Beruflich Dokumente
Kultur Dokumente
Upon completion of this assignment, the student will be able to build a small network and
identify the different types of hackers.
Specific Objectives:
By the end of this lesson, students will be able to
Define a computer system
Identify the parts of a network
Create a network with the following components: Workstation, Server, Modem, Hub,
Switch, and Routers.
Define the types of networks including Peer-to-Peer and Client Server (Ethernet, Token
Ring, LAN, WAN)
Identify the different types of operating systems
Identify hackers and common security threats
Preparation
TEKS Correlations:
(A) identify hardware associated with telecommunications and data networking such
as servers, routers, switches, hubs, and network connectors;
(B) identify and describe various types of networks such as peer-to-peer, local area
networks, wide area networks, wireless token ring, and Ethernet;
(C) identify and describe functions of network operating systems.
Instructor/Trainer
References:
• http://www.automation-drive.com/ethernet-hubs
• http://www.ehow.com/how-does_4682850_ethernet-work.html
• http://www.ehow.com/facts_4965621_what-computer-hacker.html
• http://www.ehow.com/about_5410891_types-internet-security-threats.html
Materials Needed:
• Instructional aids
• Paper for students to draw on
• Color pencils, markers, and/or crayons to draw with
• Flash cards for students to create review materials
• National Treasure movie – only needed for extension assignment!
Equipment Needed:
• Projector for teacher computer
Learner
• This is an introduction on networks and hackers for students. No previous knowledge is
needed.
Introduction
SAY, “How many of you have ever logged onto a computer at school, the
library, or a home office with more than one computer?”
Outline
Outline (LSI Quadrant II): Teachers can use the
Networks and Hackers Presentation and Handout and
MI Instructor Notes:
Lab.
I. Hand out the Teen Hacker Article Handout I. Hand out this article
to the students to read. for the students to
read for homework
ahead of this lesson.
II. Hand out the Networks and Hackers Notes II. Hand out copies of the
Handout or advise students to take notes Network and Hacker
during the presentation. Notes to each
student, or you can
advise each student
to get ready to take
notes.
Only two pages are converted. Please Sign Up to convert all pages.
https://www.freepdfconvert.com/membership