Sie sind auf Seite 1von 3

Lesson Plan

Course Title: Principles of IT


Session Title: Networks and Hackers
Lesson Duration:
Lesson length is subjective and will vary from instructor to instructor.
Performance Objective:

Upon completion of this assignment, the student will be able to build a small network and
identify the different types of hackers.

Specific Objectives:
By the end of this lesson, students will be able to
 Define a computer system
 Identify the parts of a network
 Create a network with the following components: Workstation, Server, Modem, Hub,
Switch, and Routers.
 Define the types of networks including Peer-to-Peer and Client Server (Ethernet, Token
Ring, LAN, WAN)
 Identify the different types of operating systems
 Identify hackers and common security threats
Preparation
TEKS Correlations:

§130.272 Principles of Information Technology:

(8) The student analyzes network systems. The student is expected to

(A) identify hardware associated with telecommunications and data networking such
as servers, routers, switches, hubs, and network connectors;
(B) identify and describe various types of networks such as peer-to-peer, local area
networks, wide area networks, wireless token ring, and Ethernet;
(C) identify and describe functions of network operating systems.

Instructor/Trainer
References:

• http://www.automation-drive.com/ethernet-hubs
• http://www.ehow.com/how-does_4682850_ethernet-work.html
• http://www.ehow.com/facts_4965621_what-computer-hacker.html
• http://www.ehow.com/about_5410891_types-internet-security-threats.html

IT: [Principals of Information Technology]: [Networks and Hackers] Plan


Copyright © Texas Education Agency, 2013. All rights reserved.
Instructional Aids:
• HANDOUT: Teen Hacker Article
• Networks and Hackers Presentation
• HANDOUT: Networks and Hackers Notes for the Presentation
• HANDOUT: Lab Assignment
• HANDOUT: National Treasure Extension Assignment

Materials Needed:
• Instructional aids
• Paper for students to draw on
• Color pencils, markers, and/or crayons to draw with
• Flash cards for students to create review materials
• National Treasure movie – only needed for extension assignment!

Equipment Needed:
• Projector for teacher computer

Learner
• This is an introduction on networks and hackers for students. No previous knowledge is
needed.

Introduction

MI Introduction (LSI Quadrant I):

SAY, “How many of you have ever logged onto a computer at school, the
library, or a home office with more than one computer?”

ASK, “Have you ever wondered how it all works?”

Outline
Outline (LSI Quadrant II): Teachers can use the
Networks and Hackers Presentation and Handout and
MI Instructor Notes:
Lab.

I. Hand out the Teen Hacker Article Handout I. Hand out this article
to the students to read. for the students to
read for homework
ahead of this lesson.
II. Hand out the Networks and Hackers Notes II. Hand out copies of the
Handout or advise students to take notes Network and Hacker
during the presentation. Notes to each
student, or you can
advise each student
to get ready to take
notes.

IT: [Principals of Information Technology]: [Networks and Hackers] Plan


Copyright © Texas Education Agency, 2013. All rights reserved.
Thank you for using www.freepdfconvert.com service!

Only two pages are converted. Please Sign Up to convert all pages.

https://www.freepdfconvert.com/membership

Das könnte Ihnen auch gefallen