You are on page 1of 4

Teacher: Natanya Wright-Benjamin

SUBJECT : Information Technology


GRADE : 8 P, O & T
DATE : January 28 – February 1 & 3, 2022
DURATION : 40 Minutes   
TOPIC : Fundamentals of Hardware & Software
SUBTOPIC : Software  
WEEK : 4

Evaluation for previous lessons: not all objectives were completed. Teacher will use the first 10
minutes to engage students in a class discussion on the various application software (students
already have these notes, however, teacher did not get to expound of all of the categories.
Following which students will be given a class work.

Multiple Choice
1. Programs such as games and Microsoft words can be classified as:
a. Software
b. System unit
c. Hardware
d. Hardcopy

2. Which of the following is not a type of application software?


a. Microsoft Office
b. Encyclopedias
c. Games
d. Windows 10

3. Which if the following is not a function of the operating system software?


a. Providing a user interface
b. Maintaining security
c. Writing a letter
d. Managing computer resources

4. The operating system maintain security by:


a. Keeping a log of users
b. Granting authorized access to the system
c. Keeping a register of all users with valid user names and passwords
d. All of the above

5. Operating system software that allows the user to access two or more programs is called:
a. Multi-tasking
b. Multi-using
c. Single-user
d. File-managing
Teacher: Natanya Wright-Benjamin

Fill in the blanks


1. The two main categories of software are ____________________ and
_____________________. ______________software performs specific tasks to solve a
particular problem. __________________ software allows the user to communicate with
the computer hardware.
2. _________________ is the ability of the computer to run more than one program at the
same time.
3. __________________ software is software that can be used to maintain and protect the
system software.
4. A _________________ is a company that specializes in writing software.
5. A _________________ is a set of instructions for the computer to follow to accomplish a
given task.
6. A ___________________ software is that is written solely for a specific task rather than
a range of functions.

True or False
1. Entertainment software such as games is an example of application software. _______
2. Integrated software allow you to move faster from one application to the next. ______
3. Custom-written software is usually cheaper than general-purpose software. ______
4. The main function of the system software is to manage the resources of the computer
system. ______
5. Software on your mobile phone for your camera is an example of a specialized software.
______
Teacher: Natanya Wright-Benjamin

SUBJECT : Information Technology


GRADE : 8 P, O & T
DATE : February 7, 9 & 11, 2022
DURATION : 40 Minutes   
TOPIC : Computer Threats
SUBTOPIC : Types of Computer Threats
WEEK : 5

General Objective: students will be guided to:


1. Become knowledgeable about threats that can affect computer system or networking.
2. Develop an understanding of the various malicious means used to access a computer
system or network.

Specific Objectives: at the end of the lesson students should:


1. Define the term data security
2. Identify various types of computer threats such as eavesdropping, industrial espionage,
spam, identify theft, credit card fraud, denial of service, phishing, pharming, malware
(log bomb, virus, worm, Trojan, spyware, and key logger).
3. Explain how each computer threats above affects a computer.

Key Vocabulary: data security, computer threats, eavesdropping, industrial espionage, spam,
identify theft, credit card fraud, denial of service, phishing, pharming, malware (log bomb, virus,
worm, Trojan, spyware, and key logger).
Resource & Materials:
 Bridal, R & Taylor, M (2008), Interact with Information Technology 2, Pearson
Longman Publisher, pages
 Bridal, R & Taylor, M (2008), Log on to Information Technology, Pearson Longman
Publisher, page 78 - 82
 Computer, Google classroom, computer, smartphones, tables, computers, white board,
markers, eraser
 https://www.youtube.com/watch?v=NDcEOW8r0xc
 https://www.youtube.com/watch?v=Dk-ZqQ-bfy4

Content
Please see handout.
Teaching Learning Strategies
Engagement: the lesson will be introduce and students will be informed of the learning
outcome. The topic will be written on the board and students will be asked to share what they
Teacher: Natanya Wright-Benjamin

know about same. Responses will be acknowledged.

Exploration: Prior to class, students will be told to watch videos related to the topic posted in
Google classroom. Teacher will ask students to share what they found out from accessing the
materials, by identifying various computer threats. Responses will be written on the board.

Explanation: students will be given notes on the various threats; they will be encourage to read
notes. Teacher will then ask students to volunteer by explaining what they understand about any
of the threats. Teacher will commend students’ effort as well as to provide additional
explanation.
Elaboration: students will be selected at random to answer questions, their classmates will
indicate whether they are correct and if possible give the correct response. Students will be
instructed to access Kahoot challenge posted in the Google classroom.
Evaluation: students will be assessed based on:
- Participation in class discussion
- Answer to questions
- Completion of Kahoot

You might also like