model instruction plan - houston independent school ... · • projector for teacher computer...

24
IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved. Lesson Plan Course Title: Principles of IT Session Title: Networks and Hackers Lesson Duration: Lesson length is subjective and will vary from instructor to instructor. Performance Objective: Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers. Specific Objectives: By the end of this lesson, students will be able to Define a computer system Identify the parts of a network Create a network with the following components: Workstation, Server, Modem, Hub, Switch, and Routers. Define the types of networks including Peer-to-Peer and Client Server (Ethernet, Token Ring, LAN, WAN) Identify the different types of operating systems Identify hackers and common security threats Preparation TEKS Correlations: §130.272 Principles of Information Technology: (8) The student analyzes network systems. The student is expected to (A) identify hardware associated with telecommunications and data networking such as servers, routers, switches, hubs, and network connectors; (B) identify and describe various types of networks such as peer-to-peer, local area networks, wide area networks, wireless token ring, and Ethernet; (C) identify and describe functions of network operating systems. Instructor/Trainer

Upload: others

Post on 11-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

Lesson Plan

Course Title: Principles of IT

Session Title: Networks and Hackers

Lesson Duration: Lesson length is subjective and will vary from instructor to instructor.

Performance Objective:

Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers.

Specific Objectives: By the end of this lesson, students will be able to

Define a computer system

Identify the parts of a network Create a network with the following components: Workstation, Server, Modem, Hub,

Switch, and Routers. Define the types of networks including Peer-to-Peer and Client Server (Ethernet, Token

Ring, LAN, WAN)

Identify the different types of operating systems Identify hackers and common security threats

Preparation

TEKS Correlations: §130.272 Principles of Information Technology:

(8) The student analyzes network systems. The student is expected to

(A) identify hardware associated with telecommunications and data networking such

as servers, routers, switches, hubs, and network connectors; (B) identify and describe various types of networks such as peer-to-peer, local area

networks, wide area networks, wireless token ring, and Ethernet; (C) identify and describe functions of network operating systems.

Instructor/Trainer

Page 2: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

Instructional Aids:

• Networks and Hackers Presentation

• HANDOUT: Networks and Hackers Notes for the Presentation

• HANDOUT: Lab Assignment and Key; Quiz and Key

Materials Needed:

• Instructional aids

• Paper for students to draw on

• Color pencils, markers, and/or crayons to draw with

• Flash cards for students to create review materials

Equipment Needed:

• Projector for teacher computer

Learner

• This is an introduction on networks and hackers for students. No previous knowledge is needed.

Introduction

MI

Introduction (LSI Quadrant I):

SAY, “How many of you have ever logged onto a computer at school, the

library, or a home office with more than one computer?” ASK, “Have you ever wondered how it all works?”

Outline

MI

Outline (LSI Quadrant II): Teachers can use the

Networks and Hackers Presentation and Handout and Lab.

Instructor Notes:

I. Hand out the Teen Hacker Article Handout to the students to read.

I. Hand out this article for the students to read for homework ahead of this lesson.

II. Hand out the Networks and Hackers Notes Handout or advise students to take notes during the presentation.

II. Hand out copies of the Network and Hacker Notes to each student, or you can advise each student to get ready to take notes.

Page 3: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

III. Show the presentation, which covers the following concepts:

a. Computer system b. Parts of a network

I. Workstation ii. Server Iii. Modem iv. Hub V. Switch vi. Router

C. Types of networks I. Peer-to-peer ii. Client server

1. Ethernet 2. Token ring 3. Lan 4. Wan

d. Operating systems e. Hackers F. Security threats

III. Students should be taking notes as you are showing the Networks and Hackers Presentation.

IV. Hand out the Lab Assignment to students. They will create diagrams of the networks based on seniors listed.

IV. Students should draw out 3 different types of networks listed on the Lab Assignment. Have them create a legend for the different parts of the network they are trying to draw – like a box with the word Router for a router.

V. Work through the SOHO portion of the lab together – the key listed is one of many solutions.

VI. Work through the SOHO setup as a class so that students understand what you are looking for.

VII. Student groups need to finish up the Lab Assignment.

V. Divide students into groups of two or three. Have them complete the Lab Assignment for the small office and world wide company.

Page 4: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

VIII. Review for Networks and Hackers Quiz VI. After completion of the lab, have students create flash cards of the important terms to study for the quiz.

Application

MI Guided Practice (LSI Quadrant III):

Do the SOHO portion of the lab as a class.

MI Independent Practice (LSI Quadrant III):

Hand out the Lab Assignment. Divide students into groups of two or three. Have each group work together on the following…

SAY, “Students, now that you see how we have set up a SOHO, see if you and a partner can come up with one possible solution to the rest of the problems on the Lab Assignment.”

Summary

MI Review (LSI Quadrants I and IV):

SAY, “Now that we have a good understanding about Networks, we need to study for our quiz. In your groups, each of you needs to create your own set of flash cards to study. Work together as a group to make sure that you do not miss any important concepts or terms. I will need to review these to make sure that I feel you are not missing anything. I would also draw out our SOHO example so that you do not forget it later.”

Evaluation

MI Informal Assessment (LSI Quadrant III):

Page 5: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

• Teacher checks for understanding while going through the SOHO portion

of the lab as a class.

• Review of student-created flash cards

MI Formal Assessment (LSI Quadrant III, IV):

• Completion of the rest of the Lab Assignment done in groups.

• Networks and Hackers Quiz

Page 6: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

Icon

MI

Teaching Strategies Personal Development

Strategies

Verbal/ Linguistic

Lecture, discussion, journal writing, cooperative learning, word origins

Reading, highlighting, outlining, teaching others, reciting information

Logical/ Mathematical

Problem solving, number games, critical thinking, classifying and organizing, Socratic questioning

Organizing material logically, explaining things sequentially, finding patterns, developing systems, outlining, charting, graphing, analyzing information

Visual/Spatial

Mind-mapping, reflective time, graphic organizers, color-coding systems, drawings, designs, video, DVD, charts, maps

Developing graphic organizers, mind- mapping, charting, graphing, organizing with color, mental imagery (drawing in the mind’s eye)

Musical/ Rhythmic

Use music, compose songs or raps, use musical language or metaphors

Creating rhythms out of words, creating rhythms with instruments, playing an instrument, putting words to existing songs

Bodily/ Kinesthetic

Use manipulatives, hand signals, pantomime, real life situations, puzzles and board games, activities, role- playing, action problems

Moving while learning, pacing while reciting, acting out scripts of material, designing games, moving fingers under words while reading

Intrapersonal

Reflective teaching, interviews, reflective listening, KWL charts

Reflecting on personal meaning of information, studying in quiet settings, imagining experiments, visualizing information, journaling

Interpersonal

Cooperative learning, role- playing, group brainstorming, cross-cultural interactions

Studying in a group, discussing information, using flash cards with other, teaching others

Naturalist Natural objects as manipulatives and as background for learning

Connecting with nature, forming study groups with like-minded people

Existentialist

Socratic questions, real life situations, global problems/questions

Considering personal relationship to larger context

Page 7: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

Student Name:

Date:

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

Networks and Hackers Notes:

Computer System • A basic computer system is made up of two parts:

(physical equipment that you can touch), and

(programs installed on the computer).

Computer Networks • Computer Networks allow users to over distances. They allow

, , and

, making them a necessary tool for

offices, schools, and homes all over the world. A computer network consists of

several , each of which is important to making

the network function correctly as a whole.

Network: Parts of a Network

Workstations • These are known as . The computer you use at

home or school would be called a workstation in a network.

Servers • Servers can look like desktop computers; however, most do not look like your “normal”

computer. Servers do not really need ,

and . What they really need is hard drives. In most

schools, when you save your work, you are saving to a server. By doing this, you can

access your schoolwork from any computer that is on your school network.

Modems • A modem is a device that enables computers to

they receive from a network or send data in the proper form along a network.

Hubs • A hub is sort of like a car radio. Every computer that has that section of network (like a

radio station) can hear that is being transmitted. All

the computers that are connected to that hub receive all the information that goes

through it. Usually, if you have a hub, you also have a .

Page 8: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

Student Name:

Date:

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

Switches • A switch is more complex than a hub and works a lot like a two-way radio. In a room full

of people, only the person holding the other radio can hear what is being said. It keeps

track of which computers are where, and when something comes in, it sends it only to

that --not every computer on that section of the network.

It is more secure than a hub and faster than a hub, but not as powerful as a router.

Routers

• Routers work a lot like a . Each computer is

given its own unique number by the router. When information comes into the router, it is

sent along to the correct number, or in this case, .

• There are more options built into routers than there are available to switches. A router

can have the equivalent phone options of and

. This is beyond a switch’s capabilities.

Peer- to- Peer Network • This is a type of network where the computers in the network share

among each other.

• Every computer on this network is ; all the computers run the

same , and

for sharing.

• , , and other

are shared by the machine they are

plugged into, otherwise known as managed by.

Advantages

• It is to set up a peer-to-peer network initially.

• You may already own the needed to get a peer-to-peer network setup.

• This type of network does not require the installation of dedicated

or expensive security software.

Page 9: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

Student Name:

Date:

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

Disadvantages • If you have a peer-to-peer network, you need to be aware that

, such as printers, place a special demand

on the in the network.

• Also, due to the nature of this type of network, all of the computers on the

network provide access to all of the machine’s resources. The down side of this is

that you can unintentionally expose

to all the other users on the network.

• There is also no or

from hackers, viruses, etc.

Peer-to-Peer Operating Systems • In the peer-to-peer network operating system, each workstation has an operating

system that tells them how to and

with each other.

• Name some software packages that allow this type of network:

Client Server Networks

Ethernet • Ethernet is a type of

basis of most LANs.

between computers that forms the

• It also serves as one of the main methods for connecting a computer or network to an

.

• The origin of Ethernet was the idea of connecting several computers together in a

network via ; since that time, it

has evolved into a much more sophisticated system that uses specialized

that connect to a central hub or

router to network several computers together.

Page 10: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

Student Name:

Date:

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

LAN • LAN stands for

.

• A local area network is a group of computers that are

together that share internet access, file access, applications, storage, and allow

computers to share printers and scanners.

LAN Issues

• For a LAN to work properly, a

must be installed on the

primary computer that is connected to the internet. Each computer connected to the LAN

must have an installed.

• The other issue with a LAN is that they are usually confined in a

.

WAN • WAN stands for

.

• A WAN is a collection of regular

that are all interconnected to form one .

Oftentimes, schools and even large companies will operate a WAN on premises.

Advantages • : School networks can be created

for students to access files throughout the school district.

• : Networks speed up the file sharing and

saving process.

Disadvantages • : WANs save money over

time, but they are expensive to set up at first.

• : WANs require maintenance of the network, which costs both money and time.

Token Rings • Token rings work by sending data from one machine to the next around a

until it ends up back where it started.

Page 11: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

Student Name:

Date:

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

• It also uses a special token passing protocol, which means that a machine can only

use the network when it has control of the . This ensures that there

are no collisions because only one machine can use the network at any given time.

Token Ring Issues • In order for token rings to work,

• all computers must check for or

tokens.

• all connected computers must “ ”

a new leader to a new token.

Client/Server Operating Systems • Client/Server setup allows the network to centralize functions and applications in

or file server.

• File servers become the “ ” of this

system and provide to files and resources, as

well as providing security.

• Workstations have to the resources to files

on the file servers.

Client/Server Operating Systems • There are many different kinds of software out there for this type of network. Name

some of the most popular ones.

Advantages • This type of network makes it easy to install

and .

• The server can be remotely, and you can have both non-PCs and PCs on the network.

• Client/Server operating systems

Page 12: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

Student Name:

Date:

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

Disadvantages: • Client/Servers depend on their servers. When they go down, the

will no longer work.

• There is a hefty for a client/server network. It pays off in the long run, but it requires money to set it up.

• Large networks will require to

maintain a client/server network and to work out the “kinks” when problems

arise.

Network Threats

Hackers • A computer hacker is someone who finds in a computer’s

security system to break into another machine.

• Hackers usually collect information on the target computer and then try to find

into the computer system.

Security Threats • The most common threats are

• : this is unwanted commercial e-mail.

• : can cause your computer to slow down or

even destroy your hard drive.

• : this is software that gets installed on the

computer. It can cause annoying pop-ups or even steal information.

Hackers

• : hackers steal important information: client information, bank account numbers, etc.

• Networks can take steps to protect their networks. The most common are

Page 13: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

Student Name:

Date:

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

Networks and Hackers Notes: KEY

Computer System • A basic computer system is made up of two parts: hardware (physical equipment that

you can touch) and software (programs installed on the computer).

Computer Networks • Computer networks allow users to connect over distances. They allow file sharing,

hardware sharing, and instant communication, making them a necessary tool for offices, schools, and homes all over the world. A computer network consists of several components, each of which is important to making the network function correctly as a whole.

Network: Parts of a Network

Workstations • These are known as desktop computers. The computer you use at home or school

would be called a workstation in a network.

Servers • Servers can look like desktop computers; however, most do not look like your “normal”

computer. Servers do not really need monitors, graphics, and sound cards. What they really need is hard drives. In most schools, when you save your work, you are saving to a server. By doing this, you can access your schoolwork from any computer that is on your school network.

Modems • A modem is a device that enables computers to interpret data they receive from a

network or send data in the proper form along a network.

Hubs • A hub is sort of like a car radio. Every computer that has that section of network (like a

radio station) can hear everything that is being transmitted. All the computers that are connected to that hub receive all the information that goes through it. Usually, if you have a hub, you also have a router.

Switches • A switch is more complex than a hub and works a lot like a two-way radio. In a room full

of people, only the person holding the other radio can hear what is being said. It keeps track of which computers are where, and when something comes in, it sends it only to that specific computer, not every computer on that section of the network. It is more secure than a hub and faster than a hub, but it is not as powerful as a router.

Routers • Routers work a lot like a telephone system. Each computer is given its own unique

number by the router. When information comes into the router, it is then sent along to the correct number, or in this case, computer.

Page 14: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

Student Name:

Date:

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

• There are more options built into routers than there are available to switches. A router can have the equivalent phone options of call screening and caller ID. This is beyond a switch’s capabilities.

Peer-to-Peer Network • This is a type of network where the computers in the network share resources among

each other.

• Every computer on this network is equal; all the computers run the same networking software and file systems for sharing.

• Printers, scanners, and other external devices are shared by the machine they

are plugged into, otherwise known as managed by.

Advantages • It is less expensive to set up a peer-to-peer network initially.

• You may already own the software needed to get a peer-to-peer network setup.

• This type of network does not require the installation of dedicated server hardware or expensive security software.

Disadvantages • If you have a peer-to-peer network, you need to be aware that shared

resources, such as printers, place a special demand on the computers in the network.

• Also, due to the nature of this type of network, all of the computers on the network provide access to all of the machine’s resources. The down side of this is that you can unintentionally expose private files to all the other users on the network.

• There is also no data security or protection from hackers, viruses, etc.

Peer-to-Peer Operating Systems • In the peer-to-peer network operating system, each workstation has an operating

system that tells them how to store and share resources with each other.

• There are software packages that allow this type of network.

*Note: Identify and discuss in class.

Client Server Networks

Ethernet • Ethernet is a type of connection between computers that forms the basis of most LANs.

• It also serves as one of the main methods for connecting a computer or network to an Internet hub.

• The origin of Ethernet was the idea of connecting several computers together in a

network via coaxial cables; since that time, it has evolved into a much more

Page 15: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

Student Name:

Date:

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

LAN

sophisticated system that uses specialized Ethernet cables that connect to a central

hub or router in order to network several computers together.

• LAN stands for Local Area Network.

• A local area network is a group of computers that are linked together that share internet access, file access, applications, storage, and allow connected computers to share printers and scanners.

LAN Issues • For a LAN to work properly, a router must be installed on the primary computer that is

connected to the internet. Each computer connected to the LAN must have an Ethernet card installed.

• The other issue with a LAN is that they are usually confined in a single building.

WAN • WAN stands for Wide Area Networks.

• A WAN is a collection of regular local area networks that are all interconnected to form one giant network. Oftentimes, schools and even large companies will operate a WAN on premises.

Advantages • Flexible Access: School networks can be created for students to access files

throughout the school district.

• Speed: Networks speed up the file sharing and saving process.

Disadvantages • Expensive to Install: WANs save money over time, but they are expensive to

set up at first.

• Time: WANs require maintenance of the network, which costs both money

and time.

Token Rings • Token rings work by sending data from one machine to the next and so on around a

ring until it ends up back where it started.

• It also uses a special token passing protocol, which means that a machine can only use the network when it has control of the token; this ensures that there are no collisions because only one machine can use the network at any given time.

Token Ring Issues • In order for token rings to work,

• All computers must check for lost or duplicate tokens.

• All connected computers must “vote” a new leader to create a new token.

Page 16: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

Student Name:

Date:

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

Client/Server Operating Systems • Client/Server setup allows the network to centralize functions and applications in one or

more file server.

• File servers become the “heart” of this system and provide access to files and

resources, as well as providing security.

• Workstations have access to the resources to files on the file servers.

Client/Server Operating Systems • There are many different kinds of software out there for this type of network. Name

some of the most popular ones. (*Note: Discuss this in class)

___________________________________________________________________

Advantages • This type of network makes it easy to install new technology and new

elements.

• The server can be accessed remotely, and you can have both non-PCs and PCs

on the network.

• Client/Server Operating Systems

Disadvantages • Client/Servers depend on their servers. When they go down, the network will no

longer work.

• There is a hefty investment for a client/server network. It pays off in the long run,

but it requires money to set it up.

• Large networks will require dedicated staff to maintain a client/server network

and to work out the “kinks” when problems arise.

Network Threats

Hackers • A computer hacker is someone who finds access in a computer’s security system to

break into another machine.

• Hackers usually collect information on the target computer and then try to find access into the computer system.

Security Threats • The most common threats are

Page 17: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

Student Name:

Date:

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

• Spam: this is unwanted commercial e-mail.

• Viruses: can cause your computer to slow down or even destroy your hard

drive.

• Adware/Malware: this is software that gets installed on the computer. It can

cause annoying pop-ups or even steal information.

Hackers

• Information Threats: Hackers steal important information: client

information, back account numbers, etc.

• Networks can take steps to protect their networks. The most common are

• Installing a firewall

• Advising caution on the net

• Making sure the network is password protected, especially if using a wireless network.

.

