Lesson Plan in Empowerment Technology 11
Lesson Plan in Empowerment Technology 11
I. OBJECTIVES
The learners demonstrate an understanding of: ICT in the context of global
A. Content Standards communication for specific professional track
The learners shall be able to: at the end of the 2-week period
independently compose an insightful reflection paper on
B. Performance Standards the nature of ICT in the context of their lives, society, and
professional tracks (Arts, Tech Voc, Sports, Academic)
C. Most Essential
Apply online safety, security, ethics, and etiquette standards and practice in the
Learning Competencies
use of ICTs as it would relate to their specific professional tracks
(MELC)
a. Identify online safety measures
b. Define online ethics and netiquette
c. Apply online safety, security, ethics and etiquette standards and practice in
D. Objectives
the use of ICT’s
d. Appreciate the importance of online ethics and netiquettes
E. Integration
II. CONTENT ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE.
III. LEARNING
CONTENT
References
Materials
IV. PPROCEDURE
A. Reviewing previous A. Preliminary Activities:
lesson or presenting the
new lesson (Introductory Prayer
Activity) Greetings
Checking Attendance
B. Revie
Motivation:
Internet Risk
a. Cyberbullying
It happens when someone intentionally abused, harass,
and mistreated by
other person using electronic communication.
b. Identity Theft
It is a crime of stealing personal information for the
purpose of assuming that person’s name or identity to
make any form of transactions.
c. Cyber Stalking
A criminal practice where electronic communication is
used to stalk or harass individual or group.
d. Sexting
The act of sending sexually explicit text messages,
images, and videos.
Internet Threats
Malware – also known as Malicious Software.
Types of Malware
1. Virus – a malicious program that replicate itself by
copying itself to another program.
2. Trojan Horse – a malicious program that disguised as
legitimate program that user will accept and use but take
control of your computer.
3. Worm – malicious program that copy’s itself and
spreads to other computers.
4. Spyware – A malicious program that gathers
information from victim’s computer and send it back to
the hacker.
5. Adware – An unwanted advertisement that will pop-up
several times on victim’s computer then behave
abnormally and tedious to close them.
6. Keylogger – A program that runs in the background and
steals user credentials and confidential information and
send back to hack by recording every keystroke that a user
makes on their computer or device.
7. Botnet – A collection of infected internet–connected
devices such as PC and mobile phone that are controlled
by a common type of malware.
8. Rootkit – A software tools used by hackers to gain
control over a computer on a network without being
exposed.
9. Ransomware – A ransom virus that block the user from
accessing the programs or files and demands to pay the
ransom through online method for the removal of the
virus.
Spam
Also known as junk email or unwanted email send by
advertiser or bot. It can be used to send malware.
Phishing
A cyberattack method using deceptive emails and
websites to acquiring sensitive personal information.
Cybercrime
A crime in which computer is used as object and tool in
committing a crime such hacking, phishing, spamming,
child pornography, libel, hate crimes, identity thief and
others.
Cybercrime Law
A law that deals with all forms of cybercrime
Ask: (HOTS)
How do you keep yourself safe and secure online?
Why is it important to observe netiquette online?
The Core Rules of Netiquette by Seth T. Ross
Direction: Group the students into two (2) and let them
pick 1 Social Media Task Card and present it in the class
after 5-10 minutes.
E. Discussing new
concepts and practicing
new skills #2 (Guided
Practice)
I. Evaluating learning Direction: Read carefully and Choose the letter of the best
(Evaluation) answer
1. What is Netiquette?
A. Using a net to catch fish
B. Being mean to other people on Facebook
C. Presenting proper manners at the dinner table
D. Showing manners and etiquette on the Internet
Prepared by:
MARIEDEL E. JUAYANG