LC 2
LC 2
LC 2
Department of Education
Region VI – Western Visayas
DIVISION OF ROXAS CITY
DON YNOCENCIO A. DEL ROSARIO NATIONAL HIGH SCHOOL
DETAILED LESSON PLAN IN EMPOWERMENT TECHNOLOGIES
Teacher: Williamson B. Enoc
Teaching Date and Time: M, T, W and TH/7:30-8:30 AM
Grade Level: 11
Learning Area: Empowerment Technologies
Quarter: 1
I OBJECTIVES
a. Content Standard:
ICT in the context of global communication for specific professional track
b. Performance Standard:
At the end of the 2-week period student will independently compose an insightful
reflection paper on the nature of ICT in the context of their lives, society, and
professional tracks (Arts, Tech-Voc, Sports, Academic).
c. Learning Competencies:
Apply online safety, security, ethics, and etiquette standard and practice in the use of
ICTs as it would relate to their specific professional tracks.
Code: CS_ICT11/12-ICTPT-Ia-b-2
II CONTENT
Online Safety, security, ethics, and etiquette
III LEARNING RESOURCES
a. References: Book (Empowerment Technologies, Innovative Training Works, Inc.)
b. Other Instructional Resources: laptop, internet, projector and PPT.
IV PROCEDURES
Activity:
1. Divide the class into 5 groups.
2. The group must answer the questionnaire about how much information have shared.
Each member will put a check () under Shared or Not Shared.
3. Each group will post their output on the board. (The output will be used in discussion)
Analysis:
1. What did you feel after sharing?
2. What are common answers you have with other group?
3. Why these are the common answers?
4. What do you think are the reason people share these information in the Facebook
Account?
5. How important are these information over the internet?
6. Do you think these information can be used by the hackers to destroy your reputation
over the internet? How?
Abstraction:
Internet - information superhighway. Anyone has access to this highway, can place
information, and can grab that information. Any information, even things that you have
set privately, can be accessed one way or another. This is why social networking sites
like Facebook continue to improve their security features. The threat of cybercrime is
very real. While you may not experience threat now, whatever information we share
today could affect our future.
INTERNET THREATS
Here are some of the threats you should be aware of when using the Internet:
1. Malware- stands for malicious software
*Rouge security software- tricks the user into posing that it is a security
software. It asks the user to pay to improve his/her security but in
reality, they are not protected at all.
COPYRIGHT INFRINGEMENT
If you create something—an idea, an invention, a form of literary work, or a research, you have
the right as to how it should be used by others. This is called INTELLECTUAL PROPERTY. In other
words, the copyright law includes your rights over your work, and anyone who uses it without
your consent is punishable by law. Try grabbing any book then browse its few pages and you will
find a page with a disclaimer with the words: “No part of this book may be copied,
reproduced…” That is a copyright page.
As a responsible user of the Internet, you have to consider that not everything out there is free
for you to use. Just like your own, contents that you see from websites have their respective
copyrights. There are several instances where employees or business owners face copyright
infringement and are sentenced to a huge fine due to reckless copying of materials.
Here are some tips that could help you avoid copyright infringement:
1. Understand. Copyright protects literary works, photographs, paintings,
drawings, films, music (and lyrics), choreography, and sculptures, but it generally does
NOT protect underlying ideas and facts. This means that you can express something
using your own words, but you should give credit to the source.
3. Be creative. Ask yourself whether what you are making is something that came
from you or something made from somebody else’s creativity. It is important to add
your own creative genius in everything that will be credited to you.
4. Know the law. There are some limitations to copyright laws. For instance in the
Philippines, copyrights only last a lifetime (of the author) plus 50 years. There are also
provisions for “fair” use which mean that an intellectual property may be used without a
consent as long as it used in commentaries, criticism, search engines, parodies, news
reports, research, library archiving, teaching, and education. If you have doubts that
what you are doing does not fall under the policy of fair use, seek permission first.
Another misconception is that fan-fiction is not copyright infringement. In reality, it is
and some copyright holders ignore them but they can opt to use their rights.
Application:
Take the Challenge!
Together with your group from the cybernews reporting, create campaign
materials promoting “Thinks before you click”. It could be in a form of small posters
posted along the hallway or bulletin boards as approved by the school. This campaign is
an awareness program for the younger batches of the school.
Assessment/Evaluation:
Matching Type: Match Column A with Column B. Write the letter of the correct answer on the
space before each number.
A B
____1. Virus A. – designed to send you advertisements
____2. Rogue B. – sends an official-looking email and is designed to steal sensitive
personal information
____3. Keylogger C. – a provision that allows you to use copyrighted work without consent with
certain limitations
____4. Adware D. – a browser feature that is synonymous to “private” browsing
____5. Spam E. – replicates and can transfer from one computer to another
____6. Phishing F. – exploits the DNS System
____7. Fair use G. – states that anyone who uses your work without your consents is punishable
by law
____8. Spyware H. – runs in the background and monitors what you are doing
____9. Private I. – unwanted email mostly from bots
____10. Malware J. – disguised as a useful program but is not
____11. Incognito K. – the information superhighway
____12. Internet L. – tricks the user into posing that it is security software
____13. Trojan M. – a malicious software
____14. Copyright N. – an option to hide a post so that search engines could not scan it
____15. Pharming O. – used to record the keystrokes done by the user
Agreement:
All group will have their campaign in lower years (Junior High School) after their class or during vacant
period. They have collect the signature of the students’ right after the campaign to be checked next
meeting. Each will have to take photos also during the campaign as a proof that they have conducted a
campaign.
V REMARKS
VI REFLECTION