User:Nawarajbhandary/Real teaching lesson plan 25

Real Teaching Lesson Plan Number: 25 (Twenty-Five)
Subject: Computer Science Class: 11
Period: Third Unit: Eight (8)
Topic: Information Security and Cyber Law Time: 45 min
Teaching Item: Protection from Cybercrime No. of Students: 23

SPECIFIC OBJECTIVES

  • Describe the concept of Protection from Cybercrime,
  • Describe the need of protection from Cybercrime,

TEACHING MATERIALS

  • Daily materials
  • Laptop,
  • Presentation Slide,

TEACHING LEARNING ACTIVITIES

  1. Enter the classroom, and encourage students before starting the lesson for their total participation and also concentration on the lesson, and then write today’s topic on the board.
  2. Begin the class by understanding their opinion and previous knowledge about the topic and explain about Protection from Cybercrime encompassing the concept of (Use Strong Password, keep social media Private, secure your mobile devices, protect your data, Protect Identity etc.).
  3. Begin the classroom with more student-centered learning methodology with lecture method followed by the discussion method for effective learning environment,
  4. Present the content to be covered using PowerPoint presentation followed by the real demonstration method to using laptop to illustrate topic with all student and teach them about Protection from Cybercrime (Use Strong Password, keep social media Private, secure your mobile devices, protect your data, Protect Identity etc.)
  5. Encouraging students to ask questions or share their thoughts if they encounter any type of problem and confusions during explanation and demonstration about concept regarding protection from cybercrime.
  6. Follow the lecture method followed by group discussion method to attain the learning objectives of Concept and application of protection from cybercrime.
  7. clarifying doubts and summarizing topic in brief,

ASSESSMENT

  • What are any five (5) methods of protection from Cybercrime?
  • How ca you know, the website which you used secured or not?

HOMEWORK

  • Explain the different methods to protect from cybercrime.