0% found this document useful (0 votes)
53 views

Ict Computer Jss3 2nd Term Note

The document outlines the lesson plan for a Basic 9 Information Technology course at Power Age Academy for the second term. It includes a detailed scheme of work spanning twelve weeks, covering topics such as worksheets, computer career opportunities, logic circuits, computer viruses, and Excel calculations. Each week has specific learning objectives, instructional materials, and evaluation methods to ensure students grasp the essential concepts of Information Technology.

Uploaded by

Faith Ozuah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views

Ict Computer Jss3 2nd Term Note

The document outlines the lesson plan for a Basic 9 Information Technology course at Power Age Academy for the second term. It includes a detailed scheme of work spanning twelve weeks, covering topics such as worksheets, computer career opportunities, logic circuits, computer viruses, and Excel calculations. Each week has specific learning objectives, instructional materials, and evaluation methods to ensure students grasp the essential concepts of Information Technology.

Uploaded by

Faith Ozuah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 31

POWER AGE ACADEMY

Motto: DOMINION AND EXCELLENCE

LESSON NOTE
EDUCATOR’S NAME:

SUBJECT: INFORMATION – TECHNOLOGY


(I.C.T)
CLASS: BASIC 9 / GRADE 9 / J.S.S. 3

TERM: SECOND TERM (2ND TERM )

SESSION:
SUBJECT: INFORMATION – TECHNOLOGY CLASS: JSS 3

SCHEME OF WORK 2ND TERM LESSON NOTE

WEEK ONE TO WEEK TWELVE

SCHEME OF WORK

WEEKS TOPICS LEARNING OBJECTIVES: At the end of the lesson the


students should be able to:
1 The worksheet Starting worksheet, data entry, editing, savings, retrieving
worksheet, formatting worksheet, ( text cell, and column, naming
2 The Worksheet ( Continued) Perform simple calculations , print data from worksheet, addition,
average, counting
3 Computer career opportunities Computer manager, systems analyst , programmers, computer
education/educators, computer engineers, technicians operators
4 Information technology (ICT) Meaning, qualities of good computer professionals, computer
professionals bodies ,Nigeria computer society (NCS) institute of
management information system (IMIS), (CPRN), ITAN, NIG
5 Logic circuit Describe logic circuit , explain and interpret logic gate,
construction of some logic gate , with their corresponding truth
table
6 Computer games Introduction to computer games, types of computer games,
advantages of playing games and disadvantages
7 MID TERM BREAK Mid-term Test
8 Computer virus Meaning of computer virus, types of computer virus, examples of
virus , source of virus e.g. infected diskette, infected CD-ROMS,
email, internet download, duplication of software
9 Virus warning signs Slowing down of response time, presence of tiny dots, wandering
across the screen, incomplete saving of the corruption of the
system, set up instructions, appearance of strange character
10 Virus detection ( Anti-virus) Meaning of anti-virus , types of anti-virus, MCA fee virus scan ,
Norton anti-virus
11 Revision Revision
12 Examination Markings

WEEK: ONE
TOPIC: REVISION OF LAST TERM’S WORK/ WELCOME TEST

WEEK: 1 DAY: SUBJECT:

DATE: TOPIC:

SUBTOPIC: PERIODS: DURATIONS:

LEARNING OBJECTIVES: At the end of the lesson, pupils should be able to

1. Define a Worksheet.
2. State the THREE types of data that can be entered into a worksheet.
3. Highlight the steps required to do the following; (a) Open a worksheet (b) Save a worksheet
(c) Retrieve a worksheet (d) Rename a worksheet
KEY VOCABULARY WORDS:

INSTRUCTIONAL MATERIALS:

CONTENT: THE WORKSHEET

Sub-Topic 1: Definition of a Worksheet:


A Worksheet can be defined as the working area of the program where entering of data and
calculations are handled. It consists of rows, columns, cells and a cell pointer.
Starting Excel worksheet: This entails the following
(i) opening a worksheet (ii) Data entry (iii) Editing (iv) saving (v) Retrieving worksheet
Opening a worksheet:
To create a new worksheet, follow the steps below:
 Open Microsoft Excel from the Start button
 Click on Office button to display a sub menu
 Select New
 Click on Create
 A new workbook will be displayed.
Method II:
 Open Microsoft Excel
 Press Ctrl + N
Data Entry:
There are three types of data that can be entered into an excel worksheet. These are Labels,
Numbers and Formula.
Labels are made up of texts that are entered into the active worksheet. Examples are letters of
alphabets (A-Z)
Numbers / values consists of numerals 0 – 9
Formulas are mathematical expressions which return calculated value.
A typical example of data entry is shown below;

Fig. 4.1: Entering data into the worksheet.


NOTE: Educators should please ensure that students practise the act of entering data into the
worksheet by entering the data shown in fig. 4.1 above.
Editing the Worksheet
Editing a worksheet means to either insert data, delete existing ones or to make corrections to the
already existing data. Fig. 4.2 below shows the edited version of fig. 4.1

Fig. 4.2: Editing Worksheet


NOTE: Educators should please ensure that the students edit the previous excel sheet (fig 4.1) to
give the excel sheet shown above (fig 4.2)
Saving a Worksheet
To save a worksheet for the first time, follow the steps below;
 Click on the Microsoft office Button
 Click on Save
 When the dialog box appears, in the save in box click on the arrow, a drop down menu
appears.
 Select a location to save e.g My Document
 Type a file name in the File name box.
 Click on Save
Save in Box Arrow for Drop Down

File Name Box Save Button


Fig 4.3: Save As Dialog Box
Subsequently, just press ctrl + S to continue saving the worksheet.
NOTE: Educators should please show the students other methods of saving a worksheet
Retrieving a Worksheet
To retrieve an existing or saved worksheet, follow the steps below;
 Load the spreadsheet package (Microsoft Excel in this case)
 Click on the File menu or the Microsoft Office button
 Click on Open, the open dialog box will be displayed
 Click on the arrow beside the Look in box
 Select My Document from the drop down menu
 Click on the File Name
 Click on Open
Sub-Topic 2:
Formatting Worksheet:
The general arrangement of data is known as ‘Formatting’. The contents of selected cells can be
formatted using the formatting tool bar. Formatting changes the way numbers and text are displayed
in a worksheet.
Changing Fonts:
NOTE: Educators should practically demonstrate the methods of changing font sizes, style, colour,
attributes(bold, italics and underline), alignment(left, right, center), style, etc.
Formatting values in a range:
The number entered in the worksheet can be formatted to have currency symbols like the dollar ($).
To follow numbers in a worksheet follow the under listed steps;
 Highlight the number(s) in the desired range
 Click on the arrow beside the number on the ribbon bar
 When the dialog box appears, click on the number tab
 Select Currency
 Click on the arrow beside the symbol to get a drop down menu
 Select the required symbol e.g dollar sign with 2 decimal places
 Click on OK

Fig. 4.4: The Format cells dialog box


NOTE: Educators should please guide the students to format the cells in fig. 4.2 above using the
steps described above.
Adjusting the Column Width:
To adjust the column width so as to accommodate the contents of the cell, follow the steps below;
 Click on the cell to be adjusted
 Position the cell pointer on the column tab,
 The cell pointer changes to a cross
 Click and drag to the right to increase the column width
 Release the mouse button
NOTE: When the hash sign (#) is displayed inside a cell that contains data, it means the content of
the cell is more than what the cell can accommodate. The column widths of that cell need to be
adjusted.
Renaming the Worksheets
When MS Excel is opened, the sheets are named Sheet 1, Sheet 2, etc. To rename a worksheet:
 Right click on the sheet tab to be renamed
 Select Rename
 Type the name you wish to give to the sheet
 Press the Enter key

Fig. 4.4: Renaming the worksheet.


Inserting Rows or Columns:
To shift existing rows or columns to create blank rows or columns, follow the steps below;
 Select the current row or column where the new row or column would be inserted
 Click on Insert menu
 Click on rows or columns
EVALUATION:
4. (a) Define a Worksheet.
(b) State the THREE types of data that can be entered into a worksheet.
1. Highlight the steps required to do the following;
(a) Open a worksheet (b) Save a worksheet (c) Retrieve a worksheet
(d) Rename a worksheet
WEEKEND ASSIGNMENT:
1. ……………….. can be defined as the working area of the program where entering of data and
calculations are handled. (a) Worksheet (b) Workbook (c) Workcell (d) row
2. Which of the following cannot be found in a worksheet? (a) Cell pointer (b) Column (c)
Animations (d) Row
3. ……………….. are mathematical expressions which return calculated value. (a) MS Excel (b)
Formula (c) Equation (d) Function
4. To save a workbook for future reference, a …………………. must be given to it. (a) File name
(b) File title (c) Reference name (d) Reference title
5. ………………… changes the way numbers and text are displayed in a worksheet. (a)
Arrangement (b) Decoration (c) Formatting (d) Highlighting
6. ………………. sign is displayed when the content of the cell is more than what the cell can
accommodate. (a) ₦ (b) (c) £ (d) #

WEEK: 2 DAY: SUBJECT:

DATE: TOPIC:

SUBTOPIC: PERIODS: DURATIONS:

LEARNING OBJECTIVES: At the end of the lesson, pupils should be able to

1. State THREE guidelines that must be followed when performing excel calculations
2. Highlight the major steps required to carry out the following calculations; (a) Addition (b)
Subtraction (c) Count (d) Average (e) Division
KEY VOCABULARY WORDS:

INSTRUCTIONAL MATERIALS: Wall charts, Pictures, Related Online Video, Flash Cards,
computers

CONTENT: THE WORKSHEET (CONTINUES)

Sub-Topic 1: EXCEL CALCULATIONS:


The basic and most powerful feature of Microsoft Excel is the ability to accept formula into the
worksheet. A Formula is an instruction that is entered to tell Excel how to Add, Subtract, Multiply,
Divide, or otherwise perform calculation by using the content of other cells.
It is advisable to construct formula that makes reference to cells in the worksheet so that the result
can be instantly generated even the values are changed.
When working on Excel calculations, the following guidelines should be noted;
(i) To enter a formula, first select the cell that will contain the formula.
(ii) All formula must begin with equal (=) sign tells Excel to treat the cells contents as a formula.
(iii) The formula should not be more than 1024 characters.
(iv) The function name (e.g. SUM, AVERAGE) which is preceded by equal (=) sign must be selected
and followed by the desired argument, i.e. =SUM(A5:F5). In this case, SUM is the function name and
A5:F5 is the argument.
Addition: Using the SUM Function
The SUM function is used to add together a range of data or numbers. To sum up the values of a
range of data:
 Open the worksheet containing data (as previously done in fig 4.2 above).
 Position the cell pointer on the desired cell i.e. the cell where the result should be displayed.
 Type equal sign, Select the function (i.e. SUM) and state the range of cells.
 MS Excel will highlight the range specified.
 Press the Enter key.
 The result is displayed.

Fig 5.1: summing up a range of values


NOTE: Educators should kindly ensure that each student follow the steps above and should also
endeavour to explain alternative methods using the ‘AUTOSUM’ symbol (), and Addition sign(+).
Subtraction: Using the IMSUB Function
The IMSUB function is used to find the difference of two numbers. To find the difference of a range
of data;
 Open the worksheet containing data (as previously done in fig 4.2 above).
 Position the cell pointer on the desired cell i.e. the cell where the result should be displayed.
 Type equal sign, Select the function (i.e. IMSUB) and state the range of cells, usually two
cells.
 MS Excel will highlight the range specified.
 Press the Enter key.
 The result is displayed.
NOTE: Educators should kindly explain alternative methods using the Subtraction sign (-)
Average: It is also possible to use the spreadsheet package to find the average of certain values or
group of numbers. To find average:
 Position the cell pointer in the desired cell where result is to be displayed
 Type “=AVERAGE (DATA RANGE)” in the formula bar
 Press the ENTER KEY
 The result is displayed in the cell
Count:
The count function is used to ascertain the number of cells within a specified range that contains
values. To use the count function;
 Position the cell pointer in the desired cell
 Click on AutoSum () and select “Count”
 Press the ENTER KEY.
Multiplication:
The multiplication function is solely for multiplication of numbers just like in arithmetic. To multiply a
range of data;
 Position the cell pointer on the desired cell i.e. the cell where the result should be displayed.
 Type equal sign, Select the function (i.e. PRODUCT) and state the range of cells.
 MS Excel will highlight the range specified.
 Press the Enter key.
 The result is displayed.
Also, the symbol (*) can be used.
Division:
To divide a range of values;
 Position the cell pointer on the desired cell i.e. the cell where the result should be displayed.
 Type equal sign, Select the function (i.e. QUOTIENT to display the integer portion of a
division) and state the range of cells.
 MS Excel will highlight the range specified.
 Press the Enter key.
 The result is displayed.
Also, the symbol (/) can be used to display the exact result.
NOTE: Educators should please endeavour to expose the students to some other functions
embedded in the worksheet program.
Sub-topic 2:
Printing of Worksheet
After the spreadsheet have been formatted and properly calculated the next thing is to get the
worksheet printed. To print your worksheet, take the following steps:
 Highlight the range to be printed
 Click on the Office button and select Print
 Select the name of the printer from the Printer Name box
 Enter the number of copies to print
 Click on Preview button and select Page Set Up. Set all the necessary parameters like
margins, page layout, paper size and grid lines (if necessary).
 Click on OK
 Click on Print.
EVALUATION
3. State THREE guidelines that must be followed when performing excel calculations
4. Highlight the major steps required to carry out the following calculations;
(a) Addition (b) Subtraction (c) Count (d) Average (e) Division
WEEKEND ASSIGNMENT
1. Which of the following signs can be used for multiplication in MS Excel? (a) + (b) X (c) & (d) *
2. In Excel, the expression C4:F20 is usually referred to as a/an …………(a) Function (b)
Function Name (c) Argument (d) Expression
3. In Excel, the function IMSUB is used for ……………(a) Addition (b) Subtraction (c)
Multiplication (d) Division
4. The ……………… function is used to ascertain the number of cells within a specified range
containing values. (a) MAXIMUM (b) COUNT (c) SORT (d) AVERAGE

WEEK: 1 DAY: SUBJECT:

DATE: TOPIC:

SUBTOPIC: PERIODS: DURATIONS:

LEARNING OBJECTIVES: At the end of the lesson, pupils should be able to

1. Define Different career opportunity in computer


KEY VOCABULARY WORDS:

INSTRUCTIONAL MATERIALS: Wall charts, Pictures, Related Online Video, Flash Cards,
computers, Computer, Projector, Explanatory posters/pictures, Explanatory Video

CONTENT: COMPUTER CAREER OPPORTUNITIES

Careers in computer are much and are rewarding.


The following are some careers in computer
1. Software Developer: they are responsible for the entire development, testing, and
maintenance of software.
2. Database Administrator: analyze and evaluate the data needs of users
3. Computer Hardware Engineer: they responsible for designing, developing, and testing
computer components, such as circuit boards, routers, and memory devices
4. Computer Systems Analyst: they assess an organization’s computer systems and
recommend changes to hardware and software to enhance the company’s efficiency.
5. Computer Network Architect: they design, implement and maintain networking and data
communication systems, including local area networks, wide area networks, extranets, and
intranets.
6. Web Developer : they plan and produce website
7. Information Security Analyst: they create systems to protect information networks and
websites from cyber-attacks and other security breaches.
8. IT Project Manager: they coordinate the efforts of a team of programmers and analysts to
complete projects
9. Computer and Information Research Scientists: they invent and design new approaches to
computing technology and find innovative uses for existing technology
10.Computer and Information Systems Managers : they analyze a company’s technology
needs and oversee the implementation of appropriate data systems
11.Computer Programmer: write codes to generate programs
12.Software Developer: manages the creation of computer program.
13.Network Administrator: manages the daily operation of computer network
PRESENTATION
 The Teacher revises the previous lesson.
 The Teacher introduces the topic.
 The Teacher explains the lessons.
CONCLUSION: the teacher sum up the lesson.
EVALUATIVE ACTIVITIES
 Mention three careers in computer and their work.

