ss 2 comp
ss 2 comp
CLASS: SS 2
WEEK 1
TOPIC: CONCEPT OF COMPUTER FILES
CONTENT:
Definition of Terms
Types of data item
File structure organization
Types of file organization
Duration: 45 minutes
Date:
Age: 13 - 14 years
Specific Objectives: At the end of the lesson, the students will be able to:
Know the concept of computer files
Know the types of file organization
Know the file structure organization
Rationale: Students will be able to understand the concept of computer files organization
Previous Knowledge: the students should have fundamental knowledge on food
Set Induction: The teacher begins by asking the students questions on the previous lesson
Instructional Method: Explanation and Discussion and Illustration
Instructional Materials: whiteboard, marker, handout
Presentation:
Step I
Teacher's Activity: teacher begins the lesson by reviewing previous lesson and stating the usefulness
of the concepts being taught
Students' Activity: the students engage in a discussion with the teacher about what they've learnt.
Step 2
Teacher's Activity: the teacher introduces the topic and begins to define and explain key words
Students' Activity: the students pay keen attention to the teacher
Step 3
Teacher's Activity: the teacher makes the class interactive by asking the students questions on what
has been explained
Students' Activity: the students provide answers to the teacher's questions
Step 4
Teacher's Activity: the teacher encourages the students to ask questions
Student's Activity: the students participate in the question and answer session
Step 6
Teacher's Activity: the teacher copies the note of lesson on the board
Students' Activity: the students take down the note.
Summary: the teacher summarizes the topic
Resource Materials: Internet
EVALUATION
1. Define the following key terms;
(i) Computer file (ii) Record (iii) Field (iv) Data item
2. Highlight the types of data item
RECORD: A Record is a collection of related data items or fields. Each record usually corresponds to
a specific unit of information, e.g Employee number, Employee name, Basic salary, etc. The elements
of records are usually called fields or members.
FIELD: This is portion where data items are physically arranged in a computer file. It is commonly
used to refer to a column in a database or a field in a data entry form. It is a space allocated for a
particular item of information. The length of a field may be fixed or variable.
DATA ITEM: Data item is the smallest unit of information stored in computer files. In computing,
data is information that has been translated into a form that is more convenient to move or process.
Data can exist in a variety of forms – as numbers or text on pieces of paper, as bits and bytes stored in
electronic memory, or as facts stored in a person’s mind.
DATA
FIELD
RECORD
FILE
Represented above is the structure of a file in a systematic order from top to bottom, i.e. from DATA
to FILE.
Data item is the smallest unit of information stored in computer file.
A field is a collection of related data items
A record is a collection of related fields.
The collection of records is called file.
Sub-Topic 2: TYPES OF FILE ORGANIZATION
There are a large number of ways records can be organized on disk or tape. The main methods of file
organization used for files are;
Serial
Sequential
Indexed
Random ( or Direct)
SERIAL ORGANISATION: Serial files are stored in chronological order; that is, as each record is
received it is stored in the next available storage position. It is only used on serial medium such as
magnetic tape. This type of file organization means that the records are in no particular order and
therefore to retrieve a single record, the whole file needs to be read from the beginning to the end.
SEQUENTIAL ORGANIZATION: Sequential files are serial files whose records are sorted and
stored in an ascending or descending order on a particular key field. In a sequential file organization,
records are organized in the sequence by which they were added. Records in these files can only be
read or written sequentially.
RANDOM FILE ORGANIZATION: This is a file arranged physically without regard to the
sequence of the primary key. It is also called a ‘direct file’ or a ‘direct access file’, it enables quick
access to specific records or other elements within the file rather than having to read the file
sequentially.
GENERAL EVALUATION
(i) With the aid of a diagram, systematically illustrate the structure of computer file
(ii) Enumerate four ways of organizing files
READING ASSIGNMENT
Study the topic ‘METHODS OF ACCESING FILES’ using your students’ textbook
WEEKEND ASSIGNMENT
1. Records in a .............................. file are inserted as they arrive
(a) serial (b) sequential (c) indexed (d) random
2. ................ is the collection of related data items or field.
(a) Data item (b) Field (c) Record (d) File
3. ................... is the smallest unit of information stored in computer file
(a) Data item (b) Field (c) Record (d) File
4. ......................... file is referred to as direct access file
(a) Random (b) Indexed (c) Serial (d) Sequential
5. The length of a field may be ............................ or ...................................
ESSAY QUESTION
1. Clearly distinguish between sequential and random file organization
WEEK 2
CLASS: SS 2
SUBJECT: COMPUTER SCIENCE
TOPIC: CONCEPT OF COMPUTER FILES (cont’d)
CONTENT:
Methods of accessing files.
File classification.
Criteria for classifying files.
Duration: 45 minutes
Date:
Age: 13 - 14 years
Specific Objectives: At the end of the lesson, the students will be able to:
Know the concept of computer files
Know the types of file organization
Know the file structure organization
Rationale: Students will be able to understand the concept of computer files organization
Previous Knowledge: the students should have fundamental knowledge on food
Set Induction: The teacher begins by asking the students questions on the previous lesson
Instructional Method: Explanation and Discussion and Illustration
Instructional Materials: whiteboard, marker, handout
Presentation:
Step I
Teacher's Activity: teacher begins the lesson by reviewing previous lesson and stating the usefulness
of the concepts being taught
Students' Activity: the students engage in a discussion with the teacher about what they've learnt.
Step 2
Teacher's Activity: the teacher introduces the topic and begins to define and explain key words
Students' Activity: the students pay keen attention to the teacher
Step 3
Teacher's Activity: the teacher makes the class interactive by asking the students questions on what
has been explained
Students' Activity: the students provide answers to the teacher's questions
Step 4
Teacher's Activity: the teacher encourages the students to ask questions
Student's Activity: the students participate in the question and answer session
Step 6
Teacher's Activity: the teacher copies the note of lesson on the board
Students' Activity: the students take down the note.
Summary: the teacher summarizes the topic
Resource Materials: Internet
EVALUATION
1. State the three methods of accessing files
Serial Access
This is a method of storing or retrieving data or information that requires the program to start writing
or reading at the beginning and continues until it finds the desired data. The only way to access a
serially organized file is serially, for instance, the tape.
Sequential Access
The method of access used is still SERIAL but of course in an organized way, that is, in the order in
which they are physically arranged. It is important to note that to process (e.g update) a sequential
master tape file, the transaction file must also be in the sequence of the master file. Also, if the record
required is the twentieth record on the file, in order to get it into storage to process it the computer will
first have to read in all nineteen preceding records.
This is possible with files organized sequentially or indexed-sequentially.
Random Access:
This is a method of retrieval or storage of data that does not require any other stored data to be read
first, that is, the storage locations can be accessed (read or written to) in any order, with the help of the
record key. It is also called ‘direct access’. This type of access is possible on a file with indexed-
sequential or random organization.
Master File:
This is a file containing relatively permanent information, usually updated periodically, e.g customer
ledger, payroll, inventory, etc. it is a file that can be used as an authoritative source of data when
carrying out a particular job on the computer. Master files contain descriptive data.
Transaction File:
This is a collection of transaction records. The data in transaction file is used to update the master file
that contains the data about the subject of the organization. (customers, employees, vendors, etc.).
Transaction files also serve as audit trails and history of the organization.
Reference File:
In computer science, a reference is a value that enables a program to indirectly access a particular data
item, such as variable or a record, in the computer’s memory or in some other storage device.
Reference file contains data that are to be permanently stored. Amendment to records on it are usually
not frequent. It stores data that are used as reference for processing of transaction
EVALUATION
(i) List and explain the methods of classifying files
(ii) Highlight the criteria require to classify files
GENERAL EVALUATION
(i) State the difference between Master file and Transaction file
(ii) List two classes of computer files
(iii) Which is the best method of accessing the following types of file;
Serial files = ................................................ Access
Sequential files = ............................................ Access
Indexed files = ........................................ Access
Random files = ........................................ Access
WEEKEND ASSIGNMENT
1. A computer file that is used as an authority in a given job that is relatively permanent is
called ................. (a) transaction file (b) reference file (c) master file (d) random file
2. A computer file of data that is kept so that it could be referred to is called ....................
(a) transaction file (b) reference file (c) master file (d) authority file
3. The data in a .................................. file is used to update the master file, which contains the
data about the subject of the organization.
(a) transaction file (b) reference file (c) master file (d) authority file
4. Which of the following is NOT a method of accessing files?
(a) Random (b) Selection (c) Serial (d) Sequential
5. Which of the following is not a criteria for classifying files?
(a)Nature of content (b) Organization method(c)Storage medium(d) Correction methods
5. Which one of these is not a data item?
(a) Numeric data (b) Alphabetic data (c) Letter data (d) Alphanumemeric data
ESSAY QUESTIONS
1. List and Explain the methods for classifying files
2. State the similarity between Master file and Reference file.
WEEK: 4
CLASS:
SUBJECT: COMPUTER SCIENCE
TOPIC: HANDLING COMPUTER FILES I (PRACTICAL)
CONTENT: (a) Basic operations on computer files (b) Steps involved in creating sequential files (c)
Steps involved in accessing sequential file (d) basic file processing statements (e) effects of file
insecurity: data loss and insecurity.
The following are some operations that can be performed on a computer file;
EVALUATION:
1. Outline five (5) basic operations on a computer file.
EVALUATION:
1. List the steps involved in creating sequential files.
2. What is a sequential file?
EVALUATION:
1. Explain any two effects of file insecurity.
GENERAL EVALUATION:
1. What is ‘overwriting’?
2. Define file insecurity.
READING ASSIGNMENT:
Students are expected to read ‘methods of file security’ of Handbook on Computer studies for SS2.
WEEKEND ASSIGNMENT:
1. All these can be performed on an existing file except
(a) Copy (b) View (c) Delete (d) Creation
2. ‘E O F’ statement is used in ------- file.
(a) Creating (b) Reading (c) Closing (d) Deleting
3. Writing of binary set of data on a memory is called--------
(a) Computer file (b) Manual file (c)data loss(d) Overwriting
4. A file that is read from start to finish is called--------
(a) Logic file (b) sequential file (c) dotted file (d) overwrite file.
5. ------------ is not a basic computer file operation
(a) Delete (b) Open (c) View (d) Pause
WEEK: 5
CLASS: SS 2
SUBJECT: COMPUTER SCIENCE
TOPIC: HANDLING COMPUTER FILES II
CONTENT: (a) Methods of file security: (i) Use of backups (ii) Use of anti-virus (iii) Passwording
(iv) Proper label of stored devices, etc. (b) Advantages of computerized files.
EVALUATION:
1. State two (2) File security methods and explain them.
2. What are the two purposes of file backup?.
EVALUATION:
1. State ten (10) advantages of a computerized file.
2. State three (3) limitations of a computerized file.
GENERAL EVALUATION:
1. What is an antivirus program?
2. List five (5) antivirus known to you.
READING ASSIGNMENT:
Students are expected to read ‘Computer Applications’ on the next page of Handbook on
Computer studies for SS2.
WEEKEND ASSIGNMENT:
1. ----------- is a self replicating program that copies itself and that can infect other programs
(a) Virus (b) Actors (c) pseudo codes (d) Trojan horse
2. ----------- is a software to protect computer from viruses
(a) File guide (b) Antivirus (c) Format (d) Upgrade
3. ---------- Means to make copies of data
(a) Backup (b) Backing (c) protection (d) storage
4. Which of the following is not and advantage of computerized files
(a) Fast to access (b) Less laborious (c) Neatly modified (d) Less reliable.
5. One of these is not a limitation of computerized files
(a) Expensive to set up (b) Irregular power supply (c) Prone to hacking
(d) Does not require skilled labour.
WEEK 6
CLASS: SS 2
SUBJECT: COMPUTER SCIENCE
TOPIC: WORD PROCESSING
CONTENTS
i. Definition of (i) Word Processing (ii) Text document
ii. Examples of word processors
iii. Application Areas
iv. Facilities available in a word processor – type document, edit document, store document,
move, copy, paste, etc
v. Features: Editing, Formatting, Justification, search and replace, spell-check etc
Word Processing
This is an act of using the computer or other electronic equipments for the manipulation of text which
involves creation, editing, storage and printing. Other electronic devices that can be used to achieve
this are mobile phones, personal digital assistant (PDA), electric typewriters, computer etc.
Text Document
This is a collection of data that is written, typed, printed on paper, or created with a Computer
application and used to provide information for future use. A text document could contain single or
multiple pages.
- Mariner Write
- Mathematica
- Mellel
- Microsoft Word
- Microsoft Works
- Microsoft Write
- Nisus Writer
- Nota Bene
- Polaris Office
- PolyEdit
- QuickOffice
- Scrivener
- TechWriter
- TextMaker
- ThinkFree Office
- WordPad,
EVALUATION
1. Define the following terms:
a. Word processing
b. Text document
1. Offices: Word processing plays a vital role in the running of offices. It is used in the
production of letter heads, memo writing, circulars, etc.
2. Publishing: In publishing, typesetting process has been replaced by desktop publishing
software (DTP). This is the use of computers with graphics capacities to produce printed
materials for public consumption such as newspapers and magazines. DTP is much faster and
more flexible than typesetting. Publishers can easily make last minutes changes.
3. Journalism: This is the profession of reporting or editing news stories for the mass.
Journalists get information noted down on paper or through some other means like audio
recording device.
4. Education: Word processing offers high versatility and flexibility to education. It is also
model-free instructional software, i.e. it provides many general relative advantages to teachers
and students. Word processing helps teachers use reparation time more efficiently by letting
them modify materials (lesson plan, lesson note and diaries) instead of creating new ones.
Enhances document appearance and allows sharing of documents.
5. Articles: Word processing has reduced the stress involved in article writing. The features
of modern word processing software such as Search and Replace, Go to, File sharing etc. have
made article writing more flexible unlike when typewriter was used.
6. Home: Word processing in the home tends to be educational, planning or business related,
dealing with assignments or work being completed at home or occasionally recreational, e.g.
writing short stories, letter writing, resume creation and card creation.
EVALUATION
1. Mention three examples of word processors in use today.
GENERAL EVALUATION
1. Explain how word processor facilitates operations in the following areas:
a. Offices
b. Home
c. Journalism
d. Education
READING ASSIGNMENT
Read and summarize the following week topic.
WEEKEND ASSIGNMENT
1. The term text document means: (a) a software (b) an application (c) a window (d) a
written and a printed document
2. ___ is a program used for the production of documents
ESSAY QUESTIONS
1. a. What is word processing?
b. Define the term ‘text document’.
2. List and explain four application areas of word processing.
1. Type Document
The keyboard is used to type a document. You type a document by pressing the relevant keys
on the keyboard in order to arrive at the desired word. You do not have to worry about
overflowing the text line because the program will take care of breaking it up appropriately.
This automatic line breaking features is called word wrapping.
2. Edit Document
This is the ability to change text by adding, deleting and re-arranging letters, words, sentences
and paragraph. Text editing is the main operation users perform in word processing, which also
handles graphics and other multimedia files.
3. Store Document
Word processor gives the opportunity of accessing a previously saved file or document either
on the computer or on external storage facility, e.g. flash disk, DVD, diskette, etc. the
following are the three ways of saving a document:
(a) Click on File on the menu bar, the file menu list appears, click on the ‘SAVE’ command
(b) Click on the save button on the standard tool bar.
(c) Press CTRL + S on the keyboard. If you are saving the document for the first time, the
‘Save As’ dialog box will appear after you have used any of the three methods above.
Then type the file name in the space provided in a dialog window in front of ‘FILE NAME’
(the file name must be a name that reflects its contents for easy and quick retrieval).
Click on the ‘SAVE’ button.
EVALUATION
1. Mention three examples of fonts in word processor
2. What are the differences between Cut and Copy in word processor
1. Editing: This is the ability to make corrections by changing text, by adding, deleting and
rearranging letters, words, sentences and paragraphs.
2. Formatting: Formatting a document means making the document appears the way you want
it. This refers to the structure, organization, presentation and appearance (colours, size, font
size and font face) of a set of data in a document.
You can remove the space between paragraphs you have already typed in your document.
Simply select the paragraphs and then follow the above steps.
3. Justification
Justification in word processor means to adjust horizontal spacing, so that text is aligned evenly along
both the left and right margins. Justifying text creates a smooth edge on both sides.
Steps
i. Highlight the text
ii. Press Ctrl + J on the keyboard OR
ii. In the Replace with text box, type the word you will like to use to replace the existing ones in
the document.
iv. Click Replace to replace only that word.
v. Click Replace All to replace all the occurrence of the word.
5. Spell Check/Thesaurus
This is the capability of the word processor to check the correctness of spelling or the grammar of a
document using a particular dictionary; it could be British or American dictionary.
Type the text exactly as seen and observe how the word processor underlines words and sentences.
Take your cursor over the underlined texts and right-click to see the correct options.
6. File Merging
Modern word processors have the ability of joining two or more documents from one. These
documents can be texts or graphics. Steps:
i. Create a new blank document and then set the page layout to be similar to the documents that
you are going to merged.
ii. Click Insert tab option in the Office ribbon menu bar
iii. In the Text group, click on the down arrow at the right side of object.
EVALUATION
1. What does it mean to justify text?
2. What is the use of formatting marks in word processors?
GENERAL EVALUATION
1. What features in word processors enables automatic line breaking?
2. Mention three other automatic features in word processors.
3. State the command that you will use in word processors to do the following:
i. Save a document
ii. Copy text
iii. Paste text
iv. Open a file
READING ASSIGNMENT
Read the next topic and summarize them
WEEKEND ASSIGNMENT
1. In Microsoft word environment, ‘File’ is located except (a) changing of font size (b)
deleting a word (c) adding a word (d) rearranging paragraph
2. Ctrl + V is the short cut for __ (a) saving a document (b) an application (c) a window (d)
a written and a printed document
3. Editing of document involves the following except. (a) changing of font size (b) deleting
(c) adding a word (d) rearranging paragraph
4. The save command can be found under the ___ menu. (a) edit (b) format (c) View (d)
File
5. CTRL + J is the shortcut for (a) joining texts (b) justifying texts (c) formatting text (d)
file sharing
Theory
1. Highlight the steps involved in finding and replacing a text.
2. List and explain four application areas of word processing.
WEEK 8.
CLASS: SS 2
SUBJECT: COMPUTER SCIENCE
TOPIC: SYSTEM DEVELOPMENT CYCLE
CONTENT:
(a) Definition of System Development Cycle
(b) Description of System Development Cycle
(c) Stages in System Development Cycle: (i) Preliminary study (ii) Feasibility study (iii) Investigative
study (iv) Analysis (v) Design (vi) Implementation (viii) Study review
(d) Description of each stage of system development cycle.
Economic feasibility - The likely benefits outweigh the cost of solving the problem which is generally
demonstrated by a cost/ benefit analysis.
Operational feasibility - Whether the problem can be solved in the user’s environment with existing
and proposed system workings?
Organizational feasibility – Whether the proposed system is consistent with the organization’s
strategic objectives?
Technical feasibility - Whether the problem be solved using existing technology and resources
available?
Social feasibility – Whether the problem be solved without causing any social issues? Whether the
system will be acceptable to the society?
(iii) Investigative study: The detailed investigation of the system is carried out in
accordance with the objectives of the proposed system. This involves detailed study of various
operations performed by a system and their relationships within and outside the system. During
this process, data are collected on the available files, decision points and transactions handled by
the present system. Interviews, on-site observation and questionnaire are the tools to be used for
detailed system study. Using the following steps it becomes easy to draw the exact boundary of
the new system under consideration:
Keeping in view the problems and new requirements
Workout the pros and cons including new areas of the system
All the data and the findings must be documented in the form of detailed data flow diagrams (DFDs),
data dictionary, logical data structures and miniature specifications. It includes planning for the new
system, analysis of requirement, system constraints, functions and proposed system architecture,
prototype of the proposed system and its analysis.
(iv) Analysis: Systems analysis is a process of collecting factual data, understand the processes
involved, identifying problems and recommending feasible suggestions for improving the system
functioning. This involves studying the business processes, gathering operational data, understand
the information flow, finding out bottlenecks and evolving solutions for overcoming the
weaknesses of the system so as to achieve the organizational goals. System Analysis also includes
subdividing of complex process involving the entire system, identification of data store and manual
processes.
The major objectives of systems analysis are to find answers for each business process:
What is being done?
How is it being done?
Who is doing it?
When is he doing it? Why is it being done?
How can it be improved?
It is more of a thinking process and involves the creative skills of the System Analyst. It attempts to
give birth to a new efficient system that satisfies the current needs of the user and has scope for future
growth within the organizational constraints. The result of this process is a logical system design.
System analysis is an iterative process that continues until a preferred and acceptable solution
emerges.
(v) Design: Based on the user requirements and the detailed analysis of a new system, the new system
must be designed. This is the phase of system designing. It is the most crucial phase in the
development of a system. The logical system design arrived at as a result of system analysis and is
converted into physical system design. In the design phase the SDLC process continues to move
from the, what questions of the analysis phase to the how. The logical design produced during the
analysis is turned into a physical design - a detailed description of what is needed to solve original
problem. Input, output, databases, forms, codification schemes and processing specifications are
drawn up in detail. In the design stage, the programming language and the hardware and software
platform in which the new system will run are also decided. In the design stage, logical design is
translated into computer programming codes after which testing is done to ensure a workable
system
Coding
The system design needs to be implemented to make it a workable system. This demands the coding of
design into computer language, i.e., programming language. This is also called the programming phase
in which the programmer converts the program specifications into computer instructions, which we
refer to as programs. It is an important stage where the defined procedures are transformed into control
specifications by the help of a computer language. The programs coordinate the data movements and
control the entire process in a system.
Testing
Before actually implementing the new system into operations, a test run of the system is done
removing all the bugs, if any. It is an important phase of a successful system. After codifying the
whole programs of the system, a test plan should be developed and run on a given set of test data. The
output of the test run should match the expected results. Sometimes, system testing is considered as a
part of implementation process.
Using the test data following test run are carried out:
Program test
System test
Program test: When the programs have been coded and compiled and brought to working conditions,
they must be individually tested with the prepared test data. All verification and validation be checked
and any undesirable happening must be noted and debugged (error corrected).
System Test: After carrying out the program test for each of the programs of the system and errors
removed, then system test is done. At this stage the test is done on actual data. The complete system is
executed on the actual data. At each stage of the execution, the results or output of the system is
analyzed. During the result analysis, it may be found that the outputs are not matching the expected
output of the system. In such case, the errors in the particular programs are identified and are fixed and
further tested for the expected output.
(vi) Implementation: After having the user acceptance of the new system developed, the
implementation phase begins. Implementation is the stage of a project during which theory is
turned into practice. The major steps involved in this phase are:
Acquisition and Installation of Hardware and Software
Conversion
User Training
Documentation
The hardware and the relevant software required for running the system must be made fully
operational before implementation. The conversion is also one of the most critical and expensive
activities in the system development life cycle. The data from the old system needs to be converted to
operate in the new format of the new system. The database needs to be setup with security and
recovery procedures fully defined.
During this phase, all the programs of the system are loaded onto the user’s computer. After loading
the system, training of the user starts. Main topics of such type of training are:
How to execute the package?
How to enter the data?
How to process the data (processing details)?
How to take out the reports?
The documentation of the system is also one of the most important activity in the system development
life cycle. This ensures the continuity of the system. Generally following two types of documentations
are prepared for any system.
User or Operator Documentation
System Documentation
(vii) Maintenance: Maintenance is necessary to eliminate errors in the system during its working
life and to tune the system to any variations in its working environments. It must meet the scope of
any future enhancement, future functionality and any other added functional features to cope up
with the latest future needs. It has been seen that there are always some errors found in the systems
that must be noted and corrected. It also means the review of the system from time to time. The
review of the system is done for:
knowing the full capabilities of the system
knowing the required changes or the additional requirements
studying the performance.
If a major change to a system is needed, a new project may have to be set up to carry out the
change. The new project will then proceed through all the above life cycle phases.
EVALUATION
1. Briefly give a description of System development cycle.
2. List various levels of testing.
READING ASSIGNMENT
Read on Changeover during implementation stage and briefly describe three changeover methods.
WEEKEND ASSIGNMENT
1. A system analyst identifies the need for a change in approach in a company during ________
2. The new system is test run during ___________
3. The first stage to consider in system development is ______________
4. The system development has _______________ phases.
5. The new system will still be subjected to _________ even though it is working.
ESSAY QUESTIONS
1. Briefly give a description of System development cycle.
2. List various levels of testing.