Chapter 6 – Computer Viruses/Hacking and Prevention Starter Task – How can a virus effect your computer? Last Lesson: - Software Copyright & illegal Downloads.

Slides:



Advertisements
Similar presentations
WHO HAS THE POWER? L.I To be able to explain who has the power in our lives STARTER: How many different words can you think of that have something to do.
Advertisements

Learning Objectives Can I understand what is a computer virus and worm is Can I identify risks when using technology (E- Safety) Can I discuss cyber bullying.
Chapter 1 - Lesson 4 Worksheet 4 – Task 2 Pupils will identify their usage of application software. They will comment on how they use the software and.
Desktop Publishing Lesson 2 - Unit 7 – Desktop Publishing
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Factors to be taken into account when designing ICT Security Policies
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
William Shakespeare. Year 7 Your mission if you are willing to accept it, is to learn about William Shakespeare and his plays! Starter game.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Section 6 Theory Software Copyright, Viruses and Hacking.
Chapter 6 – Effect of ICT on Patterns of Employment Starter Task – Discuss this statement and the video? Last Lesson: - Trustworthiness of Information.
Topic 3 Spreadsheets and Modelling Lesson 4 A Good Breakfast.
Lesson 3: Global Citizens1 Citizenship Lesson 3 What is a global citizen? Aim: to understand what a global citizen is Global citizen.
ESafety Lesson 3 – Cyber Bullying Part 2 Unit 1 – eSafety
Unit 2 Information gathering techniques Short Term Goal: To employ appropriate information gathering techniques to accurately assess pupils current online.
Risk assessments. Aims Follow safe working practices Objectives To define a hazard To define a risk List ways in which a hazard can be minimised Complete.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Year 8 Lesson 4 – Searching for information Objectives To be able to use the advanced image searching feature To understand how images (and text content)
How did the Liberal Reforms protect children?. Learning objective – to be able to understand the measures the Liberals took to help the young between.
What Output devices are being used in picture B? What are the advantages of using this device? How is teacher A at an disadvantage in teaching his lesson?
ESafety Lesson 2 – Cyber Bullying Part 1 Unit 1 – eSafety
LO To practice our methods of division. 11- Nov-14 Write a comment or make a statement about this prompt.
Chapter 1 - Lesson 7 (P2) Worksheet 8 – Task 1 Write a brief explanation for each type of computer What is the purpose of a Mainframe Computer: Task 2:
Mr Conti 12th February 2014 Lesson Aim To explore the laws associated with computer and media use and look at some examples of when these laws may apply.
School in Mozambique Learning Objectives: 1 – To understand the similarities and differences between different schools 2 – To reflect on the importance.
The origins of the universe- Are science and religion in conflict?
Hackers And Hacking.
Home Entertainment Music Downloads. Objectives Become familiar with home entertainment technologies. Be able to assess the impact of home technologies.
Nuclear Waste What is the best way to deal with Nuclear Waste? Starter: What are the issue with nuclear waste?
Desktop Publishing Lesson 2 -
Unit 9 – Google Sketch up Google Sketch up – Intro Lesson 1 & 2.
Learning Objectives Can I discuss the copyright law Can I identify why organisations must protect data Can I describe how legislation affect computer use.
STARTER - WHICH OF THESE IS A COMPUTER A A G G F F E E B B C C D D H H.
Year 9 XL task. Task 1. ?assetID=17237 You have already looked at some measures that can be taken to protect.
© 2016 AQA. Created by Teachit for AQA Social engineering Lesson.
Starter: Think, Pair, Share.
3.6 Fundamentals of cyber security
Year 8 ICT Internet Security
Write a story Creating a Successful Lesson Plan Learning objectives:
Chapter 4 Number 2, Lesson 1 15/xi/2013.
Spreadsheets.
Year 7 – PSHE Topic 9 Effects of Drugs.
Starter Open up the “What Am I Task Sheet” and work through the clues independently. You have 5 minutes before the answers are to be discussed as a group…
TB2 Lesson 8 Online Banking
TB2 Lesson 5 Data Protection
WEEK 1 – LESSON 3 SEQUENCES nth TERM
Starter Task One: Complete the gapped worksheet, identifying which description matches the correct key word. Task Two: Briefly answer the questions outlined.
Lesson 2 – Cyber Bullying Part 1
STARTER TASK EXTENSION
Lesson 1 – Intro to eSafety
Lesson 3 – Cyber Bullying Part 2
Starter Activity On the lined paper provided answer the following:
Planning a Family.
Lesson Objectives Must learn: What determines the balance of supply and demand Should learn: The purpose of understanding how supply and demand works.
Market Demand & Supply Unit 1 Topic
Unit 1.3: Putting a Business Idea into Practice
WEEK 1 – LESSON 2 SEQUENCES
Blues Music.
Simultaneous Equations
Learning objective – to be able to explain the significance of a historical figure or event.
STARTER TASK EXTENSION
Data Protection.
How did the German government handle the economy during the 1920s?
All pupils can use circle theorems to solve a variety of questions
How did the German government handle the economy during the 1920s?
Market Demand & Supply Miss Khan
Gradients L.O. All pupils can find the gradient of linear graphs
What can your remember about triangles?
LO: To create an idea as a starting point for our devised pieces.
Internal components of a computer.
Presentation transcript:

Chapter 6 – Computer Viruses/Hacking and Prevention Starter Task – How can a virus effect your computer? Last Lesson: - Software Copyright & illegal Downloads

Learning Objectives To understand the threat of viruses and hacking to a computer system. To understand how viruses can infect computers. To understand what could be done to prevent the threat of viruses and hacking. Outcomes Task 1 In pairs pupils will look at the articles and discuss the threats posed by viruses and hacking. Task 2 Pupils will complete a set of questions based on the articles. Task 3 Pupils will explain the measures that could be taken in order to protect against hacking and viruses. Extension – Research into news articles related to viruses and hacking. Chapter 6 - Lesson 6 Computer Viruses and Hacking

Main Activities Task 1 – Discussion In pairs pupils will look at the articles and discuss the threats posed by viruses and hacking. Pupils will also write definitions for viruses and hacking. 10 Minutes 15 Minutes Student Progression All PupilsMost PupilsSome Pupils Will be able to understand the threats posed by viruses and hacking. Will understand how viruses can infect and cause harm to computers. Will be able suggest measures that could be taken to prevent the threat of viruses and hacking. Task 2 – Worksheet Pupils will complete a set of questions based on the articles. For each articles pupils will identify the threat. Task 3 Pupils will explain the measures that could be taken in order to protect against hacking and viruses. 5 Minutes

Plenary Refer back to lesson objectives Plenary Tasks How would you protect your computer against the threat of a computer virus? Learning Objectives To understand what a computer virus is and how it effects a computer system. To understand how viruses can infect computers. To understand what could be done to prevent the threat of viruses.