Computer Science Lesson Notes JSS2 Third Term
Scheme of work
Week 1
Topic: THE INTERNET
Week 2
Topic: HOW THE INTERNET WORKS
Week 3
Topic: BENEFITS OF THE INTERNET
Week 4
Topic: Internet Environment
Week 5
Topic: ABUSE OF THE INTERNET
Week 6
Topic: File Sharing
Week 7
Topic: COMPUTER ETHICS I
Week 7
Topic: THE TEN COMMANDMENTS OF COMPUTER ETHICS
Week 9
Topic: SAFETY MEASURES
Week 10
Topic: Safety Measures – The Computer Laboratory
Computer science lesson note for jss2
Below are the 2022 complete computer science lesson notes for jss 2 third term
Week 1
Topic: THE INTERNET
Definition
Internet is defined as a global electronic communication network. It is one of the largest networks that link trillions of computers all over the world. You can access this network via communication devices and media such as modems, cable, telephone lines and satellite.
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies.
The internet offers many conveniences at your fingerprints. You can send messages to others, meet new friends, bank, invest, shop, fill prescription, file taxes, take online courses, play games, listen to music or watch a movie on the internet, the advantage of the internet is that you can use it from a computer anywhere in the world.
To learn more: Click here
Week 2
Topic: HOW THE INTERNET WORKS
On the internet, data and information are transferred worldwide through the servers and clients (which are computers) connected to the internet.
The computers which are responsible for management of resources i.e program and data on a network, by providing a centralized storage area, is called a SERVER. The computer which has an access to the contents of the storage area on the server is CLIENT. On the internet, a client which can access file and services on a number of servers called a Host computer. Your computer is a Host computer.
The inner structure of the internet resembles a transportation system. In the transportation system, the maximum load of traffic is concentrated on the highways, which are linked to the major cities. Similarly, on the internet, there are certain main communication lines which carry the maximum load of traffic. These lines are collectively called the INTERNET BACKBONE.
To learn more: Click here
Week 3
Topic: BENEFITS OF THE INTERNET
The benefits of the internet are as follows:
- INFORMATION: The internet gives you access to information on any subjects of your interest. This makes the internet a valuable research tool. Most sources such as news paper and magazines have websites and a number of them only exist online.
- RESEARCH: You can make use of the internet search facilities to research just about any topic you can think of. This information can help you with a school project, or a presentation at work. You can search for the data you need, or go to specific research sites.
- E-MAIL (electronic mail): Electronic mails enable us to exchange message with people around the world, including friends, family members, colleagues, customers and even people you meet on the internet. E-mail is an exciting feature of the internet as we can send and receive message over long distances. It is also fast, easy and inexpensive.
To learn more: Click here
Week 4
Topic: Internet Environment
Internet is a logical collection of networks supported by gateways, routers, bridges, hosts, and various layers of protocols. An internet permits different physical networks to function as a single, large, virtual network and permits dissimilar computers to communicate with each other, regardless of their physical connections. Processes within gateways, routers, and hosts originate and receive packet information. Protocols specify a set of rules and formats required to exchange these packets of information.
Protocols are used to accomplish different tasks in TCP/IP software. To understand TCP/IP, you should be familiar with the following terms and relationships.
To learn more: Click here
Computer Science Lesson Notes JSS2 Third Term
Week 5
Topic: ABUSE OF THE INTERNET
Internet abuse refers to improper use of the internet and may include:
- Computer Crime – or cybercrime, is any crime that involves a computer and a network. Use of computers for criminal activity.
- Cyberbullying – Use of the internet to bully and intimidate. The use of information technology to repeatedly harm or harass other people in a deliberate manner.
- Spam (electronic) – Is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site. Sending of unwanted advertising messages.
To learn more: Click here
Week 6
Topic: File Sharing
Definition
File sharing is the practice of sharing or offering access to digital information or resources, including documents, multimedia (audio/video), graphics, computer programs, images and e-books. It is the private or public distribution of data or resources in a network with different levels of sharing privileges.
File sharing can be done using several methods. The most common techniques for file storage, distribution and transmission include the following:
- Removable storage devices
- Centralized file hosting server installations on networks
- World Wide Web-oriented hyperlinked documents
- Distributed peer-to-peer networks
To learn more: Click here
Week 7
Topic: COMPUTER ETHICS I
COMPUTER ETHICS
Computer ethics are rules that govern the use of a computer system. Ethics deals with placing a “value” on acts according to whether they are “good” or “bad”. Every society has its rules about whether certain acts are ethical or not. These rules have been established as a result of consensus in society and are often written into laws. Computer ethics are increasingly becoming important because of the rising number of cyber crime issues, including software piracy, unauthorized access, pornography, spamming, target marketing, and hacking. The widespread popularity and use of the Internet has given rise to a number of cybercrime issues and concerns about user privacy. Various computing applications are tampered with to invade into other’s privacy.
To learn more: Click here
Week 8
Topic: THE TEN COMMANDMENTS OF COMPUTER ETHICS
The Ten Commandments of Computer Ethics were created in 1992 by the Computer Ethics Institute. The Ten Commandments is “a set of standards to guide and instruct people in the ethical use of computers.”
- Thou shalt not use a computer to harm other people.
- Thou shalt not interfere with other people’s computer work.
- Thou shalt not snoop around in other people’s computer files.
- Thou shalt not use a computer to steal.
- Thou shalt not use a computer to bear false witness
- Thou shalt not copy or use proprietary software for which you have not paid.
To learn more: Click here
Computer Science Lesson Notes JSS2 Third Term
Week 9
Topic: SAFETY MEASURES
SAFETY MEASURES
A person who uses computer sometimes face many problems if the computer is used for a long period of time. The problems may be health-related, like headache or vision problems and waist pain.
ERGONOMICS
Ergonomics is the study people, their physical characteristics and the ways in which the functirelationlating to their working environment, the finishers and the machine they use the mail goal of ergonomics is to the design of keyboards, computer, desk, chairs and others in the work place.
Back and neck strain can be avoided be ensuring that the chair which you seat provide proper support and by placing the monitor when you can comfortably.
To learn more: Click here
Week 10
Topic: Safety Measures – The Computer Laboratory
Computer Laboratory
A computer lab is a space that provides computer services to a defined community. Computer labs are typically provided by libraries to the public, by academic institutions to students who attend the institution, or by other institutions to the public or to people affiliated with that institution.
Rules and Regulations of Computer Laboratory
1. Students are not allowed to enter the Computer Laboratory without their Instructor or any authorized personnel. The Instructor should be the first person to come in and the last one to leave the laboratory. No computer laboratory shall be opened if there will be no instructor or IT personnel present in the laboratory.
2. Instructors shall closely monitor the conduct of their students while they are inside the laboratory. The Instructor shall not be allowed to leave the class during the instructor’s assigned laboratory hours. In the exceptional event that the instructor must leave the class, the instructor must inform IT Personnel.To learn more: Click here