You are on page 1of 9

 

Standard
The learners demonstrate an understanding of: ICT in the context of global
communication forspecific professional track.
B.
 
Performance Standard
The learners shall be able to: at the end of the 2 week period independently
compose an insightfulreflection paper on the nature of ICT in the context of
their lives, society, and professional tracks(Arts, Tech-Voc., Sports and Academic).
C.
 
Learning Competency
Apply online, safety, security, ethics, and etiquette standards and practice in the
use of ICTs asit would relate to their specific professional tracks.
D.
 
Learning Competency Code
CS_ICT11/12-ICTPT-Ia-b-2
Content
Categories on how to use the internet
LEARNING COMPETENCIES
A.
 
References
https://empowermenttech12.wordpress.com/2017/06/24/online-safety-security-
ethics-and-etiquette/Empowerment Technologies Innovative Training Works Inc
.
B.
 
Materials
Computer, computer application software, LCD projector
 
II.
 
PROCEDURESA.
 
Reviewing previous lesson
 
Note to the Teacher:
As a sort of review, the teacher will ask the following question to the class:1.
 
What is a semantic web?2.
 
Differentiate Web 1.0 and web 2.0.3.
 
What is a web browser?4.
 
Who develop the world wide web?5.
 
What are the six types of social media?
Additional activities for application or remedial
 
B.
 
Establishing a purpose for the lesson:
 Teacher says,
”Today we are going to
discuss about applying online safety, security, ethics andetiquette standards and
practice but before we can apply it we will tackle first different categories onhow
to use the internet. The importance of this topic is that it will help us to be
acquainted on howto use the internet properly as well as the appropriate sites that
you need to visit that suit to yourneed while on the net different. It will also serve
us a guide and help us to open our mind about tobecome a responsible user of a
social networking sites and browsing the internet efficient and properthrough
proper referencing. And of course, for our own security while we are on the net.
Presenting examples/instances of the new lessonPracticing new skills #
Teacher say:
Most of us use internet every day. Sometimes, we do not pay attention on how
much informationwe share online.

 Highlight
 Add Note
 Share Quote

Trusted by over 1 million members


Try Scribd FREE for 30 days to access over 125 million titles without ads or interruptions!

Start Free Trial


Cancel Anytime.

 
 
Note to the Teacher:
Though a slide presentation a teacher will present a table that contains a question
and let the studentrespond the questions. Titled: HOW Safe Are You
INFORMATION SHARED NOT SHARED
1.First name2. Last name3. Middle name4. Current and previous school5. Cellphone
number6.Name of your mother7.The name of your siblings8. Your address9. your
home and phonenumber10. Your birthday
Note to the teacher:
The teacher will connect to the new topic.
Lesson 1: Online Safety and SecurityTeacher says:
Internet as a powerful tool, used to promote business, gain new friends, and stay in
touch with oldones. It can be a source of entertainment through games, online
communities and everything inbetween. But most like things in the world, there is
always
the “other side of the coin”. The internet is
one of the most dangerous places, especially
if you don’t not know what you are doing with it.
 Note to the teacher:
 
A table is presented to the student through a slide presentation titled “How Safe Are You?”
The class scrutinize each item and see how risky it is to share them.
TYPE OF INFORMATION RISKS
1.
 
First name There is a risk in sharing your first name.Chances are, a hacker may
already know plentyof stuff you even if you only give out your firstname. Likewise,
you can cot just walk in a roomand start introducing yourself to everyone. You
don’t not know whom
you can across with.2.
 
Last name If sharing your first name is a small risks, havingboth your first and last
is more risky. You willvulnerable to being searched for using searchengine, which
include image search. Matchinga name with a face is a modus to severalcybercrimes
like identity theft.3.
 
Middle name Sharing your middle name alone is probablynot most risky of these
shared information, butsharing your full name would be.4.
 
Current and previous school(s) Most people steal identities study their subject.The
y can use this information for verification.Purposes.5.
 
Your cellphone number Your cellphone number should never be postedover the net.
Since it is a public places, it is thesame as posting your number on a billboard.You
would not want random strangers to textor call you, o worse, pretend that they
aresomeone else.6.
 
The name of your mother and father Risky, yet not as risky posting their full name
s,
especially your mother’s maiden name. In fact,
you may have encountered many websites that
require your mother’s maiden name as an
 
answer to a secret question whenever you loseyour password.7.
 
The name of your siblings Disclosing this is a huge risk. Strangers maypretend or
use their identity to dupe you.8.
 
Your address
Hopefully you answered “no” to this one.
Giving the interest to your number is one thing;giving them your address is a whole
other level.It would be much easier for criminals to findyou.9.
 
Your home phone number This shared information more risky thansharing you
personal phone number. Scamsusually use this information to deceive you, oneof
which is when stranger pretends to knowyour parents or pretend to be you.10.
 
Your birthday Letting people know your birthday I probably smust if you want to
get as many gifts aspossible. But having it in you profile makes youvulnerable to
identity theft.
C.
 
Developing Mastery.D.
 
Finding practical application of concepts and skills in daily living
The teacher will give a question and let the learners answer it using a one half
sheet of paper.As a Netizen, after knowing the risk of the information that you
have shared over the net, what arethe ways that you are about to change especially
in sharing information on the net.
E.
 
Making generalizations and abstractions about the lessonTeacher say:
Class,
 Internet is defined as information high way.
Which means
 
that anyone has access to thishighway, can place and can grab that information.
Any information, even things that have set privately,ca be accessed on way or
another. The threat of cybercrime is very real. Whatever you shared today
couldaffect our future.
Evaluating Learning
 Pencil Paper Test (5pts) ½ c.w.In a 50 words, what are the learnings that you have
gain especially in sharing information on thenet.
Giving of Assignment
 
I.
 
REMARKS ______________________________________________________
___________________________ __________________________________
_______________________________________________ ______________
______________________________________________________________
_____
II.
 
REFLECTION
A.
 
No. of learners who earned 80% in the
evaluation. _____________________________________________________
____________________________ _________________________________
________________________________________________B.
 
No. of learners who require additional activities for remediation who scored below
80%- _________________________________________________________
________________________C.
 
Did the remedial lessons work? No. of learners who have caught up with the
lesson _________________________________________________________
________________________ _____________________________________
____________________________________________ _________________
___________________________________________D.
 
No. of learners who continue to require
remediation ____________________________________________________
_____________________________ ________________________________
_________________________________________________E.
 
Which of my teaching strategies worked well? Why did these work?

You might also like