Ict Computer Jss3 2nd Term Note
Ict Computer Jss3 2nd Term Note
LESSON NOTE
EDUCATOR’S NAME:
SESSION:
SUBJECT: INFORMATION – TECHNOLOGY CLASS: JSS 3
SCHEME OF WORK
WEEK: ONE
TOPIC: REVISION OF LAST TERM’S WORK/ WELCOME TEST
DATE: TOPIC:
1. Define a Worksheet.
2. State the THREE types of data that can be entered into a worksheet.
3. Highlight the steps required to do the following; (a) Open a worksheet (b) Save a worksheet
(c) Retrieve a worksheet (d) Rename a worksheet
KEY VOCABULARY WORDS:
INSTRUCTIONAL MATERIALS:
DATE: TOPIC:
1. State THREE guidelines that must be followed when performing excel calculations
2. Highlight the major steps required to carry out the following calculations; (a) Addition (b)
Subtraction (c) Count (d) Average (e) Division
KEY VOCABULARY WORDS:
INSTRUCTIONAL MATERIALS: Wall charts, Pictures, Related Online Video, Flash Cards,
computers
DATE: TOPIC:
INSTRUCTIONAL MATERIALS: Wall charts, Pictures, Related Online Video, Flash Cards,
computers, Computer, Projector, Explanatory posters/pictures, Explanatory Video
DATE: TOPIC:
1. Define conflict
2. State types of conflict
3. State and Explain causes of conflicts
4. Explain consequences of conflict
5. State and explain the computer professional organization in Nigeria
INSTRUCTIONAL MATERIALS: Wall charts, Pictures, Related Online Video, Flash Cards,
computers
PROGRAMMER/SOFTWARE ENGINEER
1. Good computer programmer must be able to give instruction to the computer.
2. Use of computer programming language to develop programs.
3. Ability to develop a good and durable program.
4. Must be able to detect or debug a problem in a program.
COMPUTER INSTRUCTOR/EDUCATOR
1. Teaches and trains people on the use, misuse and care of computer
2. Impacts knowledge into computer illiterates
3. Good knowledge of computer and effective operation
COMPUTER TECHNICIANS
1. Good computer technician repairs computer
2. Assembles computer parts
3. Troubles shooting of Computer problems
4. Computer hardware maintenance and repair
COMPUTER ANALYST/ SYSTEM ANALYST
1. Ability to analyze data
2. Train people on computer usage
3. Solve computer problems.
4. Computer setup in workplaces and schools
NETWORKING ENGINEER
1. Computer networking
2. Troubleshooting of faulty networks
3. Network configuration.
4. Internet networking.
5. Network update knowledge
COMPUTER OPERATOR
1. Fast typing skills.
2. Use of graphics package for design
3. Excellent use of computer for documents
4. The effective operation of the Computer
EVALUATION
1. State some of the qualities needed to be most successful in the computer and IT world
2. State general qualities of a good Computer Professional
There are various professional organizations, that are established by enabling act of parliament.
These professionals exist in ICT as Computer Professional Bodies.
Below are some of the lists of computer professional bodies that we have in Nigeria;
1. NCS | Nigeria Computer Society:
The Nigeria Computer Society is the umbrella organization of all Information Technology
professionals, interest groups, and stakeholders in Nigeria. It was formed in 1978, as the Computer
Association of Nigeria (COAN) and transformed into NCS in 2002, as a result of harmonization with
other stakeholders and interest groups.
2. CPRN | Computer Professionals Registration Council of Nigeria:
The Computer Professional Registration Council of Nigeria was established by decree No 49 of
1993, promulgated on June 10, and appeared in the gazette on August 9, of that year.
CPRN is a body corporate, with perpetual succession, and a common seal, a legal entity charged
with the control and supervision, of the computing profession in the country. It is a government
agency, seeking to identify resourceful and focused individuals, as part of its efforts to consolidate on
recent progress in IT in Nigeria.
3. IMIS | Institute of Management Information System:
The Institute for the Management of Information Systems, is an international association, devoted to
supporting and promoting the profession.
4. ITAN | Information Technology Association of Nigeria:
ITAN is an association of over 350 Information technology-driven companies in Nigeria. It was
founded in 1991, to promote IT literacy and penetration in Nigeria; and to promote members’ interest
in the area of trade, public policy formulation, and negotiations with the government on IT policy
matters.
5. MIVAN | Microcomputer Vendors Association of Nigeria:
Microcomputer Vendors Association of Nigeria (MiVAN) was the visionary initiative of Mr. Tayo
Adeniyi, MD Worldwide Computers Ltd. It was first called ITRealms Online (ITAN) before it
metamorphosed into the Computer Vendors Association of Nigeria (CoVAN) before transforming into
its current status MIVAN in 2000.
In 2002, following industry pressures and advocacy by the Senate of the Federal Republic of Nigeria,
ITAN joined other stakeholders to form what is now the society of IT professionals in Nigeria, the
Nigeria Computer Society (NCS)
6. NIRA | Nigeria Internet Registration Association:
NIRA was founded on March 23, 2005, as a stakeholder-led organization, charged with the
management of the nation’s Country Code Top Level Domain. It is the registry for .ng internet
Domain names and maintains the database of names registered in the .ng country code top Level
Domain.
