Computer Studies Scheme of Work for SS3 Federal

8 Min Read
Computer Curriculum
Computer Curriculum

Federal Science Syllabus for Senior Secondary. SS 3 Computer Studies Scheme of Work First term and Second term – Schemeofwork.com

COMPUTER STUDIES SS3 FIRST TERM

WEEKTOPIC/CONTENT  ACTIVITIES
1NETWORK -Definition of networking -Types of networking -Network topology -Network devices -Benefits of networking  -Teacher leads students to define and list types of networking e.g. Ethernet, Token ring, Arcnet. -Displays each network topology in class -Drawing of flow diagram for each network topology in the class -List network devices e.g. (Hubs, Modems, Switches, Router) -State benefits of networking e.g. Sharing resources, easy communication, etc.  
2INTRODUCTION FOR WORLD WIDE WEB -Definitions and full meaning of www -Brief history of www -Introduction to www -Basic terminologies protocols  – Teacher leads students to define and gives full meaning of www. -Brief history of www in the class -Basic terminologies: www, website, webpage, home page. -Lists the protocols with full meaning, e.g. HTTP, html -Hypertext transfer protocols -Hypertext markup language  
3USES/BENEFIT OF WWW -Navigating through websites -Software for web development, cables and connectors -Network cables and connectors  – Teacher leads students to display and demonstrate a website  on the internet(H.O.E) -Navigate through websites e.g. finegoving.org -Displaying network cables and connectors in the class, e.g. twisted pair, fiber option, telephone -Displays data cables -Power cables, data cables: Printer, USB, monitor etc. -List types of connectors: e.g. male, female.
4DATA BASE -Definition -Examples of DBMS -Basic technologies -Forms of data base organization– Teacher leads students to define database and D.B packages -Mention examples of database packages: e.g. DbaseIII, DbaseIV, Foxbase. -Basic technologies: e.g. file, record, field, keys. -List different forms of data base organization -Displays an existing data base (file) in the system and features e.g. file designed as tables -Tables composed of rows and columns (field) contains specific types of information.  
5DATABASE -Creating database -Basic operations– Teacher guides students to create a database in the system(H.O.E) -Define the structure -Indicate field type -Enter and save data -Basic operations: i) Searching ii) Sorting iii) Modifying iv) Generating report  
6GRAPHICS(INTRODUCTION TO COREL DRAW) -Definition of graphics, examples of graphics -Features in CorelDraw e.g. environment: tools, color pallets.  – Teacher leads students to define graphics -Examples of graphics packages: i) Paint ii) Harvard graphics iii) Photoshop iv) Corel draw, etc -Features: Tools, and color pallets -Opening Corel; draw from programs(H.O.E)  
7GRAPHICS(COREL DRAW) -Simple design -Basic programming III (one-dimensional array) -DIM statement  -Application to make simple design e.g. i) Complimentary card, Business card ii) Birthday and congratulatory  cards iii) School logo, Nigeria flag. -Guide students to close and exit Corel draw -Define one dimensional array (i.e. using DIM  statement) -Operations on array: input of an array, output of an array, arithmetic array.  
8BASIC PROGRAMING III -Review of the for next statement, while end statement -Write BASIC program– Teacher guides students to write simple program segments on each operation and program using FOR-NEXT and WHILE-END statement. -State data in vector of 10 integer with and without a FOR-NEXT statement -Calculate the average of one dimensional array with 100 numeric value.  
9BASIC PROGRAMMING III -Calculate the area of 10 different rectangles with and without while-end statements. – High Level Language (HLL) Definition of HLL Examples:- BASIC, FORTRAN, ALGOL etc.– Teacher guides students to calculate area of 10 different rectangles with and without the WHILE-END statement -Output the sum of the first 100 integers -Output the value elements of a given array -Define high level language(HLLs) -BASIC, FORTRAN, ALGOL, C, PASCAL, P/I, PROLOG, COBOL, as given examples -BASIC, FORTRAN, ALGOL(scientific)  
1OHIGH LEVEL LANGUAGE -Classification of (HLLs) -Features of BASIC, C, PASCAL, COBOL. -Advantages of HLL over ML, LLL– Teacher leads students to classify HLLs based on suitable application of C, PASCAL,  P/I (General Purpose), LISP, PROLOG(Artificial Intelligent AI), SNOBOL(Special Purpose Programming Language), COBOL(Business) -Interpreted Language: BASIC -Compiled Language: PASCAL, COBOL, FORTRAN -State the advantages of HLLs over ML, LLL -State features of HLLs, BASIC, C,L PASCAL, COBOL, etc  
11  OVERVIEW OF NUMBER BASES -Review of number bases: decimal, hexadecimal. -Conversion in number bases-List digits in each number bases: i) Binary-2, Octal-8, Decimal-10, Hexadecimal-12 ii) Leads students to carry out conversion of a given number to another number base. E.g. 810  to binary number =810 =10002    
12OVERVIEW OF NUMBER BASES -Basic arithmetic in number bases -Addition and subtraction-Carry out simple arithmetic operation using each number bases. i) Addition operation e.g.     1102 +1112 , 0045 +2345 ii) Subtraction operation e.g.      1224 -0324 , 11102 -01012  etc.  
13RevisionRevision
14ExaminationExamination

Federal Science Syllabus for Senior Secondary. SS 3 Computer Studies Scheme of Work First term and Second term – Schemeofwork.com

COMPUTER STUDIES SS3 SECOND TERM

WEEKTOPIC/CONTENT  ACTIVITIES
1DATA REPRESENTATION -Definition of data representation. -Description of data representation. -Character set.  -Teacher leads students to define and list methods of data representation. -Description of data representations method: Bits, BCD, EBCDIC, -ASCII -Display character sets. ASCII: American Standard Code for Information Interchange.  
2SECURITY AND ETHICS -sources of security breaches -virus, worm and Trojan horse. -Poorly implemented or lack of ICT Policy.  Teacher leads students to list out the sources of security branches. E.g Virus, worms and Trojan horse. – Poorly implemented or lack of ICT Policy -poorly implemented network -careless giving out of personal and vital information on the net without careful screening.  
3SECURITY AND ETHICS – Preventive measures – Legal issues – Web content – Piracy – Cyber-Crime – Hacking. – Crime, etcLeads students to list preventive and discuss preventive measures against security breaches: -use of anti-virus software -use of fire fox -exercising care in giving out personal and vital information -encryption, proper network, implementation and policy, using sites with web certificates, exercising care in opening e-mail attachments.  
4SECURITY AND ETHICS -legal issue -web content -piracy -cyber crimes Hackinglegal issues: -Copy right -Ownership right to: text, image, audio, video -Web content. Subject to existing laws of host country -piracy: software, audio, video -Cyber crimes: identify theft, internet fraud. -Hacking: gaining authorized access to resources with the intention to cause harm.  
5RevisionRevision
6ExaminationExamination

Federal Science Syllabus for Senior Secondary. SS 3 Computer Studies Scheme of Work First term and Second term – Schemeofwork.com

Share this Article
Leave a comment