First Term, Second Term and Third Term Computer Studies – Information Technology Scheme of Work for JSS 3

 

 

COMPUTER STUDIES

INFORMATION TECHNOLOGY

JUNIOR SECONDARY SCHOOL (JSS 3)

FIRST TERM

 

WEEKS TOPICS/CONTENTS

 

1. REVISION ON THE INTERNET

Examples of Search Engines – google.com, mama.com, ask.com, yahoo.com, etc.

 

2. USES OF SEARCH ENGINES

Use the Search Engines to obtain Information and Download Materials on the Internet

 

3. DIGITAL DIVIDE

I. Concept of Digital Divide

II. Features of Old Economy – Time Consuming, Labor Based, Mechanical, Constrained by Space, Time and Mechanical

III. Limitation of Old Economy

 

4. FEATURES OF NEW ECONOMY 

I. Digital, Time, Space and distance is irrelevant, Knowledge based, etc.

II. Benefits of new economy – Low capital, business, create new jobs, etc.

 

5. DIGITAL LITERACY 

– Meaning of Digital Literacy

– Characteristics of Digital Literacy

 

6. DIGITAL LITERACY (CONT’D) 

Digital Literacy use in Education, Workforce and Society

 

7. DATABASE

I. Operational Definition of Database

II. Database Terminologies – Fields, Records, Files, Keys, etc. (State and Explain the Database Terminology)

 

8. FORMS OF DATABASE

I. Flat File

II. Hierarchical

III. Relational

IV. Preparation of Results Sheet

V. Start and open an existing database, Input, Store and Retrieve Information from a Database Application

 

9. SPREADSHEET

I. Examples of Spreadsheet Packages – Excel, Lotus 123, STATVIEW, etc.

II. Uses of spreadsheet packages – preparation of daily sales, budget, Examination Results

 

10. SPREADSHEET PACKAGES (CONTINUATION) 

I. Spreadsheet Features and Terminologies – Row, Column, Cell, Worksheets, Charts, Data Range, etc.

II. Load and existing spreadsheet packages.

 

11. | 13. REVISION AND EXAMINATION

 

 

COMPUTER STUDIES

INFORMATION TECHNOLOGY

JUNIOR SECONDARY SCHOOL (JSS 3)

SECOND TERM

 

WEEKS TOPICS/CONTENTS

 

1. GRAPHIC

Creating Graphs – Line graphs, Histogram, Pie charts, Legends, etc

 

2. EDITING GRAPHS 

I. Formatting Graphs – Line graphs, Histogram, Pie charts, Legends, etc.

II. Identify and Select Data Range and Area for Graph Construction

 

3. THE WORKSHEETS 

I. Starting Worksheets

II. Data Entry

III. Editing

IV. Saving

V. Retrieving Worksheets

VI. Formatting worksheets ( text, Cell and column, naming, etc. )

 

4. CALCULATIONS

I. Addition, Average, Counting, Multiplication, Division, etc

II. Printing of Worksheets.

 

5. COMPUTER CAREER OPPORTUNITIES 

I. Computer Professionals – Computer Manager, System Analyst, Programmers

II. Computer Education, Computer Engineers and Technicians, and Operators

– State the Functions of each of the Professional

 

6. QUALITIES OF GOOD COMPUTER PROFESSIONALS

I. Computer Professional Bodies – Nigeria Computer Society (NCS), Institute of Management Information System (IMIS), Computer Professional Registration Council of Nigeria (CPRN), Information Technology Association of Nigeria (ITAN) and Nigeria Internet Group (NIG)

 

7. LOGIC CIRCUIT 

I. Introduction to Logic

II. Interpreting Logic Gate and Circuit

 

8. CONSTRUCTION OF TRUTH TABLES FOR, OR, AND, NOT, ETC. 

 

9. COMPUTER GAMES

I. Introduction to Computer Game

II. Types of Computer Games

 

10. COMPUTER GAMES (CONTINUATION) 

I. Advantages of Playing Computer Games

– Disadvantages of Playing Computer Games

 

11. REVISION

 

12. | 13. EXAMINATION

 

 

COMPUTER STUDIES

INFORMATION TECHNOLOGY

JUNIOR SECONDARY SCHOOL (JSS 3)

SECOND TERM

 

WEEKS TOPICS/CONTENTS

 

1. COMPUTER VIRUS

I. State the Meaning of Computer Virus

II. Types of Computer Virus  – Book Sector, Executable File Virus, Attack on Document

III. Examples of Computer Virus – Trojan Horse, Sleeper, Logic Bomb, Alabama Virus and Christmas Virus

 

2. SOURCES OF VIRUSES

I. Infected Diskettes

II. Infected CD – ROMS

III. E – mail

IV. Internet Download

V. Illegal Duplication of Software, etc

 

3. VIRUS WARNING SIGNS

I. Slowing Down of Response Time

II. Presence of Tiny Dots

III. Wandering Across the Screen

IV. Incomplete Saving of File

V. Corruption of the System Setup Instructions

VI. Appearance of strange characters.

 

4. VIRUS DETECTION (ANTI VIRUS) 

I. Norton Anti Virus

II. McAfee Virus Scan

III. Dr. Solomon’s Took Kite, etc.

 

5. – 12. REVISION AND EXAMINATION