This document provides an overview of teaching methods and sessions for various IT subjects taught by Ms. V. Vennila at Bon Secours College for Women in Thanjavur. It describes her 9-step teaching session format for Java Programming, Mobile Computing, and Mini Projects that includes warm-up activities, teaching aids, information bits, practice and review zones, life skills, cross-connections, additional ideas, and self-assessments. Key inheritance concepts in Java like single, multi-level and hierarchical inheritance are also summarized. Finally, it outlines a research topic on using persuasive click points to strengthen graphical passwords against online guessing attacks and improve user security.
3. TEACHING SESSION
KEY FEATURES JAVA PROGRAMMING
1. WARM UP ( 5 Mints) Let students do some warm up
2. TEACHING AID ( 20 Mints) Outlines the topic that will be taught using chalk
and talk.
3. INFO BIT ( 2 Mints) Provides interesting information related to the
java
4. PRACTICE ZONE ( 5 Mints) Find out the Java quizzes
5. REVIEW ZONE ( 5 Mints) Applies the concept one java program exercises
which they learnt in previous classes
6. ENHANCE LIFE SKILLS ( 2 Mints) Contains java questions related to real time
applications
7. CROSS CONNECTION ( 2 Mints) Applies the knowledge and skills learnt in java to
other programming languages.
8. SOMETHING MORE ( 2 Mints) Includes ideas for projects using java
programming language.
9. TEST YOURSELF ( 2 Mints) Contains assessment papers for testing the
concepts learnt
4. TEACHING SESSION
KEY FEATURES MOBILE COMPUTING
1. WARM UP ( 5 Mints) Let students do some warm up by asking them
some prompts about mobile phones.
2. TEACHING AID ( 20 Mints) Outlines the topic that will be taught about the
mobile phones.
3. INFO BIT ( 2 Mints) Provides interesting information related to the
computation of mobile.
4. PRACTICE ZONE ( 5 Mints) Record and shared their ideas about mobiles.
5. REVIEW ZONE ( 5 Mints) Applies the concept of one mobile to another
mobile.
6. ENHANCE LIFE SKILLS ( 2
Mints)
Contains questions related to real-life situations
7. CROSS CONNECTION ( 2
Mints)
Applies the knowledge and skills learnt in science
to other subjects
8. SOMETHING MORE ( 2
Mints)
Includes ideas for experiments and projects
9. TEST YOURSELF ( 2 Mints) Contains assessment papers for testing the
concepts learnt
5. TEACHING SESSION
KEY FEATURES MINI PROJECT
1. WARM UP ( 5 Mints) Let students do some warm up discussion about
our college needs to do some project.
2. TEACHING AID ( 20 Mints) Outlines the topic that will be taught.
3. INFO BIT ( 2 Mints) Provides interesting information related to the
topic
4. PRACTICE ZONE ( 5 Mints) Find out the real time applications.
5. REVIEW ZONE ( 5 Mints) Applies and discuss with the concept to the
students project.
6. ENHANCE LIFE SKILLS
( 2 Mints)
Contains questions related to web based
applications.
7. CROSS CONNECTION
( 2 Mints)
Applies the knowledge and skills learnt in real
time projects to other subjects
8. SOMETHING MORE
( 2 Mints)
Includes ideas for experiments and projects
9. TEST YOURSELF ( 2 Mints) Contains assessment papers for testing the
concepts learnt
6. JAVA – INHERITANCE
What is Inheritance?
Inheritance is a mechanism in which one class acquires the property of
another class.
SYNTAX
class Vehicle
{
......
}
class Car extends Vehicle
{
....... //extends the property of vehicle class.
}
Now based on above example.
Vehicle is super class of Car.
Car is sub class of Vehicle.
Car IS-A Vehicle.
7. PROGRAM FOR INHERITANCE
class Parent
{
public void p1()
{
System.out.println("Parent method");
}
}
public class Child extends Parent {
public void c1()
{
System.out.println("Child method");
}
public static void main(String[] args)
{
Child cobj = new Child();
cobj.c1(); //method of Child class
cobj.p1(); //method of Parent class
}
}
OUTPUT
Child method
Parent method
9. RESEARCH TOPIC
DEFENSES AGAINST ONLINE PASSWORD GUESSING
ATTACKS BY USING PERSUASIVE CLICK POINTS
AIM:
“Defenses against online password guessing attacks by
using persuasive click points” provides graphical passwords
which was pixel-based essentially use images or
representation of images as passwords.
It aims to provide users with secure computing environments.
10. ABSTRACT
• Users often create memorable passwords that are easy for
attackers to guess, but assigned passwords are difficult for
users to remember.
• Graphical pixel based password is easy to remember as
well as difficult to guess.
• The major goal of this work is to reduce the guessing
attacks as well as encouraging users to select more
random, and difficult passwords to guess.
11. ABSTRACT CONTINUES..
• Graphical passwords essentially use pixel based images
or representation of images as passwords.
• There are various graphical password schemes or
graphical password software in the market. However,
very little research has been done to analyze graphical
passwords that are still immature.
• Therefore, this project work merges persuasive
cued click points and password guessing resistant
protocol.