Sie sind auf Seite 1von 5

Subject : ICT Form :

Date/Day : Time :
Learning Area : 1.0 Information To Information And Communication Technology
Topic : 1.2.3 Controversial Contents and Control
Learning Outcomes :1.2.3.1 List effects of controversial contents on society:
Pornography Slander
1.2.3.2 Describe the process of filtering to control access to
controversial contents.
Learning Objectives : At the end of this lesson students able to list out the effect of
conterversial contents on society.
Activity : 1.Discussion
3. Slide presentation in groups for each topic

Refleksi :

Subject : ICT Form :


Date/Day : Time :
Learning Area : 1.0 Information To Information And Communication Technology
Topic : 1.2.3 Controversial Contents and Control
Learning Outcomes :1.2.3.1 List effects of controversial contents on society:
Pornography Slander
1.2.3.2 Describe the process of filtering to control access to
controversial contents.
Learning Objectives : At the end of this lesson students able to list out the effect of
conterversial contents on society.
Activity : 1.Discussion
3. Slide presentation in groups for each topic

Refleksi :

Subject : ICT Form :


Date/Day : Time :
Learning Area : 1.0 Information To Information And Communication Technology
Topic : 1.2.3 Controversial Contents and Control
Learning Outcomes :1.2.3.1 List effects of controversial contents on society:
Pornography Slander
1.2.3.2 Describe the process of filtering to control access to
controversial contents.
Learning Objectives : At the end of this lesson students able to list out the effect of
conterversial contents on society.
Activity : 1.Discussion
3. Slide presentation in groups for each topic

Refleksi :

Subject : ICT Form :4


Date/Day : Time :
Learning Area : 1.0 Information To Information And Communication Technology
Topic : 1.2.4 Computer Crimes
Learning Outcomes : 1 .2.4.1 Explain the need for Cyber Law.
1.2.4.2 Explain briefly the computer crimes below:
Fraud Copyright Infringement Theft Attack
Learning Objectives : At the end of this lesson students able to
1 .2.4.1 Explain the need for Cyber Law.

1.2.4.2 Explain briefly the computer crimes below:

Fraud Copyright Infringement Theft Attack

Activity : 1.Discussion
2.Brainstorming

3. Slide presentation in groups for each topic

Refleksi :

Subject : ICT Form : 4IT1


Date/Day : 27-01-2015 (Tuesday) Time : 11.20-12.30
Learning Area : 1.0 Information To Information And Communication Technology
Topic : 1.2.4 Computer Crimes
Learning Outcomes : 1 .2.4.1 Explain the need for Cyber Law.
1.2.4.2 Explain briefly the computer crimes below:
Fraud Copyright Infringement Theft Attack
Learning Objectives : At the end of this lesson students able to
1 .2.4.1 Explain the need for Cyber Law.

1.2.4.2 Explain briefly the computer crimes below:

Fraud Copyright Infringement Theft Attack

Activity : 1.Discussion
2.Brainstorming

3. Slide presentation in groups for each topic

Refleksi :

Subject : ICT Form : 4


Date/Day : Time :
Learning Area : 1.0 Information To Information And Communication Technology
Topic : 1.3 Computers Security
Learning Outcomes : 1.3.1 Definition

Learning Objectives : At the end of this lesson students able to define computer security
Activity : 1.Discussion
2.Conduct a study on effects computer security breaches on an
organization
3.Do exercise and discuss the answer.
Refleksi :

Subject : ICT Form : 4


Date/Day : Time :
Learning Area : 1.0 Information To Information And Communication Technology
Topic : 1.3 Computers Security
Learning Outcomes : 1.3.1 Definition

Learning Objectives : At the end of this lesson students able to define computer security
Activity : 1.Discussion
2.Conduct a study on effects computer security breaches on an
organization
3.Do exercise and discuss the answer.
Refleksi :

