Computing Week 10 TM 3

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

THE FLOBAR SCHOOL

COMPUTING WEEK TEN SCHEME OF LEARNING – GRADE FOUR

WEEK ENDING: FRIDAY, 5th July, 2024. PERIOD: Two.


DURATION: REFERENCES: Strand 3: Word processing
Two Hours. • Computing curriculum book
(NACCA).
• Essential Computing EBook.
CLASS SIZE: Sub-strand 1: Introduction to word processing (Tabs and ribbons of
Forty- four. word processing)

Content Indicator: B4.3.1.1.2 Illustrate LESSONS:


standard: the use of the commands on the
B4.3.1.1 Home tab Demonstrate how to use the Fonts group on the Home tab.
Demonstrate
understanding Demonstrate how to use the Paragraph group on the Home tab.
of the use of
word
processing
application.
PERFORMANCE INDICATORS: CORE COMPETENCES:
• Creativity and Innovation.
• learners will be able to create a new
• Communication and Collaboration.
document and use the commands in the
Home tab. • Cultural identity and Global citizenship.
• and use the commands in the Home tab
• Personal development and Leadership.

• Digital literacy.

TEACHING AND LEARNING MATERIALS: computer set.


KEYWORDS: : serif, sans serif, script, decorative
PHASE 1: STARTER PHASE 2: MAIN (New Learning including PHASE 3: REFLECTION/
DAYS Introduction (Preparing the Assessment and Lesson Development). PLENARY (Learner and
brain for learning). Teacher).

Start of task Recap the scenario described in the Ask the learners to work in
Ask the learners to discuss what worksheet and support learners to carry pairs to evaluate their own
they understood from their out the tasks in the worksheet. • In this set work (self-evaluation) only in
MONDAY peer-evaluations from the of tasks, task 10 should focus more on this task using the evaluation
previous task and how they executing the hand-drawn plan from the worksheet. Ask the learners
intended to progress in today’s previous task. Learners should use their how they wish to proceed in
task computers in this task. • If you notice that the next task.
many learners are struggling with any
aspect of the work, stop to intervene and
explain that section again for clarification
purposes.
Start of task Recap the scenario described in the End of task
Ask the learners to discuss what worksheet and support learners to carry
WEDNESDAY they understood from their self- out the tasks in the worksheet. Ask the learners to work in
evaluations from the previous • In this set of tasks, Task 11 should focus pairs to evaluate their peer’s
task and how they intended to more on executing the hand-drawn plan work (peer-evaluation) only
progress in today’s task from the previous task. Learners should use in this task using the
their computers in this task. evaluation worksheet. Ask
• If you notice that many learners are the learners how they wish
struggling with any aspect of the work, stop to proceed in the next task.
to intervene and explain that section again
for clarification purposes.
THE FLOBAR SCHOOL

COMPUTING WEEK TEN SCHEME OF LEARNING – GRADE FIVE

WEEK ENDING: FRIDAY, 5th July, 2024. PERIOD: Two.


DURATION: REFERENCE: STRAND 6:
Two Hours. • Computing curriculum
book (NACCA). Internet and social media
• Essential Computing
EBook.
CLASS SIZE: Thirty-six. Sub-strand: 8. Digital literacy

CONTENT INDICATORS LESSONS: Discuss various techniques in online protection from online
STANDARD: B5.6.9.1.2 Discuss various identity theft
B5.6.9.1 techniques in online Discuss various techniques in online protection from online identity theft
Demonstrate protection from online
proficiency in identity theft.
digital literacy. B5.6.9.1.2 Discuss various
techniques in online
protection from online
identity theft.
PERFORMANCE INDICATORS: CORE COMPETENCES:
learners will be able to discuss some • Creativity and innovation
techniques in online protection from online • Communication and collaboration
identity theft. • Cultural identity and global citizenship
learners will be able to discuss various • Personal development and leadership
techniques in online protection from online • Digital literacy
identity theft.
learners will be able to confidently discuss
various techniques in online protection
from online identity theft.
TEACHING AND LEARNING MATERIALS: keyboard, mouse, computer set.
KEYWORDS: identity theft, phishing, anti-virus software, malware, pass codes, Virtual Private Network (VPN), two-factor
authentication, manage privacy
PHASE 1: STARTER PHASE 2: MAIN (New Learning PHASE 3: REFLECTION/ PLENARY
DAYS Introduction (Preparing the including Assessment and Lesson (Learner and Teacher).
brain for learning). Development).
Start of task Main End of task
Ask each group to create an
MONDAY Discuss what identity theft is. information poster to explain the Recap learners’ interpretations of
contents of their part of the article. Ask learners to list five steps they
They can use the Learner’s Book and intend to take to ensure they are
the internet for further research safe form identity theft online
lists the criteria that the posters
should fulfil. Explain that the groups
will have a chance to explain their
posters to the class in the next task.
Allow learners to create their posters
during this task and to explain their
posters to the whole class in the next
task.

Start of task End of task


Let the groups take turns to present
Set up the room for groups and explain their posters to the rest of ask learners to complete the Task
to explain their posters, the class. 40 Assessment Sheet.pdf to self-
which they prepared in the assess their work in this task. .
THURSDAY previous task
THE FLOBAR SCHOOL

COMPUTING WEEK TEN SCHEME OF LEARNING – GRADE SIX

WEEK ENDING: FRIDAY, 5th July, 2024. PERIOD: Two.


DURATION: REFERENCE: STRAND:
Two Hours. • Computing curriculum
book (NACCA). Internet and social media
• Essential Computing
EBook.
CLASS SIZE: Sub-strand 8: Digital literacy
Thirty-six.
CONTENT INDICATORS: LESSONS:
STANDARD: B6.6.9.1.1 Demonstrate
B6.6.9.1 how to handle private and Demonstrate how to handle private and personal information
Demonstrate personal information.
proficiency in : B6.6.9.1.2 Devise various
digital literacy techniques on how to
protect oneself from online
identity theft.
PERFORMANCE INDICATORS: CORE COMPETENCES:
• ALL learners will be able to demonstrate • 1. Creativity and innovation
how to handle private information. • 2. Communication and collaboration
• learners will be able to demonstrate how to • 3. Cultural identity and global citizenship
handle personal information. • 4. Personal development and leadership
• learners will be able to demonstrate how to • 5. Digital literacy.
handle private and personal information.
TEACHING AND LEARNING MATERIALS: keyboard, mouse, computer set.
KEYWORDS: private information, personal information
PHASE 1: STARTER PHASE 2: MAIN (New Learning including PHASE 3: REFLECTION/ PLENARY
DAYS Introduction (Preparing the Assessment and Lesson Development). (Learner and Teacher).
brain for learning).
End of task
Start of task Main Learners complete these
Learners work in pairs and do the statements:
Ask learners to write 10 following: • A reasonably good definition of
pieces of information about • Compare their lists and discuss why personal information is …
MONDAY themselves, such as address, they placed certain pieces of • A reasonably good definition of
names, contact details, information in each category. private information is … .
medical history, financial • Decide on which category they should
status, hobbies, family place information that they had
information, etc. and then categorised differently.
categorise the information • Suggest reasons why: a) some types of
information should not be made public,
they listed into two groups: giving examples b) some types of
Personal and Private information should only be private,
giving examples.

Start of task End of task


Learners work in pairs to create an
Show learners the posters on advice leaflet for learners in Basic 5 on Let learners complete the
the CD to use as inspiration how to protect themselves from online sentence: “The most important
and for ideas about what to identity theft. Give them the evaluation thing to keep safe from online
place in their advice leaflets criteria before they begin the task. identity theft is
THURSDAY segment. .

You might also like