Lesson Plan. Course Title: Computer Technician

Size: px
Start display at page:

Download "Lesson Plan. Course Title: Computer Technician"

Transcription

1 Lesson Plan Course Title: Computer Technician Session Title: Computer Software: Types, Setup, and Ethical Boundaries Lesson Duration: Three to four 1 hour sessions with an additional 1 hour session for the exam Lesson length is subjective and will vary from instructor to instructor Performance Objective: Upon completion of this lesson the student will be able to define, install, uninstall, and know the ethical boundaries pertaining to computer software. Specific Objectives: The student will be able to define the various types of software and their functions within the computer The student will be able to install and uninstall software on a computer The student should be able to comprehend and define the ethical boundaries associated with the handling and disbursement of software Preparation TEKS Correlations: This lesson, as published, correlates to the following TEKS. Any changes/alterations to the activities may result in the elimination of any or all of the TEKS listed (c) Computer Technician (1) The student demonstrates the necessary skills for career development, employability, and successful completion of course outcomes. The student is expected to: (H) demonstrate an understanding of legal and ethical responsibilities in relation to the field of information and technology (5) The student relates core academic skills to the requirements of computer technologies. The student is expected to: (F) describe the architecture of various computer systems Instructor/Trainer References: Webster Online Dictionary Content Developer Knowledge Instructional Aids: 1. Computer Software Types, Setup, and Ethical Boundaries Presentation 2. Computer Software Types, Setup, and Ethical Boundaries Exam 3. Computer Software Types, Setup, and Ethical Boundaries Exam - KEY 1

2 Materials Needed: 1. Operational Computer 2. Boxes of varying types of computer software 3. Software manual 4. Copy of a software package 5. Copies of an End Users License Agreement 6. Copies of Exam Equipment Needed: 1. Projection system to play presentation 2. Computer with Internet access Learner 1. Students should refer to presentation, curriculum material, and class notes for definitions, instructions, and concepts regarding computer software types, setup, and ethical boundaries. Introduction Introduction (LSI Quadrant I): Over the last few sessions we have learned about the various components, functions, and common failures associated with the hardware on a computer. Next, I will introduce you to the software component that constitutes a functioning Personal Computer. Ask: Does anyone have any ideas as to what constitutes as computer software? Ask: Can you name some different types of software? Tell: By the end of this session you will be able to identify what constitutes computer software, identify the different types of software, know how to install/uninstall computer software, and possess a better understanding of the practice of ethics in computer software usage. Outline Outline (LSI Quadrant II): Instructor Notes: Note: Instructors can use the presentation slides and notes with the following outline. I. Course Objectives (Slide 2) II. Computer Software A. Definition (Slide 3) III. Operating System (Slide 4) IV. Computer Applications (Slide 5) 2

3 V. Computer Malware (Slide 6) VI. Computer Spyware (Slide 7) VII. Anti-Virus Software (Slide 8) VIII. Installing Computer Software A. Physical Media (Slide 9) B. Downloaded Media (Slide 10) C. App Store (Slide 11) IX. Uninstalling Computer Software (Slide 12) X. Computer Software Ethics A. Definition (Slide 13) XI. Ethics in Distribution and use of Software (Slides 14-16) XII. Independent / Group work (Slide 17) XIII. Exam Preparation (Slide 18) Application Guided Practice (LSI Quadrant III): The teacher will define software and demonstrate the process of installing and uninstalling software on a personal computer aided by the use of the presentation. Instruction will also cover ethics and the use of software as the licensor intended. Independent Practice (LSI Quadrant III): The teacher will place the students into groups to practice installing and uninstalling software on a classroom computer. The teacher will evaluate the group s work as each group finishes. Upon completion, the groups will work individually and describe the processes they followed in installing/uninstalling the software. Summary Review (LSI Quadrants I and IV): Ask the students summary questions: 1. What is software and what are some examples and their functions? 2. Name some different types of software. 3. What are the steps in installing/uninstalling software? 4. What are ethics? 5. How do ethics translate into the realm of software and usage? Evaluation Informal Assessment (LSI Quadrant III): The instructor will monitor student progress during the independent practice and answer questions groups may have as they practice installing and uninstalling software on the classroom computer. 3

4 Formal Assessment (LSI Quadrant III, IV): The instructor will utilize the Computer Software: Types, Setup, and Ethical Boundaries Exam and Exam Key. Extension Extension/Enrichment (LSI Quadrant IV): Students can come in before or after school and practice working with the classroom computer and with the software. This activity will further the learning of how the various software components interact to create the holistic user experience once a computer boots. Students may also elect to bring in their own portable computing devices and experiment with them. 4

5 Icon Teaching Strategies Verbal/ Linguistic Logical/ Mathematical Visual/Spatial Musical/ Rhythmic Bodily/ Kinesthetic Intrapersonal Interpersonal Naturalist Existentialist Lecture, discussion, journal writing, cooperative learning, word origins Problem solving, number games, critical thinking, classifying and organizing, Socratic questioning Mind-mapping, reflective time, graphic organizers, color-coding systems, drawings, designs, video, DVD, charts, maps Use music, compose songs or raps, use musical language or metaphors Use manipulatives, hand signals, pantomime, real life situations, puzzles and board games, activities, role-playing, action problems Reflective teaching, interviews, reflective listening, KWL charts Cooperative learning, roleplaying, group brainstorming, cross-cultural interactions Natural objects as manipulatives and as background for learning Socratic questions, real life situations, global problems/questions Personal Development Strategies Reading, highlighting, outlining, teaching others, reciting information Organizing material logically, explaining things sequentially, finding patterns, developing systems, outlining, charting, graphing, analyzing information Developing graphic organizers, mind-mapping, charting, graphing, organizing with color, mental imagery (drawing in the mind s eye) Creating rhythms out of words, creating rhythms with instruments, playing an instrument, putting words to existing songs Moving while learning, pacing while reciting, acting out scripts of material, designing games, moving fingers under words while reading Reflecting on personal meaning of information, studying in quiet settings, imagining experiments, visualizing information, journaling Studying in a group, discussing information, using flash cards with other, teaching others Connecting with nature, forming study groups with like minded people Considering personal relationship to larger context 5

6 Computer Technician Name Date Computer Software Exam: Types, Set-up, and Ethical Boundaries True/False 2 points each: Indicate if the statement is True (T) or False (F) in the space provided. 1. A computer will run Applications without an Operating System. 2. Spyware is software that often is downloaded from the Internet without the user s knowledge. 3. A end user can be fined or face legal action for failing to adhere to the guidelines of the EULA. 4. The App Store is an old technology that is being phased out. 5. The operating system is the also called the OS for short. 6. Malware s design is to get rid of viruses on a computer. 7. Anti-virus software is not important to have installed on a personal computer. 8. The App Store is currently available on Smartphones, Tablets, and some computers. Multiple Choice 5 points each: Select the letter choice that best completes the statement or question. 9. The following are ethical uses of software: a. Installing a single software license on multiple computers b. Loaning software to a friend to borrow c. Burning a copy of software to give to someone else d. None of the above 6

7 10. The first steps to uninstalling software on a PC are: a. Selecting Programs and Features clicking Uninstall b. Clicking Start and then clicking on Control Panel c. Selecting the Control Panel and then clicking on Start d. None of the above 11. Software that is malicious in intent with the design to access a user s computer without their knowledge or consent is: a. Malware b. Anti-virus c. Operating System d. All of the above 12. Spyware s purpose is to: a. Keep viruses from infecting a computer b. Organize a computer s files in the background c. Mine data, monitor the user s habits, and keylogging d. Help the computer connect to the internet 13. An example of a computer application is: a. Protocols b. Data c. The BIOS d. None of the above 14. Before installing most software you must agree to: a. Return the software if not completely satisfied b. Upgrade when a newer version of software comes out c. The End User s License Agreement d. B and C 15. Which of the following is true about Anti-Virus Software? a. New definitions are available daily for download b. Software that scans a computer for viruses, trojans, and other unwanted software c. Software that removes viruses, malware, spyware, and trojans d. All of the above 7

8 Matching 5 Points Each (35 pts total): Draw a line from the computer part name to the correct function Anti-Virus The discipline of dealing with the good and bad and with moral duty and obligation Malware Type of malware that collects user data, monitors habits, and mines data without user consent or knowledge Software Software that is malicious and is designed to capture, exploit, and access files without the owner s consent or knowledge Ethics Software that is designed to perform a specific task Operating System Set of programs designed to manage and instruct computer hardware; this set of programs is the foundation of all other applications on a computer Spyware Software that is designed to detect, prevent, and remove viruses, malware, spyware, and trojans from the computer s hard drive Computer Application One or more programs and the collection of associated data that is stored on a computer for a specific purpose or function 8

9 Computer Technician Name Date Computer Software Exam: Types, Set-up, and Ethical Boundaries Key True/False 2 points each: Indicate if the statement is True (T) or False (F) in the space provided. F 1. A computer will run Applications without an Operating System. T 2. Spyware is software that often is downloaded from the Internet without the user s knowledge. T 3. A end user can be fined or face legal action for failing to adhere to the guidelines of the EULA. F 4. The App Store is an old technology that is being phased out. T 5. The operating system is the also called the OS for short. F 6. Malware s design is to get rid of viruses on a computer. F 7. Anti-virus software is not important to have installed on a personal computer. T 8. The App Store is currently available on Smartphones, Tablets, and some computers. Multiple Choice 5 points each: Select the letter choice that best completes the statement or question. D 9. The following are ethical uses of software: a. Installing a single software license on multiple computers b. Loaning software to a friend to borrow c. Burning a copy of software to give to someone else d. None of the above 9

10 B 10. The first steps to uninstalling software on a PC are: e. Selecting Programs and Features clicking Uninstall f. Clicking Start and then clicking on Control Panel g. Selecting the Control Panel and then clicking on Start h. None of the above A 11. Software that is malicious in intent with the design to access a user s computer without their knowledge or consent. a. Malware b. Anti-virus c. Operating System d. All of the above C 12. Spyware s purpose is to: a. Keep viruses from infecting a computer b. Organize a computer s files in the background c. Mine data, monitor the user s habits, and keylogging d. Help the computer connect to the internet D 13. An example of a computer application is: a. Protocols b. Data c. The BIOS d. None of the above C 14. Before installing most software you must agree to: a. Return the software if not completely satisfied b. Upgrade when a newer version of software comes out c. The End User s License Agreement d. B and C D 15. Which of the following is true about Anti-Virus Software? a. New definitions are available daily for download b. Software that scans a computer for viruses, trojans, and other unwanted software c. Software that removes viruses, malware, spyware, and trojans d. All of the above 10

11 Matching 5 Points Each (35 pts total): Draw a line from the computer part name to the correct function Anti-Virus The discipline of dealing with the good and bad and with moral duty and obligation Malware Type of malware that collects user data, monitors habits, and mines data without user consent or knowledge Software Software that is malicious and is designed to capture, exploit, and access files without the owner s consent or knowledge Ethics Software that is designed to perform a specific task Operating System Set of programs designed to manage and instruct computer hardware; this set of programs is the foundation of all other applications on a computer Spyware Software that is designed to detect, prevent, and remove viruses, malware, spyware, and trojans from the computer s hard drive Computer Application One or more programs and the collection of associated data that is stored on a computer for a specific purpose or function 11

Lesson Plan. Preparation

Lesson Plan. Preparation Lesson Plan Course Title: Computer Maintenance Session Title: Disaster Recovery and Preventative Maintenance Lesson Duration: 3 to 4 one-hour sessions with 1 additional one-hour session for the exam (Lesson

More information

Lesson Plan. Course Title: Advanced Computer Programming Session Title: Databases. Preparation

Lesson Plan. Course Title: Advanced Computer Programming Session Title: Databases. Preparation Lesson Plan Course Title: Advanced Computer Programming Session Title: Databases Lesson Duration: 2-3 days Performance Objective: Upon completion of this assignment, the student will be able to: identify

More information

Lesson Plan. Course Title: Digital and Interactive Media Session Title: College and Career Poster

Lesson Plan. Course Title: Digital and Interactive Media Session Title: College and Career Poster Lesson Plan Course Title: Digital and Interactive Media Session Title: College and Career Poster Lesson Duration: 3 Hours Performance Objective: Upon completion of this assignment, the student will have

More information

Lesson Plan Course Title: Web Technologies Session Title: Website Administration

Lesson Plan Course Title: Web Technologies Session Title: Website Administration Lesson Duration: Approximately 10 hours Performance Objective: Lesson Plan Course Title: Web Technologies Session Title: Website Administration Following the completion of this lesson, students will understand

More information

Lesson Plan. Preparation. TEKS Correlations: 1C: Examine the role of certifications, resumes, and portfolios in the Web Technologies profession.

Lesson Plan. Preparation. TEKS Correlations: 1C: Examine the role of certifications, resumes, and portfolios in the Web Technologies profession. Lesson Plan Course Title: Session Title: Using Online Search Tools to Locate and Evaluate Information. Lesson Duration: 2 hours Performance Objective: Upon completion of the lesson, students will be able

More information

Lesson Plan. Course Title: Computer Maintenance Session Title: Numbering Systems

Lesson Plan. Course Title: Computer Maintenance Session Title: Numbering Systems Lesson Plan Course Title: Computer Maintenance Session Title: Numbering Systems Lesson Duration: Lesson length is subjective and will vary from instructor to instructor Performance Objective: Upon completion

More information

Lesson Plan. Course Title: Web Technologies Session Title: Web Site Planning & Design

Lesson Plan. Course Title: Web Technologies Session Title: Web Site Planning & Design Lesson Plan Course Title: Web Technologies Session Title: Web Site Planning & Design Lesson Duration: 3 Hours Performance Objective: Upon completion of the lesson, students will understand how to develop

More information

Lesson Plan. Course Title: Computer Programming. Session Title: Software Life Cycle

Lesson Plan. Course Title: Computer Programming. Session Title: Software Life Cycle Lesson Plan Course Title: Computer Programming Session Title: Software Life Cycle Lesson Duration: 2 hours Performance Objective: Upon completion of this assignment, the student will understand the software

More information

Lesson Plan. Course Title: Principles of Information Technology Session Title: Understanding Types & Uses of Software

Lesson Plan. Course Title: Principles of Information Technology Session Title: Understanding Types & Uses of Software Lesson Plan Course Title: Principles of Information Technology Session Title: Understanding Types & Uses of Software Lesson Duration: Approximately 5 hours Performance Objective: Upon completion of this

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Lesson Plan Course Title: Principles of Information Technology Lesson Duration: 45 Minutes Session Title: Keyboards, Mice, and Other Input Devices Performance Objective: Upon completion of this assignment,

More information

Lesson Plan. Course Title: Digital and Interactive Media Session Title: Emerging Technologies

Lesson Plan. Course Title: Digital and Interactive Media Session Title: Emerging Technologies Lesson Plan Course Title: Digital and Interactive Media Session Title: Emerging Technologies Lesson Duration: 3 Hours Performance Objective: Upon completion of this assignment the student will be able

More information

Lesson Plan. Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers.

Lesson Plan. Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers. Lesson Plan Course Title: Principles of IT Session Title: Networks and Hackers Lesson Duration: Lesson length is subjective and will vary from instructor to instructor. Performance Objective: Upon completion

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Lesson Plan Course Title: Computer Maintenance Session Title: Hard Drives Lesson Duration: 90 Minutes Performance Objective: Upon completion of this assignment, the student will be able to recognize a

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Lesson Plan Course Title: Web Technologies Session Title: Planning & Designing Client Websites Lesson Duration: Varies but would be a minimum of one week. Performance Objective: Upon completion of this

More information

Lesson Plan Course Title: Web Technologies Session Title: Internet Fundamentals & Background

Lesson Plan Course Title: Web Technologies Session Title: Internet Fundamentals & Background Lesson Plan Course Title: Web Technologies Session Title: Internet Fundamentals & Background Lesson Duration: 2 Hours Performance Objective: Upon completion of the lesson, students will have an understanding

More information

Lesson Plan. Preparation. 130.272(c). Principles of Information Technology (One-Half to One Credit).

Lesson Plan. Preparation. 130.272(c). Principles of Information Technology (One-Half to One Credit). Lesson Plan Course Title: Principles of Information Technology Session Title: Peripheral Devices Lesson Duration: Will vary from instructor to instructor Performance Objective: Upon completion of this

More information

Lesson Plan. Instructor/Trainer References: Content developer knowledge

Lesson Plan. Instructor/Trainer References: Content developer knowledge Lesson Plan Course Title: Web Technologies Session Title: Website Publishing/Going Live! Lesson Duration: Estimated 90 Minutes and will vary from instructor to instructor Performance Objective: Upon completion

More information

Lesson Plan. Course Title: Advanced Computer Programming Session Title: Project Management Basics

Lesson Plan. Course Title: Advanced Computer Programming Session Title: Project Management Basics Lesson Plan Lesson Duration: Weeks/Days/Hours/Minutes 3 weeks Performance Objective: Course Title: Advanced Computer Programming Session Title: Project Management Basics Upon completion of this assignment,

More information

Lesson Plan. Preparation

Lesson Plan. Preparation 1 Lesson Plan Course Title: Concepts of Engineering and Technology Session Title: Emerging STEM Careers Performance Objective: After completing this lesson, students will be able to research, compare and

More information

Preparation. TEKS Correlations:

Preparation. TEKS Correlations: Lesson Plan Course Title: Principles of Business Management, Finance, and Marketing Session Title: Financial Exchanges Performance Objective (LSI Quadrant 1- Why are we doing this?): The purpose of this

More information

Animation Overview of the Industry Arts, AV, Technology, and Communication. Lesson Plan

Animation Overview of the Industry Arts, AV, Technology, and Communication. Lesson Plan Animation Overview of the Industry Arts, AV, Technology, and Communication Lesson Plan Performance Objective Upon completion of this assignment, the student will have a better understanding of career and

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Lesson Plan Course Title: Concepts of Engineering and Technology Session Title: Introduction to Engineering Fundamentals and Civilization - Part 1 Definitions Performance Objective: After completing Part

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Portfolio Information Practicum in Interior Design Lesson Plan Performance Objective Upon completion of this assignment, the student will be able to create a portfolio to document personal knowledge and

More information

Credit History and Ratings

Credit History and Ratings Credit History and Ratings Course Title Money Matters Lesson Title Credit History and Ratings Performance Objectives: Understand and manage credit responsibly. Specific Objective : As a result of this

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Statistical Process Control (SPC) Tools: Gantt Chart Manufacturing Engineering Lesson Plan Performance Objectives After completing this lesson, students will be able to discuss the purpose of using a Gantt

More information

Lesson Plan. monitor project development or resource allocation on a horizontal time scale.

Lesson Plan. monitor project development or resource allocation on a horizontal time scale. Project Management Practicum in Management and Administration Performance Objective Upon completion of this lesson, each student will demonstrate the importance of using Project Management in the school

More information

Lesson Plan. monitor project development or resource allocation on a horizontal time scale.

Lesson Plan. monitor project development or resource allocation on a horizontal time scale. Project Management Practicum in Law, Public Safety, Corrections, and Security Performance Objective Upon completion of this lesson, each student will demonstrate the importance of using Project Management

More information

Lesson Plan - Time Value of Money

Lesson Plan - Time Value of Money Lesson Plan - Time Value of Money Course Title Money Matters Lesson Title Time Value of Money Specific Objective Explain the time value of money Performance Objectives: The learner will Discuss how saving

More information

Lesson Plan Careers in Financial Management and Investment Planning

Lesson Plan Careers in Financial Management and Investment Planning Lesson Plan Careers in Financial Management and Investment Planning Course Title: Money Matters Lesson Title: Careers in Financial Management and and Investment Planning Specific Objective: Research and

More information

Lesson Plan. Course Title: Concepts of Engineering and Technology Session Title: Green Energy Careers

Lesson Plan. Course Title: Concepts of Engineering and Technology Session Title: Green Energy Careers Lesson Plan Course Title: Concepts of Engineering and Technology Session Title: Green Energy Careers Performance Objective: After completing this lesson, students will be able to compare renewable and

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Lesson Plan Course Title: Architectural Design Session Title: The Plumbing Plan Performance Objective: After completing this lesson the students will be able to: (a) explain the purpose and components

More information

Lesson Plan. Course Title: Principles of Business, Marketing and Finance Session Title: Advertising Media. Performance Objective:

Lesson Plan. Course Title: Principles of Business, Marketing and Finance Session Title: Advertising Media. Performance Objective: Lesson Plan Course Title: Principles of Business, Marketing and Finance Session Title: Advertising Media Performance Objective: After completing this lesson, the student will understand that Advertising

More information

Lesson Plan. Performance Objective Upon completion of this lesson, each student will create a design plan for a tiny house.

Lesson Plan. Performance Objective Upon completion of this lesson, each student will create a design plan for a tiny house. Tiny Houses: Living Large in a Small Space Practicum of Architectural Design Lesson Plan Performance Objective Upon completion of this lesson, each student will create a design plan for a tiny house. Specific

More information

Lesson Plan. Time When taught as written, this lesson should take two to three days to teach. Preparation

Lesson Plan. Time When taught as written, this lesson should take two to three days to teach. Preparation Public Relations & Publicity Practicum in Marketing Dynamics Marketing Lesson Plan Performance Objective Upon completion of this lesson, each student will understand how to promote a business or organization

More information

Lesson Duration: Approximately two to four 90-minute class periods [Lesson length is subjective and will vary from instructor to instructor]

Lesson Duration: Approximately two to four 90-minute class periods [Lesson length is subjective and will vary from instructor to instructor] pe Lesson Plan Course Title: Session Title: Printing & Imaging Technology Advertising: Flyers and * This is Lesson #22 if used as part of the overall unit on Printing & Imaging Technology. This lesson

More information

Lesson Plan. Time When taught as written, this lesson should take approximately 55-65 minutes to teach. Preparation

Lesson Plan. Time When taught as written, this lesson should take approximately 55-65 minutes to teach. Preparation Reconciling the Statement Practicum in Business Management Business Management & Administration Lesson Plan Performance Objective Students will be able to demonstrate their ability to reconcile the bank

More information

Chapter 3 Software. Computer Concepts 2013. 3 Chapter Contents. 3 Section A: Software Basics 13-09-27

Chapter 3 Software. Computer Concepts 2013. 3 Chapter Contents. 3 Section A: Software Basics 13-09-27 Chapter 3 Software Computer Concepts 2013 3 Chapter Contents Ø Section A: Software Basics Ø Section B: Office Suites Ø Section C: Installing Software and Upgrades Ø Section D: Buying Software Ø Section

More information

What is Multiple Intelligence? Multiple Intelligences are 8 different ways to demonstrate intellectual ability. It is how you learn best.

What is Multiple Intelligence? Multiple Intelligences are 8 different ways to demonstrate intellectual ability. It is how you learn best. What is Multiple Intelligence? Multiple Intelligences are 8 different ways to demonstrate intellectual ability. It is how you learn best. The Multiple Intelligences How You Learn Best 1. Visual/Spatial

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Lesson Plan Course Title: Professional Communications Session Title: Communication Strategies & Technical Writing: Advertising, Marketing, & Propaganda Techniques - PART II Lesson Duration: Three 90-minute

More information

Pre-service Performance Assessment Professional Standards for Teachers: See 603 CMR 7.08

Pre-service Performance Assessment Professional Standards for Teachers: See 603 CMR 7.08 Please use this assessment in conjunction with the for Teachers guidelines: the rating scale; evaluation questions relating to the standards; and the license-specific questions per standard (b)2c. Candidates

More information

Computer Apps for Careers (#5000)

Computer Apps for Careers (#5000) AASD BUSINESS CURRICULUM Computer Apps for Careers (#5000) Description Students will use a variety of software to create personal as well as business documents. The course will emphasize touch-keyboarding

More information

Lesson Plan. Graphic Design & Illustration

Lesson Plan. Graphic Design & Illustration Lesson Plan Course Title: Session Title: Graphic Design & Illustration Telling a Story: Introduction to Bézier Curves Lesson Duration: Approximately 7-10 days [Lesson length is subjective and will vary

More information

Lesson Plan. Approximate Time: If taught the way the lesson is written, it should take approximately 3 days.

Lesson Plan. Approximate Time: If taught the way the lesson is written, it should take approximately 3 days. Lesson Plan Course Title: Principles of Business, Marketing and Finance Session Title: Advertising to Targeted Audiences Performance Objective: Upon completion of this lesson, the student will be able

More information

Statewide Healthcare Curriculum: Technology Awareness and Skills Module

Statewide Healthcare Curriculum: Technology Awareness and Skills Module Statewide Healthcare Curriculum: Technology Awareness and Skills Module Introduction -------------------------------------------------------------------------------iii Module Outline -------------------------------------------------------------------------viii

More information

Lesson Plan. Financial Ratios Financial Analysis Finance. Performance Objective Students calculate financial ratios to evaluate company performance.

Lesson Plan. Financial Ratios Financial Analysis Finance. Performance Objective Students calculate financial ratios to evaluate company performance. Financial Ratios Financial Analysis Finance Lesson Plan Performance Objective Students calculate financial ratios to evaluate company performance. Specific Objective Discuss the use of financial ratios

More information

Quick Start Guide. www. K7Computing.com

Quick Start Guide. www. K7Computing.com Quick Start Guide Table of Contents Before you install the Product... 3 Installing the program... 3 Quick Installation... 4 Custom Installation... 4 Installation... 7 Activation... 8 Offline Activation...

More information

Meganmarie Pinkerton. Importance of Art in Education. Art 205

Meganmarie Pinkerton. Importance of Art in Education. Art 205 Pinkerton 0 Meganmarie Pinkerton Importance of Art in Education Art 205 30 November 2004 Pinkerton 1 I believe art education in music, theater, dance, and the visual arts, is one of the most creative ways

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE FLORIDA STATE COLLEGE AT JACKSONVILLE Form 2A, Page 1 COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2155 COURSE TITLE: Customer Support Operations PREREQUISITE(S): CGS 1060 or CGS 1100 COREQUISITE(S):

More information

Professional Education Matrix

Professional Education Matrix COURSE NUMBER AND TITLE KNOWLEDGE AND SKILLS All prospective teachers will complete studies in professional education. Professional education is a lifelong undertaking that is initiated in college course

More information

Graphic Design I GT Essential Goals and Objectives

Graphic Design I GT Essential Goals and Objectives Graphic Design I GT Essential Goals and Objectives COURSE DESCRIPTION: This academy was specifically designed to bridge the gap between a client s publication concept and the final printed product. The

More information

Multiple Intelligence

Multiple Intelligence Multiple Intelligence LuPe/LJ 2013 In the beginning There were no words éarlier was the great silence J.C. van Schagen LuPe/LJ 2013 Talent or Intelligence GHANDI MARTHA GRAHAM PICASSO EINSTEIN FREUD Multiple

More information

Days. Day 1. Reflection Teacher Responsibilities. Lesson Plans

Days. Day 1. Reflection Teacher Responsibilities. Lesson Plans Days Day 1 Lesson Plans Call the students to the carpet by the number of letters in their names. If your name has less than 5 letters, come to the carpet. If your name has more than 5 letters, come to

More information

Learning Styles and Aptitudes

Learning Styles and Aptitudes Learning Styles and Aptitudes Learning style is the ability to learn and to develop in some ways better than others. Each person has a natural way of learning. We all learn from listening, watching something

More information

Social Forces Human Development Learning and Learning Styles

Social Forces Human Development Learning and Learning Styles Social Forces Human Development Learning and Learning Styles Change in individual s knowledge or behavior that results from experience Types of learning Behavioral Cognitive Emphasize observable changes

More information

What's the difference between spyware and a virus? What is Scareware?

What's the difference between spyware and a virus? What is Scareware? What's the difference between spyware and a virus? What is Scareware? Spyware and viruses are both forms of unwanted or malicious software, sometimes called "malware." You can use Microsoft Security Essentials

More information

Vocabulary and Reading Comprehension. Robert Taggart

Vocabulary and Reading Comprehension. Robert Taggart Vocabulary and Reading Comprehension Robert Taggart Table of Contents To the Student......................................... v Unit 1: Vocabulary: Word Parts Lesson 1: Base Words....................................

More information

Business Information Management I

Business Information Management I Business Information Management I Texas 130.114 This document describes the correlation between curriculum, supplied by Applied Educational Systems, and the Business Information Management I standard,

More information

IMSA 1:1 Computing@IMSA AY10 Service and Support Summary Table of Contents

IMSA 1:1 Computing@IMSA AY10 Service and Support Summary Table of Contents AY1 Service and Support Summary Table of Contents Support Available... Communications:... Trends... Year in Summary... Service Requests processed for 9-1 School Year... Computer Hardware Issues:... Computer

More information

SPYWARE & MALWARE. ComputerFixed.co.uk Page: 1 Email: info@computerfixed.co.uk. How do you get infected? Will Anti-virus software protect me?

SPYWARE & MALWARE. ComputerFixed.co.uk Page: 1 Email: info@computerfixed.co.uk. How do you get infected? Will Anti-virus software protect me? ComputerFixed.co.uk Page: 1 Email: info@computerfixed.co.uk SPYWARE & MALWARE How do you get infected? You can get infected by malware (malicious Software) in several ways. Malware often comes bundled

More information

Lesson Plan. Preparation

Lesson Plan. Preparation Audio Video Production Graphic Manipulations Arts, Audio/Visual Technology, and Communications Lesson Plan Performance Objective Upon completion of this lesson, the student will develop an understanding

More information

Microsoft Security Essentials User Guide

Microsoft Security Essentials User Guide Microsoft Security Essentials User Guide Compiled and written by Le Roy Acres Web Services 2010 Foreward This is the first of numerous tutorials concerning some of the more basic maintenance routines that

More information

Raritan Valley Community College Academic Course Outline MUSC 190 - DIGITAL MUSIC COMPOSITION I

Raritan Valley Community College Academic Course Outline MUSC 190 - DIGITAL MUSIC COMPOSITION I Raritan Valley Community College Academic Course Outline I. Basic Course Information MUSC 190 - DIGITAL MUSIC COMPOSITION I A. Course Number and Title: MUSC 190: DIGITAL MUSIC COMPOSITION I B. New or Modified

More information

Days of the Week Grade Kindergarten

Days of the Week Grade Kindergarten History Ohio Standards Connection: Benchmark A Use a calendar to determine the day, week, month and year. Indicator 1 Recite the days of the week. Lesson Summary: The children will participate in a variety

More information

Frank Phillips College ITNW2305 Network Administration. Prerequisite and/or Co-requisite: BCIS1405 Advanced Microcomputer Applications

Frank Phillips College ITNW2305 Network Administration. Prerequisite and/or Co-requisite: BCIS1405 Advanced Microcomputer Applications Frank Phillips College ITNW2305 Network Administration I. General Course Information Stehanie Mooney Spring 2010 ITNW2305 Network Administration 3 Credit hours Prerequisite and/or Co-requisite: BCIS1405

More information

REQUIRED MATERIALS: I. COURSE OVERVIEW AND OUTLINE:

