Professional Documents
Culture Documents
Adriatico, Norwin-Lesson-Exemplar-E-Tech (Cultural Mapping Output)
Adriatico, Norwin-Lesson-Exemplar-E-Tech (Cultural Mapping Output)
Adriatico, Norwin-Lesson-Exemplar-E-Tech (Cultural Mapping Output)
Department of Education
REGION I
SCHOOLS DIVISION OF THE CITY OF BATAC
<TOPIC>
(LESSON EXEMPLAR INTEGRATING CULTURAL HERITAGE)
PARTS DESCRIPTION
I. OBJECTIVES
A. CONTENT STANDARDS The learners demonstrate an understanding of: ICT in
the context of global communication for specific
professional track.
B. PERFORMANCE The learners shall be able to: at the end of the 2-week
STANDARDS period independently compose an insightful reflection
paper on the nature of ICT in the context of their lives,
society, and professional tracks (Arts, Tech Voc, Sports,
Academic)
C. MELCS (WITH CODE, if
any) CS_ICT11/12-ICTPT-Ia-b2
II. TOPIC Online Safety, Security Ethics, and Etiquette
III. CULTURAL ICON “Lakasa”
INTEGRATED
IV. LEARNING RESOURCES
A. REFERENCE
1. TEACHER’S GUIDE Empowerment Technologies, Alternative Delivery Mode,
PAGES Quarter 1 – Module 2: Online Safety, Security Ethics, and
Etiquette, First Edition 2020.
2. LEARNER’S 1. Teach Students about Internet Safety and Privacy
MATERIALS PAGES https://www.youtube.com/watch?v=25G4tLVH1JE
2. EDU in 90: Privacy and Security, Google for
Education.
https://www.youtube.com/watch?v=1HOjYCC4O1s
3. ADDITIONAL None found.
MATERIALS FROM
LR PORTAL
B. OTHER LEARNING
RESOURCES
1. BOOKS, INTERNET Online Safety: Scams, SPAM, Viruses and Clouds, A.M.
SOURCES, ETC. Perry.
2. LEARNING TOOLS Google Chrome Browser, Android smart phone,
OR Wireless Modem-Router, and PowerPoint Presentation.
MANIPULATIVES
V. PROCEDURES
A. REVIEW LESSON Say: During our previous lessons we discussed about
how to effectively use the searching techniques in the
web browser with the existing web browser applications
used in researching on the internet. We’ve learned how
to search for a specific word as well as the relevant
information. In the next lesson, we will talk about how
we can protect ourselves and our information we are
searching information online.
B. PRESENTING A NEW Say: The next topic that we will discuss is about online
LESSON safety, security ethics, and etiquette. In the lesson, we
will be informed how to protect ourselves and our
information online from hackers and people with
malicious intentions such as identity thieves, and black
hat hackers. But before we go to the topic itself, let us
first find out how the early Filipino people secure their
important or precious belongings.
Show on the Screen:
“LAKASA”
Ask: Now its time for you to give your own example on
how your parents and grandparents secured their
precious belongings.
2. Yahoo
3. Microsoft
4. Facebook
5. Instagram
6. YouTube
7. Twitter
Performance task:
* Using a differentiated learning technique, let the
students apply what they have learned in making their
smartphone secure by replacing the default
configuration.
Let them also work on the configuration of a wireless wi-
fi router by hiding the SSID or the name of the wi-fi
signal.
H. ADDITIONAL
ACTIVITIES FOR
APPLICATION OR
REMEDIATION
Prepared by:
Norwin C. Adriatico
Teacher I
General Artemio Ricarte Senior High School
Score
Category
10 7 4 1
Turning off the Turned off the Turned off the Turned off the Was not able to
Smartphone automatic wi-fi automatic wi-fi automatic wi-fi perform all the
Configuration connection, able connection, able connection, was tasks.
default on hide the SSID of hide the SSID of not able hide the
automatic wi-fi the Hotspot wi-fi, the Hotspot wi-fi, SSID of the
connection and saved the and but did not Hotspot wi-fi,
configuration save the and did not save
configuration the configuration
Making the wi-fi Hid the SSID, Hid the SSID, Hid the SSID, Was not able to
router secure by created a strong created a strong did not create a perform all the
changing the password, and password, but strong tasks.
default saved the did not save the password, and
configuration configuration configuration did not save the
configuration