0% found this document useful (0 votes)
539 views40 pages

Ss 2 Data Processing Second Term E-Note

The document provides a scheme of work for a Data Processing class covering 14 weeks. Week 1 focuses on file organization, discussing types of file organization including heap, sequential, hash/direct, cluster, and indexed sequential access methods. Basic file organization operations like scan, search, insert, delete, locate, write, and read are also covered. A comparison is provided of the storage efficiency and speed of operations for hashed, heap, and sorted file organizations.

Uploaded by

Jesse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
539 views40 pages

Ss 2 Data Processing Second Term E-Note

The document provides a scheme of work for a Data Processing class covering 14 weeks. Week 1 focuses on file organization, discussing types of file organization including heap, sequential, hash/direct, cluster, and indexed sequential access methods. Basic file organization operations like scan, search, insert, delete, locate, write, and read are also covered. A comparison is provided of the storage efficiency and speed of operations for hashed, heap, and sorted file organizations.

Uploaded by

Jesse
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

SUBJECT:

DATA PROCESSING
CLASS:
S.S. 2

TERM: Second

©Deeper Life High School. 2023

www.deeperlifehighschool.org …leadership with distinction


SCHEME OF WORK

WEEKS TOPICS CONTENT


FILE ORGANIZATION (a) Types of file organization
1 (b) Comparison of Three file organization

PRESENTATION (a) Meaning of Presentation package (b)


2 PACKAGES Uses of presentation package c)Practical

COMPUTER NETWORKS (a) By Meaning of Network


(b) Types of Data Networks
3
COMPUTER NETWORKS c)Network Topology
d) Types of Networking Technologies
4
INTERNET I (a) Definition of internet
(b) Internet browsers
(c)Benefits of internet
5
INTERNET II (d) Internet Security
(e) Abuse of the Internet
6
7 MID-TERM BREAK
WEB DESIGN PACKAGES (a) Meaning of web design packages:
8 (b)Uses of web design packages

WEB DESIGN PACKAGES (c) Components of web design packages (b)


Examples of web design packages
9
10 REVISION

11 EXAMINATION

12
13

www.deeperlifehighschool.org …leadership with distinction


WEEK:1

TOPIC:FILE ORGANIZATION

LESSON OBJECTIVES: By the end of the lesson, students should be able to:
(a) state the types of file organization
(b) comparethethree file organization

ENTRY BEHAVIOUR: The students already know how to create file in a database and store
data in such file.

SUB-TOPIC 1:
CONTENT:FILE ORGANIZATION
File organization is a way of organizing the data or records in a file. It does not refer to how files are
organized in folders, but how the contents of a file are added and accessed.

Is also a systematical way of arranging record in a file that is stored on a disk. You can access a file
of record in different ways and tailor it in a variety of ways.

PRACTICE EXERCISE:
1. File organization does not refer to how files are organized in __________
2. But how the contents of a ________ are added and __________.
3. ___________ is a systematical way of arranging record in a file that is stored on a disk.
4. You can access a ______ of _________ in different ways and tailor it in a variety of ways.
5. File organization is a __________ way of arranging record _______ that is stored on a disk

SUB-TOPIC 2:

CONTENT:TYPES OF FILE ORGANIZATION


There are a large number of ways records can be organized on disk or tape. The main methods of file
organization used for files are;
• Heap File Organization
• Sequential File Organization
• Hash / Direct File Organization
• Cluster File Organization
• Indexed Sequential Access Methods (ISAM)

Heap File Organization


An unordered file, sometimes called a heap file, is the simplest type of file organization.
Records are placed in file in the same order as they are inserted. A new record is inserted in the last
page of the file; if there is insufficient space in the last page, a new page is added to the file. This
makes insertion very efficient. However, as a heap file has no particular ordering with respect to field
values, a linear search must be performed to access a record. A linear search involves reading pages
from the file until the required is found.
www.deeperlifehighschool.org …leadership with distinction
Sequential File Organization:
In a sequential file organization, records are organized in the sequence by which they were added.
You cannot insert a new record between existing records, but only at the end of the last record. It is a
simple file organization that allows you to process batches of records in the file without adding or
deleting anything. However, to access a particular record, processing must run through all the other
records above it because it does not generate any random key to identify the location of the record.
Hash File Organization
In a hash file, records are not stored sequentially in a file instead a hash function is used to calculate
the address of the page in which the record is to be stored.
The field on which hash function is calculated is called as Hash field and if that field acts as the key of
the relation then it is called as Hash key. Records are randomly distributed in the file so it is also
called as Random or Direct files. Commonly some arithmetic function is applied to the hash field so
that records will be evenly distributed throughout the file.

Cluster File Organization


A traditional file system is a hierarchical tree of directions and files Implemented on a raw device
partition through the file system. Clustered file organization is not considered good for large
databases. In this mechanism, related records from one or more relations are kept in the same disk
block, that is ordering of records is not based on primary key or search key.
Indexes Sequential Access Method (ISAM)
In an ISAM system, data is organized into records which are composed of fixed length fields. Records
are stored sequentially. A secondary set of hash tables known as indexes contain "pointers" into the
tables, allowing individual records to be retrieved without having to search the entire data set.
It is a data structure that allows the DBMS to locate particular records in a file more quickly and
thereby speed response to user queries. An index in a database is similar to an index in a book. It is
an auxiliary structure associated with a file that can be referred to when searching for an item
of information, just like searching the index of a book, in which we look up a keyword to get a list of
one or more pages the keyword appears on.

PRACTICE EXERCISE:
1. ISAM stands for _________________
2. In a hash file, ______ are not stored sequentially in a file.
3. Clustered file organization is not considered good for large ____________.
4. In a sequential file organization, records are organized in the _________ by which they were
added.
5. An __________, sometimes called a heap file, is the simplest type of file organization.

SUB-TOPIC 3:

CONTENT:BASIC OPERATION

Scan: Fetch all records in the file. The pages in the file must be fetched from the disk into the buffer
pool. There is also a CPU overhead per record for locating the record on the page.

www.deeperlifehighschool.org …leadership with distinction


Search with equality selection: Fetch all records that satisfy an equality selection, for example, find
the student record for the student with sid 23. Pages that contain qualifying records must be fetched
from the disk, and qualifying records must be located within retrieved pages.

Search with range selection:Fetch all records that satisfy a range selection. For example, find all
students records with name alphabetically after smith.

Insert:Insert a given record into the file. We must identify the page in the file into which the new
record must be inserted, fetch that page from the disk, modify it to include the new record and then
write back the modified page.

Delete:Delete a record that is specified using its record id. We must identify the page in the file into
which the new record must be inserted, fetch that page from the disk, modify and then write it back.
Locate: Every file has a file pointer, which tells the current position where the data is to be read or
written.

Write: User can select to open a file in write mode, the file enables them to edit its contents. It can be
deletion, insertion or modification.

Read: By default, when file are opened in read mode, the file pointer points to the beginning of the
file.

Comparison among Three Files Organization


- A hashed file does not utilize space quite as well as a sorted file, but insertions and deletions
are fast, and equality selections are very fast.
- A heap file has good storage efficiency and supports fast scan, insertion and deletion or
records. However, it is slow for searching.
- A sorted file also offers good storage efficiency, but insertion and deletion of records are slow.
It is quite fast for searching, and it is the best structure for range selections.

PRACTICE EXERCISE:
1. Pages that contain qualifying records must be ________ from the disk.
2. Fetch all records that satisfy a __________ selection.
3. Every file has a file _________, which tells the current position where the data is to be read or
written.
4. User can select to open a file in __________mode, the file enables them to _______ its
contents.
5. A __________ file does not utilize space quite as well as a sorted file, but _____ and _____
are fast, and equality selections are very fast.

TOPICAL TEST:
Objective Question
1. The type of file organization in a DVD-ROM is A. direct access. B. sequential C. serial D.
hierarchical. [2015/33]
2. Computers store data as A. folders. B. files. C. documents D. directories [2016/37]

www.deeperlifehighschool.org …leadership with distinction


3. The records of students in a school are kept in order of their approval. What file access method
would be used to access a student’s record if the latest record first be retrieved? A. direct B. index C.
senior
4. What file organization would require the 5th record is written? A. direct access file B. index
sequential file C. random access D. sequential access file
5.Which of the following is not an advantage of file organization? A. of data input B> post data
retrieval C. promotion of data failure and data loss D. safety of data and information in a storage
medium. [2017/38]
6. arranging records in a file according to a particular order is referred to as A. matching B. merging
C> sorting D. updating [2018/37]
7. One advantage of indexed sequential file organization is that A. index tables are small and can be
searched quickly B. it is cost effective. C. it is suitable for dynamically changing files D. it requires less
storage space. [2018/38]
8. One unique feature of index file is that it contains A. reference number. B. relative number. C.
sequential number D. static number. [2019/37]
9. Which of the following file organizations requires a primary key? A. Indexed file organization B.
Random file organization C. Serial file organization D. Sequential file organization [2019/38]
10. The file organization method which allows records to be accessed in any sequence is A. index.
B. random. C. sequential. D. serial. [2020/37]

Fill in the gap Questions:


1. File organization refers to the structured arrangement and storage of data within
____________.
2. In a sequential file organization, records are stored in a ____________ order based on a
specified key field.
3. A ____________ file organization uses an index structure to provide direct access to records.
4. In a ____________ file organization, records are grouped together based on a common
attribute or key.
5. The ____________ file organization stores records in a way that allows rapid retrieval based
on various attributes.
6. ____________ is an advantage of sequential file organization, where reading/writing records is
relatively straightforward.
7. An ____________ file organization allows records to be accessed in any order without the
need for physical arrangement.
8. The ____________ file organization uses a hash function to calculate storage locations for
records.
9. A ____________ file organization maintains multiple physical copies of the same data for
redundancy.
10. ____________ is a disadvantage of direct file organization, where updates and insertions can
be complex.
Essay
1. What is file organization? Explain the different types of file organization.
2. What are the advantages and disadvantages of sequential file organization?
3. What are the advantages and disadvantages of indexed file organization?
4. What are the advantages and disadvantages of direct file organization?
5. Discuss the factors that should be considered when choosing a file organization method.

www.deeperlifehighschool.org …leadership with distinction


GLOSSARY OF TERMS / KEY WORDS / VOCABULARY:
1. File Organization: The structured arrangement and storage of data within files to facilitate
efficient data access and manipulation.
2. Sequential File Organization: A file organization method where records are stored in a specific
order, typically based on a key field, and can only be accessed sequentially.
3. Indexed File Organization: A method that uses an index structure to provide direct access to
records, improving retrieval speed and efficiency.
4. Clustered File Organization: Records with similar attributes are physically grouped together on
storage media, enhancing retrieval of related data.
5. Random File Organization: A method that allows records to be accessed directly, without
following a sequential order, providing fast and efficient access.
6. Primary Index: A data structure that provides direct access to records by pointing to the
storage location of each record on the storage medium.
7. Secondary Index: An additional index that provides an alternate path for accessing records
based on attributes other than the primary key.
8. Hashing: A technique that uses a hash function to calculate storage locations for records,
ensuring even distribution and efficient retrieval.
9. Record: A collection of related data elements or fields that represent a unit of information within
a file.
10. File Header: Metadata stored at the beginning of a file, containing information about the file's
structure, attributes, and organization.
11. File Footer: Metadata stored at the end of a file, containing summary information or checksums
for data integrity validation.

PUZZLES / BRAIN TEASER:Unscramble the File Organization Terms


Unscramble the letters to reveal different terms related to file organization:
1. SRTGEPEAQUNIIEU
2. KAHNSI
3. LYNFEDI
4. IDETCR
5. CSHAAHG
6. RIMAPYR
7. THIAND
8. CLSTERUE

File Organization Sudoku


Complete the 6x6 Sudoku puzzle using the terms related to file organization:

www.deeperlifehighschool.org …leadership with distinction


INSPIRATIONAL QUOTES:You educate a man; you educate a man. You educate a woman; you
educate a generation.”
-Brigham Young

WEEK:2

TOPIC:PRESENTATION PACKAGES

LESSON OBJECTIVES: By the end of the lesson, students should be able to:
(a) state the meaning of Presentation package
(b) state the uses of presentation package
(c)Practical
ENTRY BEHAVIOUR: This students already know how to use Microsoft PowerPoint to view
lesson note in school.
SUB-TOPIC 1:

CONTENT:Meaning of Presentation Package


A Presentation package is a computer software package that is used to display information
usually in the form of a slide show. It is often called graphic presentation. A presentation package
can also be defined as software for creating documents or animations for presentation.

Examples of Presentation Packages are;


1. Microsoft PowerPoint.
2. Harvard graphics
3. Windows movie maker
www.deeperlifehighschool.org …leadership with distinction
4. Macromedia flash
5. OpenOffice.org Impress

PRACTICE EXERCISE:
1. A presentation package can also be defined as _____________documents or animations for
presentation.
2. Presentation package is often called ___________ presentation.
3. A Presentation package is a _________________ that is used to display information usually in
the form of a slide show.
4. ______, ________ and ________ are examples of presentation package.
5. ________ Flash is also an example of presentation package.

SUB-TOPIC 2:
CONTENT:Uses of Presentation Package
Presentation packages are used to display Information usually in the form of a slide show via the
integration of multimedia such as digital video and sounds. Other uses of the internet are;
i. Multimedia lectures
ii. Student reports
iii. Handouts
iv. Multimedia story books
Sub-topic 2

Getting started with PowerPoint


- Click on start menu
- Point to program icon
- Click on Microsoft PowerPoint

PowerPoint Environment

PowerPoint View

www.deeperlifehighschool.org …leadership with distinction


PowerPoint provides different types of views to work with, while a presentation is being created.
These views are:
i. Slide view
ii. Outline view
iii. Normal view or Tri-pane view
iv. Slide sorter view
v. Note view
vi. Master view
vii. Slide show

Slide View
This slide view is used to view slides one by one on the screen. In slide view you can insert text,
movie clips, sound, objects like clip art, Auto Shapes and Word Art.
Outline View
In this view you can re-arrange your slides and bullets that you have inserted in your slide. In this
view you can see how your main points flow from slide to slide.
Normal View
This view consists of three pane
- slide pane-to enter and edit text and objects in slides
- Outlines pane-to rearrange the slide
- Notes pane-to insert the information for the speaker or the audience.
Note View
In notes page view, you can type speaker notes to use during your presentation. You can as well
have the hard copy of your notes for reference.
Master View
A company logo or formatting you desired to appear on every slide, notes page or handout can be
done on this view.
Slide show view
This view is used to view the presentation on the screen. A slide show is a full-screen display of
each page in a presentation.

NOTE:
Pls educator, treat all other tools use in PowerPoint.

PRACTICE EXERCISE:
1. _________, ___________ and ___________ are the uses of presentation packages.
2. Presentation packages are used to display Information usually in the form of a _________
3. This slide view is used to view slides ___________ on the screen.
4. ________ is used to view the presentation on the screen.
5. In notes page view, you can type __________ to use during your presentation.

TOPICAL TEST:
Objective Questions:
1. In MS PowerPoint, the action of holding down the left mouse key and moving the mouse
around the slide would A. highlight an item B. drag an item C. select an item D. move ac item.
[2015/27]

www.deeperlifehighschool.org …leadership with distinction


2. in MS power point presentation, the special effects that control the order in which objects enter
a slide and their manner of appearance is A. transition B. media C. clip art D. animation [2016/24]
3. During presentation, slide transition can be activated by A. right—click. B. mouse drag D.
double-click [2017/24]
4. A special effect that controls the way slides appear in power point presentation is called A.
word Art B. transition C. theme D. clip Art. [2018/24]
5. The MS power point which can be used to change the appearance of the entire presentation is
the A. add slide option B. design template C. online view C. slide layout option. [2019/24]
6. Which of the following objects is not located in the slide layout tab? A. animation B. charts C.
lists D. titles [2020/4]
7. To show the whole presentation in Microsoft power point 2007, select slide show from the A.
design tab B. menu bar C. title bar D. Home tab
8. In Microsoft power point application, the command: Ctrl + m is used to create A. an animation
B. new power point document C. new presentation D. new slide [2022/24]
9. PowerPoint can use existing documents of _____________(a)Word (b) Access (c) pseudo codes
(d) Excel
10. ____________ is a software used for making presentations(a)PowerPoint (b) Excel (c) Access(d)
Publisher

Fill in the gap Questions:


1. A ____________ is a software tool used to create visually engaging slideshows for
presentations.
2. In presentation software, a ____________ is a single page of content that can contain text,
images, and multimedia.
3. ____________ are predefined designs and layouts that provide a consistent look for slides.
4. ____________ are special effects applied to transitions between slides, adding visual appeal.
5. The ____________ feature in presentation software allows you to add movement to individual
elements on a slide.
6. ____________ are visual aids used to enhance the presenter's message and engage the
audience.
7. ____________ are additional notes that can be added to slides to provide information for the
presenter.
8. ____________ is a feature that allows you to insert links to other slides, websites, or files.
9. ____________ is the process of integrating external media, such as videos or audio, directly
into a slide.
10. The ____________ function in presentation software allows you to rehearse and time your
presentation.

