J S S 2 COMPUTER SCIENCE. EASTER TERM, LESSON 4. I.C.T
USES OF I.C.T
There are various ways in which information communication technology can be used such are:
(1). Information Gathering, Processing and Distributing: ICT is a major tool in information gathering, processing and distribution; for example, the use of computer to produce, edit and distribute news over the internet.
(2). Information Management: ICT is used to handle and manage information, because information can be better managed with ICT
(3). Information Security: ICT has many features that help to protect and secure information.
(4). Communication: Today, I.CT provides effective use of radio, TV, video and other multimedia devices such as the computer, mobile phone, and 3G for effective communication.
(5). Timing and Control: Operations are effectively timed by computer and other ICT media. These devices also offer effective control of resources, e.g. computer gadgets employed in traffic control.
Advantages of ICT
The benefits of ICT include:
1. Speed: With the introduction of ICT, processing and transactions are carried out faster than before.
(2). Flexibility Interaction: ICT also supports many types of interaction. Examples are one-on-one conference, and one-to-many people conference.
(3). Access to Information: There is better and cheaper access to knowledge and information. With ICT, many people can get information even in remote parts of the world.
(4). Globalisation: ICT has made distance become irrelevant in business transactions and dealings. For instance, one can stay in a room in Rivers State, Nigeria and carry out business in Lagos, Tokyo, Japan and USA.
(5). Timelines: Information is sent and received in reasonable time with ICT. Example: information sent can be received in any part of the world in a split of second by internet chatting, email, teleconferencing, etc.
(6). Effective Human Interaction: ICT has caused human beings to relate with one another in new and better ways.
(7). Innovation and Creativity: ICT has created so many new methods of communication such as the use of the internet, pager, computer, and the mobile phone.
(8). Media Integration: With ICT, so many media types can work together. For example, the mobile phone can be connected to the computer. Also information on the mobile phone can be transferred and viewed from a projector.
Disadvantages of ICT
(1). It can cause addiction disorder(AD): This is when people interact more with ICT gadgets than real people.
(2). The components are fragile: The ICT devices can easily break. They are fragile and need to be handle with absolute care to prevent damage.
(3). Job loss: people can lose their jobs as a result of ICT. This could be as a result of lack of computer skills, or due to ICT gadgets taking over human jobs. For example, you don’t need a dispatch rider to send an e-mail.
(4). It might require resources: ICT sometimes requires expensive equipment to carry out, which can be unacceptable to an average user.
(5). It requires extra cost to train users: To use ICT facilities, you must be well trained. At times the training can take place in a foreign land and can be very expensive.
(6). Destruction of human capital: Many old skills are no longer needed. As a result, such skills are lost.
Links between the computer and information and communication technology (ICT)
Information and communication technology (ICT) refers to broad field that includes computers, communication equipment and other resources that are related to them such as cellular networks, satellite communication, telephone, broadcast equipment and other forms of communication.
The computer is part of ICT and plays a major role in facilitating ICT. As a result, there are relationships and links between computers and ICT.
These include the following:
(1). All modern ICT gadgets are programmable just as computers are.
(2). Experience shows that people who understand the technology of the computer and how it operates are better ICT users.
(3). Most discoveries in IT and ICT were as a result of access to the computer.
(4) Computers can serve the functions of other ICT gadgets. For example, the computer can exchange information with the telephone, it can play video, it can tune to television stations, connect to the satellite, and can also play audio data like the radio.
(5). The computer, through the internet and ICT has created ‘Sovereign People’ , i.e. people who are empowered by their knowledge.
USING THE GSM and ICT GADGETS
A GSM phone on a network can be used in different ways to send and receive calls, texts messges, pictures, etc.
Creating and Sending Messages on a GSM Phone
1. Press the menu option.
2. Choose messages.
3. Choose text message.
4. Choose write message.
5. Type in your text.
6. Choose the right send option(send, save and send, etc) and press OK.
7. Enter the recipient’s number and press OK.
To tetrieve information on a GSM phone
1. Once the message comes in, the GSM phone beeps.
2. Select the Read to retrieve the message or select inbox to check the message and press OK.

Lessons

JSS2 COMPUTER SCIENCE, EASTER TERM, LESSON 3.

Author: Hadassah Melech

JSS 2, I.C.T, EASTER TERM, LESSON 3: I.C.T. Learning Objectives At the end of this lesson, students should be able to 1. State what ICT stands for. 2. List examples of ICT gadgets. 3. State the uses of ICT. 4. State the advantages and disadvantages of ICT. 5. Mention the links between the computer and ….  Read More

JSS2 COMPUTER SCIENCE, EASTER TERM, LESSON 9.

Author: Hadassah Melech

EASTER TERM, JSS 2 COMPUTER SCIENCE, LESSON 9: INTERNET(REVISION) Introduction We often write letters to our friends living in distance places, maybe in neigbouring cities or states or a far-off country like Australia, or Germany. You wonder when the mail will get there. You need not bother anymore about friends getting your letters in time. ….  Read More

JSS2 COMPUTER SCIENCE EASTER TERM EXAMINATION

Author: Hadassah Melech

YHWH HAMASCHIAC SCHOOL TERM: Easter Term Examination, COURSE: Computer Science, CLASS: JSS2, TIME/DATE: 2Hours. 31st March 2021, INSTRUCTIONS: Answer only four questions in all. 1. List five tools of Ms-Paints 10Marks 2. List and explain three main features of all graphic software. 5Marks 3. List and explain four menu in the paint window.5Marks 4. In ….  Read More

JSS 2 COMPUTER SCIENCE, SPRING TERM, LESSON ONE.

Author: Hadassah Melech

JSS2 COMPUTER SCIENCE, SPRING TERM, LESSON ONE(EASTER TERM RECAP/REVISION ON INTERNET) EASTER TERM, JSS 2 COMPUTER SCIENCE, LESSON 5: INTERNET Introduction We often write letters to our friends living in distance places, maybe in neigbouring cities or states or a far-off country like Australia, or Germany. You wonder when the mail will get there. You ….  Read More

JSS2 COMPUTER SCIENCE, SPRING TERM, LESSON TWO.

Author: Hadassah Melech

JSS2 COMPUTR SCIENCE, SPRING TERM,LESSON TWO…. HOW TO CREATE AN E-EMAIL. JSS 2 COMPUTER SCIENCE, EASTER TERM, LESSON 6: INERNET. The Electronic Mail (e-mail) E-mail is basically a file that is sent from one computer to another through a network. Some of the files are texts, scanned images, computer graphics and sound and video files, ….  Read More

JSS2 COMPUTER SCIENCE, SPRING TERM, LESSON THREE.

Author: Hadassah Melech

SPRING TERM, JSS 2 COMPUTER SCIENCE, LESSON 3…… INTERNET Introduction Writing letters to our friends living in distance places, maybe in neigbouring cities or states or a far-off country like New York, Japan, or Germany. You lament on the time the mail will get there. You need not to bother anymore about friends getting your ….  Read More

JSS2 COMPUTER SCIENCE, SPRING TERM, LESSON FIVE

Author: Hadassah Melech

JSS2 COMPUTER SCIENCE, SPRING TERM, LESSON FIVE……… COMPUTER INTERNET Introduction We often write letters to our friends living in distance places, maybe in neigbouring cities or states or a far-off country like Australia, or Germany. You wonder when the mail will get there. You need not bother anymore about friends getting your letters in time. ….  Read More

JSS2 COMPUTER SCIENCE, SPRING TERM, LESSON SIX.

Author: Hadassah Melech

JSS2 COMPUTER SCIENCE, SPRING TERM, LESSON SIX……… COMPUTER INTERNET Introduction We often write letters to our friends living in distance places, maybe in neigbouring cities or states or a far-off country like Australia, or Germany. You wonder when the mail will get there. You need not bother anymore about friends getting your letters in time. ….  Read More

JSS2 COMPUTER SCIENCE, SPRING TERM, LESSON SEVEN.

Author: Hadassah Melech

JSS2 COMPUTER SCIENCE, SPRING TERM, LESSON SEVEN….. HEALTH AND SAFETY MEASURES WHILE USING THE COMPUTER. Lesson preamble. Here, we are going to discuss the safety measures to take regarding health problems which emerges from constant use of the computer. They are · Use of anti-glare protector Eyes can become strained after staring at the computer ….  Read More

SPRING/THIRD TERM JSS2 CIMPUTER SCIENCE CONTINUOUS ASSESSMENT TEST.

Author: Hadassah Melech

YHWH HAMASCHIAC SCHOOL INTERNATIONAL SPRING/TERM CONTINUOUS ASSESSMENT TEST. COURSE: Computers Science, CLASS: JSS2, TIME: GUIDE: Answer only four questions in all. 1. What are the four necessary steps that a computer user can take to read an e-mail message? 2. Explain three methods of creating an e-mail on the yahoo site. 3. List five merits/advantages ….  Read More

JSS2 SPRING/THIRD TERM, COMPUTER SCIENCE C.A.T CORRECTIONS.

Author: Hadassah Melech

ANSWERS TO JSS2 COMPUTER SCIENCE SPRING TERM C.A QUESTIONS Answers to Question 1 1. To read an e-mail messages which you have received, take the following steps: 1. Move the mouse-pointer over the mail button on the standard toolbar of the Microsoft Internet Explorer screen. Then click the left mouse button on it. 2. Immediately, ….  Read More

JSS2 COMPUTER SCIENCE, SPRING/THIRD TERM, LESSON EIGHT.

Author: Hadassah Melech

JSS2 COMPUTER SCIENCE, SPRING/THIRD TERM, LESSON EIGHT……COMPUTER ETHICS COMPUTER ETHICS The word “ethics” simply means the lay down rules governing the behavior of group of people. So, computer Ethics is defined as the rules and regulations guiding the use of computer. The following are good ways to make use of the computer · Remove the ….  Read More

JSS2 COMPUTER STUDIES, SPRING/THIRD TERM, LESSON NINE.

Author: Hadassah Melech

JSS2 COMPUTER SCIENCE, SPRING/THIRD TERM ,LESSON NINE… JSS2 Next ABUSE OF THE INTERNET Specific objectives: By the end of this lesson, the students should be able to: Define abuse of the internet List different ways by which the internet can be abused Abuse of the Internet: The word “abuse” means the improper way of doing ….  Read More

JSS2 COMPUTER SCIENCE SPRING/THIRD TERM, EXAMINATION.

Author: Hadassah Melech

YHWH HAMASCHIAC SCHOOL INTERNATIONAL SPRING/THIRD TERM EXAMINATION. COURSE: Computers Science, CLASS: JSS2, TIME: GUIDE: Answer only four questions in all. 1. What are the four necessary steps that a computer user can take to read an e-mail message? 2. Explain three methods of creating an e-mail on the yahoo site. 3. List five merits/advantages of ….  Read More