Lesson Plan Course Title: Computer Maintenance Session Title: Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance of Security Software Lesson Duration: 3 to 4 one-hour sessions with 1 additional one-hour session for the exam (Lesson length is subjective and will vary from instructor to instructor) Performance Objective: Upon completion of this lesson, the student will be able to define, evaluate, install, and maintain computer software packages, licensing agreements, and security software. Specific Objectives: The student will be able to evaluate software packages to determine the compatibility of the software to the hardware on the computer determine that the software is properly licensed prior to its installation define, install, and maintain security software Preparation TEKS Correlations: This lesson, as published, correlates to the following TEKS. Any changes/alterations to the activities may result in the elimination of any or all of the TEKS listed. 130.273(c) Knowledge and Skills (10) The student installs and configures software programs and updates information technology systems. The student is expected to (A) evaluate application software packages and test the functionality of a proposed software configuration (B) verify software is properly licensed prior to installation (C) install and maintain security software Instructor/Trainer References: Content developer knowledge Instructional Aids: Software Configuration Presentation Software Configuration Handout Software Configuration Exam Software Configuration Exam - KEY IT: Software Configuration Copyright © Texas Education Agency, 2013. All rights reserved. 1 Materials Needed: Operational computers Varying types of computer software Screenshots of specific computer software specifications and software application requirements Copies of the exam Equipment Needed: Projection system to show the presentation Computer(s) with Internet access Learner Students should refer to the curriculum material in the presentation and class notes for definitions, instructions, and concepts regarding computer software functionality, configuration, compatibility, and licensing Introduction MI Introduction (LSI Quadrant I): ASK, " How many of you have ever installed or tried to install software on a computer that ended up not working as intended or wouldn’t work at all?" o Most likely their answers will be yes. ASK, "How many of you have ever purchased software with the intention of installing it in one manner, but you found the software licensing wouldn’t allow the software to be installed that way?" o The responses should be mixed. Some experiences will be positive, some mixed, and a few negative. ASK, "How many of you have ever had a virus on your computer?" o The responses should indicate that the majority have. SAY, "If you are going to be involved in the Information and Technology industry or even simply be an educated user, it is important to understand some key concepts pertaining to software and usage. Over the course of the next few sessions, we are going to learn to evaluate software packages, software licenses, and security software." Outline MI Outline (LSI Quadrant II): Instructor Notes: Note: Instructors can use the presentation slides and notes with the following outline. I. II. III. IV. Course Objectives (Slide 2) Computer Software A. Definition (Slide 3) Computer Hardware A. Definition (Slide 4) Software Compatibility A. Definition (Slide 5) B. What to Look For (Slide 6) IT: Software Configuration Copyright © Texas Education Agency, 2013. All rights reserved. 2 V. VI. VII. VIII. C. Minimum Requirements (Slide 7) D. Recommended Specifications (Slide 8) E. Assessing Software (Slides 9-10) Software Licensing A. Definition (Slide 11) B. EULA (Slides 12) Security Software A. Definitions (Slides 13-14) B. Important Things to Know (Slide15) C. Installation (Slides 16-18) Independent / Group work (Slide 19) Exam Preparation (Slide 20) Application MI Guided Practice (LSI Quadrant III): The teacher will have a tub with 5 software applications listing the computer specifications required for each. There will also be 5 notecards with computer specifications. Groups will match the software application to the notecard of the computer specification for which it is best suited. MI Independent Practice (LSI Quadrant III): The student will log into the demo computer in the classroom and choose whether to install an antivirus program from the internet or from a CD-ROM. Once installed, they will need to run a complete scan of the computer’s hard drive. The teacher will review the students’ work upon completion. Summary MI Review (LSI Quadrants I and IV): ASK, 1. "What are some of the things you would want to know when selecting a software application?" 2. "How can you know if the software will work and if it is stable?" 3. "What is an End Users License Agreement?" 4. "What is the purpose of security software?" 5. "Name some different reasons you would install security software." Evaluation MI Informal Assessment (LSI Quadrant III): The instructor will monitor student progress during the independent practice IT: Software Configuration Copyright © Texas Education Agency, 2013. All rights reserved. 3 and answer questions groups may have as they practice assessing software requirements for the installation of security software. MI Formal Assessment (LSI Quadrant III, IV): The instructor will utilize the Software Configuration Exam and Exam Key to assess students’ understanding of concepts. Extension MI Extension/Enrichment (LSI Quadrant IV): The students need to evaluate the compatibility of a piece of software they want to install on their home computer. Students should write down the system requirements for their computer and the recommended specifications for the software application they want to install. After comparing the software requirements to the computer’s specifications, they should explain why they do or do not feel it will work. IT: Software Configuration Copyright © Texas Education Agency, 2013. All rights reserved. 4 Icon MI Teaching Strategies Verbal/ Linguistic Logical/ Mathematical Visual/Spatial Musical/ Rhythmic Bodily/ Kinesthetic Intrapersonal Interpersonal Naturalist Existentialist Personal Development Strategies Lecture, discussion, journal writing, cooperative learning, word origins Reading, highlighting, outlining, teaching others, reciting information Problem solving, number games, critical thinking, classifying and organizing, Socratic questioning Mind-mapping, reflective time, graphic organizers, color-coding systems, drawings, designs, video, DVD, charts, maps Use music, compose songs or raps, use musical language or metaphors Organizing material logically, explaining things sequentially, finding patterns, developing systems, outlining, charting, graphing, analyzing information Developing graphic organizers, mindmapping, charting, graphing, organizing with color, mental imagery (drawing in the mind’s eye) Use manipulatives, hand signals, pantomime, real life situations, puzzles and board games, activities, roleplaying, action problems Reflective teaching, interviews, reflective listening, KWL charts Cooperative learning, roleplaying, group brainstorming, cross-cultural interactions Natural objects as manipulatives and as background for learning Socratic questions, real life situations, global problems/questions Creating rhythms out of words, creating rhythms with instruments, playing an instrument, putting words to existing songs Moving while learning, pacing while reciting, acting out scripts of material, designing games, moving fingers under words while reading Reflecting on personal meaning of information, studying in quiet settings, imagining experiments, visualizing information, journaling Studying in a group, discussing information, using flash cards with other, teaching others Connecting with nature, forming study groups with like-minded people Considering personal relationship to larger context IT: Software Configuration Copyright © Texas Education Agency, 2013. All rights reserved. 5 Name_______________________ Date________________________ Software Configuration Exam True/False 5 points ea. Indicate if the statement is True (T) or False (F) in the space provided. _____ 1. It is important to check software compatibility before purchasing. _____ 2. The minimum requirements for software increase over time. _____ 3. It is acceptable for a photographer to buy the student version of a photo editing package at the student price when he/she is not a student. _____ 4. Most security software applications have an automatic update feature to keep their definition files current on the computer. _____ 5. Checking the minimum system requirements will not help gauge the level or performance that can be expected. _____ 6. Some types of malware are not able to be removed and can require the operating system to be reinstalled. _____ 7. Computer software is also known as an application. _____ 8. The End Users License Agreement is usually printed on the box of software. _____ 9. Security software is never 100% effective. _____ 10. All computers have the same specifications. Multiple Choice 5 points ea. Select the letter choice that best completes the statement or question. IT: Software Configuration Copyright © Texas Education Agency, 2013. All rights reserved. 6 _____ 11. The recommended hardware specifications will ensure _______. a. minimum performance b. the manufacturer's intended level of performance c. software failure d. none of the above _____ 12. Which of the following are types of security software? a. anti-virus b. firewall c. anti-spyware d. all of the above _____ 13. Computer hardware includes all of the following except ____. a. cable modem b. memory c. monitor d. hard drive _____ 14. A software license is a legal contract that specifies _______. a. the number of computers it may be installed on b. the cost of the software c. who is authorized to use it d. A and C _____ 15. Which of the following is a computer application designed to protect a computer? a. disk defragmenter b. operating system c. security software d. all of the above _____ 16. When checking software compatibility, you should check a. hardware requirements b. A and C c. compatible operating systems d. none of the above _____ 17. Which of the following must be accepted prior to installing the software application? a. end users license agreement b. software agreement c. manufacturers licensing agreement d. none of the above _____ 18. When bringing up the hardware list on a computer, the operating system will list the following items: IT: Software Configuration Copyright © Texas Education Agency, 2013. All rights reserved. 7 a. b. c. d. computer temperature software packages that are installed installed computer hardware fan speed _____ 19. ______ ensure(s) that the software is compatible or capable of running on the computer. a. recommended hardware specifications b. minimum system requirements c. EULA d. all of the above _____ 20. A computer whose hardware specifications just meet a software application's system requirements will _______. a. run quickly and efficiently b. will run, but not too efficiently c. will crash a lot d. none of the above IT: Software Configuration Copyright © Texas Education Agency, 2013. All rights reserved. 8 Name_______________________ Date________________________ Software Configuration Exam (KEY) True/False 5 points ea. Indicate if the statement is True (T) or Falter (F) in the space provided. ___T__ 1. It is important to check the software compatibility before purchasing. ___T__ 2. The minimum requirements for software increase over time. ___F__ 3. It is acceptable for a photographer to buy the student version of a photo editing package at the student price when he/she is not a student. ___T__ 4 Most security software applications have an automatic update feature to keep their definition files current on the computer. . ___F__ 5. Checking the Minimum System Requirements will not help gauge the level or performance that can be expected. ___T__ 6. Some types of Malware are not able to be removed and can require the Operating System to be reinstalled. ___T__ 7. Computer Software is also known as an application. ___F__ 8. The End Users License Agreement is usually printed on the box of software. ___T__ 9. Security Software is never 100% effective. __ F___10. All computers have the same specifications. Multiple Choice 5 points ea. Select the letter choice that best completes the statement or question. IT: Software Configuration Copyright © Texas Education Agency, 2013. All rights reserved. 9 ___B__ 11 The Recommended Hardware Specifications will ensure _______. a. minimum performance b. the manufacturer's intended level of performance c. software failure d. none of the above ___D__ 12. a. b. c. d. Which of the following are types of security software? anti-virus firewall anti-spyware all of the above ___A__ Computer hardware includes all of the following except ____. a. cable modem b. memory c. monitor d. hard drive ___D__ 14. . A software license is a legal contract that specifies _______. a. the number of computers it may be installed on b. the cost of the software c. who is authorized to use it d. A and C ___C__ 15 Which of the following is a computer application designed to protect a computer? a. disk defragmenter b. operating system c. security software d. all of the above ___B__ 16 When checking software compatibility, you should check a. hardware requirements b. A and C c. compatible operating systems d. none of the above ___A__ 17. Which of the following must be accepted prior to installing the software application? a. end users license agreement b. software agreement c. manufacturers licensing agreement IT: Software Configuration Copyright © Texas Education Agency, 2013. All rights reserved. 10 d. none of the above ___C__ 18. When bringing up the hardware list on a computer, the operating system will list the following items: a. computer temperature b. software packages that are installed c. installed computer hardware d. fan speed ___B__ 19. ______ ensure(s) that the software is compatible or capable of running on the computer. a. recommended hardware specifications b. minimum system requirements c. EULA d. all of the above ___B__ 20. . A computer whose hardware specifications just meet a software application's system requirements will _______. a. run quickly and efficiently b. will run, but not too efficiently c. will crash a lot d. none of the above IT: Software Configuration Copyright © Texas Education Agency, 2013. All rights reserved. 11