Home






SCHEME OF WORK
Computer Studies
Form 2 2025
TERM III
School


To enable/disable signing area for H.O.D & Principal, click here to update signature status on your profile.




To enable/disable showing Teachers name and TSC Number, click here to update teacher details status on your profile.












Did you know that you can edit this scheme? Just click on the part you want to edit!!! (Shift+Enter creates a new line)


WK LSN TOPIC SUB-TOPIC OBJECTIVES T/L ACTIVITIES T/L AIDS REFERENCE REMARKS
2 1-2
Programming with visual basic
Project
Creating menus
Message boxes
By the end of the lesson, the learner should be able to:

Use codes to create a project

Explain the steps for creating message boxes
Explaining
Demonstration
Discussions
Newspaper
Books
internet
Newspaper
Longhorn Secondary
Computer studies
Form 3, pages 151-153
Longhorn Secondary
Computer studies
Form 3, pages 155-156
2 3
Programming with visual basic
Dialog boxes
Project
By the end of the lesson, the learner should be able to:

Explain the steps for creating dialog boxes
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 156-157
2 4
Programming with visual basic
Project
By the end of the lesson, the learner should be able to:

Explain how to create a project
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 159-160
3 1-2
Programming with visual basic
List boxes
Combo boxes
Visual basic data structures
By the end of the lesson, the learner should be able to:

Explain the steps of creating list boxes

Explain the steps of creating combo boxes
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 160-161
Longhorn Secondary
Computer studies
Form 3, pages 161-162
3 3
Programming with visual basic
Visual basic data structures
By the end of the lesson, the learner should be able to:

Discuss how to record data
Explain how to keep array of records
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 164-165
3 4
Programming with visual basic
Visual basic data structures
Project
By the end of the lesson, the learner should be able to:

Discuss the data files
Explain types of data files
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 165-168
4 1-2
Programming with visual basic
Project
Project
Project form
By the end of the lesson, the learner should be able to:

Discuss how to create an interface form

Explain how to add an item into a combo box
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 171-174
Longhorn Secondary
Computer studies
Form 3, pages 174-177
4 3
Programming with visual basic
Project form
By the end of the lesson, the learner should be able to:

Explain the steps for creating two forms
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 180-182
4 4
Programming with visual basic
Project form
Linking visual basic forms to a database
By the end of the lesson, the learner should be able to:

Explain the steps for creating a private form
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 182-187
5 1-2
Programming with visual basic
Linking visual basic forms to a database
Project
By the end of the lesson, the learner should be able to:

Explain how to link form controls to an underlying table

Create a project with visual basic
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 190-191
Longhorn Secondary
Computer studies
Form 3, pages 191-192
5 3
Programming with visual basic
Project
By the end of the lesson, the learner should be able to:

Create a project using the VBBiblio
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 194-197
5 4
Programming with visual basic
Project
By the end of the lesson, the learner should be able to:

Create a record set manipulation
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 197-198
6 1-2
Programming with visual basic
Database
Building reports
Creating a visual basic executable file
Introduction
By the end of the lesson, the learner should be able to:

Explain steps for building reports using data report designer

Discuss database
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 198-199
Longhorn Secondary
Computer studies
Form 3, pages 201-202
6 3
Database
Defining attributes
Creating the database
By the end of the lesson, the learner should be able to:

Discuss attributes
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 202-204
6 4
Database
Defining a file/table structure
By the end of the lesson, the learner should be able to:

Explain the steps for defining the file/table structure
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 205
7 1-2
Database
Setting the primary key and foreign key
Automating database
Creating a switchboard
By the end of the lesson, the learner should be able to:

Discuss the steps for setting the primary key and the foreign key

Explain the steps for creating a switchboard
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 206-208
Longhorn Secondary
Computer studies
Form 3, pages 209-210
7 3
Database
Creating macros
Creating visual basic
By the end of the lesson, the learner should be able to:

Explain the steps for creating macros
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages 210-211
7 4
Database
Securing your database from unauthorized access
By the end of the lesson, the learner should be able to:

Explain how to secure database from unauthorized access
Explaining
Demonstration
Discussions
Newspaper
Books
Internet
Longhorn Secondary
Computer studies
Form 3, pages
8 1-2
Database
INTERNET AND E-MAIL
Setting up the startup options
INTRODUCTION
IMPORTANCE OF THE INTERNET
By the end of the lesson, the learner should be able to:

Discuss the steps for setting up the startup options


Explain the importance of the internet
Explaining
Demonstration
Discussions

Q/A demonstration practical
Newspaper
Books
Internet
Text book
Working Computer

Handouts
Books
Working computer
Longhorn Secondary
Computer studies
Form 3, pages 213

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 266-275
8 3
INTERNET AND E-MAIL
IMPORTANCE OF THE INTERNET
By the end of the lesson, the learner should be able to:


Explain the importance of the internet

Q/A demonstration practical

Handouts
Books
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 266-275
8 4
INTERNET AND E-MAIL
INTERNET CONNECTIVITY
By the end of the lesson, the learner should be able to:


Define the internet connectivity
Explain elements of IC

Q/A Demonstration Practical

Handouts
Books
Modem S/W
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 273-276
9 1-2
INTERNET AND E-MAIL
INTERNET SERVICES
ACCESSING INTERNET
By the end of the lesson, the learner should be able to:


Explain the internet services


Log in/Sign in
Surf/browse

Q/A Demonstration Practical

Q/A Demonstration practical

Letters
Cards
Books
computer

Web pages
Books
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 273-276

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 279
9 3
INTERNET AND E-MAIL
HYPER LINKS AND SEARCH ENGINES
By the end of the lesson, the learner should be able to:


Define the term search engine
Use search engines

Q/A Demonstration practical

Letters
Card
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 177-179
9 4
INTERNET AND E-MAIL
ELECTRONIC MAIL
By the end of the lesson, the learner should be able to:


Explain the term e-mail
Discuss the use of email s/w

Q/A Demonstration practical

Handouts
Books
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 178-180
10 1-2
INTERNET AND E-MAIL
E-MAIL
By the end of the lesson, the learner should be able to:


State the e-mail facilities
Compose mails
Check mails


Manipulate an e-mail

Q/A Demonstration practical

Books
Web pages
Working computer

Handouts
Books
Web pages
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 30-37

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 180
10 3
INTERNET AND E-MAIL
SET-UP
By the end of the lesson, the learner should be able to:


Fax e-mail
Attach files

Q/A Demonstration practical

Websites
Web pages
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 181-182
10 4
INTERNET AND E-MAIL
TEL MESSAGING
By the end of the lesson, the learner should be able to:


Explain the term tel messaging
Develop contact mgt

Q/A Demonstration practical

Handouts
Web pages
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 181-182
11 1-2
INTERNET AND E-MAIL
EMERGING ISSUES
GRAPHICS
By the end of the lesson, the learner should be able to:


Explain the emerging issues
Search for the emerging issues in the net


Define the term graphic
Insert/edit graphics

Q/A Demonstration practical

Websites
Web pages
Working computer

Web sites
Web pages
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 182-183


Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 44-49
11 3
DATA SECURITY AND CONTROLS
INTRODUCTION
By the end of the lesson, the learner should be able to:


Define the term data security
Identify security threats on ICT

Q/A Demonstration practical

Books
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 185-186
11 4
DATA SECURITY AND CONTROLS
CONTROL MEASURES
By the end of the lesson, the learner should be able to:


Discuss the control measures on ICT

Q/A discussion

Internet
Books
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 186-188
12 1-2
DATA SECURITY AND CONTROLS
COMPUTER CRIMES
ICT PROTECTION
By the end of the lesson, the learner should be able to:


Define the term computer crimes
Explain the computer crimes


Discuss ICT protection measures

Q/A Demonstration Practical

Books
Internet
Working computer

Books
Internet
Handouts
Working computer

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 188-190

Longhorn Computer studies Secondary. S.Mburu, G. Chemwa page 190-193
12 3
DATA SECURITY AND CONTROLS
LAWS OF ICT
By the end of the lesson, the learner should be able to:


Define the terms ethics
Explain the ethical issues

Q/A demonstration practical

Books
Internet
Handouts
Books
Working computer

Computer studies by S.John Onunga page 327-328
12 4
DATA SECURITY AND CONTROLS
ICT LEGISLATION
By the end of the lesson, the learner should be able to:

lesson, be able to
Discuss ICT laws

Q/A discussion

Computer studies by S.John Onunga page 328-331

Your Name Comes Here


Download

Feedback