Adriatico, Norwin-Lesson-Exemplar-E-Tech (Cultural Mapping Output)

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Republic of the Philippines

Department of Education
REGION I
SCHOOLS DIVISION OF THE CITY OF BATAC

<TOPIC>
(LESSON EXEMPLAR INTEGRATING CULTURAL HERITAGE)

SUBJECT : Empowerment Technology


GRADE LEVEL : Grade 11

PARTS DESCRIPTION
I. OBJECTIVES
A. CONTENT STANDARDS The learners demonstrate an understanding of: ICT in
the context of global communication for specific
professional track.
B. PERFORMANCE The learners shall be able to: at the end of the 2-week
STANDARDS period independently compose an insightful reflection
paper on the nature of ICT in the context of their lives,
society, and professional tracks (Arts, Tech Voc, Sports,
Academic)
C. MELCS (WITH CODE, if
any) CS_ICT11/12-ICTPT-Ia-b2
II. TOPIC Online Safety, Security Ethics, and Etiquette
III. CULTURAL ICON “Lakasa”
INTEGRATED
IV. LEARNING RESOURCES
A. REFERENCE
1. TEACHER’S GUIDE Empowerment Technologies, Alternative Delivery Mode,
PAGES Quarter 1 – Module 2: Online Safety, Security Ethics, and
Etiquette, First Edition 2020.
2. LEARNER’S 1. Teach Students about Internet Safety and Privacy
MATERIALS PAGES https://www.youtube.com/watch?v=25G4tLVH1JE
2. EDU in 90: Privacy and Security, Google for
Education.
https://www.youtube.com/watch?v=1HOjYCC4O1s
3. ADDITIONAL None found.
MATERIALS FROM
LR PORTAL
B. OTHER LEARNING
RESOURCES
1. BOOKS, INTERNET Online Safety: Scams, SPAM, Viruses and Clouds, A.M.
SOURCES, ETC. Perry.
2. LEARNING TOOLS Google Chrome Browser, Android smart phone,
OR Wireless Modem-Router, and PowerPoint Presentation.
MANIPULATIVES
V. PROCEDURES
A. REVIEW LESSON Say: During our previous lessons we discussed about
how to effectively use the searching techniques in the
web browser with the existing web browser applications
used in researching on the internet. We’ve learned how
to search for a specific word as well as the relevant
information. In the next lesson, we will talk about how
we can protect ourselves and our information we are
searching information online.

b Agtayaktak Batac: Nasantak, Naragsak! Ag\tayak\tak\ bataC\: nasan\tak\, narag\sak\!


Republic of the Philippines
Department of Education
REGION I
SCHOOLS DIVISION OF THE CITY OF BATAC

B. PRESENTING A NEW Say: The next topic that we will discuss is about online
LESSON safety, security ethics, and etiquette. In the lesson, we
will be informed how to protect ourselves and our
information online from hackers and people with
malicious intentions such as identity thieves, and black
hat hackers. But before we go to the topic itself, let us
first find out how the early Filipino people secure their
important or precious belongings.
Show on the Screen:

“LAKASA”

Say: The “Lakasa” is one of the vintage furniture of the


Guillermo Family at Sitio Dungtal, Barangay 23, Laoag
City, Ilocos Norte. A rectangular shape box that is made
up of solid “Narra” wood with two steel handles on both
short sides. It has no compartment or divisions inside
and it has a metal lock and key fitting. It is being used to
store important documents, jewelries, memorabilia, and
old pictures. From the look of the “Lakasa”, it is clear
that it was made by a carpenter with excellent
craftmanship skill using traditional carpentry tools. The
length is 39.4 inches, the height is 15 inches, and the
width is 15 inches.

Ask: Now its time for you to give your own example on
how your parents and grandparents secured their
precious belongings.

* Ask for at least three examples then, move on to the


new topic.
C. PRESENTING Say: Class, I’m going to display words on the screen
EXAMPLES/ and I will call students in random to say what they know
INSTANCES OF NEW about a certain issue / threat.
LESSON
Display on the screen one after another:
1. Identity theft
2. Hacked Facebook account
3. Erroneous credit card purchases
4. Inaccessible e-mail address
5. Libelous pronouncements
6. Indecent social media posts
7. Social media wars
D. DISCUSSING NEW Say: Let us fist know what are the websites on the web
CONCEPTS AND that are secured by accessing these websites one by
PRACTICING NEW one.
SKILLS 1. Google

b Agtayaktak Batac: Nasantak, Naragsak! Ag\tayak\tak\ bataC\: nasan\tak\, narag\sak\!


Republic of the Philippines
Department of Education
REGION I
SCHOOLS DIVISION OF THE CITY OF BATAC

2. Yahoo
3. Microsoft
4. Facebook
5. Instagram
6. YouTube
7. Twitter

* Demonstrate to the students how to know if the


website is secured enough to give your personal
information by registering an account.

* Demonstrate how to protect our smartphones from


hackers by turning off the option “Connect to any open
wi-fi” in the configuration.

* Demonstrate how to protect our wi-fi / modem from


other people especially from hackers.
E. DEVELOPING Discuss: The best practices on how we can protect
MASTERY (LEADS TO ourselves and our data from malicious entities.
FORMATIVE 1. Check the website if it is secure enough to let
ASSESSMENT) yourself enter your personal information.
2. Always read the terms and conditions of the
website on how they will be handling your
information.
3. When creating an account online, always
compose your password with combinations of
small and capital letters as well as numbers and
symbols. Be sure to secure your password and
don’t tell anyone about it.
4. If you’re going to open your emails and other
important accounts in internet cafés and internet
shops, always make sure that you logged them
out before you leave so no one will be able to
access them even if they look at the browsing
history. As much as possible avoid opening
sensitive information when you go to net cafes
and shops.
5. Make it a point to change your passwords every
three months or as frequent as necessary.
6. Always turn off the “Connect automatically to any
open wi-fi” in your smartphone settings.
7. Always hide the SSD (Service Set Identifier) or
the name of our wi-fi signal to prevent hackers
from accessing your internet connection.
F. MAKING Say: As technology innovations made our lives easier
GENERALIZATIONS and convenient, there will still be those people who
AND ABSTRACTIONS would want to return to the basest of ways and make our
ABOUT THE LESSON lives difficult by stealing our information and taking
advantage of our hard-earned money as well as
destroying our reputation. That is why we need to equip
ourselves with the knowledge on how to protect our
accounts and properties.

b Agtayaktak Batac: Nasantak, Naragsak! Ag\tayak\tak\ bataC\: nasan\tak\, narag\sak\!


Republic of the Philippines
Department of Education
REGION I
SCHOOLS DIVISION OF THE CITY OF BATAC

G. EVALUATING * Let the students access a website of their choice and


LEARNING with the knowledge that they have learned, let them rate
the website from 1-10 in terms of security. Make them
create a presentation of their website evaluation on the
next class schedule.

Performance task:
* Using a differentiated learning technique, let the
students apply what they have learned in making their
smartphone secure by replacing the default
configuration.
Let them also work on the configuration of a wireless wi-
fi router by hiding the SSID or the name of the wi-fi
signal.

* Use this Rubric in evaluating their performance task.


Rubric for hands-on task.

H. ADDITIONAL
ACTIVITIES FOR
APPLICATION OR
REMEDIATION

Prepared by:

Norwin C. Adriatico
Teacher I
General Artemio Ricarte Senior High School

b Agtayaktak Batac: Nasantak, Naragsak! Ag\tayak\tak\ bataC\: nasan\tak\, narag\sak\!


Republic of the Philippines
Department of Education
REGION I
SCHOOLS DIVISION OF THE CITY OF BATAC

Rubric for the Performance Task

Score
Category
10 7 4 1
Turning off the Turned off the Turned off the Turned off the Was not able to
Smartphone automatic wi-fi automatic wi-fi automatic wi-fi perform all the
Configuration connection, able connection, able connection, was tasks.
default on hide the SSID of hide the SSID of not able hide the
automatic wi-fi the Hotspot wi-fi, the Hotspot wi-fi, SSID of the
connection and saved the and but did not Hotspot wi-fi,
configuration save the and did not save
configuration the configuration
Making the wi-fi Hid the SSID, Hid the SSID, Hid the SSID, Was not able to
router secure by created a strong created a strong did not create a perform all the
changing the password, and password, but strong tasks.
default saved the did not save the password, and
configuration configuration configuration did not save the
configuration

b Agtayaktak Batac: Nasantak, Naragsak! Ag\tayak\tak\ bataC\: nasan\tak\, narag\sak\!

You might also like