Professional Documents
Culture Documents
Lesson 1
A. TOPIC: ENTREPRENEURSHIP
SUBJECT MATTER: The Concept of Entrepreneurship
B. AIM:
- Define entrepreneurship and entrepreneur
- Identify the importance of entrepreneurship
- Discuss the characteristics of an entrepreneur
C. ACTIVITIES:
Materials:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext
- Logos of famous business enterprises in the Philippines
Methodology:
Classroom Flipping
Allow students to interact in a dynamic learning environment
References:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext, pp.
D. LEARNING CONTENT:
3. Encouraging the local development – They promote the growth of the local
development through creating business/enterprise within their community.
5. Improving the standard of living with locally sourced options that offer lower
prices – The people in the community would rather choose products with lower prices.
The entrepreneurs provide options to them with their competitive products that offer
lower prices.
7. Encouraging people to be in business and working on their own – Some people are
inspired by successful entrepreneurs. That is why some people are encouraged to put up
their own businesses.
Some people are said to be born as entrepreneurs because they have entrepreneurial
predispositions which they can develop to increase their chances of becoming successful in
business. But then, everyone can be an entrepreneur if he/she has a driving force to achieve in
business. Early exposure to any business or enterprise during childhood can help build the
foundations for a successful entrepreneurial career.
An entrepreneur must possess the following entrepreneurial characteristics.
1. Has a desire for responsibility – He/she considers his/her coming ventures with
which he/she is associated as his/her resources and the uses of those resources. To
achieve self-determined goals. He/she makes use of his/her resources wisely.
3. Has a high level of energy – He/she is more energetic than ordinary people. He/she
can work long hours.
4. Prefers moderate risks – Entrepreneurs are said to be risk-takers because they see the
market differently ang they even see the product or service that will converge with how
the world is changing. But an entrepreneur is not a wild risk-taker. He/she takes
calculated risks.
5. Desires for immediate feedback – He/she likes to know that response of the
consumers to his/her business or enterprise. As an entrepreneur, he/she accepts feedbacks
positively so that he/she can improve his/her products.
7. Has organizational skills – He/she must know how to position the right people to help
in his/her business as well as to perform a task.
8. Gives value in his/her own money – Achievement is the primary motivating force in
business, but money is the symbol of the achievement, an entrepreneur must know how to
keep and grow his/her money.
10. Flexible – He/she can adapt to the changing demands of customers or even the
business itself.
Learning Activity
E. ABSTRACTION
F. EVALUATION
Activity 1
Write down the characteristics an entrepreneur must possess.
1. _____________________________________________________________
2. _____________________________________________________________
3. _____________________________________________________________
4. _____________________________________________________________
5. _____________________________________________________________
6. _____________________________________________________________
7. _____________________________________________________________
8. _____________________________________________________________
9. _____________________________________________________________
10. ____________________________________________________________
Assignment
Within the community, Interview an entrepreneur. Ask him/her the following questions:
1. What business do you have?
2. What entrepreneurial characteristics do you possess?
List down the gathered information in your notebook.
EPP 4
Name: _____________________________________ Date: _______________
Grade: _____________________________________ Rating: _____________
Topic:
Activity:
Write down the characteristics an entrepreneur must possess.
1. _____________________________________________________________
2. _____________________________________________________________
3. _____________________________________________________________
4. _____________________________________________________________
5. _____________________________________________________________
6. _____________________________________________________________
7. _____________________________________________________________
8. _____________________________________________________________
9. _____________________________________________________________
10. ____________________________________________________________
Assignment
Within the community, Interview an entrepreneur. Ask him/her the following
questions:
1. What business do you have?
2. What entrepreneurial characteristics do you possess?
List down the gathered information in your notebook.
EPP 4: First Quarter
Lesson 2
A. TOPIC: Information and Communications Technology (ICT)
SUBJECT MATTER: Safe and Responsible use of ICT
B. AIM:
- Discuss the factors to consider in using a computer, the internet, and an e-mail.
- Discuss the personal safety while working with a computer
- Discuss how to use the Internet safely.
C. ACTIVITIES:
Materials:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext
- Computer, Internet connection
Methodology:
Classroom Flipping
Allow students to interact in a dynamic learning environment
References:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext,
D. LEARNING CONTENT:
1. Viruses, adware, and spyware – The user must be aware that his/her computer can
get a virus while using the internet. It can damage the files and memory of the computer
and even affect its functions.
3. Harassment and cyberbullying – A user must be aware that not all people online are
trustworthy. Some of the, especially those who the user really does not know can harass
or cyberbully him/her.
4. Identity theft or fraud – The user must be aware that his/her identity can be stolen
without his/her prior knowledge, some bad people do this intentionally to create crimes or
unlawful acts.
2. Do not touch the metallic parts of the components which are plugged into a power
source.
5. Before using the computer, be sure that you fully understand the computer software.
6. Avoid trailing the wires of a computer across or around the room, because people
might trip on them.
8. Use a work desk which is strong enough to support computers and equipment.
9. When installing software in your computer such as antivirus and antispyware, ask for
assistance from a knowledgeable elder.
10. Before touching any hardware, make sure that the electricity is off.
Input 3: Using the internet (E-mail, Social Media, and Browsing) Safely
The Internet can be a great place for everybody to research, learn, communicate, socialize
with other people, and play interactive or online games. However, there are also risks in using
the Internet.
The following are several helpful tips for children and students to stay safe online.
1. Never give real names, addresses, contact number (either landline or cellphone
number), and even the name and address of your school to anyone online whom you really do
not know.
2. Never send or show your real pictures or pictures of your family to anyone online
whom you really do not know.
3. When creating an e-mail address, user account names, and screen names, never include
your real name, birthday, address, name, and address of your school, or any combination of
personally identifiable information.
4. Let your parents know your password/s, but never share them with your friends.
5. Always “Log out” on any website you are signed in (like Facebook, Instagram, or any
other social networking website). When using a borrowed/rented computer/laptop, tablets,
cellphones, and the like, logging out is necessary for your personal protection.
6. Beware of online surveys and quizzes that are often advertised on the top and on the
sides of webpages. When your personal information is asked, keep in mind that many of those
advertisements are written by untrustworthy sources.
7. Never meet with any person you just met online. Tell your parents or guardians if
someone online wants to meet you. Not all people online are honest; some are just hiding their
real personality.
8. If you want to upload or post something online, especially photos, think first and be
responsible enough.
9. When someone sends you mean or rude messages (like in e-mails or chat), do not
respond anymore, delete any unwanted messages, Block and delete online friends who
continuously bother you or keep on posting inappropriate contents.
11. Whenever you are using an Internet ang there is something or the screen that worries
you, do not hesitate to tell you parents or guardians about it.
Learning Activity
E. ABSTRACTION
F. EVALUATION
Activity
Enumerate the factors to be considered in using a computer, the internet, and e-mail?
a) ___________________________________________________________________________
b) ___________________________________________________________________________
c) ___________________________________________________________________________
d) ___________________________________________________________________________
Assignment
Answer the following questions. Write your answers on the lines.
1. What is Information Technology?
______________________________________________________________________________
______________________________________________________________________________
2. What is cyberbullying?
______________________________________________________________________________
______________________________________________________________________________
EPP 4
Name: _____________________________________ Date: _______________
Grade: _____________________________________ Rating: _____________
Topic:
Activity:
Enumerate the factors to be considered in using a computer, the internet, and e-mail?
a) ___________________________________________________________________________
b) ___________________________________________________________________________
c) ___________________________________________________________________________
d) ___________________________________________________________________________
Assignment
Answer the following questions. Write your answers on the lines.
1. What is Information Technology?
______________________________________________________________________________
______________________________________________________________________________
2. What is cyberbullying?
______________________________________________________________________________
______________________________________________________________________________
EPP 4: First Quarter
Lesson 3
A. TOPIC: Information and Communications Technology (ICT)
SUBJECT MATTER: Safe and Responsible use of ICT
B. AIM:
- Identify the dangers caused by malwares.
- Enumerate the common types of malwares
- Identify the malware symptoms
C. ACTIVITIES:
Materials:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext
- Computer, Internet connection
Methodology:
Classroom Flipping
Allow students to interact in a dynamic learning environment
References:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext
D. LEARNING CONTENT:
Malware
Malware is a shortened term for “malicious software” which is designed to damage or disable
computers and computer systems. These can steal, encrypt, or delete sensitive data; alter core
computing functions; and monitor the user’s computer activity without any permission.
1. Worm – The computer worms spread over the computer networks by exploiting the
computer system vulnerabilities. They can self-replicate and spread independently. Often, they
are spread through mass e-mails with infected attachments to users’ contacts.
2. Virus – This is a malware which can copy itself and spreading to other computers.
They can steal information, harm host computers and networks, steal money, create boot nets,
render advertisements, and do other wats to cause damages.
3. Trojan Horse – It is also known as “Trojan”. To trick the users to download or install
the malware, it disguises itself as a normal file or program.
4. Bug – It is a flaw that produces undesired outcomes which are usually results of human
error and usually exists in the source code or compilers of a program. These can be prevented
with developer education, code analysis tools, and quality educations.
5. Adware – It is a short form of advertising-supported software, it delivers
advertisements automatically such as pop-up ads on websites and applications which offer free
versions that are bundled with adware.
6. Bots – These are created to automatically perform some specific functions. Some of
them are created for harmless purposes. Using captcha test which verifies that you are a human,
websites are being guarded from bots.
8. Rootkit – This is designed to remotely access or control a computer wherein the users
or even the security programs cannot detect. It cannot be removed easily because it keeps hiding
itself.
9. Spyware – It functions by spying the user’s activity without their knowledge. It spreads
by exploiting software vulnerabilities.
E. ABSTRACTION
F. EVALUATION
Activity
Write down the common types of malware that damage the computer.
1. ____________________________________________________________________________
2. ____________________________________________________________________________
3. ____________________________________________________________________________
4. ____________________________________________________________________________
5. ____________________________________________________________________________
6. ____________________________________________________________________________
7. ____________________________________________________________________________
8. ____________________________________________________________________________
9. ____________________________________________________________________________
10. ___________________________________________________________________________
Assignment
Enumerate the following malware symptoms? Give six (6) symptoms only.
a) ___________________________________________________________________________
b) ___________________________________________________________________________
c) ___________________________________________________________________________
d) ___________________________________________________________________________
e) ___________________________________________________________________________
f) ___________________________________________________________________________
EPP 4
Name: _____________________________________ Date: _______________
Grade: _____________________________________ Rating: _____________
Topic:
Activity:
Write down the common types of malware that damage the computer.
1. ____________________________________________________________________________
2. ____________________________________________________________________________
3. ____________________________________________________________________________
4. ____________________________________________________________________________
5. ____________________________________________________________________________
6. ____________________________________________________________________________
7. ____________________________________________________________________________
8. ____________________________________________________________________________
9. ____________________________________________________________________________
10. ___________________________________________________________________________
Assignment
Enumerate the following malware symptoms? Give six (6) symptoms only.
a) ___________________________________________________________________________
b) ___________________________________________________________________________
c) ___________________________________________________________________________
d) ___________________________________________________________________________
e) ___________________________________________________________________________
f) ___________________________________________________________________________
EPP 4: First Quarter
Lesson 4
A. TOPIC: Information and Communications Technology (ICT)
SUBJECT MATTER: Gathering and Organizing Information using ICT
B. AIM:
- Identify the computer, the Internet and ICT.
- Enumerate The importance of a computer.
- Discuss the importance of Information and Communications Technology (ICT)
C. ACTIVITIES:
Materials:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext
- Computer, Internet connection
Methodology:
Classroom Flipping
Allow students to interact in a dynamic learning environment
References:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext
D. LEARNING CONTENT:
Aside from books, magazines, newspapers, dictionaries, and other resource materials,
Information and Communications Technology (ICT) can also be used in researching and
gathering information. The use of Internet is very useful to everybody, if it is properly used., The
use of modern technologies is very much in-demand in today’s generation.
A computer is an electronic device that helps people process data and information. It can
be a personal computer, a laptop, a netbook, or a main frame computer which is used in big
companies. Important documents can be stored in electronic form or soft copy.
The computers used in schools, government agencies, hospitals, companies, and other
organizations are networked. These computer networks can be connected to each other to form a
worldwide computer network which is called Internet.
The Internet is a network of networks wherein users from any computer can be
information from other computers provided that they have permission. It is useful in many ways,
such as gathering information from the Internet and downloading songs, movies, animations,
videos, and texts.
Information and Communications Technology (ICT) pertains to different kinds of
technology which is used in communications. Example are smartphones, computers, Internet,
radios, and digital TVs. These are used to process, store, create, and share information.
1. Job opportunities – The existence of ICT opens many job opportunities to people in
all walks of life. It provides jobs like encoder, graphic artist, layout artist, animator, technician,
computer programmer, call center agent, and many others.
4. Globalization – ICT brings the world closer by means of communication. It not only
gives ways for information to be shared quickly and effectively but it also brings down language
barriers and geographic boundaries. People from different parts of the world can share ideas and
information with ache other because of ICT.
5. E-commerce – Most business enterprises are open anytime and anywhere like an
online business which is open 24 hours a day, seven days a week globally. Purchasing from
different places nationwide, even from different countries are made convenient and easier with
the use of ICT.
E. ABSTRACTION
F. EVALUATION
Activity
EPP 4
Name: _____________________________________ Date: _______________
Grade: _____________________________________ Rating: _____________
Topic:
Activity:
EPP 4: First Quarter
Lesson 5
A. TOPIC: Information and Communications Technology (ICT)
SUBJECT MATTER: Gathering and Organizing Information using ICT
B. AIM:
- Introduce the web browser and the search engine
C. ACTIVITIES:
Materials:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext
- Computer, Internet connection
Methodology:
Classroom Flipping
Allow students to interact in a dynamic learning environment
References:
- Dynamic Series in Home Economics and Livelihood Education 4 worktext
D. LEARNING CONTENT:
1. Menu – This allows the user to do various tasks like copying and printing an article or
picture from the Internet, saving a favorite web page, and even setting the user’s Internet options.
2. Function Icon – This is a button that allows the user to quickly perform tasks such as
refreshing the web page, going back to that last page viewed, or going forward to the next page
viewed.
3. Minimize, Maximize, Close buttons – These allows the user to make the browser
look smaller, look larger, or close it completely.
4. Web Address area – This allows the user to type what he/she wants to browse; it may
be the web site address or the particular subject.
5. Search Engine – This is a large database containing information on millions of
websites. Some examples of search engines are Google, Yahoo!, Bing, and others.
6. Keyword Search area – It allows the user to type the keyword/s that describe the type
or kind of Information he/she wants to find.
7. Start Menu – This helps the user to open various computer programs which he/she
wants to use while browsing such as MS Word, MS Excel, and MS PowerPoint.
8. Taskbar – This is found at the bottom of the screen. It is a list of all programs that the
user currently opened. To maximize a particular program on the screen while browsing, just click
on one of the icons. For example, the user wants to copy and paste an image to MS Word. He/she
can go from a folder to an MS Word file by clicking their icons on the taskbar.
How a Browser Works
A browser works by interpreting the special programming codes that are used to create a
page. These codes are called HTML (Hyper Text Markup Language). It describes the wat the
page is set up, the format of the text, and other aspects of the web page design.
Input 2: The Search Engine
The best wat to navigate the millions of sites in the World Wide Web is to use a search
engine. A search engine is a web-based tool that enables users to locate information on the
World Wide Web. Popular examples of search engines are Google, Yahoo!, and MSN Search.
Search engines utilize automated software applications (referred to as robots, bots, or spiders)
that travel along the Web, following links from page to page or site to site. The Information
gathered is used to create a searchable index of the Web.