You are on page 1of 22

POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.

POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department


BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

A DETAILED LESSON PLAN IN EMPOWERMENT TECHNOLOGY

I. LEARNING OBJECTIVES:
At the end of the lesson, 100% of the students with 75% level of proficiency shall be able
to:

1. Demonstrates understanding of the several problems that Information


and Communication Technology has created in their generation;
2. Transfers learning by composing a reflective essay on how
Information and Communication Technology can change the world for
better or for worse.

II. SUBJECT MATTER:

Topic : Disadvantages of ICT

Materials : PowerPoint, laptop, notebook, pen, class point, video advertisements,


posters
Integration : Media Information Literacy
Values : Widen knowledge with the existence of disadvantage events in the
cyber
world; the existence of crimes and distinguish their differences and how to
avoid it.
Skills : Communication Skills, Media Literacy, Technology Literacy

Learning References:
a. Empowerment Technology Module: Lesson 15 pp.
b. What is Cybercrime; Panda Media Center
https://www.pandasecurity.com/en/mediacenter/panda-security/types-of-
cybercrime/

c. Avast Academy; What is Cybercrime and How can you prevent it


https://www.avast.com/c-cybercrime

d. Cybercrime; Wikipedia
https://en.wikipedia.org/wiki/Cybercrime
e. Clerias; Cybercrime
https://www.clearias.com/cybercrime/

1
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

III. PROCEDURES:
Teacher's Activities Student's Activities

FIRST SLIDE
>WELCOME EVERYONE
TODAY WE ARE HERE IN GRADE 11’S SUBJECT
EMPOWERMENT TECHNOLOGY OF BRAVERY
CLASS

SECOND SLIDE
>BEFORE WE OFFICIAL START OUR CLASS,
LET US FIRST OFFER OUR RESPECT TO OUR
LORD BY PRAYER,
RANEL, PLEASE LEAD PRAYER

A. Preliminary Activities

May I request (student) to lead the prayer for our today's


meeting? (The learner starts praying)

Amen.
>AGAIN,Good afternoon, class! Good afternoon, ma'am!

Okay, class, to monitor the attendee of our meeting


today, I would like to ask our class secretary if there are
any absent in the class, or has somebody informed you
that they will not be around?

Class secretary will answer and


validate the attendance.

Thank you so much MS SECRETARY,

3RD SLIDE
CLASS NETIQUTTE
Please keep in mind that we are following Class
Netiquette for us to have a smooth flow of discussion,
remember to (READ THE NETIQUETTES)
NOW

2
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

Open 4th slide


Before we start our new lesson, let us first do a recap of
what we have learned from our previous topic.
 Who in this class can give me the core idea of our
topic in Lesson 14? ZYRONE DAVE
Student will answer
possible answer:
Online FEEDBACK
 That is right, Thank you ZYRONE DAVE, Last Online SURVEY
meeting we discussed the importance of
Feedback and Survey to an admin or webmaster
for the content or a website that they created to
know the effectivity and popularity of their page
or website.

 Very well, now, to support the answer of


ZYRONE DAVE, Can somebody tell me the
sample platform that we used in creating an
Online Feedback or Survey?
Student will raise hand and answer
Possible answer:
Google Forms

Yes EURY CHARM, that is right, Thank you so much The lesson that we discussed is
about the importance and creation
EURY CHARM. The famous platform that content
of Online Feedback or Survey
creators or admins use is the Google Form in which there
Form in Google Form.
are parts of it that we can use to modify the feedback or
survey form itself.
Students will raise hands and give
We are provided with different options on how we can ask
possible answers:
our respondents. We have 11 question types which are: 1. Short Answer
RICHARD BUENAVENTURA 2. Paragraph
FRANCIS AHRON 3. Multiple Choice
4. Checkboxes
EARL NATHANIEL 5. Dropdown
RANDYWEL 6. File upload
LOVELY KARREL 7. Linear Scale
8. Multiple Choice Grid
JASPER 9. Checkbox Grid
MARC STEVEN 10. Date
RODNHE GIANE 11. Time

JOHN SIBLANG
DENMARK
RIANO JERALD

Very Good __________,so from there, after choosing the


best option that you have, you may send it to your
prospected audience and their answers will reflect on
Responses tab in which you may choose to download and
transfer it in spreadsheet or create a chart from it.

Thank you so much and as you answer I can guarantee


that you have fully understood our Lesson 14.

3
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

Now, moving forward.

Okay now, to give you an introduction to our lesson, we


will be having a very short game

Open SLIDE NUMBER 5

B. Motivation
Picture Recognition

I am going to show you pictures and tell me if it is


 Students will answer Yes,
familiar with you. they are familiar ( Images
gathered are of 100% probability of
popularization among the students)

Student/s will answer


Now, choose among the pictures which do you think has 70:30 probability of answering
its greatest use or advantage for you or to the general FACEBOOK (since everybody have
public. their FB account)

If FACEBOOK was chosen:


As expected, I believe every one of you in this class have
their own FB accounts, right? So now, the question is,
what is its greatest use or advantage for you or to the
general public.

ZYRONE DAVE Student/s will answer:


EURY CHARM  Communication
JULIANA MITZI  Popularity
CANNEY  Bond Solidarity
DAPHNE  Friends expansion
 Easier way of spreading
news and relevant events.

Okay thank you so much for your answer/s ___________.


(elaborate students answer to better understand its use)
Now that we know the things that FACEBOOK could do,
let us now know, what are the disadvantages of using Student will answer and cite
Facebook? disadvantages
Possible answers:
CRISTINE MEI  Posers
LOVELY KARREL  X-rated videos/images

4
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

JAMAEZA  Hackers
JHEAN  Source of deception to
cause fraud or scam

That is right! What you all narrated are correct and


possible!
We are all aware that if there is an existence of
ADVANTAGES, there are also the DISADVANTAGES,
which leads us to our Lesson for today.

OPEN SLIDE 7
III. Presentation of the Lesson

In various aspects, ICT and technology as a whole


brought us comfort and convenience
in life. We, as Filipinos, have been known to be avid users
of technology. Some even made a name as an Internet
sensations. However, aside from those successes are the
downfalls of users.

Walking on a sidewalk does not pose danger as opposed


to walking in the middle of the
street. Remove the sidewalk and you are left to dodge
approaching vehicles. That is probably
how much of us deal with the Internet. In the Internet,
there are no sidewalks; just a huge
superhighway where information freely flows through. If
in the real world we have the police or
the military to monitor us, the Internet is unmonitored,
making it one of the most abused
technology we use.

AND SURPRISINGLY, THERE EXIST THE


OPEN SLIDE 8

CYBERCRIMES

May you please read the description_______


 Student will read
illegal acts done through the
use of the Internet.

Thank you so much _________, from what _____said,


The existence of such illegal deeds happens inside the
virtual world. And believe it or not, there are so many
ways a person could do illegal things with the use of
internet.

IV. Lesson Proper


Some of which are itemized by Stephen Nale in 2012.

5
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

OPEN SLIDE NUMBER 9

He gave the 10 most common CYBERCRIMES known


and they are,
OPEN SLIDE NUMBER 10
may you please read_______?

Student will read the number 1


cybercrime.
Phishing/Spoofing - the act of sending
multiple emails to multiple users in hopes
of having a number of them clicking on the
links or malwares attached to the email.

Thank you so much _______________


(Differentiate Phishing with Spoofing)
For you to better understand the difference of the two, A student will volunteer:
may I have a volunteer who may play as “VICTIM”?

HERES WHAT’S GOING TO HAPPEN, ASSUMING


I CALLED YOU, AND YOU WILL JUST ANSWER
ME OKAY?
LET’S START

Narration
Teacher: Good Afternoon this is Laura from Land bank,
there has been an issue with your account and it has been
locked because of constant transactions, to avoid this
situation we would like to ask you few question regarding Student (victim): Sure!
your account for us to redirect it to the branch Manager
and survive the account. IS IT OKAY MAM?

Teacher: Okay, May I please know your Full Name and Student (victim): I am __________
your Birthday? and my birthday is on __________.

Teacher: Very well, thank you Mr./Ms. _______, to


properly redirect your account and avoid future closure of
Student (victim): Okay no
it, please dictate your last known Online Bank password
problem. (narrate password)
and repeat it after my signal.

Teacher (culprit): Please repeat Student (victim): Repeats


password

 Cut the narration – NOW YOU HEARD, THAT


IS HOW PHISHING HAPPENS, YOU GIVE
INFORMATION FROM SOMEONE WHO

6
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

PRETENDED TO BE A LEGITIMATE
PERSON.

When it comes to Spoofing, the best example for it is


identity theft. Students will say that they are
ARE YOU FAMILIAR WITH THE MOVIE MISSION familiar with the movie
IMPOSSIBLE?
IT IS AGREAT MOVIE, AND IN THAT MOVIE YOU
WILL SEE THAT THE ACTOR OFTEN COPY AND
IDENTITY TO BYPASS A CERTAIN SECURITY
ESPECIALLY IN USERS ACCOUNTS FOR THEM TO
GAIN ACCESS.

After Phishing and Spoofing, we have,


OPEN SLIDE NUMBER 11
may you please read______________

Student volunteer to read.


Blackmail/Extortion - the act of using the
Internet to threaten or damage someone’s
reputation to extort money or anything
else of value.

Thank you so much _________.


This can be avoided if you are
aware of what you should post on the internet. The
victims of this act tent to have posted
something “inappropriate” over the Internet even if they
put it at a secured location.
YOU’LL NEVER KNOW, THE ALBUM THAT YOU
UPLOADED AS PRIVATE IS ALREADY
VULNERABLE.

Do you think, to whom does this action usually happens?


Student/s will answer
Possible answers:
Actors/actress
Politician/s
Right! Those given person are the most vulnerable type
with this kind of cybercrime, why? Because of the
reputation that they are trying to protect.
THEY ARE WILLING TO SPEND MONEY JUST TO
AVOID BEING EXTORTED.

7
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

Moving on, M
OPEN SLIDE NUMBER 12
May you please read the next cybercrime example?

Student will volunteer to read


Accessing Stored
Communications/Hacking - the act of
obtaining unauthorized
access to data rom a computer network.

Thank you so much __________. Commonly we hear


this from someone saying “Na-HACK ako! Everything
was erased or lost”
Are you familiar with those lines? Student will answer
Possible answer
Yes Ma’am we are familiar!

This is typically done to commercial and


government sites to threaten its owner.
IF YOU MUST KNOW, In late 2014, a group of hackers
hacked Sony’s website because of the impending release
of the controversial film “The Interview.” IF YOU HAVE
TIME YOU CAN SEARCH ABOUT IT AND SEE
WHAT HAPPENS WITH THE CASE.

Right! Now let us move on to the next slide


OPEN SLIDE NUMBER 13
May you please read _________
Student will read the description
Sports Betting - the act of wagering on
any sports event on the Internet.

Thank you so much __________


I know most of you are familiar hearing the very famous
online casino and online sabong as we hear in Layman’s Student will respond
term, “talpak”. Have you heard of those before class? Possible response:
Yes Ma’am we are familiar with it!

8
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

Yes! Wherein pit masters collect money to those who


wants to bet on the game. So that action is illegal and is
not accepted by the Law.

Now moving forward with our lesson, the next one is


Non-Delivery of Merchandise,
OPEN SLIDE NUMBER 14

May you please read the description______________

Volunteered student will read the


description.
Non-Delivery of Merchandise - the act of
Okay Thank you ________, devising a scheme wherein a culprit posts
Now, from what ______ read, Is there a very familiar an
item or service for sale on the Internet and
word that came up from your mind when the situation
once the transactions have been done,
arise wherein an alleged “seller” will post a product, and a does
Customer purchased and send payment for it but DID not really give the item or service.
NOT RECEIVED THE ITEM?
What is that action called?
Any idea?

If answered:
Yes that is correct! Thank you for sharing your thoughts Student will volunteer to answer
________. As what your classmate/s shared, we often Possible answer:
called such act as SCAMMING. AND VERY POPULAR Scam/med
NOWADAYS. SO BE CAREFUL, DO NOT TRUST scamming
SUSPECTED SCAMMERS.

Okay, is everybody able to follow our lesson?


If there are questions do not hesitate to raise hands class
okay?

Now, for our next slide, Student will respond


OPEN SLIDE NUMBER 15 Possible to have question or is
may you please read___________

9
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

following the lesson.

Let me ask you guys, do you think bullying on the internet Student will read the description
Electronic Harassment - the act of
is possible?
anonymously using the Internet to harass,
abuse, threaten, or annoy other people.

That is correct! Bullying on the virtual world is possible,


and it is related to “electronic harassment” crime,
however, in this kind of bullying, you do not know who
the culprit is because they are anonymous AND THEY
ARE QUITE HARD TO DETECT. Yes Ma’am, it is possible!

10
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

Now moving on to our next slide,


OPEN SLIDE NUMBER 16

This may be the most hideous that we could encounter


but yes, this happens in the cyber world. It is a situation
wherein there is a presence of children’s nudity of doing
entertainment for the purpose of giving out pleasure to
viewers in exchange of monetary. Although this could of
happen regardless money involvement, still, this kind of
act is HIGHLY PUNISHABLE by law and will never be
acceptable in whoever’s sight.
Is this clear to everybody?
Yes Ma’am it is clear!

Okay, for our next slide,


OPEN SLIDE NUMBER 17
may you please read__________

Student will volunteer to read


Prostitution - the act of using the internet
to engage in prostitution

Thank you so much __________, in reference to what


_____ read, can anybody give me their thoughts about this Student will volunteer to answer,
kind of cybercrime? Possible answer:
It is a kind of cybercrime wherein a
person offers indecent acts using
the internet especially in social
medias, in exchange of an amount
from the illegal service provided.

That is correct!!!
Thank you so much _________ for that detailed answer.
What your classmate said is true, and sadly, this kind of
action no longer just happen in plain sight, this could also
happen virtually, and often times they give poverty as a
reason of their wrong doing.

11
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

Moving on to our next slide,


OPEN SLIDE NUMBER 18

As you can see, nowadays, our war on drugs does not just
cover the entirety of our country because even in the
virtual world, exchange of illegal drugs could also happen
wherein transactions are discussed electronically and of
course, some of this abusers use CODES to distinguish
that the drugs they are buying.

Why do you think this kind of transaction is popularly


known to happen in the internet?
Any thoughts?
Student will volunteer to answer
Possible answer:
Because transaction in the internet
is safer for them and cannot be
easily traced.

Very Good! That is right! Thank you for answering


______.
Because the internet has an open ended range, culprits
with this kind of deeds is not easy to catch.

Okay, moving on with our last cybercrime sample,


OPEN SLIDE NUMBER 19
May you please read _________,

Student will volunteer to read


the act of piracy mainly for financial gain.

Yes, Thank you _________


This action is also most popular with what known as

12
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

“Pirata” and such act was widely use on the earlier times
when DVDs and CDs burned or copied with MOVIES
and SONG. However, up to this moment on, PIRACY
still happens and this act was taken advantage by those
who wanted to gain money with cheaper offers.

Be honest with me, when you were still younger than you
are today, do you by chance encounter people in the Yes Ma’am, they offer movies and
market selling pirated CDs or DVDs with songs and NEW mp3s for cheaper price.
released movies on it?

And when you bought one, did you have a thought that it
is okay to do so? To be honest, we thought it is okay
because it is already in the market.

Yes that is true! Thank you _______FOR SHARING


Even without our knowledge, this kind of act could
happen UNINTENTIONALLY however, for the intention
of the seller who did copied the original in exchange of
money; that is clearly a copyright infringement!

Is this clear to everybody? Yes Ma’am it is clear!

Thank you!

Those are the ten most common cybercrimes known


widely nowadays.

Is the discussion clear to everybody? Do you have any


question or you want to clarify anything? Students will answer
Possible answer:
Yes Ma’am all is clear
Ma’am I have a question
(If there are question-answer the student for better
understanding)

If everybody understood well and there are no question,


let us continue with the discussion.

OPEN SLIDE NUMBER 20

I am going to play a video clip that I have searched on the


internet, and I hope that you could reflect on it, observe
and listen attentively.

Students will watch the video.

Five (5) minutes video finished playing.

13
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

Okay, was everybody able to hear and watch the video


clearly? Yes Ma’am, the video was clear.

Now, in relevance to what you have watched,


What do you think is the idea or the thought of the video? Student will volunteer
Possible answers:
 Cybercrime being widely
exercised
 Different types of
cybercrime done in the
Philippines
 Laws created to protect
Filipinos from Cybercrimes

Yes that is correct!


Thank you for sharing ____________

From what you have watched, it is true that in the


Philippines, cybercrime is widely done and that there are
so many types of cybercrimes happening in our country.
However, the law of the Philippines was never stagnant in
protecting its people that is why, there are laws created to
protect its users welfare from those abusers.

And as we are discussing,


The protectors in the virtual world of the Philippines
establish ways on how to take care of its users

OPEN SLIDE NUMBER 21

There are few ways in COMBATTING CYBERCRIMES


The first one is the through NETWORK SECURITY, next
is INVESTIGATION and lastly, giving PENALTIES to
the guilty.

There are several ways the authorities can help solve or


prevent cybercrimes.

And among which,


There is
OPEN SLIDE NUMBER 22

14
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

Before a hacker can get through the unauthorized file it is


targeting, the hacker has to get through several security
measures, and those network security are shown in this
slide,
First is the firewall-as best explain it, it is there to block
unauthorized access while allowing outward
communication.
Next is Secure Connections-wherein there are
application that we needed to activate to avoid easy access
in our computer especially from removable discs/usb
Passwords-a good strong password is a must to protect
our accounts
Anti-malwares-This will protect our computer from
possible MALICIOUS SOFTWARE attack in our gadget.
Data encryption- the computer convert the raw data into
code to cover its true meaning. So if it is covered, that
needs a series of events before a hacker can decrypt it.

But let me ask you, are these guarantees for a 100% Student will volunteer to answer
protection? Possible answer:
No Ma’am

If No, why? Student will volunteer to answer


Possible answer:
It does not guarantee 100%
protection to our gadgets because
there will always be a way for a
hacker to hack since it is also a
person who created it,
protection was created by a person
and so are the malwares.
That is correct!tHANK YOU FOR ANSWERING
It does not give us 100% guarantee, there will always be a
way for a hacker but of course, our consciousness will
give an extra protection for our gadgets.

Now, if the hacking happened already and we are not able


to stop it, authorities will proceed with the
INVESTIGATION
OPEN SLIDE NUMBER 23

15
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

So how does investigation in the cyber world happens,


The cyber police do URL TRACING in which a UNIQUE
IP Address will surface.
This IP Address is like a birth certificate for every user,
Student will volunteer to answer
Why do you think I say that it is like a birth certificate? Possible answer:
Because nobody had the same
details as what we have.

Yes that is correct! Thank you_____


NOBODY has the same birth certificate details, that is
why we call it unique,
like a thumbmark.
So when the IP address surfaced-hacker/culprit is traced.

Student will volunteer to answer


Now, after knowing who our culprit is, do you think it Possible answer:
will end there? No Ma’am

Student will volunteer to answer


Possible answer:
That is right____, but why do you think so _____? The culprit should pay the price of
his actions.

Now, since we caught the culprit, what are the possible Student will volunteer to answer
equivalent for his action?
Possible answer:
He will be penalized either by
FINE or through
IMPRISONMENT.

Very well said_____


What your classmate said is true, it does not stop there,
there should be PENALTY
OPEN SLIDE NUMBER 24

16
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

And from the law that we believe in, penalty could be a


FINE where you pay monetarily damages of your actions
or Imprisonment where you pay your wrong doing behind
bars.
Student will volunteer to read
And here in the Philippines, there exist this law we called
as,
OPEN SLIDE NUMBER 25
May you please read ______

Student will volunteer to answer


Possible answer:

That is right, Thank you _________


We are govern with this kind of hope wherein in this
world of technology, we are somewhat protected in every
rights that we exercise, be it actual or in the virtual world.

