VirusA type ofprogram thatreplicateonce thesoftware runWEB3.0DecentralizedWEB2.0UserGeneratedContentWEB1.0Read-OnlyEraInformationLiteracythe ability tofind,evaluate,and useinformationOnlineSecurityUpdatingSoftwareorAntiVirusAssistiveMediaApplicationslike Siri andAlexaSmartphoneExample ofEmpowermentTechnologyDynamicMeans that thecontent differsdepending onthe user'spreference2 Stepauthenticationa feature ofdifferentwebsite thatactivates whena risk isdetectedMediaConvergenceMergingdifferentmediaplatformsNetiquetteRules of howyou shouldbehaveonlineEMPOWERMENTTechnologiesA tool thatenhancesindividualcapabilitiesTimeBerners-LeeInventorofWWWSpamUnsolicitedemails ormessagesMalwareMaliciousSoftwaredisguising tobe alegitimate appFacebookPrimarilyused forSocialNetworkingPossessedObjectsAuthenticationmethod thatrequires usingcard or keysFolksonomyA trait thatallows theuser to usetagging (#)MediaLiteracyThe ability topost, upload,and shareMedia andinformationonlinePrivacyThe right of theperson to denyany kind ofaccess of theirinformationRememberthe humanGoldenrule ontheinternetBPOReason whyPhilippineswere dubbedas "ICT hubof Asia"OnlineSafetyPrecautionsyou shouldpracticeonlineVirusA type ofprogram thatreplicateonce thesoftware runWEB3.0DecentralizedWEB2.0UserGeneratedContentWEB1.0Read-OnlyEraInformationLiteracythe ability tofind,evaluate,and useinformationOnlineSecurityUpdatingSoftwareorAntiVirusAssistiveMediaApplicationslike Siri andAlexaSmartphoneExample ofEmpowermentTechnologyDynamicMeans that thecontent differsdepending onthe user'spreference2 Stepauthenticationa feature ofdifferentwebsite thatactivates whena risk isdetectedMediaConvergenceMergingdifferentmediaplatformsNetiquetteRules of howyou shouldbehaveonlineEMPOWERMENTTechnologiesA tool thatenhancesindividualcapabilitiesTimeBerners-LeeInventorofWWWSpamUnsolicitedemails ormessagesMalwareMaliciousSoftwaredisguising tobe alegitimate appFacebookPrimarilyused forSocialNetworkingPossessedObjectsAuthenticationmethod thatrequires usingcard or keysFolksonomyA trait thatallows theuser to usetagging (#)MediaLiteracyThe ability topost, upload,and shareMedia andinformationonlinePrivacyThe right of theperson to denyany kind ofaccess of theirinformationRememberthe humanGoldenrule ontheinternetBPOReason whyPhilippineswere dubbedas "ICT hubof Asia"OnlineSafetyPrecautionsyou shouldpracticeonline

E-Tech Activity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. A type of program that replicate once the software run
    Virus
  2. Decentralized
    WEB 3.0
  3. User Generated Content
    WEB 2.0
  4. Read-Only Era
    WEB 1.0
  5. the ability to find, evaluate, and use information
    Information Literacy
  6. Updating Software or AntiVirus
    Online Security
  7. Applications like Siri and Alexa
    Assistive Media
  8. Example of Empowerment Technology
    Smartphone
  9. Means that the content differs depending on the user's preference
    Dynamic
  10. a feature of different website that activates when a risk is detected
    2 Step authentication
  11. Merging different media platforms
    Media Convergence
  12. Rules of how you should behave online
    Netiquette
  13. A tool that enhances individual capabilities
    EMPOWERMENT Technologies
  14. Inventor of WWW
    Time Berners-Lee
  15. Unsolicited emails or messages
    Spam
  16. Malicious Software disguising to be a legitimate app
    Malware
  17. Primarily used for Social Networking
    Facebook
  18. Authentication method that requires using card or keys
    Possessed Objects
  19. A trait that allows the user to use tagging (#)
    Folksonomy
  20. The ability to post, upload, and share Media and information online
    Media Literacy
  21. The right of the person to deny any kind of access of their information
    Privacy
  22. Golden rule on the internet
    Remember the human
  23. Reason why Philippines were dubbed as "ICT hub of Asia"
    BPO
  24. Precautions you should practice online
    Online Safety