Professional Documents
Culture Documents
Emptech DLL CO
Emptech DLL CO
DEPARTMENT OF EDUCATION
Region IX, Zamboanga del Sur
Tukuran Technical Vocational High School
I. OBJECTIVES
At the end of the lesson, 85% of the students are expected to:
A. identify the common threats in the internet.
B. Increase student’s knowledge, common threats in the internet that can
harm a computer and a data stored on it.
C. Value the importance of safety in using Internet.
III. PROCEDURE
A. Preparation
1. Prayer
2. Greetings
3. Classroom Management
4. Checking of attendance
5. Review of the previous lesson
B. Motivation
The teacher will group the student into 4 and let them arrange the
jumbled word. The group that can write and form the correct word in
the board will be declare as the winner.
Jumble word:
C. Lesson Proper
1. ANALYSIS
The teacher will ask the following question.
A. What comes in their mind when they formed / read that following words
posted in the board?
B. Do you have any experienced out of that words ? share it to the class.
2. ACTIVITY
The teacher will group the class into 4 and let them list down important details
from the video presented.
3. ABSTRACTION
From the activity , each group will report / discuss to the class the important
details they get from the video presentation given 3-5 minutes only.
The teacher will show rubrics to the students for them to be guided during the
activity.
RUBRICS;
Deliver and The group delivers a The group delivers a The group delivers the
presentation of the very creative creative presentation topic orally w/ visual
topic presentation of the of the topic aids.
topic.
4. APPLICATION:
With the same group, the teacher will distributes piece of paper containing
instruction. Each group is given 3 minutes to prepare and present their output to the
class with the allotted time of 1-2 minutes only.
RUBRICS:
CRITERIA 5 PTS 3PTS 1 PT
Content Group membersMost of the Group members has
stronghold the
members has a solid a little understanding
content thoroughly.understanding of the of the content.
content.
Presentation All members were Most members were Few members were
well prepared and prepared and done it prepared during the
done it with with confidence. presentation.
confidence.
Teamwork/Participation All members work The group worked Group did not work
together well but some well together.
members
participated slightly.
IV. EVALUATION: 1/4 sheet of paper
Identification:
1. A malicious program designed to replicate itself and transfer from one computer to
another either through the internet and local networks.
2. Used to record the keystroke done by the users .
3. A program designed to send you advertisement .
4. A kind of threats that require a sensitive personal information like password and credit
card.
5. Stands for malicious Software.
1. Copyright infringement
2. Enumerate the tips to avoid copy infringement.
Prepared by:
Jennifer S. Bataycan
Teacher I
Group Activity
Group 1: spoken poetry- Your group is required to produce a spoken poetry consist
of 1 paragraph. Content must be the different internet threats and safety.
Group 2: Song making - Your group is required to create a song with with lyrics that
is line with the different internet threats and safety. At least 1 paragraph and you can use
existing tune you want.
Group 3: Short Role playing - Your group is assigned to dramatize a situation where
in you can apply the possible outcome when we encounter the different internet threats and
how to prevent it.
SRIVU
JANTRO
SMROW
ARESPW
Y