Roles of ICT in Teaching and Learning
ICT Policies and Safety Issues
Common Malware
Types: Cybersecurity
101
Edgar Dale's
Cone of Experience
SAMR MODEL
100

It is the branch of knowledge that deals with the creation and use of technical means.

Technology

100

It is the name given to any software that could harm a computer system, interfere with a user's data, or make the computer perform actions without the owner's knowledge or permission.

Malware

100

a software programs created to automatically perform specific operations.

Bots

100

These are first hand experiences which serve as the foundation of learning. In this level, more senses are used in order to build up the knowledge.

Direct and Purposeful Experiences

100

The SAMR Model is a framework created by?

Dr. Ruben Puentedura

200

It equates learning with changes in either the form or frequency of observable performance.

Behaviorism

200

It is a piece of software that can 'infect' a computer (install itself) and copy itself to other computers, without the user’s knowledge or permission.

Computer Virus

200

It is a flaw produces an undesired outcome.

Bug

200

In this level, representative models and mock-ups of reality are being used in order to provide an experience that are as close to reality.

Contrived Experiences

200

In what stage in the SAMR MODEL that technology is directly substituted for a more traditional one. It is a simple, bare-bones, direct replacement.

Substitution

300

It refers to those aspects of educational technology that are concerned with instruction.

Instructional technology

300

A passive technique used by hackers to listen in on a network connection and observe and record as much high-value information as possible.

Eavesdropping

300

It is a form of malware that essentially holds a computer system captive while demanding a ransom.

Ransomware

300

In this level, learners can participate in a reconstructed experience that could give them better understanding of the event or of a concept.

Dramatized Experiences

300

In what stage of SAMR MODEL, that the technology is again directly substituted for a traditional one, but with significant enhancements to the student experience.

Augmentation

400

These are channels or avenues or instruments of communication. Examples are books, magazines, newspapers, radio, television, internet, and the like. These serve educational purposes.

Educational media

400

One of the simplest and oldest hacking techniques, it allows attackers with basic software to record to a log file the strokes you make on a keyboard (or in more sophisticated cases, the clicks and movements of a mouse).

Keylogging

400

It is the electronic sending of mass unsolicited messages.

Spam

400

This level extends the learning experience through excursions and visits on the different places that are not available inside the classroom.

Field Trip

400

In what stage of SAMR MODEL, that you are beginning to move from enhancement to transformation on the model.

Modification

500

It refers to any product that can receive, store, manipulate or retrieve data or information in a digital format.

Information and Communication Technology (ICT)

500

It occurs when your browser, compromised by a virus, is hijacked without your knowledge.

Pharming

500

It is a type of malware that functions by spying on user

activity without their knowledge.

Spyware

500
Who introduced the TPACK framework?

Punya Mishra and Matthew J. Koehler

500

In what stage of SAMR MODEL, that represents the pinnacle of how technology can transform a student’s experience.

Redefinition