ICT

Digital Literacy in Action: Transforming Education, Employment, and Society Computer Studies JSS 3 First Term Lesson Notes Week 6

Subject: Computer Studies Class: JSS 3 Term: First Term Week: 6 Age: 13 – 15 years Topic: Digital Literacy (Continued) Sub-topic: Applications of Digital Literacy in Education, Workforce, and Society Duration: 40 minutes Behavioral Objectives: By the end of the lesson, students should be able to: Explain how digital literacy is applied in education. Describe

Inserting Date and Time Primary 3 ICT Second Term week 6

How to Insert and Edit Date and Time in Microsoft Word Inserting the date and time into your document is a simple but essential feature in Microsoft Word. Whether you’re creating reports, essays, or official documents, the Date and Time feature helps maintain proper formatting. Here’s a well-structured guide to help you insert, format, and

Bridging the Digital Divide: Understanding the Shift from Old to New Economies Computer Studies JSS 3 First Term Lesson Notes Week 3

WEEK 3: DIGITAL DIVIDE Topics: Meaning and Concept of Digital Divide. Features of Old Economy: Time-consuming processes, labor-based systems, mechanical operations. Limited by space, time, and mechanical constraints. Limitations of the Old Economy.   Subject: Computer Studies Class: JSS 3 Term: First Term Week: 3 Age: 13 – 15 years Topic: Digital Divide Sub-topic: Meaning

3rd Term Exam Questions Primary 1 Computer ICT

THIRD TERM PROMOTIONAL EXAMINATION  CLASS: PRIMARY 1 SUBJECT: COMPUTER STUDY   NAME:…………………………………………   The brain of the computer is inside the _________  (a) VDU  (b) system unit   (c) UPS The following are parts of computer except _______________(a) Basket (b) Keyboard (c) Mouse  The monitor looks like a __________  (a) Fan (b) Television (c) DVD

ICT exams ss 3 Second Term

Ss3 ICT Exams SS 3 Section A 1. The process by which a database is moved back to a consistent and usable state is called………. (a) cash recovery (b) crash recovery (c) past recovery (d) undo recovery 2. The recovery algorithm that uses no-force and steal approach is ………….. (a) ARIAS (b) ARIES (c) ARREARS