Essay
1. (a)(i) define application package (ii) state one use each of any four application packages (b) list
two benefits of a presentation package. (c) outline three guidelines for creating good MS power point
presentation
2. Mr. Aneke is billed to address a large audience in an auditorium. (I) what computer application
package is suitable to prepare and deliver his speech? (II) state the output device that can be used to
transmit Mr. Anekes’ speech note from his computer to a large screen in the auditorium [2018/3]
3. (a)(i) what is a presentation package? (ii)give two examples of presentation package. (iii)state
three features of a presentation package. [2022/3]

www.deeperlifehighschool.org …leadership with distinction


4. What is a presentation package? List two examples of presentation packages.
5. Outline the steps involved in creating a presentation using a presentation package.

GLOSSARY OF TERMS / KEY WORDS / VOCABULARY:


1. Presentation Package: Software used to create, edit, and deliver slideshows for presentations.
2. Slide: A single page within a presentation containing content such as text, images, charts, and
multimedia.
3. Slide Deck: A collection of slides that make up a presentation.
4. Transitions: Visual effects used to smoothly transition between slides during a presentation.
5. Animations: Effects applied to individual elements on a slide to add movement and visual
interest.
6. Templates: Pre-designed layouts with consistent fonts, colors, and placeholders for creating
slides.
7. Slide Master: The main design template that defines the overall look and feel of the
presentation.
8. Themes: Sets of coordinated colors, fonts, and effects that give a consistent appearance to a
presentation.
9. Speaker Notes: Additional notes added to slides that are only visible to the presenter during a
presentation.
10. Hyperlink: A clickable link that can connect to another slide, website, document, or file.
11. Embedding: Integrating external media, such as videos, audio, or interactive content, directly
into a slide.
12. Slide Show: The mode in which a presentation is displayed, typically full-screen and in a
sequence of slides.
13. Presenter View: A feature that displays the current slide, speaker notes, and upcoming slides
to the presenter.
14. Bullet Points: Short, concise phrases or sentences that summarize key points on a slide.
15. Chart: A visual representation of data, such as bar charts, pie charts, and line graphs.
16. Transition Effects: Animation effects applied to slide transitions to add visual appeal.
17. Slide Navigation: The ability to move between slides during a presentation.
18. Auto Save: A feature that automatically saves changes to the presentation at regular intervals.
19. Export: Saving a presentation in a different file format, such as PDF or video.
20. Import: Adding external content, such as images or videos, into the presentation.
21. Master Slide: A slide that contains the main layout and design elements for the entire
presentation.

PUZZLES / BRAIN TEASER:Presentation Tools Word Search


Find the names of various presentation software tools in the word search below:
PREZISREVEALJS
KDVHULFTRAJXSW
OWPOIGNHAXVURB
WLGTLLBRTAEBAX
EFXKANIMATIONR
RRIVZPGISHCIAN
POWERPOINTRUXL
EDSLTLVUEASEPA
ZPDCUCEZTICLKT
www.deeperlifehighschool.org …leadership with distinction
INSPIRATIONAL QUOTES:“Marriage can wait, education cannot.”
― Khaled Hosseini, A Thousand Splendid Suns

WEEK:3

TOPIC:COMPUTER NETWORKS

LESSON OBJECTIVES:By the end of the lesson, students should be able to:
(a) state the meaning of network
(b) discuss the types of data networks

ENTRY BEHAVIOUR: Students already know how to connect to the internet to browse which is
a network.

SUB-TOPIC 1:

CONTENT:Meaning of Networking

Networking is a system of connecting two or more computers together in order to share resources or
transfer information. The computers on a network may be connected through cables, telephone lines,
wireless links or satellite. Every computer connected to the network is said to be on the network and
should have a network interface card (NIC).
Networking can also be defined as a collection of computers and devices interconnected by
communications channels that facilitate communication among users and allow users to share
resources.
Categories of Networking
i. Local Area Network (LAN)
ii. Wide Area Networks (WAN)
iii. Metropolitan Area Network (MAN)
iv. Personal Area Network
v. Wireless Local Area Network
Local Area Network (LAN)
This is one of the original categories of network, and one of the simplest. LAN networks connect
computers together over relatively small distances, such as within a single building or within a small
group of buildings.

www.deeperlifehighschool.org …leadership with distinction


Wide Area Networks (WAN)
A wide area network, or WAN, occupies a very large area, such as an entire country or the entire
world. A WAN can contain multiple smaller networks, such as LANs or MANs. The Internet is the best-
known example of a public WAN.
Metropolitan Area Network (MAN)
This is a network which is larger than a LAN but smaller than a WAN, and incorporates elements of
both. It typically spans a town or city and is owned by a single person or company, such as a local
council or a large company.

Personal Area Network


A personal area network (PAN) is a computer network used for communication among computer and
different information technological devices close to one person. Some examples of devices that are
used in a PAN are personal computers, printers, fax machines, telephones, PDAs, scanners, and
even video game consoles. A PAN may include wired and wireless devices.
Wireless Local Area Network
This is a LAN which works using wireless network technology such as Wi-Fi. This type of network is
becoming more popular as wireless technology is further developed and is used more in the home
and by small businesses. It means devices do not need to rely on physical cables and wires as much
and can organize their spaces more effectively.

www.deeperlifehighschool.org …leadership with distinction


PRACTICE EXERCISE:
1. NIC stands for _________________________and Wi-Fi stands for _____________
2. Networking can also be defined as a collection of computers and devices ________ by
communications channels that facilitate communication.
3. A WAN can contain multiple smaller networks, such as ______ or ____________.
4. _________ is a LAN which works using wireless network technology such as Wi-Fi.
5. The computers on a network may be connected through ______, ________, _____________
or satellite.
Essay
1. What is networking
2. State three types of network.
3. Discuss the term WLAN.

TOPICAL TEST:
Objective Questions:
1. Which of the following are the basic components of a computer network? I. A minimum of two
computers II. Printers Ill. Network interface card A. I and II only. B. I and Ill only. C. II and III only D. I,
II and III. [2015/13]
2. A server is a computer that provides services to other computers called A. clients. B. peers. C.
routers. D. switches. [2016/13]
3. The rules for exchanging data on a network are known as A. transmission rules. B. transfer rules.
C. protocols. D. configurations. [2016/14].
4. The basic criterion for classifying a network is A. psychological consideration. B. geographical
scope. C. equipment availability D. economic reason. (2017/13]
5. The following are advantages of networking except A. spamming B. sharing of resources. C.
communication. D. backup. [2018/13]
6. Which of the following devices would not transmit signals from one point to another? A. one line B.
Modem C. Fibre optics D. Coaxial cable. /2018/14]
7. Which of these technologies allows wireless connectivity in a Personal Area Network? A.
Bandwidth B. Bluetooth C. Broadband D. Satellite [2019/13].
8. The main function of the device in the part labeled II in the diagram below is?

A. speeding up the rate of data transfer to the part labeled I. B.


providing services to the other devices in the setup. C. forwarding data packets between computers.
D. controlling the access to the part labeled [2019/14]
9. A company has four computer systems, one printer and one scanner for its daily operations. One
factor that can motivate the company to connect all the devices in a network is the need to A. provide
efficient services. B. save running cost. C. share software only. D. use a wireless connection.
[2020/13]
www.deeperlifehighschool.org …leadership with distinction
10. One similarity between the Internet and intranet is that they both A. were invented by the same
company. B. use the same technology. C. have the same coverage. D. are open to the public.
[2020/14].
11. An entrepreneur who wishes to send digital data over a telephone line would need A. hub. B.
modem C. router D. switch [2020/16]
12. The protocol for transferring files from one machine to another is A. SNMP B.SMTP C.FTP D.FAT
[2021/13]
13. Mr. Francis has an office complex with 20 rooms. What type of network is suitable for connecting
all the computers in their various rooms into single network? A. LAN B.MAN C.PAN D. WAN [2021/14]
14. The capacity of a communication channel is referred to as A. bandwidth. B. baud rate. C. bit flow
D. data flow. [2022/12)
15. The type of network which has a restricted coverage within an enterprise is called A. net B.
intranet. C. ethernet. D. extranet [2022/13]
16. One of the major differences between WAN and MAN is that A. WAN uses routers while MAN
uses switches. B. WAN connects countries while MAN connects continents. C. WAN has no limited
coverage while MAN has limited coverage. D. WAN incorporates servers while MAN does not
incorporate servers. [2022/14].

Fill in the gap Questions:

Certainly! Here are 10 "fill in the gap" questions related to different types of networking such as LAN,
MAN, WAN, and PAN:
1. A ____________ is a network that covers a small geographical area, typically within a single
building or campus.
2. ____________ stands for Local Area Network, which is used to connect devices within a
limited area.
3. A ____________ is a network that spans a larger geographical area than a LAN but is still
within a city or metropolitan area.
4. ____________ stands for Metropolitan Area Network, providing connectivity over a city or
large campus.
5. A ____________ is a network that covers a vast geographical area, often spanning multiple
cities or even countries.
6. ____________ stands for Wide Area Network, connecting networks across great distances.
7. ____________ is a type of network used for communication between devices in close
proximity, such as smartphones and laptops.
8. A ____________ is a personal network used for connecting devices like smartphones, tablets,
and laptops in close proximity.
9. In a LAN, devices are usually connected using ____________ cables or wireless technologies.
10. A MAN typically covers a larger area than a LAN but is smaller in scope than a ____________.

Essay
1. (a) A general hospital decides to computerize the records in all its departments. (i). List two
advantages of networking all the computers in the various departments of the hospital. (b). State the
type of network that can be implemented in such a hospital. [2014/4]
2. Write the full meaning of WiF1 [2016/4]
3. Mr. Okafor has a company that specializes in the production of beverages with headquarters in
Abuja. He needs to monitor the sales and transactions in the company’s branches across Nigeria as

www.deeperlifehighschool.org …leadership with distinction


well as interact with his Customers (a) If mr. Okafor decides to connect all the offices within the
headquarters in Abuja in a single network: (i) what type of network is appropriate? (ii) mention three
reasons to support his decision,
(b) Mention two transmission media that can be used to implement the network in (a) (i) [2017/3].
4. Give two types of computer network. [2018/3]
5. (a) A secondary school has over twenty personal computers. The school management intends to
connect all the computers in a network. Give four reasons that must have motivated the school
management into connecting the computers together. (b) List four network devices required to
accomplish the task in (a). (c) State one function each of any two of the devices listed in (b).
[2019/31].
6. With the aid of diagrams, differentiate between LAN and WAN.[2020/3]
7. Differentiate between: (i) Internet and intranet; (ii) LAN and WAN. (c) List four devices used in a
LAN environment. [2022/1]

PUZZLES / BRAIN TEASER:


Unscramble the Networking Terms
Unscramble the letters to reveal different terms related to computer networking:
1. LHUB
2. IPRECTOOL
3. NTRPOOCLO
4. SSID
5. LSTBUI
6. EBRTAMOD
7. NATSITRN
8. ACERTIDH
9. WNIAIERT
10. ERSWTIEL

GLOSSARY OF TERMS / KEY WORDS / VOCABULARY:


1. Network: A collection of interconnected devices and computers that communicate and share
resources.
2. LAN (Local Area Network): A network that covers a limited geographical area, typically within a
building or campus.
3. WAN (Wide Area Network): A network that spans a large geographical area, often connecting
multiple LANs across cities or countries.
4. MAN (Metropolitan Area Network): A network that covers a city or a large campus, larger in
scale than a LAN but smaller than a WAN.
5. Router: A networking device that forwards data packets between different networks and directs
traffic.
6. Switch: A device that connects devices within a network and manages data traffic between
them.
7. Hub: A basic networking device that connects multiple devices in a network, but it doesn't
intelligently manage traffic.
8. Protocol: A set of rules and conventions that govern how data is transmitted and received in a
network.
9. IP Address: A numerical label assigned to each device in a network, used for identification and
addressing.

www.deeperlifehighschool.org …leadership with distinction


10. MAC Address: A unique identifier assigned to network interfaces, usually associated with
hardware devices.
11. DNS (Domain Name System): A system that translates human-readable domain names into IP
addresses, enabling easier access to websites.
12. Firewall: A security device or software that filters and monitors incoming and outgoing network
traffic.
13. Gateway: A device that connects networks with different protocols and manages data traffic
between them.
14. Subnet: A portion of a network with a shared address space, used to divide a larger network
into smaller segments.
15. Bandwidth: The maximum data transfer rate of a network or internet connection, measured in
bits per second (bps).
16. Latency: The time delay between sending and receiving data in a network, often measured in
milliseconds.
17. Packet: A unit of data transmitted over a network, including both the message and control
information.
18. VPN (Virtual Private Network): A secure connection that allows users to access a private
network over a public network.
19. TCP/IP (Transmission Control Protocol/Internet Protocol): A set of protocols used for
communication on the internet and most networks.
20. Ethernet: A common technology used for wired LAN connections, known for its reliability and
speed.
21. Wireless: A type of network connection that uses radio waves to transmit data without physical
cables.
22. SSID (Service Set Identifier): The name of a wireless network, used to identify and connect
devices.
23. Router: A device that directs data packets between different networks and manages traffic
within a network.

INSPIRATIONAL QUOTES:“Education makes a people easy to lead but difficult to drive: easy to
govern, but impossible to enslave.”
-Peter Brougham

WEEK: 4

TOPIC:COMPUTER NETWORKS

LESSON OBJECTIVES:By the end of the lesson, students should be able to:
c)discus network topology
d)explain thetypes of networking
ENTRY BEHAVIOUR: The students already been taught networking and types of networking.

SUB-TOPIC 1:
CONTENT:Network Topology

www.deeperlifehighschool.org …leadership with distinction


Network topology is the arrangement of various network elements used in data transmission and
formation of interconnections like nodes and links with each other. This linking of various elements is
known as network topology.
Network topology is of two categories:
• Physical topology
• Logical topology

Physical topology is the mapping out of the various interconnections that are visible and which
is the physical design of that network.
Logical topology is the mind mapping of such intercommunication diagrams that you make while
identifying a network. It shows how the data flows within a functioning network.

PRACTICE EXERCISE:
1. Network topology is of _________categories.
2. __________ is the mapping out of the various interconnections that are visible.
3. ____________ shows how the data flows within a functioning network.
4. ____________ is the arrangement of various network elements.
5. This linking of various elements is known as _________ topology.
Essay
1. Discuss the concept of network topology.
2. What is physical topology?
3. What is logical topology?

SUB-TOPIC 2:

CONTENT:Types of Network Topology


i. Point to point:
This is the simplest and the earliest type of topology that links two end points. This has been used by
the telephonic systems and is the oldest type of network topology. A simple example of such a
topology is how main frames and mini computers are connected to terminals. There can be one
terminal or various terminals but that one terminal server will have a point to point topological access
to each of its subscriber.
ii. Bus Topology
Bus topology is a network type in which every computer and network device is connected to single
cable. When it has exactly two endpoints, then it is called Linear Bus topology.

www.deeperlifehighschool.org …leadership with distinction


Features of Bus Topology
1. It transmits data only in one direction.
2. Every device is connected to a single cable.
Advantages of Bus Topology
1. It is cost effective.
2. Cable required is least compared to other network topology.
3. Used in small networks.
4. It is easy to understand.
5. Easy to expand joining two cables together.
Disadvantages of Bus Topology
1. Cables fails then whole network fails.
2. If network traffic is heavy or nodes are more the performance of the network decreases.
3. Cable has a limited length.
4. It is slower than the ring topology.
iii. Ring Topology
It is called ring topology because it forms a ring as each computer is connected to another computer,
with the last one connected to the first. Exactly two neighbours for each device. OR
Ring network topology is that in which all the terminals are arranged in a circular fashion and that all
the data that is transmitted across the terminals is transferred in a circular pattern so that all the
terminals receive it.

Features of Ring Topology


1. A number of repeaters are used for Ring topology with large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then the
data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss
repeaters are used in the network.
2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections
between each Network Node, it is called Dual Ring Topology.
3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction in
them. Also, if one ring fails, the second ring can act as a backup, to keep the network up.
4. Data is transferred in a sequential manner that is bit by bit. Data transmitted, has to pass through
each node of the network, till the destination node.
Advantages of Ring Topology
1. Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes
having tokens can transmit data.
2. Cheap to install and expand

www.deeperlifehighschool.org …leadership with distinction


Disadvantages of Ring Topology
1. Troubleshooting is difficult in ring topology.
2. Adding or deleting the computers disturbs the network activity.
3. Failure of one computer disturbs the whole network.

PRACTICE EXERCISE:
1. Bus topology is a network type in which every computer and network device is connected to
_________.
2. It is called ring topology because it forms a ______ as each computer.
3. The transmission is unidirectional, but it can be made bidirectional by having 2 connections
between each Network Node, it is called ___________.
4. Ring network topology is that in which all the terminals are arranged in a ____________
5. Data is transferred in a _________ manner that is bit by bit.
Essay
1. What is a Bus topology?
2. Discuss the advantages of bus topology over a ring topology.
3. At what point will a network engineer use bus topology over ring topology.

SUB-TOPIC 3:

CONTENT:STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This hub is
the central node and all others nodes are connected to the central node. OR
Star topology is the arrangement of the computers in such a way that all the terminals or work
stations are connected to the main central hub. The terminals are referred to as the clients and the
main central hub is referred to as the switch.
Features of Star Topology
1. Every node has its own dedicated connection to the hub.
2. Hub acts as a repeater for data flow.
3. Can be used with twisted pair, Optical Fibre or coaxial cable.
Advantages of Star Topology
1. Fast performance with few nodes and low network traffic.
2. Hub can be upgraded easily.
3. Easy to troubleshoot.
4. Easy to setup and modify.
5. Only that node is affected which has failed, rest of the nodes can work smoothly.
Disadvantages of Star Topology
1. Cost of installation is high.
2. Expensive to use.
3. If the hub fails then the whole network is stopped because all the nodes depend on the hub.
4. Performance is based on the hub that is it depends on its capacity

www.deeperlifehighschool.org …leadership with distinction


v. MESH Topology

In this kind of topology all the devices are connected to each other and that the data transferred from
one system is sent and received by all the other systems. In this way, the data is transferred in not a
one way route but in a multiple access pathways and that all the workstations are functioning in data
receiving and data sending at the same time.

Types of Mesh Topology


1. Partial Mesh Topology : In this topology some of the systems are connected in the same fashion
as mesh topology but some devices are only connected to two or three devices.
2. Full Mesh Topology : Each and every nodes or devices are connected to each other.
Features of Mesh Topology
1. Fully connected.
2. Robust.
3. Not flexible.
Advantages of Mesh Topology
1. Each connection can carry its own data load.
2. It is robust.
3. Fault is diagnosed easily.
4. Provides security and privacy.
www.deeperlifehighschool.org …leadership with distinction
Disadvantages of Mesh Topology
1. Installation and configuration is difficult.
2. Cabling cost is more.
3. Bulk wiring is required.

vi. TREE Topology


It has a root node and all other nodes are connected to it forming a hierarchy. It is also called
hierarchical topology. It should at least have three levels to the hierarchy.

Features of Tree Topology


1. Ideal if workstations are located in groups.
2. Used in Wide Area Network.
Advantages of Tree Topology
1. Extension of bus and star topologies.
2. Expansion of nodes is possible and easy.
3. Easily managed and maintained.
4. Error detection is easily done.
Disadvantages of Tree Topology
1. Heavily cabled.
2. Costly.
3. If more nodes are added maintenance is difficult.
4. Central hub fails, network fails.

Intranet
This is a network that is not available to the world outside of the intranet.

PRACTICE EXERCISE:
1. In this type of topology all the computers are connected to a __________ hub through a
__________.
2. In __________ topology all the devices are connected to each other.
3. __________has a root node and all other nodes are connected to it forming a hierarchy.
4. ________ is used in Wide Area Network.
5. A number of ________ are used for Ring topology with large number of nodes
Essay
1. State the full meaning of the following:
i. LAN ii. IP iii. WAN iv. HTTP
2. Briefly explain the following terms: (i) Protocols (ii) Extranet (iii) Intranet

www.deeperlifehighschool.org …leadership with distinction


3. Discuss the advantage of a star topology over mesh topology

TOPICAL TEST:
Objective Questions
1. What does network topology refer to? a) The physical arrangement of devices in a network. b)
The speed of data transmission in a network. c) The number of devices in a network. d) The
type of data being transmitted in a network.
2. In which network topology do all devices connect to a central hub or switch? a) Bus b) Ring c)
Star d) Mesh
3. Which topology offers high fault tolerance due to redundant connections? a) Bus b) Ring c)
Star d) Mesh
4. In a bus topology, what happens if one device fails? a) Only the failed device is affected. b) All
devices after the failed device are affected. c) All devices are affected. d) None of the devices
are affected.
5. Which topology forms a closed loop where each device is connected to exactly two other
devices? a) Bus b) Ring c) Star d) Mesh
6. Which topology requires the least amount of cabling? a) Bus b) Ring c) Star d) Mesh
7. Which topology is commonly used in WANs, such as the internet? a) Bus b) Ring c) Star d)
Mesh
8. In a star topology, what happens if the central hub or switch fails? a) Only the central hub or
switch is affected. b) All devices are affected. c) Only the devices directly connected to the hub
are affected. d) None of the devices are affected.
9. Which topology provides the highest level of redundancy and reliability? a) Bus b) Ring c) Star
d) Mesh
10. Which topology is most commonly used in Ethernet LANs? a) Bus b) Ring c) Star d) Mesh
11. Which topology is difficult to set up and maintain due to the high number of connections? a)
Bus b) Ring c) Star d) Mesh
12. Which topology offers better security as data flows in only one direction? a) Bus b) Ring c) Star
d) Mesh
13. Which topology offers easy fault detection and isolation due to its linear structure? a) Bus b)
Ring c) Star d) Mesh

Filling the gap Questions.


1. In a ____________ topology, all devices are connected to a central hub or switch.
2. A ____________ topology forms a closed loop where each device is connected to exactly two
other devices.
3. In a ____________ topology, devices are connected in a linear sequence.
4. A ____________ topology offers high fault tolerance due to redundant connections.
5. In a ____________ topology, each device is directly connected to every other device.
6. The ____________ topology requires the least amount of cabling.
7. The ____________ topology is commonly used in WANs such as the internet.
8. In a ____________ topology, if the central hub or switch fails, only the connected devices are
affected.
9. The ____________ topology provides the highest level of redundancy and reliability.
10. The ____________ topology is most commonly used in Ethernet LANs.
11. The ____________ topology offers efficient data transmission since there's no contention.

www.deeperlifehighschool.org …leadership with distinction


12. The ____________ topology is difficult to set up and maintain due to the high number of
connections.

GLOSSARY OF TERMS / KEY WORDS / VOCABULARY:


1. Node: A device or point in a network where data is transmitted or received, such as computers,
routers, and switches.
2. Link: A physical or logical connection between nodes in a network.
3. Hub: A simple networking device that connects multiple devices in a network.
4. Backbone: The main high-capacity communication path in a network, often connecting major
devices.

PUZZLES / BRAIN TEASER:


Brain Teaser: Network Topology Challenge
Can you determine the type of network topology described in each of the following scenarios?
Choose from options like Star, Bus, Ring, and Mesh.
1. All devices are connected to a central hub, and data flows through the hub to reach other
devices.
2. Devices are connected in a closed loop, and each device is connected to exactly two others.
3. Devices are interconnected with multiple connections, offering high fault tolerance.
4. Devices are arranged in a linear sequence, and data travels in one direction.
5. Devices are connected by a single central cable, and devices tap into the cable.
6. A hierarchical structure with a central main node connected to multiple subnodes.
7. Devices are interconnected through direct point-to-point links.
8. A network where devices are spread out and connected to each other without a central hub.
9. Multiple different types of topology are used within the same network.
10. Devices are connected to a backbone that forms the main communication path.
Essay
1. What is network topology? Explain the different types of network topologies.
2. What are the advantages and disadvantages of the star topology?
3. What are the advantages and disadvantages of the bus topology?
4. What are the advantages and disadvantages of the ring topology?
5. What are the advantages and disadvantages of the mesh topology?

INSPIRATIONAL QUOTES:“Whatever the cost of our libraries, the price is cheap compared to that of
an ignorant nation.”
-Walter Cronkite

www.deeperlifehighschool.org …leadership with distinction


WEEK: 5

TOPIC:INTERNET I

LESSON OBJECTIVES: By the end of this lesson, students should be able to:
(a) defineof internet
(b) Internet browsers
(c)Benefits of internet

ENTRY BEHAVIOUR:

SUB-TOPIC 1:

CONTENT:Definition of Internet
The Internet is a global system of interconnected computer networks that use the Standard Internet
Protocol Suite (TCP/IP) to serve billions of users worldwide.

It is a network of networks that consists of millions of private, public, academic, business and
government networks of local to global scope that are linked by a broad array of electronic and optical
networking technologies. Simply put, the Internet is a collection of computers, all linked together, to
share information worldwide. It is the largest computer network in the world.

PRACTICE EXERCISE:
1. The Internet is a _______ system of interconnected computer networks.
2. TCP/IP stands for ________________
3. _________ is the largest computer network in the world.
4. Simply put, the Internet is a ________ of computers, all linked together, to share information
_________.
5. ______ is a network of _______ that consists of millions of private, public, academic, business
and government networks.

SUB-TOPIC 2:

CONTENT:The Internet Browser


Is a software application for retrieving, presenting and traversing information resources on the World
Wide Web. An information resource is identified by a Uniform Resource Identifier (URI/URL) that may
be a web page, image, video or other piece of content. Hyperlinks present in resources enable users
easily to navigate their browsers to related resources.

Some popular browsers are: Internet Explorer, Opera, Safari, Chrome, Mozilla, Netscape
navigator.

www.deeperlifehighschool.org …leadership with distinction


Features in Main Browser Window
i. The Title bar
ii. The menu bar
iii. Tools and Help
iv. The tool bar
v. Address bar

Internet Services
i. E-mail: this service permits user to send and receive mail from anywhere in the world.
ii. World Wide Web:A network service that gives room for an individual or organization to set up
a special server or site from which other users can obtain special information.
iii. Voice and Video Conferencing: business and institution use the internet for voice and video
conferencing and other forms of communication that enable people to telecommunicate.
iv. E-commerce: this includes advertising, selling, buying, distributing product and providing
customer service on line.
v. File Sharing:this lets individuals swap music, movie, photos and applications, provided they
do not violate copy right protection.
vi. File Transfer Protocol: This was one of the first internet services developed and it allows users
to move files from one computer to another.
vii. Gopher: this offers downloaded files with some content description to make it easier to find the
file needed.

PRACTICE EXERCISE:
1. FTP stands for _______________
2. ___________ offers downloaded files with some content description to make it easier to find
the file needed.
3. ____________ lets individuals swap music, movie, photos and applications, provided they do
not violate copy right protection.
4. ________ this includes advertising, selling, buying, distributing product and providing customer
service on line.

www.deeperlifehighschool.org …leadership with distinction


5. URI/URL stands for __________________
Essay
1. Mention 4 features of web browser
2. Discuss three internet services
3. Define internet browser.
SUB-TOPIC 3:

CONTENT:Benefits of Internet to the society:


The Internet plays a major role in the society in the following application areas

1. Education/E-Learning: With the internet, people can get educational materials and read them
in preparation for examinations, or use them for school assignments. The internet also
enhances electronic learning whereby courses or subjects are taught online using audio and or
visual materials.
2. E-Registration: The internet provides users with facilities for online registration for
examinations like WAEC, NECO and JAMB.
3. Entertainment: The internet kills boredom and enhances leisure by providing its users with
latest entertainment in the form of movies, games, News and many more.
4. Communication: This is one of the key benefits of the internet. The internet provides many
means by which users can communicate with friends, family, colleagues, and lots more
through email, chat messenger, face books, etc.
5. E-Banking: The internet can be used as a tool to carry out transactions with banks irrespective
of user’s location.
6. E-Commerce: Internet is also a tool for E- Commerce. It can allow users to buy and sell their
goods and services online regardless of their location.
Websites
Is a collection of related web pages, including multimedia content, typically identified with a common
domain name, and published on at least one web server.

Webpage
Is a document that is suitable for the World Wide Web and web browsers. A web browser displays
a web page on a monitor or mobile device. The web page is what displays, but the term also refers
to a computer file, usually written in HTML or comparable markup language.

Uniform Resources Locator


Colloquially termed a web address, is a reference to a web resource that specifies its location on
a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform Resource
Identifier (URI), although many people use the two terms interchangeably.

Components of a URL
i. Protocol
ii. Http and FTP
iii. Hostname: Is the name of the computer that contains the information you want to access.
iv. Data path: is the string that specifies the path to the file that you wish to retrieve.

PRACTICE EXERCISE:
1. HTTP stands for _____________________

www.deeperlifehighschool.org …leadership with distinction


2. Colloquially termed a ____________, is a reference to a web resource that specifies its
location on a computer network and a mechanism for retrieving it.
3. __________ is a collection of related web pages, including multimedia content.
4. The internet provides users with facilities for online registration for examinations like WAEC,
NECO and JAMB, the feature is called _________________
5. ______ is the use of the internet as a tool to carry out transactions with banks irrespective of
user’s location.
Essay
1. Explain the following benefits of the internet.
E-learning, E-commerce, E-governance
2. What is a website?
3. Discuss the following components
a. Hostname
b. Data path

TOPICAL TEST:
Objective questions
1. Arrange the following ICT tools in the order of invention from the earliest to the latest: cell
phone, internet, satellite and radio A. cell phone b. internet, satellite, cell phone, radio C. radio,
satellite, internet, cell phone D. radio, cell phone, satellite, Internet. [2018/2]
2. Internet banking entails A. applying computer networks in banking operations B. applying
computers to automate banking operations C. generating tokens and one-time passwords for
online payments. D. using ATM for banking operations [2020/7]
3. One application of ICT in education is A. Automated Teller machine B. electronic fund transfer
C. magnetic ink character recognition D. optical mark Reader [2022/6]
4. An application of ICT which allows a person to participate in a meeting from a remote location
is called A. blogging B. broadcasting C. podcasting D. tele presence. [2022/7]
5. What is the primary purpose of the internet? a) Online gaming b) Social media c) Global
communication and information sharing d) E-commerce
6. Which technology enables devices to connect to the internet wirelessly? a) LAN b) Bluetooth c)
Ethernet d) Wi-Fi
7. What does URL stand for? a) Universal Resource Locator b) Uniform Resource Locator c)
Universal Reference Locator d) Unified Resource Locator
8. Which internet service allows users to send and receive emails? a) FTP b) HTTP c) SMTP d)
VoIP
9. What is the primary benefit of cloud storage services? a) Faster internet speeds b) Enhanced
gaming experience c) Secure online shopping d) Storing and accessing data from anywhere
10. Which term refers to the action of browsing the internet without revealing one's identity? a)
Hyperlinking b) Surfing c) Spamming d) Phishing
11. What does the acronym "VoIP" stand for? a) Virtual Online Internet Protocol b) Voice over
Internet Protocol c) Video over Internet Protocol d) Visual Output in Internet Protocol
12. How does the internet contribute to global communication? a) By restricting access to specific
countries b) By enabling real-time audio and video communication c) By limiting the number of
users d) By requiring physical connection to servers
13. Which term refers to the practice of making online purchases? a) E-commerce b) E-learning c)
E-government d) E-waste

www.deeperlifehighschool.org …leadership with distinction


14. What is one of the benefits of the internet for education? a) Limited access to information
sources b) Reduced need for traditional classrooms c) Decreased availability of online courses
d) Increased isolation among students.

Fill in the gap Questions


1. The ____________ is a global network that connects millions of devices worldwide.
2. The internet enables users to access and share ____________ resources such as websites,
videos, and documents.
3. Wi-Fi allows devices to connect to the internet ____________ using wireless signals.
4. The acronym ____________ stands for Uniform Resource Locator, which is used to identify
resources on the web.
5. Cloud storage services provide the benefit of ____________, allowing users to access their
files from anywhere with an internet connection.
6. ____________ over Internet Protocol (VoIP) allows users to make voice and video calls over
the internet.
7. Online shopping, also known as ____________, offers the convenience of purchasing goods
and services from the comfort of one's home.
8. One of the benefits of the internet is its ability to provide ____________ information on a wide
range of topics.
9. E-learning platforms offer educational courses and materials that can be accessed
____________ through the internet.
10. The internet has revolutionized ____________ by enabling communication and collaboration
among individuals and businesses worldwide.

Essay
1. Differentiate between: (i) Internet and intranet; (ii) LAN and WAN. (c) List four devices used in
a LAN environment. [2022/1]
2. What is the internet? Explain the different components of the internet.
3. What are the benefits of the internet?
4. What are the challenges of the internet?
5. How has the internet changed the way we live?
6. What are the ethical issues surrounding the internet?

GLOSSARY OF TERMS / KEY WORDS / VOCABULARY:


1. Cookie: A small piece of data stored on a user's device by a website to track user activity and
preferences.
2. VPN (Virtual Private Network): A secure connection that allows users to access a private
network over a public network like the internet.
3. Digital Footprint: The trace of online activities and interactions that a person leaves behind on
the internet.
4. VoIP (Voice over Internet Protocol): Technology that enables voice communication and
telephone calls over the internet.

PUZZLES / BRAIN TEASER:Crossword Puzzle: Internet Terms


INTERNET

www.deeperlifehighschool.org …leadership with distinction


CB
OA
OC
KEK
II
EMAIL
BT
RT
OWSER

INSPIRATIONAL QUOTES:Education cost money, but then so does ignorance.


-Clause Moser

WEEK: 6

TOPIC:INTERNET II

LESSON OBJECTIVES: By the end of the lesson, students should be able to:
(a) discuss internet security
(b) discuss the abuse of the internet
ENTRY BEHAVIOUR: The students already had practical on the use of internet and had browser
before using the interne to search for information on the internet.

SUB-TOPIC 1:
CONTENT:Internet Security
Is a branch of computer security specifically related to the Internet, often involving browser
security but also network security on a more general level as it applies to other applications
or operating systems on a whole.

Its objective is to establish rules and measures to use against attack over the internet. The internet
represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud,
such as phishing. Different methods have been used to protect the transfer of data, including
encryption.

Other methods of Internet Security are


I. Use of cryptographic methods and protocols that have been developed for securing
communication over the internet.
II. IPSec Protocol- This provides security and authentication at the IP layer by using
cryptography to protect the content.

Types of Internet Security

www.deeperlifehighschool.org …leadership with distinction


i. Network Layer Security: TCP/IP can be made secured with the aid of cryptographic methods
and protocol that have been put in place to protect communication over the internet.
ii. IPSec Protocol: This protocol is designed to protect communication in a secure manner
using TCP/IP, and it provides security and authentication at the IP layer by transforming data
using encryption.
iii. Security token:Some online sites offer customers the ability to use a six-digit code which
randomly changes every 30–60 seconds on a security token. The keys on the security token
have built in mathematical computations and manipulate numbers based on the current time
built into the device. This means that every thirty seconds there is only a certain array of
numbers possible which would be correct to validate access to the online account.
iv. Firewall:A computer firewall controls access between networks. It generally consists of
gateways and filters which vary from one firewall to another. Firewalls also screen network
traffic and are able to block traffic that is dangerous. Firewalls act as the intermediate server
between SMTP and Hypertext Transfer Protocol (HTTP) connections
v. Antivirus: Antivirus software and Internet security programs can protect a programmable
device from attack by detecting and eliminating viruses; Antivirus software was mainly
shareware in the early years of the Internet, but there are now several free security
applications on the Internet to choose from for all platforms.

PRACTICE EXERCISE:
1. ________ is a branch of computer security specifically related to the Internet.
2. ______ software and _______ security programs can protect a programmable device from
attack by detecting and eliminating viruses.
3. The _________ represents an insecure channel for exchanging information.
4. ________ can be made secured with the aid of cryptographic methods and protocol.
5. A computer __________ controls access between networks.

SUB-TOPIC 2:
CONTENT:ABUSES OF THE INTERNET
In spite of its benefits, some people use the internet for negative things. Abuses of the internet
include:
1. Fraud: Some people to try to deceive and collect money from them. This is a serious crime.
2. Pornography: Many websites that look innocent have been used to publish pornographic
materials several people have become addicted to watching pornography on the internet.
3. Spam: Spam is e-mail that one has not requested for. Spam is becoming a problem on the
internet because many mailboxes are filled up with a large number of unrequested e-mails
daily.
E-mail users have to take time to sort through spam to find the genuine e-mail; this process
takes time and money. Most ISPs provide software that try to separate genuine e-mail from
Spam. Such software’s are called Spam filters.
4. Addiction: some people get addicted to browsing all day. This causes their school and other
work to suffer.
5. Hacking: Unauthorized access to another computer which can be successful or unsuccessful.
6. Sniffing: Capturing information that was intended for other machines.
7. Spoofing attack: Creating half open connection structures on the victim’s system making it
impossible for the victim to accept any new incoming connection until the file expires.

www.deeperlifehighschool.org …leadership with distinction


8. False e-mail address: Used with the intention of masking identity.
9. Mail bomb: Sending of multiple e-mail messages to an address with the sole intent of
overloading the recipients’ mailbox.
10. TCP SYN Flooding attack: Sending multiple TCP SYN packets to another computer with the
intention of exhausting the targets resources.

PRACTICE EXERCISE:
1. _________ is sending of multiple e-mail messages to an address with the sole intent of
overloading the recipients’ mailbox.
2. ______ is unauthorized access to another computer which can be successful or unsuccessful.
3. Some people get ___________ to browsing all day.
4. __________ is capturing information that was intended for other machines.
5. _________ is e-mail that one has not requested for

TOPICAL TEST:
Objective Questions
1. What is the primary goal of internet security? a) Increasing online advertisements b) Ensuring
fast internet speeds c) Protecting digital assets and data d) Maximizing social media
engagement
2. Which term refers to unauthorized access and use of computer systems or networks? a)
Phishing b) Hacking c) Streaming d) Cloud computing
3. What is the purpose of a firewall in internet security? a) Blocking internet access completely b)
Filtering and controlling network traffic c) Increasing download speeds d) Improving video
quality
4. Which type of attack involves tricking individuals into revealing sensitive information via
deceptive emails? a) Hacking b) Malware c) Phishing d) Denial of Service
5. What is a common practice to enhance internet security when creating passwords? a) Using
easily guessable words b) Sharing passwords with friends c) Reusing the same password for
multiple accounts d) Creating complex, unique passwords
6. What does "HTTPS" in a website URL indicate? a) Highly Extensive Text Protocol System b)
Hyperlink Text Encoding and Processing c) Hypertext Transfer Protocol Secure d) Hyperlink
Technical Encryption System
7. Which internet abuse involves sending unsolicited emails for commercial or fraudulent
purposes? a) Phishing b) Hacking c) Malware d) Spamming
8. What is the term for software designed to disrupt or damage computer systems? a) Malware b)
Firewall c) Encryption d) VPN
9. What should users be cautious of to prevent identity theft and fraud online? a) Sharing
personal information freely b) Using the same password for all accounts c) Ignoring software
updates d) Downloading files from unknown sources

Fill in the gap questions:


1. ____________ is the practice of protecting computer systems and data from various online
threats.
2. ____________ is a type of cyber attack in which malicious software is used to gain
unauthorized access to computer systems.

www.deeperlifehighschool.org …leadership with distinction


3. A ____________ is a security barrier that monitors and controls incoming and outgoing
network traffic.
4. ____________ is the act of tricking individuals into revealing sensitive information by posing as
a legitimate entity.
5. To enhance internet security, users are advised to create ____________ passwords that
include a mix of letters, numbers, and symbols.
6. The "S" in "HTTPS" stands for ____________, indicating that the connection to a website is
encrypted and secure.
7. ____________ involves sending unsolicited and often irrelevant emails to a large number of
recipients for commercial or fraudulent purposes.
8. ____________ software is designed to disrupt, damage, or gain unauthorized access to
computer systems.
9. One should avoid ____________ by not sharing personal information or engaging in risky
online behaviors.
10. ____________ software helps protect computers from viruses, malware, and other malicious
software.

GLOSSARY OF TERMS / KEY WORDS / VOCABULARY:


1. Phishing: An attempt to deceive individuals into revealing personal or sensitive information by
posing as a legitimate entity.
2. Spamming: Sending unsolicited and often irrelevant emails to a large number of recipients,
often for commercial or fraudulent purposes.
3. Malware: Malicious software designed to harm, disrupt, or gain unauthorized access to
computer systems and data.
4. Cyberbullying: Harassing, intimidating, or threatening individuals online, often through social
media or messaging platforms.
5. Identity Theft: Unauthorized access and use of another person's personal information, often for
financial gain or fraudulent activities.
6. Patch: A software update released to fix security vulnerabilities and improve system
performance.
7. Two-Factor Authentication (2FA): A security method that requires users to provide two different
types of identification before accessing an account.
8. Firewall: A security device or software that monitors and filters network traffic to protect against
unauthorized access and attacks.

PUZZLES / BRAIN TEASER:


(Each topic should be enriched with worked examples, images, past WAEC SSCE/NECO SSCE /
BECE JSCE questions.)

INSPIRATIONAL QUOTES:“Tell me and I’ll forget; show me and I may remember; involve me and I’ll
understand.”
-Chinese Proverb

www.deeperlifehighschool.org …leadership with distinction


WEEK: 8

TOPIC:WEB DESIGN PACKAGES

LESSON OBJECTIVES: By end of the lesson, students should be able to:


(a) state the meaning of web design packages
(b)state the uses of web design packages

ENTRY BEHAVIOUR: The students have already done HTLM and CSS in their previous
classes.

SUB-TOPIC 1:

CONTENT:Meaning of Web Design Package


A web Design package is a computer program used to create, edit and update web pages and the
websites. The purpose of such a program is to make it easier for the designer to work with page and
site elements through a graphical user interface that displays the desired result, typically in a
WYSIWYG (What you see is what you get) manner, while removing the need for the designer to have
to work with the actual code that produces the result (which includes HTML, CSS, JavaScript, and
others).

Examples of Web Design Packages are;


Adobe Dreamweaver,
Net Objects Fusion (which are commercial) ,
Note pad++
Amaya,
WebPlus X4
Antenna Web Design Studio 3
iweb
Website Pro 4
Microsoft FrontPage
Photon FX Easy

PRACTICE EXERCISE:
1. A _________ package is a computer program used to create, edit and update web pages and
the websites.
2. A web Design package is a _________ used to create, edit and update web pages and the
websites.
3. WYSIWYG stands for __________________
4. Photon FX Easy is an example of __________________
5. Programming languages for the webs are _________, _______________ and
___________________
Essay
1. Define web design package

www.deeperlifehighschool.org …leadership with distinction


2. Mention three examples of web design packages.
3. Discuss the concept of WYSIWYG

TOPICAL TEST: (10 multiple Choice Questions, 10 fill in the gap questions and 5 essay question)
1. Planning and creating websites are stages in A. web analysis B. web maintenance C. web
design D. publishing [2015/23]
2. Which of these packages could be used by a data processing teacher to design a website for
his school? A. Front Page. B. PageMaker. C. PowerPoint. D. Word Perfect. [2016/25]
3. 3. Planning and creating of websites is called web A. analysis. B. design. C. maintenance. D.
publishing. [2017/25]
4. One example of web design package is A. MS frontpage B. MS outlook C. peachtree D. SPSS
[2022/25]
5. What is the main purpose of a web design package? a) To provide internet connectivity b) To
design graphics for video games c) To create and structure websites d) To manage social
media accounts
6. Which of the following is NOT typically included in a web design package? a) Domain
registration b) Web hosting c) Software development d) Graphic design
7. What is the significance of responsive design in a web design package? a) It ensures that the
website is compatible with all browsers b) It makes the website visually appealing c) It
optimizes the website for different devices and screen sizes d) It adds animations and
transitions to the website
8. What is the role of a Content Management System (CMS) in a web design package? a) It
provides internet security b) It manages website content and updates c) It generates domain
names d) It designs graphics and logos
9. Which element of a web design package focuses on the overall look and feel of the website?
a) Domain registration b) Web hosting c) User interface (UI) design d) Backend development
10. Which programming languages are commonly used for frontend development in web design
packages? a) Java and C++ b) Python and Ruby c) HTML, CSS, and JavaScript d) SQL and
PHP

Fill in the gap Questions


1. A ____________ is a collection of services and tools that facilitate the creation and
development of websites.
2. In a web design package, ____________ refers to the process of arranging visual elements
and content on a webpage.
3. ____________ ensures that a website looks and functions well on various devices and screen
sizes.
4. A ____________ is a software application that enables users to manage and update website
content without technical knowledge.
5. The process of ____________ involves planning the website's structure and layout before
actual development.
6. ____________ languages such as HTML, CSS, and JavaScript are essential for creating the
frontend of a website.
7. ____________ is the process of registering and acquiring a unique web address for a website.
8. ____________ involves optimizing a website's content and structure to improve its visibility in
search engine results.

www.deeperlifehighschool.org …leadership with distinction


9. ____________ development focuses on creating the functional components and databases
that power a website.
10. A ____________ is a type of hosting service that stores and serves the files, images, and
content of a website on the internet.

GLOSSARY OF TERMS / KEY WORDS / VOCABULARY:


1. Domain Registration: The process of securing a unique web address (domain name) for a
website on the internet.
2. Web Hosting: The service of storing website files, data, and content on a server that makes the
site accessible over the internet.
3. Frontend Development: The process of creating the visible and interactive components of a
website that users interact with.
4. Backend Development: The process of building the server-side components of a website that
handle data storage, processing, and server communication.
5. Responsive Design: Designing websites to adapt and display properly on various devices and
screen sizes, enhancing user experience.

PUZZLES / BRAIN TEASER:

INSPIRATIONAL QUOTES:Education makes a people easy to lead but difficult to drive: easy to
govern, but impossible to enslave.”
-Peter Brougham

WEEK: 9

TOPIC:WEB DESIGN PACKAGES

LESSON OBJECTIVES: By the end of the lesson, students should be able to:
(a) discuss each components of web design packages
(b) state some examples of web design packages
ENTRY BEHAVIOUR:The students have already done HTLM and CSS in their previous classes.

SUB-TOPIC 1: Component of Web Design Package


CONTENT
i. Hit Counter: this gives details about the number of a visitor to a website through a graphic
counter. If you want to know the total number of a visitor who visited a particular website, then
have a look at the Hit Counter.
ii. Advertising: The advertising banner will produce an ad banner rotator with images you prefer.
You can also spell out transitions within graphics.
iii. Animated button: it uses a java applet to generate button that responds to mouse – over
movement. You can make use of these buttons the same way you use hyperlinks.

www.deeperlifehighschool.org …leadership with distinction


iv. Table of Content: The table of content will repeatedly create a page with hyperlink to each
page on your site. The table of content is set up in a ‘tree’ format.
v. Marquees: A marquee is a text that scrolls across the screen. The Marquee is used when
you want to draw attention to a certain point.
vi. Include Page: this will include a page into another page. They are used to include
content of a page into another page. When the include page is customized, the page with the
include code is automatically updated.
vii. Scheduled Pictures: This component can be used when you have a limited time offer or you
want to add variety to your page.
viii. Search Form: The search form component lets one have an easy way to allow ones
visitors to search ones site. This component is used to create a simple search engine for ones
site.

PRACTICE EXERCISE:
1. ___________ can be used when you have a limited time offer or you want to add variety to
your page.
2. __________ uses a java applet to generate button that responds to mouse.
3. A __________ is a text that scrolls across the screen.
4. The advertising ________ will produce an ad banner rotator with images you prefer.
5. _________________ will include a page into another page.

SUB-TOPIC 2: Uses of Web Design Package

CONTENT
A web design package is used to create web pages in the Hyper text markup Language (HTML)
format to be rendered by a client application called a web browser.
Some of the uses of web design package include;
The split view option of a web design package allow users to code in Code view and preview in
Design view without the hassle of switching from design and code view tab.
1. Dynamic Web Templates (DWT) are included which allow users to create a single
template that could be used across multiple pages and even the whole web sites.
2. Interactive Buttons give users a new easy way to create web graphics for navigation and
links eliminating the need for a complicated image-editing package such as Adobe Photoshop.
3. Accessibility Checker gives the user the ability to check if their code is standard compliant and
that their web site is easily accessible for people with disabilities.
4. Intellisense which is a form of auto completion is a key feature that assist the user while
typing in code view.
5. Code Snippets gives users the advantage to create snippets of their commonly used pieces of
code allowing them to store it for easy access when it is next needed.

PRACTICE EXERCISE:
1. ________ is a form of auto completion key feature that assist the user while typing in code
view.
2. A web design package is used to create web pages in the _______ markup Language (HTML)
format.
3. HTML stands for _____________

www.deeperlifehighschool.org …leadership with distinction


4. DWT stands for ___________________
5. Code Snippets gives users the advantage to create _______ of their commonly used pieces of
code allowing them to store it for easy access

TOPICAL TEST:
Objective Questions
1. 4. A reference to another page or resource on a website is done by A. FTP B. Hyperlinks. C.
SMTP. C. Web page. [2018/25]
2. 5. One example of web design package is A. MS FrontPage. B. MS Outlook. C. Peachtree. D.
SPSS. [2019/25]
3. 6. The following programming tools are employed by a web developer except A. COBOL B.
CSS. C. HTML. D. PHP [2020/25]
4. 7. Web design packages include the following except A. Macromedia Dreamweaver. B. iWeb
C. Front Page D. Adobe PageMaker. [2021/25]
5. What is the main purpose of antivirus software? a) Enhancing internet speed b) Blocking
access to websites c) Protecting against and removing malicious software d) Sending
promotional offers to users.
6. What is the purpose of wireframing in a web design package? a) To host the website on the
internet b) To design logos and banners c) To create a blueprint or visual representation of the
website's structure d) To manage online payments
7. Which factor is essential for ensuring a user-friendly experience in a web design package? a)
Overloading the website with animations b) Using complex navigation menus c) Incorporating
clear and intuitive navigation d) Using small, unreadable fonts
8. How does Search Engine Optimization (SEO) contribute to a web design package? a) It helps
choose the right domain name b) It ensures a secure connection for the website c) It enhances
the website's visibility in search engine results d) It designs user interfaces
9. Which aspect of a web design package involves registering a unique web address for the
website? a) Web hosting b) Domain registration c) Backend development d) Graphic design
10. ……………… is included which allow users to create a single template that could be used
across multiple pages and even the whole web site
(a) DWT(b) Access (c) pseudo codes (d) Excel

Fill in the gap questions


1. __________ Development: This involves creating the visible and interactive parts of a website
that users directly interact with, including layout, images, and user interface elements.
2. Content Management __________ (CMS): A software platform that enables easy creation,
editing, and management of website content without requiring coding skills.
3. Search Engine __________ (SEO): The practice of optimizing a website's content and
structure to improve its visibility in search engine results and attract organic traffic.
4. __________ Design: This involves the creation of visual elements such as logos, images,
icons, and banners to enhance the overall aesthetics of the website.
5. Responsive __________: This design approach ensures that a website's layout and content
adapt seamlessly to different screen sizes and devices, providing an optimal user experience.
6. ___________ can be used when you have a limited time offer or you want to add variety to
your page.
7. __________ uses a java applet to generate button that responds to mouse.

www.deeperlifehighschool.org …leadership with distinction


8. A __________ is a text that scrolls across the screen.
9. Photon FX Easy is an example of __________________
10. Programming languages for the webs are _________, _______________ and
___________________

GLOSSARY OF TERMS / KEY WORDS / VOCABULARY:


1. Content Management System (CMS): A software platform that enables easy creation, editing,
and management of website content without coding knowledge.
2. User Interface (UI) Design: Designing the visual elements and layout of a website to ensure a
user-friendly and engaging experience.
3. Search Engine Optimization (SEO): The practice of optimizing a website's content and
structure to improve its visibility in search engine results.

PUZZLES / BRAIN TEASER:

INSPIRATIONAL QUOTES:“You educate a man; you educate a man. You educate a woman; you
educate a generation.”
-Brigham Young

www.deeperlifehighschool.org …leadership with distinction

You might also like