Detailed Lesson Plan SHS

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Lesson Plan in Empowerment Technologies

I. Objectives
A. Content Standard
The learners demonstrate an understanding of:
 How to avoid the dangers of the Internet.

B. Performance Standard
The learners shall be able to:
 Make a campaign materials in the form of small posters promoting
“Think Before You Click”

C. Learning Competency
 Apply online safety, security, ethics, and etiquette standards and
practice in the use of ICTs Q1 Week 1-2CS_ICT11/12-ICTPT-Ia-
b-2
II. Content
 Online Safety, Security, Ethics, and Etiquette

III. Learning Resources

 References: Empowerment Technologies


 Other Learning Resources : Empowerment Technologies Rex Book Store
 Materials: Projector, PPT, video presentation
IV. PROCEDURES
A. Pre- Activities
a. Prayer
John, kindly lead the prayer. The Lord’s prayer
Good morning class? Good morning ma’am Ann
Take your seats.
b. Checking of attendance
Class monitor, kindly check the attendance.
Who are absent for today? All are present ma’am
Class. If the teacher is talking here in front What will you do?
Yes Anna? Listen and participate ma’am
That’s right.
Can I expect that from your class? Yes Ma’am.
Very Good.
c. Review
Who can give us the recap on what we have discussed last meeting? Yes ,Caitlyn?
Ma’am, last meeting we discussed the networks.
Network, or communications network, is a system of interconnected computers,
telephones, or other communications devices that can communicate with one
another and share applications and data.

B. Activities
 Observation
The teacher will show some images to the students related with the upcoming discussion.
Each student will be given 1 minutes to write their observation on the following images.
After the activity the students will share their observation about the image.
Activity 2.

C. Analysis

 For the activity :Teacher Facilitates Q&A:


 Based from the activity, what did you observe?
 How do online, social media or any digital media affects anyone lives?
 Is our information shared online safe?
 Why is it important to stay safe online?

D. Abstraction

a. Video clip: 3-5minutes. Teacher shows related video Watch the video “Digital
Life 101,” (https://www.youtube.com/watch?v=MkwmD6OQrWQ

b. Lecture: Teacher says:

 How stay safe online


 Tips so you stay safe on social networking sites
 Other types of internet use E-mails, Spam &, Phishing and Viruses
 Tips to Combat Viruses, Worms and Trojan Horses on Your Computer

E. Application
The class will be divided into 5 groups. They will create campaign materials in the form
of small posters promoting “Think before You Click”.

E. Evaluation. I. MULTIPLE CHOICE: Choose the letter of your answer in each of the
following statements and write it on the space provided.

________1. Which of the following terms refers to a program that runs in the background
without you knowing it?
a. Spyware b. Adware c. Spam d. Virus
________2. What do you call a small pictures found on the desktop. These are symbols
representing
programs, applications, or files?
a. Adware b. Key loggers c. Spyware d. Spam
________3. How are unwanted emails from bots and advertisers called?
a. Spam b. Trojan c. Virus d. Worm
________4. How is phishing done?
a. Advertisements are sent to a user. b. Keystrokes done by a user are
recorded. c. The Domain Name Service system is exploited. d. An email is sent
that directs a user to visit a website and asked to update personal information.
________5. What information is okay to give out on the internet?
a. Name b. Address c. Phone Number d. None

 II. Enumeration. Provide Five Tips so you stay safe on social networking
sites and 4 Tips to Combat Viruses, Worms and Trojan Horses on Your
Computer

F. Assignment
 Make a 3-minutes video presentation on how to avoid Internet Threats.

Prepared by:

Rey Ann A. Rubio


Applicant

You might also like