Академический Документы
Профессиональный Документы
Культура Документы
Content Standard: The learners demonstrate an understanding of the principles and concepts in
performing computer operations
Performance Standard: The learners independently perform computer operations based on TESDA
Training Regulations
Date: ___________________
I. OBJECTIVES:
B. References:
C. Materials:
D. Concepts:
The students will realize the importance of knowing how to keep the computer will secure.
F. Skills: Identifying, describing, and discussing.
Department of Education
Division of Negros Occidental
INOCENCIO V. FERRER MEMORIAL SCHOOL OF FISHERIES
Gamboa Subd., Zone 2, Talisay City, Negros Occidental
TEACHER’S
HINT Teacher’s Activity Student’s Activity
A. Preliminary
Activities
3.Classroom Ok class before you take your seat, I want you to pick up those papers and dirt
Management under your chair then arrange your seat properly.
4. Checking of
attendance Once your name is called, kindly raise hand and say present.
None Sir!
Sir last meeting we
Do we have any assignment? Who can give us the recap of what we’re discussed discussed the networks.
last meeting?
Yes Charice.
Network, or
communications network,
Excellent Charice! is a system of
interconnected
And What about the Networks or communication networks? computers, telephones, or
other communications
devices that can
Yes Mae Hope. communicate with one
5.
A. Checking of another and share
assignment Very good! applications and data.
B. Recall
If you don’t have any question with our previous topic, we will now proceed to
the next topic which is the cyber threats, but before that let us watch a movie
presentation which is related to our discussion.
Instruction:
I have a video presentation, and you need to listen carefully and take note of the
important details because you need to answer the following guide questions that
posted on the board.
QUESTIONS:
After you watch the video, answer the following questions by grouping your
selves into 6 and you should have to present your output in the class.
RUBRICS/ MECHANICS:
5 4 3 2 1
Some of the
Validity All of the One of the answer are Almost of All of the
of the answer are answer is not related the answers answer are
answer correct wrong to the topic. are wrong. wrong.
Explained
the answer Lacks for Lacks in Did not
Accuracy for question Explained some some correctly
of the excellently the answer explanation explanation explain
explanati and for the in each in each their
on correctly. question answer. answer. answer.
Finish the
activity on Finish the Finishes the
Timelines or before activity little act, beyond Finishes the Finished the
s/ speed time. late. time. activity late. act. Late.
that good!
B. Analysis
The four different types of
cyber threats are denial-
Did you understand the video? of-service attacks, worms,
viruses, and Trojan horses.
If you understand the video, you can now answer the following guide question
posted on the board and RELATE it to your situation Through internet, the virus
can infect your computer
Presentation of the output… when you are surfing the
internet.
WORMS’s viruses, and Trojan horses are three forms of malware, or malicious Possible answers.
software, which attack computer systems. The latest Symantec Internet Security
Threat Report identified over 1.6 million instances of “malicious code” (worms #Don’t open, download, or
and viruses) in 2008, a 165% increase over 2007. A worm is a program that copies execute any files, email
itself repeatedly into a computer’s memory or onto a disk drive. Sometimes it will messages, or email
copy itself so often it will cause a computer to crash. Among some famous worms attachments if the source
are Code Red, Nimda, Klez, Sasser, Bagle, Blaster, Sobig, and Melissa. The 2002 is unknown or if the
worm Klez, dubbed the most common worm ever, spread its damage through subject line of an email is
Microsoft products by being inside email attachments or part of email messages questionable or
themselves, so that merely opening an infected message could infect a computer unexpected.
running Outlook or Outlook Express. The Sasser worm was estimated to account
for 26% of all virus infections in the first half of 2004. Incredibly, one person, Sven #Delete all spam and email
Jaschan, 18, who admitted programming the Sasser and other worms and who messages from strangers.
was arrested in Germany in May 2004, was responsible for 70% of the virus Don’t open, forward, or
infections in the early part of that year. reply to such messages.
Yes Aldwin.
#Back up your data files
regularly, and keep the
That’s right! backup CD or whatever in
a location separate from
Here are some causes how malware is spread Worms, viruses, and Trojan horses your computer (or use an
are passed in the following ways: online backup service).
Then if a virus (or a fire)
destroys your work files,
Will you please read Tonet? your data won’t be totally
devastated.
Thank you Tonet.
And also it can cause by opening unknown email attachments: The second way is
from an email attachment. This is why a basic rule of using the internet is: Never
click on an email attachment that comes from someone you don’t know. This
advice also applies to unknown downloaded files, as for free video games or
screen savers.
So that is why class, that malware can infiltrate or it can damage your personal
data in your computer.
C. Abstraction
D. Application:
1. Okay class reads some ways to minimize virus attacks in your personal
computers and smartphones.
Class here are some tips for minimizing the chances of infecting your
computers are as follows:
IV. EVALUATION:
Multiple Choice
1. ____________ is not a foreign concept for mobile devices but it is viewed differently for mobile
devices than with computers
a. Cyber Attack b. Cyber Security c. Cyber Bullying d. Cyber Crime
2. Nearly __________ of consumers believe the task of keeping mobile devices safe falls mostly on
them. Cybersecurity is not a foreign concept for mobile devices but it is viewed differently for
mobile devices than with computers.
a. 3/4 b. 2/4 c. ¼ d. 5/4
4. Those who lost their smartphones are more likely to have a ________ than those who have not,
but aren’t significantly more likely to take any other protective action.
a. PIN b. Software c. Device d. Programs
5. ________ believe the mobile industry is best equipped to write cybersecurity regulations vs. the
federal government.
a. 1/3 b. 2/3 c. ¼ d. 1/2
Key Answer
1. c
2. a
3. c
4. a
5. b
V. ASSIGNMENT: