You are on page 1of 20

EPP 4: First Quarter

Lesson 1
A. TOPIC: ENTREPRENEURSHIP
SUBJECT MATTER: The Concept of Entrepreneurship

B. AIM:
- Define entrepreneurship and entrepreneur
- Identify the importance of entrepreneurship
- Discuss the characteristics of an entrepreneur

C. ACTIVITIES:
Materials:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext
- Logos of famous business enterprises in the Philippines
Methodology:
Classroom Flipping
Allow students to interact in a dynamic learning environment
References:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext, pp.

D. LEARNING CONTENT:

Input 1: Entrepreneurship and Entrepreneur

The main concept of entrepreneurship is innovation. This refers to a new or a different


way of doing things like marketing, technology, human relations, management, and others.
When an individual creates a new product, it us innovation. Innovation has produced many
things that have made work easier for man.
New different ways of innovation are the main concept of entrepreneurship.

Entrepreneurship is transforming or innovating the effective use of resources into


profitable business. It is creating new products that can help man in his or her everyday living.
The entrepreneur is the one who sees the needs of others as a business opportunity; puts together
the needed resources and innovates them in order to meet those needs; and delivers the needed
goods and services at the right place, at the right time, to the right people, and at the right price.

Input 2: The Importance of Entrepreneurship


In economic growth and development, entrepreneurship plays a very important role. The
greater the number of business enterprises, the higher the taxes the government can raise. When
more taxes are collected, the government can implement more projects which are beneficial to
the people.
The entrepreneurs help in economic development through:
1. Creating new businesses – They stimulate the local economy.
2. Creating jobs – They reduce unemployment rate.

3. Encouraging the local development – They promote the growth of the local
development through creating business/enterprise within their community.

4. Contributing to local and national happiness due to positive impact to economic


development – People who are happy are more likely to go out and spend their money.

5. Improving the standard of living with locally sourced options that offer lower
prices – The people in the community would rather choose products with lower prices.
The entrepreneurs provide options to them with their competitive products that offer
lower prices.

6. Forming a sense of community due to localization of the products – Most often,


entrepreneurs who build enterprises within their community are patronized by their own
neighbors, their bonding as members of their community becomes stronger.

7. Encouraging people to be in business and working on their own – Some people are
inspired by successful entrepreneurs. That is why some people are encouraged to put up
their own businesses.

Input 3: The Characteristics of an Entrepreneur

Some people are said to be born as entrepreneurs because they have entrepreneurial
predispositions which they can develop to increase their chances of becoming successful in
business. But then, everyone can be an entrepreneur if he/she has a driving force to achieve in
business. Early exposure to any business or enterprise during childhood can help build the
foundations for a successful entrepreneurial career.
An entrepreneur must possess the following entrepreneurial characteristics.

1. Has a desire for responsibility – He/she considers his/her coming ventures with
which he/she is associated as his/her resources and the uses of those resources. To
achieve self-determined goals. He/she makes use of his/her resources wisely.

2. Confident in his/her ability to succeed – He/she must be optimistic in business and


believe that he /she can succeed in his/her chosen business.

3. Has a high level of energy – He/she is more energetic than ordinary people. He/she
can work long hours.

4. Prefers moderate risks – Entrepreneurs are said to be risk-takers because they see the
market differently ang they even see the product or service that will converge with how
the world is changing. But an entrepreneur is not a wild risk-taker. He/she takes
calculated risks.

5. Desires for immediate feedback – He/she likes to know that response of the
consumers to his/her business or enterprise. As an entrepreneur, he/she accepts feedbacks
positively so that he/she can improve his/her products.

6. Has future orientation – He/she has a well-defined sense of searching for


opportunities. He/she looks ahead rather than worrying about yesterday.

7. Has organizational skills – He/she must know how to position the right people to help
in his/her business as well as to perform a task.

8. Gives value in his/her own money – Achievement is the primary motivating force in
business, but money is the symbol of the achievement, an entrepreneur must know how to
keep and grow his/her money.

9. Has a high degree of commitment – He/she is committed to managing his/her


business, which results in overcoming and lessening business threats, mistakes, and
obstacles.

10. Flexible – He/she can adapt to the changing demands of customers or even the
business itself.

Learning Activity
E. ABSTRACTION

F. EVALUATION
Activity 1
Write down the characteristics an entrepreneur must possess.
1. _____________________________________________________________
2. _____________________________________________________________
3. _____________________________________________________________
4. _____________________________________________________________
5. _____________________________________________________________
6. _____________________________________________________________
7. _____________________________________________________________
8. _____________________________________________________________
9. _____________________________________________________________
10. ____________________________________________________________
Assignment
Within the community, Interview an entrepreneur. Ask him/her the following questions:
1. What business do you have?
2. What entrepreneurial characteristics do you possess?
List down the gathered information in your notebook.
EPP 4
Name: _____________________________________ Date: _______________
Grade: _____________________________________ Rating: _____________
Topic:
Activity:
Write down the characteristics an entrepreneur must possess.
1. _____________________________________________________________
2. _____________________________________________________________
3. _____________________________________________________________
4. _____________________________________________________________
5. _____________________________________________________________
6. _____________________________________________________________
7. _____________________________________________________________
8. _____________________________________________________________
9. _____________________________________________________________
10. ____________________________________________________________

Assignment
Within the community, Interview an entrepreneur. Ask him/her the following
questions:
1. What business do you have?
2. What entrepreneurial characteristics do you possess?
List down the gathered information in your notebook.
EPP 4: First Quarter
Lesson 2
A. TOPIC: Information and Communications Technology (ICT)
SUBJECT MATTER: Safe and Responsible use of ICT

B. AIM:
- Discuss the factors to consider in using a computer, the internet, and an e-mail.
- Discuss the personal safety while working with a computer
- Discuss how to use the Internet safely.

C. ACTIVITIES:
Materials:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext
- Computer, Internet connection
Methodology:
Classroom Flipping
Allow students to interact in a dynamic learning environment
References:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext,

D. LEARNING CONTENT:

Input 1: Factors to consider in using a computer, the internet, and an e-mail.


The application of computers to store, study, retrieve, transmit, and manipulate data or
information is called Information Technology (IT). This is useful in most business enterprises.
This is also considered as an art or science of recording, storing, organizing, exchanging, and
information dissemination.
These factors should be considered when using a computer, the internet, and an e-mail.

1. Viruses, adware, and spyware – The user must be aware that his/her computer can
get a virus while using the internet. It can damage the files and memory of the computer
and even affect its functions.

2. Exposure to inappropriate contents – A user may encounter inappropriate contents


in the Internet such as those materials which are not meant for his/her age and level of
his/her maturity. These could tempt him/her to be unlawful or put him/her in danger.
Some of there are: pornographic materials; sites that encourage vandalism, terrorism,
racism, eating disorders, and even suicide; gambling sites; and unmoderated chat rooms.

3. Harassment and cyberbullying – A user must be aware that not all people online are
trustworthy. Some of the, especially those who the user really does not know can harass
or cyberbully him/her.
4. Identity theft or fraud – The user must be aware that his/her identity can be stolen
without his/her prior knowledge, some bad people do this intentionally to create crimes or
unlawful acts.

Input 2: Personal Safety while Working with a Computer


Since a computer is an electronic device. It is important to use it properly and follow the
safety guidelines. The following are some precautionary measures to observe while suing a
computer.
1. Always wear shoes or slippers with nonconductive rubber soles. This will reduce the
chances of being shocked or seriously injured in an electrical accident.

2. Do not touch the metallic parts of the components which are plugged into a power
source.

3. Turn off the extension cord when removing from a computer.

4. Avoid eating and drinking near the computer.

5. Before using the computer, be sure that you fully understand the computer software.

6. Avoid trailing the wires of a computer across or around the room, because people
might trip on them.

7. Avoid overloading electrical socket.

8. Use a work desk which is strong enough to support computers and equipment.

9. When installing software in your computer such as antivirus and antispyware, ask for
assistance from a knowledgeable elder.

10. Before touching any hardware, make sure that the electricity is off.

Input 3: Using the internet (E-mail, Social Media, and Browsing) Safely
The Internet can be a great place for everybody to research, learn, communicate, socialize
with other people, and play interactive or online games. However, there are also risks in using
the Internet.
The following are several helpful tips for children and students to stay safe online.

1. Never give real names, addresses, contact number (either landline or cellphone
number), and even the name and address of your school to anyone online whom you really do
not know.
2. Never send or show your real pictures or pictures of your family to anyone online
whom you really do not know.

3. When creating an e-mail address, user account names, and screen names, never include
your real name, birthday, address, name, and address of your school, or any combination of
personally identifiable information.

4. Let your parents know your password/s, but never share them with your friends.

5. Always “Log out” on any website you are signed in (like Facebook, Instagram, or any
other social networking website). When using a borrowed/rented computer/laptop, tablets,
cellphones, and the like, logging out is necessary for your personal protection.

6. Beware of online surveys and quizzes that are often advertised on the top and on the
sides of webpages. When your personal information is asked, keep in mind that many of those
advertisements are written by untrustworthy sources.

7. Never meet with any person you just met online. Tell your parents or guardians if
someone online wants to meet you. Not all people online are honest; some are just hiding their
real personality.

8. If you want to upload or post something online, especially photos, think first and be
responsible enough.

9. When someone sends you mean or rude messages (like in e-mails or chat), do not
respond anymore, delete any unwanted messages, Block and delete online friends who
continuously bother you or keep on posting inappropriate contents.

10. If you wish to download or install an application, software, or anything in your


computer, tell your parent/s or guardian to check them first.

11. Whenever you are using an Internet ang there is something or the screen that worries
you, do not hesitate to tell you parents or guardians about it.

Learning Activity
E. ABSTRACTION
F. EVALUATION
Activity
Enumerate the factors to be considered in using a computer, the internet, and e-mail?
a) ___________________________________________________________________________
b) ___________________________________________________________________________
c) ___________________________________________________________________________
d) ___________________________________________________________________________

Assignment
Answer the following questions. Write your answers on the lines.
1. What is Information Technology?
______________________________________________________________________________
______________________________________________________________________________

2. What is cyberbullying?
______________________________________________________________________________
______________________________________________________________________________
EPP 4
Name: _____________________________________ Date: _______________
Grade: _____________________________________ Rating: _____________
Topic:
Activity:
Enumerate the factors to be considered in using a computer, the internet, and e-mail?
a) ___________________________________________________________________________
b) ___________________________________________________________________________
c) ___________________________________________________________________________
d) ___________________________________________________________________________

Assignment
Answer the following questions. Write your answers on the lines.
1. What is Information Technology?
______________________________________________________________________________
______________________________________________________________________________

2. What is cyberbullying?
______________________________________________________________________________
______________________________________________________________________________
EPP 4: First Quarter
Lesson 3
A. TOPIC: Information and Communications Technology (ICT)
SUBJECT MATTER: Safe and Responsible use of ICT

B. AIM:
- Identify the dangers caused by malwares.
- Enumerate the common types of malwares
- Identify the malware symptoms

C. ACTIVITIES:
Materials:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext
- Computer, Internet connection
Methodology:
Classroom Flipping
Allow students to interact in a dynamic learning environment
References:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext

D. LEARNING CONTENT:

Input 1: The Danger Caused by a Malware


One of the dangers brought about by using the Internet is the risk of acquiring computer
virus and malwares. The computer’s system is just like a human body. It is also susceptible to
sickness. It can be infected by computer virus and malwares. An antivirus is used to scan the
computer so that it will be protected from computer virus and malwares.

Malware
Malware is a shortened term for “malicious software” which is designed to damage or disable
computers and computer systems. These can steal, encrypt, or delete sensitive data; alter core
computing functions; and monitor the user’s computer activity without any permission.

Input 2: Common Types of Malwares

1. Worm – The computer worms spread over the computer networks by exploiting the
computer system vulnerabilities. They can self-replicate and spread independently. Often, they
are spread through mass e-mails with infected attachments to users’ contacts.

2. Virus – This is a malware which can copy itself and spreading to other computers.
They can steal information, harm host computers and networks, steal money, create boot nets,
render advertisements, and do other wats to cause damages.
3. Trojan Horse – It is also known as “Trojan”. To trick the users to download or install
the malware, it disguises itself as a normal file or program.

4. Bug – It is a flaw that produces undesired outcomes which are usually results of human
error and usually exists in the source code or compilers of a program. These can be prevented
with developer education, code analysis tools, and quality educations.
5. Adware – It is a short form of advertising-supported software, it delivers
advertisements automatically such as pop-up ads on websites and applications which offer free
versions that are bundled with adware.

6. Bots – These are created to automatically perform some specific functions. Some of
them are created for harmless purposes. Using captcha test which verifies that you are a human,
websites are being guarded from bots.

7. Ransomware – It holds the computer system captive while demanding a ransom. It


encrypts the user’s access to the computer by encrypting files to the hard drive or locking down
the system. Then, it will display a message forcing the user to pay the malware creator to remove
restriction as well as to regain access.

8. Rootkit – This is designed to remotely access or control a computer wherein the users
or even the security programs cannot detect. It cannot be removed easily because it keeps hiding
itself.
9. Spyware – It functions by spying the user’s activity without their knowledge. It spreads
by exploiting software vulnerabilities.

Input 3: Malware symptoms


These malwares spread easily and infect computers in different ways. But most of the
time, they have similar symptoms. Here are some of the symptoms when a computer is infected.
1. The computer or the web browser speed becomes slower.
2. the files rare modified or deleted.
3. the CUP usage increases.
4. There is a problem when connecting to a network.
5. It is freezing or crashing.
6. The running programs turn off or reconfigure themselves.
7. The computer behavior becomes strange.
8. The e-mails and messages are being sent automatically without the user’s knowledge.
9. Strange files, programs, or desktop icons appear.

E. ABSTRACTION
F. EVALUATION
Activity
Write down the common types of malware that damage the computer.
1. ____________________________________________________________________________
2. ____________________________________________________________________________
3. ____________________________________________________________________________
4. ____________________________________________________________________________
5. ____________________________________________________________________________
6. ____________________________________________________________________________
7. ____________________________________________________________________________
8. ____________________________________________________________________________
9. ____________________________________________________________________________
10. ___________________________________________________________________________

Assignment
Enumerate the following malware symptoms? Give six (6) symptoms only.
a) ___________________________________________________________________________
b) ___________________________________________________________________________
c) ___________________________________________________________________________
d) ___________________________________________________________________________
e) ___________________________________________________________________________
f) ___________________________________________________________________________
EPP 4
Name: _____________________________________ Date: _______________
Grade: _____________________________________ Rating: _____________
Topic:
Activity:
Write down the common types of malware that damage the computer.
1. ____________________________________________________________________________
2. ____________________________________________________________________________
3. ____________________________________________________________________________
4. ____________________________________________________________________________
5. ____________________________________________________________________________
6. ____________________________________________________________________________
7. ____________________________________________________________________________
8. ____________________________________________________________________________
9. ____________________________________________________________________________
10. ___________________________________________________________________________

Assignment
Enumerate the following malware symptoms? Give six (6) symptoms only.
a) ___________________________________________________________________________
b) ___________________________________________________________________________
c) ___________________________________________________________________________
d) ___________________________________________________________________________
e) ___________________________________________________________________________
f) ___________________________________________________________________________
EPP 4: First Quarter
Lesson 4
A. TOPIC: Information and Communications Technology (ICT)
SUBJECT MATTER: Gathering and Organizing Information using ICT

B. AIM:
- Identify the computer, the Internet and ICT.
- Enumerate The importance of a computer.
- Discuss the importance of Information and Communications Technology (ICT)

C. ACTIVITIES:
Materials:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext
- Computer, Internet connection
Methodology:
Classroom Flipping
Allow students to interact in a dynamic learning environment
References:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext

D. LEARNING CONTENT:

Input 1: The Computer, The Internet, and ICT

Aside from books, magazines, newspapers, dictionaries, and other resource materials,
Information and Communications Technology (ICT) can also be used in researching and
gathering information. The use of Internet is very useful to everybody, if it is properly used., The
use of modern technologies is very much in-demand in today’s generation.

A computer is an electronic device that helps people process data and information. It can
be a personal computer, a laptop, a netbook, or a main frame computer which is used in big
companies. Important documents can be stored in electronic form or soft copy.
The computers used in schools, government agencies, hospitals, companies, and other
organizations are networked. These computer networks can be connected to each other to form a
worldwide computer network which is called Internet.

The Internet is a network of networks wherein users from any computer can be
information from other computers provided that they have permission. It is useful in many ways,
such as gathering information from the Internet and downloading songs, movies, animations,
videos, and texts.
Information and Communications Technology (ICT) pertains to different kinds of
technology which is used in communications. Example are smartphones, computers, Internet,
radios, and digital TVs. These are used to process, store, create, and share information.

