model instruction plan · web viewlan wan operating systems hackers f. security threats iii....

9
Lesson Plan Course Title: Principles of IT Session Title: Networks and Hackers Lesson Duration: 2 Weeks: October 13-17 and October 20 – 24 th Performance Objective: Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers. Specific Objectives: By the end of this lesson, students will be able to Define a computer system Identify the parts of a network Create a network with the following components: Workstation, Server, Modem, Hub, Switch, and Routers. Define the types of networks including Peer-to-Peer and Client Server (Ethernet, Token Ring, LAN, WAN) Identify the different types of operating systems Identify hackers and common security threats Preparation TEKS Correlations: §130.272 Principles of Information Technology: (8) The student analyzes network systems. The student is expected to (A) identify hardware associated with telecommunications and data networking such as servers, routers, switches, hubs, and network connectors; (B) identify and describe various types of networks such as peer-to-peer, local area networks, wide area networks, wireless token ring, and Ethernet; (C) identify and describe functions of network operating systems. Instructor/Trainer

Upload: others

Post on 06-Feb-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Model Instruction Plan

Lesson Plan

Course Title: Principles of IT

Session Title: Networks and Hackers

Lesson Duration:

2 Weeks: October 13-17 and October 20 – 24th

Performance Objective:

Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers.

Specific Objectives:

By the end of this lesson, students will be able to

· Define a computer system

· Identify the parts of a network

· Create a network with the following components: Workstation, Server, Modem, Hub, Switch, and Routers.

· Define the types of networks including Peer-to-Peer and Client Server (Ethernet, Token Ring, LAN, WAN)

· Identify the different types of operating systems

· Identify hackers and common security threats

Preparation

TEKS Correlations:

§130.272 Principles of Information Technology:

(8) The student analyzes network systems. The student is expected to

(A) identify hardware associated with telecommunications and data networking such as servers, routers, switches, hubs, and network connectors;

(B) identify and describe various types of networks such as peer-to-peer, local area networks, wide area networks, wireless token ring, and Ethernet; (C) identify and describe functions of network operating systems.

Instructor/Trainer

Instructional Aids and Weekly Lessons:

· Networks and Hackers Presentation CONTINUE – MONDAY & TUESDAY

· QUIZ: Networks and Hackers Notes for the Presentation WEDNESDAY/ THURSDAY

· QUIZ REVIEW: Lab Assignment (KAHOOTS.IT) ON HACKING; - FRIDAY

Materials Needed:

· Instructional aids

· Paper for students to draw on

· Color pencils, markers, and/or crayons to draw with

· Flash cards for students to create review materials

Equipment Needed:

• Projector for teacher computer

Learner

• This is an introduction on networks and hackers for students. No previous knowledge is needed.

Introduction/

MODIFICATIONS AND ACCOMODATIONS

MI

Introduction (LSI Quadrant I):

SAY, “How many of you have ever logged onto a computer at school, the library, or a home office with more than one computer?”

ASK, “Have you ever wondered how it all works?”

Outline

MI

Outline (LSI Quadrant II): Teachers can use the Networks and Hackers Presentation and Handout and Lab.

Instructor Notes:

I. Hand out the Teen Hacker Article Handout to the students to read.

I. Hand out this article for the students to read for homework ahead of this lesson.

II. Hand out the Networks and Hackers Notes Handout or advise students to take notes during the presentation.

II. Hand out copies of the Network and Hacker Notes to each student, or you can advise each student to get ready to take notes.

III.

Show the presentation, which covers the following concepts:

a. Computer system

b. Parts of a network

I. Workstation ii. Server Iii. Modem iv. Hub

V. Switch vi. Router

C. Types of networks

I. Peer-to-peer ii. Client server

1. Ethernet

2. Token ring

3. Lan

4. Wan

d. Operating systems

e. Hackers

F. Security threats

III.

Students should be taking notes as you are showing the

Networks and Hackers

Presentation.

IV.

Hand out the Lab Assignment to students. They will create diagrams of the networks based on seniors listed.

IV.

Students should draw out 3 different types of networks listed on the Lab Assignment. Have them create a legend for the different parts of the network they are trying to draw – like a box with the word Router for a router.

V.

Work through the SOHO portion of the lab together – the key listed is one of many solutions.

VI.

Work through the SOHO setup as a

class so that students understand what you are looking for.

VII.

Student groups need to finish up the Lab Assignment.

V.

Divide students into groups of two or three. Have them complete the Lab Assignment for the small office and world wide company.

VIII. Review for Networks and Hackers Quiz

VI. After completion of the lab, have students create flash cards of the important terms to study for the quiz.

Application

MI

Guided Practice (LSI Quadrant III):

Do the SOHO portion of the lab as a class.

MI

Independent Practice (LSI Quadrant III):

Hand out the Lab Assignment. Divide students into groups of two or three. Have each group work together on the following…

SAY, “Students, now that you see how we have set up a SOHO, see if you and a partner can come up with one possible solution to the rest of the problems on the Lab Assignment.”

Summary

MI

Review (LSI Quadrants I and IV):

SAY, “Now that we have a good understanding about Networks, we need to study for our quiz. In your groups, each of you needs to create your own set of flash cards to study. Work together as a group to make sure that you do not miss any important concepts or terms. I will need to review these to make sure that I feel you are not missing anything. I would also draw out our SOHO example so that you do not forget it later.”

Evaluation

MI

Informal Assessment (LSI Quadrant III):

· Teacher will check for understanding while going through the SOHO portion of the lab as a class.

· Review of student-created flash cards

MI

Formal Assessment (LSI Quadrant III, IV):

· Completion of the rest of the Lab Assignment done in groups.

· Networks and Hackers Quiz WEDENSDAY AND THURSDAY

Icon

MI

Modification

Teaching Strategies

Personal Development Strategies

Verbal/

Linguistic

Lecture, discussion, journal writing, cooperative learning, word origins

Reading, highlighting, outlining, teaching others, reciting information

Logical/

Mathematical

Problem solving, number games, critical thinking, classifying and organizing, Socratic questioning

Organizing material logically, explaining things sequentially, finding patterns, developing systems, outlining, charting, graphing, analyzing information

Visual/Spatial

Mind-mapping, reflective time, graphic organizers, color-coding systems, drawings, designs, video,

DVD, charts, maps

Developing graphic organizers, mind- mapping, charting, graphing, organizing with color, mental imagery (drawing in the mind’s eye)

Musical/

Rhythmic

Use music, compose songs or raps, use musical language or metaphors

Creating rhythms out of words, creating rhythms with instruments, playing an instrument, putting words to existing songs

Bodily/

Kinesthetic

Use manipulatives, hand signals, pantomime, real life situations, puzzles and board games, activities, role- playing, action problems

Moving while learning, pacing while reciting, acting out scripts of material, designing games, moving fingers under words while reading

Intrapersonal

Reflective teaching,

interviews, reflective listening, KWL charts

Reflecting on personal meaning of information, studying in quiet settings, imagining experiments, visualizing information, journaling

Interpersonal

Cooperative learning, role- playing, group brainstorming, cross-cultural interactions

Studying in a group, discussing information, using flash cards with other, teaching others

Naturalist

Natural objects as manipulatives and as background for learning

Connecting with nature, forming study groups with like-minded people

Existentialist

Socratic questions, real life situations, global problems/questions

Considering personal relationship to larger context

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.