Professional Documents
Culture Documents
ACROSS CURRICULUM
I. OBJECTIVES
At the end of the lesson, the learners should be able to:
References:
https://www.ibm.com/ph-en/topics/threat-management
https://ourtechroom.com/tech/difference-between-cyber-bullying-and-cyber-crime/
http://frimmerclass.weebly.com/exploring-the-internet-researching-and-evaluating-the-
web.html
https://edu.gcfglobal.org/en/computerbasics/understanding-operating-systems/1/
https://www.education.govt.nz/school/digital-technology/ict-incidents/digital-technology-
guide-for-schools/digital-technology-safe-and-responsible-use-in-schools/understanding-
digital- technology/relevant-characteristics/
III. PROCEDURE
A. Preparatory Activities
1. Prayer
The teacher will ask the student to lead the prayer.
2. Greetings
The teacher will greet the students.
3. Checking of attendance
The teacher will check the students
4. Class reminders
Rules during the class will also remind
B. Review
To test the retention of the students, the teacher will ask the following questions
regarding on the previous discussion.
1. What was our lesson last meeting?
2. What is financial literacy?
3. What are the tips of being financially Stable?
4. How to avoid financial scam?
5. What is insurance and taxes?
C. Motivation
Forget Password
The teacher will flash a number on the screen and the student will be analyzed what are the
hidden letter behind the numbers to form word.
DIGITAL CYBER
D. Analysis
Presentation of the lesson
1. Different scopes of citizenship in the digital age (online community life in an ethical and
respectful way)
2. Ways on how to manage safety in using Internet (Keep Personal Information Professional
and Limited)
3. Cyberbullying and cybercrime as part of the cyber/digital literacy (most frequent
locations for cyberbullying)
4. Identify, Protect, Detect, and Respond as ways of managing threats.
5. Researching and evaluating the web (search, strategy, safety, citation, and assessing
credibility)
6. social networking, bookmarking, social news, media sharing, microblogging, and online
forum sites as part of media usage
7. Mobile devices and Digital traits
E. Abstraction
The teacher will ask the student to encapsulate the discussion.
a. What is are the things we must consider in using the cyber/digital Literacy?
b. How can we avoid experiencing cybercrimes in using the internet?
F. Application
Each group will be given a topic, and then create a whether it is slogan, poster, speech or act
the topic that will be given to them, for the slogan, poster, and speech, they will present their
output, for group 1 create slogan, group 2 will have poster, group 3 will create a speech, and
lst group will act according to the topic given.
TOPICS:
MEDIA USE, CYBERCRIMES, CYBERBULLYING, INTERNET USAGE
Criteria 4 3 2 1
Delivery Express the Some audience was not Most of the Does not express
(20%) message clearly able to grasp the message. audience does the message
to the audience. not understand clearly and most of
the message. the student does
not able to grasp
the message.
Content and Factual content Some information was not Some of the was Content was not
Presentation and hundred factual but have good not factual and fully understood
(30%) percent communication. the and did not present
communication communication clearly.
was met. is not
convincing.
Group Groupmates Groupmates have their Some of the Most of the group
Participation have their own own assigned task, but not groupmates are does not cooperate.
(20%) assigned task to organized. not cooperating.
do.
G. Evaluation
Write true if the statement is true and write false if the statement is false.
1. Being a responsible digital citizen means having the online social skills to take part in online
community life in an ethical and respectful way. T
2. Cyberbullying does not occur via SMS, Text, and applications and online via social media,
forums, and gaming platforms where individuals can see, engage in, or exchange content. F
3. Cybersecurity is a broad term used to describe criminal activities in which computers or computer
networks get utilized as a tool, a goal, or a location for criminal action; examples include
electronic wracking and denial-of-service attacks. F
4. The Identify function covers much of the technical and physical security controls for developing
and implementing appropriate safeguards and protecting critical infrastructure. F
5. The protect function implements measures that alert an organization to cyberattacks. F
Criteria 3 2 1
Organization (50%) The ideas are The ideas were not Most of the idea was
organized, and the organized, and the not organized and
graph was utilized graph was not fully the graph was not
accordingly. utilized. utilized.
Ideas (25%) The idea was based Some of the ideas The ideas was not
on fact. was not legally suited to the topic.
based.
Content(25%) Content was Content was The content was
accurate and accurate but inaccurate or overly
complete incomplete. general.
Prepared By:
Pre-Service Teacher