|
Long-term plan unit: 10.1A Computer Systems and Information Security |
School: |
||||
|
Date: |
Teacher name: |
||||
|
Grade: |
Number present: |
absent: |
|||
|
The topic of the lesson:
|
Organization of Computer Networks |
||||
|
Learning objectives(s) that this lesson is contributing to |
10.6.1.1 describe the purpose of network components (nodes, routes, commutators); 10.6.1.2 explain the purpose and presentation of an IP address; 10.6.1.3 explain the purpose of DNS; 10.6.1.4 explain the purpose of a private virtual network |
||||
|
Lesson objectives |
· define the terms IP address, Domain Name Server, URL; · describe difference between IP address, Domain Name, URL; · define the term Network protocols; · describe types of Network protocols; |
||||
|
Success criteria |
All learners will be able to: Explain the purpose of network components (nodes, routes, commutators); Explain the purpose of DNS;
|
||||
|
Language objectives
|
Network protocols, IP address, Domain Name, Domain Name Server, URL, a network identifier part, a host identifier part. Useful sets of phrases for dialogue and writing: Network protocols are used … Types of network protocols are … Protocol for sending and receiving emails … Protocol for loading websites … Protocol for sending files … Protocol for loading secure websites … The IP address is used … The Domain Name is used … The URL is used … Difference between IP and Domain Name … |
||||
|
Value links |
Soft skills Respect for each other when working in groups
|
||||
|
Cross curricular links |
English |
||||
|
Previous learning |
Information protection |
||||
|
Plan |
|||||
|
Planned lesson stages |
Planned activities |
Resources |
|||
|
Beginning
0-10
|
Organizational moment: Question for students: Can you remember what we discussed in our previous lesson? At the beginning of the lesson, students in the two groups will perform the following exercise to determine the topic. Exercise. Encrypted sentence. Mix the words in the sentence on the topic and ask the students to restore the original sentence.
Familiarization with the topic and objectives of the lesson, what we will do in the lesson. |
Application 1
|
|||
|
Middle 10-20 min
20-30
30-37
|
Group workStudents will be divided into three groups. They will use the "Napkin Diagram" method, and will discuss about IP address, Domain Name Server, URL. The task will be written in the center of the diagram. Each student should write the information in his section of the diagram. Students moving the diagram around, reading the records of other students, and discuss the topic in the group. After discussion in the group, students will present their work.At the beginning, the students study the topic themselves. Then, to conclude a new topic, students ask each other question.Self-evaluation of group workStudents evaluate their role in group work. Write down your conclusion. Determine the purpose for the next group work.Evaluation of group workStudents evaluate the work of other groups according to the criteria.Individual workThen, to summarize a new topic students perform the tasks. More successful students can perform additional tasks.If necessary, strong students provide support to weak students. In pairs evaluate the results and gives feedback. The teacher observes the process peer assessment, if necessary, gives feedback.
Additional taskIn a whole class discussion talk about of IP, DNS, URL address.Each student chooses one card with a question and answers the question. |
Poster
Application 2
Application 3
Application 4 |
|||
|
The end of the lesson 37 - 40
|
At the end of the lesson, learners reflect on their learning: ✓ What has been learned ✓ What remained unclear ✓ What needs more attention Reflection Thermometer:
380С is not interesting, hard 340С useless, priceless
|
|
|||
|
Differentiation – how do you plan to give more support? How do you plan to challenge the more able learners? |
Assessment – how are you planning to check learners’ learning? |
Health and
safety check |
|||
|
Differentiation can be expressed in the selection of tasks, in the expected result from a particular student, in providing individual support to the student, in selecting the educational material and resources, taking into account the individual abilities of the students (Theory of Multiple Intelligence by Gardner). Differentiation can be used at any stage of the lesson, taking into account the rational use of time. |
Use this section to record the methods that you will use to assess what the students have learned during the lesson.
|
Health and safety check links. Used active exercises. Items applied from the Safety Rules in this lesson. |
|||
|
Reflection
Were the lesson objectives/learning objectives realistic? Did all learners achieve the LO? If not, why? Did my planned differentiation work well? Did I stick to timings? What changes did I make from my plan and why?
|
Use the space below to reflect on your lesson. Answer the most relevant questions from the box on the left about your lesson. |
||||
|
|
|||||
|
Summary evaluation
What two things went really well (consider both teaching and learning)?
1:
2:
What two things would have improved the lesson (consider both teaching and learning)?
1:
2:
What have I learned from
this lesson about the class or individuals that will inform my next lesson?
|
|||||
Application 1
IP Address - numerical label assigned to each device participating in a computer network that uses the Internet Protocol.
Domain Name - humanly-memorable names for Internet participants such as computers, networks, and services.
Protocol - a set of rules governing the way that devices communicate with each other.
Network protocols are divided into two types: Secure and Non-secure protocols.
Application 2
Marks of assessments: 0 = nothing 1 = sometimes 2 = often 3 = always
|
I respect and I can listen to the opinions of students |
I share my useful ideas |
If necessary, I dispute opinions |
I take part in the decision-making process |
Total score |
|
3 2 1 0 |
3 2 1 0 |
3 2 1 0 |
3 2 1 0 |
|
|
|
|
|
|
|
What conclusion can I draw? __________________________________________________________________________________________________________________________________________________________________________________
What is my goal for the next group work?
__________________________________________________________________________________________________________________________________________________________________________________
|
Сorrect and accurate presentation of the material |
Logic of presentation, available, clear |
Culture of presentation |
Answer the questions |
Total score |
|
3 2 1 0 |
3 2 1 0 |
3 2 1 0 |
3 2 1 0 |
|
|
|
|
|
|
|
Wishes and recommendations
__________________________________________________________________________________________________________________________________________________________
Application 3
Name ______________
1. What is an IP address, give an example?
____________________________________________________________________________________________________________________________________________________
2. What is the IP address range for an internal network?
____________________________________________________________________________________________________________________________________________________
3. An IP address consists of two parts. Define the Network and Host Identification part of the IP address 192.168.1.1.
Network part ___________ Host Identification part ____________
4. Users of the network, instead of IP addresses uses DNS-addresses.
i. What is DNS address?
______________________________________________________________________________________________________________________________________________________________
ii. Describe one function of DNS server.
________________________________________________________________________________________________________________________________________________________________________
5. What is an URL address, give an example?
__________________________________________________________________________________________________________________________________________________________________________________
Application 4
1. What is a protocol?
2. What are Secure and Non-secure protocols?
3. Name the protocol used for the sending email
4. Name the protocol used for the loading websites
5. Name the protocol used for the sending files
6. Name the protocol used for the loading secure websites
7. Name the protocol used for the receiving emails
8. Differences from HTTP and HTTPS
Скачано с www.znanio.ru
Материалы на данной страницы взяты из открытых источников либо размещены пользователем в соответствии с договором-офертой сайта. Вы можете сообщить о нарушении.