Esp Download

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

2019 dll week4 - for educational purposes...

Political Science (University of Saint Louis)

Studocu is not sponsored or endorsed by any college or university


Downloaded by Karen Guico (karenortegaguico@gmail.com)
School Grade Level 11/12
Teacher JOHNNY G. HABAB Learning Area EMPOWERMENT TECHNOLOGIES
DAILY LESSON LOG Teaching JUNE 24 – 28, 2019 Quarter 1
Dates and G11 GAS – 11:00 AM to 12:00 NN; G11 TVL – 1:00 PM to 2:00 PM; G12 GAS1 – 7:30 AM to 8:30 AM; G12
Time GAS2 – 2:00 PM to 3:00 PM; G12 TVL – 10:00 AM to 11:00 AM
SESSION 1 SESSION 2 SESSION 3 SESSION 4
I. OBJECTIVES Students will be able to:
1. discuss what constitutes appropriate and inappropriate online behavior;
2. make the students discern possible deceptive information and wrongly evaluated data; and
3. make the students understand the importance of making judgment calls on possible
A. Content Standard The learners demonstrate an understanding of: ICT in the context of global communication for specific professional track.
B. Performance Standard The learners shall be able to: at the end of the 2-week period independently compose an insightful reflection paper on the nature of ICT in the context of their lives, society, and
professional tracks (Arts, Tech-Voc, Sports, Academic).
C. Learning Apply online safety, security, ethics, and Apply online safety, security, ethics, and
Competencies/Objectives etiquette standards and practice in the etiquette standards and practice in the
(Write the LC Code) use of ICTs as it would relate to their use of ICTs as it would relate to their
specific professional tracks specific professional tracks
CS_ICT11/12-ICTPT-Ia-b-2 CS_ICT11/12-ICTPT-Ia-b-2
II. CONTENT Online safety, security, ethics, and etiquette
III. LEARNING
RESOURCES
A. References
1. Teacher’s Guide pages
2. Learner’s Materials pages
3.Textbook pages Visual Guide Empowerment
Technologies (ICT in Business &
Technology) pp. 16-20
4. Additional Materials from
Learning Resource (LR)
portal
B. Other Learning www.google.com www.slideshare.net
Resources
IV. PROCEDURES
A. Reviewing previous lesson Ask students to have a recap on previous Ask students to have a recap on ACTIVITY QUIZ #2
or presenting the new lesson topic. Yesterday’s topic.

B. Establishing a purpose for the Ask students: Do we need to practice good attitude To enhance student’s understanding on To evaluate students understanding on the
lesson How can you protect important works when using the computer? the topic being discussed. topic being discussed.
and personal information stored in your
computer?
C. Presenting examples/ Video Analysis Video Analysis Students will be choose one among “The
instances of the new lesson The teacher will play a video on the The teacher will play a video on the Ten Commandments of Computer Ethics”
screen and after which, ideas will be screen and after which, ideas will be and they will
collected from the students with collected from the students with illustrate it on a sheet of bond paper.

Downloaded by Karen Guico (karenortegaguico@gmail.com)


regards to what they have just watched. regards to what they have just watched.

D. Discussing new concepts The teacher will discuss about The teacher will discuss about Online
and practicing new skills #1 Windows Security. Ethics and Etiquette.
E. Discussing new concepts and The teacher will give emphasis on The teacher will discuss mainly on The
practicing new skills #2 Windows Security which is necessary in Ten Commandments of Computer
order to protect important works and Ethics.
personal information stored in your
computer.
F. Developing mastery The teacher will ask students how much The teacher asks students how much
(Leads to Formative they know about changing and they about advantages and
Assessment 3) adding user accounts. disadvantages of using computers.
G. Finding practical Ask students if they know how to create The teacher will give elaboration and
applications of concepts and a secured password. concrete examples on each
skills in daily living commandment.
H. Making generalizations and Ask students: “How will you assure Ask students: “How will you compare
abstractions about the safety and security in creating user Online platforms from other trends of
lesson accounts?” ICT?”
I. Evaluating learning Evaluate students learning by asking Evaluate learners by asking them to
them the question: “How important is give their insightful reflection on the
the Security Settings on your ethical use of computers.
computer?”
J. Additional activities for
application or remediation

IV. REMARKS:

VI. REFLECTION
A. No. of learners who earned
80% on the formative
assessment.

B. No. of learners who require


additional activities for
remediation.
C. Did the remedial lessons
work?

D. No. of learners who have


caught up with the lesson.

D. No. of learners who continue


to require remediation.

Downloaded by Karen Guico (karenortegaguico@gmail.com)


E. Which of my teaching
strategies worked well? Why
did these work?

F. What difficulties did I


encounter which my principal
or supervisor can help me
solve?

G. What innovation or localized


materials did I use/discover
which I wish to share with other
teachers?

Downloaded by Karen Guico (karenortegaguico@gmail.com)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy