Lesson Notes By Weeks and Term - Primary 5

Wages and income + Identification of different security information

Term: 2nd Term

Week: 8

Class: Primary 5

Age: 10 years

Duration: 40 minutes of 3 periods

Date:

Subject: National Values Education

Topic:- Wages and income

Identification of different security information

SPECIFIC OBJECTIVES: At the end of the lesson, pupils should be able to

  1. Explain concept of wages
  2. Describe concept of Salary
  3. State why some people earn higher salaries than others
  4. Identify more Security Information
  5. Examine the Functions of the mentioned security information.

INSTRUCTIONAL TECHNIQUES: Identification, explanation, playway method, questions and answers, demonstration, videos from source

INSTRUCTIONAL MATERIALS: family photos, pictures and charts showing a Nuclear and Extended Family

INSTRUCTIONAL PROCEDURES

PERIOD 1: Wages and income

PRESENTATION

TEACHER’S ACTIVITY

PUPIL’S ACTIVITY

STEP 1

INTRODUCTION

The Teacher revises the previous topic on Employment and Introduces Wages and Income.

Wages and Salary are the money given to a person after working.

 

WAGES- is the money that is paid regularly(hourly, daily, weekly) for doing work While

 

SALARY- is the Money that is paid monthly to a worker for doing work.

Pupils pay attention

STEP 2

EXPLANATION

She Explain that Employment is the state of having a Job. It is the work you do for which you are paid.

 

Unemployment- is the state of not having a Job or not being employed.

 

Under-Employment: is when a person is over qualified for the Job he/she is doing. For example an Engineer who accepts to be a primary school teacher

 

She Explains Why Some People Earn Higher Salaries Than Others

1. Level Of qualification

2. The Value Of Service

3. Negotiation Skill

4. Gender

5. Trade Union Support

6. Employer and employee Relationship

7. Amount and the quantity of workdone.

Pupils pay attention and participates

STEP 3

DEMONSTRATION

Some Actions Taken by Workers That Feels They Are Underpaid

1. They go on strike

2. Some will quit their Job

3. They may petition the authorities

4. Demonstration protest

5. They may dialogue with the authorities

Pupils pay attention and participate

STEP 4

NOTE TAKING

The teacher writes a short note on the board

The pupils write the notes in their books

 

NOTE

Wages and Salary are the money given to a person after working.

 

WAGES- is the money that is paid regularly (hourly, daily, weekly) for doing work

While

SALARY- is the Money that is paid monthly to a worker for doing work.

 

Employment is the state of having a Job. It is the work you do for which you are paid.

 

Unemployment- is the state of not having a Job or not being employed.

 

Under-Employment: is when a person is over qualified for the Job he/she is doing. For example an Engineer who accepts to be a primary school teacher

 

Why Some People Earn Higher Salaries Than Others

  1. Level Of qualification
  2. The Value Of Service
  3. Negotiation Skill
  4. Gender
  5. Trade Union Support
  6. Employer and employee Relationship
  7. Amount and the quantity of work done.

 

Actions Taken by Workers That Feels They Are Underpaid

  1. They go on strike
  2. Some will quit their Job
  3. They may petition the authorities
  4. Demonstration protest
  5. They may dialogue with the authorities

 

EVALUATION:    1. Differentiate between wages and Salary

  1. Mention 3 Reason why some people earn higher salaries than others
  2. List 3 actions taken by workers that feel they are underpaid.

CLASSWORK: As in evaluation

CONCLUSION: The teacher commends the pupils positively

 

PERIOD 2 and 3: Identification of different security information

PRESENTATION

TEACHER’S ACTIVITY

PUPIL’S ACTIVITY

STEP 1

INTRODUCTION

The teacher revisits the previous lesson

 

Pupils pay attention

STEP 2

EXPLANATION

She Explains that Information Security is the protection of electronic information from unauthorized activities.

Examples of Information Security are password, passcode, etc.

Examples Of Information Security

1. Fingerprint- This is a finger recognition that confirm individual identity using their thumb.

 

2. Face Scanner- This is a facial recognition that confirms individual identity using their face.

 

3. Eye Scanner- This is a eye recognition that confirm individual identity using their eyeball

 

4. Authentication- This is an additional code or pin used immediately after other password or passcode. It is used to add confirm identity of the user.

 

She gives the Functions Of Information Security

1. It increases accountability

2. It foster a culture of empowerment and improvement

3. It demonstrates a consistent information security.

Pupils pay attention and participates

STEP 3

DEMONSTRATION

She explains further the functions of Information security

4. It improves security capacity and capability

5. It guarantee good Governance and organization engagement

6. It foster a culture of empowerment and improvement

Pupils pay attention and participate

STEP 4

NOTE TAKING

The teacher writes a short note on the board

The pupils copy the note in their books

 

NOTE

Information Security is the protection of electronic information from unauthorized activities.

 

Examples of Information Security are password, passcode, etc.

 

Examples Of Information Security

  1. Fingerprint- This is a finger recognition that confirm individual identity using their thumb.

 

  1. Face Scanner- This is a facial recognition that confirm individual identity using their face.

 

  1. Eye Scanner- This is a eye recognition that confirm individual identity using their eyeball

 

  1. Authentication- This is an additional code or pin used immediately after other password or passcode. It is used to confirm the identity of the user.

 

Functions Of Information Security

  1. It increases accountability
  2. It foster a culture of empowerment and improvement
  3. It demonstrates a consistent information security.
  4. It improves security capacity and capability
  5. It guarantee good Governance and organization engagement
  6. It fosters a culture of empowerment and improvement.

 

EVALUATION:    1. List 5 explain 5 types of information security

  1. State 3 function of Information Security.

CLASSWORK: As in evaluation

CONCLUSION: The teacher commends the pupils positively



© Lesson Notes All Rights Reserved 2023