Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

BACLAYON NATIONAL HIGH SCHOOL

Landican, Baclayon, Bohol

DETAILED DAILY LESSON PLAN

Teacher: Subject: Quarter:


VENUS L. NAMOC EMPOWERMENT TECHNOLOGIES 2
Date: Section : 11-HUMMS, Section-Integrity
January 19, 2023 Time : 1:00-2:00 PM
Learning Competency Create a reflective piece or output using an ICT tool, platform, Code:
or application of choice on the learning experience undergone CS_ICT11/12-
during the semester ICTPT-IIt-23
Performance Standards Independently reflect on the ICT learning process and how his/her world view has
evolved over the past semester
Content Standards How to reflect on the nature of ICT and the manner by which the learning process has
changed his/her world view.
1. Objectives
Knowledge Identify the several problems ICT has created and the ways in combatting
cybercrimes;
Skills Develop an output using any ICT tools, platform or application of choice on how ICT
can change the world for better or for worse;
Attitudes Display critical thinking on the formulation of ideas for the expected output.
Values Display with utmost concern on social responsibility in using media.
2. Content/Topic The Disadvantages of ICT
3. Learning Resources/ Curriculum Guide: page 9-10 of 12
Materials/ Equipment Learning Materials: Empowerment Technologies by IT Works Inc., pp 239-241; ABS-CBN
News (2017, March 5). Failon Ngayon - Cybercrime cases in the Philippines [Video File].
Retrieved from https://www.youtube.com/watch?v=tKOeloKle8Y; Department of Education
(2015). Ekonomiks, Araling panlipunan – Modyul para sa Mag-aaral. First Edition.
Philippines:Vibal Group, Inc.; The LAWPHIL Project (March 1, 2019). Cybercrime
Prevention Act of 2012. Retrieved from
https://www.lawphil.net/statutes/repacts/ra2012/ra_10175_2012.html.
Laptop, PowerPoint Presentation, T.V., iOS or Android phones with mobile data
4. Procedures (Parts under procedure may vary and is modifiable.)
Teacher’s Activity Students’ Activity
4.1 Introductory Activity Routinary Activities
 Prayer and Greetings
 Checking of attendance

Ok class, what was our lesson yesterday? (Some students raise their hand)
Review of Previous Pia: It was all about the Impact
Yes Pia!
Lesson of ICT, the Self, and Society, we
(Indicator 5 is employed.) focused first on the Advantages
of ICT.
Ok, very good! Let us give her one clap please
Students will clap their hands
4.2 Activity (Indicators 1, 2, 3, 4, 5, 6, & 8 are employed.)
Ok let’s have an activity. This is called
Knowledge Base Corners:
1. There are four large strips of paper I will post in each Students will listen to the
corner of the room and each one has a label with phrases: instructions
“I don’t know”, “I know a little bit”, “I know a lot”, and “I
am expert of it”.
2. Whenever I read texts/terms related to the lesson, you

1
BACLAYON NATIONAL HIGH SCHOOL
Landican, Baclayon, Bohol

move around to each corner of the room that matches your


knowledge level for the topic.
(Terms: Cybercrime, Spam, Blackmail, Identity
Theft, Encryption, Republic Act No. 10175, and
Cybercrime Prevention Act)
3. And please be cautious in moving around to avoid
accident. Yes, we are ready ma’am!
So, are you ready class?
4.3 Analysis (Indicators 1, 2, 3, 5, & 8 are employed.)
Analyze the activity using the following questions:
1. What did you learn from our activity? I will call (Some students are raising their
a name… Ok Julian? hands)
Julian: I learned that I have only
few knowledge about the terms
you mentioned ma’am especially
the Republic Act No. 10175 and
Cybercrime Prevention Act.

Ok Julian, thank you for your honest answer! Let’s give (Students will clap their hands)
him two claps please
2. What can you describe about the terms being
mentioned? Diane? Diane: I think it were all about
the illegal acts done through the
use of the internet and the law
enacted to prevent those internet
crimes.
Wow, that was an amazing answer Diane, let’s give her
around of a plause please…
3. So, what do you think is our lesson for today?
Bea: I think our lesson for today
Bea?
is all about Cybercrimes and
Ways to Combat or Prevent
Wow, terrific! Yes, exactly! That will be our lesson for Cybercrimes.
today. Another around of applause for Bea please…

And now, kindly watch the 4-minutes and 51-seconds


video entitled, “Failon Ngayon - Cybercrime cases in the
Philippines”. (Students will watch the video
Be prepared to answer these questions: and listen attentively)
 What are the internet cybercrimes being tackled
and showed in the video?
(ANSWER: Identity theft and Cyberbullying,
using trolls or fake account to bully you and say
something bad about you)
 What is the law that was being created and
implemented to help solve and prevent
cybercrimes in our country? Who is the author of
the said House Bill? And why is it important that
we should know about this law? (A student will give his/her
(ANSWER: House Bill No. 5021 or SOCIAL answer in each question…)
MEDIA REGULATION ACT OF 2017 author by
House Representative Pantaleon Alvarez)
(I will ask the questions after watching the video)
Say: According to Feliciano R. Fajardo (1994.), the country’s
growth is a progressive process in improving the human

2
BACLAYON NATIONAL HIGH SCHOOL
Landican, Baclayon, Bohol

condition, such as reducing poverty, unemployment, ignorance,


inequality, and exploitation. (Araling Panlipunan 10 – Konsepto
ng Pag-unlad).

In various aspects, ICT and technology as a whole brought


us comfort and convenience in life. We, as Filipinos, have
been known to be avid users of technology. Some even
have made a name as an internet sensation. However, aside
from those successes are the downfalls of users.
And here is what we called CYBERCRIMES
4.4 Abstraction (Indicators 3, 5, 7, & 8 are employed.)
(Using PowerPoint Presentation projected to the T.V.
screen, introduce the lesson for today and show to the
students the objectives of the lesson)
Ok, what is Cybercrime? (Students are raising their hands)
What do you understand about it? Ok, Antonnette? Antonnette: Cybercrime is an
Illegal Act done through the use
of the internet.
Wow,..Very good! Give her three claps please…
In your own opinion what are the most or give me top 10
most common internet cybercrimes happening in our
society, or in the world, or in our country? And as what I
have observed, this cybercrime cases are always part of the
news and rampant. Ok, you name one, Reniel? Reniel: Identity Theft
Yes, very good!
Another one, Aiza? Aiza: Fraud
Very good!
Ashley? Ashley: Hacking
Yes, very good!
Erik? Erik: Fake News
Yes, that’s right! Any other answer?
Introduce the top 10 most common Internet Cybercrimes
posted by Stephen Nale in 2012. Discuss also The Ways
the Authorities can help Solve or Prevent Cybercrimes.
 Network Security
 Investigation
 Penalties
It is important to have knowledge about this law:
Republic Act No. 10175 :
“Cybercrime Prevention Act of 2012”

Okay, so do you still have questions regarding our No more students raising their
lessons? hands.
Very good class! You’ve learned a lot in this lesson.
4.5 Application (Indicators 1, 3, 4, 5, 6, & 8 are employed.)
Okay so this time, we will do a Role Playing called “What
Will You Do Challenge”. They will form a group of two
and act to this challenge. So here is the situation:
 If your friend happened to do such cybercriminal
activities specifically identity theft and
prostitution, what will you do?
 They will share/show their ways on how they are
going to help their friend to stop his/her wrong Each group will act on what will
doings
they do in the given situation.

3
BACLAYON NATIONAL HIGH SCHOOL
Landican, Baclayon, Bohol

 Present the Role Playing within 5 mins


ROLE PLAY RUBRIC:
CRITERIA LEVEL 4 LEVEL 3 LEVEL 2 LEVEL 1
Works Always Usually Sometimes Rarely willing
Cooperatively willing and willing and willing and and focused
with group focused during focused during focused during during
assigned task assigned task assigned task assigned task
and and and and
presentation presentation presentation presentation
Presentation of Convincing Competent Adequate Limited
Perspective communicatio communicatio communicatio communicatio
n of n of n of n of
character’s character’s character’s character’s
role, feelings, role, feelings, role, feelings, role, feelings,
and motives and motives and motives and motives
Use of Non- An impressive Good variety An acceptable Limited
verbal Cues variety of non- (1 or more) of variety of non- variety of non-
(voice, verbal cues non-verbal verbal cues verbal cues
gestures, eye were used in cues were used were used in were used in
contact) an exemplary in an an adequate an developing
way competent way way way

5. Assessment (Indicators 7, 8, & 9 are employed.)


True or False: Write T if the statement is correct,
otherwise, replace the underlined word/s to make the ANSWERS:
statement correct.
1. Phishing is the act of sending multiple emails to 1. T
multiple users in hopes of having a number of 2. Accessing Stored
them clicking on the links or malwares attached Communications
to the email. 3. T
2. Spoofing is the act of obtaining unauthorized 4. ThePirateBay
access to data from a computer network.
5. T
3. Extortion is the act of using the internet to
6. Merchandise
threaten or damage someone’s reputation to extort
7. T
money or anything else of value.
4. In late 2014, LimeWire was raided for the 8. T
second time due to years of pirating movies, 9. Sports Betting
music, games, books, and other software. 10. T
5. Electronic harassment is also referred to as
cyberbullying.
6. Non-delivery of service is the act of devising a
scheme wherein a culprit posts an item or service
for sale over the internet, and once the
transactions have been done, does not give the
item or service.
7. Encryption is the process of converting raw data
to code.
8. In piracy, trackers are used to identify IP
addresses currently sharing a pirated file.
9. Wager gambling is the act of betting on any
sports event over the internet.
10. Most email services today have spam or bulk
folder that automatically puts these suspicious
emails to that folder.

6. Assignment (Indicators 1, 3, 6, & 8 are employed.)


Develop an output using any ICT tools, platform or application of choice (e.g., video blog,
presentation or image gallery, website, illustrated document, podcast or webcast) about
everything you have learned about ICT and its possible impact to our society. Talk about its
positive and negative impacts and the youth’s role in helping promote its responsible use.
Interview your classmates and other school personnel.

4
BACLAYON NATIONAL HIGH SCHOOL
Landican, Baclayon, Bohol

Prepared by: Checked by:

VENUS L. NAMOC PAUL ROSELITO M. NUERA


T-II/Subject Teacher Principal

You might also like