Lesson Plan Course Title: Computer Technician Session Title: Computer Software: Types, Setup, and Ethical Boundaries Lesson Duration: Three to four 1 hour sessions with an additional 1 hour session for the exam Lesson length is subjective and will vary from instructor to instructor Performance Objective: Upon completion of this lesson the student will be able to define, install, uninstall, and know the ethical boundaries pertaining to computer software. Specific Objectives: The student will be able to define the various types of software and their functions within the computer The student will be able to install and uninstall software on a computer The student should be able to comprehend and define the ethical boundaries associated with the handling and disbursement of software Preparation TEKS Correlations: This lesson, as published, correlates to the following TEKS. Any changes/alterations to the activities may result in the elimination of any or all of the TEKS listed. 130.275(c) Computer Technician (1) The student demonstrates the necessary skills for career development, employability, and successful completion of course outcomes. The student is expected to: (H) demonstrate an understanding of legal and ethical responsibilities in relation to the field of information and technology (5) The student relates core academic skills to the requirements of computer technologies. The student is expected to: (F) describe the architecture of various computer systems Instructor/Trainer References: Webster Online Dictionary Content Developer Knowledge Instructional Aids: 1. Computer Software–Types, Setup, and Ethical Boundaries Presentation 2. Computer Software–Types, Setup, and Ethical Boundaries Exam 3. Computer Software–Types, Setup, and Ethical Boundaries Exam - KEY IT: Computer Technician – Software Types Plan Copyright © Texas Education Agency, 2013. All rights reserved. 1 Materials Needed: 1. 2. 3. 4. 5. 6. Operational Computer Boxes of varying types of computer software Software manual Copy of a software package Copies of an End Users License Agreement Copies of Exam Equipment Needed: 1. Projection system to play presentation 2. Computer with Internet access Learner 1. Students should refer to presentation, curriculum material, and class notes for definitions, instructions, and concepts regarding computer software types, setup, and ethical boundaries. Introduction MI Introduction (LSI Quadrant I): Over the last few sessions we have learned about the various components, functions, and common failures associated with the hardware on a computer. Next, I will introduce you to the software component that constitutes a functioning Personal Computer. Ask: Does anyone have any ideas as to what constitutes as computer software? Ask: Can you name some different types of software? Tell: By the end of this session you will be able to identify what constitutes computer software, identify the different types of software, know how to install/uninstall computer software, and possess a better understanding of the practice of ethics in computer software usage. Outline MI Outline (LSI Quadrant II): Instructor Notes: Note: Instructors can use the presentation slides and notes with the following outline. I. Course Objectives (Slide 2) II. Computer Software A. Definition (Slide 3) III. Operating System (Slide 4) IV. Computer Applications (Slide 5) IT: Computer Technician – Software Types Plan Copyright © Texas Education Agency, 2013. All rights reserved. 2 V. Computer Malware (Slide 6) VI. Computer Spyware (Slide 7) VII. Anti-Virus Software (Slide 8) VIII. Installing Computer Software A. Physical Media (Slide 9) B. Downloaded Media (Slide 10) C. App Store (Slide 11) IX. Uninstalling Computer Software (Slide 12) X. Computer Software Ethics A. Definition (Slide 13) XI. Ethics in Distribution and use of Software (Slides 14-16) XII. XIII. Independent / Group work (Slide 17) Exam Preparation (Slide 18) Application MI Guided Practice (LSI Quadrant III): The teacher will define software and demonstrate the process of installing and uninstalling software on a personal computer aided by the use of the presentation. Instruction will also cover ethics and the use of software as the licensor intended. MI Independent Practice (LSI Quadrant III): The teacher will place the students into groups to practice installing and uninstalling software on a classroom computer. The teacher will evaluate the group’s work as each group finishes. Upon completion, the groups will work individually and describe the processes they followed in installing/uninstalling the software. Summary MI Review (LSI Quadrants I and IV): Ask the students summary questions: 1. What is software and what are some examples and their functions? 2. Name some different types of software. 3. What are the steps in installing/uninstalling software? 4. What are ethics? 5. How do ethics translate into the realm of software and usage? Evaluation MI Informal Assessment (LSI Quadrant III): The instructor will monitor student progress during the independent practice and answer questions groups may have as they practice installing and uninstalling software on the classroom computer. IT: Computer Technician – Software Types Plan Copyright © Texas Education Agency, 2013. All rights reserved. 3 MI Formal Assessment (LSI Quadrant III, IV): The instructor will utilize the Computer Software: Types, Setup, and Ethical Boundaries Exam and Exam Key. Extension MI Extension/Enrichment (LSI Quadrant IV): Students can come in before or after school and practice working with the classroom computer and with the software. This activity will further the learning of how the various software components interact to create the holistic user experience once a computer boots. Students may also elect to bring in their own portable computing devices and experiment with them. IT: Computer Technician – Software Types Plan Copyright © Texas Education Agency, 2013. All rights reserved. 4 Icon MI Teaching Strategies Personal Development Strategies Verbal/ Linguistic Lecture, discussion, journal writing, cooperative learning, word origins Reading, highlighting, outlining, teaching others, reciting information Logical/ Mathematical Problem solving, number games, critical thinking, classifying and organizing, Socratic questioning Organizing material logically, explaining things sequentially, finding patterns, developing systems, outlining, charting, graphing, analyzing information Developing graphic organizers, mind-mapping, charting, graphing, organizing with color, mental imagery (drawing in the mind’s eye) Creating rhythms out of words, creating rhythms with instruments, playing an instrument, putting words to existing songs Moving while learning, pacing while reciting, acting out scripts of material, designing games, moving fingers under words while reading Visual/Spatial Musical/ Rhythmic Bodily/ Kinesthetic Intrapersonal Interpersonal Naturalist Existentialist Mind-mapping, reflective time, graphic organizers, color-coding systems, drawings, designs, video, DVD, charts, maps Use music, compose songs or raps, use musical language or metaphors Use manipulatives, hand signals, pantomime, real life situations, puzzles and board games, activities, role-playing, action problems Reflective teaching, interviews, reflective listening, KWL charts Cooperative learning, roleplaying, group brainstorming, cross-cultural interactions Natural objects as manipulatives and as background for learning Socratic questions, real life situations, global problems/questions Reflecting on personal meaning of information, studying in quiet settings, imagining experiments, visualizing information, journaling Studying in a group, discussing information, using flash cards with other, teaching others Connecting with nature, forming study groups with like minded people Considering personal relationship to larger context IT: Computer Technician – Software Types Plan Copyright © Texas Education Agency, 2013. All rights reserved. 5 Computer Technician Name Date Computer Software Exam: Types, Set-up, and Ethical Boundaries True/False 2 points each: Indicate if the statement is True (T) or False (F) in the space provided. _____ 1. A computer will run Applications without an Operating System. _____ 2. Spyware is software that often is downloaded from the Internet without the user’s knowledge. _____ 3. A end user can be fined or face legal action for failing to adhere to the guidelines of the EULA. _____ 4. The App Store is an old technology that is being phased out. _____ 5. The operating system is the also called the OS for short. _____ 6. Malware’s design is to get rid of viruses on a computer. _____ 7. Anti-virus software is not important to have installed on a personal computer. _____ 8. The App Store is currently available on Smartphones, Tablets, and some computers. Multiple Choice 5 points each: Select the letter choice that best completes the statement or question. _____ 9. The following are ethical uses of software: a. Installing a single software license on multiple computers b. Loaning software to a friend to borrow c. Burning a copy of software to give to someone else d. None of the above IT: Computer Technician – Software Types Plan Copyright © Texas Education Agency, 2013. All rights reserved. 6 ______ 10. The first steps to uninstalling software on a PC are: a. Selecting Programs and Features clicking Uninstall b. Clicking Start and then clicking on Control Panel c. Selecting the Control Panel and then clicking on Start d. None of the above _____ 11. Software that is malicious in intent with the design to access a user’s computer without their knowledge or consent is: a. Malware b. Anti-virus c. Operating System d. All of the above _____ 12. Spyware’s purpose is to: a. Keep viruses from infecting a computer b. Organize a computer’s files in the background c. Mine data, monitor the user’s habits, and keylogging d. Help the computer connect to the internet _____ 13. An example of a computer application is: a. Protocols b. Data c. The BIOS d. None of the above _____ 14. Before installing most software you must agree to: a. Return the software if not completely satisfied b. Upgrade when a newer version of software comes out c. The End User’s License Agreement d. B and C _____ 15. Which of the following is true about Anti-Virus Software? a. New definitions are available daily for download b. Software that scans a computer for viruses, trojans, and other unwanted software c. Software that removes viruses, malware, spyware, and trojans d. All of the above IT: Computer Technician – Software Types Plan Copyright © Texas Education Agency, 2013. All rights reserved. 