School Week Teache R Quarter Second
School Week Teache R Quarter Second
Region III
Division of City of San Fernando DETAILED LESSON PLAN
EMPOWERMENT TECHNOLOGY 11
Page 1 of 18
The following are different multimedia content:
Page 2 of 36
A. Evaluating Learning
Department of Education
Page 3 of 36
Region III
Division of City of San Fernando
City of San Fernando West Integrated School
Release and
Planning Development Maintenance
Promotion
Page 5 of 36
3. Why is it important to follow the steps in ICT project
process?
Page 6 of 36
Subject Matter: ICT Project Publication and Statistics
Page 7 of 36
A. Evaluating Learning
Page 8 of 36
Department of Education
Region III
Division of City of San Fernando
City of San Fernando West Integrated School
Website Promotion
Page 9 of 36
Before digging deep with Google Analytics study the
following terminologies:
B. Evaluating Learning
Page 11 of 36
_____3. One of the key parts of website management
which includes the process of testing and logging
the status and uptime performance of a website.
_____4. An integral part of website maintenance and
development because it is the process of
reviewing and analyzing website performance,
stability, and overall user experience.
_____5. One of the most widely used free website
analytics platforms that provides statistics and basic
analytical tools for search engine optimization
(SEO) and marketing purposes.
_____6. It allows the user to create customized views of
Google Analytics data using widgets.
_____7. With This tool you can easily see the traffic
created by your website in a span of time.
_____8. It is used to quickly find data that links to your
google analytics reports.
_____9. This section showcases the current visitors’
pageviews, active pages, locations, and more._____10.
Alerts you can set up within Google Analytics that send
you e-mail notifications when a
specific event occurs.
Department of Education
Region III
Page 12 of 36
Division of City of San Fernando
City of San Fernando West Integrated School
7. Shop Around
Check out the competition and see what works well and
where you can improve on your website.
While it may make you feel a bit like you’re being
unfaithful, sometimes checking out the competition is a good
way to honestly appraise the condition of your current
website.
Page 15 of 36
2. BLACKMAIL/EXTORTION – the act of using the internet
to threaten or damage someone’s reputation to extort money
or anything else of value.
Extortion (also called blackmail, shakedown, out wresting,
and exaction) is a criminal offence of unlawfully obtaining
money, property, or services from a person, entity, or
institution, through coercion. Refraining from doing harm is
sometimes euphemistically called protection. Using the
Internet to threaten to cause damage with the intent to extort
from any person any money or other thing of value.
3. ACCESSING STORED COMMUNICATION – or hacking;
the act of obtaining unauthorized access to data from a
computer network.
Accessing Stored Communications or
hacking; Intentionally accessing, without authorization, a
facility through which an electronic communication service is
provided. The act of obtaining unauthorized access to data
from computer network. This is typically done to commercial
and government sites to threaten its owner. In late 2015, a
group of Anonymous Philippines hacked the Twitter account
of actress Maine Mendoza, who plays the famous character
Yaya Dub of the popular AlDub tandem and posted links and
messages on the account.
4. SPORTS BETTING – the act of wagering on any sports
event over the internet in some countries, gambling
Page 16 of 36
(including sports betting) is illegal even if you are doing it
over the internet.
5. NON-DELIVERY OF MERCHANDISE - is a scheme most
often linked to Internet auction fraud, in which a seller on an
Internet auction website accepts payment for an item yet
intentionally fails to ship it.
Devising any scheme to defraud, or for obtaining money or
property by means of false or fraudulent pretenses, or
promises, and using the Internet for the purpose of executing
the scheme. The non-delivery scam occurs when the
scammer places an item up for sale when there is actually
no item at all. The item is subsequently never delivered to
the buyer after they purchase the item.
A. Developing mastery
Activity: Responsible Use of Technology
As a responsible user of technology, we should be aware of
the limitations of using the internet. Do the following:
1. Write the internet crimes that are rampant today.
2. Research on the punishments for the said crimes.
3. Reflect if these punishments are fair or not.
4. Write your answer on a long bond paper and don’t
forget to site the sources.
Evaluating Learning
Guide Questions:
1. How did this subject change the way you view ICT?
Page 18 of 36