Lesson Plan

advertisement
Lesson Plan
Course Title: Computer Maintenance
Session Title: Software Configuration: Evaluating Software
Packages, Software Licensing, and Computer Protection
through the Installation and Maintenance of Security
Software
Lesson Duration: 3 to 4 one-hour sessions with 1 additional one-hour session for the exam
(Lesson length is subjective and will vary from instructor to instructor)
Performance Objective:
Upon completion of this lesson, the student will be able to define, evaluate, install, and maintain
computer software packages, licensing agreements, and security software.
Specific Objectives:
The student will be able to
 evaluate software packages to determine the compatibility of the software to the
hardware on the computer
 determine that the software is properly licensed prior to its installation
 define, install, and maintain security software
Preparation
TEKS Correlations:
This lesson, as published, correlates to the following TEKS. Any changes/alterations to the
activities may result in the elimination of any or all of the TEKS listed.
130.273(c) Knowledge and Skills
(10) The student installs and configures software programs and updates information technology
systems. The student is expected to
(A) evaluate application software packages and test the functionality of a proposed
software configuration
(B) verify software is properly licensed prior to installation
(C) install and maintain security software
Instructor/Trainer
References:
Content developer knowledge
Instructional Aids:




Software Configuration Presentation
Software Configuration Handout
Software Configuration Exam
Software Configuration Exam - KEY
IT: Software Configuration
Copyright © Texas Education Agency, 2013. All rights reserved.
1
Materials Needed:
 Operational computers
 Varying types of computer software
 Screenshots of specific computer software specifications and software application
requirements
 Copies of the exam
Equipment Needed:
 Projection system to show the presentation
 Computer(s) with Internet access
Learner
 Students should refer to the curriculum material in the presentation and class notes for
definitions, instructions, and concepts regarding computer software functionality,
configuration, compatibility, and licensing
Introduction
MI
Introduction (LSI Quadrant I):




ASK, " How many of you have ever installed or tried to install software on a
computer that ended up not working as intended or wouldn’t work at all?"
o Most likely their answers will be yes.
ASK, "How many of you have ever purchased software with the intention of
installing it in one manner, but you found the software licensing wouldn’t
allow the software to be installed that way?"
o The responses should be mixed. Some experiences will be positive,
some mixed, and a few negative.
ASK, "How many of you have ever had a virus on your computer?"
o The responses should indicate that the majority have.
SAY, "If you are going to be involved in the Information and Technology
industry or even simply be an educated user, it is important to understand
some key concepts pertaining to software and usage. Over the course of the
next few sessions, we are going to learn to evaluate software packages,
software licenses, and security software."
Outline
MI
Outline (LSI Quadrant II):
Instructor Notes:
Note: Instructors can use the presentation slides and
notes with the following outline.
I.
II.
III.
IV.
Course Objectives (Slide 2)
Computer Software
A. Definition (Slide 3)
Computer Hardware
A. Definition (Slide 4)
Software Compatibility
A. Definition (Slide 5)
B. What to Look For (Slide 6)
IT: Software Configuration
Copyright © Texas Education Agency, 2013. All rights reserved.
2
V.
VI.
VII.
VIII.
C. Minimum Requirements (Slide 7)
D. Recommended Specifications (Slide 8)
E. Assessing Software (Slides 9-10)
Software Licensing
A. Definition (Slide 11)
B. EULA (Slides 12)
Security Software
A. Definitions (Slides 13-14)
B. Important Things to Know (Slide15)
C. Installation (Slides 16-18)
Independent / Group work (Slide 19)
Exam Preparation (Slide 20)
Application
MI
Guided Practice (LSI Quadrant III):
The teacher will have a tub with 5 software applications listing the computer
specifications required for each. There will also be 5 notecards with
computer specifications.
Groups will match the software application to the notecard of the computer
specification for which it is best suited.
MI
Independent Practice (LSI Quadrant III):
The student will log into the demo computer in the classroom and choose
whether to install an antivirus program from the internet or from a CD-ROM.
Once installed, they will need to run a complete scan of the computer’s hard
drive. The teacher will review the students’ work upon completion.
Summary
MI
Review (LSI Quadrants I and IV):
ASK,
1. "What are some of the things you would want to know when
selecting a software application?"
