Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

DLP15

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

DETAILED LESSON PLAN (DLP)

DLP NO. School: Baclayon National High School Learning Area: EMPOWERMENT
TECHNOLOGIES
Teaching Date and Time: October 7, 2019 ; Grade Level: 11 – TVL Quarter: 2
3:00-4:00 P.M.
Learning Create a reflective piece or output using an Code: CS_ICT11/12-ICTPT-IIt-23
Competency: ICT tool, platform, or application of choice
on the learning experience undergone during
the semester
Key Concept/ The nature of ICT and the manner by which the learning process has changed
Understanding to his/her world view
be developed
1. Objectives
Knowledge At the end of this lesson, the students are expected to:

Identify the several problems ICT has created and the ways in combatting cybercrimes;

Skills Develop an output using any ICT tools, platform or application of choice on how
ICT can change the world for better or for worse;
Attitude Display critical thinking on the formulation of ideas for the expected output.
Values Display with utmost concern on social responsibility in using media.
2. Content Reflecting on the ICT learning process covering the topics of: ICT, the Self, and
Society
3. Learning Curriculum Guide: page 9-10 of 12
Resources Learning Materials: Empowerment Technologies by IT Works Inc., pp 239-241; ABS-
CBN News (2017, March 5). Failon Ngayon - Cybercrime cases in the Philippines [Video
File]. Retrieved from https://www.youtube.com/watch?v=tKOeloKle8Y; Department of
Education (2015). Ekonomiks, Araling panlipunan – Modyul para sa Mag-aaral. First
Edition. Philippines:Vibal Group, Inc.; The LAWPHIL Project (March 1, 2019).
Cybercrime Prevention Act of 2012. Retrieved from
https://www.lawphil.net/statutes/repacts/ra2012/ra_10175_2012.html.
Laptop, PowerPoint Presentation, T.V., iOS or Android phones with mobile data
4. Procedures
Teacher’s Activity Student’s Activity
4.1 Introductory Routine
Activity 1. Prayer & Greetings
2. Checking of Attendance
3. Classroom Management

Ok class, what was our lesson yesterday? (Some students raise their hand)
Yes Charlen! Charlen: It was all about analytics of
traffic data in the aspects of
visibililty, reach and virality using
wordpress as a platform and
Google Analytics as a tool.
Ok, very good! Let us give her one clap please
Students will clap their hands
4.2 Activity Ok let’s have an activity. This is called
Knowledge Base Corners: Students will listen to the instructions
1. There are four large strips of paper I will post
in each corner of the room and each one has a
label with phrases: “I don’t know”, “I know a
little bit”, “I know a lot”, and “I am expert of it”.
2. Whenever I read texts/terms related to the
lesson, you move around to each corner of the
room that matches your knowledge level for the
topic.
(Terms: Cybercrime, Spam, Blackmail,
Identity Theft, Encryption, Republic Act No.
10175, and Cybercrime Prevention Act)
3. And be cautious in moving around to avoid
accident.
Alright, are you ready? Students: Yes, we are ready ma’am!
4.3 Analysis Analyze the activity using the following
questions:
1. What did you learn from our activity? I (Some students are raising their hands)
will call a name… Ok Jay Lord? Jay Lord: I learned that I have only
few knowledge about the terms you
mentioned ma’am especially the
Republic Act No. 10175 and
Ok Jay Lord, thank you for your honest answer! Cybercrime Prevention Act.
Let’s give him two claps please Students will clap their hands
2. What can you describe about the terms
being mentioned? Diana? Diana: I think it were all about the
illegal acts done through the use of the
internet and the law enacted to prevent
Wow, that was amazing answer Diane, let’s give those internet crimes.
her around of a plause please…
3. So, what do you think is our lesson for
today? Nolie? Nolie: I think our lesson for today is
all about Cybercrimes and How to
Wow, terrific! Yes, exactly! That will be our Combat or Prevent Cybercrimes.
lesson today. Another around of applause for
Nolie please…
Kindly watch the 4-minutes and 51-seconds
video entitled, “Failon Ngayon - Cybercrime
cases in the Philippines”. (Students will watch the video and
Be prepared to answer these questions: listen attentively)
 What are the internet cybercrimes being
tackled and showed in the video?
 What is the law that was being created
and implemented to help solve and
prevent cybercrimes in our country?
Who is the author of the said House
Bill?
(I will ask the questions after watching the
video)
Say: According to Feliciano R. Fajardo (1994.), the
country’s growth is a progressive process in
improving the human condition, such as reducing
poverty, unemployment, ignorance, inequality, and
exploitation. (Araling Panlipunan 10 – Konsepto ng
Pag-unlad).
In various aspects, ICT and technology as a
whole brought us comfort and convenience in
life. We, as Filipinos, have been known to be
avid users of technology. Some even have made
a name as an internet sensation. However, aside
from those successes are the downfalls of users.
And here is what we called CYBERCRIMES
4.4 Abstraction (Using PowerPoint Presentation projected to the
T.V. screen, introduce the lesson for today and
show to the students the objectives of the lesson)
Ok, what is Cybercrime? Students are raising their hands
What do you understand about it? Ok, Rhea Ann Rhea Ann: Cybercrime is an Illegal
Act done through the use of the
internet.
Very good! Give her three claps please…
In your own opinion what are the most or give
me top 10 most common internet cybercrimes
happening in our society, or in the world, or in
our country? And as what I have observed, this
cybercrime cases are always part of the news
and rampant. Ok, you name one, Luigi? Luigi: Identity Theft
Yes, very good!
Another one, Allyna? Allyna: Fraud
Very good!
Trisha? Trisha: Hacking
Yes, very good!
Kent? Kent: Fake News
Yes, that’s right! Any other answer? No more students raising their hands.
Introduce the top 10 most common Internet
Cybercrimes posted by Stephen Nale in 2012.
Discuss also The Ways the Authorities can help
Solve or Prevent Cybercrimes.
 Network Security
 Investigation
 Penalties
4.5 Application 1. I will divide you to 8 groups and
provide each one of you a hand-out
about RA 10175. Select your leader and
spokesperson.
2. Each group is assigned a color (red,
blue, yellow, green, orange, violet,
black, white). Choose representative in
your group to pick your color.
3. The color you have picked has an assign
task. You find your color which is
written in your printed copy of RA
10175
4. All groups are given 15-minutes to
discuss/share ideas.
5. After the 15-minutes period, the
spokesperson of each group will report
their assigned topic.
Am I understood class? Students: Yes, ma’am!
After reporting, ask these questions:
1. If your friend happened to do such
cybercriminal activities specifically
identity theft, what will you do?
2. What is the importance having
knowledge about R.A 10175 or the
Cybercrime Prevention Act of 2012?
(Revisit knowledge base corners to identify their
knowledge level about the topic.)
Is there any questions regarding our topic? Students: None so far mam!
5.6 Assessment True or False: Write T if the statement is correct, otherwise, replace the underlined
word/s to make the statement correct.
1. Phishing is the act of sending multiple emails to multiple users in hopes of having
a number of them clicking on the links or malwares attached to the email.
2. Extortion is the act of using the internet to threaten or damage someone’s
reputation to extort money or anything else of value.
3. Electronic harassment is also referred to as cyberbullying.
4. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file
5. Wager gambling is the act of betting on any sports event over the Internet.
6. Most email services today have spam or bulk foder that automatically puts these
suspicious emails to that folder.
7-8. What are those cybercrimes that were discussed in this lesson that you think
students of your generation should be aware of? Give atleast 2.

Answer Key:
1. T 3. T 5. Sports betting 7. Libel
2. T 4. T 6. T 8. Cyber-squatting
4.7 Assignment Develop an output using any ICT tools, platform or application of choice (e.g., video blog,
presentation or image gallery, website, illustrated document, podcast or webcast) about
everything you have learned about ICT and its possible impact to our society. Talk about
its positive and negative impacts and the youth’s role in helping promote its responsible
use. Interview your classmates and other school personnel about it.
4.8 Concluding Keep everything in proper order.
Activity
(2 mins)
5. Remarks Each day accomplishment of output is checked until submission.
6. Reflections
A. No. of learners who
earned 80% in the
evaluation
B. No. of learners who
require additional
activities for
remediation
C. Did the remedial
lessons work? No. of
learners who have
caught up with the
lesson
D. No. of learners who
continue
E. Which of my learning
strategies worked
well? Why did these
work?
F. What difficulties did I
encounter which my
principal or
supervisor can help
me solve?
G. What innovation or
localized materials
did I use/ discover
which I wish to share
with other teachers?

Prepared by: Checked by:


VENUS L. NAMOC PAUL ROSELITO M. NUERA
T-II/Subject Teacher Principal

You might also like