ICT Note
ICT Note
WEEKS TOPICS
1 Spreadsheet
6-8 Networking
11 Revision
12 Examination
1
LESSON PLAN FOR WEEKS 1,
SUBJECT TOPIC
ICT SPREADSHEET
Subject: ICT
Topic :- Spreadsheet
Reference book: Computer studies for Senior Secondary Education by Hiit plc
Duration:- 40 mins
Behaviourial Objectives:- At the end of the lesson, students should be able to:
(i) Define spreadsheet package
(ii) State some spreadsheet application packages
(iii) Explain the uses of the spreadsheet packages
(iv) Describe the general features of spreadsheet packages
Presentation:- The teachers writes the topic on the board for the students to read.
CONTENT
SPREADSHEETS
Spreadsheets are used for organizing and analyzing numeric data. Many spreadsheet packages are
designed to work on specific operating systems, while some can be used on cross-platform. Microsoft
excel is the standard which other spreadsheet packages are designed to emulate.
2
APPLICATION/USES OF SPREADSHEET PACKAGES.
Charts
3
Data range:- In a worksheet, a group of highlighted cell is called a range.
Workbook:- The workbook is the Microsoft Excel file in which you enter and store related data. The
workbook is made up of multiple worksheets.
Microsoft Excel is an electronic spreadsheet program that can be used for storing, organizing and
manipulating data.
Steps
Steps
3. Press ALT+F4
EVALUATION:- (I) State the steps required to load and exit Microsoft excel
4
LESSON PLAN FOR WEEKS 2-3,
SUBJECT TOPIC
ICT Database
Subject: ICT
Topic :- Database
Reference book: Computer studies for Senior Secondary Education by Hiit plc
Duration:- 40 mins
Behaviourial Objectives:- At the end of the lesson, students should be able to:
(i) Define database and database package
(ii) State examples of database packages
(iii) Define the basic term in database
(iv) State the different forms of database organization
Presentation:- The teachers writes the topic on the board for the students to read.
CONTENT
DATABASE
A database is a structured collection of related records stored in a computer system with the aim
of retrieving them at a later date. It could also be referred to as the arrangement of related data and
information in such manner that the records become easy to access and manipulate. It is a special way of
organizing computer data.
A data base is designed to offer an organized mechanism for storing, managing and retrieving
information. It does so through the use of tables.
For example, a school students’ database will contains data relating to the students, it may contain
data relating to their academic results, school fees, accommodation, parent information (and so on) for the
purpose of managing the students.
A database is usually created using database packages called Data Base Management (DBMS)
and relational Data Base Management System (RDBMS)
A database management system (DBM) is a software that controls the creation, retrieval, storage,
maintenance and manipulation of data stored in a database.
5
Examples of DBMS are:-
1. Microsoft access
2. dbase iv
3. Oracle
4. MySQL
5. FoxBase plus
6. Sybase
Database management system:- can also be defined as a software that structures, manipulates and
ensures data security and recovery.
5. It is used to query data stored in a database for retrieval, manipulation and so on.
A database model is the fundamental specification describing how a database is structured and
used. There are many database models but the three main types of database are:
This is a database that links records like an organizational chart or like a three E.g information
management system (IMS) by IBM, COBOL, Dbase
etc.
6
Fruit
Orange
Berry
Pear
Lime
Sour Pasoberry
grape sop
Avocado Cranberry
The network model organizes data using two fundamental constructs, called records and set. A network
DBMS is a type of DBMS in which relationships among data in the database are of type many-to-many.
The relationships among many to-many appears in the form of a network.
Animal
Lion Tiger
cat
This is a type of database management system in which database relationships are treated in the
form of table. The table is composed of rows and columns used to organize the database its structure.
Example are MYSQL, MS SQL server, DB2, Oracle etc.
7
Database terminologies
1. Data:- Data is a collection of raw facts which conclusion may be drawn. Examples are &,$,AH45, 89,
Fred etc.
2. Entity:- An entity has a distinct existence as an individual unit. It is something that is in existence that
has the properties of being real (i.e having a real existence). Examples a person, object, event or
transaction.
3. Entity group:- A group of class of persons, objects, events or transactions with very similar
characteristic (students, teachers, employees, men, women, patients, medical doctors etc).
4. Data table:- The data table allows you to add or modify columns or rows for all data tables (global) or
for specific ones. Global columns are available for use with all data tables. Practically a table consist of
records and each record is made up of a number of fields.
5. fields:- this refers to a column of data in a table. Each column or field in a table contains similar type of
data for all the members of entity. Columns run vertically from top to bottom.
6. records:- record refers to a row of data in a table. Each row or record in a table contains the data for a
specific number or the entity group whose data are stored in the table. A record runs horizontally from left
to right.
Keys:- A key in database is defined as an attribute used to sort and /or identify data in some manner. The
following are common types of keys in database.
(i) Primary key (ii) candidate key (iii) foreign key (iv) key field etc.
Primary key:- This is defined as a key that uniquely identifies each record in a database. It also defined as
the set of columns that can be used to identify or access a particular row or rows. Examples of primary
keys are:
2. Phone numbers
They are called primary keys because they cannot be duplicated. For example, two people cannot
own the same phone number.
Candidate key:- Is a combination of attributes that can be uniquely used to identify a database record
without any extraneous data.
Foreign key:- Is field in a relational table that matches a candidate key of another table.
Key field:- You can sort and quickly retrieve information from a database by choosing one or more fields
to act as keys.
8
Index:- This is a sum of many table that allows you to quickly find any record in a table. It is similar to
the index of a book.
Query:- This can be related to the literal meaning of query. You can query the database to display any
information you desire. It is like asking the computer to display the first names of students in SSS1.
Database packages are used to design a database in a computer. example of a common database
package is Microsoft access.
Microsoft access is a relational database management system used to create and modify
databases. MS Access is used to illustrate database operation.
2. By the right hand side of the windows, click inside the file name text box and type the desired database
name (e.g school database) you want to create.
3. Click on create command button. A school database is created as shown on the title bare of MS Access.
Note :-files are created as tables in the database. To create a file as table in MS Access, follow the steps
below:-
2. At all tables tab, right click on any of the table, table 1:. Table
4. Go to the save as dialog box and type a desired table name (e.g student table) in the table name text box
and click ok.
9
Tables in database on a computer are composed of rows and columns. A table in MS Access is organized
into rows and columns like this.
Student table
Serial number Surname First name
1 John Moon
2 Fredrick Oluwole
3 Udeme Esther
4 Kitchner Queen
A row contains records for diverse fields. In the MS Access table above the rows specify the numbers of
records in the table. There are four (4) rows in the students table, this implies that there are 4 records in
the students table.
A column usually represent a field in a database table. It contains a specific type of information.
In the MS Access table above there are (3) three columns in the students table which implies that there are
three fields in the students table. The first column contains specific information about serial numbers of
students.
Fields:- are assigned field names relevant to the information they keep. In the MS Access table above
column 1, contain serial numbers and should be given the field name serial number or S/N or s.no etc
Fields names are assigned data types which determine the kind of data type accept as inputs. For example
in MS Access table above, surname are alphabetic field will not accept inputs 10 or 700 as surname.
Basic operation
1. Searching
2. Sorting
3. Modifying
4. Generating reports.
Searching
Steps
10
(c) Select start of field search
Sorting
1. Start Microsoft Access, and then open the database that you are working with
2. Open the table or the form whose data you want to view
3. Click the field that you want to use for sorting records.
4. On the records menu, point the sort, and then click sort ascending or sort descending
11
LESSON PLAN FOR WEEKS 4,
SUBJECT TOPIC
ICT ELECTRONIC MAIL SERVICES
Subject: ICT
Topic :- Electronic mail services
Reference book: Computer studies for Senior Secondary Education by Hiit plc
Duration:- 40 mins
Behaviourial Objectives:- At the end of the lesson, students should be able to:
(i) Define e-mail
(ii) List services available in e-mail
(iii) Create mail address
(iv) Send and receive mail
(v) State the difference between the features of email and website address
(vi) Define chatting.
