JSS 3 COMPUTER STUDIES

WEEK: WEEK TWO

DATE:  28TH September – 2ND October, 2020

SUBJECT: COMPUTER STUDIES

CLASS: JSS3

TOPICCOMPUTER PROFESSIONALS

LEARNING OBJECTIVES: By the end of the lesson, you should be able to:

  • List the qualities of good computer professionals.
  • Draw up a list of computer professional bodies.

QUALITIES OF GOOD COMPUTER PROFESSIONALS

Good computer professionals must possess the following attitudes to excel in the profession:

  1. Disciplined approach to professional issues.
  2. Fast and logical way of thinking.
  3. Good memory and ability to concentrate.
  4. Patience and perseverance.
  5. Ability to follow instructions accurately.
  6. A good listener with good writing skills.
  7. Ability to maintain set standards in documentation and production.
  8. Creativity in design.
  9. Flexible and open minded.
  10. Good working relationship with other team members.

Computer professional bodies

These are bodies or associations that regulate the activities of computer professionals.

List of computer professional bodies

  • Nigeria Computer Society (NCS)
  • Institute of Management Information System (IMIS)
  • Information Technology association of Nigeria (ITAN)
  • Nigeria Internet Group (NIG)
  • Computer Professional Registration Council of Nigeria (CPRN)

ASSIGNMENT:

Chapter 1,  Page  2 of concise computer science workbook for jss3  (Theory questions 1 to 5)

WEEK: WEEK THREE

DATE:  5TH OCTOBER – 9TH OCTOBER 2020

SUBJECT: COMPUTER STUDIES

CLASS: JSS3

TOPICINTERNET

SUB TOPIC: INTERNET SEACH ENGINES

LEARNING OBJECTIVES: By the end of the lesson, you should be able to:

  • Define internet
  • Define internet search engines.
  • Identify internet search engines.
  • State the specific uses of  internet search engines.

Definition of internet

The internet contains a vast collection of information which is spread out in every part of the world on remote web servers.

Definition of internet search engines

  • A search engine is an online tool which helps the users find the websites or the information which they are looking for.
  • A search engine is a software program that lets you search the internet using keywords.

A keyword (also called a search term) is a descriptive word within the web document.

Examples of internet search engines

There are several search engines but the common ones are:

  1. Google: www.Google.com
  2. Yahoo: www. Yahoo.com
  3. Bing: www. Bing.com
  4. Ask: www.ask.com
  5. Mama: www.mama.com
  6. Entireweb : www.entireweb.com
  7. Blekko: www.blekko.com
  8. Yandex : www.yandex.com
  9. ScrubyTheweb: www.scrubtheweb.com
  10. Altavista: www.altavista.com

Week 4:                 

Specific uses of search engines

  1. To source information and download them.
  2. To download up to date graphics
  3. To search for foreign admissions
  4. To search for business opportunities/ Job opportunities.
  5. To download web content such as web pages, images, documents and other files using a crawler called web robot or web spider.
  6. To store web content within the database using a tool called “index” or “indexer”

WEEK: WEEK FIVE

DATE:  19TH OCTOBER – 23RD OCTOBER 2020

SUBJECT: COMPUTER STUDIES

CLASS: JSS3

TOPICDIGITAL DIVIDE

LEARNING OBJECTIVES: By the end of the lesson, you should be able to:

  • Explain the concept of digital divide
  • State reasons for digital divide
  • Differentiate between old and new economy in line with their features.
  • Explain the limitations of the old economy
  • State the benefits of new economy

           Concept of digital divide

Digital divide is the gap or demarcation between those who use computers and the internet and those who do not.

           Reasons for digital divide

  • Economic divide
  • Usability divide
  • Empowerment divide

        Features of old economy

  • It is time consuming
  • It is labour consuming
  • It is mechanical in nature
  • It is constrained by space, time and distance.
  • It is slow

        Features of New Economy

  • It is digital in nature
  • It is technology driven
  • It is knowledge and information based.
  • It is not constrained by space, time and distance.
  • It is very fast.

         Disadvantages/Limitations of the old economy

  • It requires high capital to start business
  • It is very slow
  • It is not effective because it is retarded by distance and space.

         Advantages/Benefits of new economy

  • It requires low capital to start business
  • It creates new jobs
  • It is very fast
  • It is very effective
  • It is very easy.

WEEK: WEEK SIX

DATE:  26TH OCTOBER – 30TH OCTOBER 2020

SUBJECT: COMPUTER STUDIES

CLASS: JSS3

TOPICDATABASE

LEARNING OBJECTIVES: By the end of the lesson, you should be able to:

  • Define Database
  • Define Database Management System (DBSM)
  • Explain Database terminologies

      Definition of Database

A database is a group of related files which consists of tables that contain related information. It is the organized collection of data for one or more multiple use(s).

