0% found this document useful (0 votes)
34 views5 pages

Data Integrity

Uploaded by

sharn.lewis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views5 pages

Data Integrity

Uploaded by

sharn.lewis
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

SHARN LEWIS

SHARN LEWIS LESSON PLAN


[email protected]

Lesson Plan

SUBJECT Information Technology

DATE March 22- April 8 2024

GRADE 5T/N

Course Name Application and Implications of Information and Communications


Technology

Lesson/Unit Title Data Integrity and security


General Objective The student applies Data Integrity strategies
(A) The student is expected to Describe measures to secure
data.
(B) Students should develop expertise in the maintenance
of data integrity
Performance Objective:
Instructional Objectives
After completing this assignment, the student will be able to identify
and use appropriate terminology associated with data integrity.
Specific Objectives:

The student will be able to


Knowledge

● Explain data Integrity

● use appropriate terminology and notions commonly associated


with data integrity.
Skill

● Outline Measures to secure data

● Demonstrate software restrictions methods

● illustrate physical access restrictions of data


Affective
● Show an appreciation for the importance of restricting data
access and maintaining its integrity.

ST. THOMAS TECHNICAL HIGH SCHOOL 1 of 5


SHARN LEWIS

Rationale This lesson introduces students to the importance of securing data and
maintaining their integrity. Students will individually research different
measures to secure data and maintain data integrity.

Previous Knowledge Students should know what data and information. They should know what
viruses are. They should be able to work in groups.

Duration of Lesson 1 hours


Materials/Specialized Instructional Aids:
Equipment Needed ● Desktop, Laptop, Mobile phone or any computer devices that
promotes data integrity.

Materials Needed:
● Each student will need access to a computer device or any private
materials they want to secure
Equipment Needed:
● The instructor will need a computer connected to an interactive
white board or projector
● Multimedia; laptop; ActivitySheets.

● Students with a visual learning style would be separated also and


provided with a youtube video to further engage them in learning
about data integrity in hopes to meet the objectives of the lesson
link: https://www.youtube.com/watch?v=uSKdjjw5zow
Anticipatory Set
The instructor should begin by asking students to identify several pieces of
(May include pre-
technology that are used for data communication and their networks they
assessment for prior
use to connect to each other to share data.
knowledge)
As a class, students can brainstorm about current technology, and its
origins, as well as discuss how the growth and evolution of technology has
and will impact the industry regarding method in ensuring data integrity

Additionally, a youtube video will be displayed


https://www.youtube.com/watch?v=9qCfJv-zoyE to further exploit the idea
of securing measures to ensure data integrity.
Direct Instruction * Activity 1.
What is Data Integrity?
a) Why is it so important?
i) What Methods are there in securing data?
Software restrictions??

ST. THOMAS TECHNICAL HIGH SCHOOL 2 of 5


SHARN LEWIS

b) What is it?
c) What are they used for?
d) What are the types of software restrictions?
3) What are measures to ensure physical acess restrictions?
Activity 2
Define terminology
e) password
f) encryptions
g) virus protection
h) firewall
i) biometric system
j) guards
k) locks
l) backups and data recovery softwares
NOTE: For this lesson, the teacher will refer to the Teacher’s Directions
when introducing and completing the lesson with the students.
Guided Practice
Method and procedure *

Independent
Students will be provided with three different activities throughout the
Practice/Laboratory
lesson to ensure all objectives are met for data integrity measures.
Experience/Differentiate
d Activities *
Lesson Closure - Students will explain verbally in a discussion which would

ST. THOMAS TECHNICAL HIGH SCHOOL 3 of 5


SHARN LEWIS

emphasize the importance of securing data to ensure its integrity


- Students will take all the introduced information from the lesson
and use it to complete the Assessment.
- For students having a visual learning differentiated learning style
would use the video and PowerPoint provided to explore and meet
the lessons objectives.
- A quick Q&A with regards to the parameters of the assignment may
be used to check for understanding

Summative/End of Informal Assessment


Lesson Assessment *
Periodic checks for understanding are used as well as progress checks to
quantify the amount of research done and information gathered for the
completion of the spreadsheet material provided.
Formal Assessment
The project will be completed individually to check for understanding and
graded against the provided assessment task. Class evaluation and
discussion will also be used to allow students to compare their findings
against those of their peers.

References/Resources/ ● https://classroom.google.com/c/MzkwMjU2MTcxNjQy
Teacher Preparation
● https://cybersecuritychallenge.org.uk/wp-content/uploads/
2019/08/Lesson-Plan-Network-Topologies.pdf
YOUTUBE VIDEO LINK
● https://www.youtube.com/watch?v=9qCfJv-zoyE

Other Essential Lesson Components


Lesson Evaluation Exercises:
What is Data Integrity?
i) Why is it so important
ii) What Methods are there in securing data?
Software restrictions??
a. What is it?
b. What are they used for?
c. What are the types of software restrictions?
3) What are measures to ensure physical acess restrictions?
Define terminology
a) password
b) encryptions
c) virus protection
d) firewall
e) biometric system
f) guards

ST. THOMAS TECHNICAL HIGH SCHOOL 4 of 5


SHARN LEWIS

g) locks
h) backups and data recovery softwares
4)
a. Explain what is data integrity
b. List some of the ways that data could lose integrity
c. Create a chart showing the different methods of securing data.
d. Categorize the different methods of securing data as physical or software methods
e. Explain the procedures that secure and value the importance of data that has integrity.
f. Illustrate and recognize the importance of protecting data.

Enrichment Activity
After completing their research, students should be able to use the
(e.g., homework
appropriate terminologies associated with network and data
assignment)
communication and should acknowledge the impact that it can have on
Information Technology.
They should ask questions like

● “What does this do for society?”

● “How can I benefit from this?”

● “How is using networks different from what came before? “

● “What are the possibilities for the future in data communication?

Lesson Reflection

ST. THOMAS TECHNICAL HIGH SCHOOL 5 of 5

You might also like