Displaying items by tag: Computer Studies Schemes of Work

                    SCHEMES OF WORK      FORM 2  COMPUTER STUDIES       T ERM 3 2020/2021
WEEK LESSON TOPIC SUB-TOPIC OBJECTIVES LEARNING/TEACHING ACTIVITIES LEARNING/TEACHING RESOURCES REFERENCES REMARKS
  1    Reporting from home and settling for the third term work      
  2  1  

INTERNET AND E-MAIL

By the end of the lesson, the learner should be able to

  • Define the term internet
  • Explain the development of internet
  • Q/A discussion
  • Demonstration
  • Observation
  • Internet
  • Text book
  • Working Computer
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 168-169
 
   2-3   IMPORTANCE OF THE INTERNET

By the end of the lesson, the learner should be able to

  • Explain the importance of the internet
  • Q/A demonstration practical
  • Handouts
  • Books
  • Working computer
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 266-275
 
 3  1   INTERNET CONNECTIVITY

By the end of the lesson, the learner should be able to

  • Define the internet connectivity
  • Explain elements of IC
  • Q/A Demonstration Practical
  • Handouts
  • Books
  • Modem S/W
  • Working computer
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 273-276
 
   2-3   INTERNET SERVICES

By the end of the lesson, the learner should be able to

  • Explain the internet services
 
  • Q/A Demonstration Practical
  • Letters
  • Cards
  • Books
  • computer
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 273-276
 
 4  1   ACCESSING INTERNET

By the end of the lesson, the learner should be able to

  • Log in/Sign in
  • Surf/browse
 
  • Q/A Demonstration Practical
  • Web pages
  • Books
  • Working computer
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 279
 
   2-3   HYPERLINKS AND SEARCH ENGINES

By the end of the lesson, the learner should be able to

  • Define the term search engine
  • Use search engines
 
  • Q/A Demonstration Practical
  • Letters
  • Card
  • Working computer
 
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 177-179
 
 5  1   ELECRTONIC MAIL

By the end of the lesson, the learner should be able to

  • Explain the term e-mail
  • Discuss the use of email s/w
 
  • Q/A Demonstration Practical
  • Handouts
  • Books
  • Working computer
 
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 178-180
 
   2-3   E-MAIL

By the end of the lesson, the learner should be able to

  • State the e-mail facilities
  • Compose mails
  • Check mails
 
  • Q/A Demonstration Practical
  • Books
  • Web pages
  • Working computer
 
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 30-37
 
 6  1   E-MAIL

By the end of the lesson, the learner should be able to

  • Manipulate an e-mail
  • Q/A Demonstration Practical
  • Handouts
  • Books
  • Web pages
  • Working computer
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 180
 
   2-3   SET-UP

By the end of the lesson, the learner should be able to

  • Fax e-mail
  • Attach files
  • Q/A Demonstration Practical
  • Websites
  • Web pages
  • Working computer
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 181-182
 
 7  1   TEL MESSAGING

By the end of the lesson, the learner should be able to

  • Explain the term Tel messaging
  • Develop contact management
  • Q/A Demonstration Practical
  • Handouts
  • Web pages
  • Working computer
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 181-182
 
   2-3   EMERGING ISSUES

By the end of the lesson, the learner should be able to

  • Explain the emerging issues
  • Search for the emerging issues in the net
  • Q/A Demonstration Practical
  • Websites
  • Web pages
  • Working computer
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 182-183
 
 8  1   GRAPHICS

By the end of the lesson, the learner should be able to

  • Define the term graphic
  • Insert/edit graphics
  • Q/A Demonstration Practical
  • Websites
  • Web pages
  • Working computer
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 44-49
 
   2-3   G.DATA SECURITY AND CONTROLS

By the end of the lesson, the learner should be able to

  • Define the term data security
  • Identify security threats on ICT
  • Q/A Demonstration Practical
  • Books
  • Working computer
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 185-186
 
 9  1   CONTROL MEASURES

By the end of the lesson, the learner should be able to

  • Discuss the control measures on ICT
  • Q/A discussion
  • Internet
  • Books
  • Working computer
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 186-188
 
   2-3   COMPUTER CRIMES

By the end of the lesson, the learner should be able to

  • Define the term computer crimes
  • Explain the computer crimes
  • Q/A Demonstration Practical
  • Books
  • Internet
  • Working computer
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 188-189
 
 10  1   ICT PROTECTION

By the end of the lesson, the learner should be able to

  • Discuss ICT protection measures
  • Q/A Demonstration Practical
  • Books
  • Internet
  • Handouts
  • Working computer
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 190-193
 
   2-3   LAWS OF ICT

By the end of the lesson, the learner should be able to

  • Define the terms ethics
  • Explain the ethical issues
  • Q/A Demonstration Practical
  • Books
  • Internet
  • Handouts
  • Working computer
  • Computer studies by S.John Onunga page 327-328
 
 11  1   ICT LEGISLATION

By the end of the lesson,  the learner should be able to

  • Discuss ICT laws
  • Q/A discussion
 
  • Computer studies by S.John Onunga page 328-331
 
   2-3   WORKSHEET FORMATTING

By the end of the lesson, the earner should be able to

  • Format a w/sheet: text, numbers, rows, columns and global
  • Q/A Demonstration Practical
  • Books
  • Handouts
  • Working computer
  • Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 190-193
 
    SCHOOL CLOSES END OF YEAR