1Computer Science_10_Revision_Information Security

  • docx
  • 10.05.2020
Публикация на сайте для учителей

Публикация педагогических разработок

Бесплатное участие. Свидетельство автора сразу.
Мгновенные 10 документов в портфолио.

Иконка файла материала 1Computer Science_10_Revision_Information Security.docx

                                        Short Term Plan

 

Long-term plan unit:

10.1A Information Security

School:

Date:

Teacher name:

Grade: 10

Number present:

absent:

The topic of the lesson:

 

Revision of Information Security

Learning objectives(s) that this lesson is contributing to

 

10.1.2.1 explain the meaning of information security, confidentiality and data integrity

10.1.2.2  describe precaution measures, including the concepts of backup and data encryption

10.1.2.3 justify the use of various identification methods

 

Lesson objectives

 

explain the principles of Information Security

Success criteria

 

All learners will be able to:

·     Know what is information security

·     Know what is information security measures

·     Know what is identification methods

 

Language objectives

 

 

Subject vocabulary and terminology:

Student is able to describe the meaning of information security, confidentiality and data integrity

For instance, describe precaution measures, including the concepts of backup and data encryption

Also, student is able to justify the use of various identification methods

 

Vocabulary and terminology specific to the subject:

Information security, confidentiality and data integrity, backup and data encryption, identification methods   

 

Useful expressions for dialogs and letters:

Methods to identify….

Ways to protect …

 

Value links

Soft skills

Respect for each other when working in groups

 

Cross curricular links

English

Previous learning

previous lessons

Plan

Planned lesson stages

Planned activities

Resources

Beginning

 

0-3

 

3-10

mins

Organizational moment: 

 

Discuss with students:

Learning objectives

Lesson objectives

Success criteria

Language objectives

 

Question for students:

 

Can you remember what we discussed in our previous lesson?

 

Teacher divides students in five groups and suggests the learners to discuss the following questions and tasks in groups:

 

1) What dangers can arise when transporting information over computer networks?

 

2) What methods do you know to identify a person when providing access to information?

 

3) What software and hardware ways do you know to protect the information?

 

4) In which situations there is a leak or loss of data?

 

5) Which data protection measures can be used for data integrity and confidentiality, including backup, encryption, and mirroring?

 

 

 

1-5 slides

 

 

 

 

 

 

 

 

 

 

6-7 slides

 

Middle

10-20 min

 

After discussing groups start presenting their thoughts on these questions and teacher slightly moves to the next tasks:

 

Teacher gives each group 3-5 definitions of one term that characterizes the situation. Let the learners discuss each definition and justify the choice of the best of them (the most complete and briefly stated definition).

 

Discuss the work of the groups and together formulate a definition of the concept of "information security", "confidentiality", "integrity", "accessibility".

 

 

8-9 slides

 

 

 

20-37min

Teacher asks students a questions about identification, checking their existing knowledge:

 

1) What is identification?

 

2) What are the methods of identification?

 

3) How does identification helps us in our everyday life?

 

4) Ask the groups to prepare arguments about the advantages, disadvantages of one of the identification methods and the prospects for further use.

 

10-11 slides

 

The end of the lesson

37 - 40

 

 

 

At the end of the lesson, learners reflect on their learning:

            What did you learn in class?

            What was the most interesting?

            What was left incomprehensible?

            Was this lesson helpful to you?

 

12 slide

 

Differentiation – how do you plan to give more support? How do you plan to challenge the more able learners?

Assessment – how are you planning to check learners’ learning?

Health and safety check
ICT links

Differentiation can be expressed in the selection of tasks, in the expected result from a particular student, in providing individual support to the student, in selecting the educational material and resources, taking into account the individual abilities of the students (Theory of Multiple Intelligence by Gardner). Differentiation can be used at any stage of the lesson, taking into account the rational use of time.

Use this section to record the methods that you will use to assess what the students have learned during the lesson.

 

Health and safety check links.

Used active exercises.

Items applied from the Safety Rules in this lesson.

Reflection

 

Were the lesson objectives/learning objectives realistic? Did all learners achieve the LO?

If not, why?

Did my planned differentiation work well?

Did I stick to timings?

What changes did I make from my plan and why?

 

Use the space below to reflect on your lesson. Answer the most relevant questions from the box on the left about your lesson. 

 

 

 

 

 

 

 

 

 

Summary evaluation

 

 

What two things went really well (consider both teaching and learning)?

 

1:

 

2:

 

What two things would have improved the lesson (consider both teaching and learning)?

 

1:

 

2:

 

What have I learned from

 

this lesson about the class or individuals that will inform my next lesson?

 

 


 

Скачано с www.znanio.ru