Three teaching plans of information technology in senior high school of "information technology with each passing day"

# Lesson Plan # Introduction How to combine the learning of information technology courses with the actual needs of students? The following content is ready for your reference!

Tisch

I. Analysis of Teaching Content On the basis of students' understanding of the concept and general characteristics of information, this course mainly introduces the history and development trend of information technology, and analyzes the influence of information technology on social development, scientific and technological progress and personal life and study.

Second, the analysis of teaching objects

The information technology foundation (compulsory) course is aimed at freshmen in senior high school. Students of this grade have been exposed to information technology courses for at least three years in junior high school. Most of them have quick thinking, strong hands-on ability, strong independent thinking ability, strong ability to accept knowledge and certain self-learning ability. In classroom teaching, students should be guided to learn independently, so that they can be good at finding, analyzing and solving problems in class; So as to improve students' information ability.

Third, the teaching objectives

1. Knowledge and skills Objective: To understand the definition, development process and relationship of various information technologies.

2. Process and Method Objective: To cultivate students' ability to solve problems by using information and information technology.

3. Emotion, attitude and values: By exploring the information technology around us, explore the history of information technology, let students understand the content, application and development of information technology, stimulate students' interest in learning information technology, and initially cultivate students' awareness and habits of rational use of information technology.

Fourth, the focus of teaching

1, information technology has a long history.

2. The development trend of information technology.

3. Rational use of information technology.

Difficulties in teaching verbs (abbreviation of verb)

1, the development trend of information technology.

2. The relationship between various information technologies.

Sixth, teaching methods.

This lesson mainly adopts the following methods: lecture, discussion, inquiry, questioning method, guidance, teacher-student summary and so on.

Seven, class 1 class.

Teaching process:

Review: Question: What are the four characteristics of information?

Introduction of new lesson

Teacher activities:

1, students, today we will learn the section "information technology changing with each passing day". First of all, please take 2 minutes to read a message at the beginning of this lesson and answer the question: What does the material say?

First, guide students to analyze the materials: What tools do tourists have and how do they get help when their lives are in crisis?

Student 1: mobile phone.

Student 2: Only by using the weak signal of the mobile phone can we send out the distress message.

Teachers and students sum up together: this material shows the importance of information and information technology to us human beings.

First, the development history of information technology

Teacher activities:

IT (information technology)

Information technology: All technologies related to information acquisition, processing, expression, communication, management and evaluation can be called information technology. It can be said that where there is information technology, there are human beings, and there have been five information technology revolutions in human history:

Teacher's activity: Give students 3 minutes to read page 6, and ask them to remember "the five revolutions of information technology" as much as possible.

The first time: the use of language

The second time: coinage

The third time: the invention of printing

The fourth time: the invention and popularization of telegraph, telephone, radio and television.

The fifth time: the popularization and application of computer technology and modern communication technology

Second, the development trend of information technology: (only choose two points to explain, and the rest will be discussed next class.

Learning through the Internet, peer support, inquiry, etc.)

1, more and more friendly man-machine interface.

Teacher activities: The increasingly friendly man-machine interface is actually based on the operating system. Explain the difference between DOS and WINDOWS. (Introduction)

DOS is actually the abbreviation of DiskOperationSystem. As the name implies, this is an operating system based on disk management. It is in the form of command line, through the input of commands for man-machine dialogue, the instructions are transmitted to the computer in the form of commands, so that the computer can realize the operation. Therefore, as users, we have to recite many complicated commands in order to use the computer well.

WINDOWS: using GUI- mouse/graphical user interface.

The graphical user interface design of human-computer interaction presents the interaction in a visual graphic way.

Example: find and run qq2010.exe.

How to realize WINDOWS (specify students to demonstrate operation through mouse/graphical interface)

How to realize it under DOS (teacher demonstration)

Enter c: \ > dirc:\ & gt; cdProgramFilesc:\ & gt; Program file & gtdirc:\ & gt;; Program file & gtcdTencentc:\ & gt;; Tencent

c:\ & gt; Tencent & gtdirc:\ & gt;; Tencent & gtqq20 10.exe

Through explanation and analysis, students gradually feel that DOS to WINDOWS is a better man-machine interface.

(1) virtual reality technology

Applications: architecture, surgeons, military.

(2) Voice technology

Speech recognition technology, speech synthesis technology

Applications: voice input method, unattended telephone service, dedicated voice direct translation.

(3) Intelligent agent technology

Office Assistant

You can learn more about related concepts through the internet.

2. More and more personalized functional design.

Personalized mobile phone personalized TV program selection

Student activity: Read the ninth page of the book. 1-3.

3, the cost performance is getting higher and higher.

Teacher activities: 8 bit =1b; 1KB = 2 10B; 1MB = 2 10KB; 1GB = 2 10MB; 1TB=2 10GB

Teacher's activities: Please pay attention to the table 1-3 on page 10 of the textbook.

Student activity: Read the form carefully.

Teacher activity: What problems do you see from this table?

Student 1: ...

Student 2: ...

Student 3: ...

Teacher-student summary:

The closer the year, the better the performance and the lower the price.

Teacher's activity: Because the book lists the main performance parameters and prices of ordinary home computers before 2003, students can list the configurations in recent years for them to understand.

Third, rational use of information technology.

Student Activities: Debate on Advantages and Disadvantages of Information Technology

Student 1: ...

Student 2: ...

Student 3: ...

Teachers' activities: Facing the development of information technology, we should objectively understand, foster strengths and avoid weaknesses, and give full play to the role of information technology.

Forms of cyber crime:

1) Entering other people's computer facilities through the Internet without permission, cracking other people's passwords and using other people's computer resources;

2) spreading computer viruses to other people's computer systems through the network; Spying, stealing, tampering with or deleting state secret information;

3) Business spies steal, tamper with and delete business secrets and computer programs stored by enterprises and institutions;

4) illegal transfer of funds; Stealing other people's bank deposits and committing various financial crimes.

5) Use the Internet to spread harmful information, slander, insult and intimidate others, create rumors, spread false news, disrupt social order, spread violent, horrible and superstitious works, and poison young people; Blasphemy of religion and destruction of national unity; Carry out cultural and ideological infiltration activities.

Teacher's activity: study the contents of the national convention on youth network civilization together.

Be good at online learning and don't browse bad information. Be honest and friendly, don't insult and deceive others. To enhance self-protection awareness, don't date netizens at will. It is necessary to maintain network security without disturbing network order. It should be beneficial to physical and mental health, and we should not indulge in virtual time and space.

Four. abstract

This course mainly understands the development history (mainly five revolutions) and trend (humanization and popularization) of information technology, and also grasps how to use information technology reasonably, scientifically and healthily.

blackboard-writing design

1.2 rapidly changing information technology

1, information technology concept

2. The long history of information technology

Five revolutions of information technology

Use of (1) language

(2) the creation of words

(3) the invention of printing

(4) The invention and popularization of telegraph, telephone, radio and television.

(5) Popularization and application of computer technology and modern communication technology.

3, the development trend of information technology

(1) More and more friendly man-machine interface.

(2) More and more personalized functional design.

(3) The cost performance is getting higher and higher.

4. Rational use of information technology

Avoid indulging in internet and games.

Five, after-school tasks:

Teacher activities: Please prepare the following materials for the next class after class.

1. Use the Internet to find information about "the advantages and disadvantages of middle school students surfing the Internet".

2. Use the Internet to find relevant information about "virtual reality technology", "voice technology" and "intelligent agent technology", ask questions in class, and check students' learning situation.

extreme

Analysis and Design of Teaching Content

The second section of the first chapter of "Fundamentals of Information Technology" in Senior One of Education Science Press. Because this content is theoretical, if it is only taught by the teacher, students may feel boring, so I am going to cite phenomena under the guidance of the teacher for students to discuss, then summarize and gain knowledge.

Teaching object analysis

Last class, the students had already understood the basic characteristics of information and had a certain understanding of information, but their understanding of "information technology" was very vague, and information technology was generally equated with computer technology. Making students understand information technology is a key point of this course. In the teaching content of experiencing the development of information technology, the key point is to let students experience "voice technology", and other items are only briefly introduced.

Teaching objectives

Understand the development history of information technology and the relationship between various information technologies; Experience the development and changes of information technology; Guide students to be kind to information technology and use it healthily.

Emphasis and difficulty in teaching

Look at the development history of information technology from five aspects; What is the development trend of information technology? Rational use of information technology.

Teaching environment

Multimedia computer network classroom

Teaching strategy

Teachers take the initiative to learn and acquire knowledge through the process of expelling phenomena, discussing and analyzing, and summarizing.

teaching process

First, the development history of information technology

information technology

All technologies related to information acquisition, processing, expression, communication, management and evaluation can be called information technology. From the development history of human society, information technology has experienced five information technology revolutions.

1) Language use: an important symbol of the evolution from apes to humans;

2) Creation of characters: it is the storage and transmission of information that breaks the limitation of time and space for the first time;

3) The invention of printing provided a more reliable foundation for the accumulation and dissemination of knowledge;

4) Invention and popularization of telegraph, telephone, radio and television: further breaking through the limitation of time and space;

5) Popularization and application of computer and modern communication technology: to push human society into the digital information age.

The first generation: 1946- 1958, electronic computer;

Second generation: 1958- 1964, transistor electronic computer;

The third generation: 1964- 1970, integrated circuit computer;

*:1971-1LSI computer of the 1980s;

Fifth Generation: Up to now, intelligent computers.

Second, the development trend of informatization

Information technology has a long history, and it will develop in the direction of humanization and popularization, that is, information technology is increasingly symbolizing people's needs and usage habits.

The specific manifestations of popularization:

1) More and more friendly man-machine interface.

A top ten human-computer interface devices in the 20th century-megaphones, touch-tone telephones, steering wheels, magnetic cards, traffic lights, crt, remote controllers, LCD, barcode scanners, and mouse/GUI;

B, dos operation interface and gui operation interface: humanized interface and personalized design;

C virtual reality technology (produced at the end of 20th century);

Three-dimensional realistic virtual environment: three-dimensional graphics generation technology, multi-transmission sensory interaction technology, high-resolution display technology.

"3i" features: strong "immersive" immersion; Friendly human-computer interaction; Stimulate people's imagination.

Classification: virtual reality technology (such as virtual visit to the Palace Museum), virtual reality technology (such as virtual reality environment generation, virtual design of Boeing 777 aircraft).

D, voice technology;

Speech recognition technology (ASR)-A technology that converts human voice signals into text information that can be recognized by computer, so as to recognize the speaker's voice instructions and text content.

Speech synthesis technology (TTS)- a technology that converts text information into voice data and plays it out through voice.

The application of voice technology can be divided into three aspects: desktop application, network/telephone system application and information appliance application.

E. Intelligent agent technology: usually, it can actively complete certain tasks according to people's needs, which is mainly used for automatic binding and filtering of information. Such as "robot" or "*" programs in search engines.

2) More and more personalized functional design.

3) The cost performance is getting higher and higher.

For example, the size of computer memory chips changes from 1mb at the beginning to 32mb, 64mb, 128mb, 5 12mb and so on. (mb stands for the unit of storage capacity in the computer). The storage capacity of a computer is calculated in bytes.

The units commonly used in computers to express capacity are: byte (B), kilobyte (kb), megabyte (mb) and gigabyte (gb).

The transformation relationship between them: 8 bit =1b; 1kb = 2 10b; 1mb = 2 10kb; 1gb = 2 10mb; 1tb=2 10gb

Third, rational use of information technology.

Facing the development of information technology, we should understand objectively, foster strengths and avoid weaknesses, and give full play to the role of information technology.

Forms of cyber crime:

1) Entering other people's computer facilities through the Internet without permission, cracking other people's passwords and using other people's computer resources;

2) spreading computer viruses to other people's computer systems through the network; Spying, stealing, tampering with or deleting state secret information;

3) Business spies steal, tamper with and delete business secrets and computer programs stored by enterprises and institutions;

4) illegal transfer of funds; Stealing other people's bank deposits and committing various financial crimes.

5) Use the Internet to spread harmful information, slander, insult and intimidate others, create rumors, spread false news, disrupt social order, spread violent, horrible and superstitious works, and poison young people; Blasphemy of religion and destruction of national unity; Carry out cultural and ideological infiltration activities.

class exercise

Papermaking and printing in four great inventions of ancient china are closely related to the third information technology revolution.

2, 2 1 century, human beings have entered (a).

A. information age B. electronic age C. high-tech age D. modernization age

3, the English full name of information technology is (A), referred to as it.

information technology

(c) Communication transmission (d) Information transmission

4. The influence of information technology on social development is various. The following description of the impact is correct (a).

(a) Promoting scientific and technological progress; (2) Causing trouble to others.

(3) Creating a new human civilization; (4) Accelerating industrial transformation.

5. The configuration of the newly bought computer at home is: Intel Pentium 4 2.8 GHz/256 m/80 GB/50x/15, where (a) is usually used to indicate the main frequency of cpu.

A. Intel Pentium 42.8ghz b, 256 MHz C, 80gb d and 50x

Tisso

First, the analysis of teaching objectives:

"Information and Information Technology" is the first chapter of the module "Fundamentals of Information Technology" published by Education Science Press. As the first chapter of this book, on the basis of students' existing knowledge, information and information technology are further improved, with the aim of enabling students to grasp information and information technology from a macro perspective, form an overall understanding, and provide necessary preparations for later study. Through learning, ask students to list all kinds of information around them and feel the richness of information; Can illustrate the general characteristics of information with examples; Be able to name five revolutions in information technology; Be able to understand the development history of information technology; Can understand the development trend of information technology, experience the changes of information technology development, and realize that information technology is closely related to people's lives.

Second, the teaching content analysis:

This chapter mainly includes two parts:

1, colorful information and the general characteristics of information, the former is the foreshadowing content, which is closely related to students' study and life, easy to understand and easy for students to accept; The latter is the key content, which is theoretical and difficult to teach;

2. The Long History of Information Technology mainly describes five revolutions of information technology; The development trend of information technology describes the popularization and humanization of information technology from the perspective of information culture, and puts the development of technology in the development of information culture; Rational use of information technology is mainly to let students know that information technology is a double-edged sword. If it is used improperly, it will bring negative effects to people. The content of this block is the focus of teaching, and the content of the last two blocks is also the difficulty of this chapter.

Third, the analysis of students' learning state:

Senior one students have initially possessed certain self-study ability, and their ability to apply and transfer knowledge has been relatively strong. Students at this stage are more mature in logical thinking, and students at this age are also more active in thinking, so they can discuss and communicate with their classmates on some issues. They have a broad vision and a strong sense of mission, and pay attention to the influence of information technology on life and its surrounding environment.

Fourth, the teaching focus:

1, the long history of information technology 2, the development trend of information technology 3, the rational use of information technology

Five, teaching difficulties:

1, the development trend of information technology 2, the rational use of information technology

Six, teaching methods:

This lesson mainly adopts the following methods: lecture, discussion, inquiry, questioning method, guidance, teacher-student summary and so on.

Teaching process:

Review: Question: What are the four characteristics of information?

Introducing the new curriculum into teachers' activities;

1, students, today we will learn the section "information technology changing with each passing day". First, please read a news item at the beginning of this section:

Question: What does the above story show?

The importance of information and its information technology to us human beings.

First, the development history of information technology

Teacher activities:

IT (information technology)

Information technology: All technologies related to information acquisition, processing, expression, communication, management and evaluation can be called information technology. It can be said that where there is information technology, there are human beings, and there have been five information technology revolutions in human history:

Teacher's activity: Give students 3 minutes to read page 6, and ask them to remember "the five revolutions of information technology" as much as possible.

The first time: the use of language

The second time: coinage

The third time: the invention of printing

The fourth time: the invention and popularization of telegraph, telephone, radio and television.

The fifth time: the popularization and application of computer technology and modern communication technology

Second, the development trend of information technology:

Only choose two points to explain, and the rest of the next class will be studied through network, mutual assistance and inquiry.

1, more and more friendly man-machine interface.

Teacher activities: The increasingly friendly man-machine interface is actually based on the operating system. Explain the difference between DOS and WINDOWS. (Introduction)

DOS:

DOS is actually the abbreviation of DiskOperationSystem. As the name implies, this is an operating system based on disk management. It is in the form of command line, through the input of commands for man-machine dialogue, the instructions are transmitted to the computer in the form of commands, so that the computer can realize the operation. Therefore, as users, we have to recite many complicated commands in order to use the computer well.

WINDOWS: using GUI- mouse/graphical user interface.

The graphical user interface design of human-computer interaction presents the interaction in a visual graphic way. Example: View files, copy files and delete files.

How to realize (1) WINDOWS (student demonstration)

(2) How to realize it under DOS (teacher demonstration)

Through explanation and analysis, students gradually feel that DOS to WINDOWS is a better man-machine interface.

① Virtual reality technology

Applications: architecture, surgeons, military.

② Phonetic technology

Speech recognition technology, speech synthesis technology

Applications: voice input method, unattended telephone service, dedicated voice direct translation.

③ Intelligent agent technology

Office Assistant

You can learn more about related concepts through the internet.

2, more and more personalized function design wallpaper, personalized signature (QQ), personalized ringtone carefully read the ninth page of the book.

3, the cost performance is getting higher and higher.

Teacher's activity: Please pay attention to the table on page 9 of the textbook. Student activity: Read the form carefully.

Teacher activity: What problems do you see from this table?

Student 1: ...

Student 2: ...

Student 3: ...

Teacher-student summary:

The year is getting bigger and bigger, the performance is getting better and better, and the price is getting lower and lower.

Third, the rational use of information technology debate: the advantages and disadvantages of information technology to explain three views:

(1) Copy other people's articles from the Internet when doing homework. Isn't it mine?

(2) surfing the internet is just chatting and watering. What else can I do?

(3) On the Internet, no one will know who I am? It doesn't matter what I say or do.

Exercise:

Use the internet to find the relevant information of "virtual reality technology", "voice technology" and "intelligent agent technology", and ask questions in the next class.