0% found this document useful (0 votes)
12 views22 pages

Lesson Script Final_ W2

The document outlines a curriculum for an ICT lesson focused on emerging trends, successful entrepreneurship qualities, and Occupational Safety and Health standards in ICT environments. It includes lesson objectives, key terms, teaching procedures, and activities aimed at enhancing students' understanding of ICT issues such as cyberbullying and online scams. The lesson encourages responsible digital behavior and culminates in a creative task where students design a digital safety poster.

Uploaded by

edmar alcarion
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views22 pages

Lesson Script Final_ W2

The document outlines a curriculum for an ICT lesson focused on emerging trends, successful entrepreneurship qualities, and Occupational Safety and Health standards in ICT environments. It includes lesson objectives, key terms, teaching procedures, and activities aimed at enhancing students' understanding of ICT issues such as cyberbullying and online scams. The lesson encourages responsible digital behavior and culminates in a creative task where students design a digital safety poster.

Uploaded by

edmar alcarion
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

1

Week 2 Lesson 1 (Day 1-4)


I. CURRICULUM CONTENT, STANDARDS, AND LESSON COMPETENCIES
A. Content The Learners demonstrate an understanding of current
Standards trends and emerging issues in ICT, the qualities of
successful entrepreneurs in the field of ICT and the
Occupational Safety and Health (OSH) standards in ICT
environments
B. Performance
Standards

C. Learning The Learners discuss the emerging trends and issues in ICT;
Competenci discuss the qualities of successful entrepreneurs in the field
es of ICT and discuss Occupational safety and Health ()OSH
standards in ICT environments.
II. CONTENT: 1. Trends and Issues in ICT;
2. Qualities of Successful Entrepreneurs in the
field of ICT; and
3. Occupational Safety and Health (OHS)
Standards in ICT.
III. LEARNING RESOURCES
A. References Department of Education. “MATATAG Curriculum in TLE-7
ICT.” Accessed July 6, 2024.

B. Other
Learning
Resources
IV. TEACHING AND LEARNING PROCEDURES
Day 1
Before/Pre-Lesson Proper
Activating Prior “Good , class! Welcome to our ICT class! I hope you’re all
Knowledge doing well today. Let’s make this session both informative
and enjoyable. Shall we begin?

Let’s play a little game. Think fast!

“What is one new technology or gadget you’ve seen


or used recently? Raise your hand and share."

(Allow 4–5 students to share. List down answers on the


board like: TikTok, ChatGPT, Alexa, VR headset, Google
Drive, etc.)

2
Lesson
Purpose/Intention "All of these are examples of technology that are constantly
evolving. These changes in ICT are called emerging trends.
That’s what we’ll explore today!"

By the end of the session, you should be able to:


1. identify common ICT-related issues;
2. explain the importance of responsible and safe use of
technology in daily life; and
3. demonstrate awareness of online etiquette and
personal safety.

Lesson Language "Let’s learn some important words for today. Repeat after
Practice me and tell me if you’ve heard these words before."

TERM MEANING
Emerging Beginning to appear or develop; newly
becoming noticeable or important.

(Lumilitaw o bagong uso)

Trend A general direction in which something


is developing or changing, especially in
technology or fashion.

(Isang direksyon kung saan napupunta


ang uso o teknolohiya)

Artificial The simulation of human intelligence in


Intelligence machines, enabling them to think, learn,
(AI) and make decisions (e.g., Siri,
ChatGPT).

(Katalinuhang gawa ng tao, gaya ng


Siri o ChatGPT)
Cloud The practice of storing and accessing
Computing data and programs over the internet
instead of a local computer.

(Pag-iimbak ng files sa internet)


Virtual Reality A simulated experience created by
(VR) computers, often involving immersive
digital environments.

3
(Tunay na karanasan sa digital na
mundo)

Mini-Activity (Quick Match):

 Give students index cards with the terms and


definitions. Ask them to match pairs with a seatmate.
During/Lesson Proper
Reading the Key
Idea/Stem "Emerging trends in ICT refer to the latest innovations and
advancements in technology that are changing how we live,
work, and communicate."

"These are new technologies that are starting to become


more common in our daily lives. They’re not just 'cool' —
they’re changing how we learn, shop, play, and even work."

Developing "Let’s explore some of these trends."


Understanding of
the Key Idea/Stem 1. Artificial Intelligence (AI):
"AI means machines can think or respond like humans. Have
you talked to ChatGPT, Alexa, or Siri? That’s AI!"

2. Virtual Reality (VR):


"VR is when you wear goggles and feel like you’re inside a
game or place. It’s used in gaming, education, and even
medical training."

3. Cloud Computing:
"When you save files in Google Drive or Dropbox, you’re
using the cloud. It’s like a huge online storage."

4. Internet of Things (IoT):


"Imagine your refrigerator can message you when you run
out of eggs! That’s IoT—devices talking to each other."

Deepening Activity: Role-Playing (Pairs or Groups)


Understanding of Instructions:
the Key Idea/Stem
"Act out a short 1-minute skit. Show an ICT issue AND the
right response."

4
Examples:
 Reporting cyberbullying to a teacher
 Fact-checking fake news before sharing
 Keeping passwords private

(Allow 10–15 minutes and present to class.)

After/Post-Lesson Proper
Making
Generalizations "What are the most common ICT issues?"
and Abstractions Student answers:
 “Cyberbullying is common in group chats.”
 “Many people fall for online scams.”
 “We need to protect our passwords.”

Teacher wraps up:


"Technology is a gift — but we must use it wisely. Be smart,
be kind, and be safe online."

Evaluating 1. While chatting in a group, someone posts hurtful


Learning comments about your classmate. What is this an example
of?
A. Online gaming
B. Cyberbullying
C. Data sharing
D. Digital literacy

Correct Answer: B. Cyberbullying

2. You receive a message saying you’ve won a prize and


asking you to click a link. What should you do?
A. Click the link immediately to claim the prize
B. Forward it to your friends
C. Ignore or report the message
D. Reply to ask who sent it

Correct Answer: C. Ignore or report the message

3. Which of the following helps protect your personal data


online?
A. Posting your schedule on social media
B. Using the same password for everything

5
C. Keeping passwords private and using strong ones
D. Sharing your login with a friend

Correct Answer: C. Keeping passwords private and


using strong ones

4. Why is spreading fake news harmful to others?


A. It helps people stay updated
B. It can confuse or mislead others
C. It makes people laugh
D. It improves critical thinking

Correct Answer: B. It can confuse or mislead others


5. Your friend is being bullied online. What is the BEST action
you can take?
A. Take a screenshot and report it to a trusted adult
B. Join in the teasing
C. Ignore it and stay silent
D. Unfriend your classmate

Correct Answer: A. Take a screenshot and report it to


a trusted adult

Creative Output: Digital Safety Poster

Task: Design a Digital Safety Poster with a clear slogan or


reminder about online safety.

You can draw it on paper or use digital tools like Canva,


PowerPoint, or Paint.

Rubrics

Criteria 4 - Excellent 3 - Proficient 2 - Developing 1 - Beginning


Content & Poster includes a Poster includes a Poster includes Poster is
Relevance clear slogan and slogan and at least a slogan but the missing a slogan
2 or more 1 relevant safety safety tip is or the safety
relevant safety tip unclear or message is off-
tips incomplete topic

6
Creativity & Exceptionally Creative use of Some visuals Lacks creativity;
Visual Appeal creative use of visuals and colors are used, but poster is plain or
colors, layout, that support the they lack visuals do not
and graphics to safety message creativity or support the
enhance message relevance message
Clarity of The message is The message is The message is The message is
Message clear, powerful, mostly clear and somewhat unclear or
and easy to understandable difficult to confusing
understand at understand or
first glance needs rewording
Effort & Poster shows Poster shows good Poster shows Poster is
Neatness outstanding effort and is fairly basic effort; a unfinished or
effort; neat and neat bit messy or shows minimal
well-presented rushed effort
Use of Shows skillful Demonstrates Tools used with Tools used
Digital/Manual use of digital or adequate use of some difficulty; ineffectively or
Tools traditional tools tools to create design elements not at all
for design visuals may appear
unbalanced

Additional
Activities for
Application or
Remediation (if
applicable)
Remarks
Reflection
Day 2
Before/Pre-Lesson Proper
Activating Prior
Knowledge “Good Day, class! Welcome to our ICT class! I hope you’re
all doing well today. Let’s make this session both
informative and enjoyable. Shall we begin?

"Last week, my friend received a text saying she won a new


phone. She clicked the link and her Facebook got hacked!

Class, has something like this happened to you or someone


you know?"

(Let 2–3 students share. Relate their stories to today’s


topic.)

"These are real examples of issues in ICT—when technology


is used in the wrong way."

Lesson
Purpose/Intention By the end of this session, you should be able to:

7
1. identify at least three common ICT issues, including
cyberbullying, online scams, and password misuse;
2. explain how responsible digital behavior can prevent
problems in online spaces; and
3. demonstrate safe and respectful practices when using
technology and interacting online.

Let’s dive in and achieve these goals together!


Lesson Language Before we proceed to our lesson proper, let us define first
Practice the following terminologies:

TERM MEANING
Cyberbullyin The use of the internet or digital devices
g to harass, threaten, or bully others.

(Pananakot o pambubully gamit ang


internet)
Data Privacy The protection of personal information
from being shared, accessed, or misused
online.

(Proteksyon ng personal na impormasyon)


Online Fraudulent activities or tricks on the
Scams internet to steal your money or personal
data.
(Panlilinlang sa internet upang makuha
ang pera o impormasyon mo)
Fake News False or misleading information spread
online as if it were true.

(Mali o huwad na impormasyon online)


Hacking Illegally accessing someone else’s
computer system or network without
permission.

(Iligal ap ag-access sa ibang tao o


systema sa computer)

Mini-Game: Real or Fake?

Flash headlines or images. Ask:

"Is this trustworthy or fake? Thumbs up or thumbs down."

8
During/Lesson Proper
Reading the Key Teacher writes/displays:
Idea/Stem
📘 "ICT issues are problems or dangers we face when using
technology, especially when we are not careful online."
Developing Teacher provides 3 case scenarios (read aloud or show
Understanding of images):
the Key Idea
1. A student gets bullied through group chats.
2. A child gives away their password to a stranger.
3. A person clicks on a ‘You won!’ link and gets
scammed.

Discussion Questions:
 What went wrong in each case?
 What could the person have done differently?

Deepening Activity: Role-Playing (Pairs or Groups)


Understanding of Instructions:
the Key Idea/Stem
"Act out a short 1-minute skit. Show an ICT issue AND the
right response."
Examples:
 Reporting cyberbullying to a teacher
 Fact-checking fake news before sharing
 Keeping passwords private
(Allow 10–15 minutes and present to class.)

After/Post-Lesson Proper
Making Teacher asks:
Generalization "What are the most common ICT issues?"
Student answers:
 “Cyberbullying is common in group chats.”
 “Many people fall for online scams.”
 “We need to protect our passwords.”
Teacher wraps up:
"Technology is a gift — but we must use it wisely. Be smart,
be kind, and be safe online."

Evaluating Instructions: Read the statement carefully. Write


Learning your answer on a separate sheet.

9
1. Anna received a message on social media saying mean
things about her and encouraging others not to talk to her.
She feels embarrassed and hurt.
What is this situation an example of?
A. Digital marketing
B. Cyberbullying
C. Social networking
D. Peer pressure

2. You get a text message from an unknown number saying


you’ve won a new phone and asking you to click on a link to
claim it.
What should you do to stay safe?
A. Click the link right away
B. Share it with friends to see if it works
C. Delete the message and report it as spam
D. Respond to ask for more details

3. While installing a new photo-editing app, it asks for


access to your microphone, location, and contacts.
What is the best thing to do to protect your personal
information?
A. Grant all permissions without reading
B. Check why those permissions are needed before agreeing
C. Allow access because all apps ask for it
D. Uninstall the app immediately without reading anything

4. Your friend shares an article on social media about a new


virus that sounds scary. You notice the article is from an
unknown website and there are no other reports about it.
What is the best response?
A. Share the article so others can be warned
B. Ignore it and keep scrolling
C. Check reliable news sources first before believing or
sharing it
D. Ask your friend if the article is interesting

5. Liam notices someone in their group chat is being teased


and called names by other classmates. He feels
uncomfortable but isn’t sure what to do.
What is the most responsible action Liam can take?
A. Ignore it since it’s not about him
B. Take screenshots and share them with others
C. Report the behavior and offer support to the classmate

10
D. Laugh along so others won’t target him

6. You’re setting a password for a new school portal account.


It asks you to create a strong password.
Which of the following is the BEST example of a strong
password?
A. 12345678
B. yourname2025
C. Pa$$w0rd!84
D. iloveschool

7. Your friend often shares too many personal details on


social media, like home address, daily routine, and vacation
plans.
What is a possible danger of this behavior?
A. Their friends will think they are bragging
B. They might receive too many friend requests
C. Strangers can misuse this information or track their
location
D. It will make their account boring

8. You’re using a public computer in the library to check


your email. After logging in, you're done using it.
What should you do before leaving the computer?
A. Close the tab and walk away
B. Leave it open for the next person
C. Log out of all accounts and clear the browser history
D. Shut down the computer without logging out

9. Your class is working on a research project and you find a


blog with interesting information. It has no author name, no
sources, and lots of ads.
What should you consider before using the information?
A. Use it anyway because it’s easier
B. Trust it because it matches what you think
C. Double-check the facts with trusted websites or sources
D. Assume it’s true because it's on the internet

10. During a video call, someone in class starts screen


recording and sharing funny clips of classmates without
permission.
What digital rule is being broken?
A. Time management rule
B. Data storage rule

11
C. Online safety and consent rule
D. Password protection rule

Answer Key:
Correct Rational
No.
Answer e
Mean messages and social
1 B. Cyberbullying exclusion online are forms of
cyberbullying.
This is the safest action when receiving
2 C. Delete the message and report it as spam
suspicious links.
B. Check why those permissions are needed Always review permissions to protect
3
before agreeing your privacy.
C. Check reliable news sources first before Prevents the spread of fake or
4
believing or sharing it misleading information.
C. Report the behavior and offer support to This is the most responsible and
5
the classmate empathetic response.
A strong password includes uppercase
6 C. Pa$$w0rd!84 and lowercase letters, symbols, and
numbers.
C. Strangers can misuse this information or Oversharing personal details online can
7
track their location lead to safety risks.
C. Log out of all accounts and clear the This protects your privacy when using
8
browser history public computers.
C. Double-check the facts with trusted Verifying information helps avoid using
9
websites or sources unreliable content.
Recording and sharing without permission
10 C. Online safety and consent rule
violates privacy and consent rules.

Additional
Activities
Remarks

Reflection

Day 3
Before/Pre-Lesson Proper
Activating Prior Good Day, everyone! Welcome to our ICT Class! I hope
Knowledge you’re all doing well today. Let’s make this session both
informative and enjoyable.

"Class, have you ever sold anything online? Maybe through

12
Facebook, Shopee, or even a simple buy-and-sell with
classmates?"

(Allow 2–3 students to answer.)

Follow-up:
"Those who do business using technology are called ICT
entrepreneurs. But what makes them successful? That’s
our topic today!"

Lesson By the end of the session, you should be able to:


Purpose/Intention 1. identify common characteristics of successful ICT
entrepreneurs;
2. describe how qualities like being tech-savvy,
persistent, and innovative contribute to
entrepreneurial success; and
3. analyze how their current personal traits align with
those of successful ICT entrepreneurs.
Lesson Language Before we proceed to our lesson proper, let us define first
Practice the following terminologies:

TERM MEANING
Entreprene Someone who starts and runs a business
ur
"Isang taong nagsisimula at nagpapatakbo
ng negosyo."
Innovative Someone who likes to think of new and
creative ideas or ways to do things.

“Mahilig mag-isip ng bago o kakaiba”


Resilient A person who doesn’t give up easily, even
when facing problems or failure.

“Hindi sumusuko kahit may problema”


Risk-taker Someone who is willing to face challenges
and try new things, even if risky.

“Handa sa pagsubok at panganib”


Tech-savvy A person who is skilled and knowledgeable
in using technology.

“Marunong at bihasa sa teknolohiya”


Goal- Someone who works with discipline and

13
oriented focus to achieve a specific goal or
purpose.

“May layunin at disiplina sa trabaho”

Say the word. Students echo it with actions.


Example:
 "Innovative" – point to the head
 "Resilient" – stand tall
 "Tech-savvy" – type on an imaginary keyboard

During/Lesson Proper
Reading the Key
Idea/Stem "Successful ICT entrepreneurs are people who use
technology to start and grow businesses. They have special
qualities like being creative, disciplined, and open to new
ideas."

"These people are not just good at using gadgets — they are
leaders who turn ideas into income using ICT!"

Developing Teacher gives examples of famous ICT entrepreneurs:


Understanding of
the Key Idea 1. A student who made money from YouTube by
creating how-to videos.
2. A small local business that sells products through
Facebook and GCash.
3. An app developer who created a mobile game.

Discuss the qualities they showed:

Entrepreneur Action Quality


Displayed
Made creative videos Innovative
Kept trying despite low Resilient
views
Used technology to sell Tech-savvy
online
Set weekly goals for uploads Goal-oriented

Deepening Group Work: “ICT Entrepreneur Profile” (15 mins)

14
Understanding of Instructions:
the Key Idea/Stem  Form groups of 4.
 Create a pretend character who is a successful ICT
entrepreneur.
 Answer:
o What business do they have?
o What ICT tools do they use?
o What are their top 3 qualities?
 Create a mini-profile poster or skit and share with the
class.
After/Post-Lesson
Proper
Making
Generalization "What do most ICT entrepreneurs have in common?"
Sample student responses:
 "They are tech-savvy."
 "They don’t give up easily."
 "They like new ideas."

"Great! These qualities help them succeed even in a fast-


changing world. If you want to become an ICT entrepreneur
someday, these are the traits to develop!"

Evaluating Quick Quiz (Write on board or give orally):


Learning 1. Liza always thinks of new ways to improve her online
shop and make her products stand out.
Which trait does Ana show in this situation?
A. Careless
B. Innovative
C. Reserved
D. Passive

2. Marco sets a clear goal to sell 50 digital art designs in


one month. He follows a daily plan to make sure he stays on
track.
Why is being goal-oriented important for Marco’s
business success?
A. It makes him relax more
B. It helps him avoid teamwork
C. It guides his actions and decisions
D. It lets him change goals quickly

3. Which of the following tools can an entrepreneur use to

15
promote and sell products online?
A. A sketch pad
B. A spreadsheet program
C. A TV remote
D. A filing cabinet

4. Lara launched an app that didn't get many downloads.


Instead of quitting, she updated the app and asked users for
feedback.
What trait is Lara showing?
A. Fearfulness
B. Laziness
C. Resilience
D. Dishonesty

5. Think about your own strengths. Which quality do you


already have that could help you succeed in ICT
entrepreneurship? Briefly explain why.

(Open-ended answer – Encourage students to reflect and


respond in one to two sentences.)
Reflection Prompt (Notebook):

_"The ICT business I want to try in the future is ____________.


I will succeed because I am __________."
Additional
Activities
Remarks
Reflection
Day 4
Before/Pre-Lesson Proper
Activating Prior “Good Day, class! Welcome to our ICT class! I hope you’re
Knowledge all doing well today. Let’s make this session both
informative and enjoyable. Shall we begin?

"Class, let’s start with a simple question:


What comes to mind when you hear the word safety?"

(Let students respond: "helmet", "first aid", "careful",


"rules", etc.)

Follow-up:

16
"Very good! Now… what about when we’re using
computers? Or working with wires and tools? Can accidents
still happen?"
YES! And that’s why we have Occupational Safety and
Health Standards (OSHS) — rules that protect workers,
including those in ICT.

Lesson To kick-off today’s lesson, we have an exciting activity


Purpose/Intention designed to spark your interest, I want to play a quick
challenge with you. Are you ready?

(Wait for students to respond. Smile and build a little


suspense.)

Teacher (displaying the image of a cluttered computer


workstation):

“Take a good look a t this picture. This is a typical computer


workstation—but something’s not quite right. In fact, several
things are wrong!”

Teacher (giving clear instructions):

“I want you to get into pairs or small groups. I’ll give you 2
minutes to spot at least three safety hazards in this
photo. Look closely! What can go wrong here? Talk about it
with your group.”

(Give students time to observe and discuss. Walk around


and listen in on their ideas.)

Teacher (after 2 minutes):


“Alright! Let’s hear from you. Who wants to share one
hazard they noticed?”

(Call on 2–3 groups. Write down their answers on the board:


e.g., exposed wires, spilled drink, poor posture, messy
cables, open CPU near fan, overloaded socket.)

“That’s why today, we’re learning about Occupational


Safety and Health Standards in ICT. Even though we
work with computers and digital tools, physical safety rules

17
still matter.”

At the end of this session, you should be able to:

1. define the role of Occupational Safety and Health


Standards (OSHS) in the field of ICT;
2. identify possible consequences of not following OSHS
guidelines, such as personal injury or damage to
equipment; and
3. demonstrate an understanding of basic safety
practices that promote a disciplined, efficient, and
secure working environment in ICT settings.

