Você está na página 1de 3

POINT FORTIN WEST SECONDARY SCHOOL

INFORMATION TECHNOLOGY DEPARTMENT


LESSON PLAN
TEACHERS NAME: Carla Lewis
DATE:
TIME:

SUBJECT: Information Technology

16th February 2016


Period 4&5

Syllabus:

CLASS:

10:30 11:40

Form 4 Group 1

LENGTH OF PERIOD:

70 mins

CSEC Information Technology

Unit Title:

Application and Implication of IT

Lesson 2:

Misuse of Information

RESOURCES
Teacher Resources

Student resources

Writing paper
Pen

PREVIOUS KNOWLEDGE - Students should:

Know the difference between data and information

OBJECTIVES
Cognitive

At the end of the lesson Form 4 students


will:
1. Justify their reasons why misusing
information is wrong

Psychomotor

Affective

At the end of the lesson Form 4 students


will:
1. Actively participate in activities
(Responding to phenomena)
2. Displays team work (Internalizing
Page | 1

Values)
ASSESSMENT STRATEGY with Objective
Cognitive

1. Justify their reasons


why misusing
information is wrong

Assessment Strategy

Activity: Write a poem


reflecting how you feel about
the misuse of information

Affective

Assessment Strategy

1. Actively participates in
activities (Responding
to phenomena)

1. Observation using
a checklist

2. Displays team work


(Internalizing Values)

2. Observation using
a checklist

Set Induction

Two teachers act out the following scenarios: A woman reports to the police that her identity was stolen and is she
now left with a huge debt. The police question the woman about her habits to determine how the perpetrators were
able to get her information. The woman reveals that she throws her bills and bank statements in the trash without
shredding them.
3 mins
Description of Teaching/Learning Activities:
Teacher Activities

The teacher invites the class to


discuss the scenario they witnessed
by asking them questions. Teacher
then steers the conversation
towards how information in the
wrong hands can be damaging
(Questioning/discussion)
Teacher will divide students into four
groups. Each group will be given one

Student Expected Activities

Students will answer questions asked


and participate in discussions

In groups, students will discuss their


given task and then devise a scenario
that clearly shows how information is

Intelligence
being
developed
VL

Est. time to
complete

VL/BK

35 mins

10 mins

Page | 2

way information can be misused.


(Cooperative learning)

Teacher will ask students to write a


short poem about one of the ways
information can be misused
(Evaluating)

being misused.
Group A Propaganda
Group B Copyright
Group C - Violation of privacy
Group D Computer fraud
Groups must also present after the
dramatization how these acts can
negatively affect others

VL/Intra

20 mins

Students will write their poems and


present to the class

END OF LESSON ACTIVITIES


Closure to lesson: 2 mins
T.S. (Transition Statement):

In todays class, we learned about the ways information can be misused.


B.S. (Bridging Statement):

In our next class, we will look at the ways we can limit or prevent information from being misused.

Page | 3

Você também pode gostar