Entrance Announcement
MICTE 2080
2080 Magh 07
User:SusmitaPandey: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
(23 intermediate revisions by the same user not shown) | |||
Line 10: | Line 10: | ||
|[[User:SusmitaPandey/Micro Teaching Lesson Plan 1|Micro Teaching Lesson Plan 1]] | |[[User:SusmitaPandey/Micro Teaching Lesson Plan 1|Micro Teaching Lesson Plan 1]] | ||
|[[wikipedia:Computer_network|Computer Network]] | |[[wikipedia:Computer_network|Computer Network]] | ||
| | |2080-09-22 | ||
|Micro Teaching (Taught) | |Micro Teaching (Taught) | ||
|- | |- | ||
Line 16: | Line 16: | ||
|[[User:SusmitaPandey/Micro Teaching Lesson Plan 2|Micro Teaching Lesson Plan 2]] | |[[User:SusmitaPandey/Micro Teaching Lesson Plan 2|Micro Teaching Lesson Plan 2]] | ||
|Role of Operating System | |Role of Operating System | ||
| | |2080-09-23 | ||
|Micro Teaching (Taught) | |Micro Teaching (Taught) | ||
|- | |- | ||
Line 22: | Line 22: | ||
|[[Micro-Teaching-Lesson-Plan-3]] | |[[Micro-Teaching-Lesson-Plan-3]] | ||
|Introduction to Computer Software | |Introduction to Computer Software | ||
| | |2080-09-24 | ||
|Micro Teaching | |Micro Teaching | ||
|- | |- | ||
Line 28: | Line 28: | ||
|[[User:SusmitaPandey/ Micro Teaching Lesson Plan 4|Micro Teaching Lesson Plan 4]] | |[[User:SusmitaPandey/ Micro Teaching Lesson Plan 4|Micro Teaching Lesson Plan 4]] | ||
|Introduction to Web Browser and Search Engine | |Introduction to Web Browser and Search Engine | ||
| | |2080-09-25 | ||
|Micro Teaching | |Micro Teaching | ||
|- | |- | ||
Line 34: | Line 34: | ||
|[[Micro Teaching Lesson Plan 5]] | |[[Micro Teaching Lesson Plan 5]] | ||
|Introduction to CMS(Content Management System) | |Introduction to CMS(Content Management System) | ||
| | |2080-09-26 | ||
|Micro Teaching | |Micro Teaching | ||
|- | |- | ||
Line 40: | Line 40: | ||
|[[Micro Teaching Lesson Plan 6|Teaching Lesson Plan 6]] | |[[Micro Teaching Lesson Plan 6|Teaching Lesson Plan 6]] | ||
|Introduction to Hacking and its Categories | |Introduction to Hacking and its Categories | ||
| | |2080-12-22 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 46: | Line 46: | ||
|[[Micro Teaching Lesson Plan 7|Teaching Lesson Plan 7]] | |[[Micro Teaching Lesson Plan 7|Teaching Lesson Plan 7]] | ||
|Concept of Digital Signature | |Concept of Digital Signature | ||
| | |2080-12-24 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 52: | Line 52: | ||
|[[Micro Teaching Lesson Plan 8|Teaching Lesson Plan 8]] | |[[Micro Teaching Lesson Plan 8|Teaching Lesson Plan 8]] | ||
|Intellectual Property Rights | |Intellectual Property Rights | ||
| | |2080-12-25 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 58: | Line 58: | ||
|[[Micro Teaching Lesson Plan 9|Teaching Lesson Plan 9]] | |[[Micro Teaching Lesson Plan 9|Teaching Lesson Plan 9]] | ||
|Understanding Arrays in Programming | |Understanding Arrays in Programming | ||
| | |2080-12-27 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 64: | Line 64: | ||
|[[Teaching Lesson Plan 10]] | |[[Teaching Lesson Plan 10]] | ||
|Exploring String Functions in C | |Exploring String Functions in C | ||
| | |2080-12-28 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 70: | Line 70: | ||
|[[Teaching Lesson Plan 11]] | |[[Teaching Lesson Plan 11]] | ||
|Exploring Types of Arrays in Programming | |Exploring Types of Arrays in Programming | ||
| | |2080-12-29 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 76: | Line 76: | ||
|[[Teaching Lesson Plan 12]] | |[[Teaching Lesson Plan 12]] | ||
|Understanding Operating Systems | |Understanding Operating Systems | ||
| | |2080-12-30 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 82: | Line 82: | ||
|[[Teaching Lesson Plan 13]] | |[[Teaching Lesson Plan 13]] | ||
|Exploring Types of Operating Systems | |Exploring Types of Operating Systems | ||
| | |2081-01-02 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 88: | Line 88: | ||
|[[Teaching Lesson Plan 14]] | |[[Teaching Lesson Plan 14]] | ||
