IT in support of student-centered learning
Digital Citizenship
Computer Assisted Instruction
Educational Technology
Educational Technology
100

What is the role of educators in the Student-centered Class?

Facilitator 

100

How many elements does Digital Citizenship have?

9 Elements

100

Give an example of tools for designing Computer Assisted Instruction

Text                  Multiple choice

Audio                        Exercises

Video                 Chat Sessions

Tests         Immediate Feedback

Problems                   Webcams

100

Give an example of things you must do or avoid to help prevent a virus infecting your computer.

Install anti-virus

Install anti-malware 

Never download software

Don't open email attachments

Don't Click links in website


100

It affects millions of people every year and occurs when a fraudster steals your identity—by gaining access to your personally identifiable information (PII)—to commit fraud.

Identity Theft

200

Classrooms are arranged in neat columns and rows of chairs for the students while the teacher discusses in front. 

Traditional Class

200

It refers to selling and buying things online. 

Digital Commerce

200

Give one method of delivery in Computer Assisted instruction

Drill and Practice                   Tutorial

Simulation Activities              Games

Problem Solving                Discovery

200

It is the name given to any software that could harm a computer system, interfere with a user's data, or make the computer perform actions without the owner's knowledge or permission.

Malware

200

One of the simplest and oldest hacking techniques, it allows attackers with basic software to record to a log file the strokes you make on a keyboard (or in more sophisticated cases, the clicks and movements of a mouse). These log files may hold sensitive data like passwords and user names.

Keylogging

300

In this classroom, students are active learners who can interact with other learners and demonstrate independence and self-awareness in the learning process.

Student-centered Class 

300

The ability to connect with others or access information using technology.

Digital Access

300

It is an interactive instructional technique whereby a computer is used to present the instructional material and monitor the learning that takes place.

Computer Assisted Intruction

300

It is a piece of software that can 'infect' a computer (install itself) and copy itself to other computers, without the user’s knowledge or permission.

Virus

300

A classic Hacking technique used to bring down systems or networks, by overloading them with login attempts, data requests, repetitive tasks, etc.

Denial of Service/Distributed Denial of Service
400

Who described traditional learning as a process in which teachers pour information to the learners?

John Dewey

400

It refers to the privileges that all users have while using the internet and their duty to make sure that these rights remain available for everyone by treating other users fairly and respecting their privacy.

Digital Rights and Responsibility

400

Best method for material that requires repeated practice to master (ex: multiplication tables)

Drill and Practice

400

It is the act of finding the possible entry points that exist in a computer system or a computer network and finally entering into them.  It is usually done to gain unauthorized access to a computer system or a computer network, either to harm the systems or to steal sensitive information available on the computer.

Hacking

400

It is scamming you with links to steal your important information. It could be an email that looks like it came from a bank or could be a link that seems to force you to sign in again to your account. The Sender, in this case, gets access to your accounts and important information by directing you to a site or link and making you share your account details (QualiSpace, 2017).

Phishing and Related Phenomena

500

Give an example of characteristics of the new school classroom environment 

Preparing PPT

Searching for information in the Internet

Brainstorming on ideas


500

What are the 9 Elements of Digital Citizenship

Digital Access                Digital Literacy

Digital Etiquette             Digital Law

Digital Commerce          Digital Communication 

Digital Rights and Responsibility

Digital Health and Wellness     Digital Security

500

One of the method of delivery in which it provides a real-life scenario with the material to be learned being applied as it would in the real world

Simulation

500

A type of Hacker who is also known as crackers, is those who hack to gain unauthorized access to a system and harm its operations or steal sensitive information.

Black Hat Hackers

500

Give one example of hazards linked with using computers and ICT devices

Repetitive Strain Injuries

Back and Neck Problems

Eye Strain and Headaches

Electrocution

Tripping over wires