If this scheme pleases you, click here to download.
WK | LSN | TOPIC | SUB-TOPIC | OBJECTIVES | T/L ACTIVITIES | T/L AIDS | REFERENCE | REMARKS |
---|---|---|---|---|---|---|---|---|
1 | 3 |
Databases
|
Introduction
Database systems |
By the end of the
lesson, the learner
should be able to:
Define database Explain the database concepts |
Definition of terms
Explaining Demonstration Discussions |
Newspaper
Letters Books Internet Handouts |
Longhorn Computer Studies by S.Mburu and C.Chemwa page 110-111
|
|
1 | 4 |
Databases
|
Database models
|
By the end of the
lesson, the learner
should be able to:
Discuss the types of database models Explain the data organization in a database |
Definition of terms
Explaining Demonstration Discussions |
Newspaper
Letters Books Internet Handouts |
Longhorn Computer Studies by S.Mburu and C.Chemwa page 113-116
|
|
2 | 1 |
Databases
|
Creating a database in Microsoft access
|
By the end of the
lesson, the learner
should be able to:
Create a database in Microsoft access |
Definition of terms
Explaining Demonstration Discussions |
Newspaper
Letters Books Internet Handouts |
Longhorn Computer Studies by S.Mburu and C.Chemwa page 116-119
|
|
2 | 2 |
Databases
|
Field data types
Data entry and manipulation |
By the end of the
lesson, the learner
should be able to:
Discuss the field data types Explain the filed properties |
Explaining
Demonstration Discussions |
Newspaper
Letters Books Internet Handouts |
Longhorn Computer Studies by S.Mburu and C.Chemwa page 119-122
|
|
2 | 3 |
Databases
|
Modifying database structure
|
By the end of the
lesson, the learner
should be able to:
Modify table datasheet |
Explaining
Demonstration Discussions |
Newspaper
Letters Books Internet Handouts |
Longhorn Computer Studies by S.Mburu and C.Chemwa page 126-131
|
|
2 | 4 |
Databases
|
Form design
Creating database queries |
By the end of the
lesson, the learner
should be able to:
Design a form using form wizard, from scratch |
Explaining
Demonstration Discussions |
Newspaper
Letters Books Internet Handouts |
Longhorn Computer Studies by S.Mburu and C.Chemwa page 131-134
|
|
3 | 1 |
Databases
|
Creating reports and labels
|
By the end of the
lesson, the learner
should be able to:
Create reports and labels Print reports and labels |
Explaining
Demonstration Discussions |
Newspaper
Letters Books Internet Handouts |
Longhorn Computer Studies by S.Mburu and C.Chemwa page 142-146
|
|
3 | 2 |
Databases
Desktop publishing |
Setting up database security and startup
Introduction Desktop publishing |
By the end of the
lesson, the learner
should be able to:
Create an encryption using password |
Explaining
Demonstration Discussions |
Newspaper
Letters Books Internet Handouts |
Longhorn Computer Studies by S.Mburu and C.Chemwa page 147-149
|
|
3 | 3 |
Desktop publishing
|
Designing a publication
|
By the end of the
lesson, the learner
should be able to:
Design a publication |
Explaining
Demonstration Discussions |
Newspaper
Letters Books Internet Handouts |
Longhorn Computer Studies by S.Mburu and C.Chemwa page 153-158
|
|
3 | 4 |
Desktop publishing
|
Manipulating text and graphical objects
|
By the end of the
lesson, the learner
should be able to:
Type text using text box, text frame |
Explaining
Demonstration Discussions |
Newspaper
Letters Books Internet Handouts |
Longhorn Computer Studies by S.Mburu and C.Chemwa page 159-162
|
|
4 | 1 |
Desktop publishing
|
Editing a publication
Formatting a publication |
By the end of the
lesson, the learner
should be able to:
Edit a publication Check for spelling mistakes |
Explaining
Demonstration Discussions |
Newspaper
Letters Books Internet Handouts |
Longhorn Computer Studies by S.Mburu and C.Chemwa page 162-163
|
|
4 | 2 |
Desktop publishing
|
Paragraph formatting
|
By the end of the
lesson, the learner
should be able to:
Set indents and tabs |
Explaining
Demonstration Discussions |
Newspaper
Letters Books Internet Handouts |
Longhorn Computer Studies by S.Mburu and C.Chemwa page 167-170
|
|
4 | 3 |
Desktop publishing
|
Page formatting
Measuring objects and text frames |
By the end of the
lesson, the learner
should be able to:
Set column guides on a page |
Explaining
Demonstration Discussions |
Newspaper
Letters Books Internet Handouts |
Longhorn Computer Studies by S.Mburu and C.Chemwa page 171`-173
|
|
4 | 4 |
Desktop publishing
|
Formatting a graphical object
|
By the end of the
lesson, the learner
should be able to:
Format a graphical object |
Explaining
Demonstration Discussions |
Newspaper
Letters Books Internet Handouts |
Longhorn Computer Studies by S.Mburu and C.Chemwa page 175-176
|
|
5 | 1 |
Desktop publishing
Database |
Drawing other polygons
Introduction |
By the end of the
lesson, the learner
should be able to:
Draw polygons Print a publication |
Explaining
Demonstration Discussions |
Newspaper
Letters Books Internet Handouts Books Internet |
Longhorn Computer Studies by S.Mburu and C.Chemwa page 176-180
|
|
5 | 2 |
Database
|
Defining attributes
|
By the end of the
lesson, the learner
should be able to:
Discuss attributes |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 202-204 |
|
5 | 3 |
Database
|
Creating the database
|
By the end of the
lesson, the learner
should be able to:
Explain the steps for creating a database |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 204-205 |
|
5 | 4 |
Database
|
Defining a file/table structure
Setting the primary key and foreign key |
By the end of the
lesson, the learner
should be able to:
Explain the steps for defining the file/table structure |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 205 |
|
6 | 1 |
Database
|
Automating database
|
By the end of the
lesson, the learner
should be able to:
Explain the steps for automating database application |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 209 |
|
6 | 2 |
Database
|
Creating a switchboard
Creating macros |
By the end of the
lesson, the learner
should be able to:
Explain the steps for creating a switchboard |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 209-210 |
|
6 | 3 |
Database
|
Creating visual basic
|
By the end of the
lesson, the learner
should be able to:
Explain the steps for creating visual basic for application |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 211-212 |
|
6 | 4 |
Database
|
Securing your database from unauthorized access
Setting up the startup options |
By the end of the
lesson, the learner
should be able to:
Explain how to secure database from unauthorized access |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages |
|
7 | 1 |
INTERNET AND E-MAIL
|
INTRODUCTION
|
By the end of the
lesson, the learner
should be able to:
Define the term internet Explain the development of internet |
Q/A discussion Demonstration observation |
Internet Text book Working Computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 168-169 |
|
7 | 2 |
INTERNET AND E-MAIL
|
IMPORTANCE OF THE INTERNET
|
By the end of the
lesson, the learner
should be able to:
Explain the importance of the internet |
Q/A demonstration practical |
Handouts Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 266-275 |
|
7 | 3 |
INTERNET AND E-MAIL
|
INTERNET CONNECTIVITY
|
By the end of the
lesson, the learner
should be able to:
Define the internet connectivity Explain elements of IC |
Q/A Demonstration Practical |
Handouts Books Modem S/W Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 273-276 |
|
7 | 4 |
INTERNET AND E-MAIL
|
INTERNET SERVICES
|
By the end of the
lesson, the learner
should be able to:
Explain the internet services |
Q/A Demonstration Practical |
Letters Cards Books computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 273-276 |
|
8 | 1 |
INTERNET AND E-MAIL
|
ACCESSING INTERNET
|
By the end of the
lesson, the learner
should be able to:
Log in/Sign in Surf/browse |
Q/A Demonstration practical |
Web pages Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 279 |
|
8 | 2 |
INTERNET AND E-MAIL
|
HYPER LINKS AND SEARCH ENGINES
|
By the end of the
lesson, the learner
should be able to:
Define the term search engine Use search engines |
Q/A Demonstration practical |
Letters Card Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 177-179 |
|
8 | 3 |
INTERNET AND E-MAIL
|
ELECTRONIC MAIL
|
By the end of the
lesson, the learner
should be able to:
Explain the term e-mail Discuss the use of email s/w |
Q/A Demonstration practical |
Handouts Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 178-180 |
|
8 | 4 |
INTERNET AND E-MAIL
|
E-MAIL
|
By the end of the
lesson, the learner
should be able to:
State the e-mail facilities Compose mails Check mails |
Q/A Demonstration practical |
Books Web pages Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 30-37 |
|
9 |
HALF TERM BREAK |
|||||||
10 | 1 |
INTERNET AND E-MAIL
|
E-MAIL
|
By the end of the
lesson, the learner
should be able to:
Manipulate an e-mail |
Q/A Demonstration practical |
Handouts Books Web pages Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 180 |
|
10 | 2 |
INTERNET AND E-MAIL
|
E-MAIL
|
By the end of the
lesson, the learner
should be able to:
Manipulate an e-mail |
Q/A Demonstration practical |
Handouts Books Web pages Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 180 |
|
10 | 3 |
INTERNET AND E-MAIL
|
SET-UP
|
By the end of the
lesson, the learner
should be able to:
Fax e-mail Attach files |
Q/A Demonstration practical |
Websites Web pages Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 181-182 |
|
10 | 4 |
INTERNET AND E-MAIL
|
TEL MESSAGING
|
By the end of the
lesson, the learner
should be able to:
Explain the term tel messaging Develop contact mgt |
Q/A Demonstration practical |
Handouts Web pages Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 181-182 |
|
11 | 1 |
INTERNET AND E-MAIL
|
EMERGING ISSUES
|
By the end of the
lesson, the learner
should be able to:
Explain the emerging issues Search for the emerging issues in the net |
Q/A Demonstration practical |
Websites Web pages Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 182-183 |
|
11 | 2 |
INTERNET AND E-MAIL
|
GRAPHICS
|
By the end of the
lesson, the learner
should be able to:
Define the term graphic Insert/edit graphics |
Q/A Demonstration practical |
Web sites Web pages Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 44-49 |
|
11 | 3 |
DATA SECURITY AND CONTROLS
|
INTRODUCTION
|
By the end of the
lesson, the learner
should be able to:
Define the term data security Identify security threats on ICT |
Q/A Demonstration practical |
Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 185-186 |
|
11 | 4 |
DATA SECURITY AND CONTROLS
|
CONTROL MEASURES
|
By the end of the
lesson, the learner
should be able to:
Discuss the control measures on ICT |
Q/A discussion |
Internet Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 186-188 |
|
12 | 1 |
DATA SECURITY AND CONTROLS
|
COMPUTER CRIMES
|
By the end of the
lesson, the learner
should be able to:
Define the term computer crimes Explain the computer crimes |
Q/A Demonstration Practical |
Books Internet Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 188-190 |
|
12 | 2 |
DATA SECURITY AND CONTROLS
|
ICT PROTECTION
|
By the end of the
lesson, the learner
should be able to:
Discuss ICT protection measures |
Q/A Demonstration practical |
Books Internet Handouts Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 190-193 |
|
12 | 3 |
DATA SECURITY AND CONTROLS
|
LAWS OF ICT
|
By the end of the
lesson, the learner
should be able to:
Define the terms ethics Explain the ethical issues |
Q/A demonstration practical |
Books Internet Handouts Books Working computer |
Computer studies by S.John Onunga page 327-328 |
|
12 | 4 |
DATA SECURITY AND CONTROLS
|
ICT LEGISLATION
|
By the end of the
lesson, the learner
should be able to:
lesson, be able to Discuss ICT laws |
Q/A discussion |
|
Computer studies by S.John Onunga page 328-331 |
|
13 |
END TERM EXAM |
Your Name Comes Here