0% found this document useful (0 votes)
165 views5 pages

Lesson Plan 12 A

This lesson plan for Class 12 A in Computer Science focuses on Network and Communication Technology, covering topics such as types of networks, networking devices, and definitions of key terms like hacker, cracker, and firewall. The plan includes teaching methods, class discussions, comprehension questions, and practical activities related to networking. It also outlines homework assignments and innovative activities to enhance students' understanding of the subject matter.

Uploaded by

Ishaan RWA IRWA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
165 views5 pages

Lesson Plan 12 A

This lesson plan for Class 12 A in Computer Science focuses on Network and Communication Technology, covering topics such as types of networks, networking devices, and definitions of key terms like hacker, cracker, and firewall. The plan includes teaching methods, class discussions, comprehension questions, and practical activities related to networking. It also outlines homework assignments and innovative activities to enhance students' understanding of the subject matter.

Uploaded by

Ishaan RWA IRWA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

ANAND SWAROOP ARYA

SARASWATI VIDYA MANDIR


ROORKEE
LESSON PLAN (2018-19) DATE - ______________
TEACHERS NAME – MONIKA GUPTA CLASS- 12 A
SUB- COMPUTER SCIENCE(083) PERIOD 4, 5 DURATION 35 min
TOPIC- Network and Communication Technology
SUB TOPIC-NETWORKING TECHNOLOGY

1- Adhiti(teaching work)
(a) Introduction of topic
A Network is a collection of interconnected autonomous computers. A
Computer which is a part of a network is known as Node or Workstation.

Questions based on previous knowledge


Q1.How many of us take help of INTERNET for completing our work
Either in studies or daily routine.
Q2. In our computer lab is it possible that we save our work on one
system and can open again it on another one

(b) Discussion on the content


The benefits of a network are Resource Sharing, Increased Reliability, Cost
Reduction and Effective Communication.
Types of Network: Following types of network exist
1 LAN (Local Area Network) 2. MAN (Metropolitan Area Network 3. WAN
(Wide Area Network) 4. PAN (Personal Area Network)

(c) Topology:
(d) It is termed as the physical arrangement of computers in a network viz Bus, Ring, Star,
Mesh
(e)

Server

Server
Server

Transmission Media
Twisted Pair Co Axial Cable Microwaves
Cable

Networking Devices
Modem
A modem is a computer peripheral that allows you to connect and communicate
with other computers via telephone lines. Modem means Modulation/
Demodulation. Modem can be Internal and External.
RJ- 45 Connector
RJ-45 is short for Registered Jack-45. It is an eight wire connector which is commonly
used to connect computers on the local area networks i.e., LAN.
Network Interface Cards (Ethernet Card)
A network card, network adapter or NIC (network interface card) or NIU is a piece of
computer hardware designed to allow computers to communicate over a computer
network.
Repeaters
A repeater is an electronic device that receives a
signal and retransmits it at a higher level or
higher power, or onto the other side of an
obstruction, so that the signal can cover longer
distances without degradation.
Hub
A hub contains multiple ports. When a packet
arrives at one port, it is copied to all the ports of
the hub.
Switch
Switch is a device that performs switching. It
forwards chunk of data communication
between ports (connected cables) based on
the Mac-Addresses in the packets. This is
distinct from a hub in that it only forwards the
data to the ports involved in the
communications rather than all ports
connected. The network can be connected
directly to a
switch, or another switch that is in turn connected to a switch.
Difference between Bridges, Routers and Gateway
All these network devices are used to connect two or more network or network
segments with the following conditions

2- Bodh kriya(class work)


(a)Difficult term/definitions
Bridge Router Gateway
Similar Topology and similar Similar Topology and Different Different Topology and
protocol protocol Different protocol
Some Definitions:-
Hacker:- A Hacker is a programmer who intrudes in a secure network just for gaining
knowledge or playful pranks.
Cracker:- A cracker is a malicious programmer who breaks into a secure system
with a malafide intention.
Cookies:- Cookies are messages sent by web server to keep track of user’s activity.

Some Definitions:-
Hacker:- A Hacker is a programmer who intrudes in a secure network just for gaining
knowledge or playful pranks.
Cracker:- A cracker is a malicious programmer who breaks into a secure system
with a malafide intention.
Cookies:- Cookies are messages sent by web server to keep track of user’s activity.
Web Server:- A web server is a computer system that processes requests of the client via HTTP.
Web Browser:- A web browser (commonly referred to as a browser) is a software application
for retrieving, presenting, and traversing information resources on the World Wide Web. e.g.
Internet Explorer, Mozila Firefox, Google Chrome etc.
Firewall:- A firewall is a network security system designed to prevent unauthorized access to or
from a private network. Firewalls can be implemented in both hardware and software, or a
combination of both.
Cyber Crime:- Criminal activities carried out by means of computer or Internet. All such crime are
dealt with Indian IT Act 2000.
CyberLaw:- Cyberlaw is a generic term used to refer rules for preventing crime on Internet.
Cloud computing :- Cloud Computing is a kind of Internet-based computing that provides shared
processing resources and data to computers and other devices on demand. The cloud aims to cut
costs, and helps the users focus on their core business instead of being impeded by IT obstacles.
Spam:- Irrelevant or unsolicited messages sent over the Internet, typically to large numbers of users,
for the purposes of advertising, phishing, spreading malware, etc.
Virus:- A computer virus is a program that, when executed, replicates itself or infecting other
programs by modifying them. Infecting computer programs can include data files, or the boot
sector of the hard drive.
Antivirus:- Antivirus or anti-virus software, is computer software used to prevent, detect and remove
malicious software. Some common example of Antivirus Software are Norton, Quickheal,
Kasparsky etc.
(b)Comprehension question
(a) illlustrate the layout for connecting 5 computers in a Bus and a Star topology of Networks.
(b) Out of the following, which is the fastest (i) wired(ii)wireless medium of communication
Infrared, Coaxial Cable, Ethernet Cable, Microwave, Optical Fiber.
(c) Innovative activity
Give the tips for online transaction.
To give the tips for identifying the secured site
3- Abhyas(homework)
1- What is the diffrence between lan and man?
2- Write some point that we should keep in mind while designing a network.
3- What is the difference between server and workstation ?
Intelligent questions beyond book
Q1.Out of the following, which all comes under cyber crime ?
Stealing away a brand new computer from a showroom.
Getting in someone’s social networking account without his consent
and posting pictures on his behalf to harass him.
Secretly copying files from server of a call center and selling it to the
other organization.
Viewing sites on an internet browser.
4. Prayog/prasar(application of knowledge)
1. Quiz on different definition words
2. Practical aspects for using different networking device
(a) Reference book/ suggested book (to read and make presentation)
INTRODUCTION TO INFORMATION TECHNOLOGY by V.RAJARAMAN
5. Practical activity: -
Ravya Industries has set up its new center at Kaka Nagar for its office and web based activities.
The company compound has 4 buildings as shown in the diagram below:

Raj Fazz
Building Building

Jazz
Harsh Building
Building
Harsh Building
Centre to centre distances between various buildings Number of Computers
Harsh Building to Raj Building 50 m 15
Raz Building to Fazz Building 60 m Raj Building 150
Fazz Building to Jazz Building 25 m Fazz Building (a) 15 Suggest a
Jazz Building to Harsh Building 170 m Jazz Bulding 25 cable
Harsh Building to Fazz Building 125 m
layout of
Raj Building to Jazz Building 90 m
connections
between the buildings.
(b) Suggest the most suitable place (i.e. building) to house the server of this
organisation with a suitable reason.
(c) Suggest the placement of the following devices with justification:
(i) Internet Connecting Device/Modem
(ii) Switch
The organization is planning to link its sale counter situated in various parts of the same city, which type of
network out of LAN, MAN or WAN will be formed? Justify

(MONIKA GUPTA) (SHRI RAJIV GUPTA)

Subject teacher principal

You might also like