[go: up one dir, main page]

0% found this document useful (0 votes)
14 views6 pages

Lesson Plan CSS2

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 6

Senior High CSS Demonstrator: CABAÑAS, ARCHEL BONOTAN

DETAILED LESSON PLAN IN: ICT-COMPUTER SYSTEM SERVICING

I. OBJECTIVES.
a. To identify the kinds of computer malware
b. To know the harmful effects of computer malware
c. To know how to prevent malware from infecting your computer

II. SUBJECT MATTER


a. Topic: Computer Malware
b. Materials: PowerPoint presentation, Projector, Board and whiteboard
marker/ Chalk.

III. LESSON PROPER (Procedures)

TEACHER ACTIVITY STUDENTS ACTIVITY


A. Preparatory Activities
I. PRAYER  (Praying together)
II. CHECKING OF ATTENDANCE  (Raising their hand
when they are called)
III. CHECKING OF ASSIGNMENTS  (Checking the
assignments)
IV. WORD OF THE DAY  (Describing the word of
the day)
V. SETTING OF RULES BEFORE CLASS
DISCUSSION

 Once again, good morning class! It’s me


again, your teacher in Computer System
Servicing, Mr. ARCHEL CABAÑAS.

 So as usual, I will rephrase the rules


during our class discussion.

 First rule, raise your right hand without


any noise when you want to answer or if
you have some questions, then when I
point and call your name then that’s the
time you can state your answer or
questions.

 Second rule, don’t make any noise during


our class discussion like having some
chitchat with your friends or classmates.

 And third rule, please participate


appropriately. Are we clear?

 Good!  Sir, yes sir!


B. Developmental Activities
Senior High CSS Demonstrator: CABAÑAS, ARCHEL BONOTAN

I. REVIEW OF THE PREVIOUS LESSON.

 What was our lesson yesterday? Yes, John.  John: Sir, it is about
the hardware and
software

 Very good! It is about the hardware and


software

 So we had discussed the hardware and


software, and answered these following
questions:

1. What is the difference between


hardware and software?
2. What are the example of computer
hardware?
3. What are the example of computer
software?

C. Motivation

 Now, do you know what kind of software  Mike: Sir, it’s a


that makes your computer slow and computer virus!
sometimes it restarts unexpectedly? Yes,
Mike.

 Okay, very good! Virus makes your


computer slow and restart unexpectedly
but not only that there’s more.

D. Presentation of Lesson
 Virus can damage your computer easily
without knowing and hides your files, and
there are more computer programs that
can cause problem in your computer.

 Our lesson today is about Computer


Malware. We will know what are those
unwanted programs and also how to
prevent them from infecting our
computers.

E. Discussion
 Alright… Let’s start our topic for today.
Student listen
 Malware stands for malicious software.

 Malicious software is an unwanted program


in your computer,
Senior High CSS Demonstrator: CABAÑAS, ARCHEL BONOTAN

 There are 5 commonly types of malware:

Virus
Worm
Trojan
Spyware
Adware

 Virus is a computer program that can


destroy or cause damage to the data
stored in a computer. It can attach
themselves to other programs. Computer
Virus will replicate when the user executes
the program.
 The common symptoms of virus infection
are:
a. Displaying unwanted messages
b. Loss of data from a storage device
c. Computer restarting unexpectedly
 Have you ever experienced some of this
program class in your computer? Yes Mark. MARK: I experienced losing
files from my flash drive after
I used it in computer internet
 That computer you used in internet café is café.
infected with computer virus. Students STUDENT: okay, teacher
please check first if the internet café had Chel.
an updated antivirus before plugging your
flash drive, okay?
 The second common malware is worm.
WORM is a computer program but
different from virus, worm can spread to
networks or other computers without
executing it.
 The common symptoms of worm are to
unexpectedly fills up the memory.
 The third one is the Trojan/ Trojan horse Tina: Does it mean we need
is a program that disguise as a useful to research and read reviews
program but when installed it leaves your about the programs that we
PC unprotected and vulnerable by the are going to install?
hackers to get your personal information
from the computer. Yes Tina?
 Very good Tina, yes, you need to search
and read reviews about the programs that
you are going to install and please
download the program from the original
website. Don’t download from the other
sites because sometimes it attaches some
malware.
 The fourth one is the spyware, spyware is
a program that runs in the background
without you knowing. It has the ability to
monitor what you are currently doing and
typing through keylogging. Keyloggers is
an example of spyware, it records the
Senior High CSS Demonstrator: CABAÑAS, ARCHEL BONOTAN

keystroke done by the users, and steals


sensitive information like messages, email
and passwords.
 The last one is the adware, adware is
design to send you unwanted
advertisements, mostly pop-ups.
 I think everyone here experiencing adware MIKE: How are we going to
when you are a web surfer or searching on prevent our computer from
internet. Yes, Mike? those malware?
 Excellent question Mike, there are 6 tips to
prevent malware from infecting your
computer.
a. Install Anti-Virus/Malware
Software
b. Keep Your Anti-Virus Software
Up to Date
c. Run Regularly Scheduled Scans
with Your Anti-Virus Software
d. Keep Your Operating System
Current
e. Secure Your Network
f. Think Before You Click
 And that’s the 5 common malware that
sometimes we encounter when using
computer.

F. Generalization

 Alright, class be careful when using


computer because we don’t know that
someone is stealing our password with the
use of spyware or a virus running in our
computer and deleting our important files.
Always remember to install trusted
antivirus and update it regularly to prevent
malwares spreading in your computer.
G. Application

 Let’s have an oral recitation, I will give you


a scenario and you are going to answer
what kind of malware is it.
1. I plugged my flash drive from my John: Virus
friends and when I open my flash
drive my file was gone.
Yes, John.
Very good john. Next question
2. Liza surfing on internet but there is Mike: Adware
always an advertise that covers
every time she open website. Yes,
Senior High CSS Demonstrator: CABAÑAS, ARCHEL BONOTAN

mike.
Very good mike. Next question Students: we don’t know
3. What are you going to do if there are teacher.
worms in your friend’s laptop?

Don’t plug your flash drive, try to


install antivirus and scanned to
delete the worms, if the worms
damage the system already back up
your files and reformat it.

4. How do you prevent your computer Mich: Don’t trust programs


from Trojan/Trojan horse? Yes, Mich even it says it keeps your
Very good Mich. computer fast, check the sites
if it is trusted or not.

 Very good student, you understand how John: Thank you teacher for
harmful those malwares are, and you the topic today, now we
understand how to prevent it. Yes, John. understand how to be safe
 You’re welcome John. while using computer.

IV. EVALUATION.

Direction: Lets have one activity, I’ll be grouping you into 5, select 1 leader
in each group and come in the front to get a piece of paper, that paper is
written with 1 malware, so 1 malware each group. Now create a scenario
from that malware and explain how you solve that problem. I will give you
10minutes.

V. ASSIGNMENT. (Right minus wrong)

Direction: List down 2 examples in each malware. It is 10 points.

Prepared by:
Senior High CSS Demonstrator: CABAÑAS, ARCHEL BONOTAN

ARCHEL B. CABAÑAS
Senior High Applicant

You might also like