Who is the proponent of the TPACK Framework?
Punya Mishra and Matthew J. Koehler
The influence on the Cone of Experience is the Jerome Bruner's Theory of Instruction. What level of learning process is meant for words or visual symbols?
Symbolic Level
This can be used to compromise computer functions, steal data, bypass access controls, or otherwise cause harm to the host computer. This reffers to?
Malware
This is an act prescribing the Intellectual Property Code and Establishing the Intellectual Property Office, providing for its powers and functions, and for other purposes?
Republic Act No. 8293
How long does the protection last in Original or Derivative works?
Life + 50 years after death
Who developed the famous Cone of Experience?
Edgar Dale
This is commonly known as "Trojan". It is a type of malware that disguises itself as a nornal file or program to trick users unto downloading and installing malware. What kind of malware is this?
Trojan Horse
This is an instructional design methodology that used to help organize and streamline the production of your course content. What is this model?
ADDIE Model
This reffers to the ability to use technology and the Internet in an appropriate manner.
Digital Citizenship
How long does the protection last in Works of Joint Authorship?
Life of last surviving + 50 years after death
Who is the proponent of Bloom's Taxonomy?
Benjamin Bloom
Who created the framework of SAMR Model?
Dr. Ruben Puentedura
How long does the protection last in Anonymous or Pseudonymous works?
50 years from publication or making
This is the legal protection extended to the owner of the rights in an original workthat he has created?
Copyright
This reffers as to how you treat other Internet users with respect and avoiding inappropriate behavior?
Digital Etiquette
Who is the two proponents of the revised Bloom's Taxonomy?
Lorin Anderson and David Krathwohl
This is a type of malware that automatically delivers advertisements.
Adware
This is first introduced in Dale's 1946 book, "Audio-Visual Methods in Teaching"?
Dale's Cone of Experiences
This is any copying or copyrighted material done for a limited and transformative purpose, such as to comment upon, criticize or parody a copyrighted work. This reffers to?
Fair use
This is the ability to learn how to use technology and access information online. This reffers to?
Digital Literacy
The six levels of progress from simple to more complex levels of thinking, the last three referred to as?
Higher Order Thinking Skills / HOTS
Who is the proponent of the 5 principles of instruction: problem-centered, activation, demonstration, application and integration?
M. David Merril
This is the electronic sending of mass unsolicited messages. This happens when computers are infected viruses, worms or other malware that are used to distribute messages containing more malware. This reffers to?
Spam
What Republic Act is the amendment of the Intellectual Property Code?
Republic Act No. 10372
This is a form of malware that essentially holds a computer system captive while demanding a ransom. This reffers to what kind of malware?
Ransonware