Professional Documents
Culture Documents
Final Demonstration LP (LIE)
Final Demonstration LP (LIE)
Final Demonstration LP (LIE)
Learning Code:
Competency/ies:
Key Concepts/
Understanding to
be Developed:
I. Objectives:
Values
IV. Procedures
1. Preliminary 1. Greeting
Activities 2. Prayer
3. Orderliness/Cleanliness of the Room
(5 minutes) 4. Checking of Attendance
5. Eliciting Prior Knowledge
The teacher will have a simple recall about the previous quarter
discussion.
Students will answer the following:
a. What was your last topic all about?
b. What have you learned from your last topic?
MOTIVATION
The teacher show/write the word “Internet” and she will ask
the following question:
1. What is internet?
2. What are the advantages of Internet?
3. What are the disadvantages of Internet?
2. Activity The students will be called to answer “How Safe Are You?”
activity. Put a check (/) under Shared or Not shared
Type of information Shared Not shared
(10 minutes) 1. First Name
2. Last Name
3.Middle Name
4.Family
background
5.Problems
6.Your cellphone
number
7.Your address
8. Money
9. Status
10. Achievements
3. Analysis
Processed Questions:
(5 minutes) 1. What have you observed from the questions?
2. How does this relate to the word “Internet”?
3. Are those questions have something in common?
4. Abstraction
Using Powerpoint Presentation, the teacher will discuss about Living
in IT Era: Policing the Internet.
Data Breach
- Data breach is a cybercrime in which cybercriminal extracts
(20 minutes) data from source. Usually, data breach is done through remote
network or through a physical access to a computer or
network.
Cybercrime Police
- Internet police is an organization led by government agencies
in countries that are in charge with policing the internet.
Example:
- PNP’s Anti-Cyber Crime Group
2. Authentication -it should be only the user who can log in and
run the application. Only the valid information can reach this
software.
3. Authorization -it should be only the authorized user who can
change edit, and read all the information inside the
application.
Privacy Issues
- A privacy of an individual is essential because it is the key to
all of your social liberty and freedom.
- An American entrepreneur and philanthropist, Mark
Zuckerberg once said in 2010 that the users of today’s social
networking sites have developed more into being open
because of numerous and countless people sharing personal
information online and is continuously becoming expansive
every year.
- Philippines might have suffered its most terrible government
knowledge breach for just about a month before its elections.
Personal data, as well as fingerprint knowledge and passport
information that belong in a span of seventy million
individuals are alleged to have been compromised by hackers.
Examples:
Privacy Clap
Internet Jump Forward
Issues Shake
The students who failed to act the corresponding action for that
certain word will have to pick a question from the teacher and answer
it in front.
These are the questions that the students will have to answer:
1. How do we protect our online identity?
2. What is the role of cybercrime police?
3. Give one example of cybercrime.
4. Give me some ways that hackers can get into your phone.
5. Give me one type of security application and its importance.
V. Assessment
Analysis of Essay!
Learner’s
Activity In a ½ crosswise sheet of paper, students will reflect on this question:
Check learnings The teacher will give a quote and will let her students reflect on it.
(3 minutes) “Privacy is not an option and it shouldn’t be the price we accept for
just getting on the Internet.”
By; Gary Kovacs
VII. Assignment
(2 minutes)
The teacher will instruct the students to study in advance for their
Summative Exam.
Prepared by