(vii)
Presentation:- The teachers writes the topic on the board for the students to read.
CONTENT
ELECTRONIC MAIL SERVICES
Electronic mail allows users to utilize one or more services such as send/receive mails, chat and so on.
Electronic mail, most commonly abbreviated as email. It is a method of exchanging digital messages from
one source (author) to many destinations (recipients) through the internet.
Creating Email Accounts
Creating an email account enables one to have an e-mail address which can be used to send and receive
mails to and from friends or loved ones. Examples of websites offering free email services are:
(i) Yahoo
(ii) Hotmail
(iii) AOL
(iv) Gmail and so on.
Steps involved in creating Email Account with Yahoo
1. Open the internet explorer and type www.yahoo.com in address bar
12
2. On the yahoo web page, click on sign up
3. Fill in your personal data
4. Type the proposed e-mail address you want to use
5. Click on check availability
6. If it has been used by someone, the computer will suggest another e-mail address for you
7. Type your password and re-type your password to confirm
8. Type the code shown in the registration window
9. Click on create my account
10. Click on continue button, and you will be redirected to yahoo homepage.
11. To access your emails just click on the mail link on the left side of the yahoo page.
Steps Involved in Opening Mail box
1. Click on new button/ compose mail
2. Type the recipient address in the TO text box
3. Type the subject title in the subject text box
4. Type the message content in the white text area below
5. Click on the send button
Reading Mails on Yahoomail
To check the mail received from a friend:
(i) Click on the inbox link.
E-mail Address
An email address is a unique address used to identify the mail box of its users. Two or more users
cannot have the same email address. Example: [email protected], [email protected] and so
on.
Features in an e-mail address
An e-mail address consists of the following features:
(1) The username
(2) The @ (at) sign
(3) The name of the website
(4) The website extension
For example, a commercial entity will have a website with .com extension also some website extentions
include the country code of entity.
Examples are:
(i) .gh Ghana
(ii) .za South Africa
13
(iii) .ng Nigeria
(iv) .bw Botswana
(v) .uk United Kingdom
Differences between Email and Website
Email Website
An email address is a service in the internet A website is a collection of web pages
that is registered in a website. that are related to an entity. It is identified by its
name.
Chatting
Chatting is the process of simultaneous communication between internet users through instant messages
that are not stored. To be able to chat, you must have an email address. The email address is used to
identify the person chatting and location.
Steps involved in chatting with Yahoo Messenger.
1. Double click on the Yahoo Messenger
2. Type your Yahoo ID inside the Yahoo ID text box.
3. Type your password inside the Password text box
4. Click sign in. The chat window is displayed
Evaluation:
(i) State three differences between an e-mail address and a website address
(ii) List two steps involved in chatting
Conclusion: The teacher writes the note on the board and gives assignment to the students
Assignment:
(i) Define e-mail
(ii) List services available in e-mail
(iii) Create email address
(iv) State the differences between the features of email and website address.
(v) Define chatting.
14
LESSON PLAN FOR WEEKS 5
SUBJECT TOPIC
ICT INTRODUCTION TO WORLD WIDE WEB
Subject: ICT
Topic :- Introduction to world wide web
Reference book: Computer studies for Senior Secondary Education by Hiit plc
Duration:- 40 mins
Behaviourial Objectives:- At the end of the lesson, students should be able to:
(i) Describe world wide web and state the full meaning
(ii) Describe brief history of www.
(iii) List the www protocols
(iv) State the benefit of www
(v) Define basic terminologies of www
(vi) Navigate through websites using website addresses.
Presentation: - The teacher writes the topic on the board for the students to read.
CONTENT
INTRODUCTION TO WORLD WIDE WEB
World Wide Web
The world Wide Web, abbreviated as www or w3 and commonly known as the web, is a
system of interlinked hypertext documents accessed through the internet
Basic terminologies of WWW are:
1. WWW
2. Web browser
3. Web-site
4. Webpage
5. Homepage
6. Protocols
WWW:- can be defined as a universe of network accessible information, an embodiment of human
knowledge. It refers to all websites, resources and users in the internet that are using HTTP (Hyper Text
Transfer protocol).
15
WEB BROWSER:- This is a software application that enable computer users to locate and access
webpage.
WEBSITE:- This is a collection of related webpages containing images, videos or other digital assets.
HOME PAGE:- This refers to the initial or main webpage of a website
WEBPAGE:- A web page or webpage is a websites html document that is displayed by a web browser.
PROTOCOLS:- Protocols can be defined as a set of rules that governs the communication between
computer network. There are many protocols used in web technology such as
(i) HTTP: Hyper Text Transfer Protocol
(ii) HTML:- Hyper Text Makeup Language
(iii) STMP:- Simple Mail Transfer Protocol and so on
HTTP:- Is a networking protocol that governs exchanges transfer and distribution of html documents in
the www.
HTML:- Is the predominant make up language for web pages. It is the basic building blocks of
webpages.
SMTP:- Is an internet standard for electronic mail transmission across internet protocol (IP) networks.
BENEFITS OF WWW ARE:-
1. Accessibility to information from any part of the world
2. Quick, cheap and convenient means of communication between people through e-mail and
chatting.
3. Sharing of ideas, knowledge and skills across the world
4. Social networking, collaborations and making of friends across the globe.
5. It enables e-learning that is highly beneficial to educational system
6. Bedrock of e-commerce which is an effective trading system.
7. It encourages outsourcing of software services
8. Enable tele and video conferencing across the globe
9. Provide internet telephone service like skype, whasapp
10. Empowering radio and television broadcasting.
16
3. It present readers with most user-friendly path
4. Give readers the proper context of document they are reading
5. Highlight part of classification that the organization wants to promote
TYPES OF NAVIGATION
1. Left navigation
2. Top navigation
3. Right navigation
4. Central navigation
5. Global navigation
6. Feature navigation
7. Related navigation
8. Content navigation
9. History navigation
10. Geographic navigation
17
LESSON PLAN FOR WEEKS 6-8,
SUBJECT TOPIC
ICT NETWORKING
Subject: ICT
Topic :- Networking
Reference book: Computer studies for Senior Secondary Education by Hiit plc
Duration:- 40 mins
Behaviourial Objectives:- At the end of the lesson, students should be able to:
(v) Define networking
(vi) List types of network topologies
(vii) Draw flow diagram for each network topology
(viii) List network devices
(ix) State the benefits of networking
Presentation:- The teachers writes the topic on the board for the students to read.
CONTENT
NETWORKING
DEFINITION OF A NETWORK
A computer network can be referred to as the collection of computer and devices interconnected
by communication channels that facilitates communications among users and allows the users to share
resource.
A computer network allows sharing of resourced and information among interconnected devices.
Networking can be defined as the collection of computers to enable the sharing of computer resources and
information. Network exist for one major reason: to share information and resources
Types of Networks
The types of networks covered here are:
(i) Ethernet
(ii) Token ring
(iii) Acrnet
18
1. Ethernet
Ethernet is a bus topology LAN network system. Ethernet LANS use coaxial or twisted pair cables to
connect computer systems.
2. Token Ring
Token ring LAN technology is a ring topology network. It uses a special three byte frame called a
token that travels around the ring. When implemented the computers are connected through
cables to a “HUB”
3. Arcnet
ARCNET an acronym Attached Resource Computer Network is a star LAN topology network.
ARCNET was first widely available networking system for microcomputers and became popular
in 1980s for office automation tasks. It was developed by John Murphy at datapoint Corporation
in 1976.
Network Topology
In computer networking, topology refers to the layout of connected devices. There are two types
of network topology a physical topology and logical topology. The physical topology of network
refers to the layout of cables and network devices while the logical topology refers to the method
of communication of the network devices.
Network topologies can be categorized into the following basic types:
(i) Star Topology
(ii) Bus Topology
(iii) Ring Topology
1. Star Topology
In star topology network, the network devices are connected to a central point like a STAR. The
central point may be a hub, a switch or router. All the individual network devices communicate with the
central point, once the hub fails, the whole network is grounded but if any other network device fails the
network will still be operating without the failed device.
In star topology, more cables are required because cables are laid from all network devices to the
hub. Data on a star network passes through the hub, switch or concentrator before continuing to its
destination.
Advantages of a Star Topology
1. It is easy to install and wire
2. There is no disruption to the network when connecting or removing devices
3. Easy to detect faults and to remove parts.
19
Disadvantages of a Star Topology
1. It requires morhc, e cable length than a linear topology
2. If the hub, switch or concentrator fails, nodes attached are disabled
3. It is more expensive than linear bus topologies because of the cost of the hubs etc.
2.Bus Topology
Bus networks topology uses a common backbone (a cable) to connect all devices. The backbone is a
shared communication medium that all devices are attached or connected.
A device wanting to communicate with another device on the network sends a broadcast message onto the
wire that all other devices see, but only the intended recipient actually accepts and processes message.
Bus networks work best with a limited number of devices but if the backbone cable fails, the entire
network fails. Also, if any of the devices are down, the network fails.
3. Ring Topology
In a ring network, all the networks devices are connected together in a ring form. That is every device
has exactly two neighbours for communication purposes. All messages travel through a ring in the same
direction (either “clockwise or counterclockwise”). A failure in any cable or device breaks the loop and
can shut down the entire network. An example of a ring topology is IBM Token Ring Network and its
hub is the Multi Access Unit (MAN).
Network Device
The network devices are the nodes of the network. They are devices that aid connection and
communication. The common network devices are:
1. The Hub
2. The network interface card
20
3. The switch
4. The router
5. The modem
The Hub
A hub is a device that connects all other devices in a star network together. Every device in the
network connects directly to the hub through a single cable. The hub receives a message from devices
in the network and monitors it for collision to the destination.
The Network Interface (NIC)
A network interface controller (also known as a network interface card, network adapter, LAN
adapter and by similar terms) is a computer hardware component that connects a computer to a
computer network.
The Switch
A switch is a device that channels incoming data from any of network device to specific device that is
the
destination of the dat. Unlike the hub, the switch is intelligent because it does not broadcast but channels
the data to the specific destination.
Modems
Modem is an acronym for Modulator/demodulator, it is a device that can convert a digital data to an
analog data and vice versa.
Routers
A router is a network device that connects two or more dissimilar networks together. For example a
router
can connect a ring network with a star network, a wireless network and a cable network, a LAN with a
WAN and so on.
Bridge
A bridge is a device that connects two similar networks together. A bridge will connect/ join two ring
networks together or two star networks together
Benefits of Computer Networking
1. It helps to enhance connectivity
2. Networking helps in sharing of hardware resources
3. Ease out management of data
4. Internet
5. Data sharing
21
6. Networking promotes games
Evaluation: (I) What is a Network?
(II) Distinguish between types of networks you know
ASSIGNMENT:
(I) Define networking
(II) List types of network topologies
(III) Draw flow diagram for each network topology
(IV) List network devices
(V) State the benefits of networking.
22
LESSON PLAN FOR WEEKS 9-10,
SUBJECT TOPIC
ICT CABLES AND CONNECTORS
Subject: ICT
Topic :- Cables and connectors
Reference book: Computer studies for Senior Secondary Education by Hiit plc
Duration:- 40 mins
Behaviourial Objectives:- At the end of the lesson, students should be able to:
(i) Define cable and connectors
(ii) List and explain the types of cable and connectors
Presentation:- The teachers writes the topic on the board for the students to read.
CONTENT
CABLES AND CONNECTORS
CABLES
Network cable is used to connect and transfer data between computers and a network. There
different types of network cable, and the appropriate type to use will depend on the structure and topology
of your network. The most commonly used types of network cable are:
- Twisted pair
- Coaxial cable
- Optical fiber cable,
- Telephone cables.
Twisted pair cable: - twisted pair cabling is a type of wiring in which two
conductors (the forward and return conductors of a single circuit are twisted together for the purposes of
canceling out Electromagnetic Interference (EMI) from external sources. Twisted pair cables were
invented by Alexander Graham Bell in 1881.
