SusmitaPandey

Joined 3 December 2023
no edit summary
No edit summary
No edit summary
Line 40: Line 40:
|[[Micro Teaching Lesson Plan 6|Teaching Lesson Plan 6]]
|[[Micro Teaching Lesson Plan 6|Teaching Lesson Plan 6]]
|Introduction to Hacking and its Categories
|Introduction to Hacking and its Categories
|
|2080-12-22
|Real Teaching
|Real Teaching
|-
|-
Line 46: Line 46:
|[[Micro Teaching Lesson Plan 7|Teaching Lesson Plan 7]]
|[[Micro Teaching Lesson Plan 7|Teaching Lesson Plan 7]]
|Concept of Digital Signature  
|Concept of Digital Signature  
|
|2080-12-24
|Real Teaching
|Real Teaching
|-
|-
Line 52: Line 52:
|[[Micro Teaching Lesson Plan 8|Teaching Lesson Plan 8]]
|[[Micro Teaching Lesson Plan 8|Teaching Lesson Plan 8]]
|Intellectual Property Rights
|Intellectual Property Rights
|
|2080-12-25
|Real Teaching
|Real Teaching
|-
|-
Line 58: Line 58:
|[[Micro Teaching Lesson Plan 9|Teaching Lesson Plan 9]]
|[[Micro Teaching Lesson Plan 9|Teaching Lesson Plan 9]]
|Understanding Arrays in Programming
|Understanding Arrays in Programming
|
|2080-12-27
|Real Teaching
|Real Teaching
|-
|-
Line 64: Line 64:
|[[Teaching Lesson Plan 10]]
|[[Teaching Lesson Plan 10]]
|Exploring String Functions in C
|Exploring String Functions in C
|
|2080-12-28
|Real Teaching
|Real Teaching
|-
|-
Line 70: Line 70:
|[[Teaching Lesson Plan 11]]
|[[Teaching Lesson Plan 11]]
|Exploring Types of Arrays in Programming
|Exploring Types of Arrays in Programming
|
|2080-12-29
|Real Teaching
|Real Teaching
|-
|-
Line 76: Line 76:
|[[Teaching Lesson Plan 12]]
|[[Teaching Lesson Plan 12]]
|Understanding Operating Systems
|Understanding Operating Systems
|
|2080-12-30
|Real Teaching
|Real Teaching
|-
|-
Line 82: Line 82:
|[[Teaching Lesson Plan 13]]
|[[Teaching Lesson Plan 13]]
|Exploring Types of Operating Systems
|Exploring Types of Operating Systems
|
|2081-01-02
|Real Teaching
|Real Teaching
|-
|-
Line 88: Line 88:
|[[Teaching Lesson Plan 14]]
|[[Teaching Lesson Plan 14]]
|Understanding Key Operating System Terminology
|Understanding Key Operating System Terminology
|
|2081-01-03
|Real Teaching
|Real Teaching
|-
|-
Line 94: Line 94:
|[[Teaching Lesson Plan 15]]
|[[Teaching Lesson Plan 15]]
|Introduction to Programming Languages
|Introduction to Programming Languages
|
|2081-01-04
|Real Teaching
|Real Teaching
|-
|-
Line 100: Line 100:
|[[Teaching Lesson Plan 16]]
|[[Teaching Lesson Plan 16]]
|Introduction to Information Security
|Introduction to Information Security
|
|2081-01-06
|Real Teaching
|Real Teaching
|-
|-
Line 106: Line 106:
|T[[eaching Lesson Plan 17]]
|T[[eaching Lesson Plan 17]]
|Common Security Threats
|Common Security Threats
|
|2081-01-07
|Real Teaching
|Real Teaching
|-
|-
Line 112: Line 112:
|[[Teaching Lesson Plan 18]]
|[[Teaching Lesson Plan 18]]
|Understanding Cybercrime
|Understanding Cybercrime
|
|2081-01-09
|Real Teaching
|Real Teaching
|-
|-
Line 118: Line 118:
|[[Teaching Lesson Plan 19]]
|[[Teaching Lesson Plan 19]]
|Protective Measures Against Cybercrime
|Protective Measures Against Cybercrime
|
|2081-01-10
|Real Teaching
|Real Teaching
|-
|-
Line 124: Line 124:
|[[Teaching Lesson Plan 20]]
|[[Teaching Lesson Plan 20]]
|Introduction to Cyber Law
|Introduction to Cyber Law
|
|2081-01-11
|Real Teaching
|Real Teaching
|-
|-
Line 130: Line 130:
|[[Teaching Lesson Plan 21]]
|[[Teaching Lesson Plan 21]]
|Understanding ICT Policy in Nepal
|Understanding ICT Policy in Nepal
|
|2081-01-12
|Real Teaching
|Real Teaching
|-
|-
Line 136: Line 136:
|[[Teaching Lesson Plan 22]]
|[[Teaching Lesson Plan 22]]
|Understanding the Bus System in Computer Science
|Understanding the Bus System in Computer Science
|
|2081-01-13
|Real Teaching
|Real Teaching
|-
|-
Line 142: Line 142:
|[[Teaching Lesson Plan 23]]
|[[Teaching Lesson Plan 23]]
|Understanding Cache Memory and Buffer in Computer Science
|Understanding Cache Memory and Buffer in Computer Science
|
|2081-01-14
|Real Teaching
|Real Teaching
|-
|-
126

edits