Professional Documents
Culture Documents
Evaluation for previous lessons: not all objectives were completed. Teacher will use the first 10
minutes to engage students in a class discussion on the various application software (students
already have these notes, however, teacher did not get to expound of all of the categories.
Following which students will be given a class work.
Multiple Choice
1. Programs such as games and Microsoft words can be classified as:
a. Software
b. System unit
c. Hardware
d. Hardcopy
5. Operating system software that allows the user to access two or more programs is called:
a. Multi-tasking
b. Multi-using
c. Single-user
d. File-managing
Teacher: Natanya Wright-Benjamin
True or False
1. Entertainment software such as games is an example of application software. _______
2. Integrated software allow you to move faster from one application to the next. ______
3. Custom-written software is usually cheaper than general-purpose software. ______
4. The main function of the system software is to manage the resources of the computer
system. ______
5. Software on your mobile phone for your camera is an example of a specialized software.
______
Teacher: Natanya Wright-Benjamin
Key Vocabulary: data security, computer threats, eavesdropping, industrial espionage, spam,
identify theft, credit card fraud, denial of service, phishing, pharming, malware (log bomb, virus,
worm, Trojan, spyware, and key logger).
Resource & Materials:
Bridal, R & Taylor, M (2008), Interact with Information Technology 2, Pearson
Longman Publisher, pages
Bridal, R & Taylor, M (2008), Log on to Information Technology, Pearson Longman
Publisher, page 78 - 82
Computer, Google classroom, computer, smartphones, tables, computers, white board,
markers, eraser
https://www.youtube.com/watch?v=NDcEOW8r0xc
https://www.youtube.com/watch?v=Dk-ZqQ-bfy4
Content
Please see handout.
Teaching Learning Strategies
Engagement: the lesson will be introduce and students will be informed of the learning
outcome. The topic will be written on the board and students will be asked to share what they
Teacher: Natanya Wright-Benjamin
Exploration: Prior to class, students will be told to watch videos related to the topic posted in
Google classroom. Teacher will ask students to share what they found out from accessing the
materials, by identifying various computer threats. Responses will be written on the board.
Explanation: students will be given notes on the various threats; they will be encourage to read
notes. Teacher will then ask students to volunteer by explaining what they understand about any
of the threats. Teacher will commend students’ effort as well as to provide additional
explanation.
Elaboration: students will be selected at random to answer questions, their classmates will
indicate whether they are correct and if possible give the correct response. Students will be
instructed to access Kahoot challenge posted in the Google classroom.
Evaluation: students will be assessed based on:
- Participation in class discussion
- Answer to questions
- Completion of Kahoot