Lesson Plan

Lesson Plan
Grade: Date: 25/02/2026
Subject: Information Communication Technology ICT
Lesson Topic: Know and understand the methods that software producers employ to prevent software copyright legislation being broken
Learning Objective/s:
  • Describe the legal measures (EULA, copyright notices) software producers use to protect their products.
  • Explain how technical protection measures such as DRM, product activation, licence keys, dongles, obfuscation and watermarking function.
  • Compare the advantages and disadvantages of at least three protection methods.
  • Evaluate why a layered approach (legal, technical, operational) is most effective against software piracy.
Materials Needed:
  • Projector and screen
  • Laptop with internet access
  • Printed handout of the protection‑methods comparison table
  • Sample software trial for a short activation demo
  • Worksheet for group activity
  • Exit‑ticket slips or digital quiz link
Introduction:

Begin with a brief news clip about a recent software piracy case to capture interest. Ask learners what they already know about copyright and why software is treated as intellectual property. Explain that by the end of the lesson they will be able to identify and evaluate the methods producers use to protect software and how these relate to legislation.

Lesson Structure:
  1. Do‑Now (5'): Students list any protection methods they have encountered on their devices.
  2. Mini‑lecture (10'): Present legal measures (EULA, copyright notices) with slide examples.
  3. Technical demo (15'): Show a DRM‑protected trial application, walk through product activation and licence‑key entry.
  4. Group activity (15'): Using the handout, groups fill a pros/cons chart for three methods (e.g., DRM, dongle, watermarking).
  5. Class discussion (10'): Groups share findings; teacher highlights the need for a layered approach.
  6. Exit ticket (5'): Students write one protection method they consider most effective and why.
Conclusion:

Recap the key points: legal contracts, technical barriers, and operational controls work together to deter piracy. Collect exit tickets to gauge understanding and assign a brief homework task – research a real‑world software piracy incident and write a short reflection on which protection measures could have prevented it.