WEEK: 4 DAY: SUBJECT:

DATE: TOPIC:

SUBTOPIC: PERIODS: DURATIONS:

LEARNING OBJECTIVES: At the end of the lesson, pupils should be able to

1. Define conflict
2. State types of conflict
3. State and Explain causes of conflicts
4. Explain consequences of conflict
5. State and explain the computer professional organization in Nigeria

KEY VOCABULARY WORDS:

INSTRUCTIONAL MATERIALS: Wall charts, Pictures, Related Online Video, Flash Cards,
computers

CONTENT: INFORMATION TECHNOLOGY


Computer professionals are information technology experts. The definition has extended to those
involved in the internet industry too, those who deal with the computer industry to develop
something. They may design, build, write or sell software. A computer professional is a person who
works in the field of
A computer professional may be:
1. A person working in the field of information technology
2. A person who has undergone training in a computer-related field college, universities and
computer institutes
3. A person who has extensive knowledge in the area of computing.
Some of the qualities needed to be most successful in the computer and IT world include the
following:
1. Excellent Analytical Skills
Great computer professionals have excellent analytical skills that can be applied to solve
problems or develop new ideas.
2. Versatility
A computer professional must be versatile, it is a necessary requirement needed by a
professional who wants to be successful. The most successful computer professionals will be the
ones who have skills that extend beyond information technology, such as skills in business and
finance.
3. Commitment to Learning
Technology is constantly changing, and those who keep abreast of the latest developments in
information technology are the ones who will be the most successful. Knowledge and keeping up
with the latest trends is the key to success; there is no single person who knows everything.
4. Good Knowledge of Math
Strong mathematical skills are necessary because math is used in many computer applications,
such as when dealing with circuits or programming.
5. The Ability to Learn & Memorize Programming Languages
Computer professionals must know many programming languages and how to use a wide variety
of computer software programs. A great memory helps keep work efficient. There is a wide range
of programming languages that are widely used for coding and writing programs, so memorizing
all of them is what a decent specialist should be able to do.
6. Good Communication Skills
The soft skills of verbal and written communication are increasingly important as non-techies rely
on technological tools for their everyday business. Understanding a client’s needs and the ability
to meet those needs depend heavily on a steady stream of open communication. Those who are
not familiar with technology can be confused when the computer technology specialist uses a lot
of industry register, so you have to be able to switch between work speech and casual speech
quickly.
7. Attention to Detail
The slightest mistake can affect how a web page looks or how a program runs. Computer
personnel must pay close attention to detail to ensure everything works correctly and efficiently.
8. Multitasking Ability
People working with computers are often involved in many tasks at once and must be able to
manage all of their responsibilities simultaneously. Time management skills and an ability to
prioritize are assets as well.
9. Solid Problem Solving/Troubleshooting Capabilities
Computer professionals are called upon to solve problems with networks, software, and other
programs. They are expected to solve these problems very quickly, and having sharp
troubleshooting skills most definitely is a benefit.
10.Technical Writing Skills
Technical writing skills help a computer-savvy person explain complex concepts to those who
have limited knowledge of the computer world.
QUALITIES OF A GOOD COMPUTER PROFESSIONAL
 COMPUTER MANAGER
1. Must have ability to control, coordinate and manage things.
2. High level of Computer literacy.
3. Versatility in the field of Computer
4. Good decision-maker when it comes to computer-related issues
 COMPUTER SCIENTIST
1.
1. Good knowledge of a Computer
2. Ability to repair and maintain a computer
3. Must be able to identify good computers
 COMPUTER ENGINEER/HARDWARE ENGINEER
1.
1. Excellent knowledge of Computer repair
2. Computer parts assemblage
3. Should be able to build at least a circuit board.

 PROGRAMMER/SOFTWARE ENGINEER
1. Good computer programmer must be able to give instruction to the computer.
2. Use of computer programming language to develop programs.
3. Ability to develop a good and durable program.
4. Must be able to detect or debug a problem in a program.
 COMPUTER INSTRUCTOR/EDUCATOR
1. Teaches and trains people on the use, misuse and care of computer
2. Impacts knowledge into computer illiterates
3. Good knowledge of computer and effective operation
 COMPUTER TECHNICIANS
1. Good computer technician repairs computer
2. Assembles computer parts
3. Troubles shooting of Computer problems
4. Computer hardware maintenance and repair
 COMPUTER ANALYST/ SYSTEM ANALYST
1. Ability to analyze data
2. Train people on computer usage
3. Solve computer problems.
4. Computer setup in workplaces and schools

 NETWORKING ENGINEER
1. Computer networking
2. Troubleshooting of faulty networks
3. Network configuration.
4. Internet networking.
5. Network update knowledge
 COMPUTER OPERATOR
1. Fast typing skills.
2. Use of graphics package for design
3. Excellent use of computer for documents
4. The effective operation of the Computer
EVALUATION
1. State some of the qualities needed to be most successful in the computer and IT world
2. State general qualities of a good Computer Professional

Computer Professional Organizations In Nigeria

There are various professional organizations, that are established by enabling act of parliament.
These professionals exist in ICT as Computer Professional Bodies.

Below are some of the lists of computer professional bodies that we have in Nigeria;
1. NCS | Nigeria Computer Society:
The Nigeria Computer Society is the umbrella organization of all Information Technology
professionals, interest groups, and stakeholders in Nigeria. It was formed in 1978, as the Computer
Association of Nigeria (COAN) and transformed into NCS in 2002, as a result of harmonization with
other stakeholders and interest groups.
2. CPRN | Computer Professionals Registration Council of Nigeria:
The Computer Professional Registration Council of Nigeria was established by decree No 49 of
1993, promulgated on June 10, and appeared in the gazette on August 9, of that year.
CPRN is a body corporate, with perpetual succession, and a common seal, a legal entity charged
with the control and supervision, of the computing profession in the country. It is a government
agency, seeking to identify resourceful and focused individuals, as part of its efforts to consolidate on
recent progress in IT in Nigeria.
3. IMIS | Institute of Management Information System:
The Institute for the Management of Information Systems, is an international association, devoted to
supporting and promoting the profession.
4. ITAN | Information Technology Association of Nigeria:
ITAN is an association of over 350 Information technology-driven companies in Nigeria. It was
founded in 1991, to promote IT literacy and penetration in Nigeria; and to promote members’ interest
in the area of trade, public policy formulation, and negotiations with the government on IT policy
matters.
5. MIVAN | Microcomputer Vendors Association of Nigeria:
Microcomputer Vendors Association of Nigeria (MiVAN) was the visionary initiative of Mr. Tayo
Adeniyi, MD Worldwide Computers Ltd. It was first called ITRealms Online (ITAN) before it
metamorphosed into the Computer Vendors Association of Nigeria (CoVAN) before transforming into
its current status MIVAN in 2000.
In 2002, following industry pressures and advocacy by the Senate of the Federal Republic of Nigeria,
ITAN joined other stakeholders to form what is now the society of IT professionals in Nigeria, the
Nigeria Computer Society (NCS)
6. NIRA | Nigeria Internet Registration Association:
NIRA was founded on March 23, 2005, as a stakeholder-led organization, charged with the
management of the nation’s Country Code Top Level Domain. It is the registry for .ng internet
Domain names and maintains the database of names registered in the .ng country code top Level
Domain.
7. NCC | Nigerian Communications Commission:
The NCC is the independent regulatory body, for the Nigerian telecommunications industry. The
NCC was created under decree number 75, by the Federal Military Government of Nigeria, on 24th
November 1992. The NCC was charged with the responsibility of regulating the supply of
telecommunications services, and facilities, promoting competition, and setting performance
standards for telephone services in Nigeria.
8. NITDA | National Information Technology Development Agency:
NITDA is the clearinghouse for IT products in the public sector. The Agency is committed to the
drive, to bring government and its services closer to the people, through IT.
9. NIGF | Nigeria Internet Governance Forum:
NIGF was born as a collaborative effort of Nigeria Internet Registration Association, Federal Ministry
of Communication Technology, NCC, and the National Information Technology Development Agency
(NITDA)
The forum is a localized version of the global Internet Governance Forum.

WEEK: 5 DAY: SUBJECT:

DATE: TOPIC:

SUBTOPIC: PERIODS: DURATIONS:

LEARNING OBJECTIVES: At the end of the lesson, pupils should be able to


1. Definition of logic gate
2. Types of logic gates AND, NOT, OR
3. Symbols of each logic gate:
4. Input/output signals for AND, NOT and OR gates.

KEY VOCABULARY WORDS:

INSTRUCTIONAL MATERIALS: Wall charts, Pictures, Related Online Video, Flash Cards,
computers

