Www.eeducationgroup.com



Computer Studies Schemes of Work

FORM : THREE

TERM : 1 TEACHER:

YEAR : 2011 HEAD OF DEPT:

| | | | | | | |

|WK |LESSON |TOPIC/ |OBJECTIVES |TEACHING METHOD |TEACHING/ |REMARKS |

| | |SUB-TOPIC | | |LEARNING | |

| | | | | |RESOURCES | |

|1 |1 & 2 |STUDENTS | HAVE NOT REPORTED TO SCHOOL | | | |

| |3 | BRIEFING |CONCERNING FORM THREE WORK | | | |

| |4 |DATA REPRESENTATION IN A COMPUTER|By the end of the lesson, the learner should be able to: |- brief lecture method |Longhorn Bk 3 | |

| | | |i) define the term; digital signal and analog signal |- question and answer |By S. Mburu & | |

| | | |ii) explain the meaning of: |method |G. Chemwa | |

| | | |amplitude |- discussion method |1/Ed (2005) | |

| | | |frequency | |P 1-2 | |

| | | |periodic time | |Nairobi | |

| | | |modulation | |Longhorn Publisher | |

| | | |demodulation | | | |

Computer Studies Schemes of Work

FORM : THREE

TERM : 1 TEACHER:

YEAR : 2011 HEAD OF DEPT:

| | | | | | | |

|WK |LESSON |TOPIC/ |OBJECTIVES |TEACHING METHOD |TEACHING/ |REMARKS |

| | |SUB-TOPIC | | |LEARNING | |

| | | | | |RESOURCES | |

|2 |1 & 2 |Concept of data |By the end of the lesson, the learner should be able to: |- question and answer |Longhorn Bk 3 | |

| | |representation in digital|i) explain data representation in electronic circuits |Method |By S. Mburu & | |

| | |computers |ii) describe data representation on magnetic |- discussion method |G. Chemwa | |

| | | |media | |1/Ed (2005) | |

| | | |iii) describe data representation on optical media | |P 3-5 | |

| | | |iv) explain the meaning of the terms: | |Nairobi | |

| | | |bits | |Longhorn Publisher | |

| | | |bytes | |Aid | |

| | | |a nibble | |-Floppy disk | |

| | | |word | |- Optical media | |

| |3 |Types of data |By the end of the lesson, the learner should be able to: |- brief lecture method |Longhorn Bk 3 | |

| | |representation |i) classify four major categories of number system |- question and answer |By S. Mburu & | |

| | | |ii) determine the magnitude of number using three |method |G. Chemwa | |

| | | |parameters |- discussion method |1/Ed (2005) | |

| | | | | |P 6-7 | |

| | | | | |Nairobi | |

| | | | | |Longhorn Publisher | |

| |4 |Binary, octal, |By the end of the lesson, the learner should be able to: |- question and answer |Longhorn Bk 3 | |

| | |hexadecimal number system|i) change binary number to decimal |method |By S. Mburu & | |

| | | |ii) change octal number to decimal |- discussion method |G. Chemwa | |

| | | |iii) change hexadecimal number to decimal | |1/Ed (2005) | |

| | | | | |P 7-9 | |

| | | | | | | |

| | | | | |Dr. John Onunga & Renu Shah | |

| | | | | |P14-19 | |

Computer Studies Schemes of Work

FORM : THREE

TERM : 1 TEACHER:

