Wednesday, October 8, 2014

Thursday, Oct 9th- 8th- Databases- Finish NSA project

Interlocking AT.jpg
Archdale-Trinity Middle School
Lesson Plan
 
Date: 10-09-2014



Teacher:
Witkowski

Lesson/Unit Topic:
Databases- Finish NSA Glog

Standards:
DB-1 Know the use and purpose of a database



“I Can…” Statement
Criteria for Success-Formative/Summative Assessments
I can understand how a database works.
I can bring back signed Interim Reports on Thursday for a 85.
Students can explain the parts of a database.


Literacy/Vocabulary Strategies (Word Wall)
The NSA has the largest database in the world.
They have a National Cryptologic School for people to learn how to break codes.
File:2001 NSA chart.jpg
Bell-Ringer/Connecting Strategy
On page 37, type lines 05 and 06.
Remember to use your thumb for the space bar.
We are using our right PINKY finger for the  apostrophe  key.
 

 
 
Lesson-Instructional Strategies & Procedures for Teacher and Students
(Detailed Plans Including Best Practices, Researched Based Strategies)
Guided Practice:
  1. Student will click on finish and share and save their link to Edmodo.

Intelligence gathering has occurred throughout history.
The NSA uses "queries" (A database query is a piece of code (a query)
that is sent to a database in order to get information back from
the database. ) to meet its objectives of counterterrorism,
counterproliferation and cyber security. However, many people
question if gathering huge amounts of metadata without a
warrant violates our 4th Amendment rights. (The right of the people to be
secure in their persons, houses, papers, and effects, against unreasonable
searches and seizures)

A feature that displays records that meet one or more specific
criteria or condition is called a filter or query.
When you what to find more than one criteria you use connector words.

Two examples of connector words are OR and AND.
Student exercise using OR and And connectors.
And- will give you a smaller search.
Or- will give you a larger search.

Review NSA Database Project Rubric:



NSA Glogster Rubric Criteria
Items that need to be on Glogster

Points

Grade

Your Name

5


Spelling and Grammar

15


Design Principles followed contrast, alignment, repetition,
white space, proximity, and balance

10


NSA National Security Agency definition

10


Definition of either Counterterrorism OR counterproliferation
OR cybersecurity

10


5 different items that NSA can track you by. You  must have picture and item’s name.

50


Final Grade

Independent Activity:
In the upper right corner click the PINK log in box.

8th grade LOG-INS: students first initial and last name followed by atms14.  
PASSWORDS: student birthdays in the mddyyyy format.

When you are finished (Make sure your LAST NAME is NOT on Glog)

you will copy your NSA Glog web address link to edmodo.
and write one positive thing about the NSA (See Qs 5, 6, or 7)
and one area of concern (negative thing) about the NSA.(See Qs 2, 3, or 4)


Homework- Extra Credit for 3rd test:
Ask your parents if they have a business card or
have one in their wallets from a business or
have a friend with a business card or the next
time you go into a business or they go into a
business see if they have a business card or
at home go to Google and then images and type
"business card" then print a business card.
If you give Miss W a business card sometime
this week you will get 5 points extra credit on
the second test. MUST be appropriate for school-
no alcohol, guns or bad words on cards.
MUST BE IN BY MONDAY

Higher Order Thinking Questions
How do the parts of a database fit together?
Student Technology/Differentiation
Students will do research to create a glogster of the NSA.
Closure Strategy
Exit Activity #10:

CIA code breaking
Click on Code 1 and solve it.
Click on Code 2 and solve it.
Code breaking game- Use no more than 7 hints or redo.


Exit Activity #11:
Choose home row and easy. Turn off sound.

Exit Activity #12: Database terms

Exit Activity #13: Database terms
 



No comments:

Post a Comment