You are on page 1of 5

Detailed Lesson Plan in (TLE)Computer Hardware Servicing

I. INSTRUCTIONAL OBJECTIVES

At the end of the lesson, the student should be able to:

a. Identify the different types of cyber threats in personal computer

b. Explore and read the ways to minimize virus attacks in personal computer

c. Explain some practices on how the cyber threats your computer

II. SUBJECT MATTER

Topic: Cyber threats in PC

References: learning material, youtube.com

MATERIALS

 Laptop

 Projector

 Video

 Papers

III. PROCEDURE

A. PREPARATORY ACTIVITIES

Teacher's Activity Student's Activity

1. Prayers

Good morning class

Please all stand

Let us pray, anyone can lead the prayer?

Okay Janny lead the prayer Let us pray amen...

2. Classroom Management

Before you take your seat kindly pick up the


pieces of paper under your chair.

3. Checking of Attendance (Student pick up the papers under the chair)

Ms. Secretary could you please check who is


the absent.

Always maintain perfect attendance so you


won’t miss any of our discussion. Yes ma'am

4. Review of the previous lesson

Before we start our new lesson, what is our last


lesson all about?

Ma’am our discussion last meeting is all about


Very good networking.

B. DEVELOPMENTAL ACTIVITIES

Teacher's Activity Student's activity

1. Motivation

Let’s watch this video about cyber threats.


https://youtube.cyber.vytftsssssyf

2. Presentation

https://youtu.be/Zqt4KDb0-IM
(Student is watching)
Before we start let’s have an activity first, I
prepared questions here get ¼ sheet of paper
and answer the following questions.

1) What are cyber threats that can damage


youre3 personal computer?

2) What are the different types of


malwares?

3) Describe how you can avoid your (Student is answering)


computer or smartphone to these cyber
threats.
4) After you watch the video, answer the
following questions. And you should
have to present your output in the class

3. Analysis / Discussion

Did you understand the video?


Yes ma’am
Okay since you understand the video, I have a
question

Based on the video I presented to you, there are


4 different types of cyber threats. What are
those? (Students raising their hands)

Yes amilic?
Ma’am Malware attack, password attack,
phishing attack, SQL injection attack.
Very good

DENIAL-OF-SERVICE ATTACKS A
denial-of-service (DoS) attack, or distributed
denial-of-service (DDoS) attack, consists of
making repeated requests of a computer system
or network, thereby overloading it and denying
legitimate users access to it. Because
computers are limited in the number of user
requests they can handle at any given time, a
DoS onslaught will tie them up with fraudulent
requests that cause them to shut down.

WORMS’s viruses, and Trojan horses are


three forms of malware, or malicious software,
which attack computer systems.

VIRUSES A virus is a “deviant” program,


stored on a computer floppy disk, hard drive,
or CD, that can cause unexpected and often
undesirable effects, such as destroying or
corrupting data.

I have a question class. How malware is spread


Worms, viruses, and Trojan horses are passed
in to your computer?
Yes jerelyn

Ma’am Through internet, the virus can infect


your computer when you are surfing the
internet. By infected floppies or CDs: The first
way is via an infected floppy disk or CD,
Very good Jerelyn
perhaps from a friend or a repair person.
4. Application
Okay class reads some ways to minimize virus
attacks in your personal computers.

Class here are some tips for minimizing the


chances of infecting your computers are as
follows:

C. GENERALIZATION

I know you’ve learned a lot from the


discussion, anyone who can summarize the
lesson?”

(Call students to share their learning about the


lesson) (Student raising their hands)

I learned about the different types of cyber


threats such as Malware attack, password
attack, phishing attack, SQL injection attack.
Very good

Do have any questions clarifications?

None ma’am

IV. EVALUATION

Get one half crosswise and explain some


practices on how to quarantine or minimize the
cyber threats in your personal computers, in
just two to three sentences only.

V. ASSIGNMENT
1) Research about the Cyber Villains:
Hackers & Crackers.

2) What is the type of hackers and


crackers?

You might also like