Home






SCHEME OF WORK
Computer Studies
Form 2 2025
TERM III
School


To enable/disable signing area for H.O.D & Principal, click here to update signature status on your profile.




To enable/disable showing Teachers name and TSC Number, click here to update teacher details status on your profile.












Did you know that you can edit this scheme? Just click on the part you want to edit!!! (Shift+Enter creates a new line)


WK LSN TOPIC SUB-TOPIC OBJECTIVES T/L ACTIVITIES T/L AIDS REFERENCE REMARKS
1 2
Programming with visual basic
Project
By the end of the lesson, the learner should be able to:

Use codes to create a project
Explaining
Demonstration
Discussions
Newspaper
Books
internet
Longhorn Secondary
Computer studies
Form 3, pages 151-153
1 3
Programming with visual basic
Creating menus
Message boxes
By the end of the lesson, the learner should be able to:

Explain the steps for creating menus
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 154-155
1 4
Programming with visual basic
Dialog boxes
Project
Project
By the end of the lesson, the learner should be able to:

Explain the steps for creating dialog boxes
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 156-157
1 5
Programming with visual basic
List boxes
Combo boxes
By the end of the lesson, the learner should be able to:

Explain the steps of creating list boxes
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 160-161
2 1-2
Programming with visual basic
Visual basic data structures
Project
By the end of the lesson, the learner should be able to:

Discuss the visual basic data structures

Discuss how to create a project using visual basic
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 162-164
Longhorn Secondary
Computer studies
Form 3, pages 168-170
2 3
Programming with visual basic
Project
Project form
Project form
By the end of the lesson, the learner should be able to:

Explain how to add an item into a combo box
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 174-177
2 4
Programming with visual basic
Project form
Linking visual basic forms to a database
Linking visual basic forms to a database
By the end of the lesson, the learner should be able to:

Explain the steps for creating a private form
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 182-187
2 5
Programming with visual basic
Project
By the end of the lesson, the learner should be able to:

Create a project with visual basic
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 191-192
3 1
Programming with visual basic
Project
Building reports
By the end of the lesson, the learner should be able to:

Create a project using the VBBiblio
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 194-197
3

OPENER EXAM

4 1-2
Programming with visual basic
Database
Creating a visual basic executable file
Introduction
Defining attributes
Creating the database
Defining a file/table structure
By the end of the lesson, the learner should be able to:

Explain steps for creating a visual basic executable file

Discuss attributes
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 199-200
Longhorn Secondary
Computer studies
Form 3, pages 202-204
4 3
Database
Setting the primary key and foreign key
Automating database
By the end of the lesson, the learner should be able to:

Discuss the steps for setting the primary key and the foreign key
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 206-208
4 4
Database
Creating a switchboard
Creating macros
Creating visual basic
By the end of the lesson, the learner should be able to:

Explain the steps for creating a switchboard
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 209-210
4 5
Database
Securing your database from unauthorized access
Setting up the startup options
By the end of the lesson, the learner should be able to:

Explain how to secure database from unauthorized access
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages
5 1-2
INTERNET AND E-MAIL
INTRODUCTION
IMPORTANCE OF THE INTERNET
INTERNET CONNECTIVITY
By the end of the lesson, the learner should be able to:


Define the term internet
Explain the development of internet


Define the internet connectivity
Explain elements of IC

Q/A discussion
Demonstration
observation

Q/A Demonstration Practical
Internet
Text book
Working Computer
Handouts
Books

Handouts
Books
Modem S/W
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 168-169


Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 273-276
5 3
INTERNET AND E-MAIL
INTERNET SERVICES
ACCESSING INTERNET
By the end of the lesson, the learner should be able to:


Explain the internet services

Q/A Demonstration Practical
Letters
Cards
Books
computer
Web pages
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 273-276
5 4
INTERNET AND E-MAIL
HYPER LINKS AND SEARCH ENGINES
ELECTRONIC MAIL
By the end of the lesson, the learner should be able to:


Define the term search engine
Use search engines

Q/A Demonstration practical
Letters
Card
Working computer
Handouts
Books

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 177-179
5 5
INTERNET AND E-MAIL
E-MAIL
By the end of the lesson, the learner should be able to:


State the e-mail facilities
Compose mails
Check mails

Q/A Demonstration practical
Books
Web pages
Working computer
Handouts

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 30-37
6 1-2
INTERNET AND E-MAIL
SET-UP
TEL MESSAGING
EMERGING ISSUES
By the end of the lesson, the learner should be able to:


Fax e-mail
Attach files


Explain the emerging issues
Search for the emerging issues in the net

Q/A Demonstration practical
Websites
Web pages
Working computer
Handouts

Websites
Web pages
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 181-182

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 182-183
6 3
INTERNET AND E-MAIL
DATA SECURITY AND CONTROLS
GRAPHICS
INTRODUCTION
By the end of the lesson, the learner should be able to:


Define the term graphic
Insert/edit graphics

Q/A Demonstration practical
Web sites
Web pages
Working computer
Books

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 44-49
6 4
DATA SECURITY AND CONTROLS
CONTROL MEASURES
By the end of the lesson, the learner should be able to:


Discuss the control measures on ICT

Q/A discussion

Internet
Books
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 186-188
6 5
DATA SECURITY AND CONTROLS
COMPUTER CRIMES
ICT PROTECTION
By the end of the lesson, the learner should be able to:


Define the term computer crimes
Explain the computer crimes

Q/A Demonstration Practical
Books
Internet
Working computer
Handouts

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 188-190
7 1-2
DATA SECURITY AND CONTROLS
Data representation in a computer
LAWS OF ICT
ICT LEGISLATION
Introduction
Data representation
Data representation
By the end of the lesson, the learner should be able to:


Define the terms ethics
Explain the ethical issues

Define data and information
Classify computers according to functionality with illustration

Q/A demonstration practical
Explaining
Demonstration
Discussions
Books
Internet
Handouts
Books
Working computer
Newspaper
Books
internet
Newspaper

Computer studies by S.John Onunga page 327-328
Longhorn Secondary
Computer studies
Form 3, pages1-2
7 3
Data representation in a computer
Data representation
Types of data representation
By the end of the lesson, the learner should be able to:

Represent data on optical media
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 5-6
7 4
Data representation in a computer
Types of data representation
Further conversion of numbers
Further conversion of numbers
By the end of the lesson, the learner should be able to:

Represent data in actual number system
Represent data in hexadecimal number system
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 8-9
7 5
Data representation in a computer
Converting octal numbers
By the end of the lesson, the learner should be able to:

Convert octal numbers to decimal numbers
Convert octal numbers to binary numbers
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 17-19
8 1-2
Data representation in a computer
Symbolic representation using coding schemes
Binary arithmetic operations
Binary additions
By the end of the lesson, the learner should be able to:

Explain the binary coded decimal code as a representation scheme


Represent signed binary numbers using prefixing an extra sign bit to a binary number and ones complement
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 23
Longhorn Secondary
Computer studies
Form 3, pages 23-25
8 3
Data representation in a computer
Binary subtraction
By the end of the lesson, the learner should be able to:

Perform possible binary subtraction using direct subtraction
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 27-28
8 4
Data processing
Introduction
Data processing cycle
Data processing cycle
By the end of the lesson, the learner should be able to:

Define data information and data processing
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 32
8 5
Data processing
Data processing cycle
Description of errors in data processing
By the end of the lesson, the learner should be able to:

Define processing
Explain the sorting of data
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 34
9 1-2
Data processing
Data integrity
Data processing methods
Computer files
Elements of a computer file
Classification of computer files
By the end of the lesson, the learner should be able to:

Explain the data integrity


List the elements of a computer
Describe the listed elements of a computer
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 36-37
Longhorn Secondary
Computer studies
Form 3, pages 39-40
9 3
Data processing
Types of computer files
File organization methods
File organization methods
By the end of the lesson, the learner should be able to:

Discuss the types of computer processing files
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 40-41
9 4
Data processing
File organization methods
Electronic data processing modes
By the end of the lesson, the learner should be able to:

Explain the serial file organization
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 43
9 5
Data processing
Electronic data processing modes
By the end of the lesson, the learner should be able to:

Describe time-sharing, batch processing, multiprocessing and multiprogramming
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 44-45
10

END TERM 3 EXAM


Your Name Comes Here


Download

Feedback