Lesson Script Final_ W2
Lesson Script Final_ W2
C. Learning The Learners discuss the emerging trends and issues in ICT;
Competenci discuss the qualities of successful entrepreneurs in the field
es of ICT and discuss Occupational safety and Health ()OSH
standards in ICT environments.
II. CONTENT: 1. Trends and Issues in ICT;
2. Qualities of Successful Entrepreneurs in the
field of ICT; and
3. Occupational Safety and Health (OHS)
Standards in ICT.
III. LEARNING RESOURCES
A. References Department of Education. “MATATAG Curriculum in TLE-7
ICT.” Accessed July 6, 2024.
B. Other
Learning
Resources
IV. TEACHING AND LEARNING PROCEDURES
Day 1
Before/Pre-Lesson Proper
Activating Prior “Good , class! Welcome to our ICT class! I hope you’re all
Knowledge doing well today. Let’s make this session both informative
and enjoyable. Shall we begin?
2
Lesson
Purpose/Intention "All of these are examples of technology that are constantly
evolving. These changes in ICT are called emerging trends.
That’s what we’ll explore today!"
Lesson Language "Let’s learn some important words for today. Repeat after
Practice me and tell me if you’ve heard these words before."
TERM MEANING
Emerging Beginning to appear or develop; newly
becoming noticeable or important.
3
(Tunay na karanasan sa digital na
mundo)
3. Cloud Computing:
"When you save files in Google Drive or Dropbox, you’re
using the cloud. It’s like a huge online storage."
4
Examples:
Reporting cyberbullying to a teacher
Fact-checking fake news before sharing
Keeping passwords private
(Allow 10–15 minutes and present to class.)
After/Post-Lesson Proper
Making
Generalizations "What are the most common ICT issues?"
and Abstractions Student answers:
“Cyberbullying is common in group chats.”
“Many people fall for online scams.”
“We need to protect our passwords.”
5
C. Keeping passwords private and using strong ones
D. Sharing your login with a friend
Rubrics
6
Creativity & Exceptionally Creative use of Some visuals Lacks creativity;
Visual Appeal creative use of visuals and colors are used, but poster is plain or
colors, layout, that support the they lack visuals do not
and graphics to safety message creativity or support the
enhance message relevance message
Clarity of The message is The message is The message is The message is
Message clear, powerful, mostly clear and somewhat unclear or
and easy to understandable difficult to confusing
understand at understand or
first glance needs rewording
Effort & Poster shows Poster shows good Poster shows Poster is
Neatness outstanding effort and is fairly basic effort; a unfinished or
effort; neat and neat bit messy or shows minimal
well-presented rushed effort
Use of Shows skillful Demonstrates Tools used with Tools used
Digital/Manual use of digital or adequate use of some difficulty; ineffectively or
Tools traditional tools tools to create design elements not at all
for design visuals may appear
unbalanced
Additional
Activities for
Application or
Remediation (if
applicable)
Remarks
Reflection
Day 2
Before/Pre-Lesson Proper
Activating Prior
Knowledge “Good Day, class! Welcome to our ICT class! I hope you’re
all doing well today. Let’s make this session both
informative and enjoyable. Shall we begin?
Lesson
Purpose/Intention By the end of this session, you should be able to:
7
1. identify at least three common ICT issues, including
cyberbullying, online scams, and password misuse;
2. explain how responsible digital behavior can prevent
problems in online spaces; and
3. demonstrate safe and respectful practices when using
technology and interacting online.
TERM MEANING
Cyberbullyin The use of the internet or digital devices
g to harass, threaten, or bully others.
8
During/Lesson Proper
Reading the Key Teacher writes/displays:
Idea/Stem
📘 "ICT issues are problems or dangers we face when using
technology, especially when we are not careful online."
Developing Teacher provides 3 case scenarios (read aloud or show
Understanding of images):
the Key Idea
1. A student gets bullied through group chats.
2. A child gives away their password to a stranger.
3. A person clicks on a ‘You won!’ link and gets
scammed.
Discussion Questions:
What went wrong in each case?
What could the person have done differently?
After/Post-Lesson Proper
Making Teacher asks:
Generalization "What are the most common ICT issues?"
Student answers:
“Cyberbullying is common in group chats.”
“Many people fall for online scams.”
“We need to protect our passwords.”
Teacher wraps up:
"Technology is a gift — but we must use it wisely. Be smart,
be kind, and be safe online."
9
1. Anna received a message on social media saying mean
things about her and encouraging others not to talk to her.
She feels embarrassed and hurt.
What is this situation an example of?
A. Digital marketing
B. Cyberbullying
C. Social networking
D. Peer pressure
10
D. Laugh along so others won’t target him
11
C. Online safety and consent rule
D. Password protection rule
Answer Key:
Correct Rational
No.
Answer e
Mean messages and social
1 B. Cyberbullying exclusion online are forms of
cyberbullying.
This is the safest action when receiving
2 C. Delete the message and report it as spam
suspicious links.
B. Check why those permissions are needed Always review permissions to protect
3
before agreeing your privacy.
C. Check reliable news sources first before Prevents the spread of fake or
4
believing or sharing it misleading information.
C. Report the behavior and offer support to This is the most responsible and
5
the classmate empathetic response.
A strong password includes uppercase
6 C. Pa$$w0rd!84 and lowercase letters, symbols, and
numbers.
C. Strangers can misuse this information or Oversharing personal details online can
7
track their location lead to safety risks.
C. Log out of all accounts and clear the This protects your privacy when using
8
browser history public computers.
C. Double-check the facts with trusted Verifying information helps avoid using
9
websites or sources unreliable content.
Recording and sharing without permission
10 C. Online safety and consent rule
violates privacy and consent rules.
Additional
Activities
Remarks
Reflection
Day 3
Before/Pre-Lesson Proper
Activating Prior Good Day, everyone! Welcome to our ICT Class! I hope
Knowledge you’re all doing well today. Let’s make this session both
informative and enjoyable.
12
Facebook, Shopee, or even a simple buy-and-sell with
classmates?"
Follow-up:
"Those who do business using technology are called ICT
entrepreneurs. But what makes them successful? That’s
our topic today!"
TERM MEANING
Entreprene Someone who starts and runs a business
ur
"Isang taong nagsisimula at nagpapatakbo
ng negosyo."
Innovative Someone who likes to think of new and
creative ideas or ways to do things.
13
oriented focus to achieve a specific goal or
purpose.
During/Lesson Proper
Reading the Key
Idea/Stem "Successful ICT entrepreneurs are people who use
technology to start and grow businesses. They have special
qualities like being creative, disciplined, and open to new
ideas."
"These people are not just good at using gadgets — they are
leaders who turn ideas into income using ICT!"
14
Understanding of Instructions:
the Key Idea/Stem Form groups of 4.
Create a pretend character who is a successful ICT
entrepreneur.
Answer:
o What business do they have?
o What ICT tools do they use?
o What are their top 3 qualities?
Create a mini-profile poster or skit and share with the
class.
After/Post-Lesson
Proper
Making
Generalization "What do most ICT entrepreneurs have in common?"
Sample student responses:
"They are tech-savvy."
"They don’t give up easily."
"They like new ideas."
15
promote and sell products online?
A. A sketch pad
B. A spreadsheet program
C. A TV remote
D. A filing cabinet
Follow-up:
16
"Very good! Now… what about when we’re using
computers? Or working with wires and tools? Can accidents
still happen?"
YES! And that’s why we have Occupational Safety and
Health Standards (OSHS) — rules that protect workers,
including those in ICT.
“I want you to get into pairs or small groups. I’ll give you 2
minutes to spot at least three safety hazards in this
photo. Look closely! What can go wrong here? Talk about it
with your group.”
17
still matter.”
Lesson Language Let’s review some key terms. Repeat after me.
Practice
Term Meaning
Hazard A potential source of danger (e.g., loose
wires)
Risk The chance that a hazard will cause harm
5S A Japanese system for organizing the
workplace
Safety Rules that prevent accidents
Regulation
s
Ergonomic Designing tools and workspace to fit the
s user
Quick Check:
"What’s the difference between a hazard and a risk?"
Teacher explains:
"This means we must always think of safety when using ICT
tools — just like engineers or electricians!"
18
Developing 1. Hazard and Risk Management
Understanding of Ask:
the Key Idea "What hazards might we see in a computer laboratory?"
Examples:
Tangled cords
Overheating computers
Food or drinks near devices
Poor lighting
Sitting too long in bad posture
The 5S Principle
A Japanese method for organizing workplaces
Teacher explains:
Here are some basic ICT safety rules:
1. Don’t overload sockets
2. No eating/drinking near equipment
3. Maintain proper posture (ergonomics!)
4. Keep area clean and organized
5. Turn off and unplug devices properly
19
Deepening Mini-Role Playing / Demonstration Activity
Understanding of Group Task:
the Key Idea/Stem "Demonstrate one safety rule or hazard with a partner —
like how to sit properly, or how NOT to wrap cords."
After/Post-Lesson
Proper
Making
Generalization "Why is it important to follow OSHS in ICT?"
"What can happen if we ignore safety rules?"
Expected answers:
Prevents injury
Keeps equipment safe
Promotes discipline
Helps work faster and better
Teacher reinforces:
"Even in the digital world, physical safety still matters!"
20
D. Letting students do whatever they want
5. A student ignores the lab rules and runs inside with wet
hands. A classmate reminds them to dry their hands and
follow safety instructions.
Why are safety regulations important in this situation?
A. For fun
B. To delay work
C. To prevent accidents and injuries
D. To look strict in front of the teacher
Reflection
21
22