If this scheme pleases you, click here to download.
WK | LSN | TOPIC | SUB-TOPIC | OBJECTIVES | T/L ACTIVITIES | T/L AIDS | REFERENCE | REMARKS |
---|---|---|---|---|---|---|---|---|
2 | 1-2 |
Programming with visual basic
|
Project
Creating menus Message boxes |
By the end of the
lesson, the learner
should be able to:
Use codes to create a project Explain the steps for creating message boxes |
Explaining
Demonstration Discussions |
Newspaper
Books internet Newspaper |
Longhorn Secondary
Computer studies Form 3, pages 151-153 Longhorn Secondary Computer studies Form 3, pages 155-156 |
|
2 | 3 |
Programming with visual basic
|
Dialog boxes
Project |
By the end of the
lesson, the learner
should be able to:
Explain the steps for creating dialog boxes |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 156-157 |
|
2 | 4 |
Programming with visual basic
|
Project
|
By the end of the
lesson, the learner
should be able to:
Explain how to create a project |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 159-160 |
|
3 | 1-2 |
Programming with visual basic
|
List boxes
Combo boxes Visual basic data structures |
By the end of the
lesson, the learner
should be able to:
Explain the steps of creating list boxes Explain the steps of creating combo boxes |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 160-161 Longhorn Secondary Computer studies Form 3, pages 161-162 |
|
3 | 3 |
Programming with visual basic
|
Visual basic data structures
|
By the end of the
lesson, the learner
should be able to:
Discuss how to record data Explain how to keep array of records |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 164-165 |
|
3 | 4 |
Programming with visual basic
|
Visual basic data structures
Project |
By the end of the
lesson, the learner
should be able to:
Discuss the data files Explain types of data files |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 165-168 |
|
4 | 1-2 |
Programming with visual basic
|
Project
Project Project form |
By the end of the
lesson, the learner
should be able to:
Discuss how to create an interface form Explain how to add an item into a combo box |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 171-174 Longhorn Secondary Computer studies Form 3, pages 174-177 |
|
4 | 3 |
Programming with visual basic
|
Project form
|
By the end of the
lesson, the learner
should be able to:
Explain the steps for creating two forms |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 180-182 |
|
4 | 4 |
Programming with visual basic
|
Project form
Linking visual basic forms to a database |
By the end of the
lesson, the learner
should be able to:
Explain the steps for creating a private form |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 182-187 |
|
5 | 1-2 |
Programming with visual basic
|
Linking visual basic forms to a database
Project |
By the end of the
lesson, the learner
should be able to:
Explain how to link form controls to an underlying table Create a project with visual basic |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 190-191 Longhorn Secondary Computer studies Form 3, pages 191-192 |
|
5 | 3 |
Programming with visual basic
|
Project
|
By the end of the
lesson, the learner
should be able to:
Create a project using the VBBiblio |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 194-197 |
|
5 | 4 |
Programming with visual basic
|
Project
|
By the end of the
lesson, the learner
should be able to:
Create a record set manipulation |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 197-198 |
|
6 | 1-2 |
Programming with visual basic
Database |
Building reports
Creating a visual basic executable file Introduction |
By the end of the
lesson, the learner
should be able to:
Explain steps for building reports using data report designer Discuss database |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 198-199 Longhorn Secondary Computer studies Form 3, pages 201-202 |
|
6 | 3 |
Database
|
Defining attributes
Creating the database |
By the end of the
lesson, the learner
should be able to:
Discuss attributes |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 202-204 |
|
6 | 4 |
Database
|
Defining a file/table structure
|
By the end of the
lesson, the learner
should be able to:
Explain the steps for defining the file/table structure |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 205 |
|
7 | 1-2 |
Database
|
Setting the primary key and foreign key
Automating database Creating a switchboard |
By the end of the
lesson, the learner
should be able to:
Discuss the steps for setting the primary key and the foreign key Explain the steps for creating a switchboard |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 206-208 Longhorn Secondary Computer studies Form 3, pages 209-210 |
|
7 | 3 |
Database
|
Creating macros
Creating visual basic |
By the end of the
lesson, the learner
should be able to:
Explain the steps for creating macros |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages 210-211 |
|
7 | 4 |
Database
|
Securing your database from unauthorized access
|
By the end of the
lesson, the learner
should be able to:
Explain how to secure database from unauthorized access |
Explaining
Demonstration Discussions |
Newspaper
Books Internet |
Longhorn Secondary
Computer studies Form 3, pages |
|
8 | 1-2 |
Database
INTERNET AND E-MAIL |
Setting up the startup options
INTRODUCTION IMPORTANCE OF THE INTERNET |
By the end of the
lesson, the learner
should be able to:
Discuss the steps for setting up the startup options Explain the importance of the internet |
Explaining
Demonstration Discussions Q/A demonstration practical |
Newspaper
Books Internet Text book Working Computer Handouts Books Working computer |
Longhorn Secondary
Computer studies Form 3, pages 213 Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 266-275 |
|
8 | 3 |
INTERNET AND E-MAIL
|
IMPORTANCE OF THE INTERNET
|
By the end of the
lesson, the learner
should be able to:
Explain the importance of the internet |
Q/A demonstration practical |
Handouts Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 266-275 |
|
8 | 4 |
INTERNET AND E-MAIL
|
INTERNET CONNECTIVITY
|
By the end of the
lesson, the learner
should be able to:
Define the internet connectivity Explain elements of IC |
Q/A Demonstration Practical |
Handouts Books Modem S/W Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 273-276 |
|
9 | 1-2 |
INTERNET AND E-MAIL
|
INTERNET SERVICES
ACCESSING INTERNET |
By the end of the
lesson, the learner
should be able to:
Explain the internet services Log in/Sign in Surf/browse |
Q/A Demonstration Practical Q/A Demonstration practical |
Letters Cards Books computer Web pages Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 273-276 Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 279 |
|
9 | 3 |
INTERNET AND E-MAIL
|
HYPER LINKS AND SEARCH ENGINES
|
By the end of the
lesson, the learner
should be able to:
Define the term search engine Use search engines |
Q/A Demonstration practical |
Letters Card Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 177-179 |
|
9 | 4 |
INTERNET AND E-MAIL
|
ELECTRONIC MAIL
|
By the end of the
lesson, the learner
should be able to:
Explain the term e-mail Discuss the use of email s/w |
Q/A Demonstration practical |
Handouts Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 178-180 |
|
10 | 1-2 |
INTERNET AND E-MAIL
|
E-MAIL
|
By the end of the
lesson, the learner
should be able to:
State the e-mail facilities Compose mails Check mails Manipulate an e-mail |
Q/A Demonstration practical |
Books Web pages Working computer Handouts Books Web pages Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 30-37 Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 180 |
|
10 | 3 |
INTERNET AND E-MAIL
|
SET-UP
|
By the end of the
lesson, the learner
should be able to:
Fax e-mail Attach files |
Q/A Demonstration practical |
Websites Web pages Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 181-182 |
|
10 | 4 |
INTERNET AND E-MAIL
|
TEL MESSAGING
|
By the end of the
lesson, the learner
should be able to:
Explain the term tel messaging Develop contact mgt |
Q/A Demonstration practical |
Handouts Web pages Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 181-182 |
|
11 | 1-2 |
INTERNET AND E-MAIL
|
EMERGING ISSUES
GRAPHICS |
By the end of the
lesson, the learner
should be able to:
Explain the emerging issues Search for the emerging issues in the net Define the term graphic Insert/edit graphics |
Q/A Demonstration practical |
Websites Web pages Working computer Web sites Web pages Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 182-183 Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 44-49 |
|
11 | 3 |
DATA SECURITY AND CONTROLS
|
INTRODUCTION
|
By the end of the
lesson, the learner
should be able to:
Define the term data security Identify security threats on ICT |
Q/A Demonstration practical |
Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 185-186 |
|
11 | 4 |
DATA SECURITY AND CONTROLS
|
CONTROL MEASURES
|
By the end of the
lesson, the learner
should be able to:
Discuss the control measures on ICT |
Q/A discussion |
Internet Books Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 186-188 |
|
12 | 1-2 |
DATA SECURITY AND CONTROLS
|
COMPUTER CRIMES
ICT PROTECTION |
By the end of the
lesson, the learner
should be able to:
Define the term computer crimes Explain the computer crimes Discuss ICT protection measures |
Q/A Demonstration Practical |
Books Internet Working computer Books Internet Handouts Working computer |
Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 188-190 Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 190-193 |
|
12 | 3 |
DATA SECURITY AND CONTROLS
|
LAWS OF ICT
|
By the end of the
lesson, the learner
should be able to:
Define the terms ethics Explain the ethical issues |
Q/A demonstration practical |
Books Internet Handouts Books Working computer |
Computer studies by S.John Onunga page 327-328 |
|
12 | 4 |
DATA SECURITY AND CONTROLS
|
ICT LEGISLATION
|
By the end of the
lesson, the learner
should be able to:
lesson, be able to Discuss ICT laws |
Q/A discussion |
|
Computer studies by S.John Onunga page 328-331 |
Your Name Comes Here