Professional Documents
Culture Documents
Prepared by
I.OBJECTIVES
A. Topic: Safety Issues on the use of ICT tools including e-safety rules.
B. References:
MODULE 2, LESSON 2 IN TECHNOLOGY FOR TEACHING LEARNING.
https://www.studocu.com/ph/document/university-of-san-agustin/secondary-
education/module-2-lesson-2-safety-issues-on-the-use-of-ict-including-e-safety-
rules/24937293
C. Materials:
Smartphone, PowerPoint, Laptop
D. Values:
Active Participation, listening attentively and reciting
III. Procedures
A. PREPERATORY ACTIVITIES
Opening Prayer
Greetings
Classroom Rules:
Respect and listen to the demonstrator
No murmuring
Not doing unnecessary things
Share some ideas
Raise hand if there’s a question
B. DEVELOPMENTAL ACTIVITY
1. DRILL
“WORD CHAIN”
Mechanics:
The rules of the game are simple, the teacher will divide the class into two after
that the teacher will say a word and the next speaker must say another word that
begins with the letter that the previous word ended;
For example the teacher says “ dog ” and then the next person would say “giraffe”
If one of the two groups can’t say a word within 5 seconds they are automatically
the loser.
2. Review
1. What are the three categories of knowledge?
Declarative knowledge
Structural knowledge
Procedural knowledge
2. Three basic communication patterns?
One- to-many
Point to point
Many-to –many
C. Motivation (activity)
“Guess what”
The teacher will show some pictures and the students will identify what are those
pictures all about.
Those students who will guess the pictures will be given 2pts.
D. Analysis
1. Based on the activity that we’ve done what comes on your mind when you see those
pictures?
2. Do you think internet is related to technology? Why?
3. Do you have any idea what will be our lesson for today?
E-safety takes cares not only of internet technologies but also of electronic communications via
mobile phones, games, consoles and wireless technology. It highlights the need to educate
children and young people about the benefits, risks and responsibilities of using technology
Network Management
2. Password Policy
2.1 Only authorized users will have individual passwords. Users are not permitted to disclose
their passwords unless they got permission from the owner of the management. The equipment
that keep the personal information shall be locked when unattended to prevent unauthorized
access.
2.2 Computers should be set to a time out if they become unused for a certain period of time.
3.1. All mobile phones shall be kept away in a box away from children or learners and access is
only allowed at break time or at the end of the class period.
1. Provide tilt-able tables. These tables can be tilted and adjusted to the height of the users.
More specifically, safety rules that can reduce risk of accidents in the working stations should include:
1. No trailing wires across or around the room which people can trip on.
There are more issues, policies and rules. What have been presented in the lesson may be the minimum
that you should learn. As you explore some more and engage in the different aspects of Technology for
Teaching and Learning, you will find more details.
E. APPLICATION
“AM I SAFE OR NOT”
Click the link provided:
https://play.kahoot.it/v2/lobby?quizId=531013e1-fa9f-41f4-8afc-f99de2dacc3e
Tell whether the given situation is safe or unsafe.
F. Generalization
https://docs.google.com/forms/d/e/1FAIpQLSd2IBjmi1mtvZ_kGEi3OlFeJpKW4RTC8m-
Xy6IMW-CYDfgBrA/viewform?
fbclid=IwAR09OghmMwGKpyiDNlbnbNoEq6JUwF5SGI6o-nBjMDGXTjCJwZSivZakuyE
G. Evaluation
Click the link provided:
https://quizizz.com/admin/quiz/632bea30be7ae7001e3d5965/e-safety-rules?
searchLocale&fbclid=IwAR1WbgWV7cxzaqwsZ70mUTLUAVE-
vQeS2gyKDkhZ_g8uxuYTBDrxpJYZivk
H. Assignment
Short explanation on why is it important to study e-safety rules.