Archdale-Trinity Middle School
Lesson Plan
| |
Date: 10-08-2014
|
Teacher:
|
Witkowski
| |
Lesson/Unit Topic:
|
Databases- Finish NSA Glog
| |
Standards:
|
DB-1 Know the use and purpose of a database
|
“I Can…” Statement
|
Criteria for Success-Formative/Summative Assessments
|
I can understand how a database works.
I can bring back signed Interim Reports on Thursday for a 85.
|
Students can explain the parts of a database.
|
Literacy/Vocabulary Strategies (Word Wall)
| ||||||||||||||||||||||||||
The NSA has the largest database in the world.
They have a National Cryptologic School for people to learn how to break codes.
| ||||||||||||||||||||||||||
Bell-Ringer/Connecting Strategy
| ||||||||||||||||||||||||||
On page 35, type lines 09 and 10.
Remember to use your thumb for the space bar.
We are using our right PINKY finger for the SLASH/DIAGONAL key.
| ||||||||||||||||||||||||||
Lesson-Instructional Strategies & Procedures for Teacher and Students
(Detailed Plans Including Best Practices, Researched Based Strategies)
| ||||||||||||||||||||||||||
Guided Practice:
Guided Lesson:
Intelligence gathering has occurred throughout history.
The NSA uses "queries" (A database query is a piece of code (a query)
that is sent to a database in order to get information back from
the database. ) to meet its objectives of counterterrorism,
counterproliferation and cyber security. However, many people
question if gathering huge amounts of metadata without a
warrant violates our 4th Amendment rights. (The right of the people to be
secure in their persons, houses, papers, and effects, against unreasonable
searches and seizures)
A feature that displays records that meet one or more specific
criteria or condition is called a filter or query.
When you what to find more than one criteria you use connector words.
Two examples of connector words are OR and AND.
Student exercise using OR and And connectors.
And- will give you a smaller search.
Or- will give you a larger search.
Review NSA Database Project Rubric:
A visual look at how the NSA works https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3kwqiZTH2k3EGcDmSQPJ3_MWfoPtivy-1kGMdNpZXU9b4nLUTnj5-koertbf3kR2aHrbOAukY_uUN181z7IkuiJ0AqbmIIMNxfXlA6fC8eG-HLGmvqllduMx587aqZpUWGGBm91C2Vc_u/s1600/Google.png
Independent Activity:
In the upper right corner click the PINK log in box.
8th grade LOG-INS: students first initial and last name followed by atms14.
PASSWORDS: student birthdays in the mddyyyy format.
When you are finished (Make sure your LAST NAME is NOT on Glog)
and write one positive thing about the NSA (See Qs 5, 6, or 7)
and one area of concern (negative thing) about the NSA.(See Qs 2, 3, or 4)
Homework- Extra Credit for 3rd test:
Ask your parents if they have a business card or
have one in their wallets from a business or
have a friend with a business card or the next
time you go into a business or they go into a
business see if they have a business card or
at home go to Google and then images and type
"business card" then print a business card.
If you give Miss W a business card sometime
this week you will get 5 points extra credit on
the second test. MUST be appropriate for school-
no alcohol, guns or bad words on cards.
MUST BE IN BY MONDAY
| ||||||||||||||||||||||||||
Higher Order Thinking Questions
| ||||||||||||||||||||||||||
How do the parts of a database fit together?
| ||||||||||||||||||||||||||
Student Technology/Differentiation
| ||||||||||||||||||||||||||
Students will do research to create a glogster of the NSA.
| ||||||||||||||||||||||||||
Closure Strategy
| ||||||||||||||||||||||||||
Exit Activity #10:
CIA code breaking
Click on Code 1 and solve it.
Click on Code 2 and solve it.
Code breaking game
Exit Activity #11:
Choose home row and easy. Turn off sound.
Exit Activity #12: Database terms
Exit Activity #13: Database terms
| ||||||||||||||||||||||||||
No comments:
Post a Comment