Lesson Plan in Empowerment Technologies
I. Objectives
A. Content Standard
The learners demonstrate an understanding of:
How to avoid the dangers of the Internet.
B. Performance Standard
The learners shall be able to:
Make a campaign materials in the form of small posters promoting
“Think Before You Click”
C. Learning Competency
Apply online safety, security, ethics, and etiquette standards and
practice in the use of ICTs Q1 Week 1-2CS_ICT11/12-ICTPT-Ia-
b-2
II. Content
Online Safety, Security, Ethics, and Etiquette
III. Learning Resources
References: Empowerment Technologies
Other Learning Resources : Empowerment Technologies Rex Book Store
Materials: Projector, PPT, video presentation
IV. PROCEDURES
A. Pre- Activities
a. Prayer
John, kindly lead the prayer. The Lord’s prayer
Good morning class? Good morning ma’am Ann
Take your seats.
b. Checking of attendance
Class monitor, kindly check the attendance.
Who are absent for today? All are present ma’am
Class. If the teacher is talking here in front What will you do?
Yes Anna? Listen and participate ma’am
That’s right.
Can I expect that from your class? Yes Ma’am.
Very Good.
c. Review
Who can give us the recap on what we have discussed last meeting? Yes ,Caitlyn?
Ma’am, last meeting we discussed the networks.
Network, or communications network, is a system of interconnected computers,
telephones, or other communications devices that can communicate with one
another and share applications and data.
B. Activities
Observation
The teacher will show some images to the students related with the upcoming discussion.
Each student will be given 1 minutes to write their observation on the following images.
After the activity the students will share their observation about the image.
Activity 2.
C. Analysis
For the activity :Teacher Facilitates Q&A:
Based from the activity, what did you observe?
How do online, social media or any digital media affects anyone lives?
Is our information shared online safe?
Why is it important to stay safe online?
D. Abstraction
a. Video clip: 3-5minutes. Teacher shows related video Watch the video “Digital
Life 101,” (https://www.youtube.com/watch?v=MkwmD6OQrWQ
b. Lecture: Teacher says:
How stay safe online
Tips so you stay safe on social networking sites
Other types of internet use E-mails, Spam &, Phishing and Viruses
Tips to Combat Viruses, Worms and Trojan Horses on Your Computer
E. Application
The class will be divided into 5 groups. They will create campaign materials in the form
of small posters promoting “Think before You Click”.
E. Evaluation. I. MULTIPLE CHOICE: Choose the letter of your answer in each of the
following statements and write it on the space provided.
________1. Which of the following terms refers to a program that runs in the background
without you knowing it?
a. Spyware b. Adware c. Spam d. Virus
________2. What do you call a small pictures found on the desktop. These are symbols
representing
programs, applications, or files?
a. Adware b. Key loggers c. Spyware d. Spam
________3. How are unwanted emails from bots and advertisers called?
a. Spam b. Trojan c. Virus d. Worm
________4. How is phishing done?
a. Advertisements are sent to a user. b. Keystrokes done by a user are
recorded. c. The Domain Name Service system is exploited. d. An email is sent
that directs a user to visit a website and asked to update personal information.
________5. What information is okay to give out on the internet?
a. Name b. Address c. Phone Number d. None
II. Enumeration. Provide Five Tips so you stay safe on social networking
sites and 4 Tips to Combat Viruses, Worms and Trojan Horses on Your
Computer
F. Assignment
Make a 3-minutes video presentation on how to avoid Internet Threats.
Prepared by:
Rey Ann A. Rubio
Applicant