Вы находитесь на странице: 1из 5

School Grade Level 11 or 12

DAILY LESSON LOG Teacher Learning Area Empowerment Technology


Teaching Dates & Time Quarter

I. OBJECTIVES
The learners demonstrate an understanding of:
A. CONTENT STANDARD
CT in the context of global communication for specific professional track
The learners shall be able to:
B. PERFORMANCE STANDARD
at the end of the 2-week period independently compose an insightful reflection paper on the nature of ICT in the
context of their lives, society, and professional tracks (Arts, TechVoc, Sports, Academic)
Apply online safety, security, ethics and etiquette standards and practice in the use of ICTs as it would relate to their
specific professional tracks.
C. LEARNING COMPETENCIES
CS_ICT11/12-ICTPT-Ia-b-2

II. CONTENT Online Safety & Security

III. LEARNING RESOURCES


A. REFERENCES
1. Teacher’s Guide Pages
2. Learner’s Material Pages
Empowerment Technologies (Innovative Training Works, Inc.) by
3. Textbook Pages REX Bookstore
Pages 17-32
4. Additional Materials from
Learning Source (LR) portal
B. OTHER LEARNING RESORCES

IV. PROCEDURES COLLABORATIVE APPROACH – JIGSAW METHOD (TDAR)

Video Presentation About Online Safety & Security

https://www.youtube.com/watch?v=ynN7wIkRdIE
A. Reviewing Lesson or
Presenting the new lesson
Super Realistic Internet Safety Video

What is the video all about?


Can you give your reflection based from the video?

Put a check under shared or not shared to show information you have shared.

B. Establishing a purpose for the


number
lesson

How many checks did you have for shared?

THINK

Have you experienced searching your first and last name using search engine like Google?

C. Presenting examples/instances Did you get links to your profile page?


of the new lesson How about switching to image search? Did your pictures appear?

How do you feel?


Is there any danger of being found by search engines?
How will you protect yourself from or while using the internet?

Discussion on:
D. Discussing new concepts and 1. Definition of Internet
practicing new skills #1 2. Online Safety & Security

1. Internet Threats
E. Discussing new concepts and
2. Tips To Stay Safe Online
practicing new skills # 2

Why internet is considered as a powerful tool?


F. Developing mastery
Which of this malware can monitor what you are currently doing?
How will you explain phishing? How it differs from spam?
ACT:

The class will be divided into four groups. Draw Lots will be made for the group tasks.

Group Explain
1 Internet as powerful tool (1-Stanza
Poem)
2 Difference between spyware from
other malware (Elaborate)
3 Tips to Stay Safe Online (Through a
Song)
4 Tips To Stay Safe Online (Through a
Recapitulation)
REFLECT:

Think of slogan where in you can apply Online Safety & Security

Rubrics
G. Finding practical applications of
concepts and skills in daily living Criteria Points
Idea/Content 5
Creativity 5
Relevance 5
Total 15

H. Making generalizations and Nowadays we are very exposed to many things powered by the __________.
abstractions about the lesson So, it is important to ________ the internet safely through applying security measures.

With regards to the application of online safety and security, answer the following questions.

1. Assuming that you received a friend request from a boy you don’t know, how will you act?

I. Evaluating Learning A. Accept the friend request. It’s rude to ignore him.
B. Deny the friend request.
C. Send him a message and ask him how he knows her.
2. You receive an email from a person that identifies themselves as your friend John. They want to meet you in the
park after school. Do you:
A. Tell your parents about the email and ignore the request.
B. Ask the person a question only John would know to make sure it is John.
C. Go to the park and meet your friend John.

3. You receive a chain email that tells you to pass it on to 10 of your closest friends. Do you:
A. Send the email to your friends – it’s so cool and you want them to see it too!
B. Delete the email. You're never sure what viruses these types of chain emails can have.

4.Let’s say you receive an e-mail that directs you to visit a website and ask to update your personal information,
what will you do?
A. Click on the link, visit the site and update your personal information
B. Ignore the e-mail. It’s nothing.
C. Delete the email. Hackers can get your personal information and used it against you.

5. When you use your favorite gaming sites, you are:


A. Always safe from spyware, malware and other online threats
B. You are at risk that viruses can attack your computer or mobile phone

Exhibit online safety through a poster

Rubrics

Criteria Points
J. Additional Activities for
Idea 5
application or remediation
Creativity 5
Total 10

When online, you should be careful whenever approached by a new person or asked to provide information about
yourself. (True or False)

V. REMARKS
VI. REFLECTION

A.
B.

C.

D.

Prepared by:

________________________
Teacher Applicant

Вам также может понравиться