Professional Documents
Culture Documents
MT Handouts
MT Handouts
Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality
Outcome Based
Learning Task
Engage ASSESSMENT
SECTION ILO
Explore
Apply
This theoretical framework served as a foundation for developing the OBE. Therefore, it was
initially developed in the Institutional ILO from NCBTS, and from this, the Program ILO,
which is the Teacher Education course, was constructed. The curriculum for this course, for
instance, includes BTLED, BSED, and BEED. Therefore, apply or engage in any kind of
activities or assessments when it says outcome-based education, and examine the
information and skills we learn following the intended learning outcomes. Through this,
children will be able to learn things that are different from what they would study in an
ordinary educational setting, where they would be dependent learners who couldn't explore
or find things for themselves.
MAIN CAMPUS
San Roque, Sogod, Southern Leyte
Contact No.: 0998-868-5334
Email: president@southernleytestateu.edu.ph
Website: www.southernleytestateu.edu.ph
Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality
Institutional ILO
Institutional Intended Learning Outcomes (ILOs) refer to the specific skills, knowledge, and
competencies that an educational institution aims to impart to its students. These outcomes
are typically established by the institution's faculty or academic leadership and are
designed to guide curriculum development, assessment, and program evaluation
PROGRAM ILO
A Program Intended Learning Outcome (PILO) refers to the overarching educational goals
or outcomes that a particular academic program aims to achieve for its students. It specifies
the knowledge, skills, abilities, and attitudes that students are expected to possess upon
completion of the program. PILOs are typically developed by academic departments or
institutions in consultation with relevant stakeholders, such as faculty members, students,
employers, and professional organizations. PILOs may be further broken down into specific
learning outcomes for each course or module within the program, and used to guide
curriculum design, instruction, and assessment.
Course ILO
Course Intended Learning Outcomes (CILOs) are statements that describe what students
are expected to know, understand, or be able to do upon completion of a course. CILOs
provide a clear and measurable description of the expected learning outcomes of a course
and serve as a guide for course development, assessment, and evaluation. CILOs typically
include a brief description of the knowledge, skills, and attitudes that students should
acquire as a result of completing the course. They are often broken down into specific
learning objectives that can be assessed through assignments, exams, or other types of
assessments.
MAIN CAMPUS
San Roque, Sogod, Southern Leyte
Contact No.: 0998-868-5334
Email: president@southernleytestateu.edu.ph
Website: www.southernleytestateu.edu.ph
Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality
Principles of OBE
There are different definitions for outcome-based education. The most widely used one is the
four principles suggested by Spady (1994).
An OBE curriculum means starting with a clear picture of what is important for students to be
able to do, then organizing the curriculum, instruction and assessment to make sure this
learning ultimately happens. The four basic principles are (Spady, 1994):
Clarity of Focus
This means
students to know understand and able to do. In other words, teachers should
focus on helping students to develop the knowledge, skills and personalities
that will enable them to achieve the intended outcomes that have been clearly
articulated.
Designing Backward
It means that
outcomes that students are to achieve by the end of the program. Once this
has been done, all instructional decisions are then made to ensure achieve
this desired end result.
High Expectation
It means
order to encourage students to engage deeply in what they are learning.
Helping students to achieve high standards is linked very closely with the
idea that successful learning promotes more successful learning.
Expanded Opportunities
Teachers must
is based on the idea that not all learners can learn the same thing in the
same way and in the same time. However, most students can achieve high
standards if they are given appropriate opportunities.
MAIN CAMPUS
San Roque, Sogod, Southern Leyte
Contact No.: 0998-868-5334
Email: president@southernleytestateu.edu.ph
Website: www.southernleytestateu.edu.ph
Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality
Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality
Explore: Processing of input through interactive activities that will draw students to:
Provide explanation and feedback
Analyze and critique input knowledge
Add new information
Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality
Educational Technology
The study and ethical practice of facilitating learning and improving performance by
creating, using and managing appropriate technological processes and resources.
Technology in Education
The application of technology into different process that involves in the operation in
teaching and learning processes.Bring technology to perform a certain function.
It involves the use of computers, software, mobile devices, multimedia resources, and
internet-based applications to facilitate the acquisition and dissemination of knowledge.
The goal of technology in education is to enhance and improve the quality of teaching and
learning experiences. It offers a range of benefits such as increased access to information,
MAIN CAMPUS
San Roque, Sogod, Southern Leyte
Contact No.: 0998-868-5334
Email: president@southernleytestateu.edu.ph
Website: www.southernleytestateu.edu.ph
Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality
Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality
Unauthorized access of information refers to the act of gaining access to a computer system,
network, or data without the owner's permission or legal authorization. This could be
accomplished through various means, including hacking, exploiting software
vulnerabilities, stealing or guessing passwords, or social engineering techniques. Once an
unauthorized person gains access to information, they can view, modify, delete or copy it
without the owner's knowledge or consent. This could result in a wide range of
consequences, including the theft of sensitive personal or financial data, the loss of
intellectual property, the disruption of critical systems, or even the spread of malware.
Installing a firewall is one way to prevent unauthorized access to information, but it is
important to keep in mind that a firewall is only one part of a comprehensive security plan.
Use strong passwords. Limit access to information: Restrict access to sensitive information
to only those employees who need it. This can be done by using permissions and access
controls to limit who can view or modify specific files and folders.
Hardware theft refers to the act of stealing physical computer equipment such as laptops,
servers, desktops, or mobile devices. This type of theft can occur in a variety of settings
such as offices, public spaces, homes, and vehicles. Vandalism, on the other hand, refers to
the intentional destruction or damage of hardware. This can be done in various ways such
as physically damaging the hardware by smashing or breaking it, or through malicious
software that is designed to harm or destroy the device.
Ensure that all hardware equipment is physically secured and locked away in a secure
location when not in use.Implement a monitoring system, such as security cameras or
alarms, to deter and detect any attempted theft or vandalism. Educate employees and
visitors about the importance of maintaining a secure work environment and the
consequences of theft or vandalism.
MAIN CAMPUS
San Roque, Sogod, Southern Leyte
Contact No.: 0998-868-5334
Email: president@southernleytestateu.edu.ph
Website: www.southernleytestateu.edu.ph
Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality
Software Theft
Software theft, also known as software piracy, refers to the unauthorized use, copying,
distribution, or sale of computer software, which is protected by intellectual property laws
such as copyright, trademarks, and patents. It is a form of copyright infringement, and it is
illegal.
To prevent software theft, it is important to implement a combination of security measures,
such as secure storage and distribution of software, access controls and permissions,
regular software updates, and monitoring for suspicious activity. Additionally, legal
measures such as licensing agreements and copyright laws can also play a role in
preventing software theft.
Information Theft
Information theft, also known as identity theft or data theft, refers to the unauthorized
access or use of someone else's personal or confidential information for financial gain or
other malicious purposes. This can include stealing personal information such as social
security numbers, credit card numbers, passwords, and other sensitive data, which can be
used to commit fraud, impersonate the victim, or gain access to their financial accounts.
Encryption is a process of converting plaintext (i.e., readable data) into ciphertext (i.e.,
unreadable data) using a cryptographic algorithm and a key. The purpose of encryption is
to protect the confidentiality and integrity of data by making it unreadable to unauthorized
parties.
Malicious acts in software refer to any intentional and harmful action taken by a person or
program that compromises the security or functionality of a computer system or network.
Malicious software or malware can be introduced through various means, such as infected
emails, websites, or downloaded files. Malicious acts in software can take various forms,
including viruses, worms, Trojans, ransomware, spyware, adware, and phishing attacks.
These can cause a wide range of damage, including data theft, system hijacking, and
destruction of critical files.
Ensure that software is developed using secure coding practices and regularly updated with
the latest security patches. Implement strong access controls and authentication
mechanisms to prevent unauthorized access to sensitive data and functionality. Conduct
regular security audits and penetration testing to identify and address potential
vulnerabilities before they can be exploited.
MAIN CAMPUS
San Roque, Sogod, Southern Leyte
Contact No.: 0998-868-5334
Email: president@southernleytestateu.edu.ph
Website: www.southernleytestateu.edu.ph
Excellence | Service | Leadership and Good Governance | Innovation | Social Responsibility | Integrity | Professionalism | Spirituality
Lesson 6
Understanding Media
Media
Plural form of medium
Multimedia
Combination of two or more media
Digital Media
Enable users to make new forms of interaction using media and technology