Okay! Now, Are there any questions that you would like
to ask or do you have anything you wanted to share in the
class from your own experience concerning all those
Student/s will volunteer to answer
kinds of crimes?
Accept at least 3 volunteers

Thank you so much for sharing ____________.


WHAT YOU HAVE EXPERIENCED ARE FORM OF
CYBERCRIME AND YOU AS VICTIMS OF IT MAY
REFLECT FROM WHAT HAPPENED, AND LEARN
FROM IT SO THAT IN THE FUTURE, NOTHING THE
SAME WOULD TAKE PLACE.

Okay! Thank you so much for sharing all of your


thoughts. I believe our future will be a lot safer since you
are able to gain knowledge from this lesson of ours.

17
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

V. Generalization
Student will answer
Now, you are all equipped with knowledge based from Possible answer
what we have learn, are questions that you wanted to ask No questions Ma’am
me regarding our topic?

Student will volunteer to answer


Okay then, what have you learned from in our topic Possible answer
today?
About cybercrimes
Different types of cyber crimes

Thank you so much _________


Now that you mentioned,
Students will volunteer to answer
What are the different types of Cybercrime,
Possible answers
Please give me one__________
1. Phishing/Spoofing
___________
2. Blackmail/Extortion
___________
3. Accessing Stored
___________
Communications/Hacking
___________
4. Sports Betting
___________
5. Non-Delivery of
___________
Merchandise
___________
6. Electronic Harassment
___________
7. Child Pornography
___________
8. Prostitution
9. Drug Trafficking
10. Criminal Copyright
Infringement

Alright! Now, if we HAVE the existence of this crimes,


what are the security measures that has been brought to us
Students will volunteer to answer
for our protection? Can you give me one_______
Possible answers
__________
Firewalls
__________
Secure connections
__________
Passwords
_____________
anti-malwares
data encryptions

Okay, now that the crime happened, how will the cyber
Student will volunteer to answer
police investigate the situation?
Possible answer
URL tracing in tracking the unique
IP Address.

Very good____, Thank you


Student will volunteer to answer
And now that we caught the culprit, what is next?
Possible answer
Yes ______
Penalties will be given
Correct! Thank you______

18
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

What kind of penalty is possible to be given? Student will volunteer to answer


yes_________ Possible answer
FINE or IMPRISONMENT

That is right!
Thank you all so much for participating
I can see that you are now well informed about the
knowledge and ideas of our lesson for today!

VI. Evaluation

Answer the anagram being shown in the description.


Link is provided in the chat box.
https://wordwall.net/resource/31893271

You have 5 minutes to answer the quiz. Read and


understand the description carefully.

Is it clear to everyone?

Yes ma’am!
Okay you may start answering.

19
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

20
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

SO AS YOU CAN SEE, HERE IS THE RESULT OF


OUR QUIZ, AND I WANT TO CONGRATULATE
EVERYBODY FOR BEING ABLE TO ANSWER
WONDERFULLY.
THANK YOU

21
POLYTECHNIC UNIVERSITY OF THE PHILIPPINES LMI INTEGRATED FORMATION & EDUCATION INC.
POST BACCALAUREATE FOR TEACHER EDUCATION JUNIOR High School Department
BATAAN BRANCH Barangay Poblacion
Mariveles, Bataan
Mariveles Bataan

VII. Assignment
Essay Writing

Goal:
Write an essay on how Information and Communication
Technology can change the world for better or for worse.
You are welcome to creatively illustrate it in every way
that you can.

Are we now clear and good with our lesson? Do you have
any other questions? None ma’am!

ALWAYS REMEMBER
OPEN SLIDE NUMBER 26

If everything is clear, no more questions, let’s call it a


day! Thank you everyone for listening!

Thank you ma’am. See you next


week!
Thank you, too. Do not forget to answer the attendance
before leaving the platform class.

<Link for attendance will be sent to the comment box>


https://forms.gle/TxK8UFX5VMBsGbvk6

Prepared by:

Shashi Mae C. Bonifacio


PBTE Student, PUP-Bataan Campus

22

You might also like