Subject : ICT Form : 4


Date/Day : Time :
Learning Area : 1.0 Information To Information And Communication Technology
Topic : 1.3 Computers Security
Learning Outcomes : 1.3.1 Definition

Learning Objectives : At the end of this lesson students able to define computer security
Activity : 1.Discussion
2.Conduct a study on effects computer security breaches on an
organization
3.Do exercise and discuss the answer.
Refleksi :

Subject : ICT Form : 4


Date/Day : Time :
Learning Area : 1.0 Information To Information And Communication Technology
Topic : 1.3. Computers Security
Learning Outcomes : 1.3.2 Security Threats
Learning Objectives : At the end of this lesson students able to
1 Explain briefly the different threats to computer security:

Malicious code Hacking Natural disaster Theft

Activity : 1.Discussion
2. Compile the study in a portfolio.

Refleksi :

Subject : ICT Form : 4


Date/Day : Time :
Learning Area : 1.0 Information To Information And Communication Technology
Topic : 1.3. Computers Security
Learning Outcomes : 1.3.2 Security Threats

Learning Objectives : At the end of this lesson students able to


1 Explain briefly the different threats to computer security:

Malicious code Hacking Natural disaster Theft

Activity : 1.Discussion
2. Compile the study in a portfolio.

Refleksi :

Subject : ICT Form : 4


Date/Day : Time :
Learning Area : 1.0 Information To Information And Communication Technology
Topic : 1.3. Computers Security
Learning Outcomes : 1.3.2 Security Threats

Learning Objectives : At the end of this lesson students able to


1 Explain briefly the different threats to computer security:

Malicious code Hacking Natural disaster Theft

Activity : 1.Discussion
2. Compile the study in a portfolio.

Refleksi :

Subject : ICT Form : 4


Date/Day : Time :
Learning Area : 1.0 Information To Information And Communication Technology
Topic : 1.3. Computers Security
Learning Outcomes : 1.3.3 Security Measures
Learning Objectives : At the end of this lesson students able to
1 Select the appropriate security measures to overcome the identified Computer threats
2. Apply the correct security procedures:

Antivirus Anti-Spyware Cryptography

Firewall Data backup Human aspect

Activity : 1.Discussion
2. Compile the study in a portfolio.

Refleksi :

Subject : ICT Form : 4IT


Date/Day : Time :
Learning Area : 1.0 Information To Information And Communication Technology
Topic : 1.3. Computers Security
Learning Outcomes : 1.3.3 Security Measures

Learning Objectives : At the end of this lesson students able to


1 Select the appropriate security measures to overcome the identified Computer threats
Subject
2. Apply: ICT
the correct security procedures: Form : 4IT
Date/Day : Time :
Learning Area Antivirus
: 1.0 Information Anti-Spyware
To Information AndCommunication
Cryptography Technology
Topic : 1.3. Computers Security
Firewall Data backup Human aspect
Learning Outcomes : 1.3.3 Security Measures
Activity : 1.Discussion
Learning Objectives : At the end of this lesson students able to
1 Select the appropriate security measures
2. Compile the studytoinovercome the identified Computer threats
a portfolio.
2. Apply the correct security procedures: Antivirus Anti-Spyware Cryptography Firewall
Refleksi :
Data backup Human aspect

Activity : 1.Discussion
2. Compile the study in a portfolio.

Reflection :

Subject : ICT Form : 4IT


Date/Day : Time :
Learning Area : 1.0 Information To Information And Communication Technology
Topic : 1.3. Computers Security
Learning Outcomes : 1.3.3 Security Measures

Learning Objectives : At the end of this lesson students able to


1 Select the appropriate security measures to overcome the identified Computer threats
2. Apply the correct security procedures: Antivirus Anti-Spyware Cryptography Firewall

Data backup Human aspect

Activity : 1.Discussion
2. Compile the study in a portfolio.

Reflection :

Das könnte Ihnen auch gefallen