Вы находитесь на странице: 1из 4

Department of Education

Region VI – Western Visayas


Division of Iloilo City
ILOILO CITY NATIONAL HIGH SCHOOL
Molo, Iloilo City

LESSON PLAN - COMPUTER SYSTEM SERVICING

School: Iloilo City National High School Grade Level: Grade 8


Teacher: Sarah Joy A. Bataller Learning Areas: CSS

A. Content Standards:
The learners demonstrate and understanding of concepts and underlying principles in performing
computer operations.

B. Performance Standard:
The learners shall be able to perform computer operations based on a given tasks.

I. LEARNING OBJECTIVES:
1. Identify the different types of cyber threats in personal computer
2. Value practices on how to quarantine the malware in your personal computer
3. Enumerate the steps in preventing malware attacks in personal compute

II. SUBJECT MATTER:


Content: Computer Maintenance
LC Codes: TLE_IACSS9-12PCO-Ii-j-9
References:
1. Empowerment Technologies (Innovative Training Works,Inc.)
2. Youtube.com / Google.com
3. CG 11 of 32
A. Materials:
Powerpoint Presentation, Projector, Paper, Images, Video
B. Value Focus: Importance of Prevention and Awareness

III. PROCEDURE
A. Pre – Activity
Greetings
Prayer
Classroom Management
Checking of Attendance

1. Review:
 What is a Network or Communications Network?
 What are the types of Network?

2. Motivation: Show to students a video regarding Cyber Threat.

B. Activity:
1. Group the class into three groups.
2. Show powerpoint/video about Cyber Threat Definition and Malware Types.
3. After the presentation students will answer the following Guide Questions written on the
board and present it for two minutes in front of the class.
4. The rubrics will be presented to the class for the ratings.
QUESTIONS:
1. What is Cyber Threats?
2. What are the Different Types of Malware?
3. How can we avoid this MALWARE from spreading in the computer?
RUBRICS/MECHANICS:

6 4
Validity of the Answer All of the answer are correct One of the answer is wrong
Accuracy of the Explanation Explained the answer for Explained the answer for the
question excellently and question
correctly
Delivery / Presentation The presentation is clear, The presentation is
understandable, brief and understandable
concise
Timeliness / Speed Finish the activity on or before Finish the activity little late
time

C. ANALYSIS

Cyber threats have existed since 1975 when Steve Jobs and Steve Wozniak invented the first
personal computer, the Apple I. With the advent of personal computers came problems
with hackers, people who want to gain unauthorized access to your personal information either
for profit or to perform mischievous acts. A cyber threat is deemed any malicious act that
attempts to gain access to a computer network without authorization or permission from the
owners.

What are the Different Types of Cyber Threats?

1. Malware: Malware is short for “malicious software.” Wikipedia describes malware as a


term used to mean a “variety of forms of hostile, intrusive, or annoying software or
program code.” Malware could be computer viruses, worms, Trojan horses, dishonest
spyware.
A. Computer Virus - A computer virus is a small piece of software that can spread
from one infected computer to another. The virus could corrupt, steal, or
delete data on your computer—even erasing everything on your hard drive. A
virus could also use other programs like your email program to spread itself to
other computers. EXAMPLE OF VIRUS – Love Bug (I LOVE YOU),
B. Trojan horse: Users can infect their computers with Trojan horse software
simply by downloading an application they thought was legitimate but was in
fact malicious. Once inside your computer, a Trojan horse can do anything from
record your passwords by logging keystrokes (known as a keystroke logger) to
hijacking your webcam to watch and record your every move.
C. Computer worm: A computer worm is a software program that can copy itself
from one computer to another, without human interaction. Worms can
replicate in great volume and with great speed. For example, a worm can send
copies of itself to every contact in your email address book and then send itself
to all the contacts in your contacts’ address books. Because of their speed of
infection, worms often gain notoriety overnight infecting computers across the
globe as quickly as victims around the world switch them on and open their
email. EXAMPLE: Code Red, Nimda, Klez.

Tips on How to Prevent Malware From Infecting Your Computer—and Your Livelihood:

1. Install Anti-Virus/Malware Software.


2. Keep Your Anti-Virus Software Up to Date.
3. Run Regularly Scheduled Scans with Your Anti-Virus Software.
4. Keep Your Operating System Current.
5. Secure Your Network.
6. Think Before You Click.
7. Keep Your Personal Information Safe
8. Don’t Use Open Wi-Fi.
9. Back Up Your Files.
10. Use Multiple Strong Passwords
D. Abstraction/Generalization
a. What is your point of understanding with regards to the security of our cyber world? Is it
permanent or it is a never ending crusade for protection?
b. What is the main purpose of cyber threats?
c. How was this malware created?

E. Application:
Activity – Role Playing
 Group the class into three groups. Every group will be given a specific task on how to prevent
malware infection
 Give the tips in preventing the spread of malware and create a scenario/s on how are you going
to apply this tips in your day to day activity using the internet and computer.

Group I – Install Anti – Virus / Malware Software, Use Multiple Strong Passwords, Run Regularly
Scheduled Scans with your anti-virus software
Group 2 - Keep your operating system current, Secure your network, Think before you click
Group 3 – Keep your personal information safe, Don’t use open wifi, Back up your files
 Presentation of output by group

IV. EVALUATION:
(The test is presented using the MS Powerpoint)
1. Get a one whole sheet of pad paper and answer the following questions

1. What are the Cyber Threats that can damage your personal computer?
2. What are the different types of malware?
3. How this malware spread in the computer?

2. On the box choose at least 5 tips in preventing malware from infecting your computer.

Uninstall Anti-Virus/Malware Software.


Don’t Keep Your Anti-Virus Software Up to Date.
Run Regularly Scheduled Scans with Your Anti-Virus Software.
Keep Your Operating System Current.
Unsecure Your Network.
Click Before You Think
Keep Your Personal Information Safe
Use Open Wi-Fi.
Back Up Your Files.
Use Multiple Weak Passwords

IV. ASSIGNMENT:

1. Research about our next topic on cyber threats; Rogue Security Software, Botnet, Spam,
Phishing and Hacker.

Prepared by:

SARAH JOY A. BATALLER


TI – TLE
Iloilo City National High School
RUBRICS

ACTIVITY – ROLE PLAYING

CATEGORY 4 3 2 1
Content Great job! You offered Your role-play is on- The role-play is The role-play is
creative new insights topic, but it is missing somewhat off-topic. completely off-topic,
on the topic! some creativity and Pay more attention to as if your group did
insight. the directions next not even read the
time! directions.

Roles Excellent work! Every Everyone in your group For the most part, your Your group failed to
member of your group stayed in character, group stayed in stay in character, and
stayed in character, but some members character. Next time, it looked like you had
and it was clear you didn't seem to really spend more time not prepared for how
took your roles be "into" what they preparing for how the the characters might
seriously. were doing. characters might think think or act.
or act.
Preparation Your group did an Your group obviously Your group needs to It seems that your
excellent job preparing spent some time spend more time group used the
and rehearsing your preparing for the role- preparing for the role- preparation time for
role-play, and it shows play, but some play. Reading lines something else.
- everything went very rehearsal might have from a script is a sure
smoothly. helped things run sign you're not
more smoothly. prepared.
Overall Impression Excellent! Your Good! Your Keep working! Don't Argh! I expect much
presentation was presentation, while it forget that, though the better work from you
entertaining and was fun to watch, process is entertaining, next time.
informative! could have been more you're also supposed
informative. to learn something
from it.

Вам также может понравиться