Cs Ict11 12 Ictpt Ia B 1sesion1
Cs Ict11 12 Ictpt Ia B 1sesion1
Cs Ict11 12 Ictpt Ia B 1sesion1
I. OBJECTIVES
A. Content Standard
The learners demonstrate an understanding of: ICT in the context of global communication for
specific professional track.
B. Performance Standard
The learners shall be able to: at the end of the 2 week period independently compose an insightful
reflection paper on the nature of ICT in the context of their lives, society, and professional tracks
(Arts, Tech-Voc., Sports and Academic).
C. Learning Competency
Apply online, safety, security, ethics, and etiquette standards and practice in the use of ICTs as
it would relate to their specific professional tracks.
D. Learning Competency Code
CS_ICT11/12-ICTPT-Ia-b-2
Content
Categories on how to use the internet
LEARNING COMPETENCIES
A. References
https://empowermenttech12.wordpress.com/2017/06/24/online-safety-security-ethics-and-
etiquette/
Empowerment Technologies Innovative Training Works Inc.
B. Materials
Computer, computer application software, LCD projector
II. PROCEDURES
A. Reviewing previous lesson
Note to the Teacher:
As a sort of review, the teacher will ask the following question to the class:
1. What is a semantic web?
2. Differentiate Web 1.0 and web 2.0.
3. What is a web browser?
4. Who develop the world wide web?
5. What are the six types of social media?
Additional activities for application or remedial
B. Establishing a purpose for the lesson:
Teacher says, ”Today we are going to discuss about applying online safety, security, ethics and
etiquette standards and practice but before we can apply it we will tackle first different categories on
how to use the internet. The importance of this topic is that it will help us to be acquainted on how
to use the internet properly as well as the appropriate sites that you need to visit that suit to your
need while on the net different. It will also serve us a guide and help us to open our mind about to
become a responsible user of a social networking sites and browsing the internet efficient and proper
through proper referencing. And of course, for our own security while we are on the net.
Presenting examples/instances of the new lesson
Practicing new skills #
Teacher say:
Most of us use internet every day. Sometimes, we do not pay attention on how much information
we share online.
Note to the Teacher:
Though a slide presentation a teacher will present a table that contains a question and let the student
respond the questions. Titled: HOW Safe Are You
INFORMATION SHARED NOT SHARED
1.First name
2. Last name
3. Middle name
4. Current and previous school
5. Cellphone number
6.Name of your mother
8. Your address
9. your home and phone
number
10. Your birthday
Note to the teacher: The teacher will connect to the new topic.
Lesson 1: Online Safety and Security
Teacher says:
Internet as a powerful tool, used to promote business, gain new friends, and stay in touch with old
ones. It can be a source of entertainment through games, online communities and everything in
between. But most like things in the world, there is always the “other side of the coin”. The internet is
one of the most dangerous places, especially if you don’t not know what you are doing with it.
Note to the teacher:
A table is presented to the student through a slide presentation titled “How Safe Are You?”
The class scrutinize each item and see how risky it is to share them.
TYPE OF INFORMATION RISKS
1. First name There is a risk in sharing your first name.
Chances are, a hacker may already know plenty
of stuff you even if you only give out your first
name. Likewise, you can cot just walk in a room
and start introducing yourself to everyone. You
don’t not know whom you can across with.
2. Last name If sharing your first name is a small risks, having
both your first and last is more risky. You will
vulnerable to being searched for using search
engine, which include image search. Matching
a name with a face is a modus to several
cybercrimes like identity theft.
3. Middle name Sharing your middle name alone is probably
not most risky of these shared information, but
sharing your full name would be.
4. Current and previous school(s) Most people steal identities study their subject.
They can use this information for verification.
Purposes.
5. Your cellphone number Your cellphone number should never be posted
over the net. Since it is a public places, it is the
same as posting your number on a billboard.
You would not want random strangers to text
or call you, o worse, pretend that they are
someone else.
6. The name of your mother and father Risky, yet not as risky posting their full names,
especially your mother’s maiden name. In fact,
you may have encountered many websites that
require your mother’s maiden name as an
answer to a secret question whenever you lose
your password.
7. The name of your siblings Disclosing this is a huge risk. Strangers may
pretend or use their identity to dupe you.
8. Your address Hopefully you answered “no” to this one.
Giving the interest to your number is one thing;
giving them your address is a whole other level.
It would be much easier for criminals to find
you.
9. Your home phone number This shared information more risky than
sharing you personal phone number. Scams
usually use this information to deceive you, one
of which is when stranger pretends to know
your parents or pretend to be you.
10. Your birthday Letting people know your birthday I probably s
must if you want to get as many gifts as
possible. But having it in you profile makes you
vulnerable to identity theft.
C. Developing Mastery.
D. Finding practical application of concepts and skills in daily living
The teacher will give a question and let the learners answer it using a one half sheet of paper.
As a Netizen, after knowing the risk of the information that you have shared over the net, what are
the ways that you are about to change especially in sharing information on the net.
E. Making generalizations and abstractions about the lesson
Teacher say:
Class, Internet is defined as information high way. Which means that anyone has access to this
highway, can place and can grab that information. Any information, even things that have set privately,
ca be accessed on way or another. The threat of cybercrime is very real. Whatever you shared today could
affect our future.
Evaluating Learning
Pencil Paper Test (5pts) ½ c.w.
In a 50 words, what are the learnings that you have gain especially in sharing information on the
net.
Giving of Assignment
I. REMARKS
_________________________________________________________________________________
_________________________________________________________________________________
_________________________________________________________________________________
II. REFLECTION
A. No. of learners who earned 80% in the evaluation.
_________________________________________________________________________________
_________________________________________________________________________________
B. No. of learners who require additional activities for remediation who scored below 80%-
_________________________________________________________________________________
C. Did the remedial lessons work? No. of learners who have caught up with the lesson
_________________________________________________________________________________
_________________________________________________________________________________
____________________________________________________________
F. What difficulties did I encounter which my principal or supervisor can help me solve?
_________________________________________________________________________________
_________________________________________________________________________________
G. What innovation or localized materials did I use/discover which I wish to share with other
teachers?_________________________________________________________________________
____________________________________________________________________