You are on page 1of 2

WEEKLY LEARNING PLAN IN EMPOWERMENT TECHNOLOGIES

Designer: Ms. Jen Lester B. Lumidao


Subject/Learning Area: Empowerment Technologies
Grade and Section: 11- Newton, Gauss, Euler, Leibniz, Riemann
Quarter: 1

CONTENT STANDARDS: The learner…


Demonstrate an understanding of ICT in the context of global communication for specific professional track.
PERFORMANCE STANDARDS: The learner…
Compose an insightful reflection paper on the nature of ICT in the context of their lives, society, and professional tracks (Arts, Tech-Voc, Sports, Academic).
Learning Competencies: The learner…
 Demonstrate understanding of concepts in internet security and ethics
 Utilize online security and safety measures
 Apply ethical standards and practices in online transactions
 Assess instances that breach online safety, security, and ethical standards
 Value the essence of security and ethics in the use of internet technology

Parts/ Days Session # 1 Session # 2 Session # 3 Session # 4 Session # 5


Day 1 Day 2 Day 3 Day 4 Day 5
Subject Matter/ Contextualized Online Online Safety and Security Online Crimes Online Crimes Online Crimes
Sub-Topic: Search and Vital Research (Cyberbullying and Identity (Phishing) (Plagiarism and Copyright
Skills Theft) Infringement)
Reference/ Teaching Guide Empowerment Technologies Empowerment Technologies Empowerment Technologies Empowerment Technologies Empowerment Technologies
Reference: - Elimar Alupay - Elimar Alupay Ravina, - Elimar Alupay Ravina, - Elimar Alupay Ravina, - Elimar Alupay Ravina,
Page: Ravina, Ph.D. Ph.D. Ph.D. Ph.D. Ph.D.
Science in Today’s World for Science in Today’s World for Science in Today’s World for Science in Today’s World for Science in Today’s World for
Senior High Scholl Senior High Scholl Senior High Scholl Senior High Scholl Senior High Scholl
- Erwin Reyes Callo - Erwin Reyes Callo - Erwin Reyes Callo - Erwin Reyes Callo - Erwin Reyes Callo
- Rosario Laurel-Sotto - Rosario Laurel-Sotto - Rosario Laurel-Sotto - Rosario Laurel-Sotto - Rosario Laurel-Sotto
Materials: Book and PowerPoint Book and PowerPoint Book and PowerPoint Book and PowerPoint Book and PowerPoint
Procedure/ Activities:  Open access  Introduction about  Cyberbullying in  Ways to be secured  Different ways to avoid
journals online online safety and different forms. from phishing attacks. plagiarism and
 Vital research skills security.  Practical tips that  Present a video copyright infringement.
that every student-  Recitation should observe to regarding Phishing
researcher must avoid identity theft. attacks
possess  Recitation

Assessment:  Reflection Writing  Long Quiz (Online


(Could be formative or Crimes)
summative)
Assignment:

Remarks:

Prepared by:
MS. JEN LESTER B. LUMIDAO
Subject Teacher

Checked by:
MS. ZIPPORAH SARAI D. NIDEA
Head, T.L.E Department

Approved by:
MRS. MARISSA J. TAGUINOD

You might also like