Computer Studies - Junior Secondary 2 - Abuse and misuse of the computer

Abuse and misuse of the computer

Term: 1st Term

Week: 2

Class: Junior Secondary School 2

Age: 13 years

Duration: 40 minutes of 2 periods each

Date:

Subject:      Computer studies

Topic:-       Abuse and misuse of the computer

SPECIFIC OBJECTIVES: At the end of the lesson, pupils should be able to

  1. Define computer abuse
  2. List and explain ways computer could be abused and misused

INSTRUCTIONAL TECHNIQUES: Identification, explanation, questions and answers, demonstration, videos from source

INSTRUCTIONAL MATERIALS: Videos, loud speaker, textbook, pictures

INSTRUCTIONAL PROCEDURES

PERIOD 1-2

PRESENTATION

TEACHER’S ACTIVITY

STUDENT’S ACTIVITY

STEP 1

INTRODUCTION

The teacher revises the previous lesson on responsible uses of the computer and internet

Students pay attention

STEP 2

EXPLANATION

She defines computer abuse

 

Students pay attention and participates

STEP 3

DEMONSTRATION

She lists and explains ways the computer could be abused and misused

Students pay attention and participate

STEP 4

NOTE TAKING

The teacher writes a summarized note on the board

The students copy the note in their books

 

NOTE

ABUSE AND MISUSE OF THE COMPUTER AND INTERNET

Computer Abuse is the term use for using the computer to carry out improper and illegal activities to cause harm to somebody else or their properties.

AREAS OF ABUSES AND MISUSE OF COMPUTER AND INTERNET 

  1. PIRACY – is the act of illegal copying or downloading copyright materials such as movies, musicØ and software whose right belongs to someone else.
  2. ONLINE HACKERS – they inject viruses with the intention to cause extreme damage to otherØ people systems, they usually breach the internet security.
  3. SCAM - unwanted messages like fake job advertisements etcØ
  4. MALWARE – is a combination of the words malicious and software. They are harmful software used to damage or make computer unusable.
  5. PLAGIARISM – stealing a person’s ideas or writing especially software programs.
  6. JUNK EMAILS – unwanted emails that mostly have virus attached to them.
  7. PHISHING – is the attempt to obtain sensitive information such as username, passwords, and credit card details.
  8. INVASION OF PRIVACY –people’s privacy and confidentiality are no longer guarantee.
  9. COMPUTER FRAUD – using the computer to defraud people, companies or organizations ofØ money, revenue etc
  10. PORNOGRAPHY – exposing youths to immoral acts.

EVALUATION:    1. Define computer abuse

  1. List and explain five ways the computer could be                    abused and misused

CLASSWORK: As in evaluation

CONCLUSION: The teacher commends the students positively