You are on page 1of 3

MERCEDARIAN SCHOOL, INC.

Blk. 89 Lots 29-30 Greater Lagro, Novaliches, Quezon City │ 880 9681

ELEMENTARY DEPARTMENT
SY: 2022 – 2023

Subject COMPUTER
Grade Level Grade 4
Quarter First Quarter
Number of Weeks 3
Date of Implementation
Content Standards: Understand the importance of proper
netiquette,file management,threats and
fixing malwares, using email and its
threats in order for us to interact on the
digital world properly

Performance Standards: Create an infographic poster on how to


protect ourselves in digital world
Prepared by: Mr. Mark Ryan A. Bataslac

I. LEARNING COMPETENCY
A. Define what is malware
II. OBJECTIVES
At the end of the lesson, the students will be able to:
A. Define what is malware
B. Appreciate the Importance of recognizing threats by being aware on the different
computer viruses that we might get on the internet
C. Draw a computer virus and explain its effect/damage to a computer

III. CONTENT
A. Subject Matter: RECOGNIZE COMPUTER THREATS
B. References: Computer for Digital Learners 4 by The Phoenix Publishing House
Inc., Elmeryn Joy L. Combre Et al.
C. Materials: Computer with Internet, PPT Presentation, Google Meet, Headset
D. Valuing: Being Responsible
E. 21st Century Skill: Creativity

IV. LEARNING EXPERIENCE


A. ACTIVITY
1. Ask the students if they have experienced being sick. Ask what happen to
them.

2. Relate them to the same experience of computers having a virus—cannot


work well and slow down
B. ANALYSIS
1. What is a malware?
 Is short for malicious software
 It is designed to damage, destroy, steal or inflict bad action on data,
host or networks.
2. What are the different types of computer threats?
Computer Virus
 It is a type of malware that propagates by inserting a copy of itself and
becoming a part of another program
 Must be triggered by the activation of their host
Computer Worm
 It is similar to computer virus in the sense that it replicates copies of
itself and causes the same type of damage.
 It is a stand-alone software and does not require a host program to
spread.
Trojan Horse
 A software that looks real but it activates and attacks the host when
loaded.

C. ABSTRACTION
1. Do you think hackers should be considered as criminals? why?
2. How can you avoid such things on the internet?
3. As a Mercedarian learners, Why do you think we are responsible on our
actions or activity on the cyberworld? What is/are the implication of it?
Explain

D. APPLICATION

Let’s Test Ourselves 3

On a short bond paper, draw a spyware virus then give its description and how does it
affect our computer.
(Exemplary) (Accomplished) (developing) (Beginning)
5 4 3 2
Creativity Use his/her Use his/her Use some of Did not use
ideas and ideas most of his/her his/her ideas
imagination the time imagination and
on his/her imagination
own
Timeliness Submit Submit his/her Submit Submit
his/her artwork one his/her his/her
artwork on day late artwork 2 artwork 5
time days late days late
Neatness Completed Completed Completed Artwork is
artwork is artwork is very artwork is incomplete
exceptionally neat slightly neat and
neat completely
messy
V. ASSESSMENT
Let’s Try This 3
Write the word on the line that best fits as an ending for each statement
1. A stand-alone program that replicates copies of itself and destroys the host
program is called __________
2. A type of malware named after a wooden horse is called _______
3. The short term for malicious code is _____
4. A loaded and activated software that attack the host is called a ______
5. A type of malware that inserts a copy of itself and becomes part of another
program is called a _______

VI. AGREEMENT
Be ready for a graded recitation next meeting

You might also like