Page 18: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

Student Name:

Date:

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

Networks and Hackers Lab Assignment:

Case Studies:

1. Together, we are going to draw out a SOHO (Small Office, Home Office) Network. We need to

have the following parts in our design: o Desktop computer o Printer o Scanner o Wireless router o A laptop

2. We have a school computer lab that wants a peer-to-peer network created for this lab. They

have the following items that need to be in the design:

o 15 desktop computers o 5 scanners o 1 color printer o 1 black and white printer

3. Now, come up with your own scenario and solution. See who can be the most creative!

Page 19: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

Student Name:

Date:

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

Networks and Hackers Lab Assignment: KEY

Case Studies:

1. Together, we are going to draw out a SOHO (Small Office, Home Office) Network. We need to

have the following parts in our design: o Desktop computer o Printer o Scanner o Wireless router o A laptop

Listed below are two versions of what this key can look like. This is just a sample—students can draw this out in so many different ways.

Wireless

Router

Wireless Router

Desktop Computer

Laptop

Printer

Scanner

Page 20: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

Student Name: Date:

2. We have a School Computer Lab that wants a peer-to-peer network created for this lab. They have the following items that need to be in the design:

o 15 desktop computers o 5 scanners o 1 color printer o 1 black and white printer

Page 21: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

Student Name:

Date:

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

A server C Router B desktop computer D None of the Above

Networks and Hackers Quiz

True/False Indicate whether the statement is true or false.

1 All computer networks are fairly simple, containing only a few components.

A True B False

2 A hub is like a car radio. Every computer on that section of the network can hear everything that is being

transmitted. A True B False

3 A switch is more powerful than a router.

A True B False

4 A WAN is a collection of LANs forming one giant network.

A True B False

5 WANs are a cheap investment.

A True B False

6 There are many advantages to having a client/server operating system, one of which is that you can

have both non-PCs and PCs on the same network. A True B False

Multiple Choice Identify the choice that best completes the statement or answers the question.

7 All computer systems are made up of two parts:

A Hardware and Firewalls C Servers and Routers B Software and Computers D Hardware and Software

8 A workstation is a

Page 22: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

Student Name:

Date:

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

9 A Modem

A is used only for the Internet C interprets data from a network

B is installed on every computer ever made

D is all you need to make a network.

10 In this type of network, all the connected computers are equal.

A Ethernet B Client/Server

C D

Peer-To-Peer Server/Client

11

The Ethernet came about originally by A telephone cables

C

wires

B coaxial cables D none of the above

Multiple Response Identify one or more choices that best complete the statement or answer the question.

12 LANs allow for the following resources to be shared: A Files C Printers B Internet D Scanners

13 The most common security threats are: A Spam C Viruses B Firewalls D Time Bombs

Case

14 Draw out a SOHO set that contains the following parts:

Desktop Computer Printer Scanner Wireless Router 2 Laptops Photo Printer

Page 23: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous

Student Name:

Date:

IT: [Principals of Information Technology]: [Networks and Hackers] Plan Copyright © Texas Education Agency, 2013. All rights reserved.

Networks and Hackers Quiz Answer Section

TRUE/FALSE 1 ANS: F

That may be true of the SOHO (Small Office, Home Office) networks, but most global companies have WANs with hundreds of networks inside them. They can have thousands of components.

2 ANS: T

3 ANS: F A router is more powerful than a switch.

4 ANS: T

5 ANS: F

Actually WANs are a major investment, but they pay off over time.

6 ANS: T

MULTIPLE CHOICE 7 ANS: D

It is made up of both hardware you can touch and software installed on the computer.

8 ANS: C

9 ANS: C

A modem is a device that enables computers to interpret data they receive from a network.

10 ANS: C All of the computers will share resources, and all the computers are equal. In both Ethernet and client/server networks, there is a server who is considered “the boss”.

11 ANS: B

MULTIPLE RESPONSE

12 ANS: A, B, C, D

All are allowed to be shared on a LAN

13 ANS: A, C Spam, viruses, adware, and information theft are the most common security threats.

CASE 14 ANS:

The student should have drawn this out just like the independent practice done as a class. The only parts added are an extra laptop and photo printer.

Page 24: Model Instruction Plan - Houston Independent School ... · • Projector for teacher computer Learner • This is an introduction on networks and hackers for students. No previous