ALTERNATIVE LEARNING SYSTEM Community Learning Ocampo National High
Daily Lesson Log Program Senior High School
Center (CLC) School
Learning Facilitator CHRISTIAN C. MADRAZO Literacy Level Grade 12
Month and Quarter 1ST Quarter Learning Strand LS 6: Digital Literacy
I OBJECTIVES
A Content Standards The learner demonstrates understanding of media and information literacy (MIL) and MIL related concepts.
B Performance Standards The learner demonstrates ethical practices and values in using technology in the 21st century.
C Learning Competencies Apply online safety, security, ethics, and etiquette standards and practice in the use of ICTs as it would relate to
their specific professional tracks
The learners will be able to:
1. define cybercrime
2. identify the common cybercrimes, and
3. distinguish the common cybercrimes depicted from the given scenarios
II.CONTENT CYBERCRIMES
III. LEARNING RESOURCES
A References Empowerment Technology Module, DepEd, Schools Division of Pampanga, Visual Guide: Empowerment
Technologies, Jemma Development Group
1. Teacher’s Session Guide Page Hybris Curriculum ALS K to 12 Basic Education Curriculum: Learning Strand 6: Digital Citizenship, CS_ICT11/12-
ICTPT-Ia-b-2
2. Learner’s Material Page
3. Additional Materials form Videos downloaded from youtube.com and photos from google.com
Learning Resources (LR) Portal
4 Others
IV. PROCEDURES Teacher’s Activity Students’ Activity
A. Springboard/Motivation Preliminary Activities
(establishing a purpose for the Opening Prayer
lesson) Checking of Attendance
Good morning Class. Good morning Sir.
Before we start our discussion, I will flash on the screen
some photos, all you have to do is to analyze the photos
and tell us what can you say about it?
Are you ready?
Ok, let’s start.
Yes, Sir.
First photo flash on screen
The photo shows cyberbullying by saying hurtful words to
someone using the technology specifically the use of
social media.
Second photo flash on screen
The phot shows that you are not safe online because
someone is watching you. That is why we need to be
careful on sharing information online.
Third photo flash on screen
The phot shows that anyone of us can be harmed by
hackers and other person who has intention to destroy
our reputation or steal something from us.
B. Activity (Review of previous Presentation of the Learning Objectives
lesson/s or presenting the new 1. Identify common cybercrimes
lesson) 2. Distinguish effectively the common cybercrimes
based from the given scenarios
3. Create infographics that shows online safety.
Please read our learning objectives. Our lesson objectives are the following:
First, identify common cybercrimes
Second, distinguish effectively the common
cybercrimes based from the given scenarios
Third, create infographics that shows online safety
Are you ready now to listen? Yes, Sir!
C. Analysis (Presenting examples/ With the activity we had a while ago, have you encounter
instances of the new lesson) the same experience when you use the internet? Yes, Sir!
Can you share it with us? The learner with share their personal experiences or
other experiences to the class.
What will you do if you encounter such crimes in the I will immediately report them to the appropriate
future? authorities or organizations responsible for handling such
incidents. It’s important to act to prevent further harm and
to ensure that those responsible are held accountable.
Thank you for your active participation in our activity.
D. Discussing new concepts and What is cybercrime? (Video clip will be played)
practicing new skills, sub-activity #1
This refers to criminal activity that targets or uses a
computer or a computer network. Most cybercrime is Cybercrime is a crime committed online that will have an
committed by cybercriminals or hackers who aim to make impact to everyone’s lives. This will also damage
money, but it can also be carried out for political or someone’s reputation.
personal reasons.
E. Discussing new concept and Here are some of the cybercrimes that we may
practicing new skills; sub-activity #2 encounter:
1. Cyberstalking (Video clip will be played)
The learners will give their insights after the video has
been played.
Cyberstalking is the use of the internet or other electronic The learners will further explain their understanding on
means to stalk or harass an individual, group, or cyberstalking
organization. It may include false accusations,
defamation and libel. It may also include monitoring,
identity theft, threats, vandalism, solicitation for sex, or
gathering information that may cause or threaten,
embarrass or harass.
2. Privacy Violation (Video clip will be played)
The learners will give their insights after the video has
been played.
Most of today’s web require the use of private data to The learners will further explain their understanding on
provide users with added functionality. But low security- cyberstalking
awareness can cause improper handling of this sensitive
data. Privacy violation takes place when sensitive
information is illegally accessed by malicious attackers.
3. Cyberbullying (Video clip will be played)
The learners will give their insights after the video has
been played.
Cyberbullying or cyber harassment is a form of bullying or The learners will further explain their understanding on
harassment using electronic means. Cyberbullying is also cyberstalking
known as online bullying. It has become increasingly
common, especially among teenagers, as the digital
sphere has expanded and technology has advanced.
4. Identity Theft (Video clip will be played)
The learners will give their insights after the video has
been played.
Identity Theft occurs when someone uses another The learners will further explain their understanding on
person’s personal identifying information, like their name, cyberstalking
identifying number or credit card number without their
permission to commit fraud or other crimes
F. Abstraction (Generalizing about Now that we are done with the discussion of the common We discussed about the common crimes committed
the lesson) cybercrimes. Who can give me the summary of our using the internet which is the cyberstalking, privacy
lesson? violation, cyberbullying and identity theft.
G. Application (Developing Now, let’s test if you get concept of the common
mastery) cybercrimes that we had discussed. I will give you 10
situations or scenarios. Your task is to distinguish what
common cybercrime is appropriate in each situation. You
have 10 seconds to think and answer.
Are you ready?
Yes, Sir!
1. You noticed charges on your credit card statement for
purchases you didn’t make. Identity Theft
2. Sending intimidating or threatening messages using
email, text messages or the use of social media like Cyberbullying
Facebook, Instagram and X.
3. A social media platform is accused of selling user data
to third-party companies without obtaining proper consent Privacy Violation
from its users.
4. After ending a relationship with a person she met on a
dating app, Lena notices that Dan has been excessively Cyberstalking
messaging her, tracking her online activity, and even
creating fake profiles to monitor her interactions with
others, causing her significant distress and anxiety.
5. Creating fake profiles or accounts to impersonate and
mock someone online leading to embarrassment and Cyberbullying
distress
H. Valuing (Finding practical I will give you some tips on how to be safe online for you
applications of concepts and skills to avoid being a victim of these cybercrimes.
in daily living)
1. Be mindful on what you say online
2. Do not share your password with anyone
3. Do not talk to strangers online
4. Add friends you only know in real life
5. Avoid visiting untrusted websites
Why do we need to know these tips to be safe online? This will help to protect the users from the various online
dangers. That will help them navigate the digital world
safely.
I. Evaluation (Assessing For your quiz, answer the following questions:
Learners)
1. Which of the following defines cybercrime?
a. Cybercrimes are committed without using the
computers.
b. Cybercrimes is just a harmless prank, it’s just a bit of
fun on the internet.
c. This is a criminal activity that targets or uses a
computer or a computer network. Cybercrimes aims to
aim to make money, but it can also be carried out for
political or personal reasons. Answer: C
2. Which of the following is NOT an example of
cyberbullying?
a. Google violated children’s privacy
b. Posting embarrassing photos online
c. Sending hurtful messages Answer: A
3. Stolen debit and credit card information is used for
unauthorized transactions, leading to financial losses for
the cardholder. This scenario depicts
a. Cyberstalking
b. Identity Theft
c. Cyberbullying Answer: B
4. What cybercrime is being depicted in this scenario:
Sharing of intimate images or videos, often as an act of
revenge or harassment?
a. Cyberstalking
b. Identity Theft
c. Privacy Violation Answer: C
5. Sarah, a young professional started receiving
persistent and unwanted messages from unknown
person on her social media account. The stranger also
knows Sarah’s daily routine and activities causing her
immense distress and fear for her safety. This scenario.
Which cybercrime best describe this scenario?
a. Cyberstalking
b. Identity Theft
c. Privacy Violation Answer: A
The learners do the assessment and checked each other
work.
J. Agreement (Additional activities Create an INFORGRAPHICS that shows the tips on how
to be safe online.
INSTRUCTIONS:
a. Use any open source software in editing your
infographics.
b. The orientation of your output should be portrait
following the size of 600 pixels by 1100 pixels or 6.25
inches by 11.458 inches.
c. Your outputs will be posted on FB page with caption.
(Reminder: Avoid DOWNLOADING infographics in the
internet. Your work must be original and sources must be
properly cited.)
Rubrics:
Do you understand? Yes, Sir!
Ok, we all did well for today. Thank you for your Goodbye Sir. Thank you.
participation. Goodbye Class, see you next meeting.
V. REMARKS
VI. REFLECTION
A. No. of learners who earned
80% in the evaluation
B. No. of learners who require
additional activities for
remediation
C. Did the remedial lessons
work? No. of learners who
have caught up with the
lesson
D. No. of learners who continue
to require remediation
E. Which of my teaching
strategies worked well? Why
did these works?
F. What difficulties did I
encounter which my principal
or supervisor can help me
solve?
G. What innovation or localized
materials did I use/discover
which I wish to share with
other teachers?
Prepared by: CHRISTIAN C. MADRAZO Observed by:
Teacher I
Corroborated by: