Passnownow

Rated 4.8/5 by parents & students

2022 Computer Science Lesson Note for Third Term JSS2

Computer Science Lesson Notes JSS2 Third Term

Scheme of work

Week 1

Topic: THE INTERNET 

Week 2

Topic: HOW THE INTERNET WORKS

Week 3
Topic:
 BENEFITS OF THE INTERNET

Week 4

Topic: Internet Environment

Week 5

Topic: ABUSE OF THE INTERNET

Week 6

Topic: File Sharing

Week 7

Topic: COMPUTER ETHICS I

Week 7

Topic: THE TEN COMMANDMENTS OF COMPUTER ETHICS

Week 9

Topic: SAFETY MEASURES

Week 10

Topic: Safety Measures – The Computer Laboratory

 Computer science  lesson note for jss2

Below are the 2022 complete computer science  lesson notes for jss 2 third term

 

Week 1

Topic: THE INTERNET 

Definition 

Internet is defined as a global electronic communication network. It is one of the largest networks that link trillions of computers all over the world. You can access this network via communication devices and media such as modems, cable, telephone lines and satellite.

The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies.

The internet offers many conveniences at your fingerprints. You can send messages to others, meet new friends, bank, invest, shop, fill prescription, file taxes, take online courses, play games, listen to music or watch a movie on the internet, the advantage of the internet is that you can use it from a computer anywhere in the world.

To learn more: Click here

 

Week 2

Topic: HOW THE INTERNET WORKS

On the internet, data and information are transferred worldwide through the servers and clients (which are computers) connected to the internet.

The computers which are responsible for management of resources i.e program and data on a network, by providing a centralized storage area, is called a SERVER. The computer which has an access to the contents of the storage area on the server is CLIENT. On the internet, a client which can access file and services on a number of servers called a Host computer. Your computer is a Host computer.

The inner structure of the internet resembles a transportation system. In the transportation system, the maximum load of traffic is concentrated on the highways, which are linked to the major cities. Similarly, on the internet, there are certain main communication lines which carry the maximum load of traffic. These lines are collectively called the INTERNET BACKBONE.

 

To learn more: Click here

Week 3

Topic: BENEFITS OF THE INTERNET

The benefits of the internet are as follows:

  1. INFORMATION: The internet gives you access to information on any subjects of your interest. This makes the internet a valuable research tool. Most sources such as news paper and magazines have websites and a number of them only exist online.
  2. RESEARCH: You can make use of the internet search facilities to research just about any topic you can think of. This information can help you with a school project, or a presentation at work. You can search for the data you need, or go to specific research sites.
  3. E-MAIL (electronic mail): Electronic mails enable us to exchange message with people around the world, including friends, family members, colleagues, customers and even people you meet on the internet. E-mail is an exciting feature of the internet as we can send and receive message over long distances. It is also fast, easy and inexpensive.

 

       To learn more: Click here

 

 Week 4

Topic: Internet Environment

Internet is a logical collection of networks supported by gateways, routers, bridges, hosts, and various layers of protocols. An internet permits different physical networks to function as a single, large, virtual network and permits dissimilar computers to communicate with each other, regardless of their physical connections. Processes within gateways, routers, and hosts originate and receive packet information. Protocols specify a set of rules and formats required to exchange these packets of information.

Protocols are used to accomplish different tasks in TCP/IP software. To understand TCP/IP, you should be familiar with the following terms and relationships.

 

To learn more: Click here

 

Computer Science Lesson Notes JSS2 Third Term

 

Week 5

Topic: ABUSE OF THE INTERNET

Internet abuse refers to improper use of the internet and may include:

  • Computer Crime – or cybercrime, is any crime that involves a computer and a network. Use of computers for criminal activity.
  • Cyberbullying – Use of the internet to bully and intimidate. The use of information technology to repeatedly harm or harass other people in a deliberate manner.
  • Spam (electronic) –  Is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site. Sending of unwanted advertising messages.

 

      To learn more: Click here

 

Week 6

Topic: File Sharing

Definition

File sharing is the practice of sharing or offering access to digital information or resources, including documents, multimedia (audio/video), graphics, computer programs, images and e-books. It is the private or public distribution of data or resources in a network with different levels of sharing privileges.

File sharing can be done using several methods. The most common techniques for file storage, distribution and transmission include the following:

  • Removable storage devices
  • Centralized file hosting server installations on networks
  • World Wide Web-oriented hyperlinked documents
  • Distributed peer-to-peer networks

To learn more: Click here

 

 

Week 7

Topic: COMPUTER ETHICS I

COMPUTER ETHICS 

Computer ethics are rules that govern the use of a computer system. Ethics deals with placing a “value” on acts according to whether they are “good” or “bad”. Every society has its rules about whether certain acts are ethical or not. These rules have been established as a result of consensus in society and are often written into laws. Computer ethics are increasingly becoming important because of the rising number of cyber crime issues, including software piracy, unauthorized access, pornography, spamming, target marketing, and hacking. The widespread popularity and use of the Internet has given rise to a number of cybercrime issues and concerns about user privacy. Various computing applications are tampered with to invade into other’s privacy.

 

To learn more: Click here

Week 8

Topic: THE TEN COMMANDMENTS OF COMPUTER ETHICS

The Ten Commandments of Computer Ethics were created in 1992 by the Computer Ethics Institute. The Ten Commandments is “a set of standards to guide and instruct people in the ethical use of computers.”

  1. Thou shalt not use a computer to harm other people.
  2. Thou shalt not interfere with other people’s computer work.
  3. Thou shalt not snoop around in other people’s computer files.
  4. Thou shalt not use a computer to steal.
  5. Thou shalt not use a computer to bear false witness
  6. Thou shalt not copy or use proprietary software for which you have not paid.

      To learn more: Click here

Computer Science Lesson Notes JSS2 Third Term

Week 9

Topic: SAFETY MEASURES

SAFETY MEASURES

A person who uses computer sometimes face many problems if the computer is used for a long period of time. The problems may be health-related, like headache or vision problems and waist pain.

 ERGONOMICS

Ergonomics is the study people, their physical characteristics and the ways in which the functirelationlating to their working environment, the finishers and the machine they use the mail goal of ergonomics is to the design of keyboards, computer, desk, chairs and others in the work place.

Back and neck strain can be avoided be ensuring that the chair which you seat provide proper support and by placing the monitor when you can comfortably.

 

To learn more: Click here

Week 10

Topic: Safety Measures – The Computer Laboratory

Computer Laboratory

computer lab is a space that provides computer services to a defined community. Computer labs are typically provided by libraries to the public, by academic institutions to students who attend the institution, or by other institutions to the public or to people affiliated with that institution.

Rules and Regulations of Computer Laboratory

1. Students are not allowed to enter the Computer Laboratory without their Instructor or any authorized personnel. The Instructor should be the first person to come in and the last one to leave the laboratory. No computer laboratory shall be opened if there will be no instructor or IT personnel present in the laboratory.

2. Instructors shall closely monitor the conduct of their students while they are inside the laboratory. The Instructor shall not be allowed to leave the class during the instructor’s assigned laboratory hours. In the exceptional event that the instructor must leave the class, the instructor must inform IT Personnel.To learn more: Click here

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top