Data Integrity
Data Integrity
Lesson Plan
GRADE 5T/N
Rationale This lesson introduces students to the importance of securing data and
maintaining their integrity. Students will individually research different
measures to secure data and maintain data integrity.
Previous Knowledge Students should know what data and information. They should know what
viruses are. They should be able to work in groups.
Materials Needed:
● Each student will need access to a computer device or any private
materials they want to secure
Equipment Needed:
● The instructor will need a computer connected to an interactive
white board or projector
● Multimedia; laptop; ActivitySheets.
b) What is it?
c) What are they used for?
d) What are the types of software restrictions?
3) What are measures to ensure physical acess restrictions?
Activity 2
Define terminology
e) password
f) encryptions
g) virus protection
h) firewall
i) biometric system
j) guards
k) locks
l) backups and data recovery softwares
NOTE: For this lesson, the teacher will refer to the Teacher’s Directions
when introducing and completing the lesson with the students.
Guided Practice
Method and procedure *
Independent
Students will be provided with three different activities throughout the
Practice/Laboratory
lesson to ensure all objectives are met for data integrity measures.
Experience/Differentiate
d Activities *
Lesson Closure - Students will explain verbally in a discussion which would
References/Resources/ ● https://classroom.google.com/c/MzkwMjU2MTcxNjQy
Teacher Preparation
● https://cybersecuritychallenge.org.uk/wp-content/uploads/
2019/08/Lesson-Plan-Network-Topologies.pdf
YOUTUBE VIDEO LINK
● https://www.youtube.com/watch?v=9qCfJv-zoyE
g) locks
h) backups and data recovery softwares
4)
a. Explain what is data integrity
b. List some of the ways that data could lose integrity
c. Create a chart showing the different methods of securing data.
d. Categorize the different methods of securing data as physical or software methods
e. Explain the procedures that secure and value the importance of data that has integrity.
f. Illustrate and recognize the importance of protecting data.
Enrichment Activity
After completing their research, students should be able to use the
(e.g., homework
appropriate terminologies associated with network and data
assignment)
communication and should acknowledge the impact that it can have on
Information Technology.
They should ask questions like
Lesson Reflection