PRIMARY 6 THIRD TERM LESSON NOTE PLAN ICT COMPUTER STUDIES
Week: One
Date:
Class: Basic Six
Subject: ICT
Duration: 40 minutes
Topics: DRAWING WITH PAINT ARTISTS
SUB-Topic (s):
1.Draw Geometrical Figures (Lines, Eclipse and Rectangles)
2. Draw Objects with Freehand
Behavioural objectives: At the end of the lesson, pupils should be able to;
1. draw geometrical figures(lines, ellipses and rectangles).
2. do freehand drawing of objects and figures.
Instructional material/Reference material: Foundation Computer Studies for Primary Schools Book 6 by E. O. Adegbeyeni.
A functional computer system with Paint Artist software (or Corel Draw) installed.
Building Background/ Connection to prior knowledge: Pupils are familiar with the topics in their previous class
CONTENT OF THE LESSON
DRAWING A LINE
To draw a line:
1. Click the line tool.
2. To draw the line, drag the pointer.
Draw a perfectly horizontal, vertical, or diagonal line.
DRAWING A RECTANGLE
To draw a rectangle
1. Click on the rectangle tool.
2. Drag from the upper end to the lower end of the page.
3. Go back to the pick tool and then the rectangle tool.
Draw and paint a rectangle.
DRAWING A CIRCLE
To draw a circle:
1. Click the ellipses tool.
2. Click and draw on the page to produce a circle.
Draw and paint a circle.
FREEHAND DRAWINGS
Draw objects like boxes, fish, tins, cow, fan, cars etc using freehand.
Strategies & Activities
Step: Teacher revises the previous topic
Step 2:Teacher introduces the new topic.
Step 3:Teacher endeavors to explain all the points to the pupils thoroughly.
Step 4: Teacher welcomes pupils questions.
Step 5: Teacher evaluates the pupils.
Assessment& Evaluation
1. Draw geometrical figures (lines, ellipses and rectangles).
2. Do freehand drawing of objects and figures.
Summary: Teacher goes over the topic once again to enhance better understanding.
Wrap-up [conclusion]: Teacher corrects and marks pupils’ notes.
To create freehand drawings in computer studies, you can use various drawing tools available in software programs or online applications. Follow these steps to draw freehand objects:
1. Open a drawing software program or an online drawing tool.
2. Select the freehand drawing tool. It is usually represented by a pencil or brush icon.
3. Adjust the size and thickness of the drawing tool if necessary. This option is often located in the toolbar or settings panel.
4. Start drawing your object by clicking and dragging the pointer on the canvas. Remember, freehand drawings do not require perfect precision, so you can let your creativity flow.
5. Experiment with different strokes, curves, and angles to create the desired shape. You can draw objects like boxes, fish, tins, cows, fans, cars, or any other thing you can imagine.
6. If you make a mistake or want to modify your drawing, most drawing tools have an eraser or undo option available. Use these features to make corrections.
7. Once you are satisfied with your freehand drawing, you can add colors to it. Select the color palette or color picker tool, choose the desired color, and apply it to your drawing. You can also use different brush styles or patterns to enhance the appearance of your artwork.
8. Finally, save your drawing in a suitable format, such as JPEG or PNG, if you want to keep it for future use or share it with others.
Remember, freehand drawings are an excellent way to express your creativity and practice your drawing skills using digital tools. Have fun and explore different techniques to create unique and imaginative artwork.
[mediator_tech]
1. To draw a line, click the __________ tool.
a) pencil
b) rectangle
c) line
d) circle
2. To draw a line, you need to __________ the pointer.
a) click
b) drag
c) resize
d) delete
3. A perfectly vertical line goes _________.
a) up and down
b) left and right
c) diagonally
d) in a circular motion
4. To draw a rectangle, click on the __________ tool.
a) line
b) pencil
c) circle
d) rectangle
5. When drawing a rectangle, drag from the _________ end to the _________ end of the page.
a) left, right
b) right, left
c) upper, lower
d) lower, upper
6. After drawing a rectangle, you can go back to the pick tool and then the __________ tool.
a) line
b) pencil
c) circle
d) rectangle
7. To draw a circle, click the __________ tool.
a) ellipse
b) rectangle
c) line
d) circle
8. To produce a circle, click and __________ on the page.
a) drag
b) resize
c) delete
d) draw
9. Freehand drawings allow you to draw objects using __________.
a) perfect precision
b) straight lines only
c) predefined shapes
d) creative strokes
10. Draw objects like boxes, fish, tins, cow, fan, cars, etc., using __________.
a) the line tool
b) the rectangle tool
c) freehand drawings
d) the circle tool
11. The tool used to draw a line is called the __________ tool.
a) pencil
b) eraser
c) shape
d) brush
12. When drawing a rectangle, the dragging action is done from the __________ to the __________ of the page.
a) top, bottom
b) bottom, top
c) left, right
d) right, left
13. The tool used to draw a circle is called the __________ tool.
a) ellipse
b) rectangle
c) line
d) circle
14. To draw a perfectly horizontal line, you need to drag the pointer __________.
a) up and down
b) left and right
c) diagonally
d) in a circular motion
15. Freehand drawings allow you to express your __________.
a) creativity
b) precision
c) technical skills
d) mathematical abilities
16. The rectangle tool is used to draw __________ shapes.
a) square
b) circular
c) triangular
d) rectangular
17. When drawing a circle, you need to __________.
a) click and drag
b) click and release
c) click and double-click
d) click and rotate
18. Freehand drawings do not require __________.
a) creativity
b) precision
c) imagination
d) predefined shapes
19. To draw a diagonal line, you need to drag the pointer __________.
a) up and down
b) left and right
[mediator_tech]
Week: TWO
Date:
Class: Basic Six
Subject: ICT
Duration: 40 minutes
Topics: COMPUTER AND THE SOCIETY
SUB-Topic (s):
1. Small Scale Applications of Computer in the Society
2. Large Scale Applications of Computer in the Society
Behavioural objectives: At the end of the lesson, pupils should be able to;
1. mention small scale application of computer in the society;
2. mention large scale application of computer in the society
Instructional material/Reference material: Foundation Computer Studies for Primary Schools Book 6 by E. O. Adegbeyeni.
1. Digital watch
2. Automatic door lock
3. Auto pilot
4. Picture Charts
Building Background/ Connection to prior knowledge: Pupils are familiar with the topics in their previous class
CONTENT OF THE LESSON
INTRODUCTION
Computer and computer applications are used in various aspects of human activity. In fact, most professions have application software written specifically for them to solve certain tasks.
Architects have the AUTOCAD software that aid in the design of building and other structures.
SMALL SCALE APPLICATION OF COMPUTER IN THE SOCIETY
1. Digital Wrist watches replacing clock.
2. Word Processing replacing manual typewriting.
3. Automatic door locks replacing manual locks.
4. Automatic Gates in houses replacing manual gates.
5. Automatic traffic control system replacing human traffic wardens.
6. Computer Desktop Publishing in printing presses to reduce pre-press processes.
7. CAT – Scan replacing X – Ray.
8. Computer aided graphic designing replacing manual drawings.
9. Computer aided architectural designs replacing manual drawings.
10. Computer aided animation in the entertainment and TV broadcasting.
11. Video Projection for presentation replacing manual papers.
12. Digital and Video phones replacing analogue telephones.
LARGE SCALE APPLICATIONS OF COMPUTER OF THE SOCIETY
1. Auto pilot used in airplanes.
2. Satellite communications like CNN, Weather Forecasting, TV Broadcasting.
3. Office Automation like Word Processing Electronic mail, Internet.
4. Space Shuttle
5. Robotics in engineering.
6. Automatic Teller Machine used to withdraw money.
7. Global electronic air ticketing system.
8. Global Telephone and GSM Communication.
9. Oil Exploration and Drilling Operations.
10. Computer Chips Manufacturing firms.
Strategies & Activities
Step: Teacher revises the previous topic
Step 2: Teacher introduces the new topic.
Step 3: Teacher endeavors to explain all the points to the pupils thoroughly.
Step 4: Teacher welcomes pupils questions.
Step 5: Teacher evaluates the pupils.
Assessment& Evaluation
1. Mention small scale application of computer in the society;
2. Mention large scale application of computer in the society.
Summary: Teacher goes over the topic once again to enhance better understanding.
Wrap-up [conclusion]: Teacher corrects and marks pupils notes.
[mediator_tech]
1. Architects use _________ software for designing buildings and structures.
a) AUTOCAD
b) Photoshop
c) Microsoft Word
d) Excel
2. Digital wristwatches have replaced _________.
a) calendars
b) clocks
c) calculators
d) smartphones
3. Word processing has replaced _________.
a) manual writing
b) telephones
c) fax machines
d) manual typewriting
4. Automatic door locks have replaced _________.
a) windows
b) keys
c) doorknobs
d) walls
5. Automatic gates in houses have replaced _________.
a) fences
b) walls
c) manual gates
d) security guards
6. Automatic traffic control systems have replaced _________.
a) traffic lights
b) pedestrians
c) human traffic wardens
d) road signs
7. CAT-Scan has replaced _________.
a) MRI machines
b) X-Ray
c) blood tests
d) physical examinations
8. Computer-aided graphic designing has replaced _________.
a) manual drawings
b) photography
c) painting
d) sculpture
9. Computer-aided architectural designs have replaced _________.
a) manual calculations
b) blueprints
c) construction workers
d) building materials
10. Computer-aided animation is used in _________.
a) video games
b) music production
c) photography
d) medical research
11. Video projection is used for _________.
a) watching movies
b) presentations
c) photography
d) live streaming
12. Digital and video phones have replaced _________.
a) landline phones
b) smartphones
c) fax machines
d) televisions
13. Computer applications are specifically designed to solve tasks related to _________.
a) human activity
b) animal behavior
c) weather patterns
d) geological formations
14. Architects use _________ software for designing buildings and structures.
a) AUTOCAD
b) Photoshop
c) Microsoft Word
d) Excel
15. Digital wristwatches have replaced _________.
a) calendars
b) clocks
c) calculators
d) smartphones
16. Word processing has replaced _________.
a) manual writing
b) telephones
c) fax machines
d) manual typewriting
17. Automatic door locks have replaced _________.
a) windows
b) keys
c) doorknobs
d) walls
18. Automatic gates in houses have replaced _________.
a) fences
b) walls
c) manual gates
d) security guards
19. Automatic traffic control systems have replaced _________.
a) traffic lights
b) pedestrians
c) human traffic wardens
d) road signs
20. CAT-Scan has replaced _________.
a) MRI machines
b) X-Ray
c) blood tests
d) physical examinations
[mediator_tech]
Week: THREE
Date:
Class: Basic Six
Subject: ICT
Duration: 40 minutes
Topics: CAREER OPPORTUNITIES IN COMPUTING
SUB-Topic (s):
Behavioural objectives: At the end of the lesson, pupils should be able to;
1. List career opportunities associated with computer usage;
2. Mention their future career.
Instructional material/Reference material: Foundation Computer Studies for Primary Schools Book 6 by E. O. Adegbeyeni.
1. functional computer system.
Building Background/ Connection to prior knowledge: Pupils are familiar with the topics in their previous class
INTRODUCTION
There are various career opportunities in the computer or IT profession as it is commonly referred to now as every area of human activity use it.
Also, most engineering based products have one computer – based device or another working inside it.
CAREERS OPPORTUNITIES IN COMPUTER
There are many careers opportunities in computer, these include:
1. Teacher
To teach at primary, secondary and tertiary levels.
2. Computer Programming
To write computer programs.
3. Computer Engineering
To assemble and repairs computers.
4. Computer Analysts
To determine programs inside computers.
5. Hardware Maintenance and Support
To service computers.
6. Business Analyst
Offer computer solutions to business problems.
7. Database Management Support
To take care of data stored.
8. Telecommunications Engineers
To take of mobile phones, masts and other equipment.
9. Computer Operations
Computer operator, data entry clerk, librarian, etc. that work daily with the computer.
10. Computer Auditing
To check that the use of the computer is correct.
11. Computer Security
To ensure protection of computer and data.
12. Linguists
To write technical and user manuals in different languages.
Strategies & Activities
Step: Teacher revises the previous topic
Step 2: Teacher introduces the new topic.
Step 3: Teacher endeavors to explain all the points to the pupils thoroughly.
Step 4: Teacher welcomes pupils’ questions.
Step 5: Teacher evaluates the pupils.
Assessment& Evaluation
1. List five (5) career opportunities associated with computer usage;
2. Mention their future career.
Summary: Teacher goes over the topic once again to enhance better understanding.
Wrap-up [conclusion]: Teacher corrects and marks pupils’ notes.
[mediator_tech]
1. To teach at primary, secondary, and tertiary levels, one can pursue a career as a __________.
a) teacher
b) programmer
c) engineer
d) analyst
2. Computer programming involves writing __________.
a) books
b) computer programs
c) reports
d) music
3. Computer engineering focuses on assembling and __________ computers.
a) designing
b) repairing
c) analyzing
d) programming
4. Computer analysts are responsible for determining __________ inside computers.
a) users
b) programs
c) networks
d) databases
5. Hardware maintenance and support professionals provide __________ for computers.
a) upgrades
b) training
c) servicing
d) sales
6. Business analysts offer computer solutions to __________ problems.
a) personal
b) academic
c) business
d) medical
7. Database management support involves taking care of __________ stored.
a) hardware
b) software
c) data
d) networks
8. Telecommunications engineers are responsible for managing __________ equipment.
a) televisions
b) radios
c) mobile phones
d) cameras
9. Computer operations include roles such as computer operator, data entry clerk, and __________.
a) librarian
b) accountant
c) engineer
d) technician
10. Computer auditing involves checking the __________ of computer use.
a) efficiency
b) accuracy
c) legality
d) security
11. Computer security professionals ensure the __________ of computer systems.
a) availability
b) efficiency
c) protection
d) usability
12. Network administrators are responsible for managing __________.
a) software development
b) database systems
c) computer networks
d) computer hardware
13. Web development involves creating and maintaining __________.
a) websites
b) computer games
c) mobile apps
d) software programs
14. Data scientists analyze and interpret __________.
a) computer programs
b) business reports
c) user feedback
d) large sets of data
15. IT project managers oversee __________.
a) software testing
b) hardware manufacturing
c) technology upgrades
d) data analysis
16. User experience (UX) designers focus on enhancing __________.
a) computer security
b) hardware performance
c) software functionality
d) user satisfaction
17. System administrators are responsible for managing __________.
a) computer networks
b) financial transactions
c) marketing campaigns
d) customer relationships
18. IT consultants provide __________ to businesses.
a) legal advice
b) financial planning
c) technical expertise
d) customer support
19. Software testers ensure the __________ of software applications.
a) efficiency
b) accuracy
c) security
d) reliability
20. Cloud computing specialists manage __________.
a) physical servers
b) computer viruses
c) virtualized resources
d) social media platforms
[mediator_tech]
Week: FOUR
Date:
Class: Basic Six
Subject: ICT
Duration: 40 minutes
Topics: MISUSE OF COMPUTER
SUB-Topic (s): Area Where Computers have been Misuse
Behavioural objectives: At the end of the lesson, pupils should be able to;
1. Identify ways of misusing computer;
2. List ways of misusing computers.
Instructional material/Reference material: Foundation Computer Studies for Primary Schools Book 6 by E. O. Adegbeyeni.
functional computer system.
Building Background/ Connection to prior knowledge: Pupils are familiar with the topics in their previous class.
INTRODUCTION
AREAS OF COMPUTER MISUSE
There are however many areas where computer has been used for wrong or negative things. These are include:
1. Piracy
Computer software are written by computer programmers for sale. However, a lot of users simply get copies of software from friends and colleagues for use on their system without paying for it.
2. Job losses
As a result of the fact that many operations are now done by the computer, people who are not literate in computer use are likely to lose their jobs.
3. Invasion of privacy
Many people now have access to the Internet and have email addresses. It is now common to receive emails from people or companies you don’t know anything about trying to pass information or sell something to you.
4. Fraud
Goods and services are sold and bought on the internet. We need to know the people we deal with. Otherwise, goods or services purchased many never be delivered as it may be a fraud.
5. Stealing
People can steal password and withdraw money from bank accounts through the ATM machine or the internet.
Strategies & Activities
Step: Teacher revises the previous topic
Step 2: Teacher introduces the new topic.
Step 3: Teacher endeavors to explain all the points to the pupils thoroughly.
Step 4: Teacher welcomes pupils’ questions.
Step 5: Teacher evaluates the pupils.
Assessment& Evaluation
1. Identify ways of misusing computer
2. List ways of misusing computers.
Summary: Teacher goes over the topic once again to enhance better understanding.
Wrap-up [conclusion]: Teacher corrects and marks pupils’ notes.
1. Identify ways of misusing computer
2. List ways of misusing computers.
[mediator_tech]
1. Piracy involves using software without __________.
a) installation
b) authorization
c) registration
d) updates
2. Job losses can occur when operations are replaced by __________.
a) automation
b) manual labor
c) physical tasks
d) teamwork
3. Invasion of privacy can occur when receiving unsolicited emails from unknown __________.
a) friends
b) colleagues
c) companies
d) family members
4. Fraud may occur during online transactions when __________.
a) payments are made
b) information is shared
c) goods are delivered
d) services are provided
5. Stealing passwords can lead to unauthorized __________.
a) access
b) sharing
c) deletion
d) storage
6. Cyberbullying involves using technology to __________ others.
a) protect
b) support
c) encourage
d) harm
7. Hacking refers to gaining unauthorized access to __________ systems.
a) software
b) hardware
c) network
d) physical
8. Phishing involves tricking individuals into revealing their __________ information.
a) personal
b) financial
c) educational
d) medical
9. Malware refers to malicious __________ that can harm computer systems.
a) software
b) hardware
c) websites
d) documents
10. Identity theft occurs when someone steals another person’s __________ information.
a) financial
b) educational
c) medical
d) personal
11. Spam refers to unsolicited __________ sent in bulk.
a) emails
b) text messages
c) phone calls
d) social media posts
12. Cyberstalking involves persistently __________ someone online.
a) supporting
b) protecting
c) following
d) ignoring
13. Virus attacks can corrupt __________ and disrupt computer operations.
a) hardware
b) software
c) networks
d) emails
14. Online scams involve deceiving individuals to gain __________ benefits.
a) financial
b) educational
c) social
d) personal
15. Data breaches occur when unauthorized individuals access __________ information.
a) personal
b) financial
c) educational
d) medical
16. Cyber espionage involves unauthorized access to __________ information.
a) personal
b) financial
c) government
d) educational
17. Social engineering refers to manipulating individuals to gain __________ information.
a) personal
b) financial
c) educational
d) medical
18. Online harassment involves engaging in __________ behavior towards others.
a) supportive
b) friendly
c) positive
d) abusive
19. Data manipulation refers to unauthorized changes made to __________.
a) hardware
b) software
c) websites
d) documents
20. Cyberterrorism involves using __________ for malicious purposes.
a) technology
b) social media
c) encryption
d) collaboration
[mediator_tech]
Week: FIVE
Date:
Class: Basic Six
Subject: ICT
Duration: 40 minutes
Topics: CARING FOR COMPUTER HARDWARE
SUB-Topic (s):
1. Caring for Computer Systems
2. Ways of Caring for Computer Systems
3. Reasons for Caring for Computer Systems
Behavioural objectives: At the end of the lesson, pupils should be able to;
1. List ways of caring for computer or list ways of taking good care of a computer system;
2. Mention ways of caring for computer monitor and keyboards;
3. State reasons for taking care of computers; list ways of protecting computers.
Instructional material/Reference material: Foundation Computer Studies for Primary Schools Book 6 by E. O. Adegbeyeni.
computer system, ups, stabilizer, monitor, table, fan, air conditionings, hard disk, Neat duster, Cotton, Wool, Furniture, Spirit, Antivirus CD, etc.
Building Background/ Connection to prior knowledge: Pupils are familiar with the topics in their previous class.
INTRODUCTION
Hardware is the physical computer equipment that we can see and touch. They include:
1. The input devices such as a mouse and keyboard, the processing device like system unit.
2. The output device like printers and video display units (VDU).
3. Other hardware includes speaker, scanner, microphone and joystick.
STEPS FOR CARING FOR COMPUTER HARDWARE
1. Position the computer properly.
2. Keep in an appropriate (air conditioned) environment.
3. Make use of UPS and stabilizer.
4. Avoid liquid dropping into the system.
5. Avoid food particles.
6. Use dust covers.
7. Unplug the system when not in use for long.
REASONS FOR TAKING CARE OF COMPUTER
1. Avoid damages.
2. Protect the system.
3. Prolong the life of the files in the system.
4. Make the user comfortable for maximum efficiency.
WAYS OF PROTECTING COMPUTERS
There are numerous ways to protect and remove malware from our computers. No one method is enough to ensure your computer is secure. The more layers of defense, the harder for hackers to use your computer.
Here are five simple, but critical steps to protect your computer,
1. Install Firewall
2. Install Antivirus Software
3. Install Anti-Spyware Software
4. Use Complex and Secure Passwords
5. Check on the Security Settings of the Browser.
1. Name three ways of caring for the computer;
2. Give two reasons for caring for the computer;
3. List two ways of protecting computers.
Strategies & Activities
Step: Teacher revises the previous topic
Step 2: Teacher introduces the new topic.
Step 3: Teacher endeavors to explain all the points to the pupils thoroughly.
Step 4: Teacher welcomes pupils’ questions.
Step 5: Teacher evaluates the pupils.
Assessment& Evaluation
Summary: Teacher goes over the topic once again to enhance better understanding.
Wrap-up [conclusion]: Teacher corrects and marks pupils’ notes.
[mediator_tech]
1. Name three ways of caring for the computer:
a) ___________________
b) ___________________
c) ___________________
2. Give two reasons for caring for the computer:
a) ___________________
b) ___________________
3. List two ways of protecting computer hardware:
a) ___________________
b) ___________________
4. Hardware refers to the __________ computer equipment.
5. Input devices include the __________ and __________.
6. Output devices include __________ and __________.
7. Other hardware devices include __________, __________, __________, and __________.
8. Positioning the computer properly is a step for __________ computer hardware.
9. Keeping the computer in an appropriate environment helps __________.
10. Using UPS and stabilizer is a way to __________ computer hardware.
11. Liquid dropping into the system can __________ the computer.
12. Food particles should be __________ to protect the computer.
13. Dust covers are used to __________ computer hardware.
14. Unplugging the system when not in use for long helps __________ computer hardware.
15. Installing a firewall is a way of __________ the computer.
16. Installing antivirus software helps __________ the computer.
17. Installing anti-spyware software is a way to __________ the computer.
18. Using complex and secure passwords __________ the computer.
19. Checking the security settings of the browser is a step to __________ the computer.
20. Taking care of computer hardware helps avoid __________ and protect the __________.
Answers:
1. Name three ways of caring for the computer:
a) Position the computer properly.
b) Keep it in an appropriate environment.
c) Use dust covers.
2. Give two reasons for caring for the computer:
a) Avoid damages.
b) Protect the system.
3. List two ways of protecting computer hardware:
a) Use UPS and stabilizer.
b) Avoid liquid dropping into the system.
[mediator_tech]
Week: SIX
Date:
Class: Basic Six
Subject: ICT
Duration: 40 minutes
Topics: CARING FOR COMPUTER USERS
Sub-Topic (s):
Caring for Computer Users
Behavioural objectives: At the end of the lesson, pupils should be able to;
1. Enumerate ways of caring for computer users.
2. Demonstrate correct sitting posture.
3. Arrange chairs and computer systems
Instructional material/Reference material: Foundation Computer Studies for Primary Schools Book 6 by E. O. Adegbeyeni.
computer system, ups, stabilizer, monitor, table, fan, air conditionings, hard disk, Neat duster, Cotton, Wool, Furniture, Spirit, Antivirus CD, etc.
Building Background/ Connection to prior knowledge: Pupils are familiar with the topics in their previous class.
INTRODUCTION
Human ware refers to the human beings that use the system. In other words, the users of the computer system are the end – users and professional alike.
CARING FOR COMPUTER USERS
1. Sitting position/posture.
2. Using anti – glare protector.
3. Maintaining dust free.
4. Replace faulty components.
5. Ventilation
1. Enumerate ways of caring for computer users.
2. Demonstrate correct sitting posture.
3. Arrange chairs and computer systems.
Strategies & Activities
Step: Teacher revises the previous topic
Step 2: Teacher introduces the new topic.
Step 3: Teacher endeavors to explain all the points to the pupils thoroughly.
Step 4: Teacher welcomes pupils’ questions.
Step 5: Teacher evaluates the pupils.
Assessment& Evaluation
Summary: Teacher goes over the topic once again to enhance better understanding.
Wrap-up [conclusion]: Teacher corrects and marks pupils’ notes.
[mediator_tech]
1. Hardware refers to the physical computer equipment that we can __________.
a) see and touch
b) hear and touch
c) smell and taste
d) imagine and dream
2. Input devices include __________ and __________.
a) mouse, keyboard
b) printer, scanner
c) monitor, CPU
d) speakers, microphone
3. Output devices include __________ and __________.
a) printer, scanner
b) mouse, keyboard
c) monitor, CPU
d) speakers, microphone
4. Other hardware devices include __________, __________, __________, and __________.
a) mouse, keyboard, printer, scanner
b) speakers, microphone, joystick, webcam
c) monitor, CPU, hard drive, motherboard
d) software, cables, network devices, power supply
5. Positioning the computer properly is a step for caring for computer __________.
a) software
b) hardware
c) peripherals
d) connectivity
6. Keeping the computer in an appropriate environment helps __________.
a) improve performance
b) reduce power consumption
c) prevent hardware failure
d) all of the above
7. Using UPS and stabilizer is a way to ensure __________ for the computer.
a) secure data transmission
b) efficient cooling
c) stable power supply
d) fast processing speed
8. Liquid dropping into the system should be __________.
a) encouraged for cleaning
b) avoided to prevent damage
c) done for maintenance
d) necessary for cooling
9. Food particles should be __________ to protect the computer.
a) stored inside the computer
b) cleaned regularly
c) used as a power source
d) ignored as they do not affect the computer
10. Using dust covers helps __________ computer hardware.
a) protect
b) heat
c) clean
d) repair
11. Unplugging the system when not in use for long helps __________ computer hardware.
a) extend the lifespan of
b) optimize the performance of
c) enhance the aesthetics of
d) reduce the cost of
12. Reasons for taking care of the computer include avoiding __________.
a) learning new skills
b) improving productivity
c) financial losses
d) social media addiction
13. Taking care of computer hardware helps protect the __________.
a) user’s privacy
b) software licenses
c) internet connection
d) overall system security
14. Caring for the computer prolongs the life of __________ in the system.
a) viruses
b) malware
c) files
d) cookies
15. Caring for computer hardware makes the user comfortable for maximum __________.
a) entertainment
b) creativity
c) efficiency
d) relaxation
16. One way to protect the computer is to install a __________.
a) keyboard
b) mouse
c) firewall
d) scanner
17. Installing antivirus software helps protect the computer from __________.
a) power outages
b) data loss
c) malware
d) hardware failure
18. Anti-spyware software is used to remove __________ from the computer.
a) viruses
b) cookies
c) spyware
d) hardware
[mediator_tech]
Week: SEVEN
Date:
Class: Basic Six
Subject: ICT
Duration: 40 minutes
Topics: REASONS FOR CARES OF COMPUTER USERS
Sub-Topic (s):
Behavioural objectives: At the end of the lesson, pupils should be able to;
state reason why we should take care of human ware.
Instructional material/Reference material: Foundation Computer Studies for Primary Schools Book 6 by E. O. Adegbeyeni; chair, table and computer system.
Building Background/ Connection to prior knowledge: Pupils are familiar with the topics in their previous class.
INTRODUCTION
Human ware refers to the human beings that use the system.
In other words, the users of the computer system are the end – users and professional alike.
REASONS FOR CARING FOR COMPUTER USERS
1. Reduce fatigue
Using the computer for a long time causes fatigues, tiredness, and other forms of human unrest. This situation, if not checked, may have a hazardous effect on the health of the user.
2. Stimulate interest in computing
3. Promoting healthy habits
By practicing good posture and taking breaks to allow the body to rest.
4. Supervise the children’s use of the computer.
Strategies & Activities
Step: Teacher revises the previous topic
Step 2: Teacher introduces the new topic.
Step 3 : Teacher endeavors to explain all the points to the pupils thoroughly.
Step 4: Teacher welcomes pupils’ questions.
Step 5: Teacher evaluates the pupils.
Assessment& Evaluation
List two (2) ways of caring for computer users.
Summary: Teacher goes over the topic once again to enhance better understanding.
Wrap-up [conclusion]: Teacher corrects and marks pupils’ notes.
[mediator_tech]
1. Caring for computer users helps reduce __________ caused by long computer usage.
a) fatigue
b) boredom
c) excitement
d) creativity
2. Caring for computer users helps stimulate __________ in computing.
a) fatigue
b) interest
c) disinterest
d) confusion
3. Promoting healthy habits involves practicing good posture and taking __________ to rest.
a) long breaks
b) frequent breaks
c) no breaks
d) random breaks
4. It is important to supervise __________ use of the computer.
a) adults’
b) employees’
c) parents’
d) children’s’
Answers:
1. Caring for computer users helps reduce fatigue caused by long computer usage.
2. Caring for computer users helps stimulate interest in computing.
3. Promoting healthy habits involves practicing good posture and taking frequent breaks to rest.
4. It is important to supervise children’s use of the computer.