|
|
Line 1: |
Line 1: |
| == '''Computer Virus''' ==
| |
|
| |
|
|
| |
|
| |
|
| |
| Subject: Computer Science
| |
|
| |
| Unit: Two
| |
|
| |
| Class: 6 Topic: Introduction To Computer Virus
| |
|
| |
| Time: 10 Minutes
| |
|
| |
| Period: 1st
| |
|
| |
| Number of Students: 12
| |
|
| |
| School: NIST School
| |
|
| |
| == '''Specific Objectives:''' ==
| |
|
| |
| * Students will be able to define what a computer virus is and identify at least one common type of computer virus.
| |
| * Students will understand the importance of being cautious with email attachments and downloads to prevent computer virus infections.
| |
| * Students will learn one key practice for protecting against computer viruses.
| |
|
| |
| == '''Materials:''' ==
| |
|
| |
| * Whiteboard and markers
| |
| * Projector (if possible)
| |
|
| |
| == '''Introduction (2 minutes):''' ==
| |
|
| |
| * Begin by asking students if they have heard of computer viruses and what they think they are.
| |
| * Define what a computer virus is and explain that it is a type of malicious software that can replicate itself and spread to other computers.
| |
| * Emphasize the potential impact of computer viruses on personal and professional devices.
| |
|
| |
| == '''Group Activity (3 minutes):''' ==
| |
|
| |
| * Divide the class into small groups and provide each group with a scenario involving a potential computer virus threat (e.g., receiving a suspicious email with an attachment).
| |
| * In their groups, students should discuss how they would respond to the scenario and what steps they would take to protect their computers and data.
| |
| * Encourage groups to come up with at least one proactive measure to prevent a computer virus infection based on the scenario.
| |
|
| |
| == '''Sharing and Discussion (3 minutes)''': ==
| |
|
| |
| * Ask each group to share their scenario and the proactive measure they developed to address the potential computer virus threat.
| |
| * Facilitate a brief class discussion on the different approaches and strategies presented by the groups.
| |
| * Encourage students to ask questions and engage in a dialogue about the importance of being cautious with email attachments and downloads.
| |
|
| |
| == '''Conclusion (1 minute):''' ==
| |
|
| |
| * Summarize the key points discussed during the lesson, including the definition of computer viruses and the importance of being cautious with email attachments and downloads.
| |
| * Emphasize one key practice for protecting against computer viruses, such as using antivirus software or being cautious with email attachments.
| |
|
| |
| == '''Assessment:''' ==
| |
|
| |
| * Assess students' understanding through their participation in the group activity and the quality of their contributions during the sharing and discussion phase.
| |
| * Ask students to write down one proactive measure they learned for protecting against computer viruses based on the group activity.
| |