WEB3.0DecentralizedWEB2.0UserGeneratedContentWEB1.0Read-OnlyEraTimeBerners-LeeInventorofWWWMediaLiteracyThe ability topost, upload,and shareMedia andinformationonlineFolksonomyA trait thatallows theuser to usetagging (#)OnlineSecurityUpdatingSoftwareorAntiVirusOnlineSafetyPrecautionsyou shouldpracticeonlineInformationLiteracythe ability tofind,evaluate,and useinformationDynamicMeans that thecontent differsdepending onthe user'spreferenceFacebookPrimarilyused forSocialNetworkingSmartphoneExample ofEmpowermentTechnologyBPOReason whyPhilippineswere dubbedas "ICT hubof Asia"PossessedObjectsAuthenticationmethod thatrequires usingcard or keysEMPOWERMENTTechnologiesA tool thatenhancesindividualcapabilitiesMediaConvergenceMergingdifferentmediaplatformsNetiquetteRules of howyou shouldbehaveonlinePrivacyThe right of theperson to denyany kind ofaccess of theirinformationSpamUnsolicitedemails ormessagesRememberthe humanGoldenrule ontheinternetAssistiveMediaApplicationslike Siri andAlexaMalwareMaliciousSoftwaredisguising tobe alegitimate app2 Stepauthenticationa feature ofdifferentwebsite thatactivates whena risk isdetectedVirusA type ofprogram thatreplicateonce thesoftware runWEB3.0DecentralizedWEB2.0UserGeneratedContentWEB1.0Read-OnlyEraTimeBerners-LeeInventorofWWWMediaLiteracyThe ability topost, upload,and shareMedia andinformationonlineFolksonomyA trait thatallows theuser to usetagging (#)OnlineSecurityUpdatingSoftwareorAntiVirusOnlineSafetyPrecautionsyou shouldpracticeonlineInformationLiteracythe ability tofind,evaluate,and useinformationDynamicMeans that thecontent differsdepending onthe user'spreferenceFacebookPrimarilyused forSocialNetworkingSmartphoneExample ofEmpowermentTechnologyBPOReason whyPhilippineswere dubbedas "ICT hubof Asia"PossessedObjectsAuthenticationmethod thatrequires usingcard or keysEMPOWERMENTTechnologiesA tool thatenhancesindividualcapabilitiesMediaConvergenceMergingdifferentmediaplatformsNetiquetteRules of howyou shouldbehaveonlinePrivacyThe right of theperson to denyany kind ofaccess of theirinformationSpamUnsolicitedemails ormessagesRememberthe humanGoldenrule ontheinternetAssistiveMediaApplicationslike Siri andAlexaMalwareMaliciousSoftwaredisguising tobe alegitimate app2 Stepauthenticationa feature ofdifferentwebsite thatactivates whena risk isdetectedVirusA type ofprogram thatreplicateonce thesoftware run

E-Tech Activity - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Decentralized
    WEB 3.0
  2. User Generated Content
    WEB 2.0
  3. Read-Only Era
    WEB 1.0
  4. Inventor of WWW
    Time Berners-Lee
  5. The ability to post, upload, and share Media and information online
    Media Literacy
  6. A trait that allows the user to use tagging (#)
    Folksonomy
  7. Updating Software or AntiVirus
    Online Security
  8. Precautions you should practice online
    Online Safety
  9. the ability to find, evaluate, and use information
    Information Literacy
  10. Means that the content differs depending on the user's preference
    Dynamic
  11. Primarily used for Social Networking
    Facebook
  12. Example of Empowerment Technology
    Smartphone
  13. Reason why Philippines were dubbed as "ICT hub of Asia"
    BPO
  14. Authentication method that requires using card or keys
    Possessed Objects
  15. A tool that enhances individual capabilities
    EMPOWERMENT Technologies
  16. Merging different media platforms
    Media Convergence
  17. Rules of how you should behave online
    Netiquette
  18. The right of the person to deny any kind of access of their information
    Privacy
  19. Unsolicited emails or messages
    Spam
  20. Golden rule on the internet
    Remember the human
  21. Applications like Siri and Alexa
    Assistive Media
  22. Malicious Software disguising to be a legitimate app
    Malware
  23. a feature of different website that activates when a risk is detected
    2 Step authentication
  24. A type of program that replicate once the software run
    Virus