0% found this document useful (0 votes)
9 views9 pages

Js2 Ict Note_3rd

The document outlines a curriculum for JSS 2 ICT covering topics such as the Internet, its history, browsers, benefits, misuse, and safety measures. It emphasizes responsible internet use, computer ethics, and the importance of networking. Additionally, it provides practical advice on ergonomics and safety while using computers.

Uploaded by

francisdaniel242
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views9 pages

Js2 Ict Note_3rd

The document outlines a curriculum for JSS 2 ICT covering topics such as the Internet, its history, browsers, benefits, misuse, and safety measures. It emphasizes responsible internet use, computer ethics, and the importance of networking. Additionally, it provides practical advice on ergonomics and safety while using computers.

Uploaded by

francisdaniel242
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

JSS 2 ICT NOTE THIRD TERM

WEEK TOPIC/CONTENT
1 Internet: Meaning of Internet
2 Brief History of the internet
3 Internet Browser
4 Internet Benefits and Misuse
5 Internet Environment: Characteristics features
6 Internet: Uses
7 Search Engines
8 File Sharing
9 Computer Ethics: Responsible use of the Internet
10 Computer Ethics: Abuse and Misuse of the Computer
11 Safety Measures
12 Safety Measures: Use of Computer Lab and Gadgets
13 Revision
14 Examination
THE INTERNET
Internet is a collection of computers all linked together to share information worldwide. It is one of
the largest networks that link trillions of computers all over the world. You can access this network
via communication devices and media such as modems, cable, telephone lines and satellite.
Here are some of the things one can do on the internet.
1. Banking called E-banking 0r Internet Banking
2. Shop for goods and services
3. Watch movies
4. Download and listen to music
5. Access Educational material e.g. www.classnotes.ng
6. Access source of entertainment and leisure, such as online games, magazines or vacation planning
guide
7. Access other computer and exchange files, share and edit documents with others in real-time
8. Provide information, photographs or audio or video clips

Brief History of Internet


The US defense department created a project called Advanced Research Project Agency (ARPA) in
the late 1960s, which was to work as a network that would allow scientist and military personnel to
exchange information in war scenario without disruption in communications.
In 1986, the National Science Foundation (NSF) connected its huge network of five supercomputer
centre called NSFNET, to ARPANET. They used the technology developed for ARPANET to allow
universities and schools to connect to each other.
The World Wide Web was created in the early 1990s by European organization for nuclear research.
The goal of WWW was also to allow researchers to work together on projects and to make project
information easily accessible.
Features of Internet
1. WEBSITE A website is a collection of web pages. Most websites have a home page as their starting
point, which frequently has a table of contents for the site. Users need a web browser and a
connection to access a website.
2. WEB PAGE A web page is an electronic document on the World Wide Web. It may contain text,
pictures, sounds, graphics or video. Usually, a web page contains links to other pages as well.
3. HYPERLINKS This connects webpages on the internet. A hyperlink can connect one section of a
webpage to another section of the same webpage. It can also be used to connect a document to
another document on the same website, or to a document on another website anywhere in the
world.
4. HOME PAGE The home page is the first page retrieved when accessing a website. It serves as a
table of contents for the rest of the pages on the site and offers links to other websites.
5. UNIFORM RESOURCE LOCATOR (URL) The uniform resource locator is the address that defines the
router to a file on the web. URLs are typed into the browser to access web pages for example
www.google.com.
6. WEB SERVER A web server is a computer on the internet that stores web pages. A web page is
available for other people to view when it is stored in the webserver.
7. WEB BROWSER A web browser is a software program that allows you to access and view web
pages.

INTERNET BENEFITS AND MISUSE


Benefits of the Internet
The benefits of the internet are as follows:
1. INFORMATION: The internet gives you access to information on any subject of your interest. This
makes the internet a valuable research tool. Most sources such as newspaper and magazines have
websites and a number of them only exist online.
2. RESEARCH: You can make use of the internet search facilities to research just about any topic you
can think of. This information can help you with a school project, or a presentation at work. You can
search for the data you need or go to specific research sites.
3. E-MAIL (Electronic Mail): Electronic mails enable us to exchange message with people around the
world, including friends, family members, colleagues, customers and even people you meet on the
internet.
4. ENTERTAINMENT: The internet offers many different forms of entertainment, such as radio and
television broadcast, video and music. You can find a picture of the latest film, watch live interviews
of your favourite celebrities and listen to music before it is available in stores.
5. PROGRAM: You can find thousands of programs that can be used on your computer, such as word
processors, drawing programs, games and accounting programs.
6. ONLINE SHOPPING: You can order products on the internet while sitting at home. You can
purchase items such as books, flowers, music, CDs, pizzas, stock and used cars.
7. CHATTING: Chat features allow you to exchange typed message with another person on the
internet. The message you send will instantly appear on the other person’s computer. You can chat
with a person or a group at the same time.
8. BANKING: You can use the internet to find financial sites that enable you to do your banking and
investing online. Banking online is much more convenient and much less time consuming than doing
it in person.
9. E-LEARNING: E-learning is a training or education program by electronic means. It involves the use
of a computer or an electronic device (laptop) to provide training on educational technology as a tool
for learning.
Misuse of the Internet
Internet abuse refers to improper use of the internet and may include:
1. Computer Crime – or cybercrime: It is any crime that involves a computer and a network. Use of
computers for criminal activity.
2. Cyber-bullying: Use of the internet to bully and intimidate. The use of information technology to
repeatedly harm or harass other people in a deliberate manner.
3. Spam (electronic): Is the use of electronic messaging systems to send unsolicited messages
(spam), especially advertising, as well as sending messages repeatedly on the same website. Sending
of unwanted advertising messages.
4. Malware: Software designed to harm a user’s computer, including computer viruses. Malware,
short for malicious software, is any software used to disrupt computer operation, gather sensitive
information, or gain access to private computer systems.
Other ways of Abuse include:
1. You can get harassing/threatening messages from people or from stalkers.
2. It is very easy to find sites that promote hatred, violence, drug, sex, and other things not
appropriate for children.
3. There is no restriction on marketing products, such as alcohol, tobacco to children on the internet.
4. Pornographic sites are easily found on the internet instead of it being restricted.

THE INTERNET BROWSER


A web/internet browser is a software program that allows you to access and view web pages. The
web browser software is built on the hyperlinks, which allows users to point and click with a mouse
in order to jump from one document to another in whatever order they desire.
Types of Browser
1. Microsoft Internet Explorer: Microsoft internet explorer is one of the most used browsers in
the world. It was developed by Microsoft in 1995 as a supportive package to the Microsoft
Windows operating system.
2. Google Chrome This web browser is developed by Google and its beta version was first
released on September 2, 2008, for Microsoft Windows.
3. Mozilla Firefox: Mozilla Firefox is a new browser derived from Mozilla. It was released in 2004
and has grown to be the second most popular browser on the Internet after Chrome.
4. Opera: Opera is a web browser that was developed by Opera software in 1996. It is a well-
known browser that is mainly used in activated mobile phone and smartphones. It is used
with many operating systems like Linux, MAC OS and MS window.
5. Safari: Safari web browser is a freeware browser from Apple Inc. Safari is the default web
browser in Mac computers and in OS X and iOS Operating Systems. Safari was released in the
year 2003.
6. Microsoft Edge: Microsoft Edge is a relatively new browser from Microsoft Inc. it was
designed as a successor to the internet.
7. Netscape Navigator: Netscape Navigator was developed by Netscape Communication
Corporation and was very popular in the 1990s. It was compatible with almost every
operating system.
Characteristic Features of a Browser
1. Address and Search bar: The address of the webpage you want to visit is typed here. It also gives
you access to search information by using the search option.
2. Scroll arrow: They are used to navigate up and down the current webpage.
3. Back button: This takes you to the previous page you were on.
4. Refresh: It refreshes the current page you are on to show the newest version of the page.
5. Stop: It stops the loading/downloading of a page from the internet.
6. Forward button: Clicking on this button displays the previous page you were on before clicking on
the back button.

INTERNET ENVIRONMENT

Characteristic Features
1. Client: A client is a computer or process that requests services on the network. A server is a
computer or process that responds to a request for service from a client. A user accesses a service,
which allows the use of data or some other resource.
2. Host: A host is a computer, connected to a network that provides an access point to that network.
A host can be a client, a server, or a client and server simultaneously.
3. Network: A network is the combination of two or more nodes and the connecting branches among
them. A physical network is the hardware that makes up a network.
4. Packet: Packet refers to the unit or block of data of one transaction between a host and its
network. A packet usually contains a network header, at least one high-level protocol header, and
data blocks. Packets are the exchange medium used at the internetwork layer to send and receive
data through the network.
5. Port: A port is an end point for communication between applications, generally referring to a
logical connection. A port provides queues for sending and receiving data. Each port has a port
number for identification.
6. Protocol: Protocol refers to a set of rules for achieving communication on a network. Uses of the
Internet
1. Communication
2. Shopping
3. E-learning
4. Research
5. Entertainment

SEARCH ENGINE
A search engine is an information retrieval system designed to help find information stored on a
computer system such as the World Wide Web (WWW). A search engine is a program that searches
through a large volume of data to retrieve information, according to the specific instruction it has
been given.
Examples of some of the most popular search engines include:
1. Google (http://www.google.com)
2. Yahoo search (http://www.yahoo.com)
3. Aol (http://www.aol.com)
4. Ask (http://www.ask.com)
5. Bing (http://www.bing.com)
6. DuckDuckGo (http://www.duckduckgo.com)
Uses Search Engine
1. For research purpose.
2. To search for information on different topics.
3. For educational purposes.
4. To search for the meaning of words.
5. For buying and selling via the internet.

FILE SHARING
File sharing is the act of sharing one or more files. These files exist on your computer and can be sent
over a computer network and shared with someone in the same house, a team member at work, a
friend in another country, or yourself so that you can access your files from anywhere.
Files can be shared over a local network in an office or at home, or you can share files over the
internet.
Types of File Sharing There are two ways to share files over a network:
1. Directly between two computers
2. Between a computer and a server.
Between Two Computers: When a file is shared between two computers over a network, the file is
sent directly to the other person. This is often called peer-to-peer (P2P) file sharing and works by
communicating directly with the other person’s device, with no servers involved.
Between a Computer and a Server: When a file is shared between a computer and a server, the
computer uploads the file to a storage area on the server where it can be shared with others. People
that want access to the file download it directly from that server.
NETWORK:
A network is a group of computers connected to each other or to a central server so as to share
resources such as documents, printer, etc. It is a way in which two or more computers are connected
together in order to exchange or share information.
Types of Network
1. Local Area Network (LAN)
2. Wide Area Network (WAN)
3. Metropolitan Area Network (MAN)
Local Area Network (LAN): This is a network of computers located in a single building or department.
It is the type of network that connects network devices over a relatively short distance e.g. within a
school.
Wide Area Network (WAN): This is a network of computers that links computer systems thousands
of kilometres apart or even in a different region of the world. It is the link of computers from one
country to another.
Metropolitan Area Network (MAN): This is a network that is used as links between office buildings in
a city.
Benefits of Networking
1. It enhances communication with no respect for geographical barriers.
2. It allows for a convenient sharing of scarce hardware and software resources.
3. With the internet, people across the globe can communicate and share resources.
4. The case of collaboration among many computer users in an organization is enhanced.
RESPONSIBLE WAYS TO USE THE INTERNET
Students should use the internet for the following responsible operations:
1. To check and reply to emails. Students should check their emails regularly and always politely
respond to important emails.
2. Students should use chat platforms to chat with friends and colleagues on topical issues relating to
education. They can collaborate online to do assignments as well as solve technical problems.
3. Students should use the internet to research for personal, scientific and technical problems
bothering all issues of life.
4. Students can collaborate with others in network group sites to learn from each other. Such sites as
https://www.classnotes.ng/ are good network group sites which students can visit and collaborate
with.
5. Students should not open unknown emails (emails from an unknown source), especially emails
with attachment. Some of such emails are viruses in disguise, by opening them, the computer can be
infected.
6. Always ensure your privacy is protected on the internet. Do not use credit cards on untrusted
websites, do not register your data (email, name, telephone, etc.) on untrusted websites.
7. Avoid downloading free software, except a trusted company or website.

ABUSE AND MISUSE OF COMPUTERS AND INTERNET

The student should avoid doing any of the following when using the computer and the internet:

1. When using the internet, always be honest in your dealings with people and avoid hacking other people’s
privacy.

2. Do not spread computer virus on the internet. Always ensure that you scanned your files for the virus
before sharing them with people.

3. Do not send fraudulent emails to people, and always ensure that you are not using the internet as a
medium to commit fraud.

4. Do not watch pornography on the internet. It is a waste of time and resources.

5. When researching on the internet, always acknowledge the source of your document to avoid committing
plagiarism. Plagiarism is academic stealing, as a student, always avoid it.

6. Do not use or download pirated software on the internet. Also, do not attempt to crack original software or
use cracked software. It is piracy and stealing someone’s resources.

SAFETY MEASURES

A person who uses a computer sometimes faces many problems if the computer is used for a long period of
time. The problems may be health-related, like headache or vision problems and waist pain.

ERGONOMICS: Ergonomics is the study of people, their physical characteristics and the ways in which they
function in relating to their working environment, the finishers and the machine they use. The main goal of
ergonomics is to improve the design of the keyboard, computer, desk, chairs and others to better suit use in
the workplace. Back and neck strain can be avoided by ensuring that the chair which you seat provide proper
support and by placing the monitor when you can comfortably. Some safety measures include:

Some safety measures include:

1. Monitor Placement: The top edge of the monitor should be at the level of the eye or slightly lower than it.
You can use a stand to raise the monitor to an appropriate level on your desk.

2. Posture: When you are seated, your feet should be flat on the floor and you should not lean forward or
slouch in your chair. You should shift position often and stand up to stretch your arm and legs at least one
hour.

3. Chair: An adjustable chair that provides support for the lower back should be used.

4. Ergonomic Keyboard: They are designed to reduce the risk of the waist and hand injury that results from
prolonged use or repetition movement. An ergonomic keyboard includes an alternate key layout and plans set
to minimize strain while typing.
5. To prevent wrist strain while typing, keep your elbow level with the keyboard and your wrist straight and
higher than your fingers while you use a mouse, move the mouse with your entire arm instead of your wrist.

General Safety Measures

1. The lighting in the room or office should be moderate

2. Keep liquid away from the computer

3. Protect the computer from dust

4. A glare filter should be used to reduce or prevent eye strain

SAFETY MEASURES: USE OF COMPUTER LAB AND GADGETS

Responsible Ways of using the Computer:

1. Dust your computer properly every morning and avoid clustering of dust on the keyboard and screen of
your computer.

2. To appropriately prevent clustering of dust on your computer, you can use dust cover to cover your desktop
computer after each day’s use.

3. Ensure that you connect your computer to a good power source. Always protect your computer from power
surges and spikes by using UPS (Uninterruptible Power Supply) and surge protection equipment.

4. Appropriately shut down your computer after use, please do not turn off (switch off) your computer from
the power button, except if your power button is configured to shut down when it is pressed.

5. Do not spill liquids on your computer system. You can clean your system with a wet cloth, but make sure
that it is completely unplugged from the power source. Also, make sure that the system is completely dry
before connecting it to a power source.

6. Unplug your computer from the power source after each day’s use.

7. Ensure that your antivirus software is updated on a regular basis, say, on a daily basis or at most on a
weekly basis.

8. Avoid sharing files from your computer when you do not have updated antivirus software on your system.

Managing the Computer Laboratory:

1. The computer laboratory and environs should be dust-free.

2. Computer systems should be kept dust-free at all times.

3. There should be adequate ventilation in the laboratory.

4. The lighting system in a computer laboratory should be adequate.

5. The computer systems should be orderly arranged to enhance free movement.

6. Chairs should be comfortable and computer furniture should be arranged in a comfortable manner.

You might also like