You are on page 1of 3

Department of Education

DIVISION OF DAVAO DE NORTE


ASUNCION NATIONAL HIGH SCHOOL
Asuncion, Davao del Norte

Grade Level: 11
School: ASUNCION NHS
DAILY Learning Area: EMPOWERMENT OF
Teacher: ABRAHAM C. BOJOS
LESSON TECHNOLOGIES
Date: FEBRUARY 18, 2020
PLAN Quarter: 3RD
Semester: 2ND
I – OBJECTIVES
The learners demonstrate an understanding of how to work with peers
A. Content Standard and external publics/ partners for the development of an ICT project that
advocates or mobilizes for a specific Social Change or cause.
The learners shall be able to independently apply to collaboratively
B. Performance
participate actively in the creation and development of an ICT Project for
Standard
Social Change relating to an issue in specific professional tracks.
Analyze how target or intended users and audiences are expected to respond to
C. Learning
the proposed ICT Project for Social Change on the basis of content, value, and
Competency
user experience.
D. Learning Objectives
Knowledge: • Understand the ways in combatting cybercrime and policy incorporated in R.A
10175;
Skills: • Identify punishable acts with corresponding penalties under R.A
10175.
Affective: • Appreciate the importance of knowing the Cybercrime Prevention Act
of 2012.
II – CONTENT
THE DISADVANTAGES OF ICT: COMBATTING CYBERCRIME
III – LEARNING
RESOURCES
A. References Innovative Training Works, Inc. (2016). Empowerment Technologies. Manila:Rex
Book Store, Inc.
B. Other Learning Department of Education (2015). Ekonomiks, Araling panlipunan – Modyul para
Resources sa Mag-aaral. First Edition. Philippines:Vibal Group, Inc.
ABS-CBN News (2017, March 4). Failon Ngayon - Cybercrime cases in the
Philippines [Video File]. Retrieved from
https://www.youtube.com/watch?v=tKOeloKle8Y&T=25s
The LAWPHIL Project (March 1, 2019). Cybercrime Prevention Act of 2012.
Retrieved from
https://www.lawphil.net/statutes/repacts/ra2012/ra_10175_2012.html.
IV – PROCEDURES
A. Routinary Activities Classroom Management
- Prayer
- Checking of attendance
- Review

A1. ACTIVITY [3] Activity: KNOWLEDGE BASE CORNERS:


1. There are four large strips of paper and each one has a label with
phrases: “I don’t know”, “I know a little bit”, “I know a lot”, and “I am expert
of it”.
2. Post each strip of paper in a corner of the room.
3. Let the learners move around to each corner of the room whenever I
read texts/terms related to the lesson that matches their knowledge level
for the topic.
Terms: Cybercrime, Fraud, Forgery, Libel, Identity Theft, Republic
Act No. 10175, and Cybercrime Prevention Act
4. Emphasize to be cautious in moving around to avoid accident. (literacy
and numeracy)
A2. ANALYSIS [4] 1. Discuss the several ways the authorities can help solve or prevent
cybercrimes. Some of them are:
• Network Security
• Investigation
• Penalties
2. Divide the learners to 8 groups and provide each one a hand-out about RA
10175. Let them select their leader and spokesperson.
3. Each member of the group is assigned a color (red, blue, yellow, green,
orange, violet).
4. All groups are given 20-minutes to discuss/share ideas.
5. After the 20-minutes period, the spokesperson of each group will report their
assigned topic.

A3. ABSTRACTION “GUILTY” and “NOT GUILTY” response cards are given to each group. Each
group shall raise appropriate judgement for the given situation and I will pick from
the group with correct judgement to explain why he/she gave that verdict. Every
correct judgement is given 1 point that will be added to their summative
assessment.
• Situation No. 1: Katrina developed a popping up ad telling the user won
something and asking for his/her card details to pay for shipping. Eliza
clicked the ad and never receives anything. Then she starts noticing
weird transactions coming from her bank account.
• Situation No. 2: Video File
• Situation No. 3: Video File
A4. APPLICATION [5] Question: If your friend happened to do such cybercriminal activities specifically
(Ict Integration and literacy and identity theft, what will you do?
numeracy) Note: Give positive feedback to students who shared their opinions/ideas.

A5. FORMATIVE Summative Assessment: Complete the crossword below.


ASSESSMENT [6]

ACROSS

1 Illegal acts done through the use og the Internet.


5 The crime of using dishonest methods to take something valuable
from another person.
6 The act of obtaining unauthorized access to data from a computer
network.
8 Unwanted emails.
DOWN
2 The act of using the Internet to threaten or damage someone's
reputation in exchange of money or anything else of value.
3 A person who makes money illegally by getting customers for
prostitutes.
4 Something that is falsely made in order to deceive people.
7 The act of sending multiple emails to multiple users in hopes of having
a number of them clicking on the links or malwares attached to the
email.
Prepared by: Checked by:
ABRAHAM C. BOJOS JUMAR C. CALES
Teacher I Master Teacher II

You might also like