The Students, in The Long Term and On Their Own, Will Be Able To

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

St.

Mary’s Academy of San Nicolas


Tomas Abella Street, Cebu City

LEARNING PLAN

Subject: Computer 2 Quarter: 1st Unit: 1


Lesson / Topics: Year and Section: Date:
II – OLL
The Impact of Computing and the Internet on II – OLF
Society
II - OLP
I. PRELIMINARIES

Transfer Goal/s:
The students, in the long term and on their own, will be able to…
 maintain a sound, healthy and morally-upright life style by following
all the time the safety guidelines and God’s commandments.
 use properly the computer and the internet for productive purposes,
gainful employment and for spreading the Good News to the cyber
space.

Review:

Focus:
Computing Safety- Software (Threats in the Internet)

Presentation of EU and EQ

Essential Understanding/s: WHERE


The students will understand that…
1. A safety-conscious and God-fearing person is always away from
dangers, accidents and temptations.
2. Computer and the internet if properly used are entertaining and
useful products of high technology for self- growth and for
disseminating Gospel values to the World Wide Web.

Essential Question/s:
The students will keep considering the following…
1. As a Marian-Ignacian student, why is it necessary for me to keep
away from dangers and temptations all the time?
2. In what ways can I avoid threats received from computing in the
internet and how is this beneficial to me as a Marian-Ignacian
student?

II. MOTIVATION AND ACTIVATION OF PRIOR KNOWLEDGE


1. Are you a “Jejemon”? Do you consider “Jejemon” a threat? Why do
you say so? HOOK / TAILORED
2. In your own experience, have you encountered threats while using ACTIVITES
the internet?
3. What have you done to protect yourself from those threats?

Learning Plan 01 Page 1 of 3

Rommel A. Tio
Instructor
III. LESSON PROPER (Facts and Concepts)

To know: To do:
1. The threats one can receive 1. Identify software threats and
when connected to an its harmful effects.
internet. 2. Enumerate some ways to
protect computer.

Strategies

1. The students will be grouped into eight (8) groups and tasked them
to accomplish the table below.
.
Threats in using the internet Its harmful effects to the computer
EQUIP / EXPERIENCE

2. After knowing the threats and its harmful effects to your computer,
what ways can you suggest to protect your computer?

Broadening of the Concept

1. What could be the reasons why passwords are required in e-mail


accounts? How about in social networking accounts such facebook?
2. What do you think the reason why some of the data transmitted in
the internet are zipped or encrypted?

RUBRICS
Criteria Advance – 3 Developing – 2 Emerging – 3

All the essential At least 80% of all the Below 80% of all the
information are covered essential information essential information
Completeness
throughout the are covered throughout are covered throughout
presentation. the presentation. the presentation.

All the information At least 80% of the Below 80% of the


Correctness presented are correct. information presented information presented
are correct. are correct.

The level of presenting The level of The level of


the information is consistency in consistency in
Presentation consistent throughout. presenting the presenting the
information is 80% information is below
throughout. 80% throughout.

Learning Plan 01 Page 2 of 3

Rommel A. Tio
Instructor
IV. FOUR – PRONGED INTEGRATION

Lesson Across Discipline: Biology / Human Anatomy

 Do you consider alcohol a threat to your body? How about nicotine?


 What are the effects of these substances to our body?

Values Integration:
Ignacian Core Value: Service
Related Value: Stewardship
REFLECT /
 As a Marian how would you take good care of God’s creation?
RE - THINK

Social Orientation:
 Do you consider “hacking” a threat in cyber world?
 How about identity theft?

Faith Reflection:
 “Nobody should seek his own good, but the good of others.”
1 Corinthinas10:24

V. EVALUATION

Let the students make a policy or poster to guide young people to avoid
threats from the internet and protect their computers.

Summary
Now, that you have learned the essentials of safety internet
computing, what are the precautions you would take in using the internet
and preach the word of God to the cyber space?
EVALUATE

Action
 As a Marian student how can you convince your classmates or other
people to use the computer and the internet efficiently and
productively?

VI. ASSIGNMENT
1. From your own experience enumerate some internet threats you
have experienced while using the internet. You may present it in
narrative form or drawing.

Learning Plan 01 Page 3 of 3

Rommel A. Tio
Instructor

You might also like