0% found this document useful (0 votes)
223 views6 pages

I.T Lesson Plan

Uploaded by

Uy Yui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
223 views6 pages

I.T Lesson Plan

Uploaded by

Uy Yui
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

A Detailed Lesson Plan in Science 10

Prepared By: Jenny Lasconia

I. Learning Objectives:
Objectives:
At the end of the lesson, the students will be able to:
a. define what is digital right management;
b. identify the different techniques designed to control access and
reproduction of online information; and
c. share their insights about the importance of the solutions.

II. Subject Matter


a. Topic/Lesson: Digital Right Management
b. References: Teachers Material and Internet
c. Instructional Materials: Chalk and Board, Cartolina, Manila Paper and
Pictures
d. Strategies: Deductive, inductive, group work, reportorial and recitation.
e. Integration: English
f. Values Infusion: Importance of Digital Right Management

III. Procedure
Teacher’s Activity Learner’s Activity
A. Preliminary Activities

May we all stand for the prayer? Who can (A student lead the prayer)
lead the prayer?

Good afternoon class! Good morning mam!

You may now take your seat. Thank you mam.

I will now check your attendance. Say Yes Ma’am


present when I call your names.

(The teacher will check the attendance) (The students will response when their
names will be called).

Please before we will start our class I want Students will do so.
you to observe cleanliness in your area and
pick some trash you see kindly throw it in the
trash bin. Kindly arrange your chairs
accordingly.

B. Review of the Past Lesson

Do you still remember our lesson last Yes mam


meeting? (students name called to answer)
What have we discussed? (students raises We have discussed the Copyright and
their hands) teacher will call the name of a Related Rights (Digital Rights)
student
Yes very good!

So what is Copyright? (Student stands to answer the question)


Copyright is a set of exclusive rights granted
by a state to the creator of an original work
or their assignee for a limited period in
exchange for public disclosure of the work.

That is correct so Copyright includes the right


to copy, distribute and adapt the work.
Copyright owners can license or
permanently transfer or assign their
exclusive rights to others.
(Student stands to answer the question)
How about digital rights? Anyone? Digital Rights is the permission granted to
individuals to legitimately perform actions
involving the use of a computer, any
electronic device or a communications
network.

Yes. Exactly! It is particularly related to the


protection and realization of existing rights
and context of new technologies specially
the internet.
Yes, Mam we are ready.
I am glad that you remember our discussion.
So are you ready with our new topic?
C. Motivation

Class I will The students will do so.


show you
different
pictures.
Please tell me
what you think
or what can you see

according to the
pictures shown.

(Student raises his/her hand)


I can see in the picture that there is a
padlock, which means restriction in opening
certain files from different devices used such
What can you see in the picture? the laptop, pc and mobile phones.

Yes? ________student name. (Student raises his/her hand)


I can see in the picture that there is a theft
trying to steal information from the laptop but
he does not have the access.

Yes very good. That is correct. What else?

Yes, very good. All of your answers are


correct. Let us give all ourselves around pf
applause.

D. Presentation / Discussion

After doing the activity what do you think our The students will answer:
lesson for today? ` -Ma’am, our lesson for today is about
Digital Rights Management and the
techniques designed to control access and
reproduction online.
Yes, that is correct. Thank you.

So who can give me what is Digital Right Digital Right Management or DRM is used to
Management? describe the processes by which the author
or publisher of a work exerts his/her own
rights.
E. Lesson proper

Very good! Digital rights The Students will listen


management (DRM) is a systematic .
approach to copyright protection
for digital media.

Before, a person needed to copy or re-print


a physical book for additional. Now days it is
not only books are being reproduced.

Who can give examples of things being


reproduced through internet?

Yes, that is correct. While information gets to


be disseminated faster to consumers, control Mam, it maybe movies, music, software
as to how it is shared become an issue. applications etc. can be copied and shared
faster
Is downloading pirated music online helps
the music artist?
Precisely! That is why there are techniques
designed to control access and reproduction No mam, because they are deprived of the
of online information. The following are as right and royalties the music artist is entitled
follows: to.

1. Encryption- is the process of


converting data or information in such The students will listen
a way that only that only authorized
parties can understand. Its primary
purpose is to protect the
confidentiality of digital stored on
computer systems or transmitted via
internet or other computer networks.
 ATM Machines
 E-commerce
 Facebook Passwords

-to secure important information


- e.g., Credit Card information
2. Serial Keys- also known as product
key or a software key, it is a series of
alphanumeric characters acting as a
key to denote that the product or
software is original. Some product
keys are used product activation.

Who can give me example of this, it is very


common nowadays?

Exactly. Thank you. Mam, example is Microsoft Windows OS. A


product key is used to an activate operating
3. Scrambling-is done to hide sensitive system online.
information from unauthorized users.
It is accomplished by the addition of
components to the original signal or
the changing of some important
component of the original signal in
order to make extraction of the
original signal difficult.

4. Tag embedding-similar to how


pictures can include watermarks to
denote information on the owner of
the picture; tag embedding does the
same information content.
Watermarks are not complete DRM
mechanisms in their own right but are
used as part of a system for copyright
enforcement such as helping provide
prosecution evidence for legal
purposes rather than direct
technological restriction.
- In terms of data embedded into the
actual content the use of metadata is
included to identify name, author and
date of purchase among other
pertinent information.
Example: Metadata for a music file
might include the artist's name, the
album, and the year it was released.

F. Generalization

The purpose of DRM is to prevent


unauthorized redistribution of digital media
and restrict the ways consumers can copy
content they have purchased. That is why
techniques are created and design such as
1. Encryption 2. Serial keys 3. Scrambling 4.
Tag embedding to control access and
reproduction of online information.

In today’s digital world, digital rights


management is increasingly important, not
only for digital content creators but also for
companies and individuals that make use of
digital assets licensed or purchased from
third-party creators.

Now class do you have questions. No ma’am.

Since you do not have questions, I will be the


one to ask questions.

In your personal experience, have you ever No ma’am based on my personal


tried or encountered using one of these experience because when we bought our
techniques created? laptop or personal desktop the personnel in
the store were the one using it especially the
serial key in the Microsoft Windows OS.

Very good! Ma’am I have a question? What do you think


will happen if there were no techniques
created?

G. Application
IV. Evaluation
Please get ¼ sheet of paper we will have a short quiz. Please listen carefully to the
direction. I will read the question twice.
Direction. Write the correct answer
1. It is used to describe the processes by which the author or publisher of a work
exerts his/her own rights. (answer: Digital Right Management)
2-5. Enumerate the techniques designed to control access and reproduction of online
information. (encryption, serial keys, scrambling and tag embedding)
V. Assignment

You might also like