Lesson Plan in Media Information Technology
Lesson Plan in Media Information Technology
Lesson Plan in Media Information Technology
I. OBJECTIVES:
At the end of the class period, the learners should be able to:
1. Consider one’s and other’s safety when sharing information using the internet;
2. Consider one’s and other’s reputation when using the internet;
3. Determine and avoid dangers of the internet;
4. Be responsible in the use of social networking sites.
II. LEARNING CONTENT:
A. Lesson: Online Safety, Security, Ethics and Etiquette
B. Reference/s: Media Information Literacy, page 17-25
C. Materials: questionnaires, manila paper, marker, pictures, slides deck, laptop and projector
III. LEARNING TASKS:
Teacher’s Activities Learners’ Activities
A. Preliminary Activities
Can someone lead the prayer? One learner will lead the prayer.
Class secretary, do we have absentee/s today? The class secretary will report the
attendance of the class.
Okay, thank you.
Who can summarize the topics we discussed yesterday? Yesterday sir, we discussed about
the different social media
applications and their uses. Among
those social media applications are
Facebook, Instagram, Youtube and
many more.
B. Motivation
Are you familiar with this picture? Yes sir.
That’s a hacker sir.
C. Activity
Task 1: Online Safety and Security
The teacher will be handing them a questionnaire. Choose a
partner. Interview them about the information they have shared
so far using the questionnaire. Put a check () under Shared or
Not Shared.
How Safe Are You?
Types of Information Shared Not (The learners will be interviewing
Shared each other using the questionnaire.)
1. First name
2. Last name
3. Middle name
4. Current and previous schools
5. Cellphone number
6. Parents’ names
7. Name of your siblings
8. Address
9. Home phone number
10. Birthday
How many checks did you have for shared?
Answers may vary.
Okay, let’s find the implications of your responses as we move on
to our discussion.
D. Analysis
What is online safety and security? It is the knowledge of maximizing
the user’s personal safety and
security risks to private information
and property associated with using
the internet, and the self-protection
(Very Good) from computer crime in general.
Let us go back to the “How Safe Are You?” test. Let us visit each
item and see how risky it is to share them.
Each group will be given a topic to be discussed in front. (The learners are expected to
You have two-four minutes to discuss the task to your group and prepare their respective reports.)
three-four minutes to present it in front.
Group 1: Tips to Stay Safe Online (The learners are expected to report
Group 2: Internet Threats their topics in front.)
Group 3: Online Ethics and Etiquette
RUBRIC
CRITERIA Excellent (10 Pts.) Satisfactory (6-9 Pts.) Needs Improvement (1-5 Pts.)
Content The report is complete The report is complete The report is incomplete.
and comprehensive. and clear.
Delivery Organized, clear and Clear and correct. Unorganized and unclear.
correct.
Cooperation All the members Almost all the members Only few members participate in
participate in the participate in the the activity.
activity. activity.
What are examples of online or internet threats? The examples of online or internet
threats are: Malwares like virus,
worm, trojan, spyware and adware;
Spam, Phising and Pharming.
What are the things that you need to consider when posting Answers may vary.
online or using the internet?
F. Application
The teacher will be showing the learners the slogan: “Think
Before You Click!”.
As a HUMSS student, how can you spread awareness about Answers may vary.
online safety, security, ethics and etiquette to your fellow
students?
IV. EVALUATION
Read each sentence carefully. Write Yes if you agree with the statement and No if you
disagree. Write your answers on the space provided before each number.
_______1. My computer has an antivirus so it’s okay to open most email attachments like e-cards
and video files.
_______2. Your friend told you that his college application was rejected due to the fact that you
posted a video of him doing crazy stuff at a party. You posted the video several
years ago but later took it down to protect your friend’s reputation. Can your friend be
right that the college found the video?
_______3. You and your best friend play a lot of video games. One time, she asks you for your
password so she can help you level up and get in-game money. She promises to
keep your password a secret. Is it okay to give away your password?
_______4. You forgot that your essay for English class is due tomorrow. While doing your
research, you found a website offering free essays. Is it okay to use the essays
form this free essay website?
_______5. You received an email stating that your mother’s bank account is going to be forfeited if
you do not respond to the email. Is it safe to reply?
_______6. A virus is a malware that multiplies and infects another computer through flash drives.
_______7. Keyloggers are software that show pop-up ads even if you are not using your browser.
_______8. Search engines scan websites for search results even if you have set post to private.
_______9. There is a danger in posting information about a future vacation.
_______10. Letting people know your birthday is probably a must if you want to get as many gifts
as possible. But having it in your profile makes you vulnerable to identity theft.
V. ASSIGNMENT
Research about the Cybercrime Law and tell how it ensures your online safety and security. Write
it on a pad paper.
Prepared by:
Mr. Jhon Mark C. Rabanal
Teacher Applicant