The Students, in The Long Term and On Their Own, Will Be Able To
The Students, in The Long Term and On Their Own, Will Be Able To
The Students, in The Long Term and On Their Own, Will Be Able To
LEARNING PLAN
Transfer Goal/s:
The students, in the long term and on their own, will be able to…
maintain a sound, healthy and morally-upright life style by following
all the time the safety guidelines and God’s commandments.
use properly the computer and the internet for productive purposes,
gainful employment and for spreading the Good News to the cyber
space.
Review:
Focus:
Computing Safety- Software (Threats in the Internet)
Presentation of EU and EQ
Essential Question/s:
The students will keep considering the following…
1. As a Marian-Ignacian student, why is it necessary for me to keep
away from dangers and temptations all the time?
2. In what ways can I avoid threats received from computing in the
internet and how is this beneficial to me as a Marian-Ignacian
student?
Rommel A. Tio
Instructor
III. LESSON PROPER (Facts and Concepts)
To know: To do:
1. The threats one can receive 1. Identify software threats and
when connected to an its harmful effects.
internet. 2. Enumerate some ways to
protect computer.
Strategies
1. The students will be grouped into eight (8) groups and tasked them
to accomplish the table below.
.
Threats in using the internet Its harmful effects to the computer
EQUIP / EXPERIENCE
2. After knowing the threats and its harmful effects to your computer,
what ways can you suggest to protect your computer?
RUBRICS
Criteria Advance – 3 Developing – 2 Emerging – 3
All the essential At least 80% of all the Below 80% of all the
information are covered essential information essential information
Completeness
throughout the are covered throughout are covered throughout
presentation. the presentation. the presentation.
Rommel A. Tio
Instructor
IV. FOUR – PRONGED INTEGRATION
Values Integration:
Ignacian Core Value: Service
Related Value: Stewardship
REFLECT /
As a Marian how would you take good care of God’s creation?
RE - THINK
Social Orientation:
Do you consider “hacking” a threat in cyber world?
How about identity theft?
Faith Reflection:
“Nobody should seek his own good, but the good of others.”
1 Corinthinas10:24
V. EVALUATION
Let the students make a policy or poster to guide young people to avoid
threats from the internet and protect their computers.
Summary
Now, that you have learned the essentials of safety internet
computing, what are the precautions you would take in using the internet
and preach the word of God to the cyber space?
EVALUATE
Action
As a Marian student how can you convince your classmates or other
people to use the computer and the internet efficiently and
productively?
VI. ASSIGNMENT
1. From your own experience enumerate some internet threats you
have experienced while using the internet. You may present it in
narrative form or drawing.
Rommel A. Tio
Instructor