MalwareMaliciousSoftwaredisguising tobe alegitimate appWEB2.0UserGeneratedContentVirusA type ofprogram thatreplicateonce thesoftware runSpamUnsolicitedemails ormessagesBPOReason whyPhilippineswere dubbedas "ICT hubof Asia"WEB3.0DecentralizedPrivacyThe right of theperson to denyany kind ofaccess of theirinformationFacebookPrimarilyused forSocialNetworkingTimeBerners-LeeInventorofWWWNetiquetteRules of howyou shouldbehaveonlineDynamicMeans that thecontent differsdepending onthe user'spreferenceMediaConvergenceMergingdifferentmediaplatformsFolksonomyA trait thatallows theuser to usetagging (#)OnlineSecurityUpdatingSoftwareorAntiVirusAssistiveMediaApplicationslike Siri andAlexaOnlineSafetyPrecautionsyou shouldpracticeonlineMediaLiteracyThe ability topost, upload,and shareMedia andinformationonlinePossessedObjectsAuthenticationmethod thatrequires usingcard or keysWEB1.0Read-OnlyEraRememberthe humanGoldenrule ontheinternetEMPOWERMENTTechnologiesA tool thatenhancesindividualcapabilitiesSmartphoneExample ofEmpowermentTechnologyInformationLiteracythe ability tofind,evaluate,and useinformation2 Stepauthenticationa feature ofdifferentwebsite thatactivates whena risk isdetectedMalwareMaliciousSoftwaredisguising tobe alegitimate appWEB2.0UserGeneratedContentVirusA type ofprogram thatreplicateonce thesoftware runSpamUnsolicitedemails ormessagesBPOReason whyPhilippineswere dubbedas "ICT hubof Asia"WEB3.0DecentralizedPrivacyThe right of theperson to denyany kind ofaccess of theirinformationFacebookPrimarilyused forSocialNetworkingTimeBerners-LeeInventorofWWWNetiquetteRules of howyou shouldbehaveonlineDynamicMeans that thecontent differsdepending onthe user'spreferenceMediaConvergenceMergingdifferentmediaplatformsFolksonomyA trait thatallows theuser to usetagging (#)OnlineSecurityUpdatingSoftwareorAntiVirusAssistiveMediaApplicationslike Siri andAlexaOnlineSafetyPrecautionsyou shouldpracticeonlineMediaLiteracyThe ability topost, upload,and shareMedia andinformationonlinePossessedObjectsAuthenticationmethod thatrequires usingcard or keysWEB1.0Read-OnlyEraRememberthe humanGoldenrule ontheinternetEMPOWERMENTTechnologiesA tool thatenhancesindividualcapabilitiesSmartphoneExample ofEmpowermentTechnologyInformationLiteracythe ability tofind,evaluate,and useinformation2 Stepauthenticationa feature ofdifferentwebsite thatactivates whena risk isdetected

E-Tech Activity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Malicious Software disguising to be a legitimate app
    Malware
  2. User Generated Content
    WEB 2.0
  3. A type of program that replicate once the software run
    Virus
  4. Unsolicited emails or messages
    Spam
  5. Reason why Philippines were dubbed as "ICT hub of Asia"
    BPO
  6. Decentralized
    WEB 3.0
  7. The right of the person to deny any kind of access of their information
    Privacy
  8. Primarily used for Social Networking
    Facebook
  9. Inventor of WWW
    Time Berners-Lee
  10. Rules of how you should behave online
    Netiquette
  11. Means that the content differs depending on the user's preference
    Dynamic
  12. Merging different media platforms
    Media Convergence
  13. A trait that allows the user to use tagging (#)
    Folksonomy
  14. Updating Software or AntiVirus
    Online Security
  15. Applications like Siri and Alexa
    Assistive Media
  16. Precautions you should practice online
    Online Safety
  17. The ability to post, upload, and share Media and information online
    Media Literacy
  18. Authentication method that requires using card or keys
    Possessed Objects
  19. Read-Only Era
    WEB 1.0
  20. Golden rule on the internet
    Remember the human
  21. A tool that enhances individual capabilities
    EMPOWERMENT Technologies
  22. Example of Empowerment Technology
    Smartphone
  23. the ability to find, evaluate, and use information
    Information Literacy
  24. a feature of different website that activates when a risk is detected
    2 Step authentication