REQUIRED MATERIALS: I. COURSE OVERVIEW AND OUTLINE: Ms. Lockhart Phone Number (360) 874-5679 Room 202B ADVANCED PHOTOGRAPHY SYLLABUS COURSE DESCRIPTION: Builds upon skills learned in Introduction to Photography, includes camera techniques, photo analysis,

More information

Course/Program Credential(s): Credential Certificate Postsecondary Degree University Degree Other:

Course/Program Credential(s): Credential Certificate Postsecondary Degree University Degree Other: Course Title: Information Technology Fundamentals Unit: Computer Basics Content Standard(s) and 1. Distinguish between input and output devices, including monitor, keyboard, mouse, and scanner. 2. Utilize

More information

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i. New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New

More information

Science Rocks Grade Six

Science Rocks Grade Six Ohio Standards Connections: Earth and Space Sciences Benchmark D Identify that the lithosphere contains rocks and minerals and that minerals make up rocks. Describe how rocks and minerals are formed and/or

More information

Course Overview Name of Course: Child Care I Name of Department: Family and Consumer Science

Course Overview Name of Course: Child Care I Name of Department: Family and Consumer Science Course Overview Name of Course: Child Care I Name of Department: Family and Consumer Science The Child Care Career Program This is a three year program designed to give students interested in a career

More information

Learning how you Learn.

Learning how you Learn. Learning how you Learn. A guide to learning styles and the benefits of understanding yours You are a unique learner. No one else learns in exactly the same way you do. There are many benefits to discovering

More information

PROGRAM CONCENTRATION:

PROGRAM CONCENTRATION: Implementation date PROGRAM CONCENTRATION: Business & Computer Science CAREER PATHWAY: Administrative Information/Support COURSE TITLE: Business Communication and Presentation Course Description: The goal

More information

LESSON 7: LEARNING MODELS

LESSON 7: LEARNING MODELS LESSON 7: LEARNING MODELS INTRODUCTION mobility motivation persistence sociological Think about your favorite class. Does the teacher lecture? Do you do experiments or go on field trips? Does the teacher

More information

Tennessee Wesleyan College Math 131 C Syllabus Spring 2016

Tennessee Wesleyan College Math 131 C Syllabus Spring 2016 Tennessee Wesleyan College Math 131 C Syllabus Spring 2016 I. Course: College Algebra, M131 C Location: Durham 303 Days/Time: MWF 1100-1150 Credit hours: 3 II. III. IV. Instructor: Dr. David J. Ashe Office:

More information

Microsoft Security Essentials Installation and Configuration Guide

Microsoft Security Essentials Installation and Configuration Guide Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on

More information

BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy

BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy BYOD Policy 2016 Bring Your Own Device Acceptable Use Policy Approved by Leadership Team 27 th April 2016 Approved by the Governing Body: 18 th May 2016 Review Due: May 2017 Rationale The Beaconsfield

More information

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device)

Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Policy for Staff and Post 16 Student BYOD (Bring Your Own Device) Date approved: 7 th May 2015 Review Schedule: Annual Reviewed: Next review: 1 Context Aims of this Policy Definitions CONTENTS 1. OVERVIEW...

More information

ASSOCIATE OF APPLIED SCIENCE IN DIGITAL GRAPHIC DESIGN

ASSOCIATE OF APPLIED SCIENCE IN DIGITAL GRAPHIC DESIGN Program Overview In this online program students will focus on graphic design theory and techniques which can support a professional career as a graphic designer or graphic artist. Students will learn

More information

Seneca Valley Senior High School Cyber Teacher Center (across from the SHS Library on the 2 nd floor)

Seneca Valley Senior High School Cyber Teacher Center (across from the SHS Library on the 2 nd floor) Course Game Design Modding and Prototyping Faculty Name Mr. Ken Macek Term 2015-2016 Meetings IHS Library Gaming Room (semester course two 42 minute periods combined with online instruction) Faculty s

More information

RISKS OF SPYWARE. Lesson Procedures

RISKS OF SPYWARE. Lesson Procedures i-safe Lesson Plan Suggested Grade Levels Middle Grades RISKS OF SPYWARE Learning Objectives Students will: understand the term spyware and the types of programs it applies to understand the security risks

More information

Frank Phillips College. ITSY1391 Computer Forensics II

Frank Phillips College. ITSY1391 Computer Forensics II Frank Phillips College ITSY1391 Computer Forensics II I. General Course Information Stephanie Mooney Spring 2010 ITSY1391 Computer Forensics II 3 Credit hours Prerequisite and/or Co-requisite: ITSY2343

More information

Higher order questions encourages higher order thinking Based on Bloom s Taxonomy

Higher order questions encourages higher order thinking Based on Bloom s Taxonomy Higher order questions encourages higher order thinking Based on Bloom s Taxonomy Knowledge What happened after...? How many...? Who was it that...? Can you name the...? Describe what happened at...? Who

More information

Lesson Plan. Fashion Design Fashion Illustration Arts, AV, Technology, and Communication

Lesson Plan. Fashion Design Fashion Illustration Arts, AV, Technology, and Communication Fashion Design Fashion Illustration Arts, AV, Technology, and Communication Lesson Plan Performance Objective Upon completion of this lesson, the student will develop an understanding of fashion illustration

More information

Free and Legal Software You Can Download By Tom Krauser

Free and Legal Software You Can Download By Tom Krauser Free and Legal Software You Can Download By Tom Krauser Here is a list of free programs that you can download for your personal use. They are legal and free for you to install. Some may have restrictions

More information

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability

Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability Comprehensive i-safe Curriculum International Scope of Lessons and Language Availability The i-safe comprehensive curriculum provides a unique approach to Internet safety education, by meaningfully integrating

More information

Information Technology Fundamentals

Information Technology Fundamentals Information Technology Fundamentals Student Guide 37677-00 Edition 1 Ê>EcfèRÆ4#Ë 3037677000504 FIRST EDITION First Printing, April 2005 Copyright 2005 Lab-Volt Systems, Inc. All rights reserved. No part

More information

Meeting the Needs of Visual-Spatial Learners

Meeting the Needs of Visual-Spatial Learners Meeting the Needs of Visual-Spatial Learners Component 13 of the Competencies Collaboration SEVA Council of Gifted Administrators Table of Contents 1. Characteristics and strengths of visual spatial learners

More information

Could you use more resources to help you learn & retain info? Do you create your own study aids to ensure you learn the course content?

Could you use more resources to help you learn & retain info? Do you create your own study aids to ensure you learn the course content? STUDY AIDS STUDY AIDS Could you use more resources to help you learn & retain info? Do you create your own study aids to ensure you learn the course content? A student s use of study aids consists of having

More information

Credit: Pros and Cons

Credit: Pros and Cons Credit: Pros and Cons Unit: 05 Lesson: 02 Suggested Duration: 4 Days Lesson Synopsis: All economic operations depend on the flow of money and credit through the economy. The focus of this lesson is to

More information

Internet basics 2.3 Protecting your computer

Internet basics 2.3 Protecting your computer Basics Use this document with the glossary Beginner s guide to Internet basics 2.3 Protecting your computer How can I protect my computer? This activity will show you how to protect your computer from

More information

Music Standards FINAL. Approved on May 5, 2000. Copyright 2003 Texas State Board for Educator Certification

Music Standards FINAL. Approved on May 5, 2000. Copyright 2003 Texas State Board for Educator Certification Music Standards FINAL Approved on May 5, 2000 Copyright 2003 Texas State Board for Educator Certification MUSIC STANDARDS Standard I. Standard II. Standard III. Standard IV. Standard V. Standard VI. Standard

More information

HP Laptop & Apple ipads

HP Laptop & Apple ipads Shalom College Student 1:1 Laptop & ipad Program HP Laptop & Apple ipads Policy and Guidelines Booklet TABLE OF CONTENTS 1. Educational Opportunities of A 1 to 1 Laptop & ipad Program... 2 2. Overview

More information

1. Lecture by teacher (and what else can you do!) 2. Class discussion conducted by teacher (and what else!)

1. Lecture by teacher (and what else can you do!) 2. Class discussion conducted by teacher (and what else!) 150 Teaching Methods 1. Lecture by teacher (and what else can you do!) 2. Class discussion conducted by teacher (and what else!) 3. Recitation oral questions by teacher answered orally by students (then

More information

Goals for Preschool aged Children: (Compiled from several State Guidelines) Compilation by Narcissa Summerfield Language Community Goals

Goals for Preschool aged Children: (Compiled from several State Guidelines) Compilation by Narcissa Summerfield Language Community Goals Goals for Preschool aged Children: (Compiled from several State Guidelines) Compilation by Narcissa Summerfield Language Community Goals Interact appropriately in groups (taking turns talking or playing

More information

Lesson Plan Marketing Yourself

Lesson Plan Marketing Yourself Course Title: Marketing Lesson Plan Marketing Yourself Session Title: Marketing Yourself Performance Objective: Upon completion of this lesson, the student will explain the importance of marketing for

More information

TEEL 670, Workshop in Education II: CONTEMPORARY AMERICAN EDUCATION (Graduate Version) drdaniel@wildblue.net drdonnausa@gmail.com. Phone: 719.587.

TEEL 670, Workshop in Education II: CONTEMPORARY AMERICAN EDUCATION (Graduate Version) drdaniel@wildblue.net drdonnausa@gmail.com. Phone: 719.587. TEEL 670, Workshop in Education II: CONTEMPORARY AMERICAN EDUCATION (Graduate Version) Instructor of Record: Email: Dr. Elden Daniel Dr. Donna Rice (Alternate) drdaniel@wildblue.net drdonnausa@gmail.com

More information

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5 BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 5 08/25/2015 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective

More information

(collapse all) Current Version Print Email Requester(s)

(collapse all) Current Version Print Email Requester(s) Automated Course Approval System Return to Course List Accounting Systems - ACCT214 Proposal Type: Revision Current Version: View Proposal No MCO Available Requester(s): Rebecca Yedlin Zachary Smulski

More information

Presentation Notes End of Course Project Options Practicum in Culinary Arts Slide 1

Presentation Notes End of Course Project Options Practicum in Culinary Arts Slide 1 Practicum in Culinary Arts Slide 1 Practicum in Culinary Arts All students in this class will be required to complete an END OF COURSE PROJECT. This slide presentation will provide you with a variety of

More information

It is vital that you understand the rationale behind the correct answer(s) as wel as the incorrect answer options.

It is vital that you understand the rationale behind the correct answer(s) as wel as the incorrect answer options. Getting the Most out of ATI www.atitesting.com What is ATI? ATI is an online resource that will be used throughout the nursing program to help you learn about nursing practice as well as help prepare you

More information