Sie sind auf Seite 1von 3

Lesson Guide in Empowerment Technologies

________________
________________

I. OBJECTIVES
The learners demonstrate an understanding of
A. Content Standards ICT in the context of global communication for specific
professional track
The learners shall be able to:
at the end of the 2-week period independently compose
1. Performance Standards an insightful reflection paper on the nature of ICT in the
context of their lives, society, and professional tracks
(Arts, Tech-Voc, Sports, Academic)
The learners must be able to:
2. apply online safety, security, ethics, and
etiquette standards and practice in the use of
2. Learning Competencies/ ICTs as it would relate to their specific
Objectives professional tracks;
3. use the Internet as a tool for credible research and
information gathering to best achieve specific
class objectives or address situational.
Information and Communication Technology covering the
topics of:
1. Online safety, security, ethics,
II. CONTENT
and etiquette
2. Contextualized online search
and research skills
III. LEARNING RESOURCES
A. References
Empowerment Technologies, Innovative Training Works Inc.
1. Teacher’s Guide pages
p. 17
Empowerment Technologies, Innovative Training Works Inc.
2. Learner’s Manual pages
p. 17
Empowerment Technologies, Innovative Training Works Inc.
3. Textbook pages
p. 17
4. Additional Materials from Learning
Resource (LR) portal
B. Other Learning Resources

IV. PROCEDURES
A. Reviewing previous lesson or Yesterday we discussed about ICT and the Web 3.0 and its
presenting new lesson features. What is the difference of Web 3.0 from Web 2.0?
(REVIEW) What are the trends in ICT?
Most of us use the Internet everyday. Sometimes, we do
not pay attention on how much information we share
B. Establishing a purpose of the lesson online. Below is a questionnaire about how much
(MOTIVATION)
information you have shared so far. Put a check under
Shared or Not Shared.

1
Type of Information Shared Not
Shared How
1. First name Safe
2. Last name Are
3. Middle name You?
4. Current and previous How
school many
5. Your cellphone checks
number did
6. Your address you
7. Your birthday have
for
Shared? You probably answered Shared in the furst two
items. If that is the case, try using a search engine like
Google then type your first and last name. Did you get inks
to your profile page?
As the teenagers, you are all exposed to many things
powered by the Internet. Whether it is socializing, playing
games, reading sports news, shopping, etc., the Internet has
given you one of the most powerful tools that your parents,
C. Presenting examples/instances of the during their teenage years, did not have. Because of this, do
new lesson
you not think that it is also important to wield this powerful
(PRE-ACTIVITY)
tool properly?
Without proper training, a swordsman can easily injure
himself when wielding a sword; the same could be said for
you whenever you use the Internet.
1. Discuss the online safety and security; and some tips to
stay safe online.
2. Discuss some Internet threats and some ways to protect
D. Discussing new concepts and reputations online.
practicing new skills 1 3. Discuss the idea of copyright infringement and some tips
(ACTIVITY PROPER) that could help you avoid copyright infringement.
4. Discuss some tips in conducting online research.
5. Discuss the contextualized online search and research
skills.
Take the Challenge!
Together with your group from the cybernews reporting,
create campaign materials promoting “Think before you
E. Discussing new concepts and click.” It could be in a form of small posters posted along
practicing new skills 2 the hallway or bulletin boards as approved by the school.
(DEEPENING) This campaign is an awareness program for the younger
batches of your school.
Each group will choose a leader to represent and explain
their work.
F. Developing mastery 1. Reporting of results of activity
(POST-ACTIVITY) 2. The teacher will evaluate the results.

Answer the following questions:


1. Finding practical applications of 1. Do you agree or disagree with the provisionsof the
concepts and skills in daily living copyright law? Defebd your answer.
(APPLICATION) 2. How would you feel if someone posted something about
you? What would you do?
Teacher will guide the students to formulate that:

*Most teenagers spend their time online. It is vital to


2. Making generalizations and consider what information you share the Internet is a public
abstractions about the lesson place. There are several ways to stay safe online and it is
(GENERALIZATION) essential that we know and apply them.
* several Internet threats include malwares, spams, and
phishing. Malwares could be in the form of a virus, worm,
Trojan, spyware, or adware. We are responsible of what we
2
postonline. It is also responsibility to protect other’s
reputation. We should be mindful of what we post when
others are involved.
* Copyright laws protect the authors or producers of literary
works, photographs, paintings, drawings, films, music,
choreography, and sculptures from having their work used
without their permission.
* When researching online, remember to narrow down your
topic. Used advanced search features. Look for a credible
source and cite your references.
Copy and answer.
Matching type. Match Column A with Column B. Write the
letter of the correct answer on the space provided.
A B
____1. virus a. designed to send you
advertisement
____2. rogue b. sends an official-looking
email
____3. keylogger c. a provision that allows you
to use copyrighted work
3. Evaluating learning ____4. adware d. synonymous to “private
(ASSESSMENT) browsing”
____5. spam e. replicates from one
computer to another.
____6. phishing f. exploits the DNS system
____7. fair use g. anyone who uses your work
without your consent is
punishable by law.
____8. spyware h. runs in the background
____9. private i. unwanted email
____10. malware j. disguised as a useful
program but it is not
Write YES if you agree with the statement and NO if you
disagree on the blank before each number.
_____1. My computer has an antivirus so it is okay to open
most email attachments like e-cards.
_____2. You received an email stating that your mother’s
4. Additional activities for application or bank account is going to be forfeited if you do not respond
remediation to the email. Is it safe to reply?
(REMEDIAL) _____3. A virus is a malware that multiplies and infects
other computers through the flash drives.
_____4. Keyloggers are software that show pop-ups ads
even if you are not using your browsers.
_____5. Search engines scan websites for search results
even if your have set your post to private.

Das könnte Ihnen auch gefallen