Lesson Plan

advertisement
Lesson Plan
Course Title: Computer Technician
Session Title: Computer Software: Types, Setup, and
Ethical Boundaries
Lesson Duration: Three to four 1 hour sessions with an additional 1 hour session for the exam
Lesson length is subjective and will vary from instructor to instructor
Performance Objective:
Upon completion of this lesson the student will be able to define, install, uninstall, and know the
ethical boundaries pertaining to computer software.
Specific Objectives:



The student will be able to define the various types of software and their functions within the
computer
The student will be able to install and uninstall software on a computer
The student should be able to comprehend and define the ethical boundaries associated
with the handling and disbursement of software
Preparation
TEKS Correlations:
This lesson, as published, correlates to the following TEKS. Any changes/alterations to the
activities may result in the elimination of any or all of the TEKS listed.
130.275(c) Computer Technician
(1) The student demonstrates the necessary skills for career development, employability, and
successful completion of course outcomes. The student is expected to:
(H) demonstrate an understanding of legal and ethical responsibilities in relation to the field
of information and technology
(5) The student relates core academic skills to the requirements of computer technologies. The
student is expected to:
(F) describe the architecture of various computer systems
Instructor/Trainer
References:
Webster Online Dictionary
Content Developer Knowledge
Instructional Aids:
1. Computer Software–Types, Setup, and Ethical Boundaries Presentation
2. Computer Software–Types, Setup, and Ethical Boundaries Exam
3. Computer Software–Types, Setup, and Ethical Boundaries Exam - KEY
IT: Computer Technician – Software Types Plan
Copyright © Texas Education Agency, 2013. All rights reserved.
1
Materials Needed:
1.
2.
3.
4.
5.
6.
Operational Computer
Boxes of varying types of computer software
Software manual
Copy of a software package
Copies of an End Users License Agreement
Copies of Exam
Equipment Needed:
1. Projection system to play presentation
2. Computer with Internet access
Learner
1. Students should refer to presentation, curriculum material, and class notes for definitions,
instructions, and concepts regarding computer software types, setup, and ethical
boundaries.
Introduction
MI
Introduction (LSI Quadrant I):

Over the last few sessions we have learned about the various components,
functions, and common failures associated with the hardware on a computer.
Next, I will introduce you to the software component that constitutes a
functioning Personal Computer.

Ask: Does anyone have any ideas as to what constitutes as computer
software?

Ask: Can you name some different types of software?

