You are on page 1of 3

Republic of the Philippines

Department of Education
Region IX, Zamboanga Peninsula
DIVISION OF ZAMBOANGA CITY
Baliwasan Chico, Zamboanga City

Lesson Plan in ICT Empowerment of Technologies for Strand


Grade/Section Grade 11 HUMSS E
Date/Time July 22, 2019 (3:00-4:00p.m)
Room A-6
Quarter 2nd Quarter
Content Standard The learners demonstrate an understanding of the principles and
techniques of design using online creation tools, platforms, and
applications to develop ICT content for specific professional tracks
Performance Standard The learners shall be able to independently apply the principles
and techniques of design using online creation tools, platforms,
and applications to create original or derivative ICT content for
use in specific professional tracks
Learning Competencies At the end of this lesson, the students should be able to:
Understand the ways in combatting cybercrime and policy
incorporated in R.A 10175;
Identify punishable acts with corresponding penalties under R.A
10175;
Appreciate the importance of knowing the Cybercrime
Prevention Act of 2012
I. Learning Objectives explain the concept of disadvantages of ICT
describe the characteristics of cybercrime and to know to
combat it against crime
II. Subject Matter The Disadvantages of ICT : Combatting Cybercrimes
a. Concept Concepts of Community Health
b. Materials Visual Aids, Pictures, marking pens
c. References Innovative Training Works, Inc. (2016).
Empowerment Technologies. Manila:Rex Book Store, Inc
d. Process Skills Inferring, Communicating, Classifying and Observing
e. Values Integration  Self-discipline
 Respect
 Awareness of Social Problems
 Appreciating the importance of Health
 Environmental ethics
f. Integration of learning  Values Education
Areas  Science
 English
 Arpan
III. Learning Tools
Preparation Greetings
Checking of Attendance
a. Lesson Proper: Note: Remind the learners of the classroom rules. Knowledge
Base Corners:
1. There are four large strips of paper and each one has a label
with phrases: “I don’t know”, “I know a little bit”, “I know a lot”,
and “I am expert of it”.
2. Post each strip of paper in a corner of the room.
3. Let the learners move around to each corner of the room
whenever I read texts/terms related to the lesson that matches
their knowledge level for the topic.
Terms:
Cybercrime, Fraud, Forgery, Libel, Identity Theft, Republic Act
No. 10175, and Cybercrime Prevention Act4.
Emphasize to be cautious in moving around to avoid accident.
Activity Have the learners watch the 4-minutes and 51-
seconds video entitled, “Failon Ngayon - Cybercrime cases in the
Philippines”.
According to Feliciano R. Fajardo (1994.), the country’s growth is
a progressive process in improving the human condition, such as

across reducing poverty, unemployment, ignorance, inequality, and


exploitation. (Araling Panlipunan 10 Konsepto ng Pag-unlad)
1. Discuss the several ways the authorities can help solve or

curriculum
prevent cybercrimes. Some of them are:
Network Security
Investigation
Penalties2.

Divide the learners to 8 groups and provide each one a hand-out


about RA 10175. Let them select their leader and spokesperson.3.

Each member of the group is assigned a color (red, blue, yellow,


green, orange, violet).4.

All groups are given 20-minutes to discuss/share ideas.5.

After the 20-minutes period, the spokesperson of each group will


report their assigned topic.
Analysis 1. “GUILTY” and “NOT GUILTY” response cards are given to
each group. Each group shall raise appropriate judgement
for the given situation, and I will pick from the group with
correct judgement to explain why he/she gave that
verdict. Every correct judgement is given 1 point that will
be added to their summative assessment.
Situation No. 1: Katrina developed a popping up ad
telling the user won something and asking for his/her card
details to pay for shipping. Eliza clicked the ad and never
receives anything. Then she starts noticing weird
transactions coming from her bank account.
Situation No. 2: Video File
Situation No. 3: Video Fil
Abstraction 1. Question: If your friend happened to do such cybercriminal
activities specifically identity theft, what will you do?
Note: Give positive feedback to students who shared their
opinions/ideas.
Application: Ask the learners the importance having knowledge about R.A 10175 or
the Cybercrime Prevention Act of 2012.
Note: Give positive feedback to students who shared their
opinions/ideas & encourage them to ask questions about the topic.
V. Evaluation: ACROSS
1 Illegal acts done through the use og the Internet.5 The crime of using
dishonest methods to take something valuable from another person.6 The
act of obtaining unauthorized access to data from a computer network.8
Unwanted emails.
DOWN
 2 The act of using the Internet to threaten or damage someone's
reputation in exchange ofmoney or anything else of value.3 A person
who makes money illegally by getting customers for prostitutes.4 Something
that is falsely made in order to deceive people.7 The act of sending multiple
emails to multiple users in hopes of having a number of them


VI. Assignment What are the possible things why cyber crime is rampant in the
internet today?
Prepared by:

Mr. Cristian B. Leonardo

Checked by:

_______________________

You might also like