Examples of database include:

  • Phone book
  • Staff records
  • Stock records
  • Mailing list

Definition of Database Management system

Database Management System (DBMS) is application software that allows a user to store, organize and edit data values from a database.

The table below shows how a database looks like

Table 1.0.  Management Staff Records of Current Creations Limited

S/NNAMEIDNOBIRTHDATEPOSTSEXDEPARTMENTSALARY
1AdebayoA0115/02/71DirectorMEngineering300,400
2OlajideA0221/04/78ManagerFAccount245,200
3KehindeA0315/12/69AccountantMAccount279,500
4OgunremiA0414/09/76OperatorMEngineering250,000
5BabalolaA0501/10/65C.S.OFCust. Service148,000
6FajuyiA0621/05/79ManagerMMarketing280,000
7OmolajaA0723/08/74Ass. ManagerFMarketing250,000

Terminologies and components of Database

  • Field: A field contains category of information. It is a column in a table. The table above contains eight fields namely: S/N, NAME, ID NO, BIRTHDATE, POST, SEX, DEPARTMENT, and SALARY.
  • Character: A character can be said to be the smallest unit of data. It can be numeric, alphabetic, space, digit or symbol. E.g. P.A. Ogunremi.
  • Record: A record is a group of related fields. It is a row in a table. A record contains all the information or data for one person, thing or event. The table above has twelve records and each contains eight fields.
  • File: A data file is a group of related records. It is like a table arranged in rows and columns. A file composes of records, fields and data values.
  • Primary key: A key field that uniquely identifies a record in a database.

CLASS ACTIVITY:

Outline six fields required for a hospital database

ASSIGNMENT:

Chapter 3 of concise computer science workbook (Theory, page 12-13 QUESTION 1-5.)

WEEK: WEEK SEVEN

DATE:  2ND NOVEMBER – 6TH OCTOBER 2020

SUBJECT: COMPUTER STUDIES

CLASS: JSS3

TOPICDATABASE

LEARNING OBJECTIVES: By the end of the lesson, you should be able to:

  • State the forms of Database
  • List examples of Database Management system (DBMS)
  • Create a Database using Microsoft Access

FORMS OF DATABASE

  • Flat file
  • Hierarchical file
  • Relational file

Examples of Database Management System (DBMS)

  • Ms- Access
  • Dbase iii
  • Dbase iv
  • Oracle
  • MySQL
  • Clipper
  • Paradox
  • Ingress

13/08/2020

TOPICS TO REVISE FOR YOUR COMPUTER BECE EXAM

Meaning of ICT

Advantages and disadvantages of ICT

ICT Software And Components

Reasons For Warm Booting

The Main Parts Of A Computer

 Advantages and Disadvantages Of Computer

Classification Of A Computer

Health And Safety In Using ICT Tools

How To Turn On and Off A Computer

Parts Of A Personal Computer (PC) And their Function…

Information Processing Cycle

Frequently ICT questions  (SEE ANSWER)

