Types: Cybersecurity 101
It is short for malicious software, that can be used to compromise computer function, steal data, by pass access controls, or otherwise cost harm to the host computer.
Malware
It is a systemic and systematic application of strategies and techniques derived from behavioral, cognitive, and constructivist theories to the solution of instructional problems.
Instructional Technology
It refers to the technologies and methods used to store, transmit, and retrieve information, as well as facilitate communication and collaboration.
Information and Communication Technology (ICT)
It is the electronic exchange of information.
Digital Communication
It is the best method for material that requires repeated practice to master ( ex: Multiplication tables)
Drill-and-Practice
It is a type of malicious software designed to remotely access or control a computer without being detected by users or security programs.
Rootkit
It is the process of implementing the design plans.
Instructional Development
It is a learning theory that focuses on observable behaviors and external stimuli.
Behaviorism
The standards of conduct expected by other digital technology users.
Digital Etiquette
It is the instructional material to create a contest for the learner.
Games
A type of malware that disguises itself as a normal fike or program to trick users into downloading and installing malware.
Trojan Horse
It is an Instructional Systems Design (ISD) process which has been adapted to be used in the learning and teaching in the classroom.
ASSURE MODEL
It is focuses on the mental processes involved in learning, such as memory, attention, and problem-solving.
Cognitivism
It is the protection of psychological and physical well-being while using the internet.
Digital Health and Wellness
It combines presentation of material with drill-and-practice, games, or a simulation to emphasize material and assist in learning.
Tutorial
It is a type of malware that automatically delivers advertisements.
Adware
It is a systematic development of instructional specifications using learning and instructional theory to ensure the quality of instruction.
Instructional Design
It focuses on the active construction of knowledge by learners. It highlights the importance of hands-on experiences, collaboration, and the social nature of learning.
Constructivism
The capability to use digital technology and knowing when and how to use it.
Digital Literacy
Provides the learner with an opportunity to draw his own conclusions.
Discovery
It is a type of malware that functions by spying on user activity without their knowledge.
Spyware
Who develop the ASSURE MODEL?
Heinich, Molenda, Russell & Smaldino (2002)
It refers to the use of technology in education to enhance teaching and learning experiences.
Educational technology
The legal rights and restrictions governing technology use.
Digital Law
A interactive instructional technique whereby a computer is used to present the instructional material and monitor the learning that takes place.
CAI (Computer Assisted Instruction)