Beruflich Dokumente
Kultur Dokumente
I. OBJECTIVES:
B. References:
(www.symantec.com/nav)
Using information technology (A Practical Introduction to Computer & Communication)
By BRIAN K. WILLIAMS and STACEY C. SAWYER
C. Materials:
The students will realize the importance of knowing how to keep the computer will secure.
F. Skills: Identifying, describing, and discussing.
III. LEARNING TASKS
TEACHER’S
HINT Teacher’s Activity Student’s Activity
A. Preliminary
Activities
1. Greetings Good morning class! Good morning Sir.!
Praise be the name of our
2. Prayer Please stand up let us pray. Mario kindly lead the prayer. lord Jesus Christ…..
3.Classroom Ok class before you take your seat, I want you to pick up those papers and dirt under your chair then arrange
Management your seat properly.
4. Checking of
attendance Once your name is called, kindly raise hand and say present.
None Sir!
Sir last meeting we
Do we have any assignment?Who can give us the recap of what we’re discussed last meeting?
discussed the networks.
Yes Carol.
Network, or
Excellent Carol!
communications network, is
a system of interconnected
And What about the Networks or communication networks? computers, telephones, or
other communications
devices that can
Yes Annamae.
communicate with one
another and share
Very good! applications and data.
5. Checking of
assignmentB.
Recall
The student will carefully
watch the video clips and
jot down some importance
C. Motivation The demo teacher will show some video clip about cyber threats… details about cyber threats.
D. Unlocking Trojan horse is a program that pretends to be a useful program, usually free, such as a game or screen
of Terms saver, but carries viruses, or destructive instructions, that perpetrate mischief without your knowledge.
If you don’t have any question with our previous topic, we will now proceed to the next topic which is the cyber
threats, but before that let us watch a movie presentation which is related to our discussion.Instruction:
I have a video presentation, and you need to listen carefully and take note of the important details because you
need to answer the following guide questions that posted on the board.
QUESTIONS:
RUBRICS/ MECHANICS:
5 4 3 2 1
Some of the
answer are not Almost of the
Validity of All of the answer One of the answer related to the answers are All of the answer
the answer are correct is wrong topic. wrong. are wrong.
Accuracy of Explained the Explained the Lacks for some Lacks in some Did not correctly
E. Lesson the answer for answer for the explanation in explanation in explain their
Proper explanation question question each answer. each answer. answer.
excellently and
correctly.
Some parts of the Most parts of the
The presentation The presentation presentation are presentation are The presentation
is clear, is clear, not clear, not clear, is not clear,
Delivery/ understandable, understandable, understandable, understandable, understandable,
presentation brief and concise. brief and concise. brief and concise. brief and concise. brief and concise.
Timeliness/ Finish the activity Finish the activity Finishes the act, Finishes the Finished the act.
speed on or before time. little late. beyond time. activity late. Late.
So, class do you agree with our mechanics? A comment or additionalinformation?
that good!
B. Analysis
If you understand the video, you can now answer the following guide question posted on the board.
If you understand the video, you can now answer the following guide question posted on the board.
Based on the video I presented to you, there are 4 different types of cyber threats. What are those?
Yes Sir!
Yes Sir!
That’s correct!
And also it can cause by opening unknown email attachments: The second way is from an email attachment.
This is why a basic rule of using the internet is: Never click on an email attachment that comes from someone
you don’t know. This advice also applies to unknown downloaded files, as for free video games or screen
savers.
By clicking on infiltrated websites: Some crackers “seed” web pages with contagious malware that enables them
to steal personal data, so that by simply clicking on a website you can unwittingly compromise your PC. The
risk can be minimized if you have a firewall and keep antivirus software on your computer up to date, as we
describe below. (You might also consider switching to Mozilla Firefox from Internet Explorer as your browser.)
So that is why class, that malware can infiltrate or it can damage your personal data in your computer.
C. Abstraction
Security matters class are a never-ending problem, with attacks on computers and data becoming more powerful
and more complex.
D. Application:
1. Okay class reads some ways to minimize virus attacks in your personal computers and smartphones. IV. EVALUATION:
Class here are some tips for minimizing the chances of infecting your computers are as follows:
V. ASSIGNMENT: