Вы находитесь на странице: 1из 5

Department of Education

Division of Negros Occidental


INOCENCIO V. FERRER MEMORIAL SCHOOL OF FISHERIES
Gamboa Subd., Zone 2, Talisay City, Negros Occidental

LESSON PLAN IN COMPUTER PROGRAMMING NCIII


ORACLE PROGRAMMING - GRADE II

Content Standard: The learners demonstrate an understanding of the principles and concepts in
performing computer operations

Performance Standard: The learners independently perform computer operations based on TESDA
Training Regulations

Learning Competency: Maintain computer equipment

Code: TVL_ICTORCL 11-12PCOIIe-28

Date: ___________________

I. OBJECTIVES:

At the end of 45 minutes discussion, the students should be able to:

1. Identify the different types of cyber threats in your personal computer.


2. Reads the ways to minimize virus attacks in your personal computer.
3. Explain some practices on how to quarantine the cyber threats in your personal computer.
II. SUBJECT MATTER

A. Topic: Cyber threats in PC and Smartphones

B. References:

 Haris Interactive / Cybersecurity Research


 By BRIAN K. WILLIAMS and STACEY C. SAWYER

C. Materials:

 Power Point presentation


 Projector
 Images
 Paper

D. Concepts:

 Cyber threats: denial-of-service attacks, worms, viruses, and Trojan horses.


 Cyber threats allow to know how to quarantine the threats in your PC.
 Knows the areas should be concerned about for keeping computer system secure.
E. Values Integration:

 The students will realize the importance of knowing how to keep the computer will secure.
F. Skills: Identifying, describing, and discussing.
Department of Education
Division of Negros Occidental
INOCENCIO V. FERRER MEMORIAL SCHOOL OF FISHERIES
Gamboa Subd., Zone 2, Talisay City, Negros Occidental

III. LEARNING TASKS

TEACHER’S
HINT Teacher’s Activity Student’s Activity

A. Preliminary
Activities

1. Greetings Good morning class! Good morning Sir.!

Praise be the name of our


2. Prayer Please stand up let us pray. Jason kindly lead the prayer. lord Jesus Christ…..

3.Classroom Ok class before you take your seat, I want you to pick up those papers and dirt
Management under your chair then arrange your seat properly.

4. Checking of
attendance Once your name is called, kindly raise hand and say present.

None Sir!
Sir last meeting we
Do we have any assignment? Who can give us the recap of what we’re discussed discussed the networks.
last meeting?
Yes Charice.
Network, or
communications network,
Excellent Charice! is a system of
interconnected
And What about the Networks or communication networks? computers, telephones, or
other communications
devices that can
Yes Mae Hope. communicate with one
5.
A. Checking of another and share
assignment Very good! applications and data.
B. Recall

The student will carefully


watch the video clips and
jot down some importance
details about cyber
C. Motivation The demo teacher will show some video clip about cyber threats… threats.

Trojan horse is a program that pretends to be a useful program, usually free,


D. Unlocking of such as a game or screen saver, but carries viruses, or destructive instructions,
Terms that perpetrate mischief without your knowledge.

If you don’t have any question with our previous topic, we will now proceed to
the next topic which is the cyber threats, but before that let us watch a movie
presentation which is related to our discussion.
Instruction:
I have a video presentation, and you need to listen carefully and take note of the
important details because you need to answer the following guide questions that
posted on the board.

QUESTIONS:

1. What is cyber threats that can damage your personal computer?


2. What are the different types of malware?
E. Lesson 3. Describe how you can avoid your computer or smartphone to this cyber
Proper threats.
Department of Education
Division of Negros Occidental
INOCENCIO V. FERRER MEMORIAL SCHOOL OF FISHERIES
Gamboa Subd., Zone 2, Talisay City, Negros Occidental

After you watch the video, answer the following questions by grouping your
selves into 6 and you should have to present your output in the class.

You only have 2 minutes to finish the activity.

RUBRICS/ MECHANICS:

5 4 3 2 1

Some of the
Validity All of the One of the answer are Almost of All of the
of the answer are answer is not related the answers answer are
answer correct wrong to the topic. are wrong. wrong.

Explained
the answer Lacks for Lacks in Did not
Accuracy for question Explained some some correctly
of the excellently the answer explanation explanation explain
explanati and for the in each in each their
on correctly. question answer. answer. answer.

Some parts Most parts


of the of the The
The The presentatio presentatio presentatio
presentatio presentatio n are not n are not n is not
n is clear, n is clear, clear, clear, clear,
Delivery/ understand understand understand understand understand Yes Sir!
presentat able, brief able, brief able, brief able, brief able, brief
ion and concise. and concise. and concise. and concise. and concise.

Finish the
activity on Finish the Finishes the
Timelines or before activity little act, beyond Finishes the Finished the
s/ speed time. late. time. activity late. act. Late.

So, class do you agree with our mechanics? A comment or additional


information?

that good!

you are ready to watch the video?

B. Analysis
The four different types of
cyber threats are denial-
Did you understand the video? of-service attacks, worms,
viruses, and Trojan horses.
If you understand the video, you can now answer the following guide question
posted on the board and RELATE it to your situation Through internet, the virus
can infect your computer
Presentation of the output… when you are surfing the
internet.

CYBERTHREATS in PC and Smartphones


By infected floppies or
CDs: The first way is via an
Based on the video I presented to you, there are 4 different types of cyber infected floppy disk or CD,
threats. What are those? perhaps from a friend or a
repair person.
Department of Education
Division of Negros Occidental
INOCENCIO V. FERRER MEMORIAL SCHOOL OF FISHERIES
Gamboa Subd., Zone 2, Talisay City, Negros Occidental

Yes Jean. None Sir!

(The student are expected


to read through the use of
That’s correct! ppt.)

WORMS’s viruses, and Trojan horses are three forms of malware, or malicious Possible answers.
software, which attack computer systems. The latest Symantec Internet Security
Threat Report identified over 1.6 million instances of “malicious code” (worms #Don’t open, download, or
and viruses) in 2008, a 165% increase over 2007. A worm is a program that copies execute any files, email
itself repeatedly into a computer’s memory or onto a disk drive. Sometimes it will messages, or email
copy itself so often it will cause a computer to crash. Among some famous worms attachments if the source
are Code Red, Nimda, Klez, Sasser, Bagle, Blaster, Sobig, and Melissa. The 2002 is unknown or if the
worm Klez, dubbed the most common worm ever, spread its damage through subject line of an email is
Microsoft products by being inside email attachments or part of email messages questionable or
themselves, so that merely opening an infected message could infect a computer unexpected.
running Outlook or Outlook Express. The Sasser worm was estimated to account
for 26% of all virus infections in the first half of 2004. Incredibly, one person, Sven #Delete all spam and email
Jaschan, 18, who admitted programming the Sasser and other worms and who messages from strangers.
was arrested in Germany in May 2004, was responsible for 70% of the virus Don’t open, forward, or
infections in the early part of that year. reply to such messages.

Yes Aldwin.
#Back up your data files
regularly, and keep the
That’s right! backup CD or whatever in
a location separate from
Here are some causes how malware is spread Worms, viruses, and Trojan horses your computer (or use an
are passed in the following ways: online backup service).
Then if a virus (or a fire)
destroys your work files,
Will you please read Tonet? your data won’t be totally
devastated.
Thank you Tonet.

(The demo teacher will add some supplementary ideas.)

And also it can cause by opening unknown email attachments: The second way is
from an email attachment. This is why a basic rule of using the internet is: Never
click on an email attachment that comes from someone you don’t know. This
advice also applies to unknown downloaded files, as for free video games or
screen savers.

By clicking on infiltrated websites: Some crackers “seed” web pages with


contagious malware that enables them to steal personal data, so that by simply
clicking on a website you can unwittingly compromise your PC. The risk can be
minimized if you have a firewall and keep antivirus software on your computer up
to date, as we describe below. (You might also consider switching to Mozilla
Firefox from Internet Explorer as your browser.)

So that is why class, that malware can infiltrate or it can damage your personal
data in your computer.

C. Abstraction

Security matters class are a never-ending problem, with attacks on computers


and data becoming more powerful and more complex.
Department of Education
Division of Negros Occidental
INOCENCIO V. FERRER MEMORIAL SCHOOL OF FISHERIES
Gamboa Subd., Zone 2, Talisay City, Negros Occidental

Do you have any question and additional information about my topic?

D. Application:

1. Okay class reads some ways to minimize virus attacks in your personal
computers and smartphones.
Class here are some tips for minimizing the chances of infecting your
computers are as follows:

IV. EVALUATION:

Multiple Choice

1. ____________ is not a foreign concept for mobile devices but it is viewed differently for mobile
devices than with computers
a. Cyber Attack b. Cyber Security c. Cyber Bullying d. Cyber Crime

2. Nearly __________ of consumers believe the task of keeping mobile devices safe falls mostly on
them. Cybersecurity is not a foreign concept for mobile devices but it is viewed differently for
mobile devices than with computers.
a. 3/4 b. 2/4 c. ¼ d. 5/4

3. What device is mostly used in mobile banking?


a. Pesonal Smart Phone b. Personal Laptop c. Personal Tablet d. Personal
Desktop

4. Those who lost their smartphones are more likely to have a ________ than those who have not,
but aren’t significantly more likely to take any other protective action.
a. PIN b. Software c. Device d. Programs

5. ________ believe the mobile industry is best equipped to write cybersecurity regulations vs. the
federal government.
a. 1/3 b. 2/3 c. ¼ d. 1/2

Key Answer
1. c
2. a
3. c
4. a
5. b

V. ASSIGNMENT:

 Research about the Cyber Villains: Hackers & Crackers.


 What are the type of hackers and crackers?

Preppared by: Jeropher S. Sanchez


Teacher II

Submitted to: June A. Dionisio, MMEM


Head Teacher III, TV

Вам также может понравиться