0% found this document useful (0 votes)
4 views

Lesson 5

The lesson plan focuses on empowering students with knowledge about online safety, netiquette, and common internet threats. By the end of the two-week period, learners are expected to reflect on the impact of ICT in their lives and society. Activities include group discussions, games, and personal reflections to enhance understanding and application of the concepts.

Uploaded by

JAM BOY PLANCA
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Lesson 5

The lesson plan focuses on empowering students with knowledge about online safety, netiquette, and common internet threats. By the end of the two-week period, learners are expected to reflect on the impact of ICT in their lives and society. Activities include group discussions, games, and personal reflections to enhance understanding and application of the concepts.

Uploaded by

JAM BOY PLANCA
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Lesson Plan in Empowerment Technology

Content Standards: The learners demonstrate an understanding of:


ICT in the context of global communication for
the _________ Track.
Performance Standards: The learners shall be able to at the end of the 2-
week period independently compose an insightful
reflection paper on the nature of ICT in the
context of their lives, society, and professional
tracks.
Learning Competencies and Code: Apply online safety, security, ethics, and etiquette
standards and practice in the use of ICT as it
would relate to the _______track.
Quarter: First Week: 2 Day: 1

I. Objectives:

At the end of the lesson, 100% of the learners are expected to:
a. Determine the common online threats;
b. Consider one’s and others’ safety when sharing information using the internet;
and
c. Value the adage ‘think before you click”

II. Content

Subject Matter: Rules of Netiquette


Integration: Keeping oneself safe is a top priority of responsible Media and
Information Literate.
Strategies: Lecture; Collaborative Learning;. Guessing Game;
Differentiated Instruction
Materials: PPT presentation, Laptop, TV, Computer units with peripherals.
References: Teacher’s Guide, Learner’s Material, Empowerment

PAGE \* MERGEFORMAT 17
Technologies by Innovative Training Works, Inc.

III. Learning Tasks

Preliminaries Opening Prayer


Greetings
Classroom management
Checking the attendance
Review of previous lesson The teacher will ask the class this question:
1. How to stay safe online?

A. Activity Guess the word game; A group Activity

✔ Group the class by 5-6 students

✔ Each group will be given a cardboard and


chalk
Mechanics of the game;
1. Guess the word by arranging the scrambled
letters
Presented through PPT.
2. Answers should be written in the card board
given to each group.
3. Each group who got the correct word should say
something about their answer.
4. Points will be given as reward to each group who
got the correct answers.
Words/terms for the game.
✔ Virus

✔ Trojan

✔ Malware

✔ Spyware

✔ Spam

B. Analysis The following questions will then be asked to the


students:

PAGE \* MERGEFORMAT 17
◆ How dangerous are these internet threats?

◆ How to determine these threats?

◆ How can you avoid these threats?

C. Abstraction The teachers will open discussion to the class on the


following topics;
1. Internet Threats;
a. Malwares
Virus
Worm
Trojan
Spyware
Adware
b. Spam
c. Phishing
2. Protecting Reputation online
3. Think before you click
(See Appendix B-1)
Short Film Viewing on digital citizenship.
http://www.youtube.com/watch?v=2vnAV2ibf2c

D. Application Group Activity:


Mechanics:
1. Proceed to your Expert’s Group (Experts group
is the group created by teacher based on
students’ learning style)
2. Make a personal reflection on your digital media
life.
3. You have 15 minutes to prepare
4. Presentation of output should not go beyond 2
minutes.
5. Outputs may vary according to your expertise.
(ex. A poem, Role play, Jingle, Drawing, etc.)
6. Rubrics will be used to rate your performance
(Rubrics prepared by the teacher will be
distributed to each group for comments and
personal suggestions.)

IV. Assessment/Evaluation

Write YES if you agree with the statement and NO if you disagree on the
blank before each number

PAGE \* MERGEFORMAT 17
__1. Keyloggers are software that show pop-up ads even if you are not
using your browser.
__2. You received an email that your mother’s bank account is going to be
forfeited if you do not respond to the email. Is it safe to reply?
__3. My computer has an anti-virus so it is okay to open most email
attachments like e-cards and video files.

V. Assignment/Enrichment

Research a sample material for cybercrime.

Reflection:

A. No. of learners achieve 80%:


B. No. of learners who require additional activities for remediation:
C. Did the remedial lesson work?
D. No. of learners who have caught up the lesson:
E. No. of learners who continue to require remediation:
F. Which of my teaching strategies work well? Why did this work?
G. What difficulties did I encounter which my principal or supervisor
help me solve?
H. What motivation or localized materials did I use/discover which I
wish to share with other teacher?
A. No. of learners achieve 80%:

PAGE \* MERGEFORMAT 17

You might also like