Home






SCHEME OF WORK
Computer Studies
Form 2 2025
TERM III
School


To enable/disable signing area for H.O.D & Principal, click here to update signature status on your profile.




To enable/disable showing Teachers name and TSC Number, click here to update teacher details status on your profile.












Did you know that you can edit this scheme? Just click on the part you want to edit!!! (Shift+Enter creates a new line)


WK LSN TOPIC SUB-TOPIC OBJECTIVES T/L ACTIVITIES T/L AIDS REFERENCE REMARKS
1

OPENING EXAM

2 1
DATA SECURITY AND CONTROLS
INTRODUCTION
By the end of the lesson, the learner should be able to:


Define the term data security
Identify security threats on ICT

Q/A Demonstration practical

Books
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 185-186
2 2
DATA SECURITY AND CONTROLS
INTRODUCTION
By the end of the lesson, the learner should be able to:


Define the term data security
Identify security threats on ICT

Q/A Demonstration practical

Books
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 185-186
2 3
DATA SECURITY AND CONTROLS
CONTROL MEASURES
By the end of the lesson, the learner should be able to:


Discuss the control measures on ICT

Q/A discussion

Internet
Books
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 186-188
2 4
DATA SECURITY AND CONTROLS
COMPUTER CRIMES
By the end of the lesson, the learner should be able to:


Define the term computer crimes
Explain the computer crimes

Q/A Demonstration Practical

Books
Internet
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 188-190
3 1
DATA SECURITY AND CONTROLS
ICT PROTECTION
By the end of the lesson, the learner should be able to:


Discuss ICT protection measures

Q/A Demonstration practical

Books
Internet
Handouts
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 190-193
3 2
DATA SECURITY AND CONTROLS
ICT PROTECTION
By the end of the lesson, the learner should be able to:


Discuss ICT protection measures

Q/A Demonstration practical

Books
Internet
Handouts
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 190-193
3 3
DATA SECURITY AND CONTROLS
LAWS OF ICT
By the end of the lesson, the learner should be able to:


Define the terms ethics
Explain the ethical issues

Q/A demonstration practical

Books
Internet
Handouts
Books
Working computer

Computer studies by S.John Onunga page 327-328
3 4
DATA SECURITY AND CONTROLS
LAWS OF ICT
By the end of the lesson, the learner should be able to:


Define the terms ethics
Explain the ethical issues

Q/A demonstration practical

Books
Internet
Handouts
Books
Working computer

Computer studies by S.John Onunga page 327-328
4 1
DATA SECURITY AND CONTROLS
ICT LEGISLATION
By the end of the lesson, the learner should be able to:

lesson, be able to
Discuss ICT laws

Q/A discussion

Computer studies by S.John Onunga page 328-331
4 2
Data representation in a computer
Introduction
By the end of the lesson, the learner should be able to:

Define data and information
Classify computers according to functionality with illustration
Explaining
Demonstration
Discussions
Newspaper
Books
internet
Longhorn Secondary
Computer studies
Form 3, pages1-2
4 3
Data representation in a computer
Data representation
By the end of the lesson, the learner should be able to:

Represent data in digital circuits
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 3
4 4
Data representation in a computer
Data representation
By the end of the lesson, the learner should be able to:

Represent data on magnetic media
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 3-4
5 1
Data representation in a computer
Data representation
By the end of the lesson, the learner should be able to:

Represent data on optical media
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 5-6
5 2
Data representation in a computer
Types of data representation
By the end of the lesson, the learner should be able to:

Represent data in decimal number system
Represent data in binary number system
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 6-8
5 3
Data representation in a computer
Types of data representation
By the end of the lesson, the learner should be able to:

Represent data in actual number system
Represent data in hexadecimal number system
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 8-9
5 4
Data representation in a computer
Further conversion of numbers
By the end of the lesson, the learner should be able to:

Convert binary number to decimal number system
Convert decimal numbers to binary system
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 11-13
6 1
Data representation in a computer
Further conversion of numbers
By the end of the lesson, the learner should be able to:

Convert binary fraction to decimal number system
Convert decimal fraction numbers to binary system
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 13-17
6 2
Data representation in a computer
Converting octal numbers
By the end of the lesson, the learner should be able to:

Convert octal numbers to decimal numbers
Convert octal numbers to binary numbers
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 17-19
6 3
Data representation in a computer
Converting octal numbers
By the end of the lesson, the learner should be able to:

Convert hexadecimal numbers to decimal numbers
Convert hexadecimal numbers to binary numbers
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 20-22
6 4
Data representation in a computer
Symbolic representation using coding schemes
By the end of the lesson, the learner should be able to:

Explain the binary coded decimal code as a representation scheme
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 23
7

MIDTERM EXAM

8 1
Data representation in a computer
Symbolic representation using coding schemes
By the end of the lesson, the learner should be able to:

Explain the extended binary coded decimal interchange code (EBCDIC)
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 23
8 2
Data representation in a computer
Symbolic representation using coding schemes
By the end of the lesson, the learner should be able to:

Explain the American Standard Code for information interchange (ASCII)
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 23
8 3
Data representation in a computer
Binary arithmetic operations
By the end of the lesson, the learner should be able to:

Represent signed binary numbers using prefixing an extra sign bit to a binary number and ones complement
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 23-25
8 4
Data representation in a computer
Binary additions
By the end of the lesson, the learner should be able to:

Perform seven possible binary additions
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 25-27
9 1
Data representation in a computer
Binary subtraction
By the end of the lesson, the learner should be able to:

Perform possible binary subtraction using direct subtraction
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 27-28
9 2
Data representation in a computer
Binary subtraction
By the end of the lesson, the learner should be able to:

Perform possible binary subtraction using one complement
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 28-29
9 3
Data representation in a computer
Binary subtraction
By the end of the lesson, the learner should be able to:

Perform possible binary subtraction using twos complements
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 29-30
9

CLOSING EXAM


Your Name Comes Here


Download

Feedback