0% found this document useful (0 votes)
2 views

Lesson 4

The lesson plan focuses on empowering learners with knowledge about online safety, security, and netiquette in the context of ICT. Students will engage in activities to identify online threats, reflect on their online presence, and summarize privacy policies. The plan includes assessments and reflections to evaluate student understanding and teaching effectiveness.

Uploaded by

JAM BOY PLANCA
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Lesson 4

The lesson plan focuses on empowering learners with knowledge about online safety, security, and netiquette in the context of ICT. Students will engage in activities to identify online threats, reflect on their online presence, and summarize privacy policies. The plan includes assessments and reflections to evaluate student understanding and teaching effectiveness.

Uploaded by

JAM BOY PLANCA
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Lesson Plan in Empowerment Technology

Content Standards: The learners demonstrate an understanding of:


ICT in the context of global communication for
the _________ Track.
Performance Standards: The learners shall be able to at the end of the 2-
week period independently compose an insightful
reflection paper on the nature of ICT in the
context of their lives, society, and professional
tracks.

Learning Competencies and Code: Apply online safety, security, ethics, and etiquette
standards and practice in the use of ICT as it
would relate to the _______track.
S_ICT11/12-ICTPT-Ia-b-2
Quarter: First Week: 1 Day: 4

I. Objectives:

At the end of the lesson, 100% of the learners are expected to:
a. Determine the common online threats;
b. Consider one’s and others’ safety when sharing information using the internet;
and
c. Value the adage ‘think before you click”
II. Content

Subject Matter: Rules of Netiquette


Integration: Integration on Media and Information Literacy/Phil. Gov. and
Politics.
Strategies: Lecture; Collaborative Learning;.
Materials: PPT presentation, Laptop, TV, Computer units with peripherals.
References: Teacher’s Guide, Learner’s Material, Empowerment
Technologies by Innovative Training Works, Inc.

PAGE \* MERGEFORMAT 16
III. Learning Tasks

Preliminaries Opening Prayer


Greetings
Classroom management
Checking the attendance

Review of previous lesson Guess the word game;


Mechanics;
1. Group the class and give the instruction of the
game.
Game Instructions:
2. Guess the word by arranging the scrambled
letters presented through PPT.
3. Answers should be written in the card board
given to each group.
4. Each group who got the correct word should say
something about their answer.
5. Points will be given as reward to each group who
got the correct answers.
Sample Words/terms for the game.
a. Facebook
b. Plurk
c. Reddit
d. Goole
e. blogger

A. Activity 1. Using your mobile phones, go to google search


engine and try to type your name and search.

B. Analysis Ask the following questions;


1. Did you get links to your profile page?
2. How can search engine locate you?
3. Is there any danger of being found in search engine?

C. Abstraction The teacher will play a video following this link:


http://www.youtube.com/watch?v=2vnAV2ibf2c
After the video presentation ask this questions:
How safe are you online?
Power point presentation of the following topic will

PAGE \* MERGEFORMAT 16
follow;
1. Online safety and security.
2. Tips to stay safe online
(See appendix A-4)

D. Application Group Activity


Using your desktop, visit the facebook site and look for
the sites privacy policy. The link typically found at the
bottom of the page and sometimes labeled only as
“Privacy”. Write a summary on how the website handles
both your private and public information.
Option if computer laboratory is unavailable.
Use a printed copy of the privacy policy of facebook.

A group representative will be randomly selected to


present the group’s output.

IV. Assessment/Evaluation
Write YES if you agree with the statement and NO if you disagree on the blank
before each number.
___1. Your friend told you that his college application was rejected due to the fact
that you posted a video of him doing crazy stuff at a party. You posted the \
video several years ago but later took it down to protect your friend’s
reputation. Can your friends be right that the college found the video?
___2. Search engines scan websites for search results even if you have set your
post to “private’.
___3. There is danger in posting information about a future vacation.
___4. Letting people know your birthday is probably a must if you want to get as
many gifts as possible. But having it in your profile makes you vulnerable
to identity theft.
___5.You and your best friend play a lot of video games. One time, she asks you
for your password so she can help you level up and get in-game money
She promised to keep your password secret. Is it okay to give away your
password?

V. Assignment/Enrichment

Look for the meaning of the following words;


a. Virus
b. Malwares
c. Worm

PAGE \* MERGEFORMAT 16
d. Trojan
e. spyware

Reflection:

A. No. of learners achieve 80%:


B. No. of learners who require additional activities for remediation:
C. Did the remedial lesson work?
D. No. of learners who have caught up the lesson:
E. No. of learners who continue to require remediation:
F. Which of my teaching strategies work well? Why did this work?
G. What difficulties did I encounter which my principal or supervisor
help me solve?
H. What motivation or localized materials did I use/discover which I
wish to share with other teacher?
A. No. of learners achieve 80%:

PAGE \* MERGEFORMAT 16

You might also like