Daily Lesson LOG: CS - ICT11/12-ICTPT-Ia-b-1 CS - ICT11/12-ICTPT-Ia-b-2
Daily Lesson LOG: CS - ICT11/12-ICTPT-Ia-b-1 CS - ICT11/12-ICTPT-Ia-b-2
Daily Lesson LOG: CS - ICT11/12-ICTPT-Ia-b-1 CS - ICT11/12-ICTPT-Ia-b-2
I. OBJECTIVES
The learners demonstrate an understanding of: The learners demonstrate an understanding of:
A. Content Standards understanding of: understanding of:
ICT in the context of global communication for ICT in the context of global communication for
specific professional track specific professional track
The learners shall be able to: The learners shall be able to:
B. Performance Standards at the end of the 2-week period independently at the end of the 2-week period independently
compose an insightful reflection paper on the compose an insightful reflection paper on the
nature of ICT in the context of their lives, society, nature of ICT in the context of their lives, society,
and professional tracks (Arts, Tech-Voc, Sports, and professional tracks (Arts, Tech-Voc, Sports,
Academic) Academic)
1. compare and contrast the nuances of varied 2. apply online safety, security, ethics, and
C. Learning online platforms, sites, and content to best etiquette standards and practice in the use of ICTs
Competencies achieve specific class objectives or address as it would relate to their specific professional
situational challenges CS_ICT11/12-ICTPT-Ia-b-1 tracks CS_ICT11/12-ICTPT-Ia-b-2
II. CONTENT Information and Communication Technology Online safety, security, ethics, and etiquette
covering the topics of:
1. The current state of ICT technologies (i.e.,
Web 2.0, 3.0, convergent technologies, social,
mobile, and assistive media)
2. Online systems, functions, and platforms
III. LEARNING RESOURCES
A. References
1. Teacher's Guide Pages None None
2. Learner's Material None None
Pages
3. Textbook Pages None None
4. Additional Materials None None
from LR Portal
B. Other Learning Empowerment Technology by Jemma Empowerment Technology by Jemma
Resources Development Group Development Group
C. Presenting Discuss what is Information and Communication Discuss Online Safety and Security
Examples/Instances of the Technology (ICT).
New Lesson
D. Discussing New Discuss Information and Communication Explain the Dangers on the Internet and give some
Concepts and Practicing Technology covering the topics of: tips on how to stay safe online
New Skills #1 1. The current state of ICT technologies (i.e.,
Web 2.0, 3.0, convergent technologies, social,
mobile, and assistive media)
E. Discussing New Discuss Information and Communication Discuss Online Ethics and Etiquette
Concepts and Practicing Technology covering the topics of:
New Skills #2 2. Online systems, functions, and platforms
G. Finding Practical For Groups 3-4. Ask to create a secure password for each online
Applications of Concepts Exploration 1.2 Identifying the Correct Web account (Gmail, YouTube, and Yahoo) and apply
and Skills in Daily Living Platform for Social Change the security techniques on their own computer or
1. Identify a problem in your community mobile phone.
(e.g., littering, garbage disposal, blocked
drainages, etc.).
2. Imagine that you are going to create a
website to persuade both community
leaders and members to solve this
problem.
3. Fill out the form below. You may refer to
the sample provided after the form.
VI. REFLECTION
A. No. of learners who
earned 80% on the
formative assessment
B. No. of learners who
require additional
activities for remediation
C. Did the remedial
lessons work? No. of
learners who have caught
up with the lesson.
D. No. of learners who
continue to require
remediation
E. Which of my teaching
strategies worked well?
Why did these work?
F. What difficulties did I
encounter which my
principal or supervisor
can help me solve?
G. What innovation or
localized materials did I
use/discover which I wish
to share with other
teachers?
Submitted by: JENNY MAE P. SOJOR Checked by: JOELOU M. AGUIRRE Date: ___________
Teacher II PRINCIPAL 1
For Group 1.
Exploration 1.1 Static vs. Dynamic
Look for ten websites and classify them as static or dynamic. What makes each website static or dynamic? Use the table below.
Column A
1. virus
2. rogue
3. keylogger
4. adware
5. spam
6. phishing
7. fair use
8. spyware
9. private
10. malware
11. incognito
12. internet
13. Trojan
14. copyright
15. pharming
Column B
a. designed to send you advertisements
b. sends an official-looking email and is designed to steal sensitive personal information
c. a provision that allows you to use copyrighted work without the consent with certain limitations
d. a browser feature that is synonymous to “private” browsing
e. replicates and can transfer from one computer to another
f. exploits the DNS system
g. states that anyone who uses your work without your consent is punishable by law
h. runs in the background and monitors what you are doing
i. unwanted email mostly from bots
j. disguised as a useful program but is not
k. the information superhighway
l. tricks the user into posing that I is a security software
m. a malicious software
n. an option to hide a post so that search engines could not scan it
o. used to record the keystrokes done by the user