Prakash Timilsina/Real Teaching Lesson Plan 11: Difference between revisions

From ICTED-WIKI
Jump to navigation Jump to search
 
Line 15: Line 15:
* [[User:Prakash Timilsina/ Real Teaching Lesson Plan 18#Evaluation:|4Evaluation:]]
* [[User:Prakash Timilsina/ Real Teaching Lesson Plan 18#Evaluation:|4Evaluation:]]


== Specific Objectives:[edit | edit source] ==
== Specific Objectives: ==
At the end of the class, students will be able to:
At the end of the class, students will be able to:


Line 21: Line 21:
# Define and explain the terminologies related to confidentiality.  
# Define and explain the terminologies related to confidentiality.  


== Teaching Materials:[edit | edit source] ==
== Teaching Materials: ==
Daily usages materials, Laptop, PowerPoint Slide, Multimedia
Daily usages materials, Laptop, PowerPoint Slide, Multimedia


== Teaching Learning Activities:[edit | edit source] ==
== Teaching Learning Activities: ==
After entering the class, I will revise previous class, I will ask them if they have any confusion, and then I will inform today's topic confidentiality policies.
After entering the class, I will revise previous class, I will ask them if they have any confusion, and then I will inform today's topic confidentiality policies.



Latest revision as of 12:34, 14 May 2024

Class: BEDICT 6th Semester

Subject: Network Security

Teaching Topic: Confidentiality Policies

Period Duration: 50 min

Contents[edit | edit source]

Specific Objectives:[edit | edit source]

At the end of the class, students will be able to:

  1. Understand and develop the concept of Confidentiality.
  2. Define and explain the terminologies related to confidentiality.

Teaching Materials:[edit | edit source]

Daily usages materials, Laptop, PowerPoint Slide, Multimedia

Teaching Learning Activities:[edit | edit source]

After entering the class, I will revise previous class, I will ask them if they have any confusion, and then I will inform today's topic confidentiality policies.

I will give an example of authorization as right to use or access, I will explain authorized user. I will demonstrate the picture from presentation slide. I will ask at the moment of teaching, if they listen or not.

At the end I will terminate or end the class.

Evaluation:[edit | edit source]

For Evaluation I will ask

  1. Suppose you have an account for bank, Other user can access your account or not? Have you ever occurred unauthorize use of your account?
  2. Define Confidentiality. Can it help to protect your account or right?