Rakesh Agrahari/Teaching Lesson Plan 22

From ICTED-WIKI
Revision as of 11:16, 9 May 2024 by Rakesh Agrahari (talk | contribs) (Created page with "{| class="wikitable" |'''Subject :''' Computer Science |'''Class:''' 11 |- |'''Period:''' First |'''Unit:''' 8 |- |'''Topic:''' Information Security & Cyber Law |'''Time:''' 45 min |- |'''Teaching Item:''' Types Malicious Software |'''Number of Students :''' 50 |} == SPECIFIC OBJECTIVES == At the completion of this topic students will be able: * To List about Types of Malicious Software == TEACHING MATERIALS == * Daily materials * White Board * Marker * PowerPoint...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
Subject : Computer Science Class: 11
Period: First Unit: 8
Topic: Information Security & Cyber Law Time: 45 min
Teaching Item: Types Malicious Software Number of Students : 50

SPECIFIC OBJECTIVES[edit | edit source]

At the completion of this topic students will be able:

  • To List about Types of Malicious Software

TEACHING MATERIALS[edit | edit source]

  • Daily materials
  • White Board
  • Marker
  • PowerPoint Slides

TEACHING LEARNING ACTIVITIES[edit | edit source]

  • Greeting to the students and topic will be written on board
  • Previous topic will be revised in short
  • By showing the slides in the PowerPoint, types of malicious software will be explained
  • malicious Software like . Trojans, Worms, Keylogger, Bots, Spyware, Virus etc
  • At last Lesson will be concluded.

EVALUATION[edit | edit source]

  • What is Trojan and Worm

HOME WORK[edit | edit source]

  • Explain Spware.