|Understanding Key Operating System Terminology | |Understanding Key Operating System Terminology | ||
| | |2081-01-03 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 94: | Line 94: | ||
|[[Teaching Lesson Plan 15]] | |[[Teaching Lesson Plan 15]] | ||
|Introduction to Programming Languages | |Introduction to Programming Languages | ||
| | |2081-01-04 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 100: | Line 100: | ||
|[[Teaching Lesson Plan 16]] | |[[Teaching Lesson Plan 16]] | ||
|Introduction to Information Security | |Introduction to Information Security | ||
| | |2081-01-06 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 106: | Line 106: | ||
|T[[eaching Lesson Plan 17]] | |T[[eaching Lesson Plan 17]] | ||
|Common Security Threats | |Common Security Threats | ||
| | |2081-01-07 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 112: | Line 112: | ||
|[[Teaching Lesson Plan 18]] | |[[Teaching Lesson Plan 18]] | ||
|Understanding Cybercrime | |Understanding Cybercrime | ||
| | |2081-01-09 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 118: | Line 118: | ||
|[[Teaching Lesson Plan 19]] | |[[Teaching Lesson Plan 19]] | ||
|Protective Measures Against Cybercrime | |Protective Measures Against Cybercrime | ||
| | |2081-01-10 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 124: | Line 124: | ||
|[[Teaching Lesson Plan 20]] | |[[Teaching Lesson Plan 20]] | ||
|Introduction to Cyber Law | |Introduction to Cyber Law | ||
| | |2081-01-11 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 130: | Line 130: | ||
|[[Teaching Lesson Plan 21]] | |[[Teaching Lesson Plan 21]] | ||
|Understanding ICT Policy in Nepal | |Understanding ICT Policy in Nepal | ||
| | |2081-01-12 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
|22 | |22 | ||
|[[Teaching Lesson Plan 22]] | |[[Teaching Lesson Plan 22]] | ||
| | |Understanding the Bus System in Computer Science | ||
| | |2081-01-13 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 142: | Line 142: | ||
|[[Teaching Lesson Plan 23]] | |[[Teaching Lesson Plan 23]] | ||
|Understanding Cache Memory and Buffer in Computer Science | |Understanding Cache Memory and Buffer in Computer Science | ||
| | |2081-01-14 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
Line 148: | Line 148: | ||
|[[Teaching Lesson Plan 24]] | |[[Teaching Lesson Plan 24]] | ||
|Understanding Input Devices in Computer Science | |Understanding Input Devices in Computer Science | ||
| | |2081-01-16 | ||
|Real Teaching | |Real Teaching | ||
|- | |- | ||
|25 | |25 | ||
|[[Teaching Lesson Plan 25]] | |[[Teaching Lesson Plan 25]] | ||
| | |Understanding Output Devices in Computer Science | ||
| | |2081-01-17 | ||
| | |Real Teaching | ||
|- | |||
|26 | |||
|[[Teaching Lesson Plan 26]] | |||
|Understanding Hardware Interfaces - Parallel and Serial Ports | |||
|2081-01-18 | |||
|Real Teaching | |||
|- | |||
|27 | |||
|[[Teaching Lesson Plan 27]] | |||
|Lesson Plan: Understanding USB Ports and HDMI | |||
|2081-01-20 | |||
|Real Teaching | |||
|- | |||
|28 | |||
|[[Teaching Lesson Plan 28]] | |||
|Understanding Expansion Slots | |||
|2081-01-21 | |||
|Real Teaching | |||
|- | |||
|29 | |||
|[[Teaching Lesson Plan 29]] | |||
|Lesson Plan: Understanding AND Logic Gates | |||
|2081-01-23 | |||
|Real Teaching | |||
|- | |||
|30 | |||
|[[Teaching Lesson Plan 30]] | |||
|Understanding OR Logic Gates | |||
|2081-01-24 | |||
|Real Teaching | |||
|- | |||
|31 | |||
|[[Teaching Lesson Plan 31]] | |||
|Understanding NOT Logic Gates | |||
|2081-01-25 | |||
|Real Teaching | |||
|- | |||
|32 | |||
|[[Teaching Lesson Plan 32]] | |||
|Understanding NAND Logic Gates | |||
|2081-01-26 | |||
|Real Teaching | |||
|- | |||
|33 | |||
|[[Teaching Lesson Plan 33]] | |||
|Understanding NOR Logic Gates | |||
|2081-01-27 | |||
|Real Teaching | |||
|- | |||
|34 | |||
|[[Teaching Lesson Plan 34]] | |||
|Understanding XOR Logic Gates | |||
|2081-01-28 | |||
|Real Teaching | |||
|- | |||
|35 | |||
|[[Teaching Lesson Plan 35]] | |||
|Introduction to Data Structures (INTERNAL) | |||
|2081-01-30 | |||
|Real Teaching | |||
|- | |||
|36 | |||
|[[Teaching Lesson Plan 36]] | |||
|Buffer Memory(EXTERNAL) | |||
|2081-02-06 | |||
|Real Teaching | |||
|} | |} | ||
[[Category: MICTE]] | [[Category: MICTE]] |
Latest revision as of 19:41, 18 May 2024
S.N | Topic | Date | Remarks | |
---|---|---|---|---|
1 | Micro Teaching Lesson Plan 1 | Computer Network | 2080-09-22 | Micro Teaching (Taught) |
2 | Micro Teaching Lesson Plan 2 | Role of Operating System | 2080-09-23 | Micro Teaching (Taught) |
3 | Micro-Teaching-Lesson-Plan-3 | Introduction to Computer Software | 2080-09-24 | Micro Teaching |
4 | Micro Teaching Lesson Plan 4 | Introduction to Web Browser and Search Engine | 2080-09-25 | Micro Teaching |
5 | Micro Teaching Lesson Plan 5 | Introduction to CMS(Content Management System) | 2080-09-26 | Micro Teaching |
6 | Teaching Lesson Plan 6 | Introduction to Hacking and its Categories | 2080-12-22 | Real Teaching |
7 | Teaching Lesson Plan 7 | Concept of Digital Signature | 2080-12-24 | Real Teaching |
8 | Teaching Lesson Plan 8 | Intellectual Property Rights | 2080-12-25 | Real Teaching |
9 | Teaching Lesson Plan 9 | Understanding Arrays in Programming | 2080-12-27 | Real Teaching |
10 | Teaching Lesson Plan 10 | Exploring String Functions in C | 2080-12-28 | Real Teaching |
11 | Teaching Lesson Plan 11 | Exploring Types of Arrays in Programming | 2080-12-29 | Real Teaching |
12 | Teaching Lesson Plan 12 | Understanding Operating Systems | 2080-12-30 | Real Teaching |
13 | Teaching Lesson Plan 13 | Exploring Types of Operating Systems | 2081-01-02 | Real Teaching |
14 | Teaching Lesson Plan 14 | Understanding Key Operating System Terminology | 2081-01-03 | Real Teaching |
15 | Teaching Lesson Plan 15 | Introduction to Programming Languages | 2081-01-04 | Real Teaching |
16 | Teaching Lesson Plan 16 | Introduction to Information Security | 2081-01-06 | Real Teaching |
17 | Teaching Lesson Plan 17 | Common Security Threats | 2081-01-07 | Real Teaching |
18 | Teaching Lesson Plan 18 | Understanding Cybercrime | 2081-01-09 | Real Teaching |
19 | Teaching Lesson Plan 19 | Protective Measures Against Cybercrime | 2081-01-10 | Real Teaching |
20 | Teaching Lesson Plan 20 | Introduction to Cyber Law | 2081-01-11 | Real Teaching |
21 | Teaching Lesson Plan 21 | Understanding ICT Policy in Nepal | 2081-01-12 | Real Teaching |
22 | Teaching Lesson Plan 22 | Understanding the Bus System in Computer Science | 2081-01-13 | Real Teaching |
23 | Teaching Lesson Plan 23 | Understanding Cache Memory and Buffer in Computer Science | 2081-01-14 | Real Teaching |
24 | Teaching Lesson Plan 24 | Understanding Input Devices in Computer Science | 2081-01-16 | Real Teaching |
25 | Teaching Lesson Plan 25 | Understanding Output Devices in Computer Science | 2081-01-17 | Real Teaching |
26 | Teaching Lesson Plan 26 | Understanding Hardware Interfaces - Parallel and Serial Ports | 2081-01-18 | Real Teaching |
27 | Teaching Lesson Plan 27 | Lesson Plan: Understanding USB Ports and HDMI | 2081-01-20 | Real Teaching |
28 | Teaching Lesson Plan 28 | Understanding Expansion Slots | 2081-01-21 | Real Teaching |
29 | Teaching Lesson Plan 29 | Lesson Plan: Understanding AND Logic Gates | 2081-01-23 | Real Teaching |
30 | Teaching Lesson Plan 30 | Understanding OR Logic Gates | 2081-01-24 | Real Teaching |
31 | Teaching Lesson Plan 31 | Understanding NOT Logic Gates | 2081-01-25 | Real Teaching |
32 | Teaching Lesson Plan 32 | Understanding NAND Logic Gates | 2081-01-26 | Real Teaching |
33 | Teaching Lesson Plan 33 | Understanding NOR Logic Gates | 2081-01-27 | Real Teaching |
34 | Teaching Lesson Plan 34 | Understanding XOR Logic Gates | 2081-01-28 | Real Teaching |
35 | Teaching Lesson Plan 35 | Introduction to Data Structures (INTERNAL) | 2081-01-30 | Real Teaching |
36 | Teaching Lesson Plan 36 | Buffer Memory(EXTERNAL) | 2081-02-06 | Real Teaching |