Input 2: The Importance of a Computer

Computers can be found everywhere. The use of computer in today’s generation is in


demand. They are used at homes, In most business, and in schools. Using a computer has many
purposes, such as:

1. Making school projects


2. Writing personal and business letters.
3. Writing and sending e-mails.
4. Browsing and surfing.
5. Gathering data/information (research).
6. Playing online and offline games.
7. Viewing movies.
8. Creating videos.
9. Using a spreadsheet.
10. Saving information.
11. Making communication easier.
12. Ordering and tracking resources easier.
13. Allowing people to have meetings from different locations.

Input 3: The Importance of ICT

1. Job opportunities – The existence of ICT opens many job opportunities to people in
all walks of life. It provides jobs like encoder, graphic artist, layout artist, animator, technician,
computer programmer, call center agent, and many others.

2. Communication – Technologies like cellphones/smartphones, webcams, and instant


messaging applications (chat, messenger, e-mail, group conferences) are byproducts of ICT.
These technologies provide cheaper, quicker, and more efficient ways of communication.

3. Cost-effectiveness – Most business enterprises use Information Technology wherein


the business process is computerized. In this way, productivity increases, and the working
conditions is less strenuous.

4. Globalization – ICT brings the world closer by means of communication. It not only
gives ways for information to be shared quickly and effectively but it also brings down language
barriers and geographic boundaries. People from different parts of the world can share ideas and
information with ache other because of ICT.
5. E-commerce – Most business enterprises are open anytime and anywhere like an
online business which is open 24 hours a day, seven days a week globally. Purchasing from
different places nationwide, even from different countries are made convenient and easier with
the use of ICT.

E. ABSTRACTION

F. EVALUATION
Activity
EPP 4
Name: _____________________________________ Date: _______________
Grade: _____________________________________ Rating: _____________
Topic:
Activity:
EPP 4: First Quarter
Lesson 5
A. TOPIC: Information and Communications Technology (ICT)
SUBJECT MATTER: Gathering and Organizing Information using ICT

B. AIM:
- Introduce the web browser and the search engine

C. ACTIVITIES:
Materials:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext
- Computer, Internet connection
Methodology:
Classroom Flipping
Allow students to interact in a dynamic learning environment
References:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext

D. LEARNING CONTENT:

Input 1: The Web Browser


A web browser is a computer program used to find information and access different web
sites in the Internet. It allows the user to go through the content of the website such as the texts
and images. It is also capable of playing various media content like music, video, and animation.

Lagay ng icons ng web browsers like google chrome, internet


edge, mozilla firefox etc kse wla akong internet

Basic Features of the Web Browsers

Lagay ng picture ng search engine na may parts. Wla kse ako ng


internet eh

1. Menu – This allows the user to do various tasks like copying and printing an article or
picture from the Internet, saving a favorite web page, and even setting the user’s Internet options.
2. Function Icon – This is a button that allows the user to quickly perform tasks such as
refreshing the web page, going back to that last page viewed, or going forward to the next page
viewed.
3. Minimize, Maximize, Close buttons – These allows the user to make the browser
look smaller, look larger, or close it completely.
4. Web Address area – This allows the user to type what he/she wants to browse; it may
be the web site address or the particular subject.
5. Search Engine – This is a large database containing information on millions of
websites. Some examples of search engines are Google, Yahoo!, Bing, and others.
6. Keyword Search area – It allows the user to type the keyword/s that describe the type
or kind of Information he/she wants to find.
7. Start Menu – This helps the user to open various computer programs which he/she
wants to use while browsing such as MS Word, MS Excel, and MS PowerPoint.
8. Taskbar – This is found at the bottom of the screen. It is a list of all programs that the
user currently opened. To maximize a particular program on the screen while browsing, just click
on one of the icons. For example, the user wants to copy and paste an image to MS Word. He/she
can go from a folder to an MS Word file by clicking their icons on the taskbar.
How a Browser Works
A browser works by interpreting the special programming codes that are used to create a
page. These codes are called HTML (Hyper Text Markup Language). It describes the wat the
page is set up, the format of the text, and other aspects of the web page design.
Input 2: The Search Engine
The best wat to navigate the millions of sites in the World Wide Web is to use a search
engine. A search engine is a web-based tool that enables users to locate information on the
World Wide Web. Popular examples of search engines are Google, Yahoo!, and MSN Search.
Search engines utilize automated software applications (referred to as robots, bots, or spiders)
that travel along the Web, following links from page to page or site to site. The Information
gathered is used to create a searchable index of the Web.

Insert picture from book here

You might also like