You are on page 1of 3

A SEMI-DETAILED LESSON PLAN IN BUILDING AND ENHANCING NEW LITERACIES

ACROSS CURRICULUM

I. OBJECTIVES
At the end of the lesson, the learners should be able to:

a. define cyber/digital Literacy,


b. value the different cyber/digital literacy by reading its definition and;
c. demonstrate understanding by presenting the usage and effects of cyber/digital Literacy

II. SUBJECT MATTER

Topic: Cyber/and Digital Literacy

References:

https://www.ibm.com/ph-en/topics/threat-management
https://ourtechroom.com/tech/difference-between-cyber-bullying-and-cyber-crime/
http://frimmerclass.weebly.com/exploring-the-internet-researching-and-evaluating-the-
web.html
https://edu.gcfglobal.org/en/computerbasics/understanding-operating-systems/1/
https://www.education.govt.nz/school/digital-technology/ict-incidents/digital-technology-
guide-for-schools/digital-technology-safe-and-responsible-use-in-schools/understanding-
digital- technology/relevant-characteristics/

Materials: Laptop, PPT, White board pen, Web page

III. PROCEDURE
A. Preparatory Activities
1. Prayer
 The teacher will ask the student to lead the prayer.
2. Greetings
 The teacher will greet the students.
3. Checking of attendance
 The teacher will check the students
4. Class reminders
 Rules during the class will also remind
B. Review
To test the retention of the students, the teacher will ask the following questions
regarding on the previous discussion.
1. What was our lesson last meeting?
2. What is financial literacy?
3. What are the tips of being financially Stable?
4. How to avoid financial scam?
5. What is insurance and taxes?

C. Motivation

Forget Password
The teacher will flash a number on the screen and the student will be analyzed what are the
hidden letter behind the numbers to form word.

DIGITAL CYBER
D. Analysis
Presentation of the lesson
1. Different scopes of citizenship in the digital age (online community life in an ethical and
respectful way)
2. Ways on how to manage safety in using Internet (Keep Personal Information Professional
and Limited)
3. Cyberbullying and cybercrime as part of the cyber/digital literacy (most frequent
locations for cyberbullying)
4. Identify, Protect, Detect, and Respond as ways of managing threats.
5. Researching and evaluating the web (search, strategy, safety, citation, and assessing
credibility)
6. social networking, bookmarking, social news, media sharing, microblogging, and online
forum sites as part of media usage
7. Mobile devices and Digital traits
E. Abstraction
The teacher will ask the student to encapsulate the discussion.
a. What is are the things we must consider in using the cyber/digital Literacy?
b. How can we avoid experiencing cybercrimes in using the internet?

F. Application
Each group will be given a topic, and then create a whether it is slogan, poster, speech or act
the topic that will be given to them, for the slogan, poster, and speech, they will present their
output, for group 1 create slogan, group 2 will have poster, group 3 will create a speech, and
lst group will act according to the topic given.

TOPICS:
MEDIA USE, CYBERCRIMES, CYBERBULLYING, INTERNET USAGE
Criteria 4 3 2 1

Demonstrated Shows Shows adequate Show basic Does not show


Knowledge proficient understanding on the knowledge on understanding on
(30%) understanding subject matter the subject the subject matter.
of the subject matter.
matter.

Delivery Express the Some audience was not Most of the Does not express
(20%) message clearly able to grasp the message. audience does the message
to the audience. not understand clearly and most of
the message. the student does
not able to grasp
the message.

Content and Factual content Some information was not Some of the was Content was not
Presentation and hundred factual but have good not factual and fully understood
(30%) percent communication. the and did not present
communication communication clearly.
was met. is not
convincing.

Group Groupmates Groupmates have their Some of the Most of the group
Participation have their own own assigned task, but not groupmates are does not cooperate.
(20%) assigned task to organized. not cooperating.
do.
G. Evaluation
Write true if the statement is true and write false if the statement is false.
1. Being a responsible digital citizen means having the online social skills to take part in online
community life in an ethical and respectful way. T

2. Cyberbullying does not occur via SMS, Text, and applications and online via social media,
forums, and gaming platforms where individuals can see, engage in, or exchange content. F
3. Cybersecurity is a broad term used to describe criminal activities in which computers or computer
networks get utilized as a tool, a goal, or a location for criminal action; examples include
electronic wracking and denial-of-service attacks. F
4. The Identify function covers much of the technical and physical security controls for developing
and implementing appropriate safeguards and protecting critical infrastructure. F
5. The protect function implements measures that alert an organization to cyberattacks. F

For item 6-10

Give the 5 ways on how to manage threats in using internet.


H. Assignment
Using the graphic organizer, provide the different and similarities of cyber/digital Literacy.

Criteria 3 2 1
Organization (50%) The ideas are The ideas were not Most of the idea was
organized, and the organized, and the not organized and
graph was utilized graph was not fully the graph was not
accordingly. utilized. utilized.
Ideas (25%) The idea was based Some of the ideas The ideas was not
on fact. was not legally suited to the topic.
based.
Content(25%) Content was Content was The content was
accurate and accurate but inaccurate or overly
complete incomplete. general.

Prepared By:

Jonard Marcos Batin

Pre-Service Teacher

You might also like