Long-term plan unit: 10.1В: Information security |
School: |
||||
Date: |
Teacher name: |
||||
Grade: |
Number present: |
absent: |
|||
The topic of the lesson:
|
Data security measures |
||||
Learning objectives(s) that this lesson is contributing to |
10.1.3.2 describe security measures including the concepts: data back-up measures, encryption, mirroring
|
||||
Lesson objectives |
Know the different security measures Be able to do the back-up and mirroring of data on hard drives Know how the data encryption works |
||||
Success criteria |
All learners will be able to: Explain what security measures currently exist Know the differences between the mirroring and back-up of information Do the data back-up and mirroring Explain how data encryption works |
||||
Language objectives
|
Subject vocabulary and terminology: Data security measure, data mirroring, back-up of information, encryption, hard drive mirroring, restoring the default settings of system, back-up and restore of operating system, data integrity and confidentiality Speaking and writing helpful phrases: To save the back-up of…. When PC encrypts … |
||||
Value links |
Soft skills Respect for each other when working in groups
|
||||
Cross curricular links |
English |
||||
Previous learning |
Methods of identification |
||||
Plan |
|||||
Planned lesson stages |
Planned activities |
Resources |
|||
Beginning
0-3
3-10 mins |
Organizational moment: Question for students: Can you remember what we discussed in our previous lesson?
Teacher divides students into 2 groups to discuss following problems: 1) Imagine that all important data on your computer has been accidently deleted 2) Imagine that your page on the social network has been hacked What do you need to do to restore all of the important information that you lost? What security measures you need to use to prevent such situations? |
PPT Slide (1)
PPT Slide (2) |
|||
Middle 10-20 min
Individual work 20-30 min
Practice 30-35 min
|
Teacher introduces new topic Security measures: Data mirroring Data backup Encryption of information
|
PPT Slide (3-7)
PPT Slide (8)
PPT Slide (9) |
|||
The end of the lesson 35 - 40
|
At the end of the lesson, learners reflect on their learning: ✓ What has been learned ✓ What remained unclear ✓ What needs more attention Reflection Thermometer:
380С is not interesting, hard 340С useless, priceless
|
PPT Slide (10) |
|||
Differentiation – how do you plan to give more support? How do you plan to challenge the more able learners? |
Assessment – how are you planning to check learners’ learning? |
Health
and safety check |
|||
Differentiation can be expressed in the selection of tasks, in the expected result from a particular student, in providing individual support to the student, in selecting the educational material and resources, taking into account the individual abilities of the students (Theory of Multiple Intelligence by Gardner). Differentiation can be used at any stage of the lesson, taking into account the rational use of time. |
Use this section to record the methods that you will use to assess what the students have learned during the lesson.
|
Health and safety check links. Used active exercises. Items applied from the Safety Rules in this lesson. |
|||
Reflection
Were the lesson objectives/learning objectives realistic? Did all learners achieve the LO? If not, why? Did my planned differentiation work well? Did I stick to timings? What changes did I make from my plan and why?
|
Use the space below to reflect on your lesson. Answer the most relevant questions from the box on the left about your lesson. |
||||
|
|||||
Summary evaluation
What two things went really well (consider both teaching and learning)?
1:
2:
What two things would have improved the lesson (consider both teaching and learning)?
1:
2:
What have I learned from
this lesson about the class or individuals that will inform my next lesson?
|
|||||
Скачано с www.znanio.ru
Материалы на данной страницы взяты из открытых источников либо размещены пользователем в соответствии с договором-офертой сайта. Вы можете сообщить о нарушении.