1. The physical material on which a computer keeps data, instructions, and information is called.——-HARDWARE

2. Devices that extend their services to enhance the function of the computer are called—— PERIPHERALS

 3. A group of instructions that directs a computer is called—- PROGRAMS/SOFWARE

4. The memory that stores permanent instructions is referred to as——HARD DISK

 5. State three uses of the shift key on the computer keyboard.

A. To toggle between letter cases

B. To type a single capital letter

C. To highlight texts in the direction of the arrow key

6. State three ways through which computers may be damaged.

A. Liquid dropping into the computer system

B. Not following proper shut down procedures

C. Improper arrangement of computing devices

7. List three devices that may be used for transmission of messages on the internet.

A. MODEM OTHERS: SWITCHES , DATA CABLES, NETWORK CABLES

B. ROUTER

C. HUB

 8. List three toolbars available in a word processing application.

A. STANDARD TOOL BAR

B. FORMATTING TOOL BAR

C. DRAWING TOOL BAR

13/08/2020

STUDY THE QUESTIONS AND ANSWERS TO THE BECE PAST QUESTIONS BELOW

2019 BECE ICT Past Questions and answer – Paper One Share: 40 questions

1. An electronic and programmable device that processes data into useful information is called

A. computer
B. peripheral
C. processor
D. technology

SHOW ANSWER

A. computer

2. Which of the following media uses laser technology to write and read data?

A. Floppy disk
B. Hard disk
C. Optical disc
D. Pen drive

SHOW ANSWER

C. Optical disc

3. Turning off the computer is known as

A. booting
B. installation
C. programming
D. shut down

SHOW ANSWER

D. shut down

4. The following are items located on the default taskbar except

A. date
B. clock
C. recycle bin
D. start menu button

SHOW ANSWER

C. recycle bin

 
5. Files are best kept in

A. icons
B. folders
C. programs
D. applications

SHOW ANSWER

B. folders

 
6. The end results of the information processing cycle that cannot be touched is referred to as

A. hard copy
B. hardware
C. soft copy
D. software

SHOW ANSWER

C. soft copy

7. A malicious software specially designed to cause a computer system to be slow and malfunction is

A. an application
B. aa bacteria
C. a germ
D. a virus

SHOW ANSWER

D. a virus

8. The arrow keys on the computer keyboard are also referred to as

A. cursor keys
B. function keys
C. shift keys
D. special purpose keys

SHOW ANSWER

A. cursor keys

 
9. The name given to each cell according to its column label and row number is called

A. active cell
B. cell formula
C. cell reference
D. highlighted cell

SHOW ANSWER

C. cell reference

10. Which of the following applications is an example of a Word processor?

A. Excel
B. Lotus 1-2-3
C. Notepad
D. Print artist

SHOW ANSWER

C. Notepad

11. The only software that runs without a user’s instruction on a computer is the

A. application software
B. operating software
C. scanner program
D. storage program

SHOW ANSWER

B. operating software

12. The liquid Crystal Display Monitor of a computer is also known as the

A. cathode ray tube
B. display screen
C. flat panel display
D. television display

SHOW ANSWER

C. flat panel display

13. A pen-like device that is used to enter data by applying pressure on a screen is the

A. joystick
B. mouse
C. pointer
D. stylus

SHOW ANSWER

D. stylus

14. One gigabyte of data approximates to

A. 10 megabytes of data
B. 100 megabytes of data
C. 1000 megabytes of data
D. 10,000 megabytes of data

SHOW ANSWER

C. 1000 megabytes of data

 
15. Which of the following devices will turn off first when shutting down the computer?

A. Monitor
B. Stabilizer
C. System unit
D. Uninterruptible Power Supply

SHOW ANSWER

C. System unit

 
16. The title bar of an opened application always displays the name of the application and the name of the

A. computer
B. document
C. software
D. system

SHOW ANSWER

B. document

17. To remove unwanted shortcuts from the desktop which of the following options will be appropriate?

I. Click on the short icon once and press delete key on the keyboard
II. Drag the shortcut icon into the Recycle Bin
III. Right-click on the shortcut icon and select delete from the pop-up menu.

A. I and II only
B. I and III only
C. II and III only
D. I, II and III

SHOW ANSWER

D. I, II and III

18. The safety measure to prevent back ache when using the computer for a very long time is to

A. answer or receive calls when charging mobile phone
B. avoid plugging ICT tools on damaged sockets
C. position the body correctly
D. use plastic chair always

SHOW ANSWER

C. position the body correctly

19. The best measure that computer users should practice to reduce the chances of wrist and finger pains due to long term usage of the computer is to

A. adjust the lightening of the computer screen
B. close the eyes and rest them for one minute
C. spread fingers apart
D. use adjustable chair always

SHOW ANSWER

C. spread fingers apart

20. Illegal copying of operating system, application software, music and videos is referred to as copyright

A. law
B. issues
C. protection
D. infringement

SHOW ANSWER

D. infringement

21. To resave an edited document, use

A. Ctrl + C
B. Ctrl + S
C. Ctrl + V
D. Ctrl + X

SHOW ANSWER

B. Ctrl + S

22. A collection of linked documents or pages stored on millions of computers and distributed across the world is called

A. browser
B. hyperlink
C. internet
D. world wide web

SHOW ANSWER

D. world wide web

23. The device used to transform digital signals to analogue signals and vice versa on a network is a

A. hub
B. modem
C. telephone
D. digital box

SHOW ANSWER

B. modem

 
24. Google is an example of a

A. browser
B. search engine
C. spam mail
D. website

SHOW ANSWER

B. search engine

25. Mrs Famiyeh wants to copy information onto a compact disc, clean the content and later copy the information again. Which of the following media would advise her to use?

A. CD
B. CD-R
C. CD-RW
D. CD-ROM

SHOW ANSWER

C. CD-RW

26. To execute more than one program at the same time, the system software being used should be capable of

A. compatibility
B. multitasking
C. multiprocessing
D. portability

SHOW ANSWER

B. multitasking

27. Which of the following statements best describes a computer operator? A person who

A. carries a computer from one location to the other to work
B. obtains a degree in computer science and its related fields of study
C. operates the device which inputs and outputs data from the computer
D. writes computer programs for a specific purpose

SHOW ANSWER

C. operates the device which inputs and outputs data from the computer

28. A document which shows its entire text in upper case means that the user has activated the

A. alt key
B. caps lock key
C. num lock key
D. shift + F3

SHOW ANSWER

B. caps lock key

29. Pressing and releasing the left mouse button twice in quick succession is termed

A. dragging
B. double-clicking
C. left-clicking
D. right-clicking

SHOW ANSWER

B. double-clicking

30. Which of the following keys is used to create a new line in Word processing?

A. Ctrl key
B. Enter key
C. Esc key
D. Shift key

SHOW ANSWER

B. Enter key

 
31. The feature in Word processors that automatically moves the cursor to the beginning of the next line when the current typing line ends is called

A. auto text
B. auto correct
C. line flow
D. word wrap

SHOW ANSWER

D. word wrap

32. A red wavy line under a word in a Word processing document refers to word

A. not in the computer dictionary
B. not recognized by the computer
C. too long for the computer
D. too short for the computer

SHOW ANSWER

A. not in the computer dictionary

33. The shortcut to some commands on the menu bar of a Word processing application program can be found on the

A. scroll bar
B. status bar
C. standard toolbar
D. title bar

SHOW ANSWER

C. standard toolbar

34. Which of the following document views would show the document as it would look when it is printed?

A. Normal view
B. Outline view
C. Print layout view
D. Web layout view

SHOW ANSWER

C. Print layout view

35. The buttons for reload/ refresh, back, stop and forward can be found on the following applications except

A. Search engine
B. Web browser
C. Website
D. WhatsApp

SHOW ANSWER

D. WhatsApp

 
36. The software that enable users access web pages on the internet is called

A. browser
B. website
C. access engine
D. search engine

SHOW ANSWER

A. browser

 
37. In computing, the exchange of information is referred to as

A. communication
B. conversation
C. education
D. entertainment

SHOW ANSWER

A. communication

 
38. Which of the following functions is used to find the mean number in a set of numbers in Spreadsheet?

A. Average
B. Maximum
C. Minimum
D. Summation

SHOW ANSWER

A. Average

39. The content of a selected cell is shown in the

A. formula bar
B. name box
C. status bar
D. title bar

SHOW ANSWER

A. formula bar

40. An application that helps the user to change any number in a cell and immediately see the result of that change in another cell is a

A. Database
B. Presentation
C. Spreadsheet
D. Word processor

SHOW ANSWER

C. Spreadsheet

13/08/2020

2019 BECE ICT Past Questions and answer – Paper Two Share: 5 questions

1. Study the text below carefully and use it to answer questions 1(a) to (g).

A.

DISEASES: HOW TO CONTROL THE RISK

     Everyday our body wages war against enemies that are silent and unseen but potentially deadly. Foreign invaders, such as bacteria, viruses, and parasites, threaten your health. You are not likely to be aware of those battles because your immune system repels or destroys most of the invaders before the onset of the symptoms.

    For thousands of years, people knew virtually nothing about the dangers of microscopic or other small harmful organisms. However, when the 19th-century scientists confirmed the link between germ and diseases, we became better equipped to defend ourselves.

     Medical researches have since eliminated or greatly reduced the threat of some infectious diseases, including smallpox and polio. Recently, however, others, such as yellow fever and dengue, have made a comeback

(a) Write down the application software that was used to create above text.

(b) List two examples of the application software mentioned in (a) above.

(c) Give the name of the text area labeled A.

(d) Write down the name of the font styles applied to the following words in the text

(i) Potentially deadly
(ii) harmful organisms
(iii) medical researches

(e) Write down the type of alignment applied to the paragraph l

(f) List the steps used in underlining the words in the text area labelled A, which was typed with the caps lock key on

(g) write down the name given to the process of applying the various styles and paragraphs to the text

SHOW ANSWER

(a) Word Processing Software

(b) Microsoft Office, OpenOffice and wordpad.

(c) Heading / Title

(d) potentially deadly – Bold Text
(ii) harmful organisms – Italic
(iii) Medical researches – Bold italic

(e) Left alignment

(f) To underline the given text, first select the text you want to underline by holding the left mouse button and dragging it over the text you want to underline.
Then Press Ctrl + U

(g). Text formatting

 
2. (a) Using the table below, indicate where the following components can be seen on the computer
system unit.