The twisted pair cables are mainly used for Ethernet networks and telephone lines.
There are two types of twisted pair cables:
23
Unshielded twisted pair (UTP) and shielded twisted pair (STP).
A twisted pair cable that is shielded with materials that will prevent electromagnetic interference is called
an STP cable.
Coaxial cable or coax is an electrical cable with an inner conductor surrounded by a flexible, tubular
insulating layer, surrounded by a tubular conducting shield.
The term coaxial comes from the inner conductor and the outer shield sharing the same geometric axis.
Coaxial cable was invested by English engineer and mathematician Oliver Heaviside in 1880.
It is used in most homes for connecting TV antennas to TV sets, it is also used Ethernet bus network.
Fiber optic technology is a technology that uses glass (or plastic) threads (fibers) to transmit data. A
fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting messages
modulated onto light waves.
Fiber optics has several advantages over traditional metal communications lines.
- Fiber optic cables have a much greater bandwidth than metal cables. This means that they can
carry more data.
- Fiber optic cables are less susceptible than metal cables to interference.
- Fiber optic cables are much thinner and lighter than metal wires.
- Data can be transmitted digitally (the natural form for computer data) rather than analogically.
Disadvantages of fiber optics
i. fiber optics is that the cables are expensive to install
ii. They are more fragile than wire and are difficult to splice.
Telephone cable :- Is a type of male connector used to connect to telephone to the telephone wiring in a
home or business, and in turn to a local telephone network it is inserted into its female counterpart, a
telephone “jack”, commonly fixed to a wall or baseboard.
CONNECTORS
There are various types of connectors used in networking for cables, connectors are used to connect
cables together or to other devices.
It is the part of cable that plugs into a port or interface to connect one device to another . most
connectors are either male (containing one or more exposed pins) or female (containing holes in which
the male connector can be inserted).
24
Connectors are chosen in reference to the cable and device which are to be connected. The
following types of connectors are discussed below:-
- Rj45
- RJ11
- T connector.
RJ45 Connector
RJ45 is the short name for Registered Jack-45. It is an eight-wire connector
used commonly to connect computers into a local-area networks (LAN), especially Ethernet star
networks. RJ45 are used in Ethernet networking to connect system and other devices together using
twisted pair cables.
RJ11 connectors
This is the short name for Registered Jack- 11. It is a four-or six – wire
connector used primarily to connect telephone equipment. It is mainly used to connect telephone lines to
computer systems for browsing purpose using telephone twisted cables. RJ 11 connectors are also used to
connect some types of local-area networks (LANs)
BNC T- connectors
This is the short name for bayonet Neill Concelman T-connector, (most times
referred to as T-connector). It is a type of connector used with coaxial cable in a 10Base-2 Ethernet
system. The basic BNC connector is a male type mounted at each end of cable.
BNC T-connectors (used with the 10Base-2 system) are female devices for connecting two cables
to a network interface care (NIC). A BNC barrel connector allow connecting two cables together.
Computer cables and connectors
The computer cables and connectors discussed here are:-
- Power cables
- Data cables
- Connectors.
Power cables
These are used to supply electricity into the computer systems. A power cable is an assembly of
two or more electrical conductors, usually held together with an overall sheath.
Data cables
A data cable is any media that allows baseband transmissions (binary 1, 0’s) from a transmitter to
a receiver. There are various types of data cables, examples are printer cable, universal serial bus
(USB), monitor cable, serial cable.
25
Printer cable:- refers to the cable that carries data between a computer and a printer. There are many
different types of printer cable, for example:-
- Serial
- Parallel
- Firewire
- USB
Monitor cable:- Also called Video Graphics Array (VGA) connectors is a three- row 15- pin DB-15
connector. The 15-pin VGA Connector is found on many video cards, computer monitors, and some high
definition television sets.
Connectors ports
Connectors connect devices. There are two types of connector ports, the male and the female
connectors ports. Male connector ports have pins while the female connector ports have holes. One goes
into one, if the cable is having male connector, then the device should be having a female port.
26