|
Long-term plan unit: 10.1B Video-editing rules |
School: |
||||
|
Date: |
Teacher name: |
||||
|
Grade: |
Number present: |
absent: |
|||
|
The topic of the lesson:
|
Identification methods |
||||
|
Learning objectives(s) that this lesson is contributing to |
10.6.2.3 explain the use of user data security measures: passwords, accounts, authentication, biometric authentication |
||||
|
Lesson objectives |
To acquaint students with the concepts of information security and information protection, the main threats and ways to protect information from them. |
||||
|
Success criteria |
He explains in detail "videography"
He explains in detail the "Video Editing"
Explains in detail the "time division "
Explains in detail the "Connect" |
||||
|
Language objectives
|
Students can:
- describe various methods of protecting information
- use appropriate terminology and language when describing the negative impact of computers and measures to mitigate it
- justify the choice of mechanisms to protect IP from a certain information risk;
Specific vocabulary and terminology: radiation, virus, password, A set of useful phrases for communication / writing: One of the negative effects of using a computer is ... what causes .... To reduce the harmful effects, users can ... |
||||
|
Value links |
Value in accordance with the national idea " Мігілік ел ": Academic integrity Cooperation Functional literacy
The instilling of values is carried out through / through a dialogue on academic integrity, cooperation through group work, functional literacy through practical tasks. |
||||
|
Cross curricular links |
English |
||||
|
Previous learning |
- the purpose and functionality of the basic mechanisms for ensuring information security; - the most important requirements of regulatory documents for the organization of information protection;
|
||||
|
Plan |
|||||
|
Planned lesson stages |
Planned activities |
Resources |
|||
|
Beginning
0-3
3-20 mins |
Purpose: the organization began the lesson. Greeting. Mark missing. Test the readiness of students for the lesson. The concentration of attention of students. Setting lesson objectives
Introduction of new material
Questions for parsing topics : • What is information ? • what such a password ? • What are the problems of modern information security ?
[The teacher explains the main concepts of information security ]: Before you begin to protect information , you need to do some research.Below are some questions you should consider: • How to protect information in computers ? • W hat is a biometric security system?
|
Board Work with the presentation(1-24 slides )
|
|||
|
Middle Individual work 10-20 min
20-35 min
|
Task 1 Individual task • Fill in the table of the advantages and disadvantages of the method of biometric identification • View video material . • Show the result to the teacher.
Teacher's notes : Using video in a classroom can change the pace and charm students. The segments that you use should not be too long. A few minutes of a film accompanied by language work can be much more interesting and effective than one and a half hours of watching TV without a goal. • Have the children talk about what they have seen. What do they think about the video ?
[Differentiation: Each student must understand what the video says ; Many students must find most textual content in a video; ]
|
Presentation (25-26 slides ) Didacticmaterial one
|
|||
|
The end of the lesson 35 - 40
|
Reflection on the board : • What was hard ? • What questions remain ? • Are all parts lightweight? • Was there something you already knew?
Home Task: • To study other objects of human identification . |
Presentation(27 slides ) |
|||
|
Differentiation – how do you plan to give more support? How do you plan to challenge the more able learners? |
Assessment – how are you planning to check learners’ learning? |
Health
and safety check |
|||
|
Differentiation can be expressed in the selection of tasks, in the expected result from a particular student, in providing individual support to the student, in selecting the educational material and resources, taking into account the individual abilities of the students (Theory of Multiple Intelligence by Gardner). Differentiation can be used at any stage of the lesson, taking into account the rational use of time. |
Use this section to record the methods that you will use to assess what the students have learned during the lesson.
|
Health and safety check links. Used active exercises. Items applied from the Safety Rules in this lesson. |
|||
|
Reflection
Were the lesson objectives/learning objectives realistic? Did all learners achieve the LO? If not, why? Did my planned differentiation work well? Did I stick to timings? What changes did I make from my plan and why?
|
Use the space below to reflect on your lesson. Answer the most relevant questions from the box on the left about your lesson. |
||||
|
|
|||||
|
Summary evaluation
What two things went really well (consider both teaching and learning)?
1:
2:
What two things would have improved the lesson (consider both teaching and learning)?
1:
2:
What have I learned from
this lesson about the class or individuals that will inform my next lesson?
|
|||||
Скачано с www.znanio.ru
Материалы на данной страницы взяты из открытых источников либо размещены пользователем в соответствии с договором-офертой сайта. Вы можете сообщить о нарушении.