0% found this document useful (0 votes)
60 views12 pages

7es lesson plan

The lesson plan focuses on teaching Grade 6 students about the safe and responsible use of Information and Communication Technology (ICT). Students will learn the importance of ICT, guidelines for using computers and the internet, and formulate policies for safe usage. The lesson includes interactive activities, discussions, and evaluations to reinforce understanding and application of the concepts.

Uploaded by

Marniel Colastre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views12 pages

7es lesson plan

The lesson plan focuses on teaching Grade 6 students about the safe and responsible use of Information and Communication Technology (ICT). Students will learn the importance of ICT, guidelines for using computers and the internet, and formulate policies for safe usage. The lesson includes interactive activities, discussions, and evaluations to reinforce understanding and application of the concepts.

Uploaded by

Marniel Colastre
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

7E’s DETAILED LESSON PLAN

Teacher Marniel B. Colastre Grade Level 6


Teaching Date April 22, 2025 Learning Area TLE

Signature Quarter 1st


I. LEARNING
At the end of the lesson, the pupils must have:
OBJECTIVES
1. Determined the meaning and the importance of ICT.
2. Explained the guidelines in using computer, internet, and
e-mail; and
3.Formulating policies to follow for safe and responsible use
of Computer, Internet, and E-mail.

I. CONTENT Safe and Responsible use of ICT


II. LEARNING K to 12 Curriculum Guide in EPP, EPP4IE -0c-5
RESOURCES TLE 4 ICT and INTREPRENUERSHIP
III. MATERIALS Visual aids, pictures
IV. PROCEDURES Teachers Activity Pupils Activity
A. Elicit Everybody stand.
Let’s have our prayer. Our father….
Our father…… Amen
Amen
Good morning class! Good morning teacher
Niel
Before we’ll start please arrange
your chairs properly.
Alright, please sit down
Class beadle, Is there any absent
today? Thank you, teacher
Alright very good.
Now, today, we are going to; None teacher
1. Determined the meaning and
the importance of ICT
Everybody please read our
second objective,
2. Explained the guidelines in
using computer, internet, and e-
mail. 2. Explained the
guidelines in using
And the last one, jake
computer, internet, and e-
please read it.
mail.
3. Formulating policies to follow
for safe and responsible use of 3. Formulating policies
Computer, Internet, and E-mail. to follow for safe and
responsible use of
Computer, Internet, and
Alright, Thank you. E-mail.

B. Engage Okay class, are you ready for our


interesting discussion for today?
Wow, very good! Yes teacher!
Since you are ready I have here
a scrambled picture and I want
you to assemble the picture and
you will guess the picture. But
before that teacher will group you
into 5 group Group 1 – cellphone
Group 2 – tablet
Group 3 - computer
Group 4 - laptop
Group 5 – tv

Group 1

Group 2

Group3

Group 4

Group 5

C. Explore Ok class, do you think they are


important in our daily lives? Yes teacher
Why? (answers may vary)
(Random oral recitation)
D. Explain Since you already know that they
are important in our lives, let us
define what ICT is. Anyone from
the class, what is ICT?

Okay Justin Teacher ICT stands for


Information and
Communication
Technology. It refers to
technologies that provide
access to information
through
telecommunications,
such as the internet,
wireless networks, cell
phones, computers, and
other communication
mediums ICT plays a vital
role in modern society,
enabling communication,
collaboration, and access
to information globally.

Very good,

Information technology refers to


the methods and technologies
that help people acquire,
process, store, and share
information. It is also considered
the art and science of recording,
storing, organizing, exchanging,
and disseminating information.

Factors in the use of


computers, the internet, and
email

• Exposure to inappropriate
materials You may encounter
materials that are explicitly
sexual, violent, prohibited, or
illegal.
• Viruses, adware, and spyware
You may acquire viruses while
using the internet, which can
damage files, computer memory,
and disrupt its proper functioning.
• Harassment and
cyberbullying You may
experience cyberbullying or be
put at risk when interacting with
strangers online.
• Identity Theft The personal
information you share may be
used by others to commit crimes.
Information may also be obtained
without your knowledge or
consent. This is known as identity
theft or fraud.

Proper Practices for Using


Computers, the Internet, and
Email

• Determine/establish which
websites can be visited and how
long computers, the internet, and
email can be used.
• Install or implement internet
content filters. This ensures that
only useful content will be
accessible and downloadable
online.
• Interact only with acquaintances
or friends when online. Follow the
proper guidelines set for the use
of social networking, instant
messaging, email, online gaming,
and webcams.

Things to Consider for Safe


Internet Use

• Schools must have a clear


policy on the use of computers,
the internet, and email.
• Internet facilities should only be
used for educational purposes.
Access the internet only with the
teacher’s permission and visit
approved websites only.
• The use of chat rooms that
may pose risks to students is
prohibited.
• Bringing any food or drinks into
the computer laboratory is
prohibited.
• Take care of all the equipment
in the computer laboratory and
follow the teacher’s instructions
for the proper use of any
equipment.
• Use only safe search engines
on the internet. Examples:
 www.kidzui.com
 www.kids.aol.com
 www.surfnetkids.com

 Understand the
difference between
public and private
information.
 Do not publish, give, or
share any personal
information about
yourself or others
(such as address,
email address, or
phone numbers).
 Choose a password
that is hard to guess
and change it if
necessary.
 Do not share your
password with anyone
(except parents) and
always log out before
shutting down or
turning off the
computer.
 Shut down the
computer and turn off
the internet connection
after use. Do not leave
them on when not in
use.

Proper Position for Using a


Computer
 Back Position: Sit upright
with your back straight and
supported by the chair's
backrest.
 Arm and Elbow Position:
Ensure your arms are
relaxed, and your elbows
are bent at a 90-degree
angle while using the
keyboard or mouse.
 Neck Position: Keep your
head and neck level,
avoiding prolonged
bending. The monitor
should be at the correct
height, at eye level.
 Leg and Foot Position:
Your feet should rest flat
on the floor or on a
footrest, and your legs
should be in a comfortable
position.
 Monitor Distance: The
monitor should be 20-30
inches away from your
eyes, and the screen
should be angled properly
to prevent glare.
 Break Time: Take a break
every 20 minutes to
relieve eye and body
strain. Stand, walk, or
stretch to maintain proper
blood circulation.

Standards for Proper Use of


Computers

Use the Computer for


Appropriate Purposes Ensure
that the computer is used for
education, work, or meaningful
activities.
Keep the Computer Clean Do
not bring food or drinks near the
computer to prevent damage to
the equipment.
Avoid Using Unlicensed
Software Only use legal and
licensed software to avoid
violating laws.
Protect Personal Information
Do not share personal
information such as passwords,
addresses, and contact numbers.
Respect the Privacy of Others
Do not open or interfere with
other people's files without their
permission.
Avoid Abusing Online
Platforms Do not send hurtful or
damaging messages; remain
respectful and responsible.
Take Care of Your Health
Maintain proper posture while
using the computer and take
breaks to avoid eye and body
strain.

E. Elaborate I will group you into 3.


Each group will discuss the
responsible use of computers,
the internet, email, and the
associated risks. Refer to the
arrangement of groups based on Answers may vary
the topics to be discussed below:
Group 1 responsible use of
computers.
Group 2 responsible use of
internet
Group 3 responsible use of e-
mail

Create a skit or any type of


presentation that discusses the
responsible use of computers,
the internet, and email.

F. Evaluate I. Write your answer on a piece


of paper.

1. When entering the computer


laboratory, what I should do
a. turns on the computer and
plays online games
b. sits quietly in the seat
assigned to me
c. eats and drink.

2. Someone sent you


inappropriate online messages,
what should you do?
a. Keep it a secret Answer:
b. respond, and ask the sender
to stop sending you inappropriate 1.
messages. 2.
c. Inform your parents so they 3.
can alert the internet service 4.
provider. 5.

3. In using an internet in
computer laboratory, which of the
following should be done?
a. checking my e-mails anytime
that I want
b. going to chat rooms and using
the instant message to talk with
my friends
c. I can only use the internet and
visit approved websites with the
teacher's permission
4. When someone asks for personal
information such as phone numbers
or addresses, you should:
a. Provide the requested
information politely.
b. Post the information on any
public websites like Facebook for
anyone to see.
c. Avoid giving personal
information online because you
don't know who you are
interacting with

5. If you come across information or


content on the computer that you
think is inappropriate, what should
you do?
a. Ignore it and dismiss it.
b. Turn off the computer and tell
your friend.
c. Inform your parents
immediately

II. Write five important rules or


practices for responsible internet
use
1.
2. Answer may vary
3. 1.
4. 2.
5. 3.
4.
5.

G. Extend In a sheet of paper “write down” (all): Yes teacher


for each number, the benefits of
technological tools in your
studies in the present time.
1. E-mail
2. Computer
3. Internet
A. No. of learners who earned 85% of the assessment
B. No. of learners who require additional activities for remediation
C. Did the remedial lessons work? No. of learners who have caught up
with the lesson
D. No. of learners who continue to require remediation

You might also like