Академический Документы
Профессиональный Документы
Культура Документы
I. OBJECTIVES
The learners demonstrate an understanding of:
A. CONTENT STANDARD
CT in the context of global communication for specific professional track
The learners shall be able to:
B. PERFORMANCE STANDARD
at the end of the 2-week period independently compose an insightful reflection paper on the nature of ICT in the
context of their lives, society, and professional tracks (Arts, TechVoc, Sports, Academic)
Apply online safety, security, ethics and etiquette standards and practice in the use of ICTs as it would relate to their
specific professional tracks.
C. LEARNING COMPETENCIES
CS_ICT11/12-ICTPT-Ia-b-2
https://www.youtube.com/watch?v=ynN7wIkRdIE
A. Reviewing Lesson or
Presenting the new lesson
Super Realistic Internet Safety Video
Put a check under shared or not shared to show information you have shared.
THINK
Have you experienced searching your first and last name using search engine like Google?
Discussion on:
D. Discussing new concepts and 1. Definition of Internet
practicing new skills #1 2. Online Safety & Security
1. Internet Threats
E. Discussing new concepts and
2. Tips To Stay Safe Online
practicing new skills # 2
The class will be divided into four groups. Draw Lots will be made for the group tasks.
Group Explain
1 Internet as powerful tool (1-Stanza
Poem)
2 Difference between spyware from
other malware (Elaborate)
3 Tips to Stay Safe Online (Through a
Song)
4 Tips To Stay Safe Online (Through a
Recapitulation)
REFLECT:
Think of slogan where in you can apply Online Safety & Security
Rubrics
G. Finding practical applications of
concepts and skills in daily living Criteria Points
Idea/Content 5
Creativity 5
Relevance 5
Total 15
H. Making generalizations and Nowadays we are very exposed to many things powered by the __________.
abstractions about the lesson So, it is important to ________ the internet safely through applying security measures.
With regards to the application of online safety and security, answer the following questions.
1. Assuming that you received a friend request from a boy you don’t know, how will you act?
I. Evaluating Learning A. Accept the friend request. It’s rude to ignore him.
B. Deny the friend request.
C. Send him a message and ask him how he knows her.
2. You receive an email from a person that identifies themselves as your friend John. They want to meet you in the
park after school. Do you:
A. Tell your parents about the email and ignore the request.
B. Ask the person a question only John would know to make sure it is John.
C. Go to the park and meet your friend John.
3. You receive a chain email that tells you to pass it on to 10 of your closest friends. Do you:
A. Send the email to your friends – it’s so cool and you want them to see it too!
B. Delete the email. You're never sure what viruses these types of chain emails can have.
4.Let’s say you receive an e-mail that directs you to visit a website and ask to update your personal information,
what will you do?
A. Click on the link, visit the site and update your personal information
B. Ignore the e-mail. It’s nothing.
C. Delete the email. Hackers can get your personal information and used it against you.
Rubrics
Criteria Points
J. Additional Activities for
Idea 5
application or remediation
Creativity 5
Total 10
When online, you should be careful whenever approached by a new person or asked to provide information about
yourself. (True or False)
V. REMARKS
VI. REFLECTION
A.
B.
C.
D.
Prepared by:
________________________
Teacher Applicant