Model Instruction Plan
Lesson Plan
Course Title: Principles of IT
Session Title: Networks and Hackers
Lesson Duration:
2 Weeks: October 13-17 and October 20 – 24th
Performance Objective:
Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers.
Specific Objectives:
By the end of this lesson, students will be able to
· Define a computer system
· Identify the parts of a network
· Create a network with the following components: Workstation, Server, Modem, Hub, Switch, and Routers.
· Define the types of networks including Peer-to-Peer and Client Server (Ethernet, Token Ring, LAN, WAN)
· Identify the different types of operating systems
· Identify hackers and common security threats
Preparation
TEKS Correlations:
§130.272 Principles of Information Technology:
(8) The student analyzes network systems. The student is expected to
(A) identify hardware associated with telecommunications and data networking such as servers, routers, switches, hubs, and network connectors;
(B) identify and describe various types of networks such as peer-to-peer, local area networks, wide area networks, wireless token ring, and Ethernet; (C) identify and describe functions of network operating systems.
Instructor/Trainer
Instructional Aids and Weekly Lessons:
· Networks and Hackers Presentation CONTINUE – MONDAY & TUESDAY
· QUIZ: Networks and Hackers Notes for the Presentation WEDNESDAY/ THURSDAY
· QUIZ REVIEW: Lab Assignment (KAHOOTS.IT) ON HACKING; - FRIDAY
Materials Needed:
· Instructional aids
· Paper for students to draw on
· Color pencils, markers, and/or crayons to draw with
· Flash cards for students to create review materials
Equipment Needed:
• Projector for teacher computer
Learner
• This is an introduction on networks and hackers for students. No previous knowledge is needed.
Introduction/
MODIFICATIONS AND ACCOMODATIONS
MI
Introduction (LSI Quadrant I):
SAY, “How many of you have ever logged onto a computer at school, the library, or a home office with more than one computer?”
ASK, “Have you ever wondered how it all works?”
Outline
MI
Outline (LSI Quadrant II): Teachers can use the Networks and Hackers Presentation and Handout and Lab.
Instructor Notes:
I. Hand out the Teen Hacker Article Handout to the students to read.
I. Hand out this article for the students to read for homework ahead of this lesson.
II. Hand out the Networks and Hackers Notes Handout or advise students to take notes during the presentation.
II. Hand out copies of the Network and Hacker Notes to each student, or you can advise each student to get ready to take notes.
III.
Show the presentation, which covers the following concepts:
a. Computer system
b. Parts of a network
I. Workstation ii. Server Iii. Modem iv. Hub
V. Switch vi. Router
C. Types of networks
I. Peer-to-peer ii. Client server
1. Ethernet
2. Token ring
3. Lan
4. Wan
d. Operating systems
e. Hackers
F. Security threats
III.
Students should be taking notes as you are showing the
Networks and Hackers
Presentation.
IV.
Hand out the Lab Assignment to students. They will create diagrams of the networks based on seniors listed.
IV.
Students should draw out 3 different types of networks listed on the Lab Assignment. Have them create a legend for the different parts of the network they are trying to draw – like a box with the word Router for a router.
V.
Work through the SOHO portion of the lab together – the key listed is one of many solutions.
VI.
Work through the SOHO setup as a
class so that students understand what you are looking for.
VII.
Student groups need to finish up the Lab Assignment.
V.
Divide students into groups of two or three. Have them complete the Lab Assignment for the small office and world wide company.
VIII. Review for Networks and Hackers Quiz
VI. After completion of the lab, have students create flash cards of the important terms to study for the quiz.
Application
MI
Guided Practice (LSI Quadrant III):
Do the SOHO portion of the lab as a class.
MI
Independent Practice (LSI Quadrant III):
Hand out the Lab Assignment. Divide students into groups of two or three. Have each group work together on the following…
SAY, “Students, now that you see how we have set up a SOHO, see if you and a partner can come up with one possible solution to the rest of the problems on the Lab Assignment.”
Summary
MI
Review (LSI Quadrants I and IV):
SAY, “Now that we have a good understanding about Networks, we need to study for our quiz. In your groups, each of you needs to create your own set of flash cards to study. Work together as a group to make sure that you do not miss any important concepts or terms. I will need to review these to make sure that I feel you are not missing anything. I would also draw out our SOHO example so that you do not forget it later.”
Evaluation
MI
Informal Assessment (LSI Quadrant III):
· Teacher will check for understanding while going through the SOHO portion of the lab as a class.
· Review of student-created flash cards
MI
Formal Assessment (LSI Quadrant III, IV):
· Completion of the rest of the Lab Assignment done in groups.
· Networks and Hackers Quiz WEDENSDAY AND THURSDAY
Icon
MI
Modification
Teaching Strategies
Personal Development Strategies
Verbal/
Linguistic
Lecture, discussion, journal writing, cooperative learning, word origins
Reading, highlighting, outlining, teaching others, reciting information
Logical/
Mathematical
Problem solving, number games, critical thinking, classifying and organizing, Socratic questioning
Organizing material logically, explaining things sequentially, finding patterns, developing systems, outlining, charting, graphing, analyzing information
Visual/Spatial
Mind-mapping, reflective time, graphic organizers, color-coding systems, drawings, designs, video,
DVD, charts, maps
Developing graphic organizers, mind- mapping, charting, graphing, organizing with color, mental imagery (drawing in the mind’s eye)
Musical/
Rhythmic
Use music, compose songs or raps, use musical language or metaphors
Creating rhythms out of words, creating rhythms with instruments, playing an instrument, putting words to existing songs
Bodily/
Kinesthetic
Use manipulatives, hand signals, pantomime, real life situations, puzzles and board games, activities, role- playing, action problems
Moving while learning, pacing while reciting, acting out scripts of material, designing games, moving fingers under words while reading
Intrapersonal
Reflective teaching,
interviews, reflective listening, KWL charts
Reflecting on personal meaning of information, studying in quiet settings, imagining experiments, visualizing information, journaling
Interpersonal
Cooperative learning, role- playing, group brainstorming, cross-cultural interactions
Studying in a group, discussing information, using flash cards with other, teaching others
Naturalist
Natural objects as manipulatives and as background for learning
Connecting with nature, forming study groups with like-minded people
Existentialist
Socratic questions, real life situations, global problems/questions
Considering personal relationship to larger context
IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.
IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.