Ss 3 2nd Term Computer Science
Ss 3 2nd Term Computer Science
Website: www.salemacademyng.com
SECOND TERM E-LEARNING NOTES
SUBJECT: COMPUTER STUDIES CLASS: SS 3
SCHEME OF WORK
WEEK TOPIC
REFERENCES:
1. HiiT @ School, Computer Studies for Senior Secondary Education
2. MELROSE Computer Studies for SS 3 by O.B. Ajayi
WEEK TWO
TOPIC: GRAPHICS (Introduction to Corel Draw)
CONTENT:
➢ Definition of Graphics
➢ Examples of Graphic Packages
➢ Simple designs
i. Photographs
ii. Drawings
iii. Graphs
iv. Diagrams
v. Numbers
vi. Symbols and other images
Graphics often combine text, illustrations and colours.
Computer Graphics can be defined as the pictorial representation and manipulation of data by a
computer. It is the use of computer to produce pictorial images that can be printed or displayed in a
video display screen/monitor.
Graphic Packages are computer programs that create, display and control images on the computer
screen. They are ready-made computer programs that enable users to perform computer graphics with
ease. A graphic package is the software for image creation.
1. Microsoft Paint
2. Harvard Graphics
3. Adobe Photoshop
4. CorelDraw
5. Paint Artist
6. Logo Graphics
7. Instant Artist
8. Ventura
9. Adobe Page maker
10. Photoshop pro
11. Gimp (free and awesome) etc.
USES OF GRAPHIC PACKAGE
1. Graphic package is used to create, edit, display and print graphic images.
2. Graphic packages are used to design letter head paper, birthday cards, wedding card logos,
banners etc.
3. They are used in designing professional art work
4. Graphic packages are commonly used in business and economics to create financial charts and
tables
5. It is used for political purposes to create cartoons, graffiti, poster arts, flag designs etc.
6. Graphics are heavily used in textbooks especially those concerning subjects such as
geography, science and Mathematics in order to illustrate theories and concepts, such as
human anatomy
7. Computer graphics are used in film and animation e.g. The Lord of the Rings, Harry Potter,
Spiderman etc.
1. MENU BAR: This is the area that contains the main menu of the package
2. PROPERTY BAR: This is a detachable bar with commands that relate to the active tool or object
3. TOOL BAR: This is a detachable bar that contains short cut to different menu options and other
commands
4. TITLE BAR: This is the area that displays the title of the currently opened drawing
5. RULERS: These are horizontal and vertical borders that are used to determine the size and
position of objects in a drawing (working area)
6. TOOL BOX: A floating bar with tools for creating, filling and modifying objects (shapes) in the
drawing
ASSIGNMENT
Explain with the aid of diagrams, all the tools found on in a CorelDraw tool box.
i. Pick tool
ii. Shape tool (shape, smudge brush, roughen brush, free, transform tool)
iii. Crop tool (crop, knife, erase, virtual segment deletes)
iv. Zoom (zoom, hand)
v. Curve (free hand, Bezier, artistic medial tool, pen, polyline, 3-point curve, interactive
connector, dimension)
vi. Smart tool (smart fill, smart drawing)
vii. Rectangle
viii. Ellipse
ix. Object (polygon, star, complex star, graph paper, spiral)
x. Perfect shapes (basic shapes, arrow shapes, flowchart shapes banner shapes, callout)
xi. Text tool
xii. Interactive tools (interactive blend, interactive contour, interactive drop shadow,
interactive envelop, interactive distortion, interactive extrude, interactive transparent)
xiii. Eye dropper (paint bucket)
xiv. Outline (outline pen dialogue, outline colour, dialogue, no outline etc.)
xv. Fill tools (fill colour dialog, fountain fill, pattern fill, texture fill, foot script fill, no dialog,
colour docker window)
xvi. Interactive fill (interactive fill, interactive mesh)
7. DRAWING WINDOW: The area outside the drawing page border by the scroll bars and
application controls
8. DRAWING PAGE: (Printable area), the rectangular area inside the drawing window. It is the
printable area of your work area.
9. COLOUR PALLETE: This is the a dockable bar that contains colour switches.
10. DOCKER: A window containing available commands and settings relevant to aa specific tool or
task
11. STATUS BAR: An area at the bottom of the application window that contains information about
the object properties such as type, size, colour, fill, resolution. It shows the current mouse
position.
12. DOCUMENT NAVIGATOR: The area at the bottom left of the application window that contains
buttons for moving between pages and adding pages.
13. NAVIGATOR: These are buttons located at the bottom right corner that enables you to move
either forward or backward one page at a time.
The tool box can be categorized into:
1. Utility tool: the pick tool, the shape tool, the zoom tool
2. Diagramming objects (the freehand curve) tool: the rectangle, the ellipse tool, the polygon
tool, the text tool
3. Interactive tools: interactive fill tool, interactive transparency tool, interactive blend tool.
4. Painting tool: outline tool, the fill tool.
EVALUATION
1. Briefly explain the term ‘Computer Graphics’
2. State FIVE examples of graphic packages
3. Identify SEVEN features of Corel draw
Birthday/Congratulatory Cards
• Open a blank document after launching the available coreldraw version
• Go to property bar, click the dropdown menu for setting Paper Type/Size, set to ‘Photocard’
• If you want the card to have a landscape view, Click Layout, on the menu bar, select Switch
Page Orientation
• Use the rectangle tool to draw a rectangle on the Page Layout
• Select the Rectangle, and fill with the desired colour
• In the tool box, select the basic shapes tool. Afterwards go to the Property bar, click the perfect
shapes option that will display the required menu
• Choose the round face shape. Use the tool to create the round face on the green rectangle box,
then use the color picker tool to add yellow color to the round face
• Then add “Happy Birthday” using the text tool, the font size, style, type can be edited as
desired.
• Stylish effects can be added to the text by clicking on Effect in the Menu Bar. From the drop
down menu, chose Add Perspective.
EVALUATION
The students are to carry out the following practical designs:
(i) Complimentary Cards
(ii) Birthday Cards
(iii) Logo - School and NNPC logos
(iv) Nigeria Flag
GENERAL EVALUATION
1. What type of graphic application comes with Windows Operating System by default?
2. Describe the function of each of the following features of CorelDraw;
(a) Menu bar
(b) Property bar
(c) Tool bar
3. Design your personal Complimentary card
READING ASSIGNMENT
Study the topic: BASIC PROGRAMMING
WEEKEND ASSIGNMENT
1. ___involves the representation and manipulation of images by a computer using specialized
software and hardware adapted devices
(a) Imagery (b) Scanning (c) Graphics (d) Coreldraw
2. Corel Draw package can be used for the following except (a) Congratulatory cards (b) Browsing
(c) Business card (d) Logo design
3. Which of the following is an example of Graphic package?
(a) VLC Player (b) YTD Video downloader (c) Internet explorer (d) Ventura
4. There are ___types of Graphics (a) 2 (b) 3 (c) 4 (d) 5
5. The rectangular area inside the drawing window of coreldraw environment is known as
(a) color palette (b) printable area (c) title bar (d) ruler
THEORY
1. Outline the major types of Graphics
2. Explain the functions of the following features;
➢ Status bar
➢ Dockers
➢ Property bar
WEEK 3
TOPIC: BASIC Programming III (One-dimensional array)
CONTENTS
i. Defining one-dimensional array
ii. Operations on Array
iii. Review of the (i) FOR-NEXT Statement, WHILE_END Statement etc
Sub-topic 1
What is an Array?
An array is a group of data items given the same name for processing. Students’ scores in some
subjects, when listed or arranged under a name, constitute an array. OR
An array is a series of elements of the same type placed in contiguous memory locations that can be
individually referenced by adding an index to a unique identifier. Also arrangement of items of
computerized data in tabular form for easy reference and identification is regarded as an array.
Suppose we have 400 scores listed for 400 students in a test. The set of scores make up an array.
Each score is an element of the array.
Operations on Array:
(a) Input of an array
The program below reads 15 values into array score of 15 elements.
10 FOR I = 1 TO 10
12 LET A(I) = I
13 LET B = A(I) + 3
14 LET C = A(I) * 3
15 LET D = A(I) / 3
20 PRINT B; C; D
30 NEXT I
40 END
Evaluation
1. Define an Array in computer
2. What is DIMENTION STATEMENT?
Sub-topic 2
FOR_NEXT Statement
The FOR_NEXT statement is generally used to implement an operation that is to be repeated for a
specific number of times. It is also called looping, see the program below:
10 FOR K = 1 TO 4
20 READ S
30 DATA 6, 7, 10, 8
40 LET A = S * S
50 PRINT S, A
60 NEXT K
70 END
WHILE_END Statement
The While...End While statement acts according to a Boolean test expression. As long as the test
expression evaluates to True, the statement will continue to iterate. The following example shows a
simple While...End While loop.
Dim counter As Integer = 0
Dim total As Integer = 0
While counter < 10
total = total + counter
counter = counter + 1
End While
You can jump out of a While...End While loop by using an Exit statement
LOOP: This can be defined as a set of instructions in a computer program that is repeated in a
particular number of times or until a specific objective has been achieved.
EVALUATION
1. What is FOR….NEXT Statement?
2. What is WHILE…END Statement?
GENERAL EVALUATION
1. What is Loop?
2. What is the difference between READ and INPUT?
READING ASSIGNMENT
Work out examples of FOR….NEXT Statement and WHILE…..END Statement.
WEEKEND ASSIGNMENT
1. Which of the following is a command recognized in BASIC program to identify array
elements? (a) DIM (b) LENS (c) FNS (d) ARRS
2. A one-dimensional array is also referred to as .. (a) Matrix (b) Linear list (c) row
(d) vector
3. The Phrase ‘DIM X(15)’ tells the computer that __ (a) The data is 15X (b) The dimension is
15 (c) An array contains 15X (d) Array X contains 15 elements
4. Every ‘FOR statement must have a ____ command along. (a) Do (b) NEXT (c) WHILE
(d) GOTO
5. The statement ‘FOR J = 1 TO 15’ implies the counter is from (a) 2 to 14 (b) 1 and 15
(c) 15 to 1 (d) 1 to 15
WEEK 4
TOPIC: BASIC Programming III (One-dimensional array)
CONTENTS
i. Write BASIC program to:
(a) State data in a vector of 10 integers with and without a FOR_NEXT statement etc
(b) Calculate the average of a one-dimensional array with 100 numeric value
(c) Calculate the area of 10 different rectangles with and without the WHILE_END statement
(d) Output the sum of the first 100 integers
(e) Output the value elements of a given array.
Sub-topic 1
a. Write a program to put 10 integers into the memory and print them on the screen.
DIM A(10)
FOR 1 = 1 TO 10
READ A (1) // OR INPUT A (1) in an interactive session, i.e. through keyboard
PRINT A(1) // The PRINT statement output data/value of A(I) on the screen
NEXT I
DATA 80, 60, -10, 11, 100, 8, 99, 67, 9, 14 //DATA statement not required if INPUT
END // Statement is used
Sub-topic 2
ASSIGNMENT
Revise all the topics from SS1 to SS3
WEEKEND ASSIGNMENT
REVISION (WAEC , NECO)
WEEK 5.
TOPIC: HIGH LEVEL LANGUAGES (HLL)
CONTENT:
(a) Definition of High Level Language (H.L.L.)
(b) Examples of H.L.L. – BASIC, FORTRAN, ALGOL, C, PASCAL, PL/I, PROLOG, SNOBOL, COBOL. (c) (i)
BASIC, FORTRAN, ALGOL (Scientific) (ii) C, PASCAL, PL/I, (General purpose) (iii) LISP, PROLOG
(Artificial intelligent (AI) (iv) SNOBOL Special purpose programming language (SPL)
Scientific Language
This is the language that is used for scientific and engineering purposes. Examples include FORTRAN –
Formula Translator, BASIC – Beginner All-purpose Symbolic Instruction Codes. It combines the
features of the extensive arithmetic computational ability and the ability to handle mathematical
expression.
Multi-Purpose
This type of high level programming language can cope with a number of different types of application
areas. Examples of multi-purpose language are Visual BASIC, PL/I C++, Java etc.
Commercial Language
This type of program was first developed by the American Government Defensive Department to
create a common administrative language for internal and external use. The prominent language is
COBOL (Common Business Oriented Language).
Artificial intelligence
Researchers have developed several specialized programming languages for artificial intelligence:
IPL was the first language developed for artificial intelligence. It includes features intended to
support programs that could perform general problem solving, including lists, associations, schemas
(frames), dynamic memory allocation, data types, recursion, associative retrieval, functions as
arguments, generators (streams), and cooperative multitasking.
• Lisp:is a practical mathematical notation for computer programs based on lambda
calculus. Linked lists are one of Lisp languages' major data structures, and Lisp source code is
itself made up of lists. As a result, Lisp programs can manipulate source code as a data structure,
giving rise to the macro systems that allow programmers to create new syntax or even
new domain-specific programming languages embedded in Lisp. There are many dialects of Lisp
in use today; among them are Common Lisp, Scheme, and Closure.
• Prolog is a declarative language where programs are expressed in terms of relations, and
execution occurs by running queries over these relations. Prolog is particularly useful for symbolic
reasoning, database and language parsing applications. Prolog is widely used in AI today.
• STRIPS is a language for expressing automated planning problem instances. It expresses an initial
state, the goal states, and a set of actions. For each action preconditions (what must be
established before the action is performed) and post conditions (what is established after the
action is performed) are specified.
General Evaluation
1. What is HLL?
2. List any five HLL.
3. Mention two special purpose languages.
4. Define artificial intelligence.
5. Highlight any three multi-purpose languages.
6. Mention any three artificial intelligence languages.
READING ASSIGNMENT
Read Features of BASIC, C, PASCAL, COBOL and summarize in one page.
WEEKEND ASSIGNMENT
Objectives
1. Which one of the following does not fit classinfication of HLL? (a) general purpose (b)
interpreted (b) object oriented language (d) functional language.
2. High level language instructions are written in ___________ (a) Bytes code (b) 1s or 0s (c)
Mnemonics (d) English language
3. _______ can be assigned various values within a program.
4. It is extremely difficult to program directly in ______________-.
5. Which of the following belong to a special purpose program? (a) SQL (b) COBOL (c) BASIC (d)
JAVA
Essay
1. List five features of BASIC.
2. Briefly describe three Artificial Intellegence programs.
WEEK 6.
TOPIC: HIGH LEVEL LANGUAGES (HLL)
CONTENT:
(d) Interpreted Language (i) BASIC (ii) Compiled Language PASCAL, COBOL, C, FORTRAN.
(e) Features of BASIC, C, PASCAL, COBOL.
(f) Advantages of HLL over ML and LLL.
Compiled Language
Compiled languages are transformed into an executable form before running. They are of two types:
(a) machine code generation: some compilers compile source code directly into machine code. This
is the original mode of compilation, and languages that are directly and completely transformed to
machine-native code in this way may be called ‘truly compiled’ languages e.g. PASCAL. (b)
intermediate representation: a language that is compiled to an intermediate representation, is that
which can be optimized or saved for later execution without the need to read the source file again.
When the intermediate representation is saved it is often represented by a bite-code. The
intermediate representation must then be interpreted or further compiled to execute it. E.g. Java.
Evaluation
1. State two advantages of HLL of ML and LLL.
2. Define interpreted language
3. What is compiled language?
Features of PASCAL
Pascal has the following features:
• Pascal is a strongly typed language.
• It offers extensive error checking.
• It offers several data types like arrays, records, files and sets.
• It offers a variety of programming structures.
• It supports structured programming through functions and procedures.
• It supports object oriented programming.
Features of C
It is easier to write assembly language codes in C programming.
C Programs are portable i.e. they can be run on any Compiler with Little or no Modification
Compiler and Pre-processor make it Possible for C Program to run it on Different PC
Previous languages have their pros and cons but C Programming collected all useful features
of previous languages thus C become more effective language.
