Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

Second Term ss 2

DATAPROCESSING
SCHEME OF WORK

WEEK TOPICS

1. Revision of last term’s work.


2. File Organization: (a) Types of file organization (b) Comparison of Three file
organization
THEME: INFORMATION TRANSMISSION
3. Internet I(a) Definition of internet(b) Internet browsers (c)Benefits of internet
4. Internet II : (d) Internet Security (e) Abuse of the Internet
THEME: TOOLS FOR PROCESSING INFORMATION
5. Presentation Packages (a) Meaning of Presentation package (b) Uses of
presentation package
6. Web Design Packages: (a) Meaning of web design packages: (b)Uses of web
design packages
7. MID TERM BREAK
8. Web Design Packages: (c) Components of web design packages (b) Examples of
web design packages
9-10. Revision.
11-13 Examination.

REFERENCES:
1. Data Processing for Senior Secondary School 2, by Adedapo F.O
2. HiiT @ School, Computer Studies for Senior Secondary Education
3. Basic Concepts of Computer Studies for Senior Secondary Schools, by Samuel
Ayokunle and
Adeleke Adekola.

2|Page
WEEK 2

TOPIC: File Organization

CONTENT:
1. Comparison of the Three file organization

SUB-TOPIC 1:

FILE ORGANIZATION
File organization is a way of organizing the data or records in a file. It does not refer to how files are
organized in folders, but how the contents of a file are added and accessed. 

Is also a systematical way of arranging record in a file that is stored on a disk. You can
access a file of record in different ways and tailor it in a variety of ways.

TYPES OF FILE ORGANIZATION


There are a large number of ways records can be organized on disk or tape. The main
methods of file organization used for files are;
· Heap File Organization
· Sequential File Organization
· Hash / Direct File Organization
· Cluster File Organization
· Indexed Sequential Access Methods (ISAM)

Heap File Organization


An unordered file, sometimes called a heap file, is the simplest type of file organization.
Records are placed in file in the same order as they are inserted. A new record is inserted in the last
page of the file; if there is insufficient space in the last page, a new page is added to the file. This
makes insertion very efficient. However, as a heap file has no particular ordering with respect to field
values, a linear search must be performed to access a record. A linear search involves reading pages
from the file until the required is found.

Sequential File Organization:


In a sequential file organization, records are organized in the sequence by which they were added.
You cannot insert a new record between existing records, but only at the end of the last record. It is a
simple file organization that allows you to process batches of records in the file without adding or
deleting anything. However, to access a particular record, processing must run through all the other
3|Page
records above it because it does not generate any random key to identify the location of the record. 
Hash File Organization

In a hash file, records are not stored sequentially in a file instead a hash function is used to calculate
the address of the page in which the record is to be stored.
The field on which hash function is calculated is called as Hash field and if that field acts as the key of
the relation then it is called as Hash key. Records are randomly distributed in the file so it is also
called as Random or Direct files. Commonly some arithmetic function is applied to the hash field so
that records will be evenly distributed throughout the file.

Cluster File Organization


A traditional file system is a hierarchical tree of directions and files Implemented on a
raw device partition through the file system. Clustered file organization is not
considered good for large databases. In this mechanism, related records from one or
more relations are kept in the same disk block, that is ordering of records is not based
on primary key or search key.

Indexes Sequential Access Method (ISAM) 

In an ISAM system, data is organized into records which are composed of fixed length fields. Records
are stored sequentially. A secondary set of hash tables known as indexes contain "pointers" into the
tables, allowing individual records to be retrieved without having to search the entire data set.
It is a data structure that allows the DBMS to locate particular records in a file more quickly and
thereby speed response to user queries. An index in a database is similar to an index in a book. It is
an auxiliary structure associated with a file that can be referred to when searching for an item
of information, just like searching the index of a book, in which we look up a keyword to get a list of
one or more pages the keyword appears on. 

SUB-TOPIC 2:
BASIC OPERATION

Scan: Fetch all records in the file. The pages in the file must be fetched from the disk into the buffer
pool. There is also a CPU overhead per record for locating the record on the page.

Search with equality selection: Fetch all records that satisfy an equality selection, for example,
find the student record for the student with sid 23. Pages that contain qualifying records must be
fetched from the disk, and qualifying records must be located within retrieved pages.

Search with range selection: Fetch all records that satisfy a range selection. For example, find
all students records with name alphabetically after smith.
4|Page
Insert: Insert a given record into the file. We must identify the page in the file into which the new
record must be inserted, fetch that page from the disk, modify it to include the new record and then
write back the modified page.

Delete: Delete a record that is specified using its record id. We must identify the page in the file into
which the new record must be inserted, fetch that page from the disk, modify and then write it back.
Locate: Every file has a file pointer, which tells the current position where the data is to be read or
written.

Write: User can select to open a file in write mode, the file enables them to edit its
contents. It can be deletion, insertion or modification.

Read: By default, when file are opened in read mode, the file pointer points to the beginning of the
file.

Comparison between the Three Files Organization


- A hashed file does not utilize space quite as well as a sorted file, but insertions
and deletions are fast, and equality selections are very fast.
- A heap file has good storage efficiency and supports fast scan, insertion and
deletion or records. However, it is slow for searching.
- A sorted file also offers good storage efficiency, but insertion and deletion of
records are slow. It is quite fast for searching, and it is the best structure for
range selections.

EVALUATION:
(i) Highlight the various methods of organizing files
(ii) Explain any two

GENERAL EVALUATION
(i) Explain any three ways in which files can be compared.

READING ASSIGNMENT
Study the topic ‘Internet’ using your students’ textbook
WEEKEND ASSIGNMENT
1. Records in a .............................. file are inserted as they arrive
(a) Serial (b) sequential (c) indexed (d) random
2. ................ is the collection of related data items or field.
(a) Data item (b) Field (c) Record (d) File
5|Page
3. ................... is the smallest unit of information stored in computer file
(a) Data item (b) Field (c) Record (d) File
4. ......................... file is referred to as direct access file
(a) Random (b) Indexed (c) Serial (d) Sequential
5. A file that is sorted on a sequence of fields is called………………
(a) Heap file (b) random file (c) Stack file (d) hash file.
ESSAY QUESTION
1. Clearly distinguish between sequential and random file organization

WEEK 3
DATE:..........................................

CLASS: SS 2
TOPIC: THE INTERNET
CONTENT:
Ø Definition of Internet.
Ø Internet browsers.
Ø Benefits of Internet.

SUB-TOPIC 1:
Definition of Internet
The Internet is a global system of interconnected computer networks that use the
Standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide.

It is a network of networks that consists of millions of private, public, academic,


business and government networks of local to global scope that are linked by a broad
array of electronic and optical networking technologies. Simply put, the Internet is a
collection of computers, all linked together, to share information worldwide. It is the largest computer
network in the world.

The Internet Browser


Is a software application for retrieving, presenting and traversing information resources on
the World Wide Web. An information resource is identified by a Uniform Resource
Identifier (URI/URL) that may be a web page, image, video or other piece of content.

6|Page
 Hyperlinks present in resources enable users easily to navigate their browsers to related
resources.

Some popular browsers are: Internet Explorer, Opera, Safari, Chrome,


Mozilla, Netscape navigator.

Features in Main Browser Window


i. The Title bar
ii. The menu bar
iii. Tools and Help
iv. The tool bar
v. Address bar

Internet Services
i. E-mail: this service permits user to send and receive mail from anywhere in the world.
ii. World Wide Web: A network service that gives room for an individual or organization to set
up a special server or site from which other users can obtain special information.
iii. Voice and Video Conferencing: business and institution use the internet for voice and video
conferencing and other forms of communication that enable people to telecommunicate.
iv. E-commerce: this includes advertising, selling, buying, distributing product and providing
customer service on line.
v. File Sharing: this lets individuals swap music, movie, photos and applications, provided they
do not violate copy right protection.
vi. File Transfer Protocol: This was one of the first internet service developed and it allows
users to move files from one computer to another.
vii. Gopher: this offers downloaded files with some content description to make it easier to find
the file needed.

SUB-TOPIC 2:

7|Page
Benefits of Internet to the society:
The Internet plays a major role in the society in the following application areas

1. Education/E-Learning: With the internet, people can get educational materials


and read them in preparation for examinations, or use them for school
assignments. The internet also enhances electronic learning whereby courses or
subjects are taught online using audio and or visual materials.
2. E-Registration: The internet provides users with facilities for online registration
for examinations like WAEC, NECO and JAMB.
3. Entertainment: The internet kills boredom and enhances leisure by providing its
users with latest entertainment in the form of movies, games, News and many
more.
4. Communication: This is one of the key benefits of the internet. The internet
provides many means by which users can communicate with friends, family,
colleagues, and lots more through email, chat messenger, face books, etc.
5. E-Banking: The internet can be used as a tool to carry out transactions with
banks irrespective of user’s location.
6. E-Commerce: Internet is also a tool for E- Commerce. It can allow users to buy
and sell their goods and services online regardless of their location.
Websites
Is a collection of related web pages, including multimedia content, typically identified with a common
domain name, and published on at least one web server.

Webpage
Is a document that is suitable for the World Wide Web and web browsers. A web browser displays
a web page on a monitor or mobile device. The web page is what displays, but the term also refers to
a computer file, usually written in HTML or comparable markup language.

Uniform Resources Locator


Colloquially termed a web address, is a reference to a web resource that specifies its location on
a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform Resource
Identifier (URI), although many people use the two terms interchangeably.

Components of a URL
i. Protocol
ii. Http and FTP
iii. Hostname: Is the name of the computer that contains the information you
want to access.
iv. Data path: is the string that specifies the path to the file that you wish to
retrieve.
8|Page
EVALUATION
1. Define the term “ Internet”
2. State FIVE benefits of the Internet to the society.

GENERAL EVALUATION
(i) List Five Examples of an internet browser
(ii) What is E-Banking?

READING ASSIGNMENT
Study the topic ‘Internet Security’ using your students’ textbook

WEEKEND ASSIGNMENT
1. An internet benefit that helps people to get materials and read them in
preparation for examination is called……….. (a) E-Learning (b) reference files (c)
E-resources (d) E-coordination
2. A term used to refer to the process of accessing and viewing web pages on the
Internet is called…………
(a) Browse (b) Opera (c) Internet (d) scroll
3. All are examples of internet browsers except...........
(a) Opera (b) Safari (c) Chrome (d) Emoticon
4. A global system of interconnected computer network that uses the standard
Protocol suite is called
(a) Internet (b) Selection(c) user net (d) Sequential
5. A browser can also be called…………….
(a)Web browser (b) Organization browser(c) Storage browser (d) Correction
browser

WEEK: 4

DATE:..........................................

CLASS: SS 2

TOPIC: THE INTERNET II


CONTENT: (a) Internet Security (b) Abuse of the internet
9|Page
SUB-TOPIC 1:
Internet Security
Is a branch of computer security specifically related to the Internet, often involving browser
security but also network security on a more general level as it applies to other applications
or operating systems on a whole.

Its objective is to establish rules and measures to use against attack over the internet.
The internet represents an insecure channel for exchanging information leading to a
high risk of intrusion or fraud, such as phishing. Different methods have been used to
protect the transfer of data, including encryption.

Other methods of Internet Security are


I. Use of cryptographic methods and protocols that have been developed for
securing communication over the internet.
II. IPSec Protocol- This provides security and authentication at the IP layer by
using cryptography to protect the content.

Types of Internet Security


i. Network Layer Security: TCP/IP can be made secured with the aid of cryptographic methods and
protocol that have been put in place to protect communication over the internet.
ii. IPSec Protocol: This protocol is designed to protect communication in a secure manner using TCP/IP,
and it provides security and authentication at the IP layer by transforming data using encryption.
iii. Security token:Some online sites offer customers the ability to use a six-digit code
which randomly changes every 30–60 seconds on a security token. The keys on the
security token have built in mathematical computations and manipulate
numbers based on the current time built into the device. This means that every
thirty seconds there is only a certain array of numbers possible which would be
correct to validate access to the online account.
iv. Firewall: A computer firewall controls access between networks. It generally consists
of gateways and filters which vary from one firewall to another. Firewalls also
screen network traffic and are able to block traffic that is dangerous. Firewalls
act as the intermediate server between SMTP and Hypertext Transfer Protocol (HTTP)
connections
v. Antivirus: Antivirus software and Internet security programs can protect a
programmable device from attack by detecting and eliminating viruses;
Antivirus software was mainly shareware in the early years of the Internet, but
10 | P a g e
there are now several free security applications on the Internet to choose from
for all platforms.

EVALUATION: State any THREE internet security method you know, and explain ONE.

SUB-TOPIC 2: ABUSES OF THE INTERNET


In spite of its benefits, some people use the internet for negative things. Abuses of the internet include:
1. Fraud: Some people to try to deceive and collect money from them. This is a serious crime.
2. Pornography: Many websites that look innocent have been used to publish pornographic materials
several people have become addicted to watching pornography on the internet.
3. Spam: Spam is e-mail that one has not requested for. Spam is becoming a problem on the internet
because many mailboxes are filled up with a large number of unrequested e-mails daily.
E-mail users have to take time to sort through spam to find the genuine e-mail; this process takes
time and money. Most ISPs provide software that try to separate genuine e-mail from Spam. Such
software’s are called Spam filters.
4. Addiction: some people get addicted to browsing all day. This causes their school and other work to
suffer.
5. Hacking: Unauthorized access to another computer which can be successful or unsuccessful.
6. Sniffing: Capturing information that was intended for other machines.
7. Spoofing attack: Creating half open connection structures on the victim’s system making it impossible
for the victim to accept any new incoming connection until the file expires.
8. False e-mail address: Used with the intention of masking identity.
9. Mail bomb: Sending of multiple e-mail messages to an address with the sole intent of overloading the
recipients’ mailbox.
10. TCP SYN Flooding attack: Sending multiple TCP SYN packets to another computer with the intention of
exhausting the targets resources.

EVALUATION:
1. Mention THREE internet security measures.
2. State EIGHT abuses of the internet.

READING ASSIGNMENT: Students are to read ‘Presentation Package of student’s textbook 2 by ‘Adedapo F.O.

GENERAL EVALUATION:
1. What is ‘Spam mail’?
2. Define internet insecurity.

READING ASSIGNMENT:
Students are expected to read ‘methods of file security’ of Handbook on Computer
studies for SS2.

11 | P a g e
WEEKEND ASSIGNMENT:
1. A Mail that one has not requested for is called …………
(a) Spam (b) View (c) Delete (d) Creation
2. …………… is not a measure of internet security
(a) Encryption (b) protocols (c) Cryptographic methods(d) Usenet
3. A secret word or string of characters that is used for authentication, to prove
identity or gain access to a resource --------
(a) Computer file (b) Manual file (c) Password (d) Overwriting
4. A branch of computer security specifically related to the internet is called……
(a) Internet breach (b) Encryption (c) dotted file (d) Anti spam.
5. ------------ is not a way in which the internet can be abused
(a) Mail bomb (b) Hacking (c) Spam mails (d) TCP transponder

WEEK: 5

CLASS: SS 2

DATE…………………………..

TOPIC: PRESENTATION PACKAGE

CONTENT: (a) Meaning of Presentation package (i) Use of Presentation package

SUB-TOPIC 1:
Meaning of Presentation Package
A Presentation package is a computer software package that is used to display
information usually in the form of a slide show. It is often called graphic
presentation. A presentation package can also be defined as software for creating
documents or animations for presentation.

Examples of Presentation Packages are;


1. Microsoft PowerPoint.
2. Harvard graphics
3. Windows movie maker
4. Macromedia flash

12 | P a g e
5. OpenOffice.org Impress

Uses of Presentation Package


Presentation packages are used to display Information usually in the form of a slide
show via the integration of multimedia such as digital video and sounds. Other uses
of the internet are;
i. Multimedia lectures
ii. Student reports
iii. Handouts
iv. Multimedia story books
Sub-topic 2

Getting started with PowerPoint


- Click on start menu
- Point to program icon
- Click on Microsoft PowerPoint

PowerPoint Environment

PowerPoint View
PowerPoint provides different types of views to work with, while a presentation is
being created. These views are:
i. Slide view
ii. Outline view
iii. Normal view or Tri-pane view

13 | P a g e
iv. Slide sorter view
v. Note view
vi. Master view
vii. Slide show

Slide View
This slide view is used to view slides one by one on the screen. In slide view you can
insert text, movie clips, sound, objects like clip art, Auto Shapes and Word Art.
Outline View
In this view you can re-arrange your slides and bullets that you have inserted in
your slide. In this view you can see how your main points flow from slide to slide.
Normal View
This view consists of three pane
- slide pane-to enter and edit text and objects in slides
- Outlines pane-to rearrange the slide
- Notes pane-to insert the information for the speaker or the audience.
Note View
In notes page view, you can type speaker notes to use during your presentation.
You can as well have the hard copy of your notes for reference.
Master View
A company logo or formatting you desired to appear on every slide, notes page or
handout can be done on this view.
Slide show view
This view is used to view the presentation on the screen. A slide show is a full-
screen display of each page in a presentation.

NOTE:
Pls educator, treat all other tools use in PowerPoint.

EVALUATION:
1. What is a Presentation Package?
2. State three (3) Examples of Presentation package

GENERAL EVALUATION:
1. State the general use of a presentation package.

READING ASSIGNMENT:
Students are expected to read ‘Web Design packages’ on the next page of
14 | P a g e
Handbook on Computer studies for SS2.

WEEKEND ASSIGNMENT:
1. PowerPoint can use existing documents of …………..
(a) Word (b) Access (c) pseudo codes (d) Excel
2. ----------- is a software used for making presentations
(a) PowerPoint (b) Excel (c) Access(d) Publisher
3. ---------- Means use of sounds in presentations
(a) Animation (b) Backing (c) media (d) storage
4. …………… is not a feature of presentation packages
(a) Creation of slides (b) Insertion of video and audio (c) Animation (d) SMS
5. One of these is not an example of a presentation package?
(a) Harvard graphics (b) Ms-PowerPoint (c) Hacking
(d) None

WEEK 6

DATE…………………………………..
CLASS: SS 2

TOPIC: WEB DSIGN PACKAGE


CONTENTS
i. Meaning of Web Design Package (i) Uses of Web Design package

SUB-TOPIC 1:
Meaning of Web Design Package
A web Design package is a computer program used to create, edit and update web
pages and the websites. The purpose of such a program is to make it easier for the
designer to work with page and site elements through a graphical user interface that
displays the desired result, typically in a WYSIWYG (What you see is what you get)
manner, while removing the need for the designer to have to work with the actual
code that produces the result (which includes HTML, CSS, JavaScript, and others).

Examples of Web Design Packages are;


Adobe Dreamweaver,
Net Objects Fusion (which are commercial) ,
Note pad++
Amaya,
15 | P a g e
WebPlus X4
Antenna Web Design Studio 3
iweb
Website Pro 4
Microsoft FrontPage
Photon FX Easy

Component of Web Design Package


i. Hit Counter: this gives details about the number of a visitor to a website
through a graphic counter. If you want to know the total number of a visitor
who visited a particular website, then have a look at the Hit Counter.
ii. Advertising: The advertising banner will produce an ad banner rotator
with images you prefer. You can also spell out transitions within graphics.
iii. Animated button: it uses a java applet to generate button that responds to
mouse – over movement. You can make use of these buttons the same way you
use hyperlinks.
iv. Table of Content: The table of content will repeatedly create a page with
hyperlink to each page on your site. The table of content is set up in a ‘tree’
format.
v. Marquees: A marquee is a text that scrolls across the screen. The Marquee is
used when you want to draw attention to a certain point.
vi. Include Page: this will include a page into another page. They are used to
include content of a page into another page. When the include page is
customized, the page with the include code is automatically updated.
vii. Scheduled Pictures: This component can be used when you have a limited time
offer or you want to add variety to your page.
viii. Search Form: The search form component lets one have an easy way to
allow ones visitors to search ones site. This component is used to create a
simple search engine for ones site.

EVALUATION
1. Define a Web Design Package

SUB-TOPIC 2:
Uses of Web Design Package
A web design package is used to create web pages in the Hyper text markup Language
(HTML) format to be rendered by a client application called a web browser.

16 | P a g e
Some of the uses of web design package include;
1. The split view option of a web design package allow users to code in Code view
and preview in Design view without the hassle of switching from design and code
view tab.
2. Dynamic Web Templates (DWT) are included which allow users to create a single
template that could be used across multiple pages and even the whole web sites.
3. Interactive Buttons give users a new easy way to create web graphics for
navigation and links eliminating the need for a complicated image-editing
package such as Adobe Photoshop.
4. Accessibility Checker gives the user the ability to check if their code is standard
compliant and that their web site is easily accessible for people with disabilities.
5. Intellisense which is a form of auto completion is a key feature that assist the
user while typing in code view.
6. Code Snippets gives users the advantage to create snippets of their commonly
used pieces of code allowing them to store it for easy access when it is next
needed.

EVALUATION
1. Mention FIVE uses of Web Design package.

GENERAL EVALUATION
1. State the function of a DWT.

READING ASSIGNMENT
Read and summarize the “Components of a web design package”.

WEEKEND ASSIGNMENT
1. ……………… is included which allow users to create a single template that could
be used across multiple pages and even the whole web site
(a) DWT(b) Access (c) pseudo codes (d) Excel
2. ----------- gives users the advantage to create snippets
(a) Code Snippets (b) Excel (c) Access(d) Publisher
3. A form of auto completion is a key feature that assists the user while typing in
code view.
(a) Animation (b) Backing (c) intellisense (d) snippets
4. …………… give users a new easy way to create web graphics for navigation and
links
(a) Interactive buttons (b) Insertion codes (c) Animation (d) SMS

17 | P a g e
5. One of these is not an example of a Web design package package?
(b) Adobe Dreamweaver (b) Shuttle (c) Amaya
(d) NetObjects

WEEK 7 MID TERM BREAK

WEEK 8

DATE…………………………

CLASS: SS 2

SUBJECT: COMPUTER SCIENCE

TOPIC: WEB DESIGN PACKAGE II

CONTENTS
PRATICAL ON WEB DESIGN USING FRONTPAGE

FrontPage helps you to create an effective and professional web page quickly without
the knowledge of HTML programming language.

WEEK 9-10. Revision

WEEK 11-13 Examination

*Plan an excursion trip to an ISP (internet service provider) and a web development
company in your area. This will expose the student to knowing how the internet is
structured. Preferably between week 7 and week 8.

18 | P a g e

You might also like