SAMR model
ASSURE model
ICT Policies and Safety Issues
Digital Citizenship
Copyright Law
100

In this level, technology acts as a direct substitute for traditional tools, with no change in function.

What is Substitution?

100

This first step involves identifying learners’ general characteristics, such as prior knowledge, learning styles, and motivation.

What is Analyze Learners?

100

This technique tricks users into downloading a helpful-looking app that’s secretly hiding malicious code.

What is Bait and Switch?

100

This element is about having access to technology and using it responsibly, regardless of socioeconomic status.

What is Digital Access?

100

This law, effective January 1, 1998, governs copyright and intellectual property in the Philippines.

What is Republic Act No. 8293?

200

At this stage, technology still substitutes a traditional method but offers functional improvements.

What is Augmentation?

200

In this step, the teacher clearly defines what learners should achieve by the end of the lesson.

What is State Objectives?

200

This hacking method involves stealing small data files stored in your browser to access personal credentials.

What is Cookie Theft?

200

This involves understanding the rights and restrictions around using digital content, such as respecting copyright laws.

What is Digital Law?

200

This agency is responsible for the enforcement of intellectual property rights in the Philippines.

What is the Intellectual Property Office of the Philippines (IPOPHL)?

300

This level of the SAMR model involves significant task redesign using technology.

What is Modification?

300

This step involves choosing the most suitable strategies, tools, and content to support the objectives.

What is Select Methods, Media, and Materials?

300

This type of attack overwhelms a server or network with traffic, sometimes using a botnet to do it.

What is a DDoS (Distributed Denial of Service) Attack?

300

This element covers protecting personal data and avoiding online threats like scams or identity theft.

What is Digital Security (Self-Protection)?

300

This type of work includes translations, adaptations, and other alterations of original literary or artistic works.

What are derivative works?

400

At this highest level, technology allows for the creation of entirely new tasks previously inconceivable.

What is Redefinition?

400

In this part of the model, the teacher plans how to prepare and implement the chosen resources during the lesson.

What is Utilize Media and Materials?

400

This silent form of hacking involves monitoring a connection without the victim knowing, often on public Wi-Fi.

What is Eavesdropping?

400

Using appropriate behavior and communication when interacting online refers to this element.

What is Digital Etiquette?

400

These rights include the legal and financial benefits derived from copyright ownership, such as reproduction and distribution.

What are economic rights?

500

These two stages in the SAMR model represent the transformation of learning through technology.  

What are Modification and Redefinition?

500

This final step involves assessing lesson effectiveness and adjusting instruction for improvement.

What is Evaluate and Revise?

500

This technique sets up two connections to intercept, alter, or observe data being exchanged between two parties.

What is a Man-in-the-Middle (MitM) Attack?








500

These three elements of digital citizenship focus on how people live, learn, and work in a digital world: access, communication, and literacy.

What are Digital Access, Digital Communication, and Digital Literacy?

500

This legal doctrine allows limited use of copyrighted material without permission for purposes such as education, commentary, or criticism.

What is fair use?