| Lesson Plan | |
| Grade: | Date: 17/01/2026 |
| Subject: Computer Science | |
| Lesson Topic: Describe and use methods of data verification during data entry and data transfer | |
Learning Objective/s:
|
|
Materials Needed:
|
Introduction: Begin with a quick poll: “When have you seen a typo or corrupted file cause a problem?” Connect this to prior knowledge of binary representation and error sources. Explain that today’s success criteria are to identify verification methods, choose the right one for a scenario, and demonstrate it in code. |
Lesson Structure:
|
|
|
Conclusion: Recap the five verification techniques and their ideal use cases. For the exit ticket, each student writes one method and a situation where it should be applied. Assign homework to research a modern hash function (e.g., SHA‑256) and prepare a short explanation of its role in data integrity. |
|
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.