Professional Documents
Culture Documents
I. Objectives REMARKS/
At the end of the lesson, the learners must be able to: ANNOTATIONS/
1. identify common online safety and security; RPMS-PPST
2. explain the danger of common internet threats; INDICATORS
Content Standard The learners demonstrate an understanding of: ICT in the
context of global communication for specific professional
track.
Performance Standard The learners shall be able to: at the end of the 2-week
period independently compose an insightful reflection
paper on the nature of ICT in the context of their lives,
society, and professional tracks (Arts, Tech Voc, Sports,
Academic)
Learning Competencies apply online safety, security, ethics, and etiquette standards
and practice in the use of ICTs as it would relate to their
specific professional tracks (CS_ICT11/12-ICTPT-Ia-b2)
II. CONTENT/ Online Safety and Security
SUBJECT
MATTER
A. References Empowerment Technologies Teaching Guide for Senior
High School (CHED)
CAPSLET Empowerment Technologies G11 SLM
B. Other Learning https://sites.google.com/deped.gov.ph./tnts-etech/lessons
Resources https://www.slideshare.net/maricelbaldomerodelara/lesson-
1-empowerment-technology
C. Interdisciplinary a. Science
Integration b. English
c. Mathematics
III. PROCEDURES
A. Preparation Preliminaries 5. Established safe and
(3 minutes) Universal Prayer secure learning
Greetings and checking of attendance. environments to enhance
Setting rules and standard for the class learning through
Reminders for minimum health and safety protocol consistent
implementation of
policies, guidelines, and
procedures.
6. Maintained learning
environment that
promotes fairness,
respect and care to
encourage learning.
A. Motivation Energizer 2. Used a range of
(5 minutes) Picture Reveal Game teaching strategies that
enhance learner
The teacher will ask students to create a story line achievements in literacy
out of the picture. (What story can you come up and numeracy skills.
with the picture? (English)
The students will form a hypothesis taken from 1. Applied knowledge of
their observations. (What are your observations and content within and across
hypothesis from the given picture?)(Science) curriculum teaching
The students will show a table of possible of the areas.
offenses/crimes shown in the picture. ( Showing a
statistics report). (Math)
The teacher will give rewards at the end of their
presentations.
2. Used a range of
teaching strategies that
enhance learner
achievements in literacy
and numeracy skills.
B. Analysis The teacher will show a survey table regarding online 3. Applied a range of
(5minutes) safety and security. The students will be given 5 minutes to teaching strategies to
write their answers in their activity notebook. develop critical and
creative thinking, as well
as higher order thinking
skills.
2. Used a range of
teaching strategies that
enhance learner
achievements in literacy
and numeracy skills.
(Research:_______________________________)
The teacher will ask the following guided questions:
1. How many checks did you have for Shared?
2. Did you get links to your profile page?
3. Did your pictures appear?
4. How can search engines locate you?
5. Is there any danger of being found by search
engines?
a. Abstraction Discussion: 3. Applied a range of
(5minutes) ONLINE SAFETY AND SECURITY teaching strategies to
develop critical and
Internet is defined as the information superhighway creative thinking, as well
Internet is one of the most dangerous places as higher order thinking
skills.
(Research:_______________________________)
INTERNET THREATS
1. Malware – stands for malicious software
a. Virus – a malicious program designed to replicate itself
and transfer form one computer to another
b. Worm – a malicious program that transfers from one
computer to another by any type of means.
c. Trojan – a malicious program that is disguised as a
useful program but once downloaded or installed, leaves
your PC unprotected and allows hackers to get your
information. *Rogue security software – tricks the user
into posing that it is a security software.
d. Spyware – a program that runs in the background
without you knowing it (thus called “spy”).
*Keyloggers – used to record the keystroke done by the
users.
e. Adware – a program designed to send you
advertisements, mostly as pop-ups.
2. Spam – unwanted email mostly from bots or
advertisements. It can be used to send malware.
3. Phishing – Its goal is to acquire sensitive personal
information like passwords and credit card details.
a. Application Matching Type: Match Column A with Column B. Write 3. Applied a range of
(10minutes) the letter of the correct answer on the space before each teaching strategies to
number. develop critical and
creative thinking, as well
A B as higher order thinking
_________1.virus a. designed to send you skills.
advertisements
_________2. Rogue b. sends an official-looking
email and is designed to steal
sensitive personal
information
_________3. Keylogger c. a provision that allows you
to use copyrighted work without consent with certain
limitations.
_________4. Adware d. a browser feature that is
synonymous to “private” browsing
_________5. Spam e. replicates and can transfer
form one computer to another
_________6. Phishing f. exploits the DNS system
_________7. Fair use g. states that anyone who
users your work without your consent is punishable by law
_________8. Spyware h. runs in the background and
monitors what you are doing
_________9. Private i. unwanted email mostly
from bots
________10. Malware j. disguised as a useful
program but is not
________11. incognito k. the information
superhighway
________12. Internet l. tricks the user into posing
that it is a security software
________13. Trojan m. a malicious software
________14. Copyright n. an option to hide a post so
that search engines could scan it
________15. pharming o. used to record the
keystrokes done by the user
V. Agreement The students will write a journal (of at most 100 words). 6. Maintained learning
environment that
“Explain the danger of common internet threats in your promotes fairness,
personal life, social life and as a student of Baliwasan Senior respect and care to
High School-Stand Alone.” encourage learning.
VI. Reflection Utilizing online platforms is very much part of the day to
day activities in our personal life. Hence the need to be
aware of online safety and security.
Prepared by: Noted: