Passnownow

Rated 4.8/5 by parents & students

THIRD TERM SCHEME OF WORK FOR SS1 COMPUTER SCIENCE LESSON NOTE

Computer Studies Scheme of Work for SS1 Third Term

 SCHEME OF WORK

WEEK 1 HOW THE INTERNET WORKS

WEEK 2: INTERNET BENEFITS TO USERS

WEEK 3: ABUSE OF THE INTERNET

WEEK 4 THE TEN COMMANDMENTS OF COMPUTER ETHICS

WEEK 5: COMPUTER VIRUSES

WEEK 6: APPLICATION SOFTWARE

Below are the 2022 complete SS1 Third Term Computer Science Lesson Note 

Third Term SS1 Computer Science Lesson

Week 1

Topic: HOW THE INTERNET WORKS

HOW THE INTERNET WORKS

On the internet, data and information are transferred worldwide through the servers and clients (which are computers) connected to the internet.

The computers which are responsible for the management of resources i.e programs and data on a network, by providing a centralized storage area, is called a SERVER. The computer which has an access to the contents of the storage area on the server is the CLIENT. On the internet, a client can access files and services on a number of servers called a Host computers. Your computer is a Host computer.

The inner structure of the internet resembles a transportation system. In the transportation system, the maximum load of traffic is concentrated on the highways, which are linked to the major cities. Similarly, on the internet, there are certain main communication lines which carry the maximum load of traffic. These lines are collectively called the INTERNET BACKBONE. To learn more, Click here.

Week 2

Topic: BENEFITS OF THE INTERNET

BENEFITS OF THE INTERNET

The benefits of the internet are as follows:

  1. INFORMATION: The internet gives you access to information on any subjects of your interest. This makes the internet a valuable research tool. Most sources such as newspapers and magazines have websites and a number of them only exist online.                                                                                             2. RESEARCH: You can make use of the internet search facilities to research just about any topic you can think of. This information can help you with a school project, or a presentation at work. You can search for the data you need, or go to specific research sites.
  2. E-MAIL (electronic mail): Electronic mails enable us to exchange message with people around the world, including friends, family members, colleagues, customers and even people we meet on the internet. E-mail is an exciting feature of the internet as we can send and receive messages over long distances. It is also fast, easy and inexpensive.
  3. ENTERTAINMENT: The internet offers many different forms of entertainment, such as radio and television broadcasts, video and music. You can find pictures from the latest film, watch a live interview of your favourite celebrities and listen to music before it is available in stores.
  4. PROGRAM: You can find thousands of programs that can be used on your computer, such as word processors, drawing programs, games and accounting programs. To learn more, Click here.

Week 3

Topic: ABUSE OF THE INTERNET

Internet abuse refers to improper use of the internet and may include:

  • Computer Crime – or cybercrime, is any crime that involves a computer and a network. Use of computers for criminal activity.
  • Cyberbullying – Use of the internet to bully and intimidate. The use of information technology to repeatedly harm or harass other people in a deliberate manner.             Spam (electronic) – This is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site. Sending unwanted advertising messages.
  • Malware – Software designed to harm a user’s computer, including computer viruses. Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, or gain access to private computer systems. Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency.

Week 4

Topic: THE TEN COMMANDMENTS OF COMPUTER ETHICS

COMPUTER ETHICS

Computer ethics are rules that govern the use of a computer system. Ethics deals with placing a “value” on acts according to whether they are “good” or “bad”. Every society has its rules about whether certain acts are ethical or not. These rules have been established as a result of consensus in society and are often written into laws. Computer ethics are increasingly becoming important because of the rising number of cybercrime issues, including software piracy, unauthorized access, pornography, spamming, target marketing, and hacking. The widespread popularity and use of the Internet have given rise to a number of cybercrime issues and concerns about user privacy. 

THE TEN COMMANDMENTS OF COMPUTER ETHICS

The Ten Commandments of Computer Ethics were created in 1992 by the Computer Ethics Institute. The Ten Commandments is “a set of standards to guide and instruct people in the ethical use of computers.”

  1. Thou shalt not use a computer to harm other people.
  2. Thou shalt not interfere with other people’s computer work.
  3. Thou shalt not snoop around in other people’s computer files.
  4. Thou shalt not use a computer to steal. To learn more, Click here.

Week 5

Topic: Computer Viruses

What are Computer Viruses?

Computer viruses are small software programs that are designed to spread from one computer to another and interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.

Computer viruses are often spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it’s from and you are expecting it.

computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be “infected”.  To learn more, Click here.

Week 6

Topic: Application Software

APPLICATION SOFTWARE

Application software is any tool that functions and is operated by the means of a computer with the purpose of supporting or improving the software user’s work. It is used for the implementation of the computer user’s work.

 TYPES OF APPLICATION SOFTWARE

It is divided into two which are

(i) User application software: User–written software is tailored to meet the user’s specific needs. This includes spreadsheet templates, word processor macros, scientific simulations, graphics, and animation scripts. Users create this software themselves and often overlook how important it is.

(ii) Application packages: This is when multiple applications are bundled together as one package. It is also known as an application suite. Examples are Microsoft office, Open office.org, and work which bundle together a word processor, a spreadsheet, and several other discrete applications. The separate applications in a suite usually have some capability to interact with each other in ways beneficial to the user. To learn more, Click here.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top