Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

EMPOWERMENT TECHNOLOGIES TEACHING GUIDE

LESSON OUTLINE

Rules of Introducti
on/
Review
Solicitation of perceptions about Rules of
Nettiquette.

Motivation “Break the Barrier” before starting the lesson. Give

Netiquette
the etymological meaning of Netiquette and define
what the term means.

Instruction Discussing the current state of Cybercrime.


Content Standards /
Delivery
The learners demonstrate understanding of: Practice Ask the students this question: What security
problems have they encountered while browsing
1. ICT in the context of global communication for specific
the Internet?
professional track Discuss with the students the different types of
Performance Standards: information they should not publicly disclose
through the social media. Explain the risks of doing
The learners shall be able to: at the end of the 2-week period so.
indepently composed an insightful reflection paper on the nature of Enrichmen Group the students to list down the risks they know
ICT in the context of their lives, society and professional tracks (Arts, t of giving too much information about themselves
Tech-Voc, Sports, Academic) online, and then present it before the class in the
form of sharing.
Learning Competency:
Materials 1. PowerPoint Presentation
The learners: 2. Computer and Internet
3. Board and Marker
4. Reference Book (Innovative Training Works,
1. apply online safety, security, ethics, and etiquette standards Empowerment Technologies, 2016)
and practice in the use of ICTs as it would relate to their Resources 1. EMPOWERMENT TECHNOLOGIES
specific professional tracks Innovative Tracks, Inc.
(CS_ICT11/12-ICTPT-Ia-b-2) Rex Printing Company, Inc. 2016
2. http://www.slideshare.net/information and
communication technology/
3. http://cyber.law.harvard.edu/readinessguide
/intro.html
Page 1|5
4. https://gathercontent.com/blog/how-to-
collaborate-the-creative-the-practical
EMPOWERMENT TECHNOLOGIES TEACHING GUIDE

Specific Learning Outcomes:


The learners should be able to:
1. consider one’s and others’ safety when sharing information using the Internet;
2. consider one’s and others’ reputation when using the Internet;
3. determine and avoid the dangers of the Internet;
4. be responsible in the use of social networking sites; and
5. browse the Internet efficiently and properly through proper referencing.
INTRODUCTION (10 MINS) Teacher Tips
“Break the Barrier” before starting the lesson. Give the etymological meaning of Netiquette  You can use the
and define what the following term means. introduction part as a
• Internet threats temperature-check on your
• Protecting reputations online students so as to gauge
• Copyright their schema and
• Contextualized online search and research skills understanding about the
topic.
 Emphasize the importance
of the terminologies in
comprehending the lesson.
MOTIVATION (15 MINS)  Pictures may be
• Ask the students to give other reasons why ICT is a powerful tool; and the possible dangers of contextualized and
using the Internet. localized using available
resources from the different
online platforms.
 A video clip may be shown
to further add impact to the
learners.

INSTRUCTION / DELIVERY (15 MINS) Teacher Tips

1. Discuss with the students the different types of information they should not publicly disclose
through the social media. Explain the risks of doing so.

Page 2|5
EMPOWERMENT TECHNOLOGIES TEACHING GUIDE

Teacher Tips

2. Give them tips on how to stay safe online.

Page 3|5
EMPOWERMENT TECHNOLOGIES TEACHING GUIDE

3. CHALLENGE QUESTION: How is your digital media life like? Hint: You have to think
figuratively.
Think about your life with media.7 First consider the questions below. Use your responses to
help you finish the statement, “My media life is like a ...” This statement is a simile, a literary
device for comparing two unlike things. For instance, someone who does not use much media
might say that her media life is like a desert, because there is little life there. Someone might
say that his media life is like a track meet, because he is exhausted at the end of the day.
Finally, make a picture or drawing of the simile you created. The drawing can include text.
Questions to consider:
● Are digital media a big part of your life?
● What kind of impact do digital media have on you (a little, some, a lot)?
● What are your favorite and least-favorite things to do with digital media?
● Do you connect with others or create things with digital media? Finish this statement:
My media life is like ___________________________________________ because
1. ___________________________________________________________________

4. Define each type of virus.


What is ‘Rogue security software’?
What is a keylogger?
What is pharming?

5. Ask the students on ways by which copyright infringement may be avoided.

6. Lecture on the ways through which research may be free from infringement.

PRACTICE (15 MINS)

• As an activity, the teacher may divide the class into groups and ask each group to present an infommercial or a campaign with the
theme "Think before you click."

ENRICHMENT (30 MINS) Teacher Tips

Page 4|5
EMPOWERMENT TECHNOLOGIES TEACHING GUIDE

1. Together with the group from Cyber News Reporting, ask the learners to create materials
promoting “Think Before You Click”. It could be a form of small posters and bulletin boards or
Graffiti Wall as approved by the school and shall be posted on their social media networking sites
such as Facebook and Twitter. This campaign is an awareness program for the younger batcher of
your school.

EVALUATION (60 MINS)


Teacher Tips
1. Ask learners to have Reflection Paper about the CYBERCRIME today, including those tips on 
how stay safe online and awareness of privacy policy in different online platforms.

2. Ask the learners to answer the following identification.

Directions: Identify the following based on the given description. Write the answer after each sentence.

1. This means that an intellectual property may be used without a consent as long as it is used in
commentaries, criticisms, search engines, parodies, news reports, research, library archiving, teaching, and
education.
2. A more complicated way of phishing where it exploits the Domain Name Service system.
3. Acquires sensitive personal information like passwords and credit card details
4. It is a malicious program designed to replicate itself and transfer from one computer to another.
5. This stands for malicious software.
6. This is a crime committed or assisted through the use of internet.
7. A part of the law, wherein you have the rights to your work, and anyone who uses it without your consent
is punishable by.
8. A malicious program that is disguised as a useful program but once downloaded or installed, leaves your
PC unprotected and allows hackers to get your information
9. This tells the users how the website will handle its data.
10. These are mostly pop-ups, a program designed to send an advertisements.

Page 5|5

You might also like