User:Prakash Timilsina/Real Teaching Lesson Plan 30: Difference between revisions

From ICTED-WIKI
Jump to navigation Jump to search
 
 
Line 9: Line 9:


== Specific Objectives: ==
== Specific Objectives: ==
At the end of the class, students will be able to:
# Define the authentication basics term username password.
# Understand the factor related with authentication process


== Teaching Learning Materials: ==
== Teaching Learning Materials: ==
Daily usage materials, Laptop, PowerPoint Slide, multimedia


== Teaching Learning Activities: ==
== Teaching Learning Activities: ==
After entering the class, I will revise previous class, I will recall if they have confusion then I will inform today's topic Authentication basics. I will write username password with a dialog box; I will explain authentication involves this method to verifying your identity, such as a facial scan, fingerprint or pin also.


== Evaluation: ==
== Evaluation: ==
# What are the authentication criteria while log in your face book account?
# What is the factor of authentication?

Latest revision as of 12:33, 16 May 2024

Class: BEDICT 6th Semester

Subject: Network Security

Teaching Topic: Authentication Basics

Period Duration: 50 min

Specific Objectives:[edit | edit source]

At the end of the class, students will be able to:

  1. Define the authentication basics term username password.
  2. Understand the factor related with authentication process

Teaching Learning Materials:[edit | edit source]

Daily usage materials, Laptop, PowerPoint Slide, multimedia

Teaching Learning Activities:[edit | edit source]

After entering the class, I will revise previous class, I will recall if they have confusion then I will inform today's topic Authentication basics. I will write username password with a dialog box; I will explain authentication involves this method to verifying your identity, such as a facial scan, fingerprint or pin also.

Evaluation:[edit | edit source]

  1. What are the authentication criteria while log in your face book account?
  2. What is the factor of authentication?