2. "How can you know if the software will work and if it is stable?"
3. "What is an End Users License Agreement?"
4. "What is the purpose of security software?"
5. "Name some different reasons you would install security software."
Evaluation
MI
Informal Assessment (LSI Quadrant III):
The instructor will monitor student progress during the independent practice
IT: Software Configuration
Copyright © Texas Education Agency, 2013. All rights reserved.
3
and answer questions groups may have as they practice assessing
software requirements for the installation of security software.
MI
Formal Assessment (LSI Quadrant III, IV):
The instructor will utilize the Software Configuration Exam and Exam Key to
assess students’ understanding of concepts.
Extension
MI
Extension/Enrichment (LSI Quadrant IV):
The students need to evaluate the compatibility of a piece of software they
want to install on their home computer. Students should write down the
system requirements for their computer and the recommended
specifications for the software application they want to install. After
comparing the software requirements to the computer’s specifications, they
should explain why they do or do not feel it will work.
IT: Software Configuration
Copyright © Texas Education Agency, 2013. All rights reserved.
4
Icon
MI
Teaching Strategies
Verbal/
Linguistic
Logical/
Mathematical
Visual/Spatial
Musical/
Rhythmic
Bodily/
Kinesthetic
Intrapersonal
Interpersonal
Naturalist
Existentialist
Personal Development
Strategies
Lecture, discussion, journal
writing, cooperative learning,
word origins
Reading, highlighting, outlining,
teaching others, reciting information
Problem solving, number
games, critical thinking,
classifying and organizing,
Socratic questioning
Mind-mapping, reflective
time, graphic organizers,
color-coding systems,
drawings, designs, video,
DVD, charts, maps
Use music, compose songs
or raps, use musical
language or metaphors
Organizing material logically, explaining
things sequentially, finding patterns,
developing systems, outlining, charting,
graphing, analyzing information
Developing graphic organizers, mindmapping, charting, graphing, organizing
with color, mental imagery (drawing in
the mind’s eye)
Use manipulatives, hand
signals, pantomime, real life
situations, puzzles and board
games, activities, roleplaying, action problems
Reflective teaching,
interviews, reflective listening,
KWL charts
Cooperative learning, roleplaying, group brainstorming,
cross-cultural interactions
Natural objects as
manipulatives and as
background for learning
Socratic questions, real life
situations, global
problems/questions
Creating rhythms out of words, creating
rhythms with instruments, playing an
instrument, putting words to existing
songs
Moving while learning, pacing while
reciting, acting out scripts of material,
designing games, moving fingers under
words while reading
Reflecting on personal meaning of
information, studying in quiet settings,
imagining experiments, visualizing
information, journaling
Studying in a group, discussing
information, using flash cards with
other, teaching others
Connecting with nature, forming study
groups with like-minded people
Considering personal relationship to
larger context
IT: Software Configuration
Copyright © Texas Education Agency, 2013. All rights reserved.
5
Name_______________________
Date________________________
Software Configuration Exam
True/False 5 points ea.
Indicate if the statement is True (T) or False (F) in the space provided.
_____ 1. It is important to check software compatibility before purchasing.
_____ 2. The minimum requirements for software increase over time.
_____ 3. It is acceptable for a photographer to buy the student version of a photo
editing package at the student price when he/she is not a student.
_____ 4. Most security software applications have an automatic update feature to
keep their definition files current on the computer.
_____ 5. Checking the minimum system requirements will not help gauge the level or
performance that can be expected.
_____ 6. Some types of malware are not able to be removed and can require the
operating system to be reinstalled.
_____ 7. Computer software is also known as an application.
_____ 8. The End Users License Agreement is usually printed on the box of software.
_____ 9. Security software is never 100% effective.
_____ 10. All computers have the same specifications.
Multiple Choice 5 points ea.
Select the letter choice that best completes the statement or question.
IT: Software Configuration
Copyright © Texas Education Agency, 2013. All rights reserved.
6
_____ 11. The recommended hardware specifications will ensure _______.
a. minimum performance
b. the manufacturer's intended level of performance
c. software failure
d. none of the above
_____ 12. Which of the following are types of security software?
a. anti-virus
b. firewall
c. anti-spyware
d. all of the above
_____ 13. Computer hardware includes all of the following except ____.
a. cable modem
b. memory
c. monitor
d. hard drive
_____ 14. A software license is a legal contract that specifies _______.
a. the number of computers it may be installed on
b. the cost of the software
c. who is authorized to use it
d. A and C
_____ 15. Which of the following is a computer application designed to protect a
computer?
a. disk defragmenter
b. operating system
c. security software
d. all of the above
_____ 16. When checking software compatibility, you should check
a. hardware requirements
b. A and C
c. compatible operating systems
d. none of the above
_____ 17. Which of the following must be accepted prior to installing the software
application?
a. end users license agreement
b. software agreement
c. manufacturers licensing agreement
d. none of the above
_____ 18. When bringing up the hardware list on a computer, the operating system will
list the following items:
IT: Software Configuration
Copyright © Texas Education Agency, 2013. All rights reserved.
7
a.
b.
c.
d.
computer temperature
software packages that are installed
installed computer hardware
fan speed
_____ 19. ______ ensure(s) that the software is compatible or capable of running on
the computer.
a. recommended hardware specifications
b. minimum system requirements
c. EULA
d. all of the above
_____ 20. A computer whose hardware specifications just meet a software application's
system requirements will _______.
a. run quickly and efficiently
b. will run, but not too efficiently
c. will crash a lot
d. none of the above
IT: Software Configuration
Copyright © Texas Education Agency, 2013. All rights reserved.
8
Name_______________________
Date________________________
Software Configuration Exam (KEY)
True/False 5 points ea.
Indicate if the statement is True (T) or Falter (F) in the space provided.
___T__ 1. It is important to check the software compatibility before purchasing.
___T__ 2. The minimum requirements for software increase over time.
___F__ 3. It is acceptable for a photographer to buy the student version of a photo
editing package at the student price when he/she is not a student.
___T__ 4 Most security software applications have an automatic update feature to
keep their definition files current on the computer.
.
___F__ 5. Checking the Minimum System Requirements will not help gauge the level
or performance that can be expected.
___T__ 6. Some types of Malware are not able to be removed and can require the
Operating System to be reinstalled.
___T__ 7. Computer Software is also known as an application.
___F__ 8. The End Users License Agreement is usually printed on the box of software.
___T__ 9. Security Software is never 100% effective.
__ F___10. All computers have the same specifications.
Multiple Choice 5 points ea.
Select the letter choice that best completes the statement or question.
IT: Software Configuration
Copyright © Texas Education Agency, 2013. All rights reserved.
9
___B__ 11 The Recommended Hardware Specifications will ensure _______.
a. minimum performance
b. the manufacturer's intended level of performance
c. software failure
d. none of the above
___D__ 12.
a.
b.
c.
d.
Which of the following are types of security software?
anti-virus
firewall
anti-spyware
all of the above
___A__ Computer hardware includes all of the following except ____.
a. cable modem
b. memory
c. monitor
d. hard drive
___D__ 14. . A software license is a legal contract that specifies _______.
a. the number of computers it may be installed on
b. the cost of the software
c. who is authorized to use it
d. A and C
___C__ 15 Which of the following is a computer application designed to protect a
computer?
a. disk defragmenter
b. operating system
c. security software
d. all of the above
___B__ 16 When checking software compatibility, you should check
a. hardware requirements
b. A and C
c. compatible operating systems
d. none of the above
___A__ 17. Which of the following must be accepted prior to installing the software
application?
a. end users license agreement
b. software agreement
c. manufacturers licensing agreement
IT: Software Configuration
Copyright © Texas Education Agency, 2013. All rights reserved.
10
d. none of the above
___C__ 18. When bringing up the hardware list on a computer, the operating system
will list the following items:
a. computer temperature
b. software packages that are installed
c. installed computer hardware
d. fan speed
___B__ 19. ______ ensure(s) that the software is compatible or capable of running on
the computer.
a. recommended hardware specifications
b. minimum system requirements
c. EULA
d. all of the above
___B__ 20. . A computer whose hardware specifications just meet a software
application's system requirements will _______.
a. run quickly and efficiently
b. will run, but not too efficiently
c. will crash a lot
d. none of the above
IT: Software Configuration
Copyright © Texas Education Agency, 2013. All rights reserved.
11
Download