Js2 Ict Note_3rd
Js2 Ict Note_3rd
WEEK TOPIC/CONTENT
1 Internet: Meaning of Internet
2 Brief History of the internet
3 Internet Browser
4 Internet Benefits and Misuse
5 Internet Environment: Characteristics features
6 Internet: Uses
7 Search Engines
8 File Sharing
9 Computer Ethics: Responsible use of the Internet
10 Computer Ethics: Abuse and Misuse of the Computer
11 Safety Measures
12 Safety Measures: Use of Computer Lab and Gadgets
13 Revision
14 Examination
THE INTERNET
Internet is a collection of computers all linked together to share information worldwide. It is one of
the largest networks that link trillions of computers all over the world. You can access this network
via communication devices and media such as modems, cable, telephone lines and satellite.
Here are some of the things one can do on the internet.
1. Banking called E-banking 0r Internet Banking
2. Shop for goods and services
3. Watch movies
4. Download and listen to music
5. Access Educational material e.g. www.classnotes.ng
6. Access source of entertainment and leisure, such as online games, magazines or vacation planning
guide
7. Access other computer and exchange files, share and edit documents with others in real-time
8. Provide information, photographs or audio or video clips
INTERNET ENVIRONMENT
Characteristic Features
1. Client: A client is a computer or process that requests services on the network. A server is a
computer or process that responds to a request for service from a client. A user accesses a service,
which allows the use of data or some other resource.
2. Host: A host is a computer, connected to a network that provides an access point to that network.
A host can be a client, a server, or a client and server simultaneously.
3. Network: A network is the combination of two or more nodes and the connecting branches among
them. A physical network is the hardware that makes up a network.
4. Packet: Packet refers to the unit or block of data of one transaction between a host and its
network. A packet usually contains a network header, at least one high-level protocol header, and
data blocks. Packets are the exchange medium used at the internetwork layer to send and receive
data through the network.
5. Port: A port is an end point for communication between applications, generally referring to a
logical connection. A port provides queues for sending and receiving data. Each port has a port
number for identification.
6. Protocol: Protocol refers to a set of rules for achieving communication on a network. Uses of the
Internet
1. Communication
2. Shopping
3. E-learning
4. Research
5. Entertainment
SEARCH ENGINE
A search engine is an information retrieval system designed to help find information stored on a
computer system such as the World Wide Web (WWW). A search engine is a program that searches
through a large volume of data to retrieve information, according to the specific instruction it has
been given.
Examples of some of the most popular search engines include:
1. Google (http://www.google.com)
2. Yahoo search (http://www.yahoo.com)
3. Aol (http://www.aol.com)
4. Ask (http://www.ask.com)
5. Bing (http://www.bing.com)
6. DuckDuckGo (http://www.duckduckgo.com)
Uses Search Engine
1. For research purpose.
2. To search for information on different topics.
3. For educational purposes.
4. To search for the meaning of words.
5. For buying and selling via the internet.
FILE SHARING
File sharing is the act of sharing one or more files. These files exist on your computer and can be sent
over a computer network and shared with someone in the same house, a team member at work, a
friend in another country, or yourself so that you can access your files from anywhere.
Files can be shared over a local network in an office or at home, or you can share files over the
internet.
Types of File Sharing There are two ways to share files over a network:
1. Directly between two computers
2. Between a computer and a server.
Between Two Computers: When a file is shared between two computers over a network, the file is
sent directly to the other person. This is often called peer-to-peer (P2P) file sharing and works by
communicating directly with the other person’s device, with no servers involved.
Between a Computer and a Server: When a file is shared between a computer and a server, the
computer uploads the file to a storage area on the server where it can be shared with others. People
that want access to the file download it directly from that server.
NETWORK:
A network is a group of computers connected to each other or to a central server so as to share
resources such as documents, printer, etc. It is a way in which two or more computers are connected
together in order to exchange or share information.
Types of Network
1. Local Area Network (LAN)
2. Wide Area Network (WAN)
3. Metropolitan Area Network (MAN)
Local Area Network (LAN): This is a network of computers located in a single building or department.
It is the type of network that connects network devices over a relatively short distance e.g. within a
school.
Wide Area Network (WAN): This is a network of computers that links computer systems thousands
of kilometres apart or even in a different region of the world. It is the link of computers from one
country to another.
Metropolitan Area Network (MAN): This is a network that is used as links between office buildings in
a city.
Benefits of Networking
1. It enhances communication with no respect for geographical barriers.
2. It allows for a convenient sharing of scarce hardware and software resources.
3. With the internet, people across the globe can communicate and share resources.
4. The case of collaboration among many computer users in an organization is enhanced.
RESPONSIBLE WAYS TO USE THE INTERNET
Students should use the internet for the following responsible operations:
1. To check and reply to emails. Students should check their emails regularly and always politely
respond to important emails.
2. Students should use chat platforms to chat with friends and colleagues on topical issues relating to
education. They can collaborate online to do assignments as well as solve technical problems.
3. Students should use the internet to research for personal, scientific and technical problems
bothering all issues of life.
4. Students can collaborate with others in network group sites to learn from each other. Such sites as
https://www.classnotes.ng/ are good network group sites which students can visit and collaborate
with.
5. Students should not open unknown emails (emails from an unknown source), especially emails
with attachment. Some of such emails are viruses in disguise, by opening them, the computer can be
infected.
6. Always ensure your privacy is protected on the internet. Do not use credit cards on untrusted
websites, do not register your data (email, name, telephone, etc.) on untrusted websites.
7. Avoid downloading free software, except a trusted company or website.
The student should avoid doing any of the following when using the computer and the internet:
1. When using the internet, always be honest in your dealings with people and avoid hacking other people’s
privacy.
2. Do not spread computer virus on the internet. Always ensure that you scanned your files for the virus
before sharing them with people.
3. Do not send fraudulent emails to people, and always ensure that you are not using the internet as a
medium to commit fraud.
5. When researching on the internet, always acknowledge the source of your document to avoid committing
plagiarism. Plagiarism is academic stealing, as a student, always avoid it.
6. Do not use or download pirated software on the internet. Also, do not attempt to crack original software or
use cracked software. It is piracy and stealing someone’s resources.
SAFETY MEASURES
A person who uses a computer sometimes faces many problems if the computer is used for a long period of
time. The problems may be health-related, like headache or vision problems and waist pain.
ERGONOMICS: Ergonomics is the study of people, their physical characteristics and the ways in which they
function in relating to their working environment, the finishers and the machine they use. The main goal of
ergonomics is to improve the design of the keyboard, computer, desk, chairs and others to better suit use in
the workplace. Back and neck strain can be avoided by ensuring that the chair which you seat provide proper
support and by placing the monitor when you can comfortably. Some safety measures include:
1. Monitor Placement: The top edge of the monitor should be at the level of the eye or slightly lower than it.
You can use a stand to raise the monitor to an appropriate level on your desk.
2. Posture: When you are seated, your feet should be flat on the floor and you should not lean forward or
slouch in your chair. You should shift position often and stand up to stretch your arm and legs at least one
hour.
3. Chair: An adjustable chair that provides support for the lower back should be used.
4. Ergonomic Keyboard: They are designed to reduce the risk of the waist and hand injury that results from
prolonged use or repetition movement. An ergonomic keyboard includes an alternate key layout and plans set
to minimize strain while typing.
5. To prevent wrist strain while typing, keep your elbow level with the keyboard and your wrist straight and
higher than your fingers while you use a mouse, move the mouse with your entire arm instead of your wrist.
1. Dust your computer properly every morning and avoid clustering of dust on the keyboard and screen of
your computer.
2. To appropriately prevent clustering of dust on your computer, you can use dust cover to cover your desktop
computer after each day’s use.
3. Ensure that you connect your computer to a good power source. Always protect your computer from power
surges and spikes by using UPS (Uninterruptible Power Supply) and surge protection equipment.
4. Appropriately shut down your computer after use, please do not turn off (switch off) your computer from
the power button, except if your power button is configured to shut down when it is pressed.
5. Do not spill liquids on your computer system. You can clean your system with a wet cloth, but make sure
that it is completely unplugged from the power source. Also, make sure that the system is completely dry
before connecting it to a power source.
6. Unplug your computer from the power source after each day’s use.
7. Ensure that your antivirus software is updated on a regular basis, say, on a daily basis or at most on a
weekly basis.
8. Avoid sharing files from your computer when you do not have updated antivirus software on your system.
6. Chairs should be comfortable and computer furniture should be arranged in a comfortable manner.