CONTENT: LOGIC CIRCUIT

DEFINITION OF LOGIC GATES


A logic gate is a device that performs a logical operation on one or more inputs and produces a
single output. The most common logic gates are AND, OR, and NOT gates. These logic gates can
be combined to create complex logic circuits that perform sophisticated operations. In digital
electronics, these logic gates are implemented using transistors, diodes, or other electronic
components. In addition, logic gates can also be implemented using optical or mechanical means.
Logic gates are the building blocks of digital circuits and form the basis for modern computer
systems. Without logic gates, communication and information processing would not be possible
Some examples of real-world applications of logic gates include computer processors, memory
devices, and programmable logic controllers. Logic gates are also used in many industrial and
manufacturing processes for control and automation.
Overall, logic gates are fundamental components in the field of electronics and play a crucial role in
modern technology.
Write five multiple-choice questions with one correct answer and three wrong answers on the topic of
logic gates
Logic gates are primarily implemented using diodes or transistors acting as electronic switches, but
can also be constructed using electromagnetic relays (relay logic), fluidic logic, pneumatic logic,
optics, molecules, or even mechanical elements. With amplification, logic gates can be cascaded in
the same way that Boolean functions can be composed, allowing the construction of a physical
model of all of Boolean logic, and therefore, all of the algorithms and mathematics that can be
described with Boolean logic.
Logic circuits include such devices as multiplexers, registers, arithmetic logic units (ALUs), and
computer memory, all the way up through complete microprocessors, which may contain more than
100 million gates. In practice, the gates are made from field-effect transistors (FETs), particularly
MOSFETs (metal–oxide–semiconductor field-effect transistors).
A logic gate is an electronic device that makes decisions based on the different combinations of
digital signals present on its inputs.
It is a logical circuit device in a computer, having one output channel and one or more input
channels, which gives signal only when specific input conditions are met.
EVALUATION:
1. What is a Logic gate?
2. State three (3) examples of a logic
USES OF LOGIC Gate
Logic gates are used in digital circuits, such as computer processors and memory chips. They
perform Boolean logic operations on input signals to produce an output signal
Some common logic gate functions include AND, OR, NOT, NAND, NOR, and XOR. These gates
can also be combined to create more complex operations. Logic gates are also used in many other
electronic devices, such as cell phones and televisions. They play a crucial role in modern
technology and computing.
Write five multiple-choice questions with one correct answer and three wrong answers on “USES OF
LOGIC GATES “.
Logic Gates are used for the following;
1. They are used in integrated circuits
2. They are used in functioning of transistors, resistors and capacitors
3. They are used in making comparators
4. They are used in producing high speed CPU’s
5. They are used as elemental building blocks for devices where signals must be selected or
combined in a controlled form. This is obvious in telephone switching, satellite transmission
and digital computer operations.
6. They are used in making micro-
7. They are used in making amplifiers, and oscillator
8. They are used in vacuum tubes
9. They are used in constructing alarms used in cars and
EVALUATION:
1. State 5 uses of logic gates
GENERAL EVALUATION:
1. Define the term logic
2. Sketch the symbol of three (3) basic logic gates
3. State five (5) uses of the logic
READING ASSIGNMENT:
Students are expected to read ‘Logic gate II’ of Handbook on Computer studies for SS2.
WEEKEND ASSIGNMENT:
1. Sketch all the symbols and truth tables of the three basic logic gates and explain them in an
exercise book.
CONTENT: Alternative logic gates:
 Description of alternative logic gate
 Types of alternative logic gates NAND, NOR
 Symbols of each logic gate
 Input/output signals for: NAND, NOR
Sub-Topic 1: DESCRIPTION OF ALTERNATIVE LOGIC GATE
Although OR, AND, and NOT gate combinations are good enough for the construction of any logic
operation, there are alternative methods that could be used. The alternative logic gates are NAND
and the NOR logic gates. Alternative methods using NAND and NOR gates are more economical
and therefore more widely used.
All logic operations can be performed with combinations of just NANDs or NORs, but a combination
of NORs with NANDs is usually preferable to one provided just by NANDs.
TYPES OF ALTERNATIVE LOGIC GATES
Basic digital logic gates perform logical operations using the following standard single logic gates:
1. Logic “NAND” gate
2. Logic “NOR” gate
THE LOGIC “NAND” GATE
The logic NAND gate is a combination of the digital logic AND gate with that of an inverter, or NOT
gate connected together in series. The NAND (Not AND) gate has an output that is normally at logic
level “1” and only goes “LOW” to logic level “0” when ALL of its inputs are at logic level “1”. It is the
reverse of the ‘complementary’ form of AND gate.
The Boolean expression for a logic NAND gate, is denoted by a single dot or full stop symbol (.) with
a line or overline (-) over the expression to signify the NOT or logical negation of the NAND gate,
giving us the Boolean expression of A.B=Q.
Sub-Topic 2 : SYMBOLS OF NAND LOGIC GATE
Inputs Output
Shows invasion
Inputs Output
THE LOGIC “NOR” GATE
The logic NOR or inclusive NOR gate is a combination of the digital logic OR gate with that of an
inverter or NOT gate connected together in series. The NOT (Not OR) gate has an output that is
normally at logic “1” and only goes “LOW” to level of “0” when ANY of its inputs are at logic level “1”.
The logic NOR gate is the reverse or “complementary” from of the OR gate.
The Boolean expression for a logic NOR gate is denoted by a plus sign (+) with a line or overline (-)
over the expression to signify the NOT or logical negation of NOT gate giving us the Boolean
expression of A+B=Q
Symbol of NOR Logic gate
A.
INPUTS OUTPUT
Shows inversion
B.
INPUTS OUTPUT
EVALUATION
1. Mention the two main types of alternative logic
2. Show the arithmetic operations of NAND and NOR
READING ASSIGNMENT
Read construction of truth table for NAND and NOR gate, also uses of logic gates and summarize in
not more than one page.
WEEKEND ASSIGNMENT
Objectives
1. The output of gate negates the output of OR gate.
2. gate has a ‘D’ shape.
3. The combination of and gates is more economical for constructing
comparators.
4. The shape of gate is triangle.
5. The symbols that negate the output of a gate are and
ESSAY QUESTIONS
1. Construct a truth table of NAND for two
2. List three uses of logic

WEEK: 6 DAY: SUBJECT:

DATE: TOPIC:

SUBTOPIC: PERIODS: DURATIONS:

LEARNING OBJECTIVES: At the end of the lesson, pupils should be able to


1. Define computer games
2. State types or examples of computer games
3. State and Explain importance of computer games
4. Explain consequences of conflict

KEY VOCABULARY WORDS:

INSTRUCTIONAL MATERIALS: Wall charts, Pictures, Related Online Video, Flash Cards,
computers, Computers

CONTENT: COMPUTER GAMES

A computer game is a software that allows one to interact with objects displayed on a computer
screen
A Computer game can be called a PC game. A computer game is a game that is played on a
personal computer (PC) and not a video game console like play station. Computer game is mostly
used by people for entertainment and relaxation.
A player of the computer game can make use of a mouse, keyboard, joystick, game pad, or virtual
reality (VR).
EXAMPLES OF COMPUTER GAMES ARE:
 Scrabble
 Solitaire
 Mario
 Prince
 Test drive
 Digital puzzle
 Dave
TYPES OF GAMES
 EDUCATIONAL GAMES: help with the learning process. Games like question and answer
game, quiz fall here.
 SPORTS GAMES: these game try to imitate real professional athletes and how they move.
Examples of sport games are basketball game, volley ball game, football game.
 SIMULATIONS GAMES: it involve taking control of real-world vehicles, including tanks, ships,
and aircraft. You learn how to control these vehicles. Simulation games are used to train
professionals.
 ADVENTURE GAMES: this is a mission game, which the player have to figure out ways on
how to complete the mission. It is usually a single player game.
 MASSIVELY MULTIPLAYER ONLINE (MMO) GAMES: it is played over a LAN (local area
network) or via the Internet. Players use a network and interact with other players in the virtual
game room. You can play against people from all over the world.
 REAL-TIME STRATEGY (RTS): it is a very strategical game and is based on two teams
fighting each other in order to destroy the enemy’s main building and troops.
 PUZZLE GAME: These are brain games, with no action involved. There are many levels, from
beginner to expert, and games usually have coloured shapes and simple actions.
 STEALTH SHOOTER GAME: stealth are used to defeat your enemies. They are war games
or spy-based games.
 COMBAT GAME: you fight one on one with opponents, up close and personal like mortal
combat game.
 ACTION GAME: It is a fast-paced game where Challenges are completed by fighting with
enemies. You use a character of your choice to represent yourself and jump into the action
and you need to be fast and have good control.
IMPORTANCE OF COMPUTER GAMES
 Entertainment
 Educational
 Recreational
 Relaxation
 It improves children cognitive skills
 It improve hand and eye coordination
 It improve their mental alertness and activeness
 It gives the children morals to overcome different challenges that comes to them.
PRESENTATION
 The Teacher revises the previous lesson.
 The Teacher introduces the topic.
 The Teacher explains the lessons.
CONCLUSION: the teacher sum up the lesson.
EVALUATIVE ACTIVITIES
 List three types of computer Game.
 Mention three importance of computer Games to children.

WEEK: 7- MIDTERM BREAK MID-TERM TEST


WEEK: 8 DAY: SUBJECT:

DATE: TOPIC:

SUBTOPIC: PERIODS: DURATIONS:

LEARNING OBJECTIVES: At the end of the lesson, pupils should be able to

1. Define computer virus


2. State types of computer virus
3. State and Explain ways computer can get infected
4. Explain the sources of computer virus

KEY VOCABULARY WORDS:

INSTRUCTIONAL MATERIALS: Wall charts, Pictures, Related Online Video, Flash Cards,
computers

CONTENT: COMPUTER VIRUS

Computer Viruses
Computer Viruses are programs that can replicate their structures or effects by infecting other files or
structures on a computer. The common use of a virus is to take over a computer to steal data.
*. Computer worms
*. Computer worms are programs that can replicate themselves throughout a computer network,
performing malicious tasks throughout.
*. Ransomware
*. Ransomware is a type of malware which restricts access to the computer system that it infects,
and demands a ransom paid to the creator(s) of the malware in order for the restriction to be
removed.
*. Spyware
*. Spyware refers to programs that surreptitiously monitor activity on a computer system and report
that information to others without the user’s consent.
*.A Trojan horse
*.A Trojan horse, commonly known as aTrojan, is a general term for malicious software that pretends
to be harmless, so that a user willingly allows it to be downloaded onto the computer.
Denial-of-service attacks
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an
attempt to make a computer resource unavailable to its intended users.
Phishing
Phishing occurs when the attacker pretends to be a trustworthy entity, either via email or web page.
Victims are directed to fake web pages, which are dressed to look legitimate, via spoof emails,
instant messenger/social media or other avenues. Often tactics such as email spoofingare used to
make emails appear to be from legitimate senders
Application Vulnerability
Applications used to access Internet resources may contain security vulnerabilities such as memory
safety bugs or flawed authentication checks. The most severe of these bugs can give network
attackers full control over the computer.

What is a Computer Virus?