7. NCC | Nigerian Communications Commission:
The NCC is the independent regulatory body, for the Nigerian telecommunications industry. The
NCC was created under decree number 75, by the Federal Military Government of Nigeria, on 24th
November 1992. The NCC was charged with the responsibility of regulating the supply of
telecommunications services, and facilities, promoting competition, and setting performance
standards for telephone services in Nigeria.
8. NITDA | National Information Technology Development Agency:
NITDA is the clearinghouse for IT products in the public sector. The Agency is committed to the
drive, to bring government and its services closer to the people, through IT.
9. NIGF | Nigeria Internet Governance Forum:
NIGF was born as a collaborative effort of Nigeria Internet Registration Association, Federal Ministry
of Communication Technology, NCC, and the National Information Technology Development Agency
(NITDA)
The forum is a localized version of the global Internet Governance Forum.
DATE: TOPIC:
INSTRUCTIONAL MATERIALS: Wall charts, Pictures, Related Online Video, Flash Cards,
computers
DATE: TOPIC:
INSTRUCTIONAL MATERIALS: Wall charts, Pictures, Related Online Video, Flash Cards,
computers, Computers
A computer game is a software that allows one to interact with objects displayed on a computer
screen
A Computer game can be called a PC game. A computer game is a game that is played on a
personal computer (PC) and not a video game console like play station. Computer game is mostly
used by people for entertainment and relaxation.
A player of the computer game can make use of a mouse, keyboard, joystick, game pad, or virtual
reality (VR).
EXAMPLES OF COMPUTER GAMES ARE:
Scrabble
Solitaire
Mario
Prince
Test drive
Digital puzzle
Dave
TYPES OF GAMES
EDUCATIONAL GAMES: help with the learning process. Games like question and answer
game, quiz fall here.
SPORTS GAMES: these game try to imitate real professional athletes and how they move.
Examples of sport games are basketball game, volley ball game, football game.
SIMULATIONS GAMES: it involve taking control of real-world vehicles, including tanks, ships,
and aircraft. You learn how to control these vehicles. Simulation games are used to train
professionals.
ADVENTURE GAMES: this is a mission game, which the player have to figure out ways on
how to complete the mission. It is usually a single player game.
MASSIVELY MULTIPLAYER ONLINE (MMO) GAMES: it is played over a LAN (local area
network) or via the Internet. Players use a network and interact with other players in the virtual
game room. You can play against people from all over the world.
REAL-TIME STRATEGY (RTS): it is a very strategical game and is based on two teams
fighting each other in order to destroy the enemy’s main building and troops.
PUZZLE GAME: These are brain games, with no action involved. There are many levels, from
beginner to expert, and games usually have coloured shapes and simple actions.
STEALTH SHOOTER GAME: stealth are used to defeat your enemies. They are war games
or spy-based games.
COMBAT GAME: you fight one on one with opponents, up close and personal like mortal
combat game.
ACTION GAME: It is a fast-paced game where Challenges are completed by fighting with
enemies. You use a character of your choice to represent yourself and jump into the action
and you need to be fast and have good control.
IMPORTANCE OF COMPUTER GAMES
Entertainment
Educational
Recreational
Relaxation
It improves children cognitive skills
It improve hand and eye coordination
It improve their mental alertness and activeness
It gives the children morals to overcome different challenges that comes to them.
PRESENTATION
The Teacher revises the previous lesson.
The Teacher introduces the topic.
The Teacher explains the lessons.
CONCLUSION: the teacher sum up the lesson.
EVALUATIVE ACTIVITIES
List three types of computer Game.
Mention three importance of computer Games to children.
DATE: TOPIC:
INSTRUCTIONAL MATERIALS: Wall charts, Pictures, Related Online Video, Flash Cards,
computers
Computer Viruses
Computer Viruses are programs that can replicate their structures or effects by infecting other files or
structures on a computer. The common use of a virus is to take over a computer to steal data.
*. Computer worms
*. Computer worms are programs that can replicate themselves throughout a computer network,
performing malicious tasks throughout.
*. Ransomware
*. Ransomware is a type of malware which restricts access to the computer system that it infects,
and demands a ransom paid to the creator(s) of the malware in order for the restriction to be
removed.
*. Spyware
*. Spyware refers to programs that surreptitiously monitor activity on a computer system and report
that information to others without the user’s consent.
*.A Trojan horse
*.A Trojan horse, commonly known as aTrojan, is a general term for malicious software that pretends
to be harmless, so that a user willingly allows it to be downloaded onto the computer.
Denial-of-service attacks
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an
attempt to make a computer resource unavailable to its intended users.
Phishing
Phishing occurs when the attacker pretends to be a trustworthy entity, either via email or web page.
Victims are directed to fake web pages, which are dressed to look legitimate, via spoof emails,
instant messenger/social media or other avenues. Often tactics such as email spoofingare used to
make emails appear to be from legitimate senders
Application Vulnerability
Applications used to access Internet resources may contain security vulnerabilities such as memory
safety bugs or flawed authentication checks. The most severe of these bugs can give network
attackers full control over the computer.
DATE: TOPIC:
INSTRUCTIONAL MATERIALS: Wall charts, Pictures, Related Online Video, Flash Cards,
computers
DATE: TOPIC:
INSTRUCTIONAL MATERIALS: Wall charts, Pictures, Related Online Video, Flash Cards,
computers, Computers