0% found this document useful (0 votes)
330 views

Lesson Plan in Empowerment Technology 11

Uploaded by

Mariedel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
330 views

Lesson Plan in Empowerment Technology 11

Uploaded by

Mariedel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

LESSON PLAN IN EMPOWERMENT TECHNOLOGY 11

Name: MARIEDEL E. JUAYANG Grade Level Grade 11


Learning Area Empowerment Technology
Teaching Date March 27, 2022 Quarter Quarter I

I. OBJECTIVES
The learners demonstrate an understanding of: ICT in the context of global
A. Content Standards communication for specific professional track

The learners shall be able to: at the end of the 2-week period
independently compose an insightful reflection paper on
B. Performance Standards the nature of ICT in the context of their lives, society, and
professional tracks (Arts, Tech Voc, Sports, Academic)

C. Most Essential
Apply online safety, security, ethics, and etiquette standards and practice in the
Learning Competencies
use of ICTs as it would relate to their specific professional tracks
(MELC)
a. Identify online safety measures
b. Define online ethics and netiquette
c. Apply online safety, security, ethics and etiquette standards and practice in
D. Objectives
the use of ICT’s
d. Appreciate the importance of online ethics and netiquettes

E. Integration
II. CONTENT ONLINE SAFETY, SECURITY, ETHICS AND ETIQUETTE.
III. LEARNING
CONTENT
References
Materials
IV. PPROCEDURE
A. Reviewing previous A. Preliminary Activities:
lesson or presenting the
new lesson (Introductory  Prayer
Activity)  Greetings

Good morning class! How are you today?


I hope everyone is fine!
Are you ready to our new lesson this
morning?

 Checking Attendance

B. Revie

Based on our lesson yesterday about the State of


ICT Technologies. I have here a concept map and
all you have to do is to answer in what way is ICT
very useful in your studies.
What way is
ICT very useful
in your studies?

Motivation:

Self -Check on Online Habits

Directions: Reflect and assess yourself on your online


habits in the following statements. If “yes” show thumbs
up and “no” thumbs down.

1. I always talk to strangers on social media.


2. Giving your passwords to your friends.
3. Posting about future vacations.
4. Visiting unsecured websites.
5. Ranting on social media
6. Posting image or video without asking permission
from the owner.
B. Establishing a
Purpose for the Lesson Ask: (HOTS)
(Motivation)  Why is it bad to talk on strangers on social
media?
 Are you also aware that you are visiting
unsecured websites?
 Do you rant on social media especially
when you have enemy?
 How are we going to manage ourselves by
posting in social media?

Say: In the activity above you assessed yourself in online


habits. Those habits might be good or bad that you must
be aware. If you keep practicing those bad habits it might
bring you danger. Safety is the first thing you must
consider in using internet.

C. Presenting Unlocking Difficulties:


examples/instances of the
new lesson 1. Ethics- a set of moral principles: a theory or
(Demonstration/Modelling) system of moral values
2. Netiquette- It is a word that came from the two
words “net” and “etiquette”. It is an etiquette
applied online that shows proper manner and
behavior.
Say: We have learned in lesson 1 about the current state
of Information and Communication Technology in global
setting. There are various online platforms and sites that
people used today as their medium of communication and
source of information. This communication technology
spread fast to the people and even controls their lives.
Despite of the good benefits given to us by the technology
there are stills things that we must be aware of.
In this lesson we will discuss and give importance in
online safety, security, ethics and netiquette.

D. Discussing new Discuss the Online Safety, Security, Ethics and


concepts and practicing Netiquette.
new skills #1 (Analysis)
Tips on how to be safe online

1. Do not share your password with anyone.


2. Add friends you know in real life.
3. Do not visit untrusted websites.
4. Add password to your WIFI at home to make it
private.
5. Install and update antivirus in your computer.
6. Do not give your personal information to anyone
7. Think before you click.
8. Never post about your future vacation.

Internet Risk
a. Cyberbullying
It happens when someone intentionally abused, harass,
and mistreated by
other person using electronic communication.

b. Identity Theft
It is a crime of stealing personal information for the
purpose of assuming that person’s name or identity to
make any form of transactions.

c. Cyber Stalking
A criminal practice where electronic communication is
used to stalk or harass individual or group.

d. Sexting
The act of sending sexually explicit text messages,
images, and videos.
Internet Threats
Malware – also known as Malicious Software.

Types of Malware
1. Virus – a malicious program that replicate itself by
copying itself to another program.
2. Trojan Horse – a malicious program that disguised as
legitimate program that user will accept and use but take
control of your computer.
3. Worm – malicious program that copy’s itself and
spreads to other computers.
4. Spyware – A malicious program that gathers
information from victim’s computer and send it back to
the hacker.
5. Adware – An unwanted advertisement that will pop-up
several times on victim’s computer then behave
abnormally and tedious to close them.
6. Keylogger – A program that runs in the background and
steals user credentials and confidential information and
send back to hack by recording every keystroke that a user
makes on their computer or device.
7. Botnet – A collection of infected internet–connected
devices such as PC and mobile phone that are controlled
by a common type of malware.
8. Rootkit – A software tools used by hackers to gain
control over a computer on a network without being
exposed.
9. Ransomware – A ransom virus that block the user from
accessing the programs or files and demands to pay the
ransom through online method for the removal of the
virus.

Spam
Also known as junk email or unwanted email send by
advertiser or bot. It can be used to send malware.

Phishing
A cyberattack method using deceptive emails and
websites to acquiring sensitive personal information.

Cybercrime
A crime in which computer is used as object and tool in
committing a crime such hacking, phishing, spamming,
child pornography, libel, hate crimes, identity thief and
others.

Cybercrime Law
A law that deals with all forms of cybercrime

Ask: (HOTS)
How do you keep yourself safe and secure online?
Why is it important to observe netiquette online?
The Core Rules of Netiquette by Seth T. Ross

1. Remember the human.


2. Adhere to the same standards of behavior online that
you follow in real life.
3. Know where you are in cyberspace.
4. Respect other people's time and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
9. Don't abuse your power.
10. Be forgiving of other people's mistakes.
Activity 1-Think-Pair and Share

Direction: Group the students into two (2) and let them
pick 1 Social Media Task Card and present it in the class
after 5-10 minutes.

E. Discussing new
concepts and practicing
new skills #2 (Guided
Practice)

F. Developing Activity 2- True or False


mastery(Independent
Practice ) Directions: Write “True” if the statement is true and write
“False” if the statement is false.

1. It is right to copy the works of other people without


asking permission.
2. All Information from the internet are free.
3. Search engine is a tool used in internet research.
4. All information from the internet are reliable.
5. Google is an example of search engine.
6. Child pornography is a form of cybercrime.
7. Committing crime on the internet is not punishable by
law
8. Do not share personal information to suspicious website
or user.
9. Share your password with anyone.
10. Think before you click.

Say: Let’s have a Group Activity, I will group you into


three groups.
Group 1- Online Safety Poster! (Arts Integration)
Direction: Create a poster showing the Netiquette rules
with examples of how you can use them in your daily life,
primarily online. The poster should use an interactive
online tool like Canva, Glogster, Piktochart, etc
G. Finding practical
applications of concepts Group II- Sing me A Netiquette Song! (Music
and skills in daily living Integration)
(Application) Direction: Make a song or put the rhyme about The Core
Rules of Netiquette by Seth T. Ross

Group III- Think Before You Post! (PE Integration)

Direction: Show a role playing and make a broadcast


about Online Safety, Security, Ethics and Etiquette.

H. Making Ask: (HOTS)


generalizations and
abstractions about the How do you keep yourself safe and secure online?
lesson (Generalization) Why is it important to observe netiquette online?

I. Evaluating learning Direction: Read carefully and Choose the letter of the best
(Evaluation) answer

1. What is Netiquette?
A. Using a net to catch fish
B. Being mean to other people on Facebook
C. Presenting proper manners at the dinner table
D. Showing manners and etiquette on the Internet

2. What should you do if you receive a text or email


from someone you don't
know?
A. Call the police
B. Delete it without opening it
C. Open it immediately and reply
D. Leave it in your inbox until you figure out who
it is.

3. What should you do if you feel you are being


cyber-bullied?
A. Call the police
B. Tell no one, it's embarrassing
C. Tell a trusted adult like a parent or teacher
D. Just delete anything referring to you on the
Internet.

4. Knowledge and understanding of netiquette is


useful because _________

A. It will help you create a positive impression on


those you meet in cyberspace
B. It explains the conventions already being used
by millions of cybernauts
C. It explains some of the technical limitations of
online communications
D. all of the above.

5. You've been sent a virus warning, what should you


do now?
A. Ignore it.
B. Forward it within your company.
C. Forward it to everyone in your address book.
D. Go to a security Web site to learn if it is a real
virus.

Direction: Like any other rules, what you have learned


from this lesson could be applied to any task you do.
So start doing your part as a student and as you take steps
in preparing for your future.

What profession do you prefer to have in the future? In


what way could you make an impact on society using the
Internet? Answer the following question in essay
form. (Use a separate sheet of paper)

J. Additional activities for


application or
remediation(Assignment)

Prepared by:

MARIEDEL E. JUAYANG

You might also like