the instructional design methodology used to help organize and streamline the production of your course content.
what is addie model?
the technology acts as direct substitute , with no functional change
what is substation?
the type of malware that functions by spying on user activity without their knowledge.
what is spyware?
the Higher level of thinking is when students put together elements of what has been learned in a new way.
what is synthesis?
the combination of some of the first levels in the cone.
what is exhibits?
what is modification?
The short for advertising-supported software
what is adware?
the most common types of malware.
what is worm?
the new group of experts to work together.
what is Lorin Anderson and David Krathwohl?
the level, the learning experience will not be limited to the classroom setting but rather extended in a more complex environment.
what is field trip?
the technology act as direct substitute
what is augmentation?
The malware that essentially holds a computer system captive while demanding
what is ransomware?
the increased CPU usage, Problems connecting to networks
what is malware symptoms?
the process of implementing the design plans.
what is instructional development?
The learners can participate in a reconstructed experience that could give them better understanding of the event or of a concept.
what is dramatized experiences?
The technology allows for the creation of new task
what is redefinition?
The type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
what is rootkit?
the definition or principles that facilitate learning
what is knowledge?
the prior knowledge, skills and attitudes
what is Specific competency levels?
The representative of models and mock-ups of reality are being used in order to provide an experience that are as close to reality.
what is Contrived Experiences?
The Practice must be completed by taking several opportunities to use new skills to solve a variety of problems.
What is varied problems?
the type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware.
what is trojan horse?
the depth understanding and mastery of these applied concepts
what is analysis?
the perceptual preferences and strengths, information processing habits
what is learning style?
the knowledge that is basic to specific disciplines.
what is functional knowledge?