If this scheme pleases you, click here to download.
WK | LSN | TOPIC | SUB-TOPIC | OBJECTIVES | T/L ACTIVITIES | T/L AIDS | REFERENCE | REMARKS |
---|---|---|---|---|---|---|---|---|
1 |
OPENING EXAM |
|||||||
2 | 1 |
DATA SECURITY AND CONTROLS
|
INTRODUCTION
|
By the end of the
lesson, the learner
should be able to:
Define the term data security Identify security threats on ICT |
Q/A Demonstration practical |
Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 185-186 |
|
2 | 2 |
DATA SECURITY AND CONTROLS
|
INTRODUCTION
|
By the end of the
lesson, the learner
should be able to:
Define the term data security Identify security threats on ICT |
Q/A Demonstration practical |
Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 185-186 |
|
2 | 3 |
DATA SECURITY AND CONTROLS
|
CONTROL MEASURES
|
By the end of the
lesson, the learner
should be able to:
Discuss the control measures on ICT |
Q/A discussion |
Internet Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 186-188 |
|
2 | 4 |
DATA SECURITY AND CONTROLS
|
COMPUTER CRIMES
|
By the end of the
lesson, the learner
should be able to:
Define the term computer crimes Explain the computer crimes |
Q/A Demonstration Practical |
Books Internet Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 188-190 |
|
3 | 1 |
DATA SECURITY AND CONTROLS
|
ICT PROTECTION
|
By the end of the
lesson, the learner
should be able to:
Discuss ICT protection measures |
Q/A Demonstration practical |
Books Internet Handouts Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 190-193 |
|
3 | 2 |
DATA SECURITY AND CONTROLS
|
ICT PROTECTION
|
By the end of the
lesson, the learner
should be able to:
Discuss ICT protection measures |
Q/A Demonstration practical |
Books Internet Handouts Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 190-193 |
|
3 | 3 |
DATA SECURITY AND CONTROLS
|
LAWS OF ICT
|
By the end of the
lesson, the learner
should be able to:
Define the terms ethics Explain the ethical issues |
Q/A demonstration practical |
Books Internet Handouts Books Working computer |
Computer studies by S.John Onunga page 327-328 |
|
3 | 4 |
DATA SECURITY AND CONTROLS
|
LAWS OF ICT
|
By the end of the
lesson, the learner
should be able to:
Define the terms ethics Explain the ethical issues |
Q/A demonstration practical |
Books Internet Handouts Books Working computer |
Computer studies by S.John Onunga page 327-328 |
|
4 | 1 |
DATA SECURITY AND CONTROLS
|
ICT LEGISLATION
|
By the end of the
lesson, the learner
should be able to:
lesson, be able to Discuss ICT laws |
Q/A discussion |
|
Computer studies by S.John Onunga page 328-331 |
|
4 | 2 |
Data representation in a computer
|
Introduction
|
By the end of the
lesson, the learner
should be able to:
Define data and information Classify computers according to functionality with illustration |
Explaining
Demonstration Discussions |
Newspaper
Books internet |
Longhorn Secondary
Computer studies Form 3, pages1-2 |
|
4 | 3 |
Data representation in a computer
|
Data representation
|
By the end of the
lesson, the learner
should be able to:
Represent data in digital circuits |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 3 |
|
4 | 4 |
Data representation in a computer
|
Data representation
|
By the end of the
lesson, the learner
should be able to:
Represent data on magnetic media |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 3-4 |
|
5 | 1 |
Data representation in a computer
|
Data representation
|
By the end of the
lesson, the learner
should be able to:
Represent data on optical media |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 5-6 |
|
5 | 2 |
Data representation in a computer
|
Types of data representation
|
By the end of the
lesson, the learner
should be able to:
Represent data in decimal number system Represent data in binary number system |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 6-8 |
|
5 | 3 |
Data representation in a computer
|
Types of data representation
|
By the end of the
lesson, the learner
should be able to:
Represent data in actual number system Represent data in hexadecimal number system |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 8-9 |
|
5 | 4 |
Data representation in a computer
|
Further conversion of numbers
|
By the end of the
lesson, the learner
should be able to:
Convert binary number to decimal number system Convert decimal numbers to binary system |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 11-13 |
|
6 | 1 |
Data representation in a computer
|
Further conversion of numbers
|
By the end of the
lesson, the learner
should be able to:
Convert binary fraction to decimal number system Convert decimal fraction numbers to binary system |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 13-17 |
|
6 | 2 |
Data representation in a computer
|
Converting octal numbers
|
By the end of the
lesson, the learner
should be able to:
Convert octal numbers to decimal numbers Convert octal numbers to binary numbers |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 17-19 |
|
6 | 3 |
Data representation in a computer
|
Converting octal numbers
|
By the end of the
lesson, the learner
should be able to:
Convert hexadecimal numbers to decimal numbers Convert hexadecimal numbers to binary numbers |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 20-22 |
|
6 | 4 |
Data representation in a computer
|
Symbolic representation using coding schemes
|
By the end of the
lesson, the learner
should be able to:
Explain the binary coded decimal code as a representation scheme |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 23 |
|
7 |
MIDTERM EXAM |
|||||||
8 | 1 |
Data representation in a computer
|
Symbolic representation using coding schemes
|
By the end of the
lesson, the learner
should be able to:
Explain the extended binary coded decimal interchange code (EBCDIC) |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 23 |
|
8 | 2 |
Data representation in a computer
|
Symbolic representation using coding schemes
|
By the end of the
lesson, the learner
should be able to:
Explain the American Standard Code for information interchange (ASCII) |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 23 |
|
8 | 3 |
Data representation in a computer
|
Binary arithmetic operations
|
By the end of the
lesson, the learner
should be able to:
Represent signed binary numbers using prefixing an extra sign bit to a binary number and ones complement |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 23-25 |
|
8 | 4 |
Data representation in a computer
|
Binary additions
|
By the end of the
lesson, the learner
should be able to:
Perform seven possible binary additions |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 25-27 |
|
9 | 1 |
Data representation in a computer
|
Binary subtraction
|
By the end of the
lesson, the learner
should be able to:
Perform possible binary subtraction using direct subtraction |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 27-28 |
|
9 | 2 |
Data representation in a computer
|
Binary subtraction
|
By the end of the
lesson, the learner
should be able to:
Perform possible binary subtraction using one complement |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 28-29 |
|
9 | 3 |
Data representation in a computer
|
Binary subtraction
|
By the end of the
lesson, the learner
should be able to:
Perform possible binary subtraction using twos complements |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 29-30 |
|
9 |
CLOSING EXAM |
Your Name Comes Here