Entrance Announcement
MICTE 2080
2080 Magh 07
User:Nawarajbhandary/Real teaching lesson plan 25: Difference between revisions
Jump to navigation
Jump to search
(Created page with "Real teching lesson (nawarajbhandary) plan 25") |
No edit summary |
||
Line 1: | Line 1: | ||
Real | {| class="wikitable" | ||
| colspan="2" |'''Real Teaching Lesson Plan Number: 25 (Twenty-Five)''' | |||
|- | |||
|'''Subject:''' Computer Science | |||
|'''Class:''' 11 | |||
|- | |||
|'''Period:''' Third | |||
|'''Unit:''' Eight (8) | |||
|- | |||
|'''Topic:''' Information Security and Cyber Law | |||
|'''Time:''' 45 min | |||
|- | |||
|'''Teaching Item:''' Protection from Cybercrime | |||
|'''No. of Students:''' 24 | |||
|} | |||
== SPECIFIC OBJECTIVES == | |||
* Describe the concept of Protection from Cybercrime, | |||
* Describe the need of protection from Cybercrime, | |||
== TEACHING MATERIALS == | |||
* Daily materials | |||
* Laptop, | |||
* Presentation Slide, | |||
== TEACHING LEARNING ACTIVITIES == | |||
# Enter the classroom, and encourage students before starting the lesson for their total participation and also concentration on the lesson, and then write today’s topic on the board. | |||
# Begin the class by understanding their opinion and previous knowledge about the topic and explain about Protection from Cybercrime encompassing the concept of (''Use Strong Password, keep social media Private, secure your mobile devices, protect your data, Protect Identity etc.).'' | |||
# Begin the classroom with more student-centered learning methodology with lecture method followed by the discussion method for effective learning environment, | |||
# Present the content to be covered using PowerPoint presentation followed by the real demonstration method to using laptop to illustrate topic with all student and teach them about '''Protection from Cybercrime''' (''Use Strong Password, keep social media Private, secure your mobile devices, protect your data, Protect Identity etc''.) | |||
# Encouraging students to ask questions or share their thoughts if they encounter any type of problem and confusions during explanation and demonstration about concept regarding protection from cybercrime. | |||
# Follow the lecture method followed by group discussion method to attain the learning objectives of Concept and application of protection from cybercrime. | |||
# clarifying doubts and summarizing topic in brief, | |||
== ASSESSMENT == | |||
* What are any five (5) methods of protection from Cybercrime? | |||
* How ca you know, the website which you used secured or not? | |||
== HOMEWORK == | |||
* Explain the different methods to protect from cybercrime. |
Revision as of 11:30, 10 May 2024
Real Teaching Lesson Plan Number: 25 (Twenty-Five) | |
Subject: Computer Science | Class: 11 |
Period: Third | Unit: Eight (8) |
Topic: Information Security and Cyber Law | Time: 45 min |
Teaching Item: Protection from Cybercrime | No. of Students: 24 |
SPECIFIC OBJECTIVES
- Describe the concept of Protection from Cybercrime,
- Describe the need of protection from Cybercrime,
TEACHING MATERIALS
- Daily materials
- Laptop,
- Presentation Slide,
TEACHING LEARNING ACTIVITIES
- Enter the classroom, and encourage students before starting the lesson for their total participation and also concentration on the lesson, and then write today’s topic on the board.
- Begin the class by understanding their opinion and previous knowledge about the topic and explain about Protection from Cybercrime encompassing the concept of (Use Strong Password, keep social media Private, secure your mobile devices, protect your data, Protect Identity etc.).
- Begin the classroom with more student-centered learning methodology with lecture method followed by the discussion method for effective learning environment,
- Present the content to be covered using PowerPoint presentation followed by the real demonstration method to using laptop to illustrate topic with all student and teach them about Protection from Cybercrime (Use Strong Password, keep social media Private, secure your mobile devices, protect your data, Protect Identity etc.)
- Encouraging students to ask questions or share their thoughts if they encounter any type of problem and confusions during explanation and demonstration about concept regarding protection from cybercrime.
- Follow the lecture method followed by group discussion method to attain the learning objectives of Concept and application of protection from cybercrime.
- clarifying doubts and summarizing topic in brief,
ASSESSMENT
- What are any five (5) methods of protection from Cybercrime?
- How ca you know, the website which you used secured or not?
HOMEWORK
- Explain the different methods to protect from cybercrime.