Lesson Language Let’s review some key terms. Repeat after me.
Practice
Term Meaning
Hazard A potential source of danger (e.g., loose
wires)
Risk The chance that a hazard will cause harm
5S A Japanese system for organizing the
workplace
Safety Rules that prevent accidents
Regulation
s
Ergonomic Designing tools and workspace to fit the
s user

Quick Check:
"What’s the difference between a hazard and a risk?"

A hazard is the danger, a risk is the chance it will hurt


someone.
During/Lesson Proper
Display or read aloud:
Reading the Key
Idea/Stem "OSHS in ICT involves following safety rules and practices
that help prevent accidents and protect people from harm in
computer labs or ICT workplaces."

Teacher explains:
"This means we must always think of safety when using ICT
tools — just like engineers or electricians!"

18
Developing 1. Hazard and Risk Management
Understanding of Ask:
the Key Idea "What hazards might we see in a computer laboratory?"
Examples:
 Tangled cords
 Overheating computers
 Food or drinks near devices
 Poor lighting
 Sitting too long in bad posture

Teacher shows images or acts out scenarios:


"Let’s classify each as: Hazard or Safe. Thumbs up/down."
Teacher Tip: Use real examples from the classroom to
reinforce.

The 5S Principle
A Japanese method for organizing workplaces

Step Meaning Tagalog


Sort (Seiri) Remove Uriin
unnecessary items
Set in Order Organize things Isaayos
(Seiton) properly
Shine (Seiso) Clean the workspace Linisin
Standardize Make cleanliness a Gawing
(Seiketsu) routine pamantaya
n
Sustain (Shitsuke) Maintain discipline Panatilihin

Activity (Quick Group Poster):


Draw a mini poster showing how to apply 5S in a computer
lab.

ICT Safety Regulations

Teacher explains:
Here are some basic ICT safety rules:
1. Don’t overload sockets
2. No eating/drinking near equipment
3. Maintain proper posture (ergonomics!)
4. Keep area clean and organized
5. Turn off and unplug devices properly

19
Deepening Mini-Role Playing / Demonstration Activity
Understanding of Group Task:
the Key Idea/Stem "Demonstrate one safety rule or hazard with a partner —
like how to sit properly, or how NOT to wrap cords."

After/Post-Lesson
Proper
Making
Generalization "Why is it important to follow OSHS in ICT?"
"What can happen if we ignore safety rules?"

Expected answers:
 Prevents injury
 Keeps equipment safe
 Promotes discipline
 Helps work faster and better

Teacher reinforces:
"Even in the digital world, physical safety still matters!"

Evaluating Instructions: Read each situation carefully and choose the


Learning best answer based on what a responsible ICT student would
do.

1. Jessa is setting up her computer in the ICT lab. She


notices that some cables are lying all over the floor, and
people might trip over them.
What should Jessa recognize in this situation?

A. The cables are safe if no one steps on them


B. Tangled wires are a hazard and should be fixed
C. Using a mouse is the real danger
D. Wearing an ID is more important than cable safety

2. During clean-up time, the class follows 5S to keep the lab


organized. They remove unneeded items, clean their desks,
and label storage bins.
What is the goal of using 5S in this activity?
A. Selling products
B. Staying quiet
C. Keeping the work area clean and organized

20
D. Letting students do whatever they want

3. Karl spends hours at the computer with his back slouched


and eyes too close to the screen. Later, he feels back pain
and eye strain.
What would have helped Karl avoid this situation?
A. Sitting straight and practicing good posture
B. Eating snacks near the keyboard
C. Leaving wires on the floor
D. Using someone else's chair

4. After sorting, setting in order, shining, and standardizing


their lab tools, the students make a habit of checking and
cleaning up daily.
What is this final 5S step called?
A. Sort
B. Shine
C. Sustain
D. Set in order

5. A student ignores the lab rules and runs inside with wet
hands. A classmate reminds them to dry their hands and
follow safety instructions.
Why are safety regulations important in this situation?
A. For fun
B. To delay work
C. To prevent accidents and injuries
D. To look strict in front of the teacher

Additional Reflective Prompt (on notebook)


Activities "How can I help keep my ICT classroom safe?"
Remarks

Reflection

21
22

You might also like