What is the role of educators in the Student-centered Class?
Facilitator
How many elements does Digital Citizenship have?
9 Elements
Give an example of tools for designing Computer Assisted Instruction
Text Multiple choice
Audio Exercises
Video Chat Sessions
Tests Immediate Feedback
Problems Webcams
Give an example of things you must do or avoid to help prevent a virus infecting your computer.
Install anti-virus
Install anti-malware
Never download software
Don't open email attachments
Don't Click links in website
It affects millions of people every year and occurs when a fraudster steals your identity—by gaining access to your personally identifiable information (PII)—to commit fraud.
Identity Theft
Classrooms are arranged in neat columns and rows of chairs for the students while the teacher discusses in front.
Traditional Class
It refers to selling and buying things online.
Digital Commerce
Give one method of delivery in Computer Assisted instruction
Drill and Practice Tutorial
Simulation Activities Games
Problem Solving Discovery
It is the name given to any software that could harm a computer system, interfere with a user's data, or make the computer perform actions without the owner's knowledge or permission.
Malware
One of the simplest and oldest hacking techniques, it allows attackers with basic software to record to a log file the strokes you make on a keyboard (or in more sophisticated cases, the clicks and movements of a mouse). These log files may hold sensitive data like passwords and user names.
Keylogging
In this classroom, students are active learners who can interact with other learners and demonstrate independence and self-awareness in the learning process.
Student-centered Class
The ability to connect with others or access information using technology.
Digital Access
It is an interactive instructional technique whereby a computer is used to present the instructional material and monitor the learning that takes place.
Computer Assisted Intruction
It is a piece of software that can 'infect' a computer (install itself) and copy itself to other computers, without the user’s knowledge or permission.
Virus
A classic Hacking technique used to bring down systems or networks, by overloading them with login attempts, data requests, repetitive tasks, etc.
Who described traditional learning as a process in which teachers pour information to the learners?
John Dewey
It refers to the privileges that all users have while using the internet and their duty to make sure that these rights remain available for everyone by treating other users fairly and respecting their privacy.
Digital Rights and Responsibility
Best method for material that requires repeated practice to master (ex: multiplication tables)
Drill and Practice
It is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them. It is usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer.
Hacking
It is scamming you with links to steal your important information. It could be an email that looks like it came from a bank or could be a link that seems to force you to sign in again to your account. The Sender, in this case, gets access to your accounts and important information by directing you to a site or link and making you share your account details (QualiSpace, 2017).
Phishing and Related Phenomena
Give an example of characteristics of the new school classroom environment
Preparing PPT
Searching for information in the Internet
Brainstorming on ideas
What are the 9 Elements of Digital Citizenship
Digital Access Digital Literacy
Digital Etiquette Digital Law
Digital Commerce Digital Communication
Digital Rights and Responsibility
Digital Health and Wellness Digital Security
One of the method of delivery in which it provides a real-life scenario with the material to be learned being applied as it would in the real world
Simulation
A type of Hacker who is also known as crackers, is those who hack to gain unauthorized access to a system and harm its operations or steal sensitive information.
Black Hat Hackers
Give one example of hazards linked with using computers and ICT devices
Repetitive Strain Injuries
Back and Neck Problems
Eye Strain and Headaches
Electrocution
Tripping over wires