You are on page 1of 6

Department of Education

Region IX, Zamboanga Peninsula


Division of Zamboanga City
BALIWASAN SENIOR HIGH SCHOOL STAND -ALONE
San Jose, Baliwasan, Zamboanga City
(62) 957-3739 – baliwasanseniorhigh@gmail.com

Semi Detailed Lesson Plan in MEDIA INFORMATION LITERACY


Date: March 13, 2024 Grade 11
Level:
Teacher: ABIGAIL S. ALEJANDRO Learnin EMPOWERMENT TECHNOLOGIES
g Area:
Duration 40 MINUTES Quarter Q3
No.

I. Objectives REMARKS/
At the end of the lesson, the learners must be able to: ANNOTATIONS/
1. identify common online safety and security; RPMS-PPST
2. explain the danger of common internet threats; INDICATORS
Content Standard The learners demonstrate an understanding of: ICT in the
context of global communication for specific professional
track.
Performance Standard The learners shall be able to: at the end of the 2-week
period independently compose an insightful reflection
paper on the nature of ICT in the context of their lives,
society, and professional tracks (Arts, Tech Voc, Sports,
Academic)
Learning Competencies apply online safety, security, ethics, and etiquette standards
and practice in the use of ICTs as it would relate to their
specific professional tracks (CS_ICT11/12-ICTPT-Ia-b2)
II. CONTENT/ Online Safety and Security
SUBJECT
MATTER
A. References Empowerment Technologies Teaching Guide for Senior
High School (CHED)
CAPSLET Empowerment Technologies G11 SLM
B. Other Learning https://sites.google.com/deped.gov.ph./tnts-etech/lessons
Resources https://www.slideshare.net/maricelbaldomerodelara/lesson-
1-empowerment-technology

C. Interdisciplinary a. Science
Integration b. English
c. Mathematics
III. PROCEDURES
A. Preparation Preliminaries 5. Established safe and
(3 minutes)  Universal Prayer secure learning
 Greetings and checking of attendance. environments to enhance
 Setting rules and standard for the class learning through
 Reminders for minimum health and safety protocol consistent
implementation of
policies, guidelines, and
procedures.

6. Maintained learning
environment that
promotes fairness,
respect and care to
encourage learning.
A. Motivation  Energizer 2. Used a range of
(5 minutes)  Picture Reveal Game teaching strategies that
enhance learner
 The teacher will ask students to create a story line achievements in literacy
out of the picture. (What story can you come up and numeracy skills.
with the picture? (English)
 The students will form a hypothesis taken from 1. Applied knowledge of
their observations. (What are your observations and content within and across
hypothesis from the given picture?)(Science) curriculum teaching
 The students will show a table of possible of the areas.
offenses/crimes shown in the picture. ( Showing a
statistics report). (Math)
 The teacher will give rewards at the end of their
presentations.

What is the title of our lesson for today? Anyone?

A. Activity Activity 1: 4. Displayed proficient


(2 minutes) The teacher will provide several questions for the use of Mother tongue,
class to answer by pair. Each pair will share their Filipino and English to
ideas/answers in English and in their vernacular facilitate teaching and
Think, Pair, dialect. The answers will be written in their activity learning.
Share notebook.
Instruction:
Answer the following questions and write your answers in 3. Applied a range of
your activity notebooks. teaching strategies to
develop critical and
creative thinking, as well
as higher order thinking
skills.

2. Used a range of
teaching strategies that
enhance learner
achievements in literacy
and numeracy skills.

B. Analysis The teacher will show a survey table regarding online 3. Applied a range of
(5minutes) safety and security. The students will be given 5 minutes to teaching strategies to
write their answers in their activity notebook. develop critical and
creative thinking, as well
as higher order thinking
skills.

2. Used a range of
teaching strategies that
enhance learner
achievements in literacy
and numeracy skills.

(Research:_______________________________)
The teacher will ask the following guided questions:
1. How many checks did you have for Shared?
2. Did you get links to your profile page?
3. Did your pictures appear?
4. How can search engines locate you?
5. Is there any danger of being found by search
engines?
a. Abstraction Discussion: 3. Applied a range of
(5minutes) ONLINE SAFETY AND SECURITY teaching strategies to
develop critical and
Internet is defined as the information superhighway creative thinking, as well
Internet is one of the most dangerous places as higher order thinking
skills.

(Research:_______________________________)

TIPS TO STAY SAFE ONLINE


1. Be mindful of what you share online and what you site
you share it to.
2. Do not just accept terms and conditions; read it.
3. Check out the privacy policy page of a website to learn
how the website handles the information you share.
4. Know the security features of the social networking site
you use.
5. Do not share your password with anyone.
6. Avoid logging in to public networks/Wi-Fi. Browsing in
“incognito (or private mode,”
7. Do not talk to strangers whether online or face-to-face.
8. Never post anything about a future vacation
9. Add friends you know I real life.
10. Avoid visiting untrusted websites.
11. Install and update an antivirus software on your
computer.
12. If you have a Wi-Fi at home, make it a private network
by adding a password.
13. Avoid downloading anything from untrusted websites.
14. Buy the software; do not use pirated ones.
15. Do not reply or click links from suspicious emails.

INTERNET THREATS
1. Malware – stands for malicious software
a. Virus – a malicious program designed to replicate itself
and transfer form one computer to another
b. Worm – a malicious program that transfers from one
computer to another by any type of means.
c. Trojan – a malicious program that is disguised as a
useful program but once downloaded or installed, leaves
your PC unprotected and allows hackers to get your
information. *Rogue security software – tricks the user
into posing that it is a security software.
d. Spyware – a program that runs in the background
without you knowing it (thus called “spy”).
*Keyloggers – used to record the keystroke done by the
users.
e. Adware – a program designed to send you
advertisements, mostly as pop-ups.
2. Spam – unwanted email mostly from bots or
advertisements. It can be used to send malware.
3. Phishing – Its goal is to acquire sensitive personal
information like passwords and credit card details.
a. Application Matching Type: Match Column A with Column B. Write 3. Applied a range of
(10minutes) the letter of the correct answer on the space before each teaching strategies to
number. develop critical and
creative thinking, as well
A B as higher order thinking
_________1.virus a. designed to send you skills.
advertisements
_________2. Rogue b. sends an official-looking
email and is designed to steal
sensitive personal
information
_________3. Keylogger c. a provision that allows you
to use copyrighted work without consent with certain
limitations.
_________4. Adware d. a browser feature that is
synonymous to “private” browsing
_________5. Spam e. replicates and can transfer
form one computer to another
_________6. Phishing f. exploits the DNS system
_________7. Fair use g. states that anyone who
users your work without your consent is punishable by law
_________8. Spyware h. runs in the background and
monitors what you are doing
_________9. Private i. unwanted email mostly
from bots
________10. Malware j. disguised as a useful
program but is not
________11. incognito k. the information
superhighway
________12. Internet l. tricks the user into posing
that it is a security software
________13. Trojan m. a malicious software
________14. Copyright n. an option to hide a post so
that search engines could scan it
________15. pharming o. used to record the
keystrokes done by the user

IV. Evaluation QUIZ: 3. Applied a range of


(10minutes) Multiple Choice Test. Choose the letter of the correct teaching strategies to
answer accordingly. develop critical and
1. Jade is using a technique that tries to take information creative thinking, as well
from the user. She commonly takes things like credit cards, as higher order thinking
usernames, passwords, and home addresses using a fake skills.
website.
What type of threat is depicted in the scenario?
a)Virus
b)Trojan
c)Phishing
d)Adware
2. Norma received an unwanted email that contains
advertisements. What type of internet threat is depicted in
the scenario?
a)Virus
b)Spam
c)Phishing
d)Trojan
3. A program that runs in the background without you
knowing it. It has the ability to monitor what you are
currently doing.
a)Spyware
b)Phishing
c)Malware
d)Virus
4. Jaryl is having a problem because his files were
corrupted. He discovered that most of his folders were
replicated.
a)Virus
b)Spyware
c)Worm
d)Ransomware
5. Maria was asked to pay a certain amount of money for
him to retrieve his files. Maria might be a victim of
______.
a)Spam
b)Spyware
c)Ransomware
d)Malware
6. The network servers of RHS stopped to respond and it
was found out that much of the systems' memory was
consumed by the malicious software. What kind of
malware is this?
a)Worm
b)Trojan
c)Adware
d)Virus
7. This program can record all you enter on your keyboard.
a)Spyware
b)Virus
c)Keylogger
d)Trojan
8. A kind of internet threat where the attacker uses a fake
website to get your sensitive information.
a)Ransomware
b)Worm
c)Copyright Infringement
d)Phishing
9. A form of piracy in which a third party infringes the
rights granted to the copyright such as the exclusive use of
a work for a set period of time.
a)Spam
b)Copying
c)Crediting
d)Copyright Infringement
10. A type of malware that disguise itself as a legitimate
application to deceive users.
a)Trojan
b)Virus
c)Worm
d)Adware

V. Agreement The students will write a journal (of at most 100 words). 6. Maintained learning
environment that
“Explain the danger of common internet threats in your promotes fairness,
personal life, social life and as a student of Baliwasan Senior respect and care to
High School-Stand Alone.” encourage learning.

VI. Reflection Utilizing online platforms is very much part of the day to
day activities in our personal life. Hence the need to be
aware of online safety and security.
Prepared by: Noted:

ABIGAIL S. ALEJANDRO MICHELLE K. VILLAREAL


Subject Teacher Subject Group Head – TVL

Checked and Reviewed:

FELIX C. MABANAG, Jr.


Principal I

You might also like