What is a type of malicious software designed to harm or exploit any programmable device or network?
Malware
Who developed the Cone of Experience model?
Dale
What is the first level of Bloom’s Taxonomy?
Remember
What does the ‘A’ in ADDIE stand for?
Analyze
What term describes the legal right to control the use of creative works?
Copyright
Which malware type disguises itself as legitimate software?
Trojan
According to Dale, what type of experiences are at the base of the cone?
Direct
Which level involves understanding the meaning of information?
Understand
Which model includes nine instructional events?
Gagné
What license allows creators to specify how others may use their work?
Creative Commons
What malware replicates itself to spread to other computers?
Worm
What does the Cone of Experience illustrate in terms of learning?
Abstraction
Which level requires using information in new situations?
Apply
Which model emphasizes problem-centered instruction?
Merrill
What term refers to works available for public use without restriction?
Public Domain
Which malware restricts access to data until a ransom is paid?
Ransomware
Which level involves learning through dramatized experiences?
Contrived
Which level involves breaking information into parts to explore relationships?
Analyze
In the ADDIE model, what phase comes after Design?
Develop
What is the term for using someone’s work without permission or credit?
Plagiarism
What is the term for software that secretly gathers user information without consent?
Spyware
What is the most abstract form of learning in the Cone of Experience?
Verbal
What is the highest level of Bloom’s Taxonomy?
Create
Which model focuses on iterative design and rapid prototyping?
SAM
What principle involves being safe, responsible, and ethical online?
Digital Citizenship