C Program Consist of Different Modules that are integrated together to form complete
program
C Supports efficient use of pointer
Provides Wide verity of ‘Data Types‘
Provides useful Control & Loop Control Statements
Features of COBOL
• The language that automated business
• Allows names to be truly connotative - permits both long names (up to 30 characters) and
word-connector characters (dashes)
• Every variable is defined in detail - this includes number of decimal digits and the location of
the implied decimal point
• File records are also described with great detail, as are lines to be output to a printer - ideal
for printing accounting reports
• Offers object, visual programming environments
• Class Libraries
• Rapid Application Capabilities
• Integration with the World Wide Web
General Evaluation
1. State any two features of BASIC.
2. What do you understand by interpreted language?
3. Give three advantages that high level language has over the others?
4. List four features of COBOL.
5. Enumerate two features of C.
6. Highlight any three features of PASCAL.
READING ASSIGNMENT
Read number bases and provide the binary numbers from 1-15.
WEEKEND ASSIGNMENT
Objectives
1. Assembly languages are written in ________ (a) Bytes (b) Mnemonics (c) 1s and 0s (d)
English like
2. High level = ____________ and ____________ more programmer work.
3. ______________ allows programmers to write instruction sing more English like
statement.
4. It is extremely difficult to programme in ____________---
5. Examples of artificial intelligence language are ________- or __________
Essay
1. Enumerate five advantages HLL.
2. Highlight any three multi-purpose languages.
WEEK 7
TOPIC: OVERVIEW OF NUMBER BASES
CONTENT:
➢ Review of number bases
➢ Conversion in Number bases
➢ Basic Arithmetic in number bases
EVALUATION
Write short notes on the on the various number systems.
2 21 R1
2 10 R1
2 5 R0
2 2 R1
2 1 R0
0 R1
= 1 x 256 + 1 x 64 + 1 x 32 + 1 x 4 + 1 x 1
= 256 + 64 + 32 + 4 + 1
= 35710
EVALUATION
Convert the following numbers to the base indicated;
(i) 4910 to base 8
(ii) 1011012 to decimal
(iii) FA616 to binary
Solve the following;
(iv) AB + C
(v) Subtract 678 from 2478
GENERAL EVALUATION
(i) List all the integers available in an octal number system
(ii) If 2578 = (X)2, find X
(iii) 110012 - 1012
(iv) ABBE16 + DE16
READING ASSIGNMENT
Refer to your students’ textbook and study the topic: DATA REPRESENTATION
WEEKEND ASSIGNMENT
1. Which of the following number is not among hexadecimal numbers/
(a) 13 (b) 14 (c) 15 (d) 16
2. Which of the following is equivalent to 12648
(a) 69210 (b) 3425 (c) 56910 (d) 39912
3. If X = 3145 and Y = 245, X + Y = ......................
(a) 3425 (b) 3435 (c) 3445 (d) 3465
4. 101010 / 111 equals (a) 1011 (b) 1101 (c) 110 (d) 11101
5. In hexadecimal, ‘D’ represents (a) 11 (b) 12 (c) 13 (d) 14
THEORY
1. Convert 15.37510 to base 8
2. Convert 10101.110112 to base 10
3. Subtract AF16 from CAD16
WEEK: 8
CONTENT: (a) Definition data representation (b) Description of data representation methods (c)
Computer Character Set
BCD: BCD stands for binary coded decimal. It is a digital encoding method for numbers using decimal
notations, with each decimal digit represented by its own binary sequence. In BCD, a numeral is
usually represented by four bits which in general, represents the decimal range 0 through 9 to
00000000 through 00001001. BCD is a method of using binary digits to represent the decimal digits 0
through 9.
BCD Decimal BCD Decimal BCD Decimal
0000 0 0011 3 0110 6
0001 1 0100 4 0111 7
0010 2 0101 5 1000 8
EBCDIC: Extended Binary Coded Decimal Interchange Code: Is an 8-bit character encoding used
mainly on IBM mainframe and IBM midrange computer operating systems.
EBCDIC is a Character set that was developed before the ASCII (American Standard Code for
Information Interchange, became commonly used. Both ASCII and EBCDIC are both 8-bit character
set, unlike the BCD which is a 4-bit character set.
ASCII: The American Standard Code for Information Interchange (ASCII) is a character-encoding
scheme based on the ordering of the English alphabet. ASCII codes represent text in computers,
communication equipment, and other devices that use text. Most modern character-encoding
schemes are based on ASCII, though they support many more characters than ASCII does.
EVALUATION:
1. Discuss any three ways in which data can be represented.
2. What is the advantage of EBCDIC over BCD?
GENERAL EVALUATION:
1. Give the full description of the words ‘ASCII’ and EBCDIC.
2. Which of the computer character set is most popular and why?
READING ASSIGNMENT:
Students are expected to read on ‘Security and Ethics’ on the next page of Handbook on Computer
studies for SS3.
WEEKEND ASSIGNMENT:
1. Write down the ASCII Character table and the symbols of the characters.
WEEK: 9
EVALUATION:
1. Explain the term “sources of security breach”
2. What is a Trojan horse?
EVALUATION:
1. State 5 preventive measures when using a computer.
GENERAL EVALUATION:
1. What is Spam mail
2. What is an internet filter?
READING ASSIGNMENT:
Students are expected to read further on ‘Security and Ethics’ on the next page of Handbook on
Computer studies for SS3.
WEEKEND ASSIGNMENT:
1. Which of these is not an internet security package
(a) Internet filter (b) web tract (c) Surf watch (d) Pal dive
2. Some effective management includes all except;
(a) Restrict access to those staff that can be trusted
(b) Sentimentalism
(c)Carry out effective staff supervision with a view of identifying those who
are no longer trustworthy.
(d)Rotate staff to check collusion and corrupt activities among them.
3. This is the process of converting readable data into unreadable characters
with the aim of preventing unauthorized access is called-------
(a)Cipher text (b) encryption (c) coding (d) hiding
4. A security arrangement of hardware and of software that prevents
unauthorized access of data, information and storage media on the
network.
(a) Firewall (b) anti-wall (d) wall defender (d)Fire tract
5. Which among theses is capable of distributing virus
(a) Spam mails (b) hotmail (c) Gmail (d) board mails
WEEK: 10
Copyright: This is the legal right given to the only producer or seller of a creative work, such as
textbook, a piece of music, a painting or a computer program.
Ownership Right: The originator of any textbook, images, audio and video programs has the
ownership rights to such programs. If you want to copy and use any of the programs, you must
accord the originator the due respect and recognition of obtaining permission.
Piracy: This is an illegal copying for personal use, sale or distribution of software, books, tapes, video,
etc. This is a serious offence and the offender must be punished by the law.
Cybercrimes: This is an online or internet-based illegal act. Once a thief has the computer, he or she
can access any document or information that is in the computer.
Hacking: This is gaining unauthorized access to the computer resources with the intention to cause
harm. Hackers breach the security of computer systems owned by banks, and government agencies
just to commit fraud.
EVALUATION:
1. ‘Define the term Hacking’
2. Explain 5 legal issues to be considered when making use of software’s.
GENERAL EVALUATION:
1. State 5 ways in which the internet can be abused.
WEEKEND ASSIGNMENT:
1. The Program that infects computer program files and boot sector is called—
(a) A file infector (b) Trojan horse (c) Worm (d)Virus
2. ----------- is not a preventive measure
(a) Use of antivirus (b) Use of Firewall (c) Encryption (d)Copyright
3. Issues of legal importance in ICT usage include the following except
(a) Piracy (b) Hacking (c) Ownership rights (d) Explorer rights
4. Which of these is not a source of security breach?
(a)Virus (b) Carelessness (c) Poor ICT implementation (d) none of the above
5. The aim of ICT policy is to ensure
(a) Security computing environment for all users
(b)Robust computing environment for all users
(c) Useable computing environment for all users
(d) All of the above.