Tell: By the end of this session you will be able to identify what constitutes
computer software, identify the different types of software, know how to
install/uninstall computer software, and possess a better understanding of the
practice of ethics in computer software usage.
Outline
MI
Outline (LSI Quadrant II):
Instructor Notes:
Note: Instructors can use the presentation slides and
notes with the following outline.
I.
Course Objectives (Slide 2)
II.
Computer Software
A. Definition (Slide 3)
III.
Operating System (Slide 4)
IV.
Computer Applications (Slide 5)
IT: Computer Technician – Software Types Plan
Copyright © Texas Education Agency, 2013. All rights reserved.
2
V.
Computer Malware (Slide 6)
VI.
Computer Spyware (Slide 7)
VII.
Anti-Virus Software (Slide 8)
VIII.
Installing Computer Software
A. Physical Media (Slide 9)
B. Downloaded Media (Slide 10)
C. App Store (Slide 11)
IX.
Uninstalling Computer Software (Slide 12)
X.
Computer Software Ethics
A. Definition (Slide 13)
XI.
Ethics in Distribution and use of Software
(Slides 14-16)
XII.
XIII.
Independent / Group work (Slide 17)
Exam Preparation (Slide 18)
Application
MI
Guided Practice (LSI Quadrant III):
The teacher will define software and demonstrate the process of installing and
uninstalling software on a personal computer aided by the use of the
presentation. Instruction will also cover ethics and the use of software as the
licensor intended.
MI
Independent Practice (LSI Quadrant III):
The teacher will place the students into groups to practice installing and
uninstalling software on a classroom computer. The teacher will evaluate the
group’s work as each group finishes.
Upon completion, the groups will work individually and describe the processes
they followed in installing/uninstalling the software.
Summary
MI
Review (LSI Quadrants I and IV):
Ask the students summary questions:
1. What is software and what are some examples and their functions?
2. Name some different types of software.
3. What are the steps in installing/uninstalling software?
4. What are ethics?
5. How do ethics translate into the realm of software and usage?
Evaluation
MI
Informal Assessment (LSI Quadrant III):
The instructor will monitor student progress during the independent practice
and answer questions groups may have as they practice installing and
uninstalling software on the classroom computer.
IT: Computer Technician – Software Types Plan
Copyright © Texas Education Agency, 2013. All rights reserved.
3
MI
Formal Assessment (LSI Quadrant III, IV):
The instructor will utilize the Computer Software: Types, Setup, and Ethical
Boundaries Exam and Exam Key.
Extension
MI
Extension/Enrichment (LSI Quadrant IV):
Students can come in before or after school and practice working with the
classroom computer and with the software. This activity will further the
learning of how the various software components interact to create the holistic
user experience once a computer boots. Students may also elect to bring in
their own portable computing devices and experiment with them.
IT: Computer Technician – Software Types Plan
Copyright © Texas Education Agency, 2013. All rights reserved.
4
Icon
MI
Teaching Strategies
Personal Development
Strategies
Verbal/
Linguistic
Lecture, discussion, journal
writing, cooperative
learning, word origins
Reading, highlighting, outlining,
teaching others, reciting
information
Logical/
Mathematical
Problem solving, number
games, critical thinking,
classifying and organizing,
Socratic questioning
Organizing material logically,
explaining things sequentially,
finding patterns, developing
systems, outlining, charting,
graphing, analyzing information
Developing graphic organizers,
mind-mapping, charting, graphing,
organizing with color, mental
imagery (drawing in the mind’s
eye)
Creating rhythms out of words,
creating rhythms with instruments,
playing an instrument, putting
words to existing songs
Moving while learning, pacing
while reciting, acting out scripts of
material, designing games, moving
fingers under words while reading
Visual/Spatial
Musical/
Rhythmic
Bodily/
Kinesthetic
Intrapersonal
Interpersonal
Naturalist
Existentialist
Mind-mapping, reflective
time, graphic organizers,
color-coding systems,
drawings, designs, video,
DVD, charts, maps
Use music, compose songs
or raps, use musical
language or metaphors
Use manipulatives, hand
signals, pantomime, real life
situations, puzzles and
board games, activities,
role-playing, action
problems
Reflective teaching,
interviews, reflective
listening, KWL charts
Cooperative learning, roleplaying, group
brainstorming, cross-cultural
interactions
Natural objects as
manipulatives and as
background for learning
Socratic questions, real life
situations, global
problems/questions
Reflecting on personal meaning of
information, studying in quiet
settings, imagining experiments,
visualizing information, journaling
Studying in a group, discussing
information, using flash cards with
other, teaching others
Connecting with nature, forming
study groups with like minded
people
Considering personal relationship
to larger context
IT: Computer Technician – Software Types Plan
Copyright © Texas Education Agency, 2013. All rights reserved.
5
Computer Technician
Name
Date
Computer Software Exam: Types, Set-up, and
Ethical Boundaries
True/False 2 points each: Indicate if the statement is True (T) or False (F) in the
space provided.
_____ 1. A computer will run Applications without an Operating System.
_____ 2. Spyware is software that often is downloaded from the Internet without the
user’s knowledge.
_____ 3. A end user can be fined or face legal action for failing to adhere to the
guidelines of the EULA.
_____ 4. The App Store is an old technology that is being phased out.
_____ 5. The operating system is the also called the OS for short.
_____ 6. Malware’s design is to get rid of viruses on a computer.
_____ 7. Anti-virus software is not important to have installed on a personal computer.
_____ 8. The App Store is currently available on Smartphones, Tablets, and some
computers.
Multiple Choice 5 points each: Select the letter choice that best completes the
statement or question.
_____ 9. The following are ethical uses of software:
a. Installing a single software license on multiple computers
b. Loaning software to a friend to borrow
c. Burning a copy of software to give to someone else
d. None of the above
IT: Computer Technician – Software Types Plan
Copyright © Texas Education Agency, 2013. All rights reserved.
6
______ 10. The first steps to uninstalling software on a PC are:
a. Selecting Programs and Features clicking Uninstall
b. Clicking Start and then clicking on Control Panel
c. Selecting the Control Panel and then clicking on Start
d. None of the above
_____ 11. Software that is malicious in intent with the design to access a user’s
computer without their knowledge or consent is:
a. Malware
b. Anti-virus
c. Operating System
d. All of the above
_____ 12. Spyware’s purpose is to:
a. Keep viruses from infecting a computer
b. Organize a computer’s files in the background
c. Mine data, monitor the user’s habits, and keylogging
d. Help the computer connect to the internet
_____ 13. An example of a computer application is:
a. Protocols
b. Data
c. The BIOS
d. None of the above
_____ 14. Before installing most software you must agree to:
a. Return the software if not completely satisfied
b. Upgrade when a newer version of software comes out
c. The End User’s License Agreement
d. B and C
_____ 15. Which of the following is true about Anti-Virus Software?
a. New definitions are available daily for download
b. Software that scans a computer for viruses, trojans, and other unwanted
software
c. Software that removes viruses, malware, spyware, and trojans
d. All of the above
IT: Computer Technician – Software Types Plan
Copyright © Texas Education Agency, 2013. All rights reserved.
7
Matching 5 Points Each (35 pts total):
Draw a line from the computer part name to the correct function

Anti-Virus

The discipline of dealing with the good and
bad and with moral duty and obligation

Malware

Type of malware that collects user data,
monitors habits, and mines data without user
consent or knowledge

Software

Software that is malicious and is designed to
capture, exploit, and access files without the
owner’s consent or knowledge

Ethics

Software that is designed to perform a
specific task

Operating System

Set of programs designed to manage and
instruct computer hardware; this set of
programs is the foundation of all other
applications on a computer

Spyware

Software that is designed to detect, prevent,
and remove viruses, malware, spyware, and
trojans from the computer’s hard drive

Computer Application

One or more programs and the collection of
associated data that is stored on a computer
for a specific purpose or function
IT: Computer Technician – Software Types Plan
Copyright © Texas Education Agency, 2013. All rights reserved.
8
Computer Technician
Name
Date
Computer Software Exam: Types, Set-up, and
Ethical Boundaries
Key
True/False 2 points each: Indicate if the statement is True (T) or False (F) in the
space provided.
__F___ 1. A computer will run Applications without an Operating System.
__T___ 2. Spyware is software that often is downloaded from the Internet without the
user’s knowledge.
__T___ 3. A end user can be fined or face legal action for failing to adhere to the
guidelines of the EULA.
__F___ 4. The App Store is an old technology that is being phased out.
__T___ 5. The operating system is the also called the OS for short.
__F___ 6. Malware’s design is to get rid of viruses on a computer.
__F___ 7. Anti-virus software is not important to have installed on a personal computer.
__T___ 8. The App Store is currently available on Smartphones, Tablets, and some
computers.
Multiple Choice 5 points each: Select the letter choice that best completes the
statement or question.
__D___ 9. The following are ethical uses of software:
a. Installing a single software license on multiple computers
b. Loaning software to a friend to borrow
c. Burning a copy of software to give to someone else
d. None of the above
IT: Computer Technician – Software Types Plan
Copyright © Texas Education Agency, 2013. All rights reserved.
9
__B___ 10.
e.
f.
g.
h.
The first steps to uninstalling software on a PC are:
Selecting Programs and Features clicking Uninstall
Clicking Start and then clicking on Control Panel
Selecting the Control Panel and then clicking on Start
None of the above
__A___ 11. Software that is malicious in intent with the design to access a user’s
computer without their knowledge or consent.
a. Malware
b. Anti-virus
c. Operating System
d. All of the above
__C___ 12. Spyware’s purpose is to:
a. Keep viruses from infecting a computer
b. Organize a computer’s files in the background
c. Mine data, monitor the user’s habits, and keylogging
d. Help the computer connect to the internet
__D___ 13. An example of a computer application is:
a. Protocols
b. Data
c. The BIOS
d. None of the above
__C___ 14. Before installing most software you must agree to:
a. Return the software if not completely satisfied
b. Upgrade when a newer version of software comes out
c. The End User’s License Agreement
d. B and C
__D___ 15. Which of the following is true about Anti-Virus Software?
a. New definitions are available daily for download
b. Software that scans a computer for viruses, trojans, and other unwanted
software
c. Software that removes viruses, malware, spyware, and trojans
d. All of the above
IT: Computer Technician – Software Types Plan
Copyright © Texas Education Agency, 2013. All rights reserved.
10
Matching 5 Points Each (35 pts total):
Draw a line from the computer part name to the correct function

Anti-Virus

Malware

Software



The discipline of dealing with the good and
bad and with moral duty and obligation

Type of malware that collects user data,
monitors habits, and mines data without user
consent or knowledge

Software that is malicious and is designed to
capture, exploit, and access files without the
owner’s consent or knowledge

Software that is designed to perform a
specific task

Set of programs designed to manage and
instruct computer hardware; this set of
programs is the foundation of all other
applications on a computer

Software that is designed to detect, prevent,
and remove viruses, malware, spyware, and
trojans from the computer’s hard drive

One or more programs and the collection of
associated data that is stored on a computer
for a specific purpose or function
Ethics
Operating System

Spyware

Computer Application
IT: Computer Technician – Software Types Plan
Copyright © Texas Education Agency, 2013. All rights reserved.
11
Download