Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

LEARNING CONTENT:

I. OBJECTIVES: At the end of the performance, the learners will be able to;

A. Determine and avoid the dangers of the internet.


B. Consider one’s and other’s safety when sharing information using the Internet.
C. Browser the Internet efficiently and properly through proper referencing.
II. SUBJECT MATTER

A. TOPIC: Online Safety. Security, Ethics and Etiquette

B. MATERIALS: Laptop,Powerpoint, Internet Connection,

C. REFERENCE: Empowerment Technologies, Innovative Training Works, Inc. Page


21-25

III. PROCEDURES:

A. PRAYER
B. GREETING
C. CHECKING OF ATTENDANCE
- The teacher will ask the classroom secretary about the attendance
D. Classroom management/ Rules and Netiquette
-CODE OF ETHICS-Educators must demonstrate impartiality, integrity, and ethical
behavior in the classroom, whether virtual or in-person
-Article 6 section 2: a teacher shall place premium upon self-respect and self
discipline as the principle’s behavior in all relationship with others and in all
situations.

E. REVIEW OF PREVIOUS LESSON


- The teacher will ask the students about the previous topic,”The Current State
of ICT Technologies”

F. LESSON PROPER

1. MOTIVATION

● Series of pictures will be shown to the Learners about Internet trolls,


baiters, posers, stalkers, etc.
● The students will be group into two (2).
● Each group will be given 2 minutes to write their observation on each
picture
● After the activity, the students will share their observation to the class.

2. DISCUSSION OF THE LESSON

A. ANALYSIS
● Are you opening email attachments like e-cards and video files coming
from an unknown source?
● How often do you check your Privacy and Online Settings in Faceboook?
● Do you share your personal information in Social Media? (Full Name, Age,
Birthday, Contact Number,etc)
● Are you posting, commenting or sharing mean things online?
● Do your family and friends know your social media passwords?
B. ABSTRACTION

Internet Safety
- it refers to the online security or safety of people and their information when using
internet
Netiquette
- is network etiquette, the do’s and don'ts of online communication
Tips on how to be safe online
● Do not share your password with anyone.
● Add friends you know in real life.
● Do not visit untrusted websites.
● Add password to your WIFI at home to make it private.
● Install and update antivirus in your computer.
● Do not give your personal information to anyone
● Think before you click.
● Never post about your future vacation.

Internet Risks
1. Cyberbullying
2. Identity Theft 4. Sexting
3. Cyber Stalking
Internet Threats
Malware – also known as Malicious Software.
Types of Malware

1. Virus
2. Trojan Horse
3. Worm
4. Spyware
5. Adware
6. Keylogger
7. Botnet
8. Rootkit
9. Ransomware

Spam
- Also known as junk email or unwanted email sent by advertiser or bot. It can
be used to send malware.
Phishing
- A cyberattack method using deceptive emails and websites to acquiring
sensitive personal information.
Cybercrime
- A crime in which computer is used as object and tool in committing a crime such
hacking, phishing, spamming, child pornography, libel, hate crimes, identity thief and
others.
Cybercrime Law
- A law that deals with all forms of cybercrime.

The Core Rules of Netiquette by Seth T. Ross


1. Remember the human.
2. Adhere to the same standards of behavior online that you follow in real life.
3. Know where you are in cyberspace.
4. Respect other people's time and bandwidth.
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
9. Don't abuse your power.
10. Be forgiving of other people's mistakes

C.APPLICATION:

Activity 1: #Wall

Suppose you have read a post like this “Strong men don’t cry” in social media. How
would you react? Post your reaction in comment section on our #Wall.

#Wall
Comment:
___________________________________________________________________
___________________________________________________________________
__________________________________________________________________

Philosophy of teaching: Constructivism is based on the idea that people actively construct or make
their own knowledge, and that reality is determined by your experiences as a learner.

The activity above shows how we react on a post by expressing our opinions and feelings through
comments, likes, and emoticons. There are times that netizens will give compliments and positive
reactions on your post but there are also times that netizens will criticize or give negative reactions on
your post. Conflicts and misunderstanding occur in social media because netizens are not behaving well.
Ethics and etiquette should be practiced by people whenever they are in social media.

Activity 2: Shout Your Mind


Directions: Make a poster with a theme “think before you click”. Use a ½ illustration board
or cartolina

Rubrics:

IV. GENERALIZATION:
The importance of the internet plays a crucial part in human development. Life
becomes easy and comfortable because of this technology. Most of us are connected to the
internet via laptop, mobile phone, tablet, personal computer and other electronic gadgets.
Behind this technology there is a risk that everyone should be aware of. You could be at risk
of scam, bullying, and illegal activities if you will not take precautions in using the internet.
We need to keep ourselves safe and secure whenever we use the internet. That is why it is
very important to know and learn the ways on how to be safe and secure online.

V. VALUING: THE LEARNERS SHOULD BE ABLE TO ANSWER THE FOLLOWING


QUESTIONS:
1. As a student, what made the activities helpful to you?
2. Which part of activities would challenge you most? How did you overcome it?
3. How do you keep yourself safe and secure online?
4. Why is it important to observe netiquette online?

VI. ASSESSMENT:

Directions: Choose the letter of the correct answer. Write your answer on the spaces given.

1. It refers to the online security or safety of people and their information when using the
internet.
A. Internet Safety B. Netiquette C. Ethics D. Etiquette
2. It aims to address legal issues concerning online interactions and the Internet in the
Philippines.
A. Republic Act no. 10175 B. Republic Act no. 10168
C. Republic Act no. 10165 D. Republic Act no. 10101
3. All of the following are common features of Phishing Email except for
A. Trusted Website B. Hyperlinks C. Attachments D. Sense of urgency
4. It is a more complicated way of phishing where it exploits the DNS System.
A. Phishing B. Pharming C. Malware D. Adware
5. It is a part of law, wherein you have the rights to work, anyone who uses it without your
consent is punishable by law.
A. Fair Use B. Keyloggers C. Copyright D. Boolean
Answer Key:

1. A
2. A
3. A
4. B
5. C
VII. ASSIGNMENT:

A. Follow Up Assignment:
Answer Activity 3 in Etech Module.

B. Advance Assignment

1. What is Internet Research?


2. What are the tips for effective Internet Research according to George Mathews?
3. Enumerate five (5) examples of Search Engine

Prepared By:

Mrs.Ivy B. Padua
SHS- Teacher III

You might also like