Professional Documents
Culture Documents
Blk. 89 Lots 29-30 Greater Lagro, Novaliches, Quezon City │ 880 9681
ELEMENTARY DEPARTMENT
SY: 2022 – 2023
Subject COMPUTER
Grade Level Grade 4
Quarter First Quarter
Number of Weeks 3
Date of Implementation
Content Standards: Understand the importance of proper
netiquette,file management,threats and
fixing malwares, using email and its
threats in order for us to interact on the
digital world properly
I. LEARNING COMPETENCY
A. Define what is malware
II. OBJECTIVES
At the end of the lesson, the students will be able to:
A. Define what is malware
B. Appreciate the Importance of recognizing threats by being aware on the different
computer viruses that we might get on the internet
C. Draw a computer virus and explain its effect/damage to a computer
III. CONTENT
A. Subject Matter: RECOGNIZE COMPUTER THREATS
B. References: Computer for Digital Learners 4 by The Phoenix Publishing House
Inc., Elmeryn Joy L. Combre Et al.
C. Materials: Computer with Internet, PPT Presentation, Google Meet, Headset
D. Valuing: Being Responsible
E. 21st Century Skill: Creativity
C. ABSTRACTION
1. Do you think hackers should be considered as criminals? why?
2. How can you avoid such things on the internet?
3. As a Mercedarian learners, Why do you think we are responsible on our
actions or activity on the cyberworld? What is/are the implication of it?
Explain
D. APPLICATION
On a short bond paper, draw a spyware virus then give its description and how does it
affect our computer.
(Exemplary) (Accomplished) (developing) (Beginning)
5 4 3 2
Creativity Use his/her Use his/her Use some of Did not use
ideas and ideas most of his/her his/her ideas
imagination the time imagination and
on his/her imagination
own
Timeliness Submit Submit his/her Submit Submit
his/her artwork one his/her his/her
artwork on day late artwork 2 artwork 5
time days late days late
Neatness Completed Completed Completed Artwork is
artwork is artwork is very artwork is incomplete
exceptionally neat slightly neat and
neat completely
messy
V. ASSESSMENT
Let’s Try This 3
Write the word on the line that best fits as an ending for each statement
1. A stand-alone program that replicates copies of itself and destroys the host
program is called __________
2. A type of malware named after a wooden horse is called _______
3. The short term for malicious code is _____
4. A loaded and activated software that attack the host is called a ______
5. A type of malware that inserts a copy of itself and becomes part of another
program is called a _______
VI. AGREEMENT
Be ready for a graded recitation next meeting