# PRIMARY 6 THIRD TERM LESSON NOTE PLAN ICT COMPUTER STUDIES

Week: One

Date:

Class: Basic Six

Subject: ICT

Duration: 40 minutes

Topics: DRAWING WITH PAINT ARTISTS

SUB-Topic (s):

1.Draw Geometrical Figures (Lines, Eclipse and Rectangles)

2. Draw Objects with Freehand

Behavioural objectives: At the end of the lesson, pupils should be able to;

1. draw geometrical figures(lines, ellipses and rectangles).

2. do freehand drawing of objects and figures.

Instructional material/Reference material: Foundation Computer Studies for Primary Schools Book 6 by E. O. Adegbeyeni.

A functional computer system with Paint Artist software (or Corel Draw) installed.

Building Background/ Connection to prior knowledge: Pupils are familiar with the topics in their previous class

CONTENT OF THE LESSON

DRAWING A LINE

To draw a line:

1. Click the line tool.

2. To draw the line, drag the pointer.

Draw a perfectly horizontal, vertical, or diagonal line.

DRAWING A RECTANGLE

To draw a rectangle

1. Click on the rectangle tool.

2. Drag from the upper end to the lower end of the page.

3. Go back to the pick tool and then the rectangle tool.

Draw and paint a rectangle.

DRAWING A CIRCLE

To draw a circle:

1. Click the ellipses tool.

2. Click and draw on the page to produce a circle.

Draw and paint a circle.

FREEHAND DRAWINGS

Draw objects like boxes, fish, tins, cow, fan, cars etc using freehand.

Strategies & Activities

Step: Teacher revises the previous topic

Step 2:Teacher introduces the new topic.

Step 3:Teacher endeavors to explain all the points to the pupils thoroughly.

Step 4: Teacher welcomes pupils questions.

Step 5: Teacher evaluates the pupils.

Assessment& Evaluation

1. Draw geometrical figures (lines, ellipses and rectangles).

2. Do freehand drawing of objects and figures.

Summary: Teacher goes over the topic once again to enhance better understanding.

Wrap-up [conclusion]: Teacher corrects and marks pupils’ notes.

To create freehand drawings in computer studies, you can use various drawing tools available in software programs or online applications. Follow these steps to draw freehand objects:

1. Open a drawing software program or an online drawing tool.

2. Select the freehand drawing tool. It is usually represented by a pencil or brush icon.

3. Adjust the size and thickness of the drawing tool if necessary. This option is often located in the toolbar or settings panel.

4. Start drawing your object by clicking and dragging the pointer on the canvas. Remember, freehand drawings do not require perfect precision, so you can let your creativity flow.

5. Experiment with different strokes, curves, and angles to create the desired shape. You can draw objects like boxes, fish, tins, cows, fans, cars, or any other thing you can imagine.

6. If you make a mistake or want to modify your drawing, most drawing tools have an eraser or undo option available. Use these features to make corrections.

7. Once you are satisfied with your freehand drawing, you can add colors to it. Select the color palette or color picker tool, choose the desired color, and apply it to your drawing. You can also use different brush styles or patterns to enhance the appearance of your artwork.

8. Finally, save your drawing in a suitable format, such as JPEG or PNG, if you want to keep it for future use or share it with others.

Remember, freehand drawings are an excellent way to express your creativity and practice your drawing skills using digital tools. Have fun and explore different techniques to create unique and imaginative artwork.

[mediator_tech]

1. To draw a line, click the __________ tool.
a) pencil
b) rectangle
c) line
d) circle

2. To draw a line, you need to __________ the pointer.
a) click
b) drag
c) resize
d) delete

3. A perfectly vertical line goes _________.
a) up and down
b) left and right
c) diagonally
d) in a circular motion

4. To draw a rectangle, click on the __________ tool.
a) line
b) pencil
c) circle
d) rectangle

5. When drawing a rectangle, drag from the _________ end to the _________ end of the page.
a) left, right
b) right, left
c) upper, lower
d) lower, upper

6. After drawing a rectangle, you can go back to the pick tool and then the __________ tool.
a) line
b) pencil
c) circle
d) rectangle

7. To draw a circle, click the __________ tool.
a) ellipse
b) rectangle
c) line
d) circle

8. To produce a circle, click and __________ on the page.
a) drag
b) resize
c) delete
d) draw

9. Freehand drawings allow you to draw objects using __________.
a) perfect precision
b) straight lines only
c) predefined shapes
d) creative strokes

10. Draw objects like boxes, fish, tins, cow, fan, cars, etc., using __________.
a) the line tool
b) the rectangle tool
c) freehand drawings
d) the circle tool

11. The tool used to draw a line is called the __________ tool.
a) pencil
b) eraser
c) shape
d) brush

12. When drawing a rectangle, the dragging action is done from the __________ to the __________ of the page.
a) top, bottom
b) bottom, top
c) left, right
d) right, left

13. The tool used to draw a circle is called the __________ tool.
a) ellipse
b) rectangle
c) line
d) circle

14. To draw a perfectly horizontal line, you need to drag the pointer __________.
a) up and down
b) left and right
c) diagonally
d) in a circular motion

15. Freehand drawings allow you to express your __________.
a) creativity
b) precision
c) technical skills
d) mathematical abilities

16. The rectangle tool is used to draw __________ shapes.
a) square
b) circular
c) triangular
d) rectangular

17. When drawing a circle, you need to __________.
a) click and drag
b) click and release
c) click and double-click
d) click and rotate

18. Freehand drawings do not require __________.
a) creativity
b) precision
c) imagination
d) predefined shapes

19. To draw a diagonal line, you need to drag the pointer __________.
a) up and down
b) left and right

[mediator_tech]

Week: TWO

Date:

Class: Basic Six

Subject: ICT

Duration: 40 minutes

Topics: COMPUTER AND THE SOCIETY

SUB-Topic (s):

1. Small Scale Applications of Computer in the Society

2. Large Scale Applications of Computer in the Society

Behavioural objectives: At the end of the lesson, pupils should be able to;

1. mention small scale application of computer in the society;

2. mention large scale application of computer in the society

Instructional material/Reference material: Foundation Computer Studies for Primary Schools Book 6 by E. O. Adegbeyeni.

1. Digital watch

2. Automatic door lock

3. Auto pilot

4. Picture Charts

Building Background/ Connection to prior knowledge: Pupils are familiar with the topics in their previous class

CONTENT OF THE LESSON

INTRODUCTION

Computer and computer applications are used in various aspects of human activity. In fact, most professions have application software written specifically for them to solve certain tasks.

Architects have the AUTOCAD software that aid in the design of building and other structures.

SMALL SCALE APPLICATION OF COMPUTER IN THE SOCIETY

1. Digital Wrist watches replacing clock.

2. Word Processing replacing manual typewriting.

3. Automatic door locks replacing manual locks.

4. Automatic Gates in houses replacing manual gates.

5. Automatic traffic control system replacing human traffic wardens.

6. Computer Desktop Publishing in printing presses to reduce pre-press processes.

7. CAT – Scan replacing X – Ray.

8. Computer aided graphic designing replacing manual drawings.

9. Computer aided architectural designs replacing manual drawings.

10. Computer aided animation in the entertainment and TV broadcasting.

11. Video Projection for presentation replacing manual papers.

12. Digital and Video phones replacing analogue telephones.

LARGE SCALE APPLICATIONS OF COMPUTER OF THE SOCIETY

1. Auto pilot used in airplanes.

2. Satellite communications like CNN, Weather Forecasting, TV Broadcasting.

3. Office Automation like Word Processing Electronic mail, Internet.

4. Space Shuttle

5. Robotics in engineering.

6. Automatic Teller Machine used to withdraw money.

7. Global electronic air ticketing system.

8. Global Telephone and GSM Communication.

9. Oil Exploration and Drilling Operations.

10. Computer Chips Manufacturing firms.

Strategies & Activities

Step: Teacher revises the previous topic

Step 2: Teacher introduces the new topic.

Step 3: Teacher endeavors to explain all the points to the pupils thoroughly.

Step 4: Teacher welcomes pupils questions.

Step 5: Teacher evaluates the pupils.

Assessment& Evaluation

1. Mention small scale application of computer in the society;

2. Mention large scale application of computer in the society.

Summary: Teacher goes over the topic once again to enhance better understanding.

Wrap-up [conclusion]: Teacher corrects and marks pupils notes.

[mediator_tech]

1. Architects use _________ software for designing buildings and structures.
b) Photoshop
c) Microsoft Word
d) Excel

2. Digital wristwatches have replaced _________.
a) calendars
b) clocks
c) calculators
d) smartphones

3. Word processing has replaced _________.
a) manual writing
b) telephones
c) fax machines
d) manual typewriting

4. Automatic door locks have replaced _________.
a) windows
b) keys
c) doorknobs
d) walls

5. Automatic gates in houses have replaced _________.
a) fences
b) walls
c) manual gates
d) security guards

6. Automatic traffic control systems have replaced _________.
a) traffic lights
b) pedestrians
c) human traffic wardens

7. CAT-Scan has replaced _________.
a) MRI machines
b) X-Ray
c) blood tests
d) physical examinations

8. Computer-aided graphic designing has replaced _________.
a) manual drawings
b) photography
c) painting
d) sculpture

9. Computer-aided architectural designs have replaced _________.
a) manual calculations
b) blueprints
c) construction workers
d) building materials

10. Computer-aided animation is used in _________.
a) video games
b) music production
c) photography
d) medical research

11. Video projection is used for _________.
a) watching movies
b) presentations
c) photography
d) live streaming

12. Digital and video phones have replaced _________.
a) landline phones
b) smartphones
c) fax machines
d) televisions

13. Computer applications are specifically designed to solve tasks related to _________.
a) human activity
b) animal behavior
c) weather patterns
d) geological formations

14. Architects use _________ software for designing buildings and structures.
b) Photoshop
c) Microsoft Word
d) Excel

15. Digital wristwatches have replaced _________.
a) calendars
b) clocks
c) calculators
d) smartphones

16. Word processing has replaced _________.
a) manual writing
b) telephones
c) fax machines
d) manual typewriting

17. Automatic door locks have replaced _________.
a) windows
b) keys
c) doorknobs
d) walls

18. Automatic gates in houses have replaced _________.
a) fences
b) walls
c) manual gates
d) security guards

19. Automatic traffic control systems have replaced _________.
a) traffic lights
b) pedestrians
c) human traffic wardens

20. CAT-Scan has replaced _________.
a) MRI machines
b) X-Ray
c) blood tests
d) physical examinations

[mediator_tech]

Week: THREE

Date:

Class: Basic Six

Subject: ICT

Duration: 40 minutes

Topics: CAREER OPPORTUNITIES IN COMPUTING

SUB-Topic (s):

Behavioural objectives: At the end of the lesson, pupils should be able to;

1. List career opportunities associated with computer usage;

2. Mention their future career.

Instructional material/Reference material: Foundation Computer Studies for Primary Schools Book 6 by E. O. Adegbeyeni.

1. functional computer system.

Building Background/ Connection to prior knowledge: Pupils are familiar with the topics in their previous class

INTRODUCTION

There are various career opportunities in the computer or IT profession as it is commonly referred to now as every area of human activity use it.

Also, most engineering based products have one computer – based device or another working inside it.

CAREERS OPPORTUNITIES IN COMPUTER

There are many careers opportunities in computer, these include:

1. Teacher

To teach at primary, secondary and tertiary levels.

2. Computer Programming

To write computer programs.

3. Computer Engineering

To assemble and repairs computers.

4. Computer Analysts

To determine programs inside computers.

5. Hardware Maintenance and Support

To service computers.

Offer computer solutions to business problems.

7. Database Management Support

To take care of data stored.

8. Telecommunications Engineers

To take of mobile phones, masts and other equipment.

9. Computer Operations

Computer operator, data entry clerk, librarian, etc. that work daily with the computer.

10. Computer Auditing

To check that the use of the computer is correct.

11. Computer Security

To ensure protection of computer and data.

12. Linguists

To write technical and user manuals in different languages.

Strategies & Activities

Step: Teacher revises the previous topic

Step 2: Teacher introduces the new topic.

Step 3: Teacher endeavors to explain all the points to the pupils thoroughly.

Step 4: Teacher welcomes pupils’ questions.

Step 5: Teacher evaluates the pupils.

Assessment& Evaluation

1. List five (5) career opportunities associated with computer usage;

2. Mention their future career.

Summary: Teacher goes over the topic once again to enhance better understanding.

Wrap-up [conclusion]: Teacher corrects and marks pupils’ notes.

[mediator_tech]

1. To teach at primary, secondary, and tertiary levels, one can pursue a career as a __________.
a) teacher
b) programmer
c) engineer
d) analyst

2. Computer programming involves writing __________.
a) books
b) computer programs
c) reports
d) music

3. Computer engineering focuses on assembling and __________ computers.
a) designing
b) repairing
c) analyzing
d) programming

4. Computer analysts are responsible for determining __________ inside computers.
a) users
b) programs
c) networks
d) databases

5. Hardware maintenance and support professionals provide __________ for computers.
b) training
c) servicing
d) sales

6. Business analysts offer computer solutions to __________ problems.
a) personal
d) medical

7. Database management support involves taking care of __________ stored.
a) hardware
b) software
c) data
d) networks

8. Telecommunications engineers are responsible for managing __________ equipment.
a) televisions
c) mobile phones
d) cameras

9. Computer operations include roles such as computer operator, data entry clerk, and __________.
a) librarian
b) accountant
c) engineer
d) technician

10. Computer auditing involves checking the __________ of computer use.
a) efficiency
b) accuracy
c) legality
d) security

11. Computer security professionals ensure the __________ of computer systems.
a) availability
b) efficiency
c) protection
d) usability

12. Network administrators are responsible for managing __________.
a) software development
b) database systems
c) computer networks
d) computer hardware

13. Web development involves creating and maintaining __________.
a) websites
b) computer games
c) mobile apps
d) software programs

14. Data scientists analyze and interpret __________.
a) computer programs
c) user feedback
d) large sets of data

15. IT project managers oversee __________.
a) software testing
b) hardware manufacturing
d) data analysis

16. User experience (UX) designers focus on enhancing __________.
a) computer security
b) hardware performance
c) software functionality
d) user satisfaction

17. System administrators are responsible for managing __________.
a) computer networks
b) financial transactions
c) marketing campaigns
d) customer relationships

18. IT consultants provide __________ to businesses.
b) financial planning
c) technical expertise
d) customer support

19. Software testers ensure the __________ of software applications.
a) efficiency
b) accuracy
c) security
d) reliability

20. Cloud computing specialists manage __________.
a) physical servers
b) computer viruses
c) virtualized resources
d) social media platforms

[mediator_tech]

Week: FOUR

Date:

Class: Basic Six

Subject: ICT

Duration: 40 minutes

Topics: MISUSE OF COMPUTER

SUB-Topic (s): Area Where Computers have been Misuse

Behavioural objectives: At the end of the lesson, pupils should be able to;

1. Identify ways of misusing computer;

2. List ways of misusing computers.

Instructional material/Reference material: Foundation Computer Studies for Primary Schools Book 6 by E. O. Adegbeyeni.

functional computer system.

Building Background/ Connection to prior knowledge: Pupils are familiar with the topics in their previous class.

INTRODUCTION

AREAS OF COMPUTER MISUSE

There are however many areas where computer has been used for wrong or negative things. These are include:

1. Piracy

Computer software are written by computer programmers for sale. However, a lot of users simply get copies of software from friends and colleagues for use on their system without paying for it.

2. Job losses

As a result of the fact that many operations are now done by the computer, people who are not literate in computer use are likely to lose their jobs.

3. Invasion of privacy

Many people now have access to the Internet and have email addresses. It is now common to receive emails from people or companies you don’t know anything about trying to pass information or sell something to you.

4. Fraud

Goods and services are sold and bought on the internet. We need to know the people we deal with. Otherwise, goods or services purchased many never be delivered as it may be a fraud.

5. Stealing

People can steal password and withdraw money from bank accounts through the ATM machine or the internet.

Strategies & Activities

Step: Teacher revises the previous topic

Step 2: Teacher introduces the new topic.

Step 3: Teacher endeavors to explain all the points to the pupils thoroughly.

Step 4: Teacher welcomes pupils’ questions.

Step 5: Teacher evaluates the pupils.

Assessment& Evaluation

1. Identify ways of misusing computer

2. List ways of misusing computers.

Summary: Teacher goes over the topic once again to enhance better understanding.

Wrap-up [conclusion]: Teacher corrects and marks pupils’ notes.

1. Identify ways of misusing computer

2. List ways of misusing computers.

[mediator_tech]

1. Piracy involves using software without __________.
a) installation
b) authorization
c) registration

2. Job losses can occur when operations are replaced by __________.
a) automation
b) manual labor
d) teamwork

3. Invasion of privacy can occur when receiving unsolicited emails from unknown __________.
a) friends
b) colleagues
c) companies
d) family members

4. Fraud may occur during online transactions when __________.
b) information is shared
c) goods are delivered
d) services are provided

a) access
b) sharing
c) deletion
d) storage

6. Cyberbullying involves using technology to __________ others.
a) protect
b) support
c) encourage
d) harm

a) software
b) hardware
c) network
d) physical

8. Phishing involves tricking individuals into revealing their __________ information.
a) personal
b) financial
c) educational
d) medical

9. Malware refers to malicious __________ that can harm computer systems.
a) software
b) hardware
c) websites
d) documents

10. Identity theft occurs when someone steals another person’s __________ information.
a) financial
b) educational
c) medical
d) personal

11. Spam refers to unsolicited __________ sent in bulk.
a) emails
b) text messages
c) phone calls
d) social media posts

12. Cyberstalking involves persistently __________ someone online.
a) supporting
b) protecting
c) following
d) ignoring

13. Virus attacks can corrupt __________ and disrupt computer operations.
a) hardware
b) software
c) networks
d) emails

14. Online scams involve deceiving individuals to gain __________ benefits.
a) financial
b) educational
c) social
d) personal

15. Data breaches occur when unauthorized individuals access __________ information.
a) personal
b) financial
c) educational
d) medical

a) personal
b) financial
c) government
d) educational

17. Social engineering refers to manipulating individuals to gain __________ information.
a) personal
b) financial
c) educational
d) medical

18. Online harassment involves engaging in __________ behavior towards others.
a) supportive
b) friendly
c) positive
d) abusive

19. Data manipulation refers to unauthorized changes made to __________.
a) hardware
b) software
c) websites
d) documents

20. Cyberterrorism involves using __________ for malicious purposes.
a) technology
b) social media
c) encryption
d) collaboration

[mediator_tech]

Week: FIVE

Date:

Class: Basic Six

Subject: ICT

Duration: 40 minutes

Topics: CARING FOR COMPUTER HARDWARE

SUB-Topic (s):

1. Caring for Computer Systems

2. Ways of Caring for Computer Systems

3. Reasons for Caring for Computer Systems

Behavioural objectives: At the end of the lesson, pupils should be able to;

1. List ways of caring for computer or list ways of taking good care of a computer system;

2. Mention ways of caring for computer monitor and keyboards;

3. State reasons for taking care of computers; list ways of protecting computers.

Instructional material/Reference material: Foundation Computer Studies for Primary Schools Book 6 by E. O. Adegbeyeni.

computer system, ups, stabilizer, monitor, table, fan, air conditionings, hard disk, Neat duster, Cotton, Wool, Furniture, Spirit, Antivirus CD, etc.

Building Background/ Connection to prior knowledge: Pupils are familiar with the topics in their previous class.

INTRODUCTION

Hardware is the physical computer equipment that we can see and touch. They include:

1. The input devices such as a mouse and keyboard, the processing device like system unit.

2. The output device like printers and video display units (VDU).

3. Other hardware includes speaker, scanner, microphone and joystick.

STEPS FOR CARING FOR COMPUTER HARDWARE

1. Position the computer properly.

2. Keep in an appropriate (air conditioned) environment.

3. Make use of UPS and stabilizer.

4. Avoid liquid dropping into the system.

5. Avoid food particles.

6. Use dust covers.

7. Unplug the system when not in use for long.

REASONS FOR TAKING CARE OF COMPUTER

1. Avoid damages.

2. Protect the system.

3. Prolong the life of the files in the system.

4. Make the user comfortable for maximum efficiency.

WAYS OF PROTECTING COMPUTERS

There are numerous ways to protect and remove malware from our computers. No one method is enough to ensure your computer is secure. The more layers of defense, the harder for hackers to use your computer.

Here are five simple, but critical steps to protect your computer,

1. Install Firewall

2. Install Antivirus Software

3. Install Anti-Spyware Software

4. Use Complex and Secure Passwords

5. Check on the Security Settings of the Browser.

1. Name three ways of caring for the computer;

2. Give two reasons for caring for the computer;

3. List two ways of protecting computers.

Strategies & Activities

Step: Teacher revises the previous topic

Step 2: Teacher introduces the new topic.

Step 3: Teacher endeavors to explain all the points to the pupils thoroughly.

Step 4: Teacher welcomes pupils’ questions.

Step 5: Teacher evaluates the pupils.

Assessment& Evaluation

Summary: Teacher goes over the topic once again to enhance better understanding.

Wrap-up [conclusion]: Teacher corrects and marks pupils’ notes.

[mediator_tech]

1. Name three ways of caring for the computer:
a) ___________________
b) ___________________
c) ___________________

2. Give two reasons for caring for the computer:
a) ___________________
b) ___________________

3. List two ways of protecting computer hardware:
a) ___________________
b) ___________________

4. Hardware refers to the __________ computer equipment.

5. Input devices include the __________ and __________.

6. Output devices include __________ and __________.

7. Other hardware devices include __________, __________, __________, and __________.

8. Positioning the computer properly is a step for __________ computer hardware.

9. Keeping the computer in an appropriate environment helps __________.

10. Using UPS and stabilizer is a way to __________ computer hardware.

11. Liquid dropping into the system can __________ the computer.

12. Food particles should be __________ to protect the computer.

13. Dust covers are used to __________ computer hardware.

14. Unplugging the system when not in use for long helps __________ computer hardware.

15. Installing a firewall is a way of __________ the computer.

16. Installing antivirus software helps __________ the computer.

17. Installing anti-spyware software is a way to __________ the computer.

18. Using complex and secure passwords __________ the computer.

19. Checking the security settings of the browser is a step to __________ the computer.

20. Taking care of computer hardware helps avoid __________ and protect the __________.

1. Name three ways of caring for the computer:
a) Position the computer properly.
b) Keep it in an appropriate environment.
c) Use dust covers.

2. Give two reasons for caring for the computer:
a) Avoid damages.
b) Protect the system.

3. List two ways of protecting computer hardware:
a) Use UPS and stabilizer.
b) Avoid liquid dropping into the system.

[mediator_tech]

Week: SIX

Date:

Class: Basic Six

Subject: ICT

Duration: 40 minutes

Topics: CARING FOR COMPUTER USERS

Sub-Topic (s):

Caring for Computer Users

Behavioural objectives: At the end of the lesson, pupils should be able to;

1. Enumerate ways of caring for computer users.

2. Demonstrate correct sitting posture.

3. Arrange chairs and computer systems

Instructional material/Reference material: Foundation Computer Studies for Primary Schools Book 6 by E. O. Adegbeyeni.

computer system, ups, stabilizer, monitor, table, fan, air conditionings, hard disk, Neat duster, Cotton, Wool, Furniture, Spirit, Antivirus CD, etc.

Building Background/ Connection to prior knowledge: Pupils are familiar with the topics in their previous class.

INTRODUCTION

Human ware refers to the human beings that use the system. In other words, the users of the computer system are the end – users and professional alike.

CARING FOR COMPUTER USERS

1. Sitting position/posture.

2. Using anti – glare protector.

3. Maintaining dust free.

4. Replace faulty components.

5. Ventilation

1. Enumerate ways of caring for computer users.

2. Demonstrate correct sitting posture.

3. Arrange chairs and computer systems.

Strategies & Activities

Step: Teacher revises the previous topic

Step 2: Teacher introduces the new topic.

Step 3: Teacher endeavors to explain all the points to the pupils thoroughly.

Step 4: Teacher welcomes pupils’ questions.

Step 5: Teacher evaluates the pupils.

Assessment& Evaluation

Summary: Teacher goes over the topic once again to enhance better understanding.

Wrap-up [conclusion]: Teacher corrects and marks pupils’ notes.

[mediator_tech]

1. Hardware refers to the physical computer equipment that we can __________.
a) see and touch
b) hear and touch
c) smell and taste
d) imagine and dream

2. Input devices include __________ and __________.
a) mouse, keyboard
b) printer, scanner
c) monitor, CPU
d) speakers, microphone

3. Output devices include __________ and __________.
a) printer, scanner
b) mouse, keyboard
c) monitor, CPU
d) speakers, microphone

4. Other hardware devices include __________, __________, __________, and __________.
a) mouse, keyboard, printer, scanner
b) speakers, microphone, joystick, webcam
c) monitor, CPU, hard drive, motherboard
d) software, cables, network devices, power supply

5. Positioning the computer properly is a step for caring for computer __________.
a) software
b) hardware
c) peripherals
d) connectivity

6. Keeping the computer in an appropriate environment helps __________.
a) improve performance
b) reduce power consumption
c) prevent hardware failure
d) all of the above

7. Using UPS and stabilizer is a way to ensure __________ for the computer.
a) secure data transmission
b) efficient cooling
c) stable power supply
d) fast processing speed

8. Liquid dropping into the system should be __________.
a) encouraged for cleaning
b) avoided to prevent damage
c) done for maintenance
d) necessary for cooling

9. Food particles should be __________ to protect the computer.
a) stored inside the computer
b) cleaned regularly
c) used as a power source
d) ignored as they do not affect the computer

10. Using dust covers helps __________ computer hardware.
a) protect
b) heat
c) clean
d) repair

11. Unplugging the system when not in use for long helps __________ computer hardware.
a) extend the lifespan of
b) optimize the performance of
c) enhance the aesthetics of
d) reduce the cost of

12. Reasons for taking care of the computer include avoiding __________.
a) learning new skills
b) improving productivity
c) financial losses

13. Taking care of computer hardware helps protect the __________.
a) user’s privacy
c) internet connection
d) overall system security

14. Caring for the computer prolongs the life of __________ in the system.
a) viruses
b) malware
c) files

15. Caring for computer hardware makes the user comfortable for maximum __________.
a) entertainment
b) creativity
c) efficiency
d) relaxation

16. One way to protect the computer is to install a __________.
a) keyboard
b) mouse
c) firewall
d) scanner

17. Installing antivirus software helps protect the computer from __________.
a) power outages
b) data loss
c) malware
d) hardware failure

18. Anti-spyware software is used to remove __________ from the computer.
a) viruses
c) spyware
d) hardware

[mediator_tech]

Week: SEVEN

Date:

Class: Basic Six

Subject: ICT

Duration: 40 minutes

Topics: REASONS FOR CARES OF COMPUTER USERS

Sub-Topic (s):

Behavioural objectives: At the end of the lesson, pupils should be able to;

state reason why we should take care of human ware.

Instructional material/Reference material: Foundation Computer Studies for Primary Schools Book 6 by E. O. Adegbeyeni; chair, table and computer system.

Building Background/ Connection to prior knowledge: Pupils are familiar with the topics in their previous class.

INTRODUCTION

Human ware refers to the human beings that use the system.

In other words, the users of the computer system are the end – users and professional alike.

REASONS FOR CARING FOR COMPUTER USERS

1. Reduce fatigue

Using the computer for a long time causes fatigues, tiredness, and other forms of human unrest. This situation, if not checked, may have a hazardous effect on the health of the user.

2. Stimulate interest in computing

3. Promoting healthy habits

By practicing good posture and taking breaks to allow the body to rest.

4. Supervise the children’s use of the computer.

Strategies & Activities

Step: Teacher revises the previous topic

Step 2: Teacher introduces the new topic.

Step 3 : Teacher endeavors to explain all the points to the pupils thoroughly.

Step 4: Teacher welcomes pupils’ questions.

Step 5: Teacher evaluates the pupils.

Assessment& Evaluation

List two (2) ways of caring for computer users.

Summary: Teacher goes over the topic once again to enhance better understanding.

Wrap-up [conclusion]: Teacher corrects and marks pupils’ notes.

[mediator_tech]

1. Caring for computer users helps reduce __________ caused by long computer usage.

a) fatigue

b) boredom

c) excitement

d) creativity

2. Caring for computer users helps stimulate __________ in computing.

a) fatigue

b) interest

c) disinterest

d) confusion

3. Promoting healthy habits involves practicing good posture and taking __________ to rest.

a) long breaks

b) frequent breaks

c) no breaks

d) random breaks

4. It is important to supervise __________ use of the computer.

b) employees’

c) parents’

d) children’s’