In this level, technology acts as a direct substitute for traditional tools, with no change in function.
What is Substitution?
This first step involves identifying learners’ general characteristics, such as prior knowledge, learning styles, and motivation.
What is Analyze Learners?
This technique tricks users into downloading a helpful-looking app that’s secretly hiding malicious code.
What is Bait and Switch?
This element is about having access to technology and using it responsibly, regardless of socioeconomic status.
What is Digital Access?
This law, effective January 1, 1998, governs copyright and intellectual property in the Philippines.
What is Republic Act No. 8293?
At this stage, technology still substitutes a traditional method but offers functional improvements.
What is Augmentation?
In this step, the teacher clearly defines what learners should achieve by the end of the lesson.
What is State Objectives?
This hacking method involves stealing small data files stored in your browser to access personal credentials.
What is Cookie Theft?
This involves understanding the rights and restrictions around using digital content, such as respecting copyright laws.
What is Digital Law?
This agency is responsible for the enforcement of intellectual property rights in the Philippines.
What is the Intellectual Property Office of the Philippines (IPOPHL)?
This level of the SAMR model involves significant task redesign using technology.
What is Modification?
This step involves choosing the most suitable strategies, tools, and content to support the objectives.
What is Select Methods, Media, and Materials?
This type of attack overwhelms a server or network with traffic, sometimes using a botnet to do it.
What is a DDoS (Distributed Denial of Service) Attack?
This element covers protecting personal data and avoiding online threats like scams or identity theft.
What is Digital Security (Self-Protection)?
This type of work includes translations, adaptations, and other alterations of original literary or artistic works.
What are derivative works?
At this highest level, technology allows for the creation of entirely new tasks previously inconceivable.
What is Redefinition?
In this part of the model, the teacher plans how to prepare and implement the chosen resources during the lesson.
What is Utilize Media and Materials?
This silent form of hacking involves monitoring a connection without the victim knowing, often on public Wi-Fi.
What is Eavesdropping?
Using appropriate behavior and communication when interacting online refers to this element.
What is Digital Etiquette?
These rights include the legal and financial benefits derived from copyright ownership, such as reproduction and distribution.
What are economic rights?
These two stages in the SAMR model represent the transformation of learning through technology.
What are Modification and Redefinition?
This final step involves assessing lesson effectiveness and adjusting instruction for improvement.
What is Evaluate and Revise?
This technique sets up two connections to intercept, alter, or observe data being exchanged between two parties.
What is a Man-in-the-Middle (MitM) Attack?
These three elements of digital citizenship focus on how people live, learn, and work in a digital world: access, communication, and literacy.
What are Digital Access, Digital Communication, and Digital Literacy?
This legal doctrine allows limited use of copyrighted material without permission for purposes such as education, commentary, or criticism.
What is fair use?