Home






SCHEME OF WORK
Computer Studies
Form 2 2025
TERM III
School


To enable/disable signing area for H.O.D & Principal, click here to update signature status on your profile.




To enable/disable showing Teachers name and TSC Number, click here to update teacher details status on your profile.












Did you know that you can edit this scheme? Just click on the part you want to edit!!! (Shift+Enter creates a new line)


WK LSN TOPIC SUB-TOPIC OBJECTIVES T/L ACTIVITIES T/L AIDS REFERENCE REMARKS
3 4
Programming with visual basic
Project
Creating menus
By the end of the lesson, the learner should be able to:

Use codes to create a project
Explaining
Demonstration
Discussions
Newspaper
Books
internet
Newspaper
Longhorn Secondary
Computer studies
Form 3, pages 151-153
4 1
Programming with visual basic
Message boxes
Dialog boxes
By the end of the lesson, the learner should be able to:

Explain the steps for creating message boxes
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 155-156
4 2-3
Programming with visual basic
Project
List boxes
By the end of the lesson, the learner should be able to:

Work on a project to open project menu

Explain the steps of creating list boxes
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 157-158
Longhorn Secondary
Computer studies
Form 3, pages 160-161
4 4
Programming with visual basic
Combo boxes
Visual basic data structures
By the end of the lesson, the learner should be able to:

Explain the steps of creating combo boxes
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 161-162
5 1
Programming with visual basic
Visual basic data structures
By the end of the lesson, the learner should be able to:

Discuss how to record data
Explain how to keep array of records
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 164-165
5 2-3
Programming with visual basic
Project
Project
Project form
By the end of the lesson, the learner should be able to:

Discuss how to create a project using visual basic

Explain how to add an item into a combo box
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 168-170
Longhorn Secondary
Computer studies
Form 3, pages 174-177
5 4
Programming with visual basic
Project form
By the end of the lesson, the learner should be able to:

Explain the steps for creating two forms
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 180-182
6 1
Programming with visual basic
Project form
Linking visual basic forms to a database
By the end of the lesson, the learner should be able to:

Explain the steps for creating a private form
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 182-187
6 2-3
Programming with visual basic
Linking visual basic forms to a database
Project
By the end of the lesson, the learner should be able to:

Explain how to link form controls to an underlying table

Create data control and data bound controls
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 190-191
Longhorn Secondary
Computer studies
Form 3, pages 193-194
6 4
Programming with visual basic
Project
By the end of the lesson, the learner should be able to:

Create a record set manipulation
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 197-198
7 1
Programming with visual basic
Building reports
Creating a visual basic executable file
By the end of the lesson, the learner should be able to:

Explain steps for building reports using data report designer
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 198-199
7 2-3
Database
Introduction
Defining attributes
Creating the database
Defining a file/table structure
By the end of the lesson, the learner should be able to:

Discuss database

Explain the steps for creating a database
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 201-202
Longhorn Secondary
Computer studies
Form 3, pages 204-205
7 4
Database
Setting the primary key and foreign key
Automating database
By the end of the lesson, the learner should be able to:

Discuss the steps for setting the primary key and the foreign key
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 206-208
8 1
Database
Creating a switchboard
By the end of the lesson, the learner should be able to:

Explain the steps for creating a switchboard
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 209-210
8 2-3
Database
Creating macros
Creating visual basic
Securing your database from unauthorized access
Setting up the startup options
By the end of the lesson, the learner should be able to:

Explain the steps for creating macros

Explain how to secure database from unauthorized access
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 210-211
8 4
INTERNET AND E-MAIL
INTRODUCTION
By the end of the lesson, the learner should be able to:


Define the term internet
Explain the development of internet

Q/A discussion
Demonstration
observation

Internet
Text book
Working Computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 168-169
9 1
INTERNET AND E-MAIL
IMPORTANCE OF THE INTERNET
By the end of the lesson, the learner should be able to:


Explain the importance of the internet

Q/A demonstration practical

Handouts
Books
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 266-275
9 2-3
INTERNET AND E-MAIL
INTERNET CONNECTIVITY
INTERNET SERVICES
ACCESSING INTERNET
By the end of the lesson, the learner should be able to:


Define the internet connectivity
Explain elements of IC


Explain the internet services

Q/A Demonstration Practical

Handouts
Books
Modem S/W
Working computer
Letters
Cards
Books
computer
Web pages
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 273-276
9 4
INTERNET AND E-MAIL
HYPER LINKS AND SEARCH ENGINES
By the end of the lesson, the learner should be able to:


Define the term search engine
Use search engines

Q/A Demonstration practical

Letters
Card
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 177-179
10 1
INTERNET AND E-MAIL
ELECTRONIC MAIL
By the end of the lesson, the learner should be able to:


Explain the term e-mail
Discuss the use of email s/w

Q/A Demonstration practical

Handouts
Books
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 178-180
10 2-3
INTERNET AND E-MAIL
E-MAIL
By the end of the lesson, the learner should be able to:


State the e-mail facilities
Compose mails
Check mails


Manipulate an e-mail

Q/A Demonstration practical

Books
Web pages
Working computer

Handouts
Books
Web pages
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 30-37

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 180
10 4
INTERNET AND E-MAIL
SET-UP
TEL MESSAGING
By the end of the lesson, the learner should be able to:


Fax e-mail
Attach files

Q/A Demonstration practical
Websites
Web pages
Working computer
Handouts

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 181-182
11 1
INTERNET AND E-MAIL
EMERGING ISSUES
By the end of the lesson, the learner should be able to:


Explain the emerging issues
Search for the emerging issues in the net

Q/A Demonstration practical

Websites
Web pages
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 182-183
11 2-3
INTERNET AND E-MAIL
DATA SECURITY AND CONTROLS
GRAPHICS
INTRODUCTION
By the end of the lesson, the learner should be able to:


Define the term graphic
Insert/edit graphics


Define the term data security
Identify security threats on ICT

Q/A Demonstration practical

Web sites
Web pages
Working computer

Books
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 44-49

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 185-186
11 4
DATA SECURITY AND CONTROLS
CONTROL MEASURES
By the end of the lesson, the learner should be able to:


Discuss the control measures on ICT

Q/A discussion

Internet
Books
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 186-188
12 1
DATA SECURITY AND CONTROLS
COMPUTER CRIMES
ICT PROTECTION
By the end of the lesson, the learner should be able to:


Define the term computer crimes
Explain the computer crimes

Q/A Demonstration Practical
Books
Internet
Working computer
Handouts

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 188-190
12 2-3
DATA SECURITY AND CONTROLS
LAWS OF ICT
ICT LEGISLATION
By the end of the lesson, the learner should be able to:


Define the terms ethics
Explain the ethical issues

lesson, be able to
Discuss ICT laws

Q/A demonstration practical

Q/A discussion

Books
Internet
Handouts
Books
Working computer

Computer studies by S.John Onunga page 327-328

Computer studies by S.John Onunga page 328-331

Your Name Comes Here


Download

Feedback