PrivacyThe right of theperson to denyany kind ofaccess of theirinformationAssistiveMediaApplicationslike Siri andAlexaRememberthe humanGoldenrule ontheinternetTimeBerners-LeeInventorofWWWNetiquetteRules of howyou shouldbehaveonlineMalwareMaliciousSoftwaredisguising tobe alegitimate appFacebookPrimarilyused forSocialNetworkingInformationLiteracythe ability tofind,evaluate,and useinformationEMPOWERMENTTechnologiesA tool thatenhancesindividualcapabilitiesOnlineSafetyPrecautionsyou shouldpracticeonlineWEB2.0UserGeneratedContentMediaLiteracyThe ability topost, upload,and shareMedia andinformationonlineFolksonomyA trait thatallows theuser to usetagging (#)SpamUnsolicitedemails ormessages2 Stepauthenticationa feature ofdifferentwebsite thatactivates whena risk isdetectedWEB3.0DecentralizedOnlineSecurityUpdatingSoftwareorAntiVirusPossessedObjectsAuthenticationmethod thatrequires usingcard or keysWEB1.0Read-OnlyEraMediaConvergenceMergingdifferentmediaplatformsVirusA type ofprogram thatreplicateonce thesoftware runBPOReason whyPhilippineswere dubbedas "ICT hubof Asia"DynamicMeans that thecontent differsdepending onthe user'spreferenceSmartphoneExample ofEmpowermentTechnologyPrivacyThe right of theperson to denyany kind ofaccess of theirinformationAssistiveMediaApplicationslike Siri andAlexaRememberthe humanGoldenrule ontheinternetTimeBerners-LeeInventorofWWWNetiquetteRules of howyou shouldbehaveonlineMalwareMaliciousSoftwaredisguising tobe alegitimate appFacebookPrimarilyused forSocialNetworkingInformationLiteracythe ability tofind,evaluate,and useinformationEMPOWERMENTTechnologiesA tool thatenhancesindividualcapabilitiesOnlineSafetyPrecautionsyou shouldpracticeonlineWEB2.0UserGeneratedContentMediaLiteracyThe ability topost, upload,and shareMedia andinformationonlineFolksonomyA trait thatallows theuser to usetagging (#)SpamUnsolicitedemails ormessages2 Stepauthenticationa feature ofdifferentwebsite thatactivates whena risk isdetectedWEB3.0DecentralizedOnlineSecurityUpdatingSoftwareorAntiVirusPossessedObjectsAuthenticationmethod thatrequires usingcard or keysWEB1.0Read-OnlyEraMediaConvergenceMergingdifferentmediaplatformsVirusA type ofprogram thatreplicateonce thesoftware runBPOReason whyPhilippineswere dubbedas "ICT hubof Asia"DynamicMeans that thecontent differsdepending onthe user'spreferenceSmartphoneExample ofEmpowermentTechnology

E-Tech Activity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. The right of the person to deny any kind of access of their information
    Privacy
  2. Applications like Siri and Alexa
    Assistive Media
  3. Golden rule on the internet
    Remember the human
  4. Inventor of WWW
    Time Berners-Lee
  5. Rules of how you should behave online
    Netiquette
  6. Malicious Software disguising to be a legitimate app
    Malware
  7. Primarily used for Social Networking
    Facebook
  8. the ability to find, evaluate, and use information
    Information Literacy
  9. A tool that enhances individual capabilities
    EMPOWERMENT Technologies
  10. Precautions you should practice online
    Online Safety
  11. User Generated Content
    WEB 2.0
  12. The ability to post, upload, and share Media and information online
    Media Literacy
  13. A trait that allows the user to use tagging (#)
    Folksonomy
  14. Unsolicited emails or messages
    Spam
  15. a feature of different website that activates when a risk is detected
    2 Step authentication
  16. Decentralized
    WEB 3.0
  17. Updating Software or AntiVirus
    Online Security
  18. Authentication method that requires using card or keys
    Possessed Objects
  19. Read-Only Era
    WEB 1.0
  20. Merging different media platforms
    Media Convergence
  21. A type of program that replicate once the software run
    Virus
  22. Reason why Philippines were dubbed as "ICT hub of Asia"
    BPO
  23. Means that the content differs depending on the user's preference
    Dynamic
  24. Example of Empowerment Technology
    Smartphone