Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

MAIN CAMPUS

San Roque, Sogod, Southern Leyte


Contact No.: 0998-868-5334
Email: president@southernleytestateu.edu.ph
Website: www.southernleytestateu.edu.ph

Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality

OUTCOME BASED EDUCATION

Institutional Program(ILO) Course (ILO)


ILO (PILO)
(CILO)
IILO Teacher Education
Teacher Education
NCBTS Curriculum
Course

Outcome Based
Learning Task

Engage ASSESSMENT
SECTION ILO
Explore
Apply

This theoretical framework served as a foundation for developing the OBE. Therefore, it was
initially developed in the Institutional ILO from NCBTS, and from this, the Program ILO,
which is the Teacher Education course, was constructed. The curriculum for this course, for
instance, includes BTLED, BSED, and BEED. Therefore, apply or engage in any kind of
activities or assessments when it says outcome-based education, and examine the
information and skills we learn following the intended learning outcomes. Through this,
children will be able to learn things that are different from what they would study in an
ordinary educational setting, where they would be dependent learners who couldn't explore
or find things for themselves.
MAIN CAMPUS
San Roque, Sogod, Southern Leyte
Contact No.: 0998-868-5334
Email: president@southernleytestateu.edu.ph
Website: www.southernleytestateu.edu.ph

Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality

Outcome-based education (OBE) is a student-centered approach to education that


focuses on defining and measuring the learning outcomes that students should be able to
demonstrate upon completion of a course or program of study. Instead of emphasizing the
delivery of content or the amount of time spent in the classroom, OBE prioritizes the desired
results of learning. This means that educational goals and objectives are clearly defined and
aligned with real-world expectations and the needs of learners. In an OBE system, learning
outcomes are established in advance, and teaching and learning activities are designed to
support the attainment of these outcomes. Assessment is a key component of OBE, and various
forms of assessment are used to evaluate the extent to which students have achieved the
intended outcomes. By focusing on outcomes, OBE seeks to ensure that students are not just
memorizing information, but are developing skills, competencies, and attributes that will enable
them to succeed in their future careers and in life. OBE is used in various educational settings,
including primary and secondary schools, higher education institutions, and vocational and
technical education programs.

Institutional ILO
 Institutional Intended Learning Outcomes (ILOs) refer to the specific skills, knowledge, and
competencies that an educational institution aims to impart to its students. These outcomes
are typically established by the institution's faculty or academic leadership and are
designed to guide curriculum development, assessment, and program evaluation
PROGRAM ILO
 A Program Intended Learning Outcome (PILO) refers to the overarching educational goals
or outcomes that a particular academic program aims to achieve for its students. It specifies
the knowledge, skills, abilities, and attitudes that students are expected to possess upon
completion of the program. PILOs are typically developed by academic departments or
institutions in consultation with relevant stakeholders, such as faculty members, students,
employers, and professional organizations. PILOs may be further broken down into specific
learning outcomes for each course or module within the program, and used to guide
curriculum design, instruction, and assessment.

Course ILO
 Course Intended Learning Outcomes (CILOs) are statements that describe what students
are expected to know, understand, or be able to do upon completion of a course. CILOs
provide a clear and measurable description of the expected learning outcomes of a course
and serve as a guide for course development, assessment, and evaluation. CILOs typically
include a brief description of the knowledge, skills, and attitudes that students should
acquire as a result of completing the course. They are often broken down into specific
learning objectives that can be assessed through assignments, exams, or other types of
assessments.
MAIN CAMPUS
San Roque, Sogod, Southern Leyte
Contact No.: 0998-868-5334
Email: president@southernleytestateu.edu.ph
Website: www.southernleytestateu.edu.ph

Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality

Principles of OBE
There are different definitions for outcome-based education. The most widely used one is the
four principles suggested by Spady (1994).

An OBE curriculum means starting with a clear picture of what is important for students to be
able to do, then organizing the curriculum, instruction and assessment to make sure this
learning ultimately happens. The four basic principles are (Spady, 1994):

 Clarity of Focus
This means
students to know understand and able to do. In other words, teachers should
focus on helping students to develop the knowledge, skills and personalities
that will enable them to achieve the intended outcomes that have been clearly
articulated.
 Designing Backward
It means that
outcomes that students are to achieve by the end of the program. Once this
has been done, all instructional decisions are then made to ensure achieve
this desired end result.

 High Expectation
It means
order to encourage students to engage deeply in what they are learning.
Helping students to achieve high standards is linked very closely with the
idea that successful learning promotes more successful learning.

 Expanded Opportunities
Teachers must
is based on the idea that not all learners can learn the same thing in the
same way and in the same time. However, most students can achieve high
standards if they are given appropriate opportunities.
MAIN CAMPUS
San Roque, Sogod, Southern Leyte
Contact No.: 0998-868-5334
Email: president@southernleytestateu.edu.ph
Website: www.southernleytestateu.edu.ph

Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality

ILO TOPIC ACTIVITIES REFERENCE ASSESSME PERFORMANCE


NT
STANDARD

Clarity of Clarity Of Expanded High Performance


focus Focus Opportunities Expectation standards in the
context of a learning
program refer to the
criteria that define
what level of
performance is
considered acceptable
or proficient in a
particular skill or
subject. These
standards are often
used to assess and
measure the
effectiveness of
educational programs
and to determine
whether students are
meeting expected
learning outcomes.
MAIN CAMPUS
San Roque, Sogod, Southern Leyte
Contact No.: 0998-868-5334
Email: president@southernleytestateu.edu.ph
Website: www.southernleytestateu.edu.ph

Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality

2E-2A Model Of Instruction

 Engage: Input Phase


Presentation of
functional knowledge (facts,concepts,theories,principles,methods and
procedures)

 Explore: Processing of input through interactive activities that will draw students to:
 Provide explanation and feedback
 Analyze and critique input knowledge
 Add new information

 Apply: Application Task


Activities/questions/situations
input.

 Assess: Conducting Assessment


Varied forms of assessment methods and styles that are aligned to the ILO.
MAIN CAMPUS
San Roque, Sogod, Southern Leyte
Contact No.: 0998-868-5334
Email: president@southernleytestateu.edu.ph
Website: www.southernleytestateu.edu.ph

Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality

Educational Technology

Association of Educational Communications and Technology (AECT), 1997

The study and ethical practice of facilitating learning and improving performance by
creating, using and managing appropriate technological processes and resources.

 By utilizing technology in the process of learning


Instructional Technology

 Refers to the ways,procedures,approaches on how to utilize the Educational Technology.


 It involves the use of various technological resources such as computers, software,
multimedia tools, and other digital technologies to create, manage, and deliver instructional
materials and resources. Instructional technology focuses on enhancing the teaching and
learning process by incorporating technology into education. This can include the
development and use of e-learning platforms, multimedia resources, interactive
simulations, and educational games, among others. Instructional technology also involves
the analysis of the effectiveness of these tools and the assessment of student learning
outcomes

Technology in Education

 The application of technology into different process that involves in the operation in
teaching and learning processes.Bring technology to perform a certain function.
 It involves the use of computers, software, mobile devices, multimedia resources, and
internet-based applications to facilitate the acquisition and dissemination of knowledge.
 The goal of technology in education is to enhance and improve the quality of teaching and
learning experiences. It offers a range of benefits such as increased access to information,
MAIN CAMPUS
San Roque, Sogod, Southern Leyte
Contact No.: 0998-868-5334
Email: president@southernleytestateu.edu.ph
Website: www.southernleytestateu.edu.ph

Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality

improved collaboration and communication, personalized learning, and greater


engagement.
MAIN CAMPUS
San Roque, Sogod, Southern Leyte
Contact No.: 0998-868-5334
Email: president@southernleytestateu.edu.ph
Website: www.southernleytestateu.edu.ph

Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality

Legal and Ethical Use of Technology

Unauthorized Access of Information

 Unauthorized access of information refers to the act of gaining access to a computer system,
network, or data without the owner's permission or legal authorization. This could be
accomplished through various means, including hacking, exploiting software
vulnerabilities, stealing or guessing passwords, or social engineering techniques. Once an
unauthorized person gains access to information, they can view, modify, delete or copy it
without the owner's knowledge or consent. This could result in a wide range of
consequences, including the theft of sensitive personal or financial data, the loss of
intellectual property, the disruption of critical systems, or even the spread of malware.
 Installing a firewall is one way to prevent unauthorized access to information, but it is
important to keep in mind that a firewall is only one part of a comprehensive security plan.
Use strong passwords. Limit access to information: Restrict access to sensitive information
to only those employees who need it. This can be done by using permissions and access
controls to limit who can view or modify specific files and folders.

Hardware Theft and Vandalism

 Hardware theft refers to the act of stealing physical computer equipment such as laptops,
servers, desktops, or mobile devices. This type of theft can occur in a variety of settings
such as offices, public spaces, homes, and vehicles. Vandalism, on the other hand, refers to
the intentional destruction or damage of hardware. This can be done in various ways such
as physically damaging the hardware by smashing or breaking it, or through malicious
software that is designed to harm or destroy the device.
 Ensure that all hardware equipment is physically secured and locked away in a secure
location when not in use.Implement a monitoring system, such as security cameras or
alarms, to deter and detect any attempted theft or vandalism. Educate employees and
visitors about the importance of maintaining a secure work environment and the
consequences of theft or vandalism.
MAIN CAMPUS
San Roque, Sogod, Southern Leyte
Contact No.: 0998-868-5334
Email: president@southernleytestateu.edu.ph
Website: www.southernleytestateu.edu.ph

Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality

Software Theft

 Software theft, also known as software piracy, refers to the unauthorized use, copying,
distribution, or sale of computer software, which is protected by intellectual property laws
such as copyright, trademarks, and patents. It is a form of copyright infringement, and it is
illegal.
 To prevent software theft, it is important to implement a combination of security measures,
such as secure storage and distribution of software, access controls and permissions,
regular software updates, and monitoring for suspicious activity. Additionally, legal
measures such as licensing agreements and copyright laws can also play a role in
preventing software theft.

Information Theft

 Information theft, also known as identity theft or data theft, refers to the unauthorized
access or use of someone else's personal or confidential information for financial gain or
other malicious purposes. This can include stealing personal information such as social
security numbers, credit card numbers, passwords, and other sensitive data, which can be
used to commit fraud, impersonate the victim, or gain access to their financial accounts.
 Encryption is a process of converting plaintext (i.e., readable data) into ciphertext (i.e.,
unreadable data) using a cryptographic algorithm and a key. The purpose of encryption is
to protect the confidentiality and integrity of data by making it unreadable to unauthorized
parties.

Malicious acts in Software

 Malicious acts in software refer to any intentional and harmful action taken by a person or
program that compromises the security or functionality of a computer system or network.
Malicious software or malware can be introduced through various means, such as infected
emails, websites, or downloaded files. Malicious acts in software can take various forms,
including viruses, worms, Trojans, ransomware, spyware, adware, and phishing attacks.
These can cause a wide range of damage, including data theft, system hijacking, and
destruction of critical files.
 Ensure that software is developed using secure coding practices and regularly updated with
the latest security patches. Implement strong access controls and authentication
mechanisms to prevent unauthorized access to sensitive data and functionality. Conduct
regular security audits and penetration testing to identify and address potential
vulnerabilities before they can be exploited.
MAIN CAMPUS
San Roque, Sogod, Southern Leyte
Contact No.: 0998-868-5334
Email: president@southernleytestateu.edu.ph
Website: www.southernleytestateu.edu.ph

Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality

Lesson 6

Understanding Media

Media
Plural form of medium

Multimedia
Combination of two or more media

Digital Media
Enable users to make new forms of interaction using media and technology

Digital Media Software


Software that uses multimedia elements

Interactive Digital Media


Interact with the program by means of input coming from the user

You might also like