Professional Documents
Culture Documents
Department of Education
Region VI Western Visayas
DIVISION OF ROXAS CITY
DON YNOCENCIO A. DEL ROSARIO NATIONAL HIGH SCHOOL
DETAILED LESSON PLAN IN EMPOWERMENT TECHNOLOGIES
Teacher: Williamson B. Enoc
Teaching Date and Time: M, T, W and TH/7:30-8:30 AM
Grade Level: 11
Learning Area: Empowerment Technologies
Quarter: 1
I OBJECTIVES
a. Content Standard:
ICT in the context of global communication for specific professional track
b. Performance Standard:
At the end of the 2-week period student will independently compose an insightful reflection
paper on the nature of ICT in the context of their lives, society, and professional tracks (Arts,
Tech-Voc, Sports, Academic).
c. Learning Competencies:
Apply online safety, security, ethics, and etiquette standard and practice in the use of ICTs as it
would relate to their specific professional tracks.
Code: CS_ICT11/12-ICTPT-Ia-b-2
II CONTENT
Online Safety, security, ethics, and etiquette
III LEARNING RESOURCES
a. References: Book (Empowerment Technologies, Innovative Training Works, Inc.)
b. Other Instructional Resources: laptop, internet, projector and PPT.
IV PROCEDURES
Activity:
1. Divide the class into 5 groups.
2. The group must answer the questionnaire about how much information have shared. Each
member will put a check () under Shared or Not Shared.
Type of Information Shared Not Shared
1. Fist Name
2. Last Name
3. Middle Name
4. Current and Previous School(s)
5. Your Cellphone Number
6. The name of your parents
7. The name of your siblings
8. Your Address
9. Your Home Phone Number
10. Your Birthday
3. Each group will post their output on the board. (The output will be used in discussion)
Analysis:
1. What did you feel after sharing?
2. What are common answers you have with other group?
3. Why these are the common answers?
4. What do you think are the reason people share these information in the Facebook
Account?
5. How important are these information over the internet?
6. Do you think these information can be used by the hackers to destroy your reputation
over the internet? How?
Abstraction:
Risky, yet not as risky as posting their full names, especially your
mothers maiden name. In fact, you may have already
6. The name of your
encountered many websites that require your mothers maiden
mother and father
name as an answer to a secret question whenever you lose your
password.
7. The name of your Disclosing this is a huge risk. Strangers may pretend or use their
siblings identity to dupe you.
Hopefully, you answered no to this one. Giving the Internet
8. Your address your number is one thing; giving them your address is a whole
other level. It would be much easier for criminals to find you.
This shared information is more risky than sharing your
9. Your home phone personal phone number. Scams usually use this information to
number deceive you, one of which is when stranger pretends to know
your parents pretends to be you.
Letting people know your birthday is probably a must if you
10. Your Birthday want to get as many gifts as possible. But having it in your
profile makes you vulnerable to identity theft.
Internet - information superhighway. Anyone has access to this highway, can place
information, and can grab that information. Any information, even things that you have set
privately, can be accessed one way or another. This is why social networking sites like Facebook
continue to improve their security features. The threat of cybercrime is very real. While you may
not experience threat now, whatever information we share today could affect our future.
INTERNET THREATS
Here are some of the threats you should be aware of when using the Internet:
1. Malware- stands for malicious software
a. Virus- a malicious program designed to replicate itself and transfer from one
computer to another either through the Internet and local networks or data storage
like flash drives and CDs.
b. Worm- a malicious program that transfers from one computer to another by any type
of means. Often, it uses a computer network to spread itself. For example, the
ILOVEYOU worm (Love Bug Worm) created by a Filipino.
*Rouge security software- tricks the user into posing that it is a security software. It
asks the user to pay to improve his/her security but in reality, they are not protected
at all.
d. Spyware- a program that runs in the background without you knowing it (thus called
spy). It has the ability to monitor what you are currently doing and typing through
keylogging.
*Keyloggers - used to record the keystroke done by the users. This is done to steal
their password or any other sensitive information. It can record email, messages, or
any information you type using your keyboard.
e. Adware- a program designed to send you advertisements, mostly as pop-ups
2. Spam- unwanted email mostly from bots or advertisers. It can be used to send malware.
3. Phishing- Its goal is to acquire sensitive personal information like passwords and credit
card details. This is done by sending you an email that will direct the user to visit a
website and be asked to update his/her username, password, credit card, or personal
information.
*Pharming- a more complicated way of phishing where it exploits the DNS (Domain
Name Service) system.
COPYRIGHT INFRINGEMENT
If you create somethingan idea, an invention, a form of literary work, or a research,
you have the right as to how it should be used by others. This is called INTELLECTUAL PROPERTY.
In other words, the copyright law includes your rights over your work, and anyone who uses it
without your consent is punishable by law. Try grabbing any book then browse its few pages
and you will find a page with a disclaimer with the words: No part of this book may be copied,
reproduced That is a copyright page.
As a responsible user of the Internet, you have to consider that not everything out there
is free for you to use. Just like your own, contents that you see from websites have their
respective copyrights. There are several instances where employees or business owners face
copyright infringement and are sentenced to a huge fine due to reckless copying of materials.
Here are some tips that could help you avoid copyright infringement:
1. Understand. Copyright protects literary works, photographs, paintings, drawings, films,
music (and lyrics), choreography, and sculptures, but it generally does NOT protect
underlying ideas and facts. This means that you can express something using your own
words, but you should give credit to the source.
2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid
defense against copyright. Be responsible enough to know if something has copyright.
3. Be creative. Ask yourself whether what you are making is something that came from
you or something made from somebody elses creativity. It is important to add your
own creative genius in everything that will be credited to you.
4. Know the law. There are some limitations to copyright laws. For instance in the
Philippines, copyrights only last a lifetime (of the author) plus 50 years. There are also
provisions for fair use which mean that an intellectual property may be used without
a consent as long as it used in commentaries, criticism, search engines, parodies, news
reports, research, library archiving, teaching, and education. If you have doubts that
what you are doing does not fall under the policy of fair use, seek permission first.
Another misconception is that fan-fiction is not copyright infringement. In reality, it is
and some copyright holders ignore them but they can opt to use their rights.
Application:
Take the Challenge!
Together with your group from the cybernews reporting, create campaign materials
promoting Thinks before you click. It could be in a form of small posters posted along
the hallway or bulletin boards as approved by the school. This campaign is an awareness
program for the younger batches of the school.
Assessment/Evaluation:
Matching Type: Match Column A with Column B. Write the letter of the correct
answer on the space before each number.
A B
____1. Virus A. designed to send you advertisements
____2. Rogue B. sends an official-looking email and is designed to steal sensitive
personal information
____3. Keylogger C. a provision that allows you to use copyrighted work without
consent with certain limitations
____4. Adware D. a browser feature that is synonymous to private browsing
____5. Spam E. replicates and can transfer from one computer to another
____6. Phishing F. exploits the DNS System
____7. Fair use G. states that anyone who uses your work without your consents is
punishable by law
____8. Spyware H. runs in the background and monitors what you are doing
____9. Private I. unwanted email mostly from bots
____10. Malware J. disguised as a useful program but is not
____11. Incognito K. the information superhighway
____12. Internet L. tricks the user into posing that it is security software
____13. Trojan M. a malicious software
____14. Copyright N. an option to hide a post so that search engines could not scan it
____15. Pharming O. used to record the keystrokes done by the user
Agreement:
All group will have their campaign in lower years (Junior High School) after their class or during
vacant period. They have collect the signature of the students right after the campaign to be
checked next meeting. Each will have to take photos also during the campaign as a proof that they
have conducted a campaign.
V REMARKS
VI REFLECTION
Prepared by:
Noted by:
TESSIE D. ORTEGA
Principal I
Don Ynocencio A. Del Rosario NHS
Division of Roxas City