Identification methods

  • docx
  • 01.05.2020
Публикация на сайте для учителей

Публикация педагогических разработок

Бесплатное участие. Свидетельство автора сразу.
Мгновенные 10 документов в портфолио.

Иконка файла материала Identification methods.docx

                                        Short Term Plan

Long-term plan unit:

10.1B Video-editing rules

School:

Date:

Teacher name:

Grade:

Number present:

absent:

The topic of the lesson:

 

Identification methods

Learning objectives(s) that this lesson is contributing to

10.6.2.3 explain the use of user data security measures: passwords, accounts, authentication, biometric authentication

Lesson objectives

To acquaint students with the concepts of information security and information protection, the main threats and ways to protect information from them.

Success criteria

He explains in detail "videography"

 

He explains in detail the "Video Editing"

 

Explains in detail the "time division "

 

Explains in detail the "Connect"

Language objectives

 

Students can:

 

- describe various methods of protecting information

 

- use appropriate terminology and language when describing the negative impact of computers and measures to mitigate it

 

- justify the choice of mechanisms to protect IP from a certain information risk;

 

Specific vocabulary and terminology:

radiation, virus, password,

A set of useful phrases for communication / writing:

One of the negative effects of using a computer is ... what causes ....

To reduce the harmful effects, users can ...

Value links

Value in accordance with the national idea

" Мігілік ел ":

Academic integrity

Cooperation

Functional literacy

 

The instilling of values ​​is carried out through / through a dialogue on academic integrity, cooperation through group work, functional literacy through practical tasks.

Cross curricular links

English

Previous learning

- the purpose and functionality of the basic mechanisms for ensuring information security;

- the most important requirements of regulatory documents for the organization of information protection;

 

Plan

Planned lesson stages

Planned activities

Resources

Beginning

 

0-3

 

 

 

 

 

3-20

mins

Purpose: the organization began the lesson.

Greeting. Mark missing. Test the readiness of students for the lesson. The concentration of attention of students.

Setting lesson objectives

 

Introduction of new material

 

Questions for parsing topics :

           What is information ?

           what such a password ?

           What are the problems of modern information security ?

 

[The teacher explains the main concepts of information security ]:

Before you begin to protect information , you need to do some research.Below are some questions you should consider:

           How to protect information in computers ?

           W hat is a biometric security system?

 

 

 

 

 

 

 

 

 

 

 

 

Board

Work with the presentation(1-24 slides )

 

Middle

Individual work

10-20 min

 

 

 

 

20-35 min

 

 

 

 

 

 

 

 

Task 1

Individual task

           Fill in the table of the advantages and disadvantages of the method of biometric identification

           View video material .

           Show the result to the teacher.

 

Teacher's notes :

Using video in a classroom can change the pace and charm students. The segments that you use should not be too long. A few minutes of a film accompanied by language work can be much more interesting and effective than one and a half hours of watching TV without a goal.

• Have the children talk about what they have seen. What do they think about the video ?

 

  [Differentiation:

Each student must understand what the video says ;

Many students must find most textual content in a video; ]

 

Presentation (25-26 slides )

Didacticmaterial one

 

The end of the lesson

35 - 40

 

 

 

 

 

 

 

Reflection on the board :

           What was hard ?

           What questions remain ?

           Are all parts lightweight?

           Was there something you already knew?

 

Картинки по запросу рефлексия

Home Task:

      To study other objects of human identification .

Presentation(27 slides )

Differentiation – how do you plan to give more support? How do you plan to challenge the more able learners?

Assessment – how are you planning to check learners’ learning?

Health and safety check
ICT links

Differentiation can be expressed in the selection of tasks, in the expected result from a particular student, in providing individual support to the student, in selecting the educational material and resources, taking into account the individual abilities of the students (Theory of Multiple Intelligence by Gardner). Differentiation can be used at any stage of the lesson, taking into account the rational use of time.

Use this section to record the methods that you will use to assess what the students have learned during the lesson.

 

Health and safety check links.

Used active exercises.

Items applied from the Safety Rules in this lesson.

Reflection

 

Were the lesson objectives/learning objectives realistic? Did all learners achieve the LO?

If not, why?

Did my planned differentiation work well?

Did I stick to timings?

What changes did I make from my plan and why?

 

Use the space below to reflect on your lesson. Answer the most relevant questions from the box on the left about your lesson. 

 

 

 

 

 

 

 

 

 

Summary evaluation

 

 

What two things went really well (consider both teaching and learning)?

 

1:

 

2:

 

What two things would have improved the lesson (consider both teaching and learning)?

 

1:

 

2:

 

What have I learned from

 

this lesson about the class or individuals that will inform my next lesson?

 

 

 

 

 

 


 

Скачано с www.znanio.ru

Посмотрите также