CD/DVD slot,  CPU,  Floppy disk slot, Memory, Motherboard, Power button, Power supply port, PS/2 port, VGA port.

BACK VIEWFRONT VIEWINSIDE VIEW
   
   
   

(b) What is copyright?

SHOW ANSWER

(a).

BACK VIEWFRONT VIEWINSIDE VIEW
 VGA Port CD/DVD SlotCPU
 Power supplyFloppy Disk slotMemory
 PS/2 PortPower buttonMotherboard

(b) Copyright is a legal right given to an author that prevents unauthorized copying and distribution of a person’s
intellectual property.
 

3. Explain the following computer terms:

(a) Hardware

(b) Network

(c) Software

(d) Virus

SHOW ANSWER

(a) Hardware – The physical components of a computer system that can be seen and touched.

(b) Network – A connection between two or more computers.

(c) Software – A software is a set of instructions or programs that instructs a system for performing a task.

(d) Virus – A computer virus is a software program that can spread from one computer system to another and cause interference with normal computer operations.

4. (a) State the function of each of the following devices:
(i) Floppy disk

(ii) Keyboard

(iii) Uninterruptible power supply

(b) Explain each of the following terms:
(i) Clicking;

(ii) Dragging

SHOW ANSWER

(a)(i) Floppy disk – Storing Data

(ii) Keyboard – It is used as an input device.

(iii) Uninterruptible power supply – It is a device that allows a computer to keep running for at least a short time when the primary power source is lost.

(b) (i) Clicking – Pressing and releasing a mouse button without moving the mouse.

(ii) Dragging – Pressing and holding a button whilst moving the mouse.

5. State three uses of computers each of the following areas:

(a) Education;

(b) Everyday life

SHOW ANSWER

(a) Education
1. Researching
2. Teaching
3. Learning.
4. Communication between students, parents, and teachers.

(b) Everyday life
1. For entertainment (listening to music, watching movies)
2. For business
3. communication
4. Seeking information

Date delivered: 18/5/2020

Hello students, this is to inform you that we will revise the following topics

  1. spreadsheets
  2. Word processing
  3. Digital divide
  4. Internet
  5. Computer professionals
  6. Computer viruses

SPREADSHEETS

Learning objectives: By the end of the lesson, you should be able to:

  1. Define spreadsheet packages
  2. Name some spreadsheet application packages
  3. State the uses of spreadsheet packages
  4. Describe the spreadsheet features and terminologies
  5. Load and exit spreadsheet packages
  6. Perform simple calculations using microsoft excel

Definition of spreadsheet

A spreadsheet (or worksheet) is an arrangement of cells in columns and rows used to organise, analyse, calculate, and report information, usually in numerical form.

Examples of spreadsheet application packages

  1. Googlesheets
  2. iworknumber
  3. Libre office
  4. Lotus 1-2-3
  5. Lotus symphony
  6. Micosoft Excel
  7. Open office
  8. Visicalc

Uses of spreadsheet application packages

  1. Preparation of daily sales report
  2. Budget planning
  3. To create charts/graphs
  4. Preparation of students’ examination result
  5. Calculation and analysis of data

Spreadsheet features and terminologies

  1. Row: Rows are horizontal lines in a worksheet that are labeled by numbers on the left side of the worksheet.
  2. Columns:These are vertical lines in a worksheet. Columns are labelled by letters across the top of the worksheet.
  3. Worksheet: An Excel worksheet is made up of rows, columns and cells. This is where entering of data is done.
  4. Cell: A cell is the intersection of a row and column in a worksheet. Each cell is labelled by the row number and the column letter, e.g. Cell A1,Cell F9.etc.
  5. Charts: Charts (graphs) are graphical representations of data. A spreadsheet package can be used to plot different types of graphs.

Loading and exiting spreadsheet packages

Loading spreadsheet package

STEP 1: Click on the start button

STEP2: Click on all programs

STEP3: Click on microsoft office

STEP4: Click on Microsoft Excel. The excel worksheet appears.

Exiting spreadsheet package

Click the close button on the title bar

Class Activity:

Use Microsoft Excel to answer this question.

A B C D E F

  1. ADEKEYE TEA SALES-BOOK
  2. PARTICULARS QUANTITY COSTPRICE
  3. SUGAR 1 150
  4. MILK 3 300
  5. MILO 1 650
  6. LIPTON 1 150
  7. BREAD 10 500

Give the formular to perform the following operations:

(a) Calculate the total cost.

(b) Calculate depreciation as 5% of total cost.

(c) Find the average cost.

Write your name and email in the spaces provided below. before writing your answers in the message box, write your subject name first. e.g (Computer jss3)

No Fields Found.