Professional Documents
Culture Documents
B. Performance Standards
C. Learning Competencies/Objectives
Write the LC code for each
No Class
First Quarter Examination Removal examination Start of BSP and GSP
encampment
Content is what the lesson is all about. It pertains to he subject matter that the
II. CONTENT teacher aims to teach. In the CG, the content can be tackled in a week or two.
IV. LEARNING RESOURCES List the materials to be used in the different days. Varied sources of materials sustain children’s interest in th lesson and in learning. Ensure that there is a mix of concrete and manipulative
materials as well as paper-based materials. Hands-on learning promotes concept development
A. References
1. Teacher’s Guide pages
2. Learner’s Material pages
3. Textbook pages Amazing World of Computers P76 -92
4. Additional Materials from
Learning Resource (LR) portal
B. Other Learning Resources Internet Internet Internet Internet
V. PROCEDURES These steps should be done across the week. Spread out the activities appropriately so that students will learn well. Always be guided by demonstration of learning by the students which you
infer from formative assessment activities. Sustain learning systematically by providing students with multiple ways to learn new things, practice their learning, question their learning processes
and draw conclusions about what they learned in relation to their life experiences and previous knowledge. Indicate time allotment for each step.
A. Reviewing previous lesson or No Class
presenting the new lesson Checking of Attendance
Checking of attendance Checking of Attendance Start of BSP and GSP
Short Review
encampment
B. Establishing a purpose for the Ask the learners the following questions:
lesson First quarter examination for those 1. Have you ever try that your files have been corrupted or hidden
Removal Examinations for those
who are absent during the scheduled by a virus?
students who failed in the examinations
examination. 2. Or Have you heard someone’s facebook account had been
hacked?
C. Presenting
examples/instances of the
new lesson Powerpoint Presentation: Computer Security Risk
E. Discussing new concepts and How is virus, worms and Trojan What is a hacker?
practicing new skills #2 What are the things to do in order to delivers their payload? How to prevent unauthorized
earn extra points for those who have What are the ways to prevent virus, access?
failing grades. worms and Trojan horse infections? What is software piracy?
What is an unauthorized access? What is EULA?
F. Developing mastery
(Leads to Formative Assessment 3)
H. Making generalizations and Explain what is security risk? Define what is virus, worm and Trojan horse.
abstractions about the lesson Discuss what are the symptoms of a virus, worm and Trojan horse attack
and how to prevent them. Discuss what is hacker and how to prevent
hacker from unauthorized access. Discuss also what is software piracy and a
license agreement.
I. Evaluating learning
VI. REMARKS
VII. REFLECTION Reflect to your teaching and assess yourself as a teacher. Think about your student’s progress this week. What works? What also needs to be done to help the students learn? Identify what help
your instructional supervisors can provide for you so when you met them, you can ask them relevant questions.
A. No. of learners who earned 80% in
the evaluation
For improvement, enhancement and/or clarification of any Deped materials used, kindly submit feedback to bid.tld@deped.gov.ph