You are on page 1of 27

COMPUT

PRINCETON CO
MAXIMUS CHILAKA NWAB
INSTRUCTOR

8 THIRD T
Click here to visit princeton w
1

CONTENTS
Week 1 Computer Studies
 Revision / Internet
 Definition
 Services Available on the internet
ICT
 Creating a Basic Worksheet
Week 2 Computer Studies
 Internet Browsers
 Creating an e-mail address
ICT
 Creating a Basic Worksheet II
Week 3 Computer Studies
 Benefits of the internet
 Abuses of the internet
ICT
 Performing Calculations
Week 4 Computer Studies
 Internet II
 Internet environment
ICT
 Performing Calculations II
Week 5 - 6 Computer Studies
 Network groups (Computer networks)
 Search engines, file sharing
ICT
 Modifying a Worksheet
Week 7 - 8 Computer Studies
 Computer Ethics I
 Responsible use of computer and internet
 Computer ethics II
 Areas of misuse
ICT
 Formatting a Worksheet
Week 9 - 10 Computer Studies
 Safety measures
ICT
 Printing Workbook Contents
 Managing Large Workbooks
2

Week 11 Revision

Week 12 Examination
3
WEEK One

Topic: Internet

Objectives:
Student should be able to define internet and understand the services available on internet

Content:
What is Internet?
This can be defined as a global computer network providing a variety of information and
communication facilities, consisting of interconnected networks using standardized
communication protocols.

It can also be defined as international network for communication, where millions of computers
are connected together worldwide.

It can also be defined as a network of computer networks (Local, Metropolitan and Wide Area
Networks) across the world. The computers on the internet are linked together by one of the
following devices:
1. Telephone
2. Modem
3. Microwave
4. Satellite etc.
HOW DOES INTERNET WORK?
The Internet is a global network connecting millions of computers. More than 100 countries are
linked into exchanges of data, news and opinions.
The Internet is comprised of many smaller networks which are connected together so that they
can communicate and share information. The hardware used to connect a computer to the
4

Internet is the same hardware used to connect a computer to a company or school network, and
the hardware that forms the core of the Internet is not much different. In fact, the Internet is a
collection of hardware. It consists of wires, routers, switches, microwave links, servers, and
communication protocols. Because the Internet is so large, companies, schools and individual
users do not connect to it directly; instead, they connect through a middleman called a service
provider.
When you purchase (or subscribe to) Internet service, you pay an Internet Service Provider (ISP)
for a connection to the Internet. (You actually connect to the ISP's network, which in turn is
connected to the
Internet.) The ISP provides the connection, and the connection provides access to the Internet
(and all the smaller networks connected to it).

Services Available on Internet


1. Email
2. Online shopping
3. Internet banking
4. Social network
5. E-learning
ASSIGNMENT
1. State five advantages of E-commerce
5
WEEK Two

TOPIC: INTERNET BROWSERS AND WWW


What is internet Browser?
A computer program with a graphical user interface for displaying HTML files, used to navigate the
World Wide Web.
A web browser (commonly referred to as a browser) is a software application for retrieving,
presenting and traversing information resources on the World Wide Web
An internet browser is the program that you use to access the internet and view web pages on your
computer. Some common internet browser examples include:

 Microsoft Internet Explorer


 Mozilla Firefox
 AOL Explorer
 Apple Safari
 Opera

Internet browser is also known as Browser, Web Browser

World Wide Web


The World Wide Web is abbreviated as www, is a system of interlinked hypertext documents
accessed via the internet. With a web browser one can view web pages that may contain text,
images, videos and other multimedia and navigate between them via hyperlinks.

History of World Wide Web


6
WEEK Three

In 1989 the idea of web was proposed by CERN (European Organization for Nuclear Research)
Scientist Timothy Berners-Lee to create a global hypertext project, for data to be used on the
internet, which later became known as the World Wide Web. Throughout 1991 to 1993 the World
Wide Web was born.
1. The first web browser was invented in 1990 by Sir Tim Berners-Lee. It was called
WorldWideWeb and was later renamed Nexus
2. The first commonly available web browser with a graphical user interface was Erwise. The
development of Erwise was initiated by Robert Cailliau.
3. Netscape Navigator Known as Mosaic Browser: The world's first popular browser developed
by Marc Andreessen in 1993 (The founder of Netscape Navigator Company)
4. Microsoft developed Internet Explorer in 1995, initiating the industry's first browser war.
5. Opera debuted in 1996; it has never achieved widespread use, having less than 2% browser
usage share as of February 2012.
6. In 1998, Netscape launched what was to become the Mozilla Foundation in an attempt to
produce a competitive browser using the open source software model. Shortly after the
release of Firefox 1.0 in late 2004, Firefox (all versions) accounted for 7% of browser use. As of
August 2011, Firefox has a 28% usage share.
7. Apple's Safari had its first beta release in January 2003; as of April 2011, it had a dominant
share of Apple-based web browsing, accounting for just over 7% of the entire browser market
8. The most recent major entrant to the browser market is Chrome, first released in September
2008. Chrome's take-up has increased significantly year by year, by doubling its usage share
from 8% to 16% by August 2011. Chrome overtook Internet Explorer 8 as the most widely
used web browser by May 2012. By April 2014, Chrome's usage hit 45% usage share.

Evaluation:
1. What is internet browser?

Assignment:
1. List five types of internet browser

Week 3:
7

Topic: Benefits of internet / Internet common terms

Objectives: At the end of the lesson students should be able to:


1. Understand the benefits of internet
2. Know the components of the internet

Contents
Benefits of Internet
More than one billion people around the world use the Internet daily for a variety of reasons,
some of which are listed below
1. Communicate with and meet other people.
2. Conduct research and access a wealth of information and news.
3. Shop for goods and services.
4. Bank and invest.
5. Participate in online training.
6. Engage in entertaining activities, such as planning vacations, playing online games,
listening to music, watching or editing videos, and reading books and magazines.
7. Download music and videos.
8. Share information, photos, and videos.
9. Access and interact with Web applications.
10. Faster and cheaper when compared with other means of communication.
Common terms
1. Internet: The Internet is a worldwide collection of networks that connects millions of
businesses, government agencies, educational institutions, and individuals.
8

2. Intranet: This is a private internal company network, sharing information and computer
resources among the company worker. It is a local network for communication, where
many computers are connected together locally.

3. World Wide Web (www): The full meaning of www is World Wide Web. This is a collection
of pages of information on different topics, linked together to form a global web of
information on the internet.

4. Home page: A page that appears on the screen when you log on to a website

5. Web page: A single page of information on the website

6. Website: The place on the internet where several web pages of information that link each
other are obtained

7. Internet Service Provider (ISP): The company that provides or connects user’s computer to
the internet

8. Internet Protocol: A set of rules that determine exchange of information between the
computers on the internet.

9. Browsing: A process of searching for and accessing information from the internet. This is
also called net surfing

10. Chatting: This is the online communication between two or more people, by sending and
receiving typed messages, at different geographical locations on the internet.
9

11. News Group: This enables users to join discussion groups on the internet. It is an electronic
bulletin board, containing messages sent by different members of the group on different
related issues or topics. A member can send or receive messages from other members

12. Downloading: A process of copying information or software from the internet.

13. File Transfer Protocol (FTP): An internet facility that enables users to download
information, files or software on the internet.

14. Electronic mail: This is the use of computer for sending and receiving mails through
electronic means on the internet. It is popularly called email.

15. Mail Server: This is a computer being used for sending and receiving e-mails

16. E-mail Box: This is a location on the mail server (i.e. computer where all the e-mails of
someone are stored.

17. Content Adviser: This prevents or controls the type of content that one can view on the
internet.

18. Secured Site: A site that prevents unauthorized users from having access to it.

19. Trusted Site: A site that one is very sure of downloading or running files from, without any
damage to the computer in use.

20. Untrusted Site: A site that one is not sure of downloading or running files from, without
any damage to the computer in use.
10

21. Offline viewing: This makes web pages available when user’s computer is not connected to
the internet.

22. Internet Relay Chat (IRC): An instant messaging program that allows users on the internet
to communicate by typing in real time.

23. Usenet: This is a global electronic bulletin board system, where group of people exchange
information.

24. A Link: hyperlink for connecting web pages.

25. Uniform Resource Locator (URL): This is the website address of an internet document. It is
the address for having direct access to a website.

Abuses of Internet
1. Fraud: A crime of deceiving people in order to obtain something that belongs to them e.g.
money or goods.

2. Conspiracy: A secret plan made by two or more people to do something that is harmful or
illegal.

3. Pornography: Films, magazines, etc. that show sexual acts and images in a way that makes
people feel sexually excited.

4. Malware: A computer virus that affects computers on the internet.


11

5. Stealing: Act of taking something that belongs to someone else without permission.

6. Terrorism: The use of violence such as damaging, destroying, bombing etc. to get
something.

E-mail and Website Addresses

Email Address
This is a unique address used to locate and identify someone’s email box on the internet. It is
similar to sending letter to someone through the post office. The e-mail address is made up of the
following parts:

1. User name: The name of person or organization that owns the e-mail address.
2. At sign or symbol: The sign or symbol is @.
3. Host: The name of the organization that maintains or owns the internet site e.g. yahoo,
Hotmail, Google etc.
4. Site Type: This determines the email service site type e.g. .edu; .com; .org, etc.
5. Domain: The host and type of site form the domain. Examples are yahoo.com,
Hotmail.com, etc.

Meaning of site type


.com: Commercial
.edu: Educational
.mil: Military
.gov: Government
.org: Organization (non-profit making)
12

.net network resources


.int International organization such as United Nations, UNESCO, etc.

Website Address:
This is the address used to search and retrieve information from the internet. The website address
is different from e-mail address. Examples of website addresses are: http://www.yahoo.com or
http://www.google.com etc.

It is made up of the following parts:


1. Protocol Name (HTTP): A set of rules that enables computer to exchange information.
HTTP means Hypertext Transfer Protocol.
2. Site Location: indicates that the site is on World Wide Web(www)
3. URL address: www.google.com

Creating Account, Opening and Sending E-mail


Steps in Creating an E-mail Account
1. Click on Internet Explorer.
2. Type an e-mail site of your interest e.g. www.yahoo.com.
3. Click on SIGN UP or press Enter key.
4. Follow the instructions for completing the form displayed.
5. After completing the form, click on SUBMIT to create the account.

Steps in Checking an E-mail


1. Click on Internet Explorer.
13

2. Type e-mail site of your address e.g. Yahoo.com.


3. Enter your e-mail ID, address and password.
4. Click on SIGN IN.
5. Click on Check mail or inbox.
6. The list of mails in your box will appear.
7. Click the mail you want to open and read.

Evaluation:
1. State five benefits of internet.
2. List five abuses of internet.
3. List the steps in opening an e-mail
4. Give the full meaning of URL
5. Give the full meaning of ISP.

Assignment:
1. Describe the steps in sending an e-mail.
14
WEEK Three

Topic: Internet Environment

Objectives: At the end of the lesson students should be able to:


1. Name the icons available on the internet environment.
2. Understand the elements on the interface of internet environment.

Contents

Internet Environment:
The internet Explorer is one of the most popular web browsers that enable users to use the
internet. With internet explorer one can search, retrieve, view, download and send information on
the internet.
The following are some of the important parts (features) of the main window or internet
environment:
1. Title Bar: This appears at the topmost bar of the screen. It indicates the title of the page
viewing and the browser e.g. Yahoo-Microsoft Internet Explorer.

2. Menu Bar: It usually appears immediately below the title bar. It consists of a list of menus and
submenus, which controls all options, functions and commands for the entire Internet
Explorer program.

3. Toolbar: This appears below the menu bar. It consists of icons of the most frequently used
commands and browsing functions e.g. stop icon, Refresh icon, etc.

4. Address Bar: This appears below the tool bar. It is a portion where you type a site address.

5. Link Bar: This appears below the address bar. It takes the user to pages at Microsoft’s main
home site where there are applications and information specifically designed for easy use.

6. Browser window: It appears below the Link bar. It contains information retrieved from a site.
Any texts, images, movies, animations, links or any other application files will be shown in this
window.
15

7. Scroll Bars: They appear at the right and bottom parts of the browser window. They enable
the user to view documents vertically (up or down) and horizontally (left to right) on the
screen.

8. Status Bar: It appears at the bottom of the screen or page. It indicates the current progress
made by the browser while in operation.

Internet Icons
Icons are buttons or tools that appear on the screen in form of symbols, signs, pictures, images, etc.,
which are used to perform commands or to carry out different tasks or operations.

1. Back Button: it takes the user back to a page of a document viewed previously.
2. Forward Button: Takes user forward to a page of a document to be viewed next.
3. Stop Button: it stops any current operation. It stops any currently loading document from
viewing. It is used whenever a page is taking much time to open.
4. Home Button: It returns the user to the page selected as the default start up page for Internet
Explorer.
5. Search Button: It takes the user to the page selected as default web search page for Internet
Explorer.
6. Favourite Button: This is used to view a frequently visited website. It opens up the favourite
menu. The user can choose a favourite addressed to the list. It may also be organized from the
menu.
7. Font Button: This enables the available font sizes to be shown for use.
8. Mail Button: This opens into a drop down menu from which user can select to read or send an
e-mail.
9. Edit button: This is used to correct errors in a document.
10. Refresh Button: It reloads a current page if there is an error while downloading information.
11. History Button: It is used to locate website and pages that have been viewed for some past
few days, hours or minutes.
12. Print Button: It sends pages of information to the printer.

Evaluation:
1. List any five Internet icons on the interface of Microsoft internet explorer
2. List five features on the interface of internet explorer.
16

Assignment:
1. State the full meaning of the following components of mail
a. CC
b. BCC
17
WEEK Five-Six

Topic: Computer Network

Objectives: At the end of the lesson students should be able to:


1. Understand types of networks
2. Identify network devices
3. Understand network security

Contents

What is a network?
A network is a collection of computers and devices connected together, often wirelessly, via
communications devices and transmission media.

Networks allow computers to share resources, such as hardware, software, data, and information.
Sharing resources saves time and money. In many networks, one or more computers act as a server.
The server controls access to the resources on a network.

Types of Server
Most networks are controlled by the use of servers. There are different types of servers, for
examples
1. File Server: Which allow users to save and load data/files
2. Applications Servers: Which deal with the distribution of application software to each
computer
3. Printer Servers: Which ensure printing from devices on the network is done in a queue
4. Proxy Servers: Which are used as a buffer between WANs and LANs

Common Types of Network

Local Area Networks


A local area network (LAN) is usually within one building or certainly not over a large geographical
area. A typical LAN will consist of a number of computers and devices (e.g. printers) which will be
connected to hubs or switches.
18

Advantages of Local Area Network


1. The sharing of resources (such as peripherals and application software)
2. Communication between users
3. A network administrator to control all aspects of the network

Disadvantages
1. Easier spread of viruses throughout the whole network.
2. The development of printer queues, which can be frustrating
3. Slower access to external networks, such as internet
4. Increased security risk when compared to stand alone computers
5. If the main server breaks down, the network may not function.
Network Topology
 Network Topology refers to the layout of a network and how different nodes (Computers and
network devices) in a network are connected to each other and how they communicate.
Common Types of LAN network topologies
1. Ring networks
2. Bus networks
3. Star Networks
4. Tree networks

Ring networks
Every computer in the network is connected in a ring, including the server. Data is transmitted around
the ring each computer only remove the data which is relevant to it. This allows each computer to
send and receive data since they all have a unique identification/address
19

Advantages
1. Ring networks work well under heavy loading
2. It is possible to create very large networks using this topology

Disadvantages
1. If there is a fault in the wiring between two computers then the whole network will fail.
2. Adding a new device or computer to the network can be difficult since it has to be replaced
between two existing devices.

Bus Network
In a bus network each computer is connected to a common central line. Data travels along this
central line until it reaches the computer or device that requires it. The ends of the line have
terminators to prevent signal bounce, which would cause data interference.

Advantages:
1. It is easy to add a new computer or device to the network
2. If one device or computer fails, it does not affect the rest of the network.
3. This type of network doesn’t need a hub or a switch and also requires less cabling.

Disadvantages
1. It is difficult to isolate any fault on the network.
2. If the central line has a fault then the whole network fails.
3. Outdated topology for network designs.
4. Its performance worsens noticeably as more and more devices / computers are added.
20

Star Networks
With a star network, each computer or device is connected via central hub or switch. Data is sent to
the hub which then sends out data along every cable to every computer or device.

Advantages
1. If one computer or device fails, then the rest of the network is unaffected.
2. Problems on the network are easy to identify and work can be carried out on a faulty device
without affecting the rest of the network.
3. It is easy to expand the network

Disadvantages
If the central hub breaks down, the whole network crashes.
21

Tree Network
A tree network has a central line connecting together a series of star networks. The server is also
connected to this central line. The server is also connected to this central line. Because of its
flexibility, and the fact that it has the advantages of both bus and star networks, this topology is
becoming increasingly popular.

The advantages and disadvantages are the same as for bus and star networks.

Wide Area Networks


A wide area network (WAN) is basically formed by a number of LANs being connected together
through either a router or a modem. It is more common to use an internet service provider (ISP) for
connections to the internet and communicate via network system.

Network Devices needed for a WAN


1. Modems
2. Network hubs
3. Switches
4. Bridges
5. Routers
22

6. HTTP Proxy Servers

Evaluation:
1. What is a network?
2. State and explain four common types of server.
3. State and explain two common types of network.
4. State and explain four types of LAN topology.
Assignment:
Explain the function of the following network devices:
Modems, Network hubs, Switches, Bridges, Routers and HTTP Proxy Servers
23
WEEK Seven-Eight

Topic: Computer Ethics

Objectives: At the end of the lesson students should be able to:


1. State the importance of computer ethics
2. Understand the possible ways of using computer and internet

Contents
INTRODUCTION
Ethics is the set of moral principles that govern the behavior of a group or individual. Therefore
COMPUTER ETHICS is a set of moral principles that regulate the use of computers. Some common
issues of computer ethics include Intellectual Properties right (such as copyrighted electronic
content), privacy concern and how computers affect society.

For instance, to duplicate digital contents is easy, however computer ethics would suggest that it is
wrong. Also, while it may be possible to access someone’s personal information on a computer
system, computer ethics advice that such an action is unethical.
As technology advances, computers continue to have a greater impact on society. Computer ethics
promotes the discussion of how much influence computers should have in areas such as artificial
intelligence.

Responsible use of computer and Internet


1. Avoid liquid dropping into the system
2. Make sure you use dust cover.
3. Protection from power problem by using surge suppressor (stabilizer)
4. Unplug the system when not in use.
5. Check your email regularly
6. Give prompt and polite response to mails
7. Do not save your work on any of the hard drives.

Ways of Misusing the Computer and Internet


1. Job loses: Computer is used to combine the work of many people hence making the
organization reduce number of man-power.
2. Fraud: A crime of deceiving people in order to gain something such as money or goods
3. Pornography: Bad sites that show sexual images in a way that can make people feel sexually
excited
24

4. Piracy of software: Unauthorized copying of software, the rights of which belong to someone
else
5. Conspiracy: A secret plan made by two or more people to do something that is harmful or
illegal.
6. Malware / Virus: A computer virus that affects computers on the internet
7. Terrorism: The use of violence such as damaging, destroying, bombing, etc. to get something
8. Stealing: Act of taking something that belongs to someone else without permission

Evaluation
1. What is Computer Ethics
2. List any three rules governing the use of a computer room.

Assignment:
1. List five things that can be found in the computer room.
25
WEEK Nine-Ten

Topic: Computer Ethics

Objectives: At the end of the lesson students should be able to:


1. Define safety measures
2. List some safety measures

Contents

Safety Measures
A well planned facilities for making the use of computer and the users of computer to be comfortable
with little or no problems during usage of computer and its accessories. Some of these safety
measures are:
1. The sitting posture/the sitting position of the users must be comfortable: The sitting posture in
a computer room should be upright, the seat should be position in such a way that one should
be able to rest the back, an awkward sitting arrangement might have an adverse effect on the
user.
2. Using the anti-glare protector to reduce light intensity entering into the eyes
3. Positioning of monitor base to eye of the users
4. Illuminating the computer room to give adequate light.
5. Maintaining a dust free environment.
6. Keep liquids away from computer and its accessories.
7. Provision of fire proof cabinet in case of fire outbreak
8. Fire extinguisher must be adequately provided.
9. Backing up the data on a regular basis.
10. Windows update should be installed at least once a week.
11. Antivirus updates
12. Safely Unplug Computer peripherals

Evaluation
1. State five safety measures of computer systems

Assignment:
List five computer maintenance tools
26

WISHING YOU AN OUTSTANDING SUCCESS IN YOUR EXAMs

You might also like