If this scheme pleases you, click here to download.
WK | LSN | TOPIC | SUB-TOPIC | OBJECTIVES | T/L ACTIVITIES | T/L AIDS | REFERENCE | REMARKS |
---|---|---|---|---|---|---|---|---|
1 | 2 |
Programming with visual basic
|
Project
|
By the end of the
lesson, the learner
should be able to:
Use codes to create a project |
Explaining
Demonstration Discussions |
Newspaper
Books internet |
Longhorn Secondary
Computer studies Form 3, pages 151-153 |
|
1 | 3 |
Programming with visual basic
|
Creating menus
Message boxes |
By the end of the
lesson, the learner
should be able to:
Explain the steps for creating menus |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 154-155 |
|
1 | 4 |
Programming with visual basic
|
Dialog boxes
Project Project |
By the end of the
lesson, the learner
should be able to:
Explain the steps for creating dialog boxes |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 156-157 |
|
1 | 5 |
Programming with visual basic
|
List boxes
Combo boxes |
By the end of the
lesson, the learner
should be able to:
Explain the steps of creating list boxes |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 160-161 |
|
2 | 1-2 |
Programming with visual basic
|
Visual basic data structures
Project |
By the end of the
lesson, the learner
should be able to:
Discuss the visual basic data structures Discuss how to create a project using visual basic |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 162-164 Longhorn Secondary Computer studies Form 3, pages 168-170 |
|
2 | 3 |
Programming with visual basic
|
Project
Project form Project form |
By the end of the
lesson, the learner
should be able to:
Explain how to add an item into a combo box |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 174-177 |
|
2 | 4 |
Programming with visual basic
|
Project form
Linking visual basic forms to a database Linking visual basic forms to a database |
By the end of the
lesson, the learner
should be able to:
Explain the steps for creating a private form |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 182-187 |
|
2 | 5 |
Programming with visual basic
|
Project
|
By the end of the
lesson, the learner
should be able to:
Create a project with visual basic |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 191-192 |
|
3 | 1 |
Programming with visual basic
|
Project
Building reports |
By the end of the
lesson, the learner
should be able to:
Create a project using the VBBiblio |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 194-197 |
|
3 |
OPENER EXAM |
|||||||
4 | 1-2 |
Programming with visual basic
Database |
Creating a visual basic executable file
Introduction Defining attributes Creating the database Defining a file/table structure |
By the end of the
lesson, the learner
should be able to:
Explain steps for creating a visual basic executable file Discuss attributes |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 199-200 Longhorn Secondary Computer studies Form 3, pages 202-204 |
|
4 | 3 |
Database
|
Setting the primary key and foreign key
Automating database |
By the end of the
lesson, the learner
should be able to:
Discuss the steps for setting the primary key and the foreign key |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 206-208 |
|
4 | 4 |
Database
|
Creating a switchboard
Creating macros Creating visual basic |
By the end of the
lesson, the learner
should be able to:
Explain the steps for creating a switchboard |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 209-210 |
|
4 | 5 |
Database
|
Securing your database from unauthorized access
Setting up the startup options |
By the end of the
lesson, the learner
should be able to:
Explain how to secure database from unauthorized access |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages |
|
5 | 1-2 |
INTERNET AND E-MAIL
|
INTRODUCTION
IMPORTANCE OF THE INTERNET INTERNET CONNECTIVITY |
By the end of the
lesson, the learner
should be able to:
Define the term internet Explain the development of internet Define the internet connectivity Explain elements of IC |
Q/A discussion Demonstration observation Q/A Demonstration Practical |
Internet
Text book Working Computer Handouts Books Handouts Books Modem S/W Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 168-169 Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 273-276 |
|
5 | 3 |
INTERNET AND E-MAIL
|
INTERNET SERVICES
ACCESSING INTERNET |
By the end of the
lesson, the learner
should be able to:
Explain the internet services |
Q/A Demonstration Practical |
Letters
Cards Books computer Web pages Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 273-276 |
|
5 | 4 |
INTERNET AND E-MAIL
|
HYPER LINKS AND SEARCH ENGINES
ELECTRONIC MAIL |
By the end of the
lesson, the learner
should be able to:
Define the term search engine Use search engines |
Q/A Demonstration practical |
Letters
Card Working computer Handouts Books |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 177-179 |
|
5 | 5 |
INTERNET AND E-MAIL
|
E-MAIL
|
By the end of the
lesson, the learner
should be able to:
State the e-mail facilities Compose mails Check mails |
Q/A Demonstration practical |
Books
Web pages Working computer Handouts |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 30-37 |
|
6 | 1-2 |
INTERNET AND E-MAIL
|
SET-UP
TEL MESSAGING EMERGING ISSUES |
By the end of the
lesson, the learner
should be able to:
Fax e-mail Attach files Explain the emerging issues Search for the emerging issues in the net |
Q/A Demonstration practical |
Websites
Web pages Working computer Handouts Websites Web pages Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 181-182 Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 182-183 |
|
6 | 3 |
INTERNET AND E-MAIL
DATA SECURITY AND CONTROLS |
GRAPHICS
INTRODUCTION |
By the end of the
lesson, the learner
should be able to:
Define the term graphic Insert/edit graphics |
Q/A Demonstration practical |
Web sites
Web pages Working computer Books |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 44-49 |
|
6 | 4 |
DATA SECURITY AND CONTROLS
|
CONTROL MEASURES
|
By the end of the
lesson, the learner
should be able to:
Discuss the control measures on ICT |
Q/A discussion |
Internet Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 186-188 |
|
6 | 5 |
DATA SECURITY AND CONTROLS
|
COMPUTER CRIMES
ICT PROTECTION |
By the end of the
lesson, the learner
should be able to:
Define the term computer crimes Explain the computer crimes |
Q/A Demonstration Practical |
Books
Internet Working computer Handouts |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 188-190 |
|
7 | 1-2 |
DATA SECURITY AND CONTROLS
Data representation in a computer |
LAWS OF ICT
ICT LEGISLATION Introduction Data representation Data representation |
By the end of the
lesson, the learner
should be able to:
Define the terms ethics Explain the ethical issues Define data and information Classify computers according to functionality with illustration |
Q/A demonstration practical Explaining Demonstration Discussions |
Books
Internet Handouts Books Working computer Newspaper Books internet Newspaper |
Computer studies by S.John Onunga page 327-328 Longhorn Secondary Computer studies Form 3, pages1-2 |
|
7 | 3 |
Data representation in a computer
|
Data representation
Types of data representation |
By the end of the
lesson, the learner
should be able to:
Represent data on optical media |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 5-6 |
|
7 | 4 |
Data representation in a computer
|
Types of data representation
Further conversion of numbers Further conversion of numbers |
By the end of the
lesson, the learner
should be able to:
Represent data in actual number system Represent data in hexadecimal number system |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 8-9 |
|
7 | 5 |
Data representation in a computer
|
Converting octal numbers
|
By the end of the
lesson, the learner
should be able to:
Convert octal numbers to decimal numbers Convert octal numbers to binary numbers |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 17-19 |
|
8 | 1-2 |
Data representation in a computer
|
Symbolic representation using coding schemes
Binary arithmetic operations Binary additions |
By the end of the
lesson, the learner
should be able to:
Explain the binary coded decimal code as a representation scheme Represent signed binary numbers using prefixing an extra sign bit to a binary number and ones complement |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 23 Longhorn Secondary Computer studies Form 3, pages 23-25 |
|
8 | 3 |
Data representation in a computer
|
Binary subtraction
|
By the end of the
lesson, the learner
should be able to:
Perform possible binary subtraction using direct subtraction |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 27-28 |
|
8 | 4 |
Data processing
|
Introduction
Data processing cycle Data processing cycle |
By the end of the
lesson, the learner
should be able to:
Define data information and data processing |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 32 |
|
8 | 5 |
Data processing
|
Data processing cycle
Description of errors in data processing |
By the end of the
lesson, the learner
should be able to:
Define processing Explain the sorting of data |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 34 |
|
9 | 1-2 |
Data processing
|
Data integrity
Data processing methods Computer files Elements of a computer file Classification of computer files |
By the end of the
lesson, the learner
should be able to:
Explain the data integrity List the elements of a computer Describe the listed elements of a computer |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 36-37 Longhorn Secondary Computer studies Form 3, pages 39-40 |
|
9 | 3 |
Data processing
|
Types of computer files
File organization methods File organization methods |
By the end of the
lesson, the learner
should be able to:
Discuss the types of computer processing files |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 40-41 |
|
9 | 4 |
Data processing
|
File organization methods
Electronic data processing modes |
By the end of the
lesson, the learner
should be able to:
Explain the serial file organization |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 43 |
|
9 | 5 |
Data processing
|
Electronic data processing modes
|
By the end of the
lesson, the learner
should be able to:
Describe time-sharing, batch processing, multiprocessing and multiprogramming |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 44-45 |
|
10 |
END TERM 3 EXAM |
Your Name Comes Here