AssistiveMediaApplicationslike Siri andAlexaEMPOWERMENTTechnologiesA tool thatenhancesindividualcapabilitiesVirusA type ofprogram thatreplicateonce thesoftware runMediaLiteracyThe ability topost, upload,and shareMedia andinformationonlineInformationLiteracythe ability tofind,evaluate,and useinformationPossessedObjectsAuthenticationmethod thatrequires usingcard or keysDynamicMeans that thecontent differsdepending onthe user'spreferenceWEB1.0Read-OnlyEraMalwareMaliciousSoftwaredisguising tobe alegitimate appWEB2.0UserGeneratedContentBPOReason whyPhilippineswere dubbedas "ICT hubof Asia"FacebookPrimarilyused forSocialNetworkingFolksonomyA trait thatallows theuser to usetagging (#)MediaConvergenceMergingdifferentmediaplatformsRememberthe humanGoldenrule ontheinternetOnlineSafetyPrecautionsyou shouldpracticeonlineSmartphoneExample ofEmpowermentTechnologyWEB3.0DecentralizedPrivacyThe right of theperson to denyany kind ofaccess of theirinformationNetiquetteRules of howyou shouldbehaveonline2 Stepauthenticationa feature ofdifferentwebsite thatactivates whena risk isdetectedSpamUnsolicitedemails ormessagesTimeBerners-LeeInventorofWWWOnlineSecurityUpdatingSoftwareorAntiVirusAssistiveMediaApplicationslike Siri andAlexaEMPOWERMENTTechnologiesA tool thatenhancesindividualcapabilitiesVirusA type ofprogram thatreplicateonce thesoftware runMediaLiteracyThe ability topost, upload,and shareMedia andinformationonlineInformationLiteracythe ability tofind,evaluate,and useinformationPossessedObjectsAuthenticationmethod thatrequires usingcard or keysDynamicMeans that thecontent differsdepending onthe user'spreferenceWEB1.0Read-OnlyEraMalwareMaliciousSoftwaredisguising tobe alegitimate appWEB2.0UserGeneratedContentBPOReason whyPhilippineswere dubbedas "ICT hubof Asia"FacebookPrimarilyused forSocialNetworkingFolksonomyA trait thatallows theuser to usetagging (#)MediaConvergenceMergingdifferentmediaplatformsRememberthe humanGoldenrule ontheinternetOnlineSafetyPrecautionsyou shouldpracticeonlineSmartphoneExample ofEmpowermentTechnologyWEB3.0DecentralizedPrivacyThe right of theperson to denyany kind ofaccess of theirinformationNetiquetteRules of howyou shouldbehaveonline2 Stepauthenticationa feature ofdifferentwebsite thatactivates whena risk isdetectedSpamUnsolicitedemails ormessagesTimeBerners-LeeInventorofWWWOnlineSecurityUpdatingSoftwareorAntiVirus

E-Tech Activity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Applications like Siri and Alexa
    Assistive Media
  2. A tool that enhances individual capabilities
    EMPOWERMENT Technologies
  3. A type of program that replicate once the software run
    Virus
  4. The ability to post, upload, and share Media and information online
    Media Literacy
  5. the ability to find, evaluate, and use information
    Information Literacy
  6. Authentication method that requires using card or keys
    Possessed Objects
  7. Means that the content differs depending on the user's preference
    Dynamic
  8. Read-Only Era
    WEB 1.0
  9. Malicious Software disguising to be a legitimate app
    Malware
  10. User Generated Content
    WEB 2.0
  11. Reason why Philippines were dubbed as "ICT hub of Asia"
    BPO
  12. Primarily used for Social Networking
    Facebook
  13. A trait that allows the user to use tagging (#)
    Folksonomy
  14. Merging different media platforms
    Media Convergence
  15. Golden rule on the internet
    Remember the human
  16. Precautions you should practice online
    Online Safety
  17. Example of Empowerment Technology
    Smartphone
  18. Decentralized
    WEB 3.0
  19. The right of the person to deny any kind of access of their information
    Privacy
  20. Rules of how you should behave online
    Netiquette
  21. a feature of different website that activates when a risk is detected
    2 Step authentication
  22. Unsolicited emails or messages
    Spam
  23. Inventor of WWW
    Time Berners-Lee
  24. Updating Software or AntiVirus
    Online Security