You are on page 1of 5

A SEMI-DETAILED LESSON PLAN

Prepared by

I.OBJECTIVES

At the end of the discussion the students are expected to;

A. Explain the safety issues and ICT policies.


B. Identify safety concerns on internet including e-safety rules through the activity
C. Appreciate the importance of knowing the e-safety rules.

II. SUBJECT MATTER

A. Topic: Safety Issues on the use of ICT tools including e-safety rules.
B. References:
 MODULE 2, LESSON 2 IN TECHNOLOGY FOR TEACHING LEARNING.
 https://www.studocu.com/ph/document/university-of-san-agustin/secondary-
education/module-2-lesson-2-safety-issues-on-the-use-of-ict-including-e-safety-
rules/24937293
C. Materials:
Smartphone, PowerPoint, Laptop
D. Values:
Active Participation, listening attentively and reciting

III. Procedures

A. PREPERATORY ACTIVITIES
Opening Prayer
Greetings
Classroom Rules:
Respect and listen to the demonstrator
No murmuring
Not doing unnecessary things
Share some ideas
Raise hand if there’s a question

B. DEVELOPMENTAL ACTIVITY
1. DRILL
“WORD CHAIN”
Mechanics:
 The rules of the game are simple, the teacher will divide the class into two after
that the teacher will say a word and the next speaker must say another word that
begins with the letter that the previous word ended;
 For example the teacher says “ dog ” and then the next person would say “giraffe”
 If one of the two groups can’t say a word within 5 seconds they are automatically
the loser.
2. Review
1. What are the three categories of knowledge?
Declarative knowledge
Structural knowledge
Procedural knowledge
2. Three basic communication patterns?
One- to-many
Point to point
Many-to –many

C. Motivation (activity)
“Guess what”
 The teacher will show some pictures and the students will identify what are those
pictures all about.
 Those students who will guess the pictures will be given 2pts.
D. Analysis
1. Based on the activity that we’ve done what comes on your mind when you see those
pictures?
2. Do you think internet is related to technology? Why?
3. Do you have any idea what will be our lesson for today?

SOME RISK IN THE USE OF ICT AND e-NETWORKING

 Exposure to inappropriate content, including online pornography, extremism (exposure to


violence associated with racist language).
 Lifestyle websites like self-harms and suicide sites, and hate sites.
 Cyber bullying in all forms, receiving sexually explicit images or messages.
 Privacy issues including disclosure of personal information;
 Health and well-being ( amount of time spent online, internet gaming and many more);
 Prolonged exposure to online technologies; particularly at an early age;
 Addiction to gambling and gaming;
 Theft and fraud from activities such as phishing;
 Viruses, Trojans, spyware and other malware

MINOR MISUSE OF ICT

In school, some minor misuse made by learners includes the following:


 Copying information into assignment and failing to acknowledge the source(plagiarism and copy
right infringement)
 Downloading materials not relevant to their studies
 Misconduct associated with subject logins such as using someone else’s password
 Leaving a mobile phone on during class period
 Unauthorized taking of pictures or images with mobile phone camera, still or moving.

E-safety takes cares not only of internet technologies but also of electronic communications via
mobile phones, games, consoles and wireless technology. It highlights the need to educate
children and young people about the benefits, risks and responsibilities of using technology

Here are some issues of e-safety:

• e-safety help safeguard children and young in the digital world;


• e-safety emphasizes learning to understand new technologies in a positive way;
• e-safety educates children about the risk as well as the benefits so we can feel confident online;
and
• e-safety supports young learners and adult to develop safer online behaviors, both in and out of
school.

Network Management

1. Safety in the use of networking in schools

1.1. Make clear that no one should log on as another user


1.2. Require all user to log off when they have finished working.
1.3. Maintain equipment to ensure safety.
1.4. Set up a clear disaster recovery system in place for critical data that include secure, remote
back up of critical data.
1.5. Secure wireless network to appropriate standards suitable for educational use.
1.6. Install all computer equipment professionally and meet health and safety standards.

2. Password Policy

2.1 Only authorized users will have individual passwords. Users are not permitted to disclose
their passwords unless they got permission from the owner of the management. The equipment
that keep the personal information shall be locked when unattended to prevent unauthorized
access.

2.2 Computers should be set to a time out if they become unused for a certain period of time.

3. Personal Mobile Phones and Mobile Devices

3.1. All mobile phones shall be kept away in a box away from children or learners and access is
only allowed at break time or at the end of the class period.

Setting Up an Educational Technology Room


Schools that plan to dedicate a room where the students can access technologies for learning should
include the following basic safety rules:

1. Provide tilt-able tables. These tables can be tilted and adjusted to the height of the users.

2. Provide anti-glare screen filters.

3. Provide adjustable chairs.

4. Provide foot support.

5. Make sure lighting is suitable.

6. Make sure work stations are not cramped.

7. Plan work at a computer so that there are frequent breaks.

More specifically, safety rules that can reduce risk of accidents in the working stations should include:

1. No trailing wires across or around the room which people can trip on.

2. Electrical sockets should not be overloaded.

3. Electrical equipment should be safety-tested at least once a year.

4. There should be adequate space around desk for people to move.

5. Bags and obstacles should be stored out of the way.

6. Food and drinks should not be placed near machines.

7. Heating and ventilation should be suitable for the working environment.

8. Fire extinguishers should be available.

9. Fire exits should be clearly marked and free from clutter.

There are more issues, policies and rules. What have been presented in the lesson may be the minimum
that you should learn. As you explore some more and engage in the different aspects of Technology for
Teaching and Learning, you will find more details.

E. APPLICATION
“AM I SAFE OR NOT”
 Click the link provided:
 https://play.kahoot.it/v2/lobby?quizId=531013e1-fa9f-41f4-8afc-f99de2dacc3e
 Tell whether the given situation is safe or unsafe.
F. Generalization
 https://docs.google.com/forms/d/e/1FAIpQLSd2IBjmi1mtvZ_kGEi3OlFeJpKW4RTC8m-
Xy6IMW-CYDfgBrA/viewform?
fbclid=IwAR09OghmMwGKpyiDNlbnbNoEq6JUwF5SGI6o-nBjMDGXTjCJwZSivZakuyE
G. Evaluation
 Click the link provided:
https://quizizz.com/admin/quiz/632bea30be7ae7001e3d5965/e-safety-rules?
searchLocale&fbclid=IwAR1WbgWV7cxzaqwsZ70mUTLUAVE-
vQeS2gyKDkhZ_g8uxuYTBDrxpJYZivk
H. Assignment
Short explanation on why is it important to study e-safety rules.

You might also like