Elective - Computer
Session Date
Lesson Topic
Wireless Communication Technology. Review of Identity Theft Quiz
Lesson Outline
Wireless Communication Technology. Review of Identity Theft Quiz. Fundamental Science/Physics for Wireless Communications: Electronic Signals converted to Electromagnetic/RF waves. Basic components of a wireless communication system (Cell phones, Wireless laptops, Ipads etc) involve Transmitters, Receivers, Channels, Antennas, Demodulators etc. During today's session, the important topic of Wireless Communication Technology was introduced and explained to PJ. He followed the basic principles and process very well, and I am very pleased that he earned a 96 score on his recent Identity Theft/Cyberattacks Quiz.
Assignment
None
Session Minutes
45
Minutes Student Attended
40
Lesson Comments
During today's session, the important topic of Wireless Communication Technology was introduced and explained to PJ. He followed the basic principles and process very well, and I am very pleased that he earned a 96 score on his recent Identity Theft/Cyberattacks Quiz.
Session Date
Lesson Topic
The Technology of Wireless Communication: How digital information is converted to radio waves and vice versa for wireless communications and transmission.
Lesson Outline
The Technology of Wireless Communication: How digital information is converted to radio waves and vice versa for wireless communications and transmission. Video on Wireless Technology and wireless (Bluetooth) devices.
Assignment
None
Session Minutes
45
Minutes Student Attended
0
Lesson Comments
PJ was absent from class today.
Session Date
Lesson Topic
Quiz: Identity Theft and Cyberattacks
Lesson Outline
Quiz: Identity Theft and Cyberattacks. Full class period.
Assignment
None
Session Minutes
45
Minutes Student Attended
45
Lesson Comments
PJ worked productively and diligently today on the Quiz covering Identity Theft and various Cyberattacks.
Session Date
Lesson Topic
Encryption
Lesson Outline
Encryption: Purpose, Science and Technology. Encryption keys, End-to-End Encryption. 256 bit Encryption technology and numbers of possible combinations/codes.
Assignment
None
Session Minutes
45
Minutes Student Attended
45
Lesson Comments
Pj was very interested and engaged in today's Encryption lesson.
Session Date
Lesson Topic
Preventing Identity Theft: Major U.S. Cases of Identity Theft and Cyberattacks involving large sums of money and stolen personal/financial information.
Lesson Outline
Preventing Identity Theft: Major U.S. Cases of Identity Theft and Cyberattacks involving large sums of money and stolen personal/financial information Video on 7 Ways to Prevent Cyberattacks/Identity Theft. Philip Cumings case of stolen Credit Reports, Operation Swiper credit card ring large scale theft and sale of Apple Computer products overseas,
Assignment
None
Session Minutes
45
Minutes Student Attended
45
Lesson Comments
Pj was very wellfocused during our session today on Identity Theft.
Session Date
Lesson Topic
Identity Theft Schemes and Terms: Phishing, Pharming, Skimming, Pretexting, Shoulder Surfing, Bots and Worms, Wireless Hacking etc. Effective ways to minimize/prevent Identity Theft and Cyberattacks.
Lesson Outline
Identity Theft Schemes and Terms: Phishing, Pharming, Skimming, Pretexting, Shoulder Surfing, Bots and Worms, Wireless Hacking etc. Effective ways to minimize/prevent Identity Theft and Cyberattacks. Video on & Ways to Enhance Digital Security and prevent cyberattacks: Secure a second "private" email, tap to pay, unique
User Name and Passwords etc.
Assignment
None
Session Minutes
45
Minutes Student Attended
35
Lesson Comments
During today's session on common Identity Theft (Cyberattack) Schemes, PJ was very engaged with this important topic. He understood clearly the various specific mechanisms of Cyberattacks and a video was presented which outlined effective methods of preventing/guarding against cybercriminals.
Session Date
Lesson Topic
Identity Theft and Cyberattacks
Lesson Outline
Identity Theft and Cyberattacks: Phishing, Pharming, and Skimming Schemes. Examples of each type of cyberattack. "Fake Website" attacks at public Wifi Hotspots, Hotels etc.
Assignment
None
Session Minutes
45
Minutes Student Attended
45
Lesson Comments
Today's lesson with Pj focused on the important topic of Identity Theft and Cyberattacks. PJ is highly intereted in this criminal activity which he had some previous knowledge of Phishing email scams etc.
Session Date
Lesson Topic
Identity Theft and Cyber Attacks. Phisinfg Schemes and theft of personal credentials, passwords etc.
Lesson Outline
Identity Theft and Cyber Attacks. Phisinfg Schemes and theft of personal credentials, passwords etc.
Assignment
None
Session Minutes
45
Minutes Student Attended
15
Lesson Comments
During today's session with PJ, the topic of Identity Theft and Cyber Attacks was introduced. PJ had to leave for early dismissal after the first 15 minutes of this class.
Session Date
Lesson Topic
Creation of Spreadsheet to Record times of High School Track athletes for each of 3 meets/events. The Average Time for each player in their event will be automatically calculated by the MS Excel Spreadsheet Program.
Lesson Outline
Creation of Spreadsheet to Record times of High School Track athletes for each of 3 meets/events. The Average Time for each player in their event will be automatically calculated by the MS Excel Spreadsheet Program. Use of SUM( ) function and DIVIDE /.
Assignment
None
Session Minutes
45
Minutes Student Attended
45
Lesson Comments
During today's computer session, PJ used his knowledge and skill with MS Excel Spreadsheets to create and organized chart of times of High School Track athletes'
times in their respective running events. He then used the Excel Program to automatically calculate the Average Times for each runner for their 3 meet events. PJ handled this quite successfully and enjoyed the assignment.
Session Date
Lesson Topic
Advanced features and applications of MS Excel spreadsheets.
Lesson Outline
Advanced features and applications of MS Excel spreadsheets. Since student was absent today,
I was asked to substitute for T. Garry and spent the class period giving him an online typing/keyboarding "Sky Chase" activity.
Assignment
None
Session Minutes
45
Minutes Student Attended
45
Lesson Comments
PJ was absent from class today. I substituted for T.Garry during this period.