Posts

Showing posts from May, 2023

SS 2 WEEK TWO LESSON NOTE (ICT_323)

Image
  Ss2 TOPIC: THE INTERNET Introduction The internet can be defined as a network of computers, designed to receive and send data in the form of emails, media, blogs and webcast etc. it is like a super-massive server, filled with seemingly infinite information and used by many people at the same time. Basic internet terminology i.                    Internet service provider: a company, which provides users with an access to the internet, is an internet service provider or internet access provider ISP. ii.                  Internet protocol suite: it is a set of communication protocols, which are used for the internet. Transmission control protocol (TCP) and Internet protocol (IP) were the two pioneering protocols to be introduced in the internet protocol standard. iii.      ...

SS 1 WEEK TWO LESSON NOTE (ICT_323)

  Ss1 TOPIC: COMPUTER SYSTEM SOFTWARE Introduction Software, commonly known as programs consists of all the electronic instructions that tells the hardware how to perform a task. System Software System software are set of instructions that are embedded into hardwares from the manufacturer of those hardware to allow for proper functionality of the hardware. Classification of System Software System software can be classified into three types. They are: 1.      Operating system 2.      Translators 3.      Utilities   Operating System An operating system or OS is a software program that enables the computer hardware to communicate and operate with the computer software. without an operating system a computer would be useless.   Types of Operating System 1.      Real-time Operating system (RTOS): a real-time operating system processes inputs simultaneously, fast enou...

JSS TWO WEEK TWO LESSON NOTE (ICT_323)

Image
  Jss2 TOPIC: COMPUTER ETHICS II Introduction People misuse computers and the internet in several ways unknown to them. We shall take a look at some of the ways of misusing the computer and the internet.   Misuse of Computers and the Internet 1.      Invasion of privacy: in a network environment, people can use a computer on the network to gain illegal access to files and other information. such as unauthorized access is known as hacking. Hackers can also access computes to collect private information about individuals or delete important information. 2.      Computer virus: people can deliberately introduce a virus into a computer system or network via fictious emails, infected diskettes etc. 3.      Fraud: false data and information are sent through emails and mailing list to fraudulently collect money and other items from unsuspecting victims. 4.      Pornography: unscrupulous ...

JSS 1 WEEK TWO LESSON NOTE (ICT_323)

Image
  Jss1 TOPIC: THE DEVICE Introduction In computer technology, a device is a unit of hardware outside or inside the case or housing for the essential computer that is capable of providing input to the essential computer or of receiving output or both.   The Device A device is any machine or tool used or a particular purpose. It can include keyboard, mouse, display monitor, hard disk drives, CD rom players, printer, audio speakers, microphones and other hardware units.   Classes of device 1.        Early counting devices: early counting devices are devices that were used by man for counting during the primitive era. E.g finger, stone, marbles, etc 2.        Mechanical device: mechanical devices are devices that were used to perform mechanical function before the invention of the more sophisticated computer system. E.g   abacus, slide rule, etc. they perform the function without making use o...

SS 2 WEEK ONE LESSON NOTE_(ICT_323)

Image
  Ss 2 TOPIC: SYSTEM DEVELOPMENT LIFE CYCLE Introduction Software Development Cycle (SDC) or Software Development Life Cycle (SDLC) is a process that consists of a series of planned activities, with a fixed beginning and end, to develop or alter an Information system. System development Cycle can be thought of as a set of activities that analysts, designers and users carry out to develop and implement an information system. Stages in the SDC The diagram below shows the stages involved in the SDC, starting from the initial stage i.e. the preliminary study to the study review stage. Note that since this is a cycle, the event may be repeated. The stages in the SDC include the following: ·                      1.       Preliminary ·                  ...

SS 1 WEEK ONE LESSON NOTE_(ICT_323)

Image
  Ss 1 TOPIC: PRESENTATION PACKAGE: MS POWERPOINT Introduction PowerPoint is an application program used to create presentations. Presentations are delivered to an audience using different media, such as slides, overhead transparencies and automated shows viewed on a computer or broadcast over the web. Starting PowerPoint To use PowerPoint, you must load the program   from the hard disk into the computer memory. You can store your data files (presentations) in a folder on the hard drive, or on a floppy disk. To start PowerPoint using the start menu 1.       Turn on your computer 2.       On the Taskbar, click on start 3.       Select programs from the list of menu choices 4.       In the programs sub-menu click on Microsoft PowerPoint to start the program Opening a presentation After you start PowerPoint, a dialog box is displayed that enables you to crea...

JSS 2 WEEK ONE LESSON NOTE_(ICT_323)

Image
  Jss2 TOPIC: COMPUTER ETHICS Introduction Ethics are set of moral principles that govern the behavior of an individual or a group of people. In order to get the maximum performance from a computer, the computer system must be used responsibly. COMPUTER ETHICS Is define as the application of moral principles to the use of computers and the internet. Responsible use of the computer Avoid dropping food or liquids on the system Cover the computer and all peripherals with dust covers when not in use. The system should be protected from power surges by using either a voltage stabilizer or a surge protector. The system should be unplugged from the power source when not in use for a long time. System should be connected to UPS to protect system from shutting down abruptly. Responsible use of the Internet Check your email regularly. Answer mails promptly and politely. The subject of mails should be short, meaningful and truthful. ...