SAMR MODEL
Roles of ICT in Teaching and Learning
Edgar Dale's Cone of Experience
COMMON WALWARE TYPES: CYBERSECURITY 101
COPYRIGHT LAW
100

Who is the proponent of SAMR model? 

Dr. Ruben Puentedura

100

Technology is from the Greek word "_____," which means art or craft. 

Techne
100

Who in the proponent of this Theory? 

Edgar Dale

100

A software programs created to automatically performs specific operations.

Bots

100

An act prescribing the Intellectual Property Code and establishing the intellectual property office, providing for its power and functions, and for other purposes.

Republic Act No. 8293

200

In what stage in the SAMR MODEL that technology is directly substituted for a more traditional one. Tech act as a direct tool substitute, with no functional change. 

Substitution

200

A learning theory that focuses on observable behaviors and external stimuli.

Behaviorism

200

What are the three levels of cone experience?

1. Enactive - concrete experiences

2. Iconic - pictorial experiences

3. Symbolic - highly abstract experiences

200

It is a flaw produces an undesired outcome.

Bug

200

It is a legal protection extended to the owner of the rights in an original work he has created. 

Copyright

300

The task is the same, but the use of technology simplifies or improves the ability to complete the task. 

Augmentation

300

It refers to any product that receive, store, manipulate or retrieve data or information in a digital format.

Information and Communication Technology - ICT

300

In this level, representative models and mock-ups of reality are being used in order to provide an experience that are so closed to reality.

Contrived experiences

300

It is a form of malware that essentially hold a computer system captive while demanding a ransom.

Ransomware

300

A translation of a book into another language is an example of? 

Derivative Work

400

In what stage of SAMR MODEL, that you beginning to move from enhancement to transformation on the model.

Modification

400

It means using learning technologies to introduce, reinforce, supplement, and extended skills. 

Technology Integration

400

What level of Cone of experience, that action is removed nearly altogether and the experience is limited to thoughts and ideas. 

Symbolic

400

It is the electronic sending of mass unsolicited messages.

Spam

400

How long does the protection last of an original work or derivative work? 

Life + 50 yeas after death

500

In this stage that the students are using technology to create and collaborate in ways that would have been impossible without the tech. It transform the task itself.  

Redefinition

500

According to them, "educational technology includes all educational inventions - old and new - to satisfy our human need to learn."

Corpus & Lucido, 2015

500

According to him the Cone of Experience corresponds with three major modes of learning based on his three-tiered model of learning.

Jerome Bruner

500

It is a type of malware that functions by spying on user activity without their knowledge.

Spyware

500

It is a transfer of license to other company but there's no transfer of title. 

Transfer of Exclusive License

M
e
n
u