User:Pratima/Lesson Plan 3

From ICTED-WIKI
Jump to navigation Jump to search
School: NBPI                                                                                                                                                                                                                 Class: Eight                        
Subject: Computer Science                                                                                                                                                                                          Time: 15 minutes                                                                                         
Topic : Computer Security                                                                                                                                                                                             Period: Third                        
                                                                                                                                                                                                                                    No of Students : 25

Specific Objectives:

Knowledge:

  1. Student will be able to know about the computer securities.
  2. To get knowledge about the need of computer securities.

Understanding:

The student will be able to understand about the antivirus software.

Teaching Aids:

  • White board and Marker
  • Laptop and Projector

Introduction:

Being ask the student about the computer security.

Main Content:

  • Computer security is the protection of computer systems and the data that they store or access.
  • It is the body of technologies, process and practices design to protect computer programs and data from attack, damage or unauthorized access.
  • Computer security also called cyber security, the protection of computer system and information from harm, theft and unauthorized use.

Evaluation:

Asking Student about computer securities by questioning them.

Homework:

Q.1 What do you mean by computer security? Explain with example.