Computer viruses are small software programs that are designed to spread from one computer to
another and to interfere with computer operation. A virus might corrupt or delete data on your
computer, use your e-mail program to spread itself to other computers, or even erase everything on
your hard disk.
Computer viruses are often spread by attachments in e-mail messages or instant messaging
messages. That is why it is essential that you never open e-mail attachments unless you know who
it’s from and you are expecting it.
A computer virus is a malware program that, when executed, replicates by inserting copies of itself
(possibly modified) into other computer programs, data files, or the boot sector of the hard drive;
when this replication succeeds, the affected areas are then said to be “infected”.
A computer virus is a program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes. Viruses can also replicate themselves. All
computer viruses are man-made. A simple virus that can make a copy of itself over and over again is
relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all
available memory and bring the system to a halt. An even more dangerous type of virus is one
capable of transmitting itself across networks and bypassing security systems.
Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk
space or CPU time, accessing private information, corrupting data, displaying political or humorous
messages on the user’s screen, spamming their contacts, logging their keystrokes, or even
rendering the computer useless.
Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.
Computer viruses also spread through downloads on the Internet. They can be hidden in illicit
software or other files or programs you might download.
Types of Viruses
There are different types of viruses:
1. Boot Sector Virus – targets the boot sector of a hard drive and crucially effects the boot
process. Boot sector viruses became popular because of the use of floppy disks to boot a
computer. The widespread usage of the Internet and the death of the floppy has made other
means of virus transmission more effective.
2. File Infection Virus – coded viruses that attach themselves to .exe files; compressed files
such as zip or drive files.
3. Multipartite Virus – cross between a file virus and a boot sector virus.These type of viruses
spread in many different ways. Their actions vary depending on the OS installed and presence
of certain files. They tend to hide in the computer’s memory but do not infect the hard disk.
4. Network Virus – uniquely created to quickly spread throughout the local area network and
generally across the Internet as well. Typically moves within shared resources like drives and
folders.
5. Macro Virus – infects program files that use macros in the program itself, such as word
processors. These viruses infect the files created using some applications or programs that
contain macros such as doc, pps, xls and mdb. They automatically infect the files with macros
and also templates and documents that are contained in the file. They hide in documents
shared through e-mail and networks.Macro viruses include:
o Relax
o bablas
o Melissa.A
o 097M/Y2K
6. E-mail Virus – generally this is a macro virus which multiplies by sending itself to other
contacts in your address book, in hopes they’ll activate the virus as well. This is a virus spread
via an email. Such a virus will hide in an email and when the recipient opens the mail.
7. Memory Resident Viruses – They usually fix themselves inside the computer memory. They
get activated every time the OS runs and end up infecting other opened files. They hide in
RAM. This type of virus is a permanent which dwells in the RAM memory. From there it can
overcome and interrupt all of the operations executed by the system: corrupting files and
programs that are opened, closed, copied, renamed etc.Memory Resident Viruses Include:
o CMJ
o meve
o randex
o mrklunky
How Computer Viruses and Worms can impact you
The Viruses and Worms subclass of malicious software programs includes the following:
 Email-Worm
 IM-Worm
 IRC-Worm
 Net-Worm
 P2P-Worm
 Virus
 Computer Worms Most known computer worms are spread in one of the following ways:
o Files sent as email attachments
o Via a link to a web or FTP resource
o Via a link sent in an ICQ or IRC message
o Via P2P (peer-to-peer) file sharing networks
o Some worms are spread as network packets. These directly penetrate the computer
memory, and the worm code is then activated.
 Computer worms can exploit network configuration errors (for example, to copy themselves
onto a fully accessible disk) or exploit loopholes in operating system and application security.
Many worms will use more than one method in order to spread copies via networks.
There are so many ways computers can get infected with viruses. Below are the bulleted lists of
ways through which our computers can contract computer viruses.
 Infected Zip Disks: Do not put a flash disk that has been in another computer into your
computer, without scanning it for a virus.
 Emails: Email messages do not carry viruses. It is the .exe, com, or other types of executable
files that can carry a virus. Note that email allows you to send and receive messages through
the Internet, but this is one way your computer can get infected with a virus.
 Infected CD/DVD-ROMS: These are storage devices used for storing software. However,
when these CD/DVD ROMS are used to copy files, from one infected computer to another, the
virus follows.
 Infected Flash Disk: Flash disk or Flash drives connects to a computer through a USB port. It
is the most common storage device today, and it has become a major tool for transmitting
viruses from one computer to another. Be wise. Do not put a flash disk that has been in
another computer into your computer, without scanning it for a virus.
 From a Computer Network: All the nodes on a network are linked together by a big computer
called a server. The server and the clients constantly share information. It is in the process of
sharing resources and information, that viruses quickly spread to other users, especially if one
of the files shared is infected. So be careful.
 Internet Downloads: Just browsing the Internet does not put your computer at risk of getting
infected, but program downloads will do you a great deal of harm. Nowadays, the Internet is
the main area that computer viruses spread like wildfire. These viruses can be attached to
various types of Internet files, such as movies, games, and graphics that people, especially
students, download from the Internet. So, be careful how you download games.
 Illegal Duplication of Software: Some viruses were written and installed to prevent
unauthorized users of the computer, from duplicating software copies. So, when people do
some sort of gate-crashing, they gate-crash into a virus, and end up destroying their own good
files/data in their computers.
WEEK: 9 DAY: SUBJECT:

DATE: TOPIC:

SUBTOPIC: PERIODS: DURATIONS:

LEARNING OBJECTIVES: At the end of the lesson, pupils should be able to

1. State and explain the virus infection to computers

KEY VOCABULARY WORDS:

INSTRUCTIONAL MATERIALS: Wall charts, Pictures, Related Online Video, Flash Cards,
computers

CONTENT: VIRUS WARNING SIGNS

Virus Warning Signs


Virus infection can cause a malfunction of the computer system in the following ways:
1. Slowing down of the response time.
2. Presence of tiny dots.
3. Wandering across the screen.
4. Incomplete saving of file.
5. Corruption of the system set up instruction.
6. Appearance of strange characters.
7. It can cause organized program into a disorganized program and making them not to execute.
8. It destroys the partition task file, even the entire system of hard drive.
9. It causes damage to valuables stored on any storage media.
Below are some possible signs that your computer may have been infected with a computer virus;
 The appearance of strange characters.
 Appearance of double extension on recently opened attachments e.g .vbs, .gif, .jpg, .exe.
 When applications on the computer do not work properly.
 When disk drives are inaccessible.
 Slowing down response time.
 The appearance of unusual error messages.
 When anti-virus programs are blocked during installation.
 Presence of tiny dots.
 The system slows down or crashes
 The computer stops responding or locks up from time to time.
 The computer crashes and then restarts every few minutes.
 The computer restarts itself.
 Programs in the computer do not work effectively.
 Programs disappear from the computer even when you did not intentionally remove them.
 Strange sounds are heard from the inbuilt or external speakers.
 New icons unknown to you appear on your desktop.
 It can delete or change files.
 It can load or run unwanted files.
 It can make the cursor freeze.
 Files do not save properly.

WEEK: 10 DAY: SUBJECT:

DATE: TOPIC:

SUBTOPIC: PERIODS: DURATIONS:

LEARNING OBJECTIVES: At the end of the lesson, pupils should be able to

1. Define the meaning of Anti-virus


2. State some of the examples of anti-virus protection against computers

KEY VOCABULARY WORDS:

INSTRUCTIONAL MATERIALS: Wall charts, Pictures, Related Online Video, Flash Cards,
computers, Computers

CONTENT: VIRUS DETECTION

Virus Detection (Antivirus)


An antivirus is a program developed to destroy computer virus wherever it is found in the system. It
is designed to eradicate the infection act of the virus program.
Examples of Antivirus Software
1. Norton-Antivirus
2. McAfee Virus scan
3. Solomon’s Took kit
4. Penicillin
5. Microsoft
6. Check point antivirus
7. Central point antivirus
EVALUATION
1. List and explain 5 signs of virus infection.
WEEK: 11- REVISION
WEEK: 12- EXAMINATION

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy