Third Term Yr 8 lesson notes
Third Term Yr 8 lesson notes
0 Project:
Create an Email account on Yahoo or Gmail.
The internet
Internet is defined as a global electronic
communication network. It is one of
the largest networks that link trillions of
computers all over the world. You can
access this network via communication devices and media such as
modems, cable, telephone lines and satellite.
Internet Terminologies
1. Cyber café: An internet café or cyber café is a place which provides
internet access to the public, usually for a fee.
2. Download: To transfer a file from a remote computer to a local
computer. In other words, it means to transfer a file from a web server to a
web client.
3. Upload: To transfer a file from a local computer to a remote computer.
In other words, it means to transfer a file from a web client to a web
server.
4. E-mail: An email is mail that is electronically transmitted by your
computer.
5. Email Address: An email address is the name of an electronic postbox
that can receive and send email messages on a network.
6. Homepage: It is the first page that appears when you visit any website.
It is also the page of a Web site that provides the introduction or content
with links.
7. HTTP: HTTP is an abbreviation for Hypertext Transfer Protocol. It is
the set of rules by which Web pages are transferred across the Internet.
8 URL: URL Stands for "Uniform Resource Locator." A URL is the
address of a specific webpage or file on the Internet.
9. World Wide Web (WWW): It is defined as part of the internet that
contains linked text, image sound, and video documents.
10. Website: A Website is a collection of World Wide Web pages or files.
Examples of website address include: www.cmpnote.blogspot.com,
www.nairaland.com, www.waeconline.org, www.facebook.com etc
11. Webpage: A Web page is a single hypertext file or a page that is part of
a Website
12. Web server: A server is a computer that delivers web content to a web
browser.
Evaluation
1. There are numerous web browsers, mention 3 others that you know
2. Mention three features of an internet browser
3. Define a web browser
Benefits
a. It enables us to share resources globally.
b. The Internet allows access to information in a very fast manner.
c. It is cost-effective.
d. It allows online banking transactions.
e. E-education
f. E-friends
g. E-entertainment
h. E-commerce
Abuse of the Internet
1. It is used by imposters to defraud people
2. Piracy of software
3. Pornography
4. Hacking
5. Plagiarism
6. Computer virus
Evaluation
1. As a student, mention five benefits of the internet to you?
2. State five abuses of the internet
Internet abuse refers to improper use of the internet and may include:
Computer Crime – or cybercrime, is any crime that involves
a computer and a network. Use of computers for criminal activity.
Cyber-bullying – Use of the internet to bully and intimidate. The use of
information technology to repeatedly harm or harass other people in a
deliberate manner.
Spam (electronic) – Is the use of electronic messaging systems to send
unsolicited messages (spam), especially advertising, as well as sending
messages repeatedly on the same site. Sending of unwanted advertising
messages.
Malware – Software designed to harm a user’s computer,
including computer viruses. Malware, short for malicious software, is any
software used to disrupt computer operation, gather sensitive information,
or gain access to private computer systems. Malware is defined by its
malicious intent, acting against the requirements of the computer user, and
does not include software that causes unintentional harm due to some
deficiency.
File sharing can be done using several methods. The most common
techniques for file storage, distribution and transmission include the
following:
Computer Network
Before the Internet and home networks became popular, data files were
often shared using floppy disks. Nowadays, some people still use CD-
ROM / DVD-ROM disks and USB sticks for transferring their photos and
videos, but networks give you more flexible options.
Types of Network
Personal Area Network – The smallest and most basic type of network, a
PAN is made up of a wireless modem, a computer or two, phones,
printers, tablets, etc., and revolves around one person in one building.
These types of networks are typically found in small offices or residences,
and are managed by one person or organization from a single device. Often
used at home, this network is more on connections between
a computer and another gadget such as a telephone or a modem.
Local Area Network – A connection that’s used for groups of computers.
This is common in small offices and internet cafes. This is where everyone
can share files basically, and is also known to be a good way to connect
between computers whenever they want to share an internet connection, or
whenever they want to play games with each other.
Metropolitan Area Network – A more powerful version of the local area
network where it can cover up the whole city in terms of connection. A
huge server is usually used for this type of connection.
Wide Area Network – This is a common type of network nowadays that’s
made possible by wireless technology. As the term implies, a WAN spans a
large physical distance. The Internet is the largest WAN, spanning the
Earth. Usually, a credential or service from a certain company is needed to
enter a connection in this type of network, but there are others that can be
used for free. This is good for internet connection. The internet is a well-
known version of this one. A WAN is a geographically-dispersed
collection of LANs. A network device called a router connects LANs to a
WAN. In IP networking, the router maintains both a LAN address and a
WAN address.
Storage Area Network – A type of network that specializes in file sharing
and other matters in storing various software within a group of computers.
Enterprise Private Network – This is a software network that’s often
used in businesses so that they can have privacy over files and interactions
between computers.
Virtual Private Network – This is a software that’s capable of setting up a
network where everyone registered in the network using a credential will be
able to access each other through other registered computers.
Wireless Personal Area Network (WPAN) which is virtually a synonym
since almost any personal area network would need to function wirelessly.
Conceptually, the difference between a PAN ( personal area network) and a
wireless LAN ( Local Area Network) is that the former tends to be
centered around one person Network while the latter is a local area
network (LAN) that is connected without wires Network and serving
multiple users.Wireless Networks • The fastest growing segment of
the computer industry is the mobile computers such as
notebook computers and personal digital assistant (PDAs).
Bus – This is the type of structure that uses a single medium to connect
the computer.
Ring – Each computer is connected to another
neighboring computer for data transfer. One failed network can cause all
networks to turn off.
Star – This is a structure that’s common in homes. It uses a certain hub or
a router to make the network possible.
Tree – This is a complicated structure that connects the star into multiple
buses. This is common for internet cafes and offices.
Mesh – this is a connection that leads to various data transmissions which
are perfect for routing huge networks.
Evaluation
COMPUTER ETHICS
BASIC RULES
GENERAL RULES
The following are the basic security measures taken to prevent damage to
the computer system.
1. There must be adequate ventilation.
2. Adequate space must be allowed between each system unit.
3. Avoid dust by using a cover.
4. Avoid moisture.
5. Provision of air conditioners and fans or other cooling machines.
6. Provision of UPS (Uninterruptible Power Supply) and other electrical
appliances to avoid loss of information and electrical damage to the system.
7. Adequate care must be taken with storage devices like diskettes, flash
drives, CD/DVD writer drives, etc.
8. Disallow an unauthorized user from having access to your computer.
9. Ensure maximum security of files and information on the computer.
10. Provide computer with anti-virus program to avoid viruses.
11. Avoiding food particles dropping into the system.
12. Unplug the system when not in use for a long.
13. Check your email regularly.
14. Give prompt and polite responses to emails.
2. Computer virus: This can affect the computer through the internet
where unsolicited information is sent to destroy files in other computers. A
computer virus can also occur when diskettes, CDs, DVDs, and flash
drives that have been corrupted are used in another computer. It is,
therefore, necessary that anti-virus programs are installed on our
computers to detect and clean any virus that may want to attack our
computers.
Evaluation
1. Define computer ethics
2. State five basic rules you should follow while using computer
3. Mention five responsible use of the internet
4. Give four reasons for taking care of the computer
5. Mention five areas of misusing the Computer
EXPLANATION:
Commandment 1
Simply put: Do not use the computer in ways that may harm other people.
Commandment 2
Commandment 3
Commandment 4
Commandment 5
Commandment 6
Simply put: Refrain from copying software or buying pirated copies. Pay
for software unless it is free.
Commandment 7
Commandment 8
Commandment 9
Simply put: Before developing a software, think about the social impact it
can have.
Commandment 10
EVALUATION:
Safety measures are measures that the users of computers need to take to
enjoy the use of computers. These are measures put in place to protect the
users (you and I) while using the computer.
The following are safety measures that will safeguard the computer users:
GENERAL EVALUATION
1. What are computer safety measures?
2. Why safety measures for computers (why is it important)?
3. Mention five ways to protect computer users.
4. List and explain four safety rules in the computer laboratory.