Detailed Lesson Plan SHS
Detailed Lesson Plan SHS
Detailed Lesson Plan SHS
I. Objectives
A. Content Standard
The learners demonstrate an understanding of:
How to avoid the dangers of the Internet.
B. Performance Standard
The learners shall be able to:
Make a campaign materials in the form of small posters promoting
“Think Before You Click”
C. Learning Competency
Apply online safety, security, ethics, and etiquette standards and
practice in the use of ICTs Q1 Week 1-2CS_ICT11/12-ICTPT-Ia-
b-2
II. Content
Online Safety, Security, Ethics, and Etiquette
B. Activities
Observation
The teacher will show some images to the students related with the upcoming discussion.
Each student will be given 1 minutes to write their observation on the following images.
After the activity the students will share their observation about the image.
Activity 2.
C. Analysis
D. Abstraction
a. Video clip: 3-5minutes. Teacher shows related video Watch the video “Digital
Life 101,” (https://www.youtube.com/watch?v=MkwmD6OQrWQ
E. Application
The class will be divided into 5 groups. They will create campaign materials in the form
of small posters promoting “Think before You Click”.
E. Evaluation. I. MULTIPLE CHOICE: Choose the letter of your answer in each of the
following statements and write it on the space provided.
________1. Which of the following terms refers to a program that runs in the background
without you knowing it?
a. Spyware b. Adware c. Spam d. Virus
________2. What do you call a small pictures found on the desktop. These are symbols
representing
programs, applications, or files?
a. Adware b. Key loggers c. Spyware d. Spam
________3. How are unwanted emails from bots and advertisers called?
a. Spam b. Trojan c. Virus d. Worm
________4. How is phishing done?
a. Advertisements are sent to a user. b. Keystrokes done by a user are
recorded. c. The Domain Name Service system is exploited. d. An email is sent
that directs a user to visit a website and asked to update personal information.
________5. What information is okay to give out on the internet?
a. Name b. Address c. Phone Number d. None
II. Enumeration. Provide Five Tips so you stay safe on social networking
sites and 4 Tips to Combat Viruses, Worms and Trojan Horses on Your
Computer
F. Assignment
Make a 3-minutes video presentation on how to avoid Internet Threats.
Prepared by: