Professional Documents
Culture Documents
plan
template, I will be using a template provided by Marshall Swafford in course CTED 480.
Prior Knowledge: Students have been exposed to some, but not all, of the terms related to this
content in a previous unit. They should be familiar with the terms, malware, virus, copyright, Fair Use,
cyberbullying and privacy. They should also be familiar with the locating reliable sources on the Web.
Attitudes Toward Content: Some of my students don’t feel that this class should be a graduation
requirement and should only be for student pursuing an Information Technology career. Others
realize, usually after the unit of instruction is complete, that they can utilize the information and skills
as consumers/users of technology.
Academic Motivation: Seniors are very motivated to learn the content since they must pass my
course to fulfill a graduation requirement. Sophomores and Juniors are not as motivated since they
can retake the course in a future semester.
Education and Ability: All NMMI students are required to meet certain academic standards before
they are accepted into the program. We (as an institution) do not accept students with IEPs nor do we
have a policy which states we must provide alternative learning materials, tests, or extra time on
assignments to accommodate ELL students. Since I usually have ELL students, from multiple countries,
who have a difficult time following class lectures due to language issues, I try to incorporate
differentiation to support their learning.
Learning Preferences: The learning preferences are very diverse. They usually range from visual to
auditory and active to reflective. Some enjoy working in groups and others prefer to work alone.
Group Characteristics: Depends on the semester. My students range in age from 15-18 years old
(usually 16% Sophomores, 64% Juniors, and 20% Seniors). NMMI is a State-supported boarding high
school that accepts students from all over the world. I usually have students from Mexico, China, and
several states, other than New Mexico. In the past, I have had students from Cambodia, Taiwan,
Germany, South Korea, Samoa, and Kenya as well.
Physical Aspects: Students will move between the classroom, which is set up with five sets of tables
with four students per table (two students on each side facing each other), and the lab which is setup
with 24 computers (all with 17” monitors) with access controls, Internet access, and Microsoft Office
installed. They will also be using their NMMI issued laptops in the classroom. Both the classroom and
the lab have rolling adjustable chairs.
Relevance: The knowledge and skills learned in this unit will be applicable at home as well as in the
community where the student will be using a computing device. Every person using a computing
device connected to the Internet, regardless of country or culture, should be aware of digital security
risks and best practices for keeping information secure and protecting hardware from theft and
failure.
Adaptability and Accessibility: All the content material is available online (through Canvas) and is
accessible anytime (students receive an HP laptop upon arrival to campus and can access most
content on the Internet from 6am-12am daily). All students have credentials to the textbook
publisher site. This site has a multitude of resources available for most learning preferences. Students
have access to the e-book where they can have the book read aloud to them, change the font size,
bookmark pages, search the book, highlight sections (which then can be printed as notes), and create
their own flash cards. Each section in the book comes with a general-concept mind map that students
can use as a “starting point” for their own mind maps. SAM from Cengage provides students with
short videos discussing the main topics of the unit and a short practice quiz they can take to verify
their understanding. Students are able to watch the videos and take the practice quiz as many times
as they want.
Goals:
After completing this Unit and reading Unit 7 in the textbook New Perspectives Computer Concepts
2016 Enhanced, Comprehensive students will be able to:
define the term digital security risk.
list potential digital safety and security risks associated with computing devices.
describe various types of Internet and network attacks (malware, bonnets, denial of service
attacks, back doors, and spoofing) and explain ways to safeguard against these attacks,
including firewalls.
discuss techniques to prevent unauthorized computer access and use, including access
controls, user names, passwords, possessed objects, and biometric devices.
identify safeguards against hardware theft and failure.
explain options available for backing up.
identify risks and safeguards associated with wireless communications.
explain the security settings on your computer.
explain intellectual property and copyright as they apply to computing.
identify acts of copyright violation and the measures to prevent those acts.
discuss issues surrounding information privacy, including electronic profiles, cookies,
phishing, spyware, and adware, and social engineering.
Reflection
I will continually monitor the lesson throughout the two weeks, making adjustments to due dates,
teaching time, and materials, as necessary. At the conclusion of the lesson, I will survey students to
evaluate the effectiveness and relevance, of teaching materials. This will provide me with feedback
regarding shortfalls in meeting the needs (learning style specific materials) of my diverse student
body. I will also analyze the results of the lesson assessments to determine if some or all students
require any remedial work to become competent in the lesson objectives. If the majority of students
score below competent on any one of the lesson objectives, I will reteach as necessary and adjust the
lesson plan accordingly before the following semester.
Even if the lesson is successful, it will be imperative for me to revisit this lesson before each semester
to ensure the content is still relevant, standards have not changed, and links are still active. Since
technology is always evolving, adjustments are necessary periodically.
Student: _____________________
Grade: _________
There are many There are some Any problems are so Project is well edited
problems with the video problems but overall the minimal that they don't and effective.
that distract from its video is able to distract from the
effectiveness. Problems communicate about the effectiveness of the
may include sound issue. message.
issues, poor information,
not enough pictures, too
brief, too many effects,
etc.
Content lacks a central The content does not Information is presented The content includes a
theme, clear point of present a clearly stated as a connected theme clear statement of
view and logical theme, is vague, and with accurate, current purpose or theme and is
sequence of some of the supporting supporting information creative, compelling and
information. Much of information does not that contributes to clearly written. A rich
the supporting seem to fit the main understanding the variety of supporting
information is irrelevant idea or appears as a project’s main idea. information in the video
to the overall message. disconnected series of Details are logical and contributes to the
The viewer is unsure scenes with no unifying persuasive information understanding of the
what the message is main idea is effectively used. project’s main idea.
because there is little
persuasive information
and only one or two
facts about the topic are
articulated. Information
is incorrect, out of date,
or incomplete.
Pictures/video Needs Work Progressing Competent Mastery
Pictures/ video are Pictures/video are clear Pictures and video are Pictures and video are
blurry and detract from but do not have much to well suited to the topic. well suited to the topic.
the main idea. OR too do with the main idea. Some may be slightly All are clear and easily
few pictures/videos to blurry or out of focus visible.
send the appropriate but most are clear and
message. easily visible.
Tone and voice rarely Tone and voice Tone and voice Tone and voice convey
convey emotions or frequently convey frequently convey emotions and
enthusiasm. Recording is emotions or enthusiasm. emotions and enthusiasm. The
unclear and/or not loud Most of the recording is enthusiasm. The recording is clear and
enough to be heard. clear and loud enough to recording is clear and loud enough to be
Background sounds and be heard. Background loud enough to be heard. Background
effects absent or distract sounds and effects heard. Background sounds and effects blend
from the message. sometimes distract from sounds and effects with the message.
the message. usually blend with the
message.
Student has used no Student has used Student uses photo Student uses photo
transitions or photo/ photo/video effects, but and/or video effects and and/or video effects and
video effects. they do not enhance the transitions, but 1 or 2 transitions consistently
overall quality of the detract from the to enhance the quality.
message. Transitions message.
may be used but not
consistently.
Student does not cite Student uses Student uses Student uses
resources or uses information and data information and data information and data
information or data from two or more from only one reputable from two or more
from one unreliable sources, but one or source. Source is cited reputable sources. All
source. more are not reputable. correctly. sources are cited
One or more sources are correctly.
not cited or are
incorrectly cited
Permissions were not Most permissions All permissions and/or All permissions and/or
requested or attribution and/or attribution was attribution was given to attribution was given to
was not given for most given to use graphics use graphics and music use graphics and music
graphics and music and music "borrowed" "borrowed" from web "borrowed" from web
"borrowed" from web from web pages or pages or scanned from pages or scanned from
pages or scanned from scanned from books books have been books have been
books. Few graphics and have been requested requested and received. requested, received,
music used were from and received. Most Graphics and music used printed and saved for
the public domain. graphics and music used were from the public future reference.
were from the public domain. Graphics and music used
domain. were from the public
domain.
Meetings were not held Only a couple of team Students met and had Student met and had
and/or some of the meetings were held. discussions regularly. discussions regularly. All
team members did not Most of the students on Most of the students on students on the team
contribute at all to the the team contributed at the team contributed to contributed to the
project. Low levels of some level, but a the discussion and were discussion and were part
respect were evident majority of the work was part of the final project. of the final project.
within the team. done by one or two. Team members mostly Team members showed
showed respect with respect with each other.
each other.