If this scheme pleases you, click here to download.
WK | LSN | TOPIC | SUB-TOPIC | OBJECTIVES | T/L ACTIVITIES | T/L AIDS | REFERENCE | REMARKS |
---|---|---|---|---|---|---|---|---|
3 | 4 |
Programming with visual basic
|
Project
Creating menus |
By the end of the
lesson, the learner
should be able to:
Use codes to create a project |
Explaining
Demonstration Discussions |
Newspaper
Books internet Newspaper |
Longhorn Secondary
Computer studies Form 3, pages 151-153 |
|
4 | 1 |
Programming with visual basic
|
Message boxes
Dialog boxes |
By the end of the
lesson, the learner
should be able to:
Explain the steps for creating message boxes |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 155-156 |
|
4 | 2-3 |
Programming with visual basic
|
Project
List boxes |
By the end of the
lesson, the learner
should be able to:
Work on a project to open project menu Explain the steps of creating list boxes |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 157-158 Longhorn Secondary Computer studies Form 3, pages 160-161 |
|
4 | 4 |
Programming with visual basic
|
Combo boxes
Visual basic data structures |
By the end of the
lesson, the learner
should be able to:
Explain the steps of creating combo boxes |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 161-162 |
|
5 | 1 |
Programming with visual basic
|
Visual basic data structures
|
By the end of the
lesson, the learner
should be able to:
Discuss how to record data Explain how to keep array of records |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 164-165 |
|
5 | 2-3 |
Programming with visual basic
|
Project
Project Project form |
By the end of the
lesson, the learner
should be able to:
Discuss how to create a project using visual basic Explain how to add an item into a combo box |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 168-170 Longhorn Secondary Computer studies Form 3, pages 174-177 |
|
5 | 4 |
Programming with visual basic
|
Project form
|
By the end of the
lesson, the learner
should be able to:
Explain the steps for creating two forms |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 180-182 |
|
6 | 1 |
Programming with visual basic
|
Project form
Linking visual basic forms to a database |
By the end of the
lesson, the learner
should be able to:
Explain the steps for creating a private form |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 182-187 |
|
6 | 2-3 |
Programming with visual basic
|
Linking visual basic forms to a database
Project |
By the end of the
lesson, the learner
should be able to:
Explain how to link form controls to an underlying table Create data control and data bound controls |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 190-191 Longhorn Secondary Computer studies Form 3, pages 193-194 |
|
6 | 4 |
Programming with visual basic
|
Project
|
By the end of the
lesson, the learner
should be able to:
Create a record set manipulation |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 197-198 |
|
7 | 1 |
Programming with visual basic
|
Building reports
Creating a visual basic executable file |
By the end of the
lesson, the learner
should be able to:
Explain steps for building reports using data report designer |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 198-199 |
|
7 | 2-3 |
Database
|
Introduction
Defining attributes Creating the database Defining a file/table structure |
By the end of the
lesson, the learner
should be able to:
Discuss database Explain the steps for creating a database |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 201-202 Longhorn Secondary Computer studies Form 3, pages 204-205 |
|
7 | 4 |
Database
|
Setting the primary key and foreign key
Automating database |
By the end of the
lesson, the learner
should be able to:
Discuss the steps for setting the primary key and the foreign key |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 206-208 |
|
8 | 1 |
Database
|
Creating a switchboard
|
By the end of the
lesson, the learner
should be able to:
Explain the steps for creating a switchboard |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 209-210 |
|
8 | 2-3 |
Database
|
Creating macros
Creating visual basic Securing your database from unauthorized access Setting up the startup options |
By the end of the
lesson, the learner
should be able to:
Explain the steps for creating macros Explain how to secure database from unauthorized access |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 210-211 |
|
8 | 4 |
INTERNET AND E-MAIL
|
INTRODUCTION
|
By the end of the
lesson, the learner
should be able to:
Define the term internet Explain the development of internet |
Q/A discussion Demonstration observation |
Internet Text book Working Computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 168-169 |
|
9 | 1 |
INTERNET AND E-MAIL
|
IMPORTANCE OF THE INTERNET
|
By the end of the
lesson, the learner
should be able to:
Explain the importance of the internet |
Q/A demonstration practical |
Handouts Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 266-275 |
|
9 | 2-3 |
INTERNET AND E-MAIL
|
INTERNET CONNECTIVITY
INTERNET SERVICES ACCESSING INTERNET |
By the end of the
lesson, the learner
should be able to:
Define the internet connectivity Explain elements of IC Explain the internet services |
Q/A Demonstration Practical |
Handouts Books Modem S/W Working computer Letters Cards Books computer Web pages Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 273-276 |
|
9 | 4 |
INTERNET AND E-MAIL
|
HYPER LINKS AND SEARCH ENGINES
|
By the end of the
lesson, the learner
should be able to:
Define the term search engine Use search engines |
Q/A Demonstration practical |
Letters Card Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 177-179 |
|
10 | 1 |
INTERNET AND E-MAIL
|
ELECTRONIC MAIL
|
By the end of the
lesson, the learner
should be able to:
Explain the term e-mail Discuss the use of email s/w |
Q/A Demonstration practical |
Handouts Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 178-180 |
|
10 | 2-3 |
INTERNET AND E-MAIL
|
E-MAIL
|
By the end of the
lesson, the learner
should be able to:
State the e-mail facilities Compose mails Check mails Manipulate an e-mail |
Q/A Demonstration practical |
Books Web pages Working computer Handouts Books Web pages Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 30-37 Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 180 |
|
10 | 4 |
INTERNET AND E-MAIL
|
SET-UP
TEL MESSAGING |
By the end of the
lesson, the learner
should be able to:
Fax e-mail Attach files |
Q/A Demonstration practical |
Websites
Web pages Working computer Handouts |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 181-182 |
|
11 | 1 |
INTERNET AND E-MAIL
|
EMERGING ISSUES
|
By the end of the
lesson, the learner
should be able to:
Explain the emerging issues Search for the emerging issues in the net |
Q/A Demonstration practical |
Websites Web pages Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 182-183 |
|
11 | 2-3 |
INTERNET AND E-MAIL
DATA SECURITY AND CONTROLS |
GRAPHICS
INTRODUCTION |
By the end of the
lesson, the learner
should be able to:
Define the term graphic Insert/edit graphics Define the term data security Identify security threats on ICT |
Q/A Demonstration practical |
Web sites Web pages Working computer Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 44-49 Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 185-186 |
|
11 | 4 |
DATA SECURITY AND CONTROLS
|
CONTROL MEASURES
|
By the end of the
lesson, the learner
should be able to:
Discuss the control measures on ICT |
Q/A discussion |
Internet Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 186-188 |
|
12 | 1 |
DATA SECURITY AND CONTROLS
|
COMPUTER CRIMES
ICT PROTECTION |
By the end of the
lesson, the learner
should be able to:
Define the term computer crimes Explain the computer crimes |
Q/A Demonstration Practical |
Books
Internet Working computer Handouts |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 188-190 |
|
12 | 2-3 |
DATA SECURITY AND CONTROLS
|
LAWS OF ICT
ICT LEGISLATION |
By the end of the
lesson, the learner
should be able to:
Define the terms ethics Explain the ethical issues lesson, be able to Discuss ICT laws |
Q/A demonstration practical Q/A discussion |
Books Internet Handouts Books Working computer |
Computer studies by S.John Onunga page 327-328 Computer studies by S.John Onunga page 328-331 |
Your Name Comes Here