7 Matching 5 Points Each (35 pts total): Draw a line from the computer part name to the correct function Anti-Virus The discipline of dealing with the good and bad and with moral duty and obligation Malware Type of malware that collects user data, monitors habits, and mines data without user consent or knowledge Software Software that is malicious and is designed to capture, exploit, and access files without the owner’s consent or knowledge Ethics Software that is designed to perform a specific task Operating System Set of programs designed to manage and instruct computer hardware; this set of programs is the foundation of all other applications on a computer Spyware Software that is designed to detect, prevent, and remove viruses, malware, spyware, and trojans from the computer’s hard drive Computer Application One or more programs and the collection of associated data that is stored on a computer for a specific purpose or function IT: Computer Technician – Software Types Plan Copyright © Texas Education Agency, 2013. All rights reserved. 8 Computer Technician Name Date Computer Software Exam: Types, Set-up, and Ethical Boundaries Key True/False 2 points each: Indicate if the statement is True (T) or False (F) in the space provided. __F___ 1. A computer will run Applications without an Operating System. __T___ 2. Spyware is software that often is downloaded from the Internet without the user’s knowledge. __T___ 3. A end user can be fined or face legal action for failing to adhere to the guidelines of the EULA. __F___ 4. The App Store is an old technology that is being phased out. __T___ 5. The operating system is the also called the OS for short. __F___ 6. Malware’s design is to get rid of viruses on a computer. __F___ 7. Anti-virus software is not important to have installed on a personal computer. __T___ 8. The App Store is currently available on Smartphones, Tablets, and some computers. Multiple Choice 5 points each: Select the letter choice that best completes the statement or question. __D___ 9. The following are ethical uses of software: a. Installing a single software license on multiple computers b. Loaning software to a friend to borrow c. Burning a copy of software to give to someone else d. None of the above IT: Computer Technician – Software Types Plan Copyright © Texas Education Agency, 2013. All rights reserved. 9 __B___ 10. e. f. g. h. The first steps to uninstalling software on a PC are: Selecting Programs and Features clicking Uninstall Clicking Start and then clicking on Control Panel Selecting the Control Panel and then clicking on Start None of the above __A___ 11. Software that is malicious in intent with the design to access a user’s computer without their knowledge or consent. a. Malware b. Anti-virus c. Operating System d. All of the above __C___ 12. Spyware’s purpose is to: a. Keep viruses from infecting a computer b. Organize a computer’s files in the background c. Mine data, monitor the user’s habits, and keylogging d. Help the computer connect to the internet __D___ 13. An example of a computer application is: a. Protocols b. Data c. The BIOS d. None of the above __C___ 14. Before installing most software you must agree to: a. Return the software if not completely satisfied b. Upgrade when a newer version of software comes out c. The End User’s License Agreement d. B and C __D___ 15. Which of the following is true about Anti-Virus Software? a. New definitions are available daily for download b. Software that scans a computer for viruses, trojans, and other unwanted software c. Software that removes viruses, malware, spyware, and trojans d. All of the above IT: Computer Technician – Software Types Plan Copyright © Texas Education Agency, 2013. All rights reserved. 10 Matching 5 Points Each (35 pts total): Draw a line from the computer part name to the correct function Anti-Virus Malware Software The discipline of dealing with the good and bad and with moral duty and obligation Type of malware that collects user data, monitors habits, and mines data without user consent or knowledge Software that is malicious and is designed to capture, exploit, and access files without the owner’s consent or knowledge Software that is designed to perform a specific task Set of programs designed to manage and instruct computer hardware; this set of programs is the foundation of all other applications on a computer Software that is designed to detect, prevent, and remove viruses, malware, spyware, and trojans from the computer’s hard drive One or more programs and the collection of associated data that is stored on a computer for a specific purpose or function Ethics Operating System Spyware Computer Application IT: Computer Technician – Software Types Plan Copyright © Texas Education Agency, 2013. All rights reserved. 11