Joke Collection Website - Public benefit messages - 5 teaching plans for the theme class meeting of National Cyber Security Publicity Week.
5 teaching plans for the theme class meeting of National Cyber Security Publicity Week.
1. National Cyber Security Publicity Week Theme Class Meeting Teaching Plan
The purpose of teaching is to implement the initiative of the Ministry of Information to use the network safely, continue to do a good job in the safety education of network use in our school, reduce the negative impact of network use and put an end to the potential dangers of the network.
Activity flow:
First, import
1. Students, do you like playing computer? Please raise your hand if you have been online; "What do you usually do online?" (Student answers)
2. The teacher said: It seems that students have done a lot of things by using the Internet. Through the Internet, we can find information, play games, chat, watch the weather forecast, watch the news, read novels, send emails, listen to music, watch movies, shop and so on. It brings convenience to our work and life. The online world is wonderful, which enriches our lives. However, if we don't surf the Internet scientifically, safely and reasonably, it will also bring us harm.
Second, the teaching process
(a) The alarm went off.
Students, where do you usually surf the Internet? How many hours do you surf the Internet every week? It is ok for us to surf the internet moderately. Can I surf the Internet for a long time? What effect will surfing the Internet for so long have on our minors? Let's take a look at the real case.
(B) the harm of the network
1. Let the students discuss in the group and let the group leader record it.
2. Students speak.
3. The teacher added a summary.
(1) is harmful to physical and mental health.
(2) lead to a decline in academic performance.
(3) the weakening of moral consciousness
(4) Affect interpersonal skills
(5) Affect the outlook on life and values.
The teacher suggested:
(1) Before surfing the Internet, set the goal of surfing the Internet and the tasks to be completed;
(2) According to the task, reasonably arrange the length of online time.
③ Get parents' consent before surfing the Internet.
4. Don't spend more than 2 hours online at most.
(3) What is "Internet addiction"? (blackboard writing)
Do you know what Internet addiction is?
Internet addiction can be described as Internet Addiction Syndrome (IAD). That is, they are indifferent to real life, but addicted to virtual online games, love and information.
How to judge Internet addiction?
The main performance is to forget to eat and sleep before going to the computer; Often go online to vent pain, anxiety and so on. The above symptoms are the initial manifestations of Internet surfing syndrome. What's more, the body will tremble when surfing the Internet, and fingers will often beat the keyboard involuntarily. In the long run, it will lead to the stiffness of the tongue and cheeks, and even lose self-control and produce hallucinations.
The most important thing to prevent internet addiction is to strictly control the online time, not more than two hours a day. Children and adolescents are in the period of development and should be strictly controlled.
(four) minors online guidance
Students, we know "Internet addiction" and its harm. How should you look at the future Internet problems?
1. Let the students discuss in the group and let the group leader record it.
2. Students speak.
3. The teacher added a summary.
(1) Obey the network rules and protect yourself.
(2) Learn target management and time management to improve the efficiency of surfing the Internet.
(3) Actively deal with life setbacks and don't escape in the network.
4. In order to guide teenagers to surf the Internet in a scientific, civilized and safe way, the Central Committee of the Communist Youth League, the Ministry of Education and the Ministry of Culture
The Ministry of Culture has also jointly formulated the National Convention on Youth Network Civilization. I'd like to take this opportunity to ask all of you to stand up, raise your right hand to your ear and solemnly swear:
Be good at online learning and don't browse bad information.
Be honest and friendly, don't insult and deceive others.
To enhance self-protection awareness, don't date netizens at will.
It is necessary to maintain network security without disturbing network order.
Good for physical and mental health, not addicted to virtual time and space.
Three. abstract
The students did it themselves. I believe that students can "stay away from Internet cafes and surf the Internet safely and civilized" from now on. I hope that everyone will widely publicize the network security knowledge they have learned after class, and everyone will strive to be a small security guard.
2. National Cyber Security Publicity Week Theme Class Meeting Teaching Plan
The purpose of the class meeting: let the students clearly understand all kinds of unsafe hidden dangers on the network and learn to protect their own interests in the virtual network world; Treat all kinds of temptations rationally and resist the erosion of bad thoughts; Pay special attention not to indulge in online games and sound the alarm with bloody facts.
Overall process:
1. Let's express our opinions on the problems encountered in the network.
2. Look at cases and materials and talk about feelings.
3. The class teacher makes a summary.
Detailed process:
A and B: Hello, everyone! The theme of this class is "Network Security Education".
Moderator A: I believe that students are familiar with the network, but how much do they know about network security? Why don't you listen to Li Zhao's questions about network security first?
1, speak freely
Moderator B: The following questions are all encountered by students in the process of surfing the Internet. How do you deal with them and why? Please speak freely.
(1) Are you temperate in surfing the Internet? What's the timetable? What do you usually do?
(2) Have you protected your online password and personal data?
(3) Will you provide your name, home address, school name or telephone number, photos, etc. Chat room or public discussion forum?
(4) Have you received documents and other information from people you don't know? Why?
(5) What will you do with bad information such as hints, provocations and threats?
(6) What's your attitude towards websites that publish bad information, unhealthy chat rooms and unhealthy pages?
(7) What do you do when someone asks to go to an appointment or visit on the grounds of giving money or meeting?
Moderator A: It seems that students have a comprehensive understanding of network security, and they can rationally control themselves.
The erosion of ideas.
It is said that the negative impact of the Internet in China at present mainly includes the following three aspects: First, hostile forces at home and abroad publish a large number of reactionary, inflammatory, violent and vulgar contents on the Internet. It has caused serious adverse effects on the physical and mental health of minors. Second, many criminals use the platform provided by websites and Internet cafes to find targets to commit fraud, robbery and other criminal activities, which directly threaten the personal safety of minors.
(8) Have you ever been to an Internet cafe to surf the Internet? Even playing games?
(9) Do you play online games? What kind is it? Do you know the language and actions in The Imitation Game? Do your classmates often imitate or even talk about it?
(10) If you have classmates or relatives who are addicted to online games, can you talk about their performance?
Moderator A: Indulging in the Internet or even online games not only affects our study and mental health, but also may lead us astray. The Imitation Game's words or actions caused tragedy.
2. Look at cases and materials and talk about feelings.
Moderator A: On March 7th, students from a primary school in Rong Gui, Shunde, imitated scenes in online games to fight during class. Xiao Peng and Xiao Gong, classmates, play hostile roles in a popular online game. In the "battle", Xiao Gong accidentally stabbed Xiao Peng with a switchblade.
Students are free to express their opinions: Why did such a tragedy happen? What do you think of this? What would you ask yourself?
Moderator B: Of course, this tragedy did not happen by accident. Behind it is a huge army of young online games. According to the latest statistics, there are about 20 million online game teenagers in China, of which 2.6 million are online game addicts. Previously, the survey results of internet addiction among teenagers in Shanghai showed that the total incidence of internet addiction among teenagers in this city was 14.2%. Internet addiction has become an incentive for these teenagers to intensify family conflicts and participate in illegal crimes.
Internet addiction: it can cause autonomic nerve disorder, imbalance of hormone level in human body, decline of immune function, cardiovascular disease, gastrointestinal neurosis, tension headache, anxiety, depression and so on. , and even lead to death.
3, the class teacher summary
The network provides us with rich information resources and creates wonderful entertainment time and space. It has become an important platform for students to learn knowledge, exchange ideas and entertain, and has strengthened communication with the outside world. However, the network is like a double-edged sword, and some of its bad content is also very easy to hurt students, which has great security risks. At this class meeting, we exchanged and discussed various situations in the virtual network from the time arrangement of surfing the Internet, to the selective browsing of online information, and finally to the correct understanding of online games. The purpose is to make students clearly understand the importance of network security and learn to treat all kinds of temptations rationally, so as to make better use of the network to promote our learning progress.
3. National Cyber Security Publicity Week Theme Class Meeting Teaching Plan
Teaching objective: 1. Knowing the function of computer network is a sign of the rapid development of information technology in 2 1 world.
2. Get online through the computer and understand that teenagers must consciously abide by the convention on network civilization.
3. Make use of computer network to make electronic text publicity cards, publicize the knowledge of civilized use of the network, and cultivate self-protection awareness.
Key points and difficulties:
Key points:
1, understand the function of computer network, which is the symbol of the rapid development of information technology in 2 1 century.
2. Get online through the computer and understand that teenagers must consciously abide by the convention on network civilization.
Difficulties: I can look at the computer network dialectically, understand the disadvantages of incorrect surfing, and know the truth of distinguishing right from wrong and civilized surfing.
Teaching preparation:
Teacher preparation:
1. Instruct students with strong computer skills to make a virtual network and put what they want to learn in this lesson on the Internet.
2. Collect some reports about incorrect Internet access.
Instructional design:
First, the role of communication networks.
1. Teachers organize dialogues:
(1) Do you often surf the Internet?
(2) Talk about what you can do online.
2. The teacher proposed a topic: the online world.
3. Students teach themselves to talk about whether they enjoy the convenience and fun brought by surfing the Internet.
Teacher's summary: With the computer network, our creative words, images and photos can be sent to other corners of the world at the fastest speed. The internet has made the world smaller and brought us a lot of convenience.
Second, explore the "wisdom valley"
1, students teach themselves and think about what they agree with.
2, the teacher asked:
(1) How can we consciously resist unhealthy websites?
(2) What is "resource sharing"?
(3) What are the hazards of indulging in the Internet?
3. The group exchanged views on issues of interest.
4. Group report and random comments from teachers.
Third, be a citizen of network civilization.
Students read and memorize the Convention on Youth Network Civilization, and talk about their own learning experience.
Fourth, practical activities.
Students make electronic publicity cards to publicize the knowledge of civilized internet access and send them to friends.
4. National Cyber Security Publicity Week Theme Class Meeting Teaching Plan
1. Activity objective: 1. Cognitive goal: to understand the relationship between computer, network and middle school students' access to information;
2. Emotional goal: treat the network correctly, not indulge in it, and consciously resist the adverse effects of the network;
3. Behavior goal: to show the colorful online life and practical achievements of middle school students in the new era.
Second, the activity content:
1. Show students' online achievements: With the help of online support and large-screen demonstration, show students' colorful online life and practical achievements.
2. Put forward many negative events, and fully understand the network by discussing the negative effects of the network, so as to lay the foundation for the following discussion on correctly understanding and using the network.
3. Establish a correct network view: on the basis of full argumentation and discussion, understand the network objectively and fairly.
4. Discuss the maintenance of network order: establish the concept of "everyone is responsible for maintaining network order" and put forward some effective concrete measures.
Third, preparation before class:
1. Collect and sort out class electronic graphic information, and establish class photo albums, ppt presentations, e-learning assistants, etc.
2. Collect reports on the negative effects of computers and networks, and sort out the data.
3. Technical support: a multimedia demonstration classroom, a blackboard and several audience seats.
Fourth, the activity process:
(A) the network is not far away, just beside you and me-the charm display of online gathering.
1, record every wonderful moment-level electronic photo album display
Make a book of photos by scanning or digital photography, including:
(1) Personal photos and a motto that each student is most satisfied with, photos and messages of each teacher;
(2) Commemorative photos of major group activities, such as military training, sports meeting and spring outing.
2. One person has "difficulty" (the "difficulty" of "difficult problem"), and all parties support it-e-learning assistant.
Summarize the situation of the class from moral, intellectual and physical aspects. In the form of word document and ppt demonstration, the key points and difficulties of each subject are summarized.
3. Let me swim in the ocean of knowledge-on-site network resource search
The audience put forward the knowledge points that need to be queried and searched.
(b) In the virtual world, I don't distinguish between east, west, north and south-I realize the negative nature of the network.
The discussion mainly focused on the following aspects:
1. It's not that I don't want to go, but I really can't stop —— A discussion on indulging in online games.
2. Give me back my bright eyes and healthy body-a discussion about damaging my health.
3. Who am I and who are you in the virtual world? -The discussion about online dating, online rumors and online cheating is essentially a discussion about online morality and responsibility.
While the audience is discussing, use multimedia to play the audio-visual information collected by the audience on the big screen. All the discussion contents are sorted out by the host and summarized on the demonstration blackboard.
(3) Whose fault is it, the Internet or me? -Discuss the advantages and disadvantages of the network.
Moderator: What has the Internet brought? Why do some people go to success and glory because of it, and some people go to degradation and destruction because of it? This leads to the discussion of the nature of the network. The moderator grasps the discussion trends and summarizes the discussion results. A student with fast computer input speed will input the discussion results into the machine and display them on the big screen.
The discussion focused on:
1, the network is good: the network is a medium, a means, a tool and a bridge for us to communicate with the outside world. There is no right or wrong in itself.
2. In the virtual world, we are still realistic: although the network is a virtual world completely different from real life, it is still inseparable from realistic morality and norms.
3. Before the Internet, everyone was equal: the Internet provided everyone with equal resources, and it was up to you to gain or suffer.
Carry out network rules to the end —— Discussion on maintaining network order.
Network order, starting from me; Network order is everyone's responsibility. Facing the network, we should do the following:
1, improve their own quality and resist the temptation of the network;
2. If bad information is found, notify friends to boycott and report to relevant departments.
Verb (abbreviation for verb) The class teacher speaks.
Through the exchange of classmates, it seems that the network is really worthy of attention. Many networks have penetrated into every aspect of our lives, but whether it will become a gurgling source of wisdom or a Pandora's box "given" by God to mankind varies from person to person. Therefore, students should correctly understand the network and consciously resist the temptation. Moreover, our school also stipulates that students are strictly forbidden to surf the Internet from Monday to Friday, so please consciously abide by it.
5. National Cyber Security Publicity Week Theme Class Meeting Teaching Plan
Teaching objective: 1. Let students know what network information security is and the general measures to maintain information system security.
2. Understand what information security threats exist in the network, what consequences they will bring, and how to effectively protect your information.
3. Cultivate students' safe use of network information technology and enhance their awareness of information security.
Teaching focus:
Understand the common factors of threat information.
Learn the basic measures of virus protection and information security protection.
Teaching difficulties:
1, learn the basic measures of virus protection and information security protection.
2, the safe use of information technology in daily life.
Teaching process:
1, scenario import: the serious consequences caused by computer viruses and computer hackers.
Broadcast news and video materials related to computer viruses, hacking and crimes.
Make students realize the destructive effect of virus and the seriousness of information technology security.
2. Introduce the topic "information security".
Teachers and students discuss and explain topics together: (information security: ensuring the integrity, availability, confidentiality and controllability of information);
3, ask questions, students answer, teachers give directions:
Through the demonstration just now, let's think about the following questions:
Turn on the computer and suddenly find that the stored files are lost or the system suddenly crashes. Do you know what happened in the computer?
What should you do when you see spam flooding your e-mail, or when you open an e-mail, anti-virus software prompts that your computer is infected with a virus?
One day, a friend saw some folders in your computer on his machine. What does this mean?
One day, a friend told you that he knew your online account and password. Can you believe it?
What do you think of the news you receive online? Just remit a certain amount of money to an account and you will get a grand prize.
One day, you were chatting on QQ, and a stranger sent you a website. Can you open it?
Internet is an ocean of information. Will you believe all the information and all the "net people" here?
Do you know how many "leak doors" there are on the Internet? As far as you know, can you tell me how these secrets were leaked?
Combined with students' daily application of computers, after discussion, students have a preliminary understanding of viruses, hackers, spam, network sharing and computer crimes. Every student has enhanced the awareness that information security is related to each of us.
4, master the threat to information security "culprit" computer virus (group discussion):
(1) Definition:
Computer virus is a set of computer instructions or program codes that are compiled or inserted into computer programs artificially, which destroys computer functions or data, affects the use of computers, and can replicate itself.
(2) Features: Latency, infectivity, concealment and destructiveness.
(3) Transmission channels: There are many transmission channels, mainly through networks and disks.
5. Do a good job in information security protection. The teacher summed up how to establish correct network behavior:
Install genuine anti-virus software and firewall, upgrade from time to time, and comprehensively kill the virus on the system;
Patch the computer system and make irregular backups of important data;
Don't log on to unhealthy websites, don't receive websites of unknown origin, and don't download programs and data from the Internet at will.
Do not manufacture, use and spread computer viruses and hacker attack software;
Abide by relevant national laws and regulations, and don't do anything illegal.
6. Divide the students into 7 groups, with 6 people in each group, and talk about their own experience and how to establish correct network civilized behavior for themselves.
7. Class summary.
In this lesson, we learned several types of information security threats in the network. I hope that through this lesson, students can improve their awareness of information security, use the convenience provided by the network correctly, and always pay attention to the importance of information security.
8. Homework after class:
Learn the National Youth Network Civilization Conference.
Inquire about the method of accessing the Internet safely.
- Previous article:Where did Jiufuwanka's lawyer's letter come from?
- Next article:I wish my colleagues a bright future after leaving their jobs.
- Related articles
- Warmly congratulate the 80-year-old man on his birthday.
- What if wechat typing cursor doesn't move?
- What are the autumn health messages? Autumn blessing short message daquan
- What is the participation process of Tianjin industrial injury insurance?
- What about SMS bombing?
- Thank you letter to the male math class teacher.
- Words of gratitude for the support of the team
- 202 1 Notice on Epidemic Prevention and Control of First Class Registered Fire Engineer Qualification Examination in Wuhu Examination Area, Anhui Province
- The landline sends a text message to display the number.
- Can deleted SMS chat records be restored?