Online Safety and Security Ethics and Etiquette Contextualized Online Search Research Skills
Online Safety and Security Ethics and Etiquette Contextualized Online Search Research Skills
Online Safety and Security Ethics and Etiquette Contextualized Online Search Research Skills
GRADES 11 to 12 Teacher Maria Shiela D. Bayungan Learning Area Empowerment Technologies (for the
DAILY LESSON LOG Strand)
Teaching Dates and Time Quarter 3rd Quarter
Session 1 Session 2 Session 3 Session 4
I. OBJECTIVES
A. Content Standard The learners demonstrate an understanding of ICT in the context of global communication for specific professional track
The learners shall be able to at the end of the 2-week period independently compose an insightful reflection paper on the nature of ICT in the context of their lives, society,
B. Performance Standard
and professional tracks (Arts, Tech-Voc, Sports, Academic)
apply online safety, security, ethics, and etiquette standards and practice in the use use the Internet as a tool for credible research and information gathering to best
C. Learning Competencies / of ICTs as it would relate to their specific professional tracks achieve specific class objectives or address situational
Objectives (Write the LC for The learners: The learners:
The learners: The learners:
each) understand online ethics and understand contextualized online
determine the dangers of the Internet enhance research skills
etiquette search
II. CONTENT Online safety and security Ethics and etiquette Contextualized online search Research skills
III. LEARNING RESOURCES
A. References
1. Teacher’s Guide pages Page 1 Page 1 Page 1 Page 1
2. Learner’s Materials pages None None None None
3. Textbook pages Empowerment Technologies; pp 17-33 Empowerment Technologies; pp 17-33 Empowerment Technologies; pp 17-33 Empowerment Technologies; pp 17-33
4. Additional Materials from
Learning Resource (LR) None None None None
portal
B. Other Learning Resources Laptop, MS PowerPoint Laptop, MS PowerPoint Laptop, MS PowerPoint Laptop, MS PowerPoint
IV. PROCEDURES
A. Reviewing previous lesson or What comes to mind when you hear the Demo. Traditional online searching and
Explain. Think before you click. What is research skills?
presenting the new lesson word "Internet threats"? contextualized online searching.
What are the difference between the
How would you know that you are on
How safe are you when you are using traditional way of getting information in
B. Establishing a purpose for the lesson Name common Internet threats. the right track of getting research
the Internet? the Internet and contextualized online
information online?
search?
C. Presenting examples/instances of the How much information you have shared
new lesson online?
D. Discussing new concepts and Lecture. The ten commandments for Lecture. Steps in making a Lecture. Enhancing and improving
Lecture. Dangers on the Internet.
practicing new skills #1 computer ethics. contextualized online search. research skills.
E. Discussing new concepts and
practicing new skills #2
F. Developing mastery (Leads to Situational analysis. Group activity. With your group, create Follow the steps in making a Make a research about any topic you are
formative Assessment 3) How would you know if someone is a campaign materials promoting “Think contextualized research. interested in and apply the research skill
trying to; spoof, phish and pharm you? before you click”. that you have learned.
What can we do to prevent installing a
spyware?
What is the best way to get rid of JUNK
MAILS?
How do we know it is a worm-infected
Page 1 of 2
file?
How do we know it is a Trojan horse-
infected file?
How do we know it is a virus-infected
file?
How do we know you are being hacked?
G. Finding practical applications of
How would you stay safe online? Why are research skills important?
concepts and skills in daily living
What are the skills needed in advancing
H. Making generalizations and What other dangers can we encounter in Enumerate the ten commandments for What are the steps in making a
one’s ability to obtain vital information
abstractions about the lesson the internet? computer ethics. contextualized online search?
on the Internet.
I. Evaluating learning Enumerate the different Internet threats. Rubrics. Rubrics. Enumerate the different research skills.
J. Additional activities for application
or remediation
The lesson was executed according to its The lesson was executed according to its The lesson was executed according to its The lesson was executed according to its
V. REMARKS
competencies. competencies. competencies. competencies.
VI. REFLECTION
A. No. of learners who earned 80% on
the formative assessment.
B. No. of learners who require
additional activities for remediation.
C. Did the remedial lessons work? No.
of learners who have caught up with
remediation the lesson.
D. No. of learners who continue to
require remediation.
E. Which of my teaching strategies
worked well? Why did these work?
F. What difficulties did I encounter
which my principal or supervisor
can help me solve?
G. What innovation or localized
materials did I use/discover which I
wish to share with other teachers?
FRANCISCO E. MATALOG
Principal II
Page 2 of 2