Ss 2 Data Processing Second Term E-Note
Ss 2 Data Processing Second Term E-Note
DATA PROCESSING
CLASS:
S.S. 2
TERM: Second
11 EXAMINATION
12
13
TOPIC:FILE ORGANIZATION
LESSON OBJECTIVES: By the end of the lesson, students should be able to:
(a) state the types of file organization
(b) comparethethree file organization
ENTRY BEHAVIOUR: The students already know how to create file in a database and store
data in such file.
SUB-TOPIC 1:
CONTENT:FILE ORGANIZATION
File organization is a way of organizing the data or records in a file. It does not refer to how files are
organized in folders, but how the contents of a file are added and accessed.
Is also a systematical way of arranging record in a file that is stored on a disk. You can access a file
of record in different ways and tailor it in a variety of ways.
PRACTICE EXERCISE:
1. File organization does not refer to how files are organized in __________
2. But how the contents of a ________ are added and __________.
3. ___________ is a systematical way of arranging record in a file that is stored on a disk.
4. You can access a ______ of _________ in different ways and tailor it in a variety of ways.
5. File organization is a __________ way of arranging record _______ that is stored on a disk
SUB-TOPIC 2:
PRACTICE EXERCISE:
1. ISAM stands for _________________
2. In a hash file, ______ are not stored sequentially in a file.
3. Clustered file organization is not considered good for large ____________.
4. In a sequential file organization, records are organized in the _________ by which they were
added.
5. An __________, sometimes called a heap file, is the simplest type of file organization.
SUB-TOPIC 3:
CONTENT:BASIC OPERATION
Scan: Fetch all records in the file. The pages in the file must be fetched from the disk into the buffer
pool. There is also a CPU overhead per record for locating the record on the page.
Search with range selection:Fetch all records that satisfy a range selection. For example, find all
students records with name alphabetically after smith.
Insert:Insert a given record into the file. We must identify the page in the file into which the new
record must be inserted, fetch that page from the disk, modify it to include the new record and then
write back the modified page.
Delete:Delete a record that is specified using its record id. We must identify the page in the file into
which the new record must be inserted, fetch that page from the disk, modify and then write it back.
Locate: Every file has a file pointer, which tells the current position where the data is to be read or
written.
Write: User can select to open a file in write mode, the file enables them to edit its contents. It can be
deletion, insertion or modification.
Read: By default, when file are opened in read mode, the file pointer points to the beginning of the
file.
PRACTICE EXERCISE:
1. Pages that contain qualifying records must be ________ from the disk.
2. Fetch all records that satisfy a __________ selection.
3. Every file has a file _________, which tells the current position where the data is to be read or
written.
4. User can select to open a file in __________mode, the file enables them to _______ its
contents.
5. A __________ file does not utilize space quite as well as a sorted file, but _____ and _____
are fast, and equality selections are very fast.
TOPICAL TEST:
Objective Question
1. The type of file organization in a DVD-ROM is A. direct access. B. sequential C. serial D.
hierarchical. [2015/33]
2. Computers store data as A. folders. B. files. C. documents D. directories [2016/37]
WEEK:2
TOPIC:PRESENTATION PACKAGES
LESSON OBJECTIVES: By the end of the lesson, students should be able to:
(a) state the meaning of Presentation package
(b) state the uses of presentation package
(c)Practical
ENTRY BEHAVIOUR: This students already know how to use Microsoft PowerPoint to view
lesson note in school.
SUB-TOPIC 1:
PRACTICE EXERCISE:
1. A presentation package can also be defined as _____________documents or animations for
presentation.
2. Presentation package is often called ___________ presentation.
3. A Presentation package is a _________________ that is used to display information usually in
the form of a slide show.
4. ______, ________ and ________ are examples of presentation package.
5. ________ Flash is also an example of presentation package.
SUB-TOPIC 2:
CONTENT:Uses of Presentation Package
Presentation packages are used to display Information usually in the form of a slide show via the
integration of multimedia such as digital video and sounds. Other uses of the internet are;
i. Multimedia lectures
ii. Student reports
iii. Handouts
iv. Multimedia story books
Sub-topic 2
PowerPoint Environment
PowerPoint View
Slide View
This slide view is used to view slides one by one on the screen. In slide view you can insert text,
movie clips, sound, objects like clip art, Auto Shapes and Word Art.
Outline View
In this view you can re-arrange your slides and bullets that you have inserted in your slide. In this
view you can see how your main points flow from slide to slide.
Normal View
This view consists of three pane
- slide pane-to enter and edit text and objects in slides
- Outlines pane-to rearrange the slide
- Notes pane-to insert the information for the speaker or the audience.
Note View
In notes page view, you can type speaker notes to use during your presentation. You can as well
have the hard copy of your notes for reference.
Master View
A company logo or formatting you desired to appear on every slide, notes page or handout can be
done on this view.
Slide show view
This view is used to view the presentation on the screen. A slide show is a full-screen display of
each page in a presentation.
NOTE:
Pls educator, treat all other tools use in PowerPoint.
PRACTICE EXERCISE:
1. _________, ___________ and ___________ are the uses of presentation packages.
2. Presentation packages are used to display Information usually in the form of a _________
3. This slide view is used to view slides ___________ on the screen.
4. ________ is used to view the presentation on the screen.
5. In notes page view, you can type __________ to use during your presentation.
TOPICAL TEST:
Objective Questions:
1. In MS PowerPoint, the action of holding down the left mouse key and moving the mouse
around the slide would A. highlight an item B. drag an item C. select an item D. move ac item.
[2015/27]
Essay
1. (a)(i) define application package (ii) state one use each of any four application packages (b) list
two benefits of a presentation package. (c) outline three guidelines for creating good MS power point
presentation
2. Mr. Aneke is billed to address a large audience in an auditorium. (I) what computer application
package is suitable to prepare and deliver his speech? (II) state the output device that can be used to
transmit Mr. Anekes’ speech note from his computer to a large screen in the auditorium [2018/3]
3. (a)(i) what is a presentation package? (ii)give two examples of presentation package. (iii)state
three features of a presentation package. [2022/3]
WEEK:3
TOPIC:COMPUTER NETWORKS
LESSON OBJECTIVES:By the end of the lesson, students should be able to:
(a) state the meaning of network
(b) discuss the types of data networks
ENTRY BEHAVIOUR: Students already know how to connect to the internet to browse which is
a network.
SUB-TOPIC 1:
CONTENT:Meaning of Networking
Networking is a system of connecting two or more computers together in order to share resources or
transfer information. The computers on a network may be connected through cables, telephone lines,
wireless links or satellite. Every computer connected to the network is said to be on the network and
should have a network interface card (NIC).
Networking can also be defined as a collection of computers and devices interconnected by
communications channels that facilitate communication among users and allow users to share
resources.
Categories of Networking
i. Local Area Network (LAN)
ii. Wide Area Networks (WAN)
iii. Metropolitan Area Network (MAN)
iv. Personal Area Network
v. Wireless Local Area Network
Local Area Network (LAN)
This is one of the original categories of network, and one of the simplest. LAN networks connect
computers together over relatively small distances, such as within a single building or within a small
group of buildings.
TOPICAL TEST:
Objective Questions:
1. Which of the following are the basic components of a computer network? I. A minimum of two
computers II. Printers Ill. Network interface card A. I and II only. B. I and Ill only. C. II and III only D. I,
II and III. [2015/13]
2. A server is a computer that provides services to other computers called A. clients. B. peers. C.
routers. D. switches. [2016/13]
3. The rules for exchanging data on a network are known as A. transmission rules. B. transfer rules.
C. protocols. D. configurations. [2016/14].
4. The basic criterion for classifying a network is A. psychological consideration. B. geographical
scope. C. equipment availability D. economic reason. (2017/13]
5. The following are advantages of networking except A. spamming B. sharing of resources. C.
communication. D. backup. [2018/13]
6. Which of the following devices would not transmit signals from one point to another? A. one line B.
Modem C. Fibre optics D. Coaxial cable. /2018/14]
7. Which of these technologies allows wireless connectivity in a Personal Area Network? A.
Bandwidth B. Bluetooth C. Broadband D. Satellite [2019/13].
8. The main function of the device in the part labeled II in the diagram below is?
Certainly! Here are 10 "fill in the gap" questions related to different types of networking such as LAN,
MAN, WAN, and PAN:
1. A ____________ is a network that covers a small geographical area, typically within a single
building or campus.
2. ____________ stands for Local Area Network, which is used to connect devices within a
limited area.
3. A ____________ is a network that spans a larger geographical area than a LAN but is still
within a city or metropolitan area.
4. ____________ stands for Metropolitan Area Network, providing connectivity over a city or
large campus.
5. A ____________ is a network that covers a vast geographical area, often spanning multiple
cities or even countries.
6. ____________ stands for Wide Area Network, connecting networks across great distances.
7. ____________ is a type of network used for communication between devices in close
proximity, such as smartphones and laptops.
8. A ____________ is a personal network used for connecting devices like smartphones, tablets,
and laptops in close proximity.
9. In a LAN, devices are usually connected using ____________ cables or wireless technologies.
10. A MAN typically covers a larger area than a LAN but is smaller in scope than a ____________.
Essay
1. (a) A general hospital decides to computerize the records in all its departments. (i). List two
advantages of networking all the computers in the various departments of the hospital. (b). State the
type of network that can be implemented in such a hospital. [2014/4]
2. Write the full meaning of WiF1 [2016/4]
3. Mr. Okafor has a company that specializes in the production of beverages with headquarters in
Abuja. He needs to monitor the sales and transactions in the company’s branches across Nigeria as
INSPIRATIONAL QUOTES:“Education makes a people easy to lead but difficult to drive: easy to
govern, but impossible to enslave.”
-Peter Brougham
WEEK: 4
TOPIC:COMPUTER NETWORKS
LESSON OBJECTIVES:By the end of the lesson, students should be able to:
c)discus network topology
d)explain thetypes of networking
ENTRY BEHAVIOUR: The students already been taught networking and types of networking.
SUB-TOPIC 1:
CONTENT:Network Topology
Physical topology is the mapping out of the various interconnections that are visible and which
is the physical design of that network.
Logical topology is the mind mapping of such intercommunication diagrams that you make while
identifying a network. It shows how the data flows within a functioning network.
PRACTICE EXERCISE:
1. Network topology is of _________categories.
2. __________ is the mapping out of the various interconnections that are visible.
3. ____________ shows how the data flows within a functioning network.
4. ____________ is the arrangement of various network elements.
5. This linking of various elements is known as _________ topology.
Essay
1. Discuss the concept of network topology.
2. What is physical topology?
3. What is logical topology?
SUB-TOPIC 2:
PRACTICE EXERCISE:
1. Bus topology is a network type in which every computer and network device is connected to
_________.
2. It is called ring topology because it forms a ______ as each computer.
3. The transmission is unidirectional, but it can be made bidirectional by having 2 connections
between each Network Node, it is called ___________.
4. Ring network topology is that in which all the terminals are arranged in a ____________
5. Data is transferred in a _________ manner that is bit by bit.
Essay
1. What is a Bus topology?
2. Discuss the advantages of bus topology over a ring topology.
3. At what point will a network engineer use bus topology over ring topology.
SUB-TOPIC 3:
CONTENT:STAR Topology
In this type of topology all the computers are connected to a single hub through a cable. This hub is
the central node and all others nodes are connected to the central node. OR
Star topology is the arrangement of the computers in such a way that all the terminals or work
stations are connected to the main central hub. The terminals are referred to as the clients and the
main central hub is referred to as the switch.
Features of Star Topology
1. Every node has its own dedicated connection to the hub.
2. Hub acts as a repeater for data flow.
3. Can be used with twisted pair, Optical Fibre or coaxial cable.
Advantages of Star Topology
1. Fast performance with few nodes and low network traffic.
2. Hub can be upgraded easily.
3. Easy to troubleshoot.
4. Easy to setup and modify.
5. Only that node is affected which has failed, rest of the nodes can work smoothly.
Disadvantages of Star Topology
1. Cost of installation is high.
2. Expensive to use.
3. If the hub fails then the whole network is stopped because all the nodes depend on the hub.
4. Performance is based on the hub that is it depends on its capacity
In this kind of topology all the devices are connected to each other and that the data transferred from
one system is sent and received by all the other systems. In this way, the data is transferred in not a
one way route but in a multiple access pathways and that all the workstations are functioning in data
receiving and data sending at the same time.
Intranet
This is a network that is not available to the world outside of the intranet.
PRACTICE EXERCISE:
1. In this type of topology all the computers are connected to a __________ hub through a
__________.
2. In __________ topology all the devices are connected to each other.
3. __________has a root node and all other nodes are connected to it forming a hierarchy.
4. ________ is used in Wide Area Network.
5. A number of ________ are used for Ring topology with large number of nodes
Essay
1. State the full meaning of the following:
i. LAN ii. IP iii. WAN iv. HTTP
2. Briefly explain the following terms: (i) Protocols (ii) Extranet (iii) Intranet
TOPICAL TEST:
Objective Questions
1. What does network topology refer to? a) The physical arrangement of devices in a network. b)
The speed of data transmission in a network. c) The number of devices in a network. d) The
type of data being transmitted in a network.
2. In which network topology do all devices connect to a central hub or switch? a) Bus b) Ring c)
Star d) Mesh
3. Which topology offers high fault tolerance due to redundant connections? a) Bus b) Ring c)
Star d) Mesh
4. In a bus topology, what happens if one device fails? a) Only the failed device is affected. b) All
devices after the failed device are affected. c) All devices are affected. d) None of the devices
are affected.
5. Which topology forms a closed loop where each device is connected to exactly two other
devices? a) Bus b) Ring c) Star d) Mesh
6. Which topology requires the least amount of cabling? a) Bus b) Ring c) Star d) Mesh
7. Which topology is commonly used in WANs, such as the internet? a) Bus b) Ring c) Star d)
Mesh
8. In a star topology, what happens if the central hub or switch fails? a) Only the central hub or
switch is affected. b) All devices are affected. c) Only the devices directly connected to the hub
are affected. d) None of the devices are affected.
9. Which topology provides the highest level of redundancy and reliability? a) Bus b) Ring c) Star
d) Mesh
10. Which topology is most commonly used in Ethernet LANs? a) Bus b) Ring c) Star d) Mesh
11. Which topology is difficult to set up and maintain due to the high number of connections? a)
Bus b) Ring c) Star d) Mesh
12. Which topology offers better security as data flows in only one direction? a) Bus b) Ring c) Star
d) Mesh
13. Which topology offers easy fault detection and isolation due to its linear structure? a) Bus b)
Ring c) Star d) Mesh
INSPIRATIONAL QUOTES:“Whatever the cost of our libraries, the price is cheap compared to that of
an ignorant nation.”
-Walter Cronkite
TOPIC:INTERNET I
LESSON OBJECTIVES: By the end of this lesson, students should be able to:
(a) defineof internet
(b) Internet browsers
(c)Benefits of internet
ENTRY BEHAVIOUR:
SUB-TOPIC 1:
CONTENT:Definition of Internet
The Internet is a global system of interconnected computer networks that use the Standard Internet
Protocol Suite (TCP/IP) to serve billions of users worldwide.
It is a network of networks that consists of millions of private, public, academic, business and
government networks of local to global scope that are linked by a broad array of electronic and optical
networking technologies. Simply put, the Internet is a collection of computers, all linked together, to
share information worldwide. It is the largest computer network in the world.
PRACTICE EXERCISE:
1. The Internet is a _______ system of interconnected computer networks.
2. TCP/IP stands for ________________
3. _________ is the largest computer network in the world.
4. Simply put, the Internet is a ________ of computers, all linked together, to share information
_________.
5. ______ is a network of _______ that consists of millions of private, public, academic, business
and government networks.
SUB-TOPIC 2:
Some popular browsers are: Internet Explorer, Opera, Safari, Chrome, Mozilla, Netscape
navigator.
Internet Services
i. E-mail: this service permits user to send and receive mail from anywhere in the world.
ii. World Wide Web:A network service that gives room for an individual or organization to set up
a special server or site from which other users can obtain special information.
iii. Voice and Video Conferencing: business and institution use the internet for voice and video
conferencing and other forms of communication that enable people to telecommunicate.
iv. E-commerce: this includes advertising, selling, buying, distributing product and providing
customer service on line.
v. File Sharing:this lets individuals swap music, movie, photos and applications, provided they
do not violate copy right protection.
vi. File Transfer Protocol: This was one of the first internet services developed and it allows users
to move files from one computer to another.
vii. Gopher: this offers downloaded files with some content description to make it easier to find the
file needed.
PRACTICE EXERCISE:
1. FTP stands for _______________
2. ___________ offers downloaded files with some content description to make it easier to find
the file needed.
3. ____________ lets individuals swap music, movie, photos and applications, provided they do
not violate copy right protection.
4. ________ this includes advertising, selling, buying, distributing product and providing customer
service on line.
1. Education/E-Learning: With the internet, people can get educational materials and read them
in preparation for examinations, or use them for school assignments. The internet also
enhances electronic learning whereby courses or subjects are taught online using audio and or
visual materials.
2. E-Registration: The internet provides users with facilities for online registration for
examinations like WAEC, NECO and JAMB.
3. Entertainment: The internet kills boredom and enhances leisure by providing its users with
latest entertainment in the form of movies, games, News and many more.
4. Communication: This is one of the key benefits of the internet. The internet provides many
means by which users can communicate with friends, family, colleagues, and lots more
through email, chat messenger, face books, etc.
5. E-Banking: The internet can be used as a tool to carry out transactions with banks irrespective
of user’s location.
6. E-Commerce: Internet is also a tool for E- Commerce. It can allow users to buy and sell their
goods and services online regardless of their location.
Websites
Is a collection of related web pages, including multimedia content, typically identified with a common
domain name, and published on at least one web server.
Webpage
Is a document that is suitable for the World Wide Web and web browsers. A web browser displays
a web page on a monitor or mobile device. The web page is what displays, but the term also refers
to a computer file, usually written in HTML or comparable markup language.
Components of a URL
i. Protocol
ii. Http and FTP
iii. Hostname: Is the name of the computer that contains the information you want to access.
iv. Data path: is the string that specifies the path to the file that you wish to retrieve.
PRACTICE EXERCISE:
1. HTTP stands for _____________________
TOPICAL TEST:
Objective questions
1. Arrange the following ICT tools in the order of invention from the earliest to the latest: cell
phone, internet, satellite and radio A. cell phone b. internet, satellite, cell phone, radio C. radio,
satellite, internet, cell phone D. radio, cell phone, satellite, Internet. [2018/2]
2. Internet banking entails A. applying computer networks in banking operations B. applying
computers to automate banking operations C. generating tokens and one-time passwords for
online payments. D. using ATM for banking operations [2020/7]
3. One application of ICT in education is A. Automated Teller machine B. electronic fund transfer
C. magnetic ink character recognition D. optical mark Reader [2022/6]
4. An application of ICT which allows a person to participate in a meeting from a remote location
is called A. blogging B. broadcasting C. podcasting D. tele presence. [2022/7]
5. What is the primary purpose of the internet? a) Online gaming b) Social media c) Global
communication and information sharing d) E-commerce
6. Which technology enables devices to connect to the internet wirelessly? a) LAN b) Bluetooth c)
Ethernet d) Wi-Fi
7. What does URL stand for? a) Universal Resource Locator b) Uniform Resource Locator c)
Universal Reference Locator d) Unified Resource Locator
8. Which internet service allows users to send and receive emails? a) FTP b) HTTP c) SMTP d)
VoIP
9. What is the primary benefit of cloud storage services? a) Faster internet speeds b) Enhanced
gaming experience c) Secure online shopping d) Storing and accessing data from anywhere
10. Which term refers to the action of browsing the internet without revealing one's identity? a)
Hyperlinking b) Surfing c) Spamming d) Phishing
11. What does the acronym "VoIP" stand for? a) Virtual Online Internet Protocol b) Voice over
Internet Protocol c) Video over Internet Protocol d) Visual Output in Internet Protocol
12. How does the internet contribute to global communication? a) By restricting access to specific
countries b) By enabling real-time audio and video communication c) By limiting the number of
users d) By requiring physical connection to servers
13. Which term refers to the practice of making online purchases? a) E-commerce b) E-learning c)
E-government d) E-waste
Essay
1. Differentiate between: (i) Internet and intranet; (ii) LAN and WAN. (c) List four devices used in
a LAN environment. [2022/1]
2. What is the internet? Explain the different components of the internet.
3. What are the benefits of the internet?
4. What are the challenges of the internet?
5. How has the internet changed the way we live?
6. What are the ethical issues surrounding the internet?
WEEK: 6
TOPIC:INTERNET II
LESSON OBJECTIVES: By the end of the lesson, students should be able to:
(a) discuss internet security
(b) discuss the abuse of the internet
ENTRY BEHAVIOUR: The students already had practical on the use of internet and had browser
before using the interne to search for information on the internet.
SUB-TOPIC 1:
CONTENT:Internet Security
Is a branch of computer security specifically related to the Internet, often involving browser
security but also network security on a more general level as it applies to other applications
or operating systems on a whole.
Its objective is to establish rules and measures to use against attack over the internet. The internet
represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud,
such as phishing. Different methods have been used to protect the transfer of data, including
encryption.
PRACTICE EXERCISE:
1. ________ is a branch of computer security specifically related to the Internet.
2. ______ software and _______ security programs can protect a programmable device from
attack by detecting and eliminating viruses.
3. The _________ represents an insecure channel for exchanging information.
4. ________ can be made secured with the aid of cryptographic methods and protocol.
5. A computer __________ controls access between networks.
SUB-TOPIC 2:
CONTENT:ABUSES OF THE INTERNET
In spite of its benefits, some people use the internet for negative things. Abuses of the internet
include:
1. Fraud: Some people to try to deceive and collect money from them. This is a serious crime.
2. Pornography: Many websites that look innocent have been used to publish pornographic
materials several people have become addicted to watching pornography on the internet.
3. Spam: Spam is e-mail that one has not requested for. Spam is becoming a problem on the
internet because many mailboxes are filled up with a large number of unrequested e-mails
daily.
E-mail users have to take time to sort through spam to find the genuine e-mail; this process
takes time and money. Most ISPs provide software that try to separate genuine e-mail from
Spam. Such software’s are called Spam filters.
4. Addiction: some people get addicted to browsing all day. This causes their school and other
work to suffer.
5. Hacking: Unauthorized access to another computer which can be successful or unsuccessful.
6. Sniffing: Capturing information that was intended for other machines.
7. Spoofing attack: Creating half open connection structures on the victim’s system making it
impossible for the victim to accept any new incoming connection until the file expires.
PRACTICE EXERCISE:
1. _________ is sending of multiple e-mail messages to an address with the sole intent of
overloading the recipients’ mailbox.
2. ______ is unauthorized access to another computer which can be successful or unsuccessful.
3. Some people get ___________ to browsing all day.
4. __________ is capturing information that was intended for other machines.
5. _________ is e-mail that one has not requested for
TOPICAL TEST:
Objective Questions
1. What is the primary goal of internet security? a) Increasing online advertisements b) Ensuring
fast internet speeds c) Protecting digital assets and data d) Maximizing social media
engagement
2. Which term refers to unauthorized access and use of computer systems or networks? a)
Phishing b) Hacking c) Streaming d) Cloud computing
3. What is the purpose of a firewall in internet security? a) Blocking internet access completely b)
Filtering and controlling network traffic c) Increasing download speeds d) Improving video
quality
4. Which type of attack involves tricking individuals into revealing sensitive information via
deceptive emails? a) Hacking b) Malware c) Phishing d) Denial of Service
5. What is a common practice to enhance internet security when creating passwords? a) Using
easily guessable words b) Sharing passwords with friends c) Reusing the same password for
multiple accounts d) Creating complex, unique passwords
6. What does "HTTPS" in a website URL indicate? a) Highly Extensive Text Protocol System b)
Hyperlink Text Encoding and Processing c) Hypertext Transfer Protocol Secure d) Hyperlink
Technical Encryption System
7. Which internet abuse involves sending unsolicited emails for commercial or fraudulent
purposes? a) Phishing b) Hacking c) Malware d) Spamming
8. What is the term for software designed to disrupt or damage computer systems? a) Malware b)
Firewall c) Encryption d) VPN
9. What should users be cautious of to prevent identity theft and fraud online? a) Sharing
personal information freely b) Using the same password for all accounts c) Ignoring software
updates d) Downloading files from unknown sources
INSPIRATIONAL QUOTES:“Tell me and I’ll forget; show me and I may remember; involve me and I’ll
understand.”
-Chinese Proverb
ENTRY BEHAVIOUR: The students have already done HTLM and CSS in their previous
classes.
SUB-TOPIC 1:
PRACTICE EXERCISE:
1. A _________ package is a computer program used to create, edit and update web pages and
the websites.
2. A web Design package is a _________ used to create, edit and update web pages and the
websites.
3. WYSIWYG stands for __________________
4. Photon FX Easy is an example of __________________
5. Programming languages for the webs are _________, _______________ and
___________________
Essay
1. Define web design package
TOPICAL TEST: (10 multiple Choice Questions, 10 fill in the gap questions and 5 essay question)
1. Planning and creating websites are stages in A. web analysis B. web maintenance C. web
design D. publishing [2015/23]
2. Which of these packages could be used by a data processing teacher to design a website for
his school? A. Front Page. B. PageMaker. C. PowerPoint. D. Word Perfect. [2016/25]
3. 3. Planning and creating of websites is called web A. analysis. B. design. C. maintenance. D.
publishing. [2017/25]
4. One example of web design package is A. MS frontpage B. MS outlook C. peachtree D. SPSS
[2022/25]
5. What is the main purpose of a web design package? a) To provide internet connectivity b) To
design graphics for video games c) To create and structure websites d) To manage social
media accounts
6. Which of the following is NOT typically included in a web design package? a) Domain
registration b) Web hosting c) Software development d) Graphic design
7. What is the significance of responsive design in a web design package? a) It ensures that the
website is compatible with all browsers b) It makes the website visually appealing c) It
optimizes the website for different devices and screen sizes d) It adds animations and
transitions to the website
8. What is the role of a Content Management System (CMS) in a web design package? a) It
provides internet security b) It manages website content and updates c) It generates domain
names d) It designs graphics and logos
9. Which element of a web design package focuses on the overall look and feel of the website?
a) Domain registration b) Web hosting c) User interface (UI) design d) Backend development
10. Which programming languages are commonly used for frontend development in web design
packages? a) Java and C++ b) Python and Ruby c) HTML, CSS, and JavaScript d) SQL and
PHP
INSPIRATIONAL QUOTES:Education makes a people easy to lead but difficult to drive: easy to
govern, but impossible to enslave.”
-Peter Brougham
WEEK: 9
LESSON OBJECTIVES: By the end of the lesson, students should be able to:
(a) discuss each components of web design packages
(b) state some examples of web design packages
ENTRY BEHAVIOUR:The students have already done HTLM and CSS in their previous classes.
PRACTICE EXERCISE:
1. ___________ can be used when you have a limited time offer or you want to add variety to
your page.
2. __________ uses a java applet to generate button that responds to mouse.
3. A __________ is a text that scrolls across the screen.
4. The advertising ________ will produce an ad banner rotator with images you prefer.
5. _________________ will include a page into another page.
CONTENT
A web design package is used to create web pages in the Hyper text markup Language (HTML)
format to be rendered by a client application called a web browser.
Some of the uses of web design package include;
The split view option of a web design package allow users to code in Code view and preview in
Design view without the hassle of switching from design and code view tab.
1. Dynamic Web Templates (DWT) are included which allow users to create a single
template that could be used across multiple pages and even the whole web sites.
2. Interactive Buttons give users a new easy way to create web graphics for navigation and
links eliminating the need for a complicated image-editing package such as Adobe Photoshop.
3. Accessibility Checker gives the user the ability to check if their code is standard compliant and
that their web site is easily accessible for people with disabilities.
4. Intellisense which is a form of auto completion is a key feature that assist the user while
typing in code view.
5. Code Snippets gives users the advantage to create snippets of their commonly used pieces of
code allowing them to store it for easy access when it is next needed.
PRACTICE EXERCISE:
1. ________ is a form of auto completion key feature that assist the user while typing in code
view.
2. A web design package is used to create web pages in the _______ markup Language (HTML)
format.
3. HTML stands for _____________
TOPICAL TEST:
Objective Questions
1. 4. A reference to another page or resource on a website is done by A. FTP B. Hyperlinks. C.
SMTP. C. Web page. [2018/25]
2. 5. One example of web design package is A. MS FrontPage. B. MS Outlook. C. Peachtree. D.
SPSS. [2019/25]
3. 6. The following programming tools are employed by a web developer except A. COBOL B.
CSS. C. HTML. D. PHP [2020/25]
4. 7. Web design packages include the following except A. Macromedia Dreamweaver. B. iWeb
C. Front Page D. Adobe PageMaker. [2021/25]
5. What is the main purpose of antivirus software? a) Enhancing internet speed b) Blocking
access to websites c) Protecting against and removing malicious software d) Sending
promotional offers to users.
6. What is the purpose of wireframing in a web design package? a) To host the website on the
internet b) To design logos and banners c) To create a blueprint or visual representation of the
website's structure d) To manage online payments
7. Which factor is essential for ensuring a user-friendly experience in a web design package? a)
Overloading the website with animations b) Using complex navigation menus c) Incorporating
clear and intuitive navigation d) Using small, unreadable fonts
8. How does Search Engine Optimization (SEO) contribute to a web design package? a) It helps
choose the right domain name b) It ensures a secure connection for the website c) It enhances
the website's visibility in search engine results d) It designs user interfaces
9. Which aspect of a web design package involves registering a unique web address for the
website? a) Web hosting b) Domain registration c) Backend development d) Graphic design
10. ……………… is included which allow users to create a single template that could be used
across multiple pages and even the whole web site
(a) DWT(b) Access (c) pseudo codes (d) Excel
INSPIRATIONAL QUOTES:“You educate a man; you educate a man. You educate a woman; you
educate a generation.”
-Brigham Young