You are on page 1of 4

WILLIAMSVILLE SECONDARY SCHOOL

INFORMATION TECHNOLOGY DEPARTMENT


LESSON PLAN

TEACHERS NAME: Mr. Zahir Ali

SUBJECT: Information Technology

DATE:

CLASS:

17th October 2014

TIME:

9:40 10:10

Form 3

LENGTH OF PERIOD:

40 mins

Syllabus: CSEC Information Technology Curriculum


Unit Title:
Lesson 1:

Protecting and Securing Information


Use of the following methods to secure data : passwords and encryption, use of a firewall, archiving, back - up and recovery

RESOURCES
Teacher Resources

Student resources

Laptop
Projector and Large Screen
Microsoft Office
Video Presentation

Laptop/Computers
Microsoft Office : Ms. Word
Peer Assessment Checklist
Document on Activity Re: Handout on steps to
password protect a document
Assessment sheet

PREVIOUS KNOWLEDGE - Students should:

Be able to open a word document


Page | 1

Be able to edit and save such document

OBJECTIVES
Cognitive
At the end of the lesson students will:

Psychomotor
At the end of the lesson students
should be able to:

1. Describe the importance of protecting and


securing information.
2. List five different methods to protect
information
3. Open a word document and create a
password.
4. Ensure that the firewall is turned on.

Affective
At the end of the lesson students will be able to:

Work together with their peers

Willingly participate to create a strong password


And ensure the firewall is turned on

ASSESSMENT STRATEGY with Objective


Cognitive

Assessment Strategy

1. Understand the importance of Activity 1 oral assessment


protecting and securing
information.
(Analyzing/Understanding)

Affective

Assessment Strategy

Work effectively together with their Observation


peers

2. List five different methods to


Activity 2- note taking
protect information
(Understanding)
3. Open a word document and Activity 3 using activity sheet 1

Observation
Page | 2

create a password using the


activity sheet 1. (Creating)

instructions on creating a password

4. Ensure that the firewall is


Activity 4 - peer evaluation checklist
turned on by going to control
panel (Analyzing)
5. Assessment

Recommendation

Activity 5 Assessment Sheet

Set Induction

Teacher introduces the lesson by passing around a set of locks and requesting the students use these physical locks to secure documents on their
laptops, since it is impossible to use physical locks to secure software, discussion begins with students as to how we could secure documents.
Description of Teaching/Learning stratgies:

Teacher Activities
1. Teacher engages students in discussion about the
set induction

Student Expected Activities

Intelligence
being developed
1. Students listen to questions and participate in giving
VL, Inter
response.

Est. time to
complete
3 mins

2. Teacher instructs students to view a video about


2. Students would be expected to listen to the video.
the different ways to protect their data using software.

VS

5 mins

3. Teacher then instructs students to take some notes


on the methods of securing data which would be
shown through powerpoint

3. Students will write brief points from a powerpoint


display.

BK

10 mins

4. Teacher will guide students to open a word


document and create a password using activity sheet1

4. Students will participate in searching for a document


and creating a password.

LM

5 mins

5. Teacher will demonstrate how to save such


document, close it and then re - open

5. Students will follow instructions to complete the


task.

VL, LM

3 mins

Page | 3

6. Teacher will instruct students to go onto control


panel, systems and security, then Windows Firewall

6. Students will check the firewall status and turn it on


as instructed.

7. Teacher instructs students to use a checklist


provided for Peer review of other students document.

7. Peer review (checklist), students take turns going to


other students laptops to check if the password
works and if Windows Firewall is turned on.

4 mins
Inter, VL
5 mins
VS

8. Teacher request students to complete an assessment 8. Students do an assessment sheet.


sheet.

5 mins

END OF LESSON ACTIVITIES


Closure to lesson:
T.S. (Transition Statement):
B.S. (Bridging Statement):

Today we learnt how to use passwords to secure a document and the importance of protecting our data.

In the next class we would look at the physical restrictions that can be placed to secure information.

Multiple Intelligences

http://www.tecweb.org/styles/gardner.html
VS: Visual Spatial
VL: Verbal Linguistic
Inter: Interpersonal Intra: Intrapersonal BK: Body/ Kinesthetic
LM: Logic/Mathematical
M: Musical
N: Naturalistic
E: Existential

Page | 4

You might also like