EdTech 111
(Blank)
Mixed
(Blank)
EdTech 112
10

Who is the proponent of the TPACK Framework? 

Punya Mishra and Matthew J. Koehler

10

The influence on the Cone of Experience is the Jerome Bruner's Theory of Instruction. What level of learning process is meant for words or visual symbols?

Symbolic Level

10

This can be used to compromise computer functions, steal data, bypass access controls, or otherwise cause harm to the host computer. This reffers to? 

Malware

10

This is an act prescribing the Intellectual Property Code and Establishing the Intellectual Property Office, providing for its powers and functions, and for other purposes? 

Republic Act No. 8293 

10

How long does the protection last in Original or Derivative works? 

Life + 50 years after death

20

Who developed the famous Cone of Experience?

Edgar Dale

20

This is commonly known as "Trojan". It is a type of malware that disguises itself as a nornal file or program to trick users unto downloading and installing malware. What kind of malware is this? 

Trojan Horse

20

This is an instructional design methodology that used to help organize and streamline the production of your course content. What is this model? 

ADDIE Model

20

This reffers to the ability to use technology and the Internet in an appropriate manner.  

Digital Citizenship

20

How long does the protection last in Works of Joint Authorship? 

Life of last surviving + 50 years after death

30

Who is the proponent of Bloom's Taxonomy?

Benjamin Bloom

30

Who created the framework of SAMR Model?

Dr. Ruben Puentedura

30

How long does the protection last in Anonymous or Pseudonymous works? 

50 years from publication or making

30

This is the legal protection extended to the owner of the rights in an original workthat he has created? 

Copyright

30

This reffers as to how you treat other Internet users with respect and avoiding inappropriate behavior? 

Digital Etiquette 

40

Who is the two proponents of the revised Bloom's Taxonomy? 

Lorin Anderson and David Krathwohl

40

This is a type of malware that automatically delivers advertisements. 

Adware

40

This is first introduced in Dale's 1946 book, "Audio-Visual Methods in Teaching"? 

Dale's Cone of Experiences 

40

This is any copying or copyrighted material done for a limited and transformative purpose, such as to comment upon, criticize or parody a copyrighted work. This reffers to? 

Fair use

40

This is the ability to learn how to use technology and access information online. This reffers to? 

Digital Literacy

50

The six levels of progress from simple to more complex levels of thinking, the last three referred to as? 

Higher Order Thinking Skills / HOTS

50

Who is the proponent of the 5 principles of instruction: problem-centered, activation, demonstration, application and integration?

M. David Merril

50

This is the electronic sending of mass unsolicited messages. This happens when computers are infected viruses, worms or other malware that are used to distribute messages containing more malware. This reffers to? 

Spam

50

What Republic Act is the amendment of the Intellectual Property Code?

Republic Act No. 10372

50

This is a form of malware that essentially holds a computer system captive while demanding a ransom. This reffers to what kind of malware? 

Ransonware