YEAR : 2011 HEAD OF DEPT:

| | | | | | | |

|WK |LESSON |TOPIC/ |OBJECTIVES |TEACHING METHOD |TEACHING/ |REMARKS |

| | |SUB-TOPIC | | |LEARNING | |

| | | | | |RESOURCES | |

|3 |1 & 2 |Converting decimal |By the end of the lesson, the learner should be able to: |- brief lecture method |Longhorn Bk 3 | |

| | |number to binary |i) name two possible methods for converting |- question and answer |By S. Mburu & | |

| | | |decimal number |method |G. Chemwa | |

| | | |ii) use long division method to convert decimal |- discussion method |1/Ed (2005) | |

| | | |number to binary number | |P 10-12 | |

| | | |iii) use place value method to convert decimal | |Nairobi | |

| | | |number to binary number | |Longhorn Publisher | |

| |3 |Converting binary |By the end of the lesson, the learner should be able to: |- question and answer |Longhorn Bk 3 | |

| | |fraction to decimal |i) convert a binary fraction to decimal number |method |By S. Mburu & | |

| | |number |ii) convert a decimal fraction to binary |- discussion method |G. Chemwa | |

| | | | | |1/Ed (2005) | |

| | | | | |P 13-15 | |

| |4 |Converting octal number |By the end of the lesson, the learner should be able to: |- question and answer |Longhorn Bk 3 | |

| | |to decimal and binary |i) convert octal number to decimal |method |By S. Mburu & | |

| | | |ii) convent octal number to binary |- discussion method |G. Chemwa | |

| | | | | |1/Ed (2005) | |

| | | | | |P 15-17 | |

| | | | | | | |

| | | | | |Dr. John Onunga and Renu Shar| |

| | | | | |P 14-16 | |

Computer Studies Schemes of Work

FORM : THREE

TERM : 1 TEACHER:

YEAR : 2011 HEAD OF DEPT:

| | | | | | | |

|WK |LESSON |TOPIC/ |OBJECTIVES |TEACHING METHOD |TEACHING/ |REMARKS |

| | |SUB-TOPIC | | |LEARNING | |

| | | | | |RESOURCES | |

|4 |1 &2 |Converting octal number |By the end of the lesson, the learner should be able to: |- discussion method |Longhorn Bk 3 | |

| | |to decimal and binary |i) convert octal number to binary numbers |- question and answer |By S. Mburu & | |

| | |number |ii) convert hexadecimal numbers to decimal |method |G. Chemwa | |

| | | |iii) convert hexadecimal numbers into binary | |1/Ed (2005) | |

| | | | | |P 18-21 | |

| | | | | | | |

| | | | | |Dr. John Onunga and Renu | |

| | | | | |Shar | |

| | | | | |P 16-19 | |

| |3 |Symbolic representation |By the end of the lesson, the learner should be able to: |- brief lecture method |Longhorn Bk 3 | |

| | |using coding schemes |i) state three common coding schemes |- question and answer |By S. Mburu & | |

| | | |ii) explain on three coding schemes |method |G. Chemwa | |

| | | |iii) explain three ways of representing a signed |- discussion method |1/Ed (2005) | |

| | | |binary numbers | |P 22-23 | |

| | | | | | | |

| | | |Assignment | |Dr. John Onunga and Renu | |

| | | |Review question 1.8 | |Shar | |

| | | |No. 2,5,7 &10 | |P 2-5 | |

| |4 |One’s (1’s) complement |By the end of the lesson, the learner should be able to: |- question and answer |Longhorn Bk 3 | |

| | | |i) explain the meaning of the word complement |method |By S. Mburu & | |

| | | |ii) perform one’s complement using binary |- discussion method |G. Chemwa | |

| | | |numbers | |1/Ed (2005) | |

| | | |iii) perform two’s complement | |P 23-26 | |

| | | |iv) carryout binary addition | | | |

| | | |Assignment | |Dr. John Onunga and Renu | |

| | | |Review question 1.8 | |Shar | |

| | | |No. 1,5,8 &12 | |P 21-22 | |

Computer Studies Schemes of Work

FORM : THREE

TERM : 1 TEACHER:

YEAR : 2011 HEAD OF DEPT:

| | | | | | | |

|WK |LESSON |TOPIC/ |OBJECTIVES |TEACHING METHOD |TEACHING/ |REMARKS |

| | |SUB-TOPIC | | |LEARNING | |

| | | | | |RESOURCES | |

|5 |1 & 2 |Binary subtraction |By the end of the lesson, the learner should be able to: |- discussion method |Longhorn Bk 3 | |

| | | |i) perform direct subtraction |- question and answer |By S. Mburu & | |

| | | |ii) carryout subtraction using ones complement |method |G. Chemwa | |

| | | |iii) carryout subtraction using twos complement | |1/Ed (2005) | |

| | | |iv) carryout binary multiplication | |P 26-29 | |

| | | |v) carryout binary division | | | |

| | | | | |Dr. John Onunga and Renu | |

| | | |Assignment | |Shar | |

| | | |Revision questions | |P 26-28 | |

| | | |No. 1,2, 4(b), 7 b (iii), 8 & 9b | | | |

| |3 |DATA PROCESSING CYCLE | |Learner to: |Longhorn Bk | |

| | | |By the end of the lesson, the learner should be able to: | |By S. Mburu & G. Chemwa | |

| | | |i) define the terms: |i) define the given terms |P 32-34 | |

| | | |-data | |Ref | |

| | | |-data processing |through question and |Computer Studies | |

| | | |-data collection |answer method |By Dr John Onunga & Renu | |

| | | |ii) explain four main stages of data |ii) explain four main |Shah | |

| | | |processing |stages of data |P 32-33 | |

| | | | |processing | | |

| | | |iii) describe the stages of data |iii) describe the stages of | | |

| | | |collection |data collection | | |

| |4 |Description of errors in |By the end of the lesson, the learner should be able to: |- discussion method |Longhorn Bk | |

| | |data processing |i) explain the meaning of transcription errors, |- question and answer |By S. Mburu & G. Chemwa | |

| | | |computation errors and algorithm errors |method |P 34-37 | |

| | | |ii) name and explain the examples of above errors | | | |

| | | |iii) define the term data integrity | | | |

| | | |iv) explain on threats to data integrity | | | |

Computer Studies Schemes of Work

FORM : THREE

TERM : 1 TEACHER:

YEAR : 2011 HEAD OF DEPT:

| | | | | | | |

|WK |LESSON |TOPIC/ |OBJECTIVES |TEACHING METHOD |TEACHING/ |REMARKS |

| | |SUB-TOPIC | | |LEARNING | |

| | | | | |RESOURCES | |

|6 |1 & 2 |Data processing methods |By the end of the lesson, the learner should be able to: |Learner to: |Ref | |

| | | |i) outline data processing methods through |i) list data processing |Longhorn Bk | |

| | | |discussion method |methods |By S. Mburu & G. Chemwa | |

| | | |ii) explain the flowing: |ii) explain various data |P 37-40 | |

| | | |- manual data processing |processing | | |

| | | |- mechanical data processing | |Ref | |

| | | |- electronic data processing | |Computer Studies | |

| | | | | |By Dr John Onunga & Renu | |

| | | |iii) define the terms:- file, records & character | |Shah | |

| | | |ii) outline the advantages of computer files | |P 43-45 | |

| | | |iii) explain the logical and physical file | | | |

| |3 |Types of computer |By the end of the lesson, the learner should be able to: |- discussion method |Ref | |

| | |processing files |i) Outline common types of |- question and answer |Longhorn Bk | |

| | | |processing files |method |By S. Mburu & G. Chemwa | |

| | | |ii) describe file organization methods | |P 40- 42 | |

| |4 |Electronic data |By the end of the lesson, the learner should be able to: |- brief lecture method |Longhorn Bk 3 | |

| | |processing |i) state at least four electronic data processing modes |- question and answer |By S. Mburu & | |

| | | |ii) explain the following files: |method |G. Chemwa | |

| | | |- master files |- discussion method |1/Ed (2005) | |

| | | |- transaction (movement) file | |P 43-45 | |

| | | |- reference file | | | |

| | | |- backup file | |Dr. John Onunga and Renu Shar| |

| | | |- report file | |P 61-69 | |

| | | |- sort file | | | |

Computer Studies Schemes of Work

FORM : THREE

TERM : 1 TEACHER:

YEAR : 2011 HEAD OF DEPT:

| | | | | | | |

|WK |LESSON |TOPIC/ |OBJECTIVES |TEACHING METHOD |TEACHING/ |REMARKS |

| | |SUB-TOPIC | | |LEARNING | |

| | | | | |RESOURCES | |

|7 |1,2,3 | |MID TERM EXAMS, | | | |

| |& | |THEN SCHOOL BREAK FOR | | | |

| |4 | |HALF TERM/ RECESS | | | |

|8 |1 & 2 |ELEMENTARY PROGRAMMING |By the end of the lesson, the learner should be able to: |- brief lecture method |Ref | |

| | |PRINCIPLES |i) define the terms: programming , syntax |- question and answer |Longhorn Bk | |

| | | |ii) explain the terms: source code, object code |method |By S. Mburu & G. Chemwa | |

| | | |- translators ,assembler, interpreter, compiler |- discussion method |P 46-48 | |

| | | |iii) differentiate between the interpreter and compiler | | | |

| | |Levels of programming |By the end of the lesson, the learner should be able to: |Learner to: |Ref | |

| | |languages |i) name two level of programming |i) list two level of |Longhorn Bk | |

| | | |languages and give examples |programming |By S. Mburu & | |

| | | |ii) outline the advantages and |languages and give |G. Chemwa | |

| | | |disadvantages of high level |examples |1/Ed (2005) | |

| | | |Languages |ii) outline the |P 49-51 | |

| | | |iii) describe third generation |advantages and |Nairobi | |

| | | |languages |disadvantages of high |Longhorn Publisher | |

| | | | |level | | |

| | | | |Languages |Ref | |

| | | | |iii) describe third |Computer Studies | |

| | | | |generation languages |By Dr John Onunga & Renu | |

| | | | | |Shah | |

| | | | | |2/Ed (2005) | |

| | | | | |P 73-78 | |

| | | | | |Mariwa Publisher | |

Computer Studies Schemes of Work

FORM : THREE

TERM : 1 TEACHER:

YEAR : 2011 HEAD OF DEPT:

| | | | | | | |

|WK |LESSON |TOPIC/ |OBJECTIVES |TEACHING METHOD |TEACHING/ |REMARKS |

| | |SUB-TOPIC | | |LEARNING | |

| | | | | |RESOURCES | |

|9 |1 & 2 |Fourth generation |By the end of the lesson, the learner should be able to: |- discussion method |Ref | |

| | |languages |i) explain the importance of application generator |- question and answer |Longhorn Bk | |

| | |(4 GLs) |ii) give examples of forth generation languages |method |By S. Mburu & G. Chemwa| |

| | | |iii) name examples of fifth generation languages | |P 53-55 | |

| | | |iv) give examples of OOP | | | |

| | | |v) explain the meaning of encapsulation | | | |

| |3 |Web scripting language |By the end of the lesson, the learner should be able to: |- demonstration method |Longhorn Bk 3 | |

| | | |i) write in full the following: HTML & XML |- question and answer |By S. Mburu & | |

| | | |ii) state reasons why HTML is not a true |method |G. Chemwa | |

| | | |programming language |- discussion method |1/Ed (2005) | |

| | | |iii) enter the codes in the program editors window | |P 55-57 | |

| |4 |Advantages and |By the end of the lesson, the learner should be able to: |- discussion method |Ref | |

| | |disadvantage of |i) explain the advantages and disadvantages of |- question and answer |Longhorn Bk | |

| | |low-level and high-evel |low level languages |method |By S. Mburu & G. Chemwa| |

| | |languages |ii) explain the advantages and disadvantages of | |P 59-60 | |

| | | |high level languages | | | |

Computer Studies Schemes of Work

FORM : THREE

TERM : 1 TEACHER:

YEAR : 2011 HEAD OF DEPT:

| | | | | | | |

|WK |LESSON |TOPIC/ |OBJECTIVES |TEACHING METHOD |TEACHING/ |REMARKS |

| | |SUB-TOPIC | | |LEARNING | |

| | | | | |RESOURCES | |

|10 |1 & 2 |Program development |By the end of the lesson, the learner should be able to: |- question and answer |Longhorn Bk 3 | |

| | | |i) state six stages of program development |method |By S. Mburu & | |

| | | |ii) explain the meaning of problem recognition |- discussion method |G. Chemwa | |

| | | |ii) state three circumstances that a programmer | |1/Ed (2005) | |

| | | |can identify the problems | |P 60-63 | |

| | | |iii)explain on problem definition | | | |

| |3 |Program design |By the end of the lesson, the learner should be able to: |- brief lecture method |Ref | |

| | | |i) explain the meaning of program design |- question and answer |Longhorn Bk | |

| | | |ii) explain the characteristics of non-modular |method |By S. Mburu & G. Chemwa | |

| | | |program and a modular program |- discussion method |P 63-65 | |

| | | |iii) compare the program coding using Pascal and | | | |

| | | |C++ | | | |

| |4 |Program testing and |By the end of the lesson, the learner should be able to: |- question and answer |Longhorn Bk 3 | |

| | |debugging |i) define the terms: syntax errors & logical errors |method |By S. Mburu & | |

| | | |ii) explain methods for testing the programs for error |- discussion method |G. Chemwa | |

| | | |iii) explain the meaning of system implementation and | |1/Ed (2005) | |

| | | |maintenance | |P 65-67 | |

| | | |iv) state the three target group for system maintenance | | | |

| | | | | |Dr. John Onunga and Renu | |

| | | | | |Shah | |

| | | | | |P88-93 | |

Computer Studies Schemes of Work

FORM : THREE

TERM : 1 TEACHER:

YEAR : 2011 HEAD OF DEPT:

| | | | | | | |

|WK |LESSON |TOPIC/ |OBJECTIVES |TEACHING METHOD |TEACHING/ |REMARKS |

| | |SUB-TOPIC | | |LEARNING | |

| | | | | |RESOURCES | |

|11 |1 & 2 |Development of |By the end of the lesson, the learner should be able to: |-question and answer |Longhorn Bk | |

| | |algorithms and program |i) define the terms: |Method |By S. Mburu & G. Chemwa | |

| | |flowchart |- algorithm |-discussion method |P 68-70 | |

| | | |- pseudo code | | | |

| | | |- flowchart | |Computer Studies | |

| | | |ii) outline the guideline for designing | |By Dr John Onunga & Renu | |

| | | |a good pseudo code | |Shah | |

| | | |iii) explain the guideline for drawing | |P 96-99 | |

| | | |a flowchart | | | |

| |3 |Comparison between a |By the end of the lesson, the learner should be able to: |- question and answer |Ref | |

| | |pseudo code and a |i) compare between a pseudo code |- discussion method |Longhorn Bk | |

| | |flowchart, program |and a flowchart | |By S. Mburu & G. Chemwa | |

| | |control structures |ii) go through the examples of a | |P 71-72 | |

| | | |flowchart | | | |

| | | |Assignment | | | |

| | | |Write a pseudo code for a program that would be used to solve | | | |

| | | |the equation E= MC2 | | | |

| |4 |Program control |By the end of the lesson, the learner should be able to: |- brief lecture method |Longhorn Bk | |

| | |structures |i) explain the meaning of control structures |- question and answer |By S. Mburu & G. Chemwa | |

| | | |ii) state three control structures | |P 72-74 | |

| | | |iii) explain on sequence and selection control | | | |

| | | |structure | |Dr. John Onunga & Renu Shah | |

| | | | | |P 93-95 | |

|12 | | |EXAMS, MARKING AND CLOSING THE SCHOOL | | | |

|& | | | | | | |

|13 | | | | | | |

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download