Reviewer Living in The Information Technology Era 1
Reviewer Living in The Information Technology Era 1
Communication
● We all know that ICT takes a major role for us by means of communicating, way back in the past
our parents used to make letters and send it via post mail. But now with the help of ICT it is
easier to communicate with our loved ones. We can use cellular phones that are designed for
communicating with other people even if they are miles away from you. Nowadays people are in
touch with the help of ICT. Through chatting, E-mail, voice mail and social networking people
communicate with each other. It is the cheapest means of communication.
● ICT allows students to monitor and manage their own learning, think critically and creatively,
solve simulated real-world problems, work collaboratively, engage in ethical decision-making,
and adopt a global perspective towards issues and ideas. It also provides students from remote
areas access to expert teachers and learning resources, and gives 14 administrators and policy
makers the data and expertise they need to work more efficiently.
Job Opportunities
● In the employment sector, ICT enables organizations to operate more efficiently, so employing
staff with ICT skills is vital to the smooth running of any business. Being able to use ICT systems
effectively allows employees more time to concentrate on areas of their job role that require soft
skills.
● For example, many pharmacies use robot technology to assist with picking prescribed drugs. This
allows highly trained pharmaceutical staff to focus on jobs requiring human intelligence and
interaction, such as dispensing and checking medication.
● Nowadays, employers expect their staff to have basic ICT skills. This expectation even applies to
job roles where ICT skills may not have been an essential requirement in the past and finding a
job is different, you can just use your smartphone, laptop, desktop or any gadgets that are
available in the comfort of your home.
Education
● Social media has changed the world. The rapid and vast adoption of these technologies 15 is
changing how we find partners, how we access information from the news, and how we organize
to demand political change.
● The internet and social media provide young people with a range of benefits, and opportunities
to empower themselves in a variety of ways. Young people can maintain social connections and
support networks that otherwise wouldn't be possible and can access more information than ever
before. The communities and social interactions young people form online can be invaluable for
bolstering and developing young people's self-confidence and social skills.
● As the ICT has become ubiquitous, faster and increasingly accessible to non-technical
communities, social networking and collaborative services have grown rapidly enabling people
to communicate and share interest in many more ways, sites like Facebook, Twitter LinkedIn You
tube, Flicker, second life delicious blogs wikis and many more let people of all ages rapidly share
their interest of the movement without others everywhere. But Facebook seems to be the leading
area where people communicate and share their opinions. What a change! “Nothing is
permanent, but change” (As Herodotus in the 4th century BC). The Internet can be seen as the
international networks of interconnection of computer networks. The main purpose for the
institution of the internet are quest for information i.e. browsing, electronic mail, new groups fill
transfer and access and use of other computers. Socialization can be seen as a process by which a
child adapts a behavior to be an effective member of the society, which can only be achieved
through learning or education.
Socializing
● Social media has changed the world. The rapid and vast adoption of these technologies 15 is
changing how we find partners, how we access information from the news, and how we organize
to demand political change. The internet and social media provide young people with a range of
benefits, and opportunities to empower themselves in a variety of ways. Young people can
maintain social connections and support networks that otherwise wouldn't be possible and can
access more information than ever before.
● The communities and social interactions young people form online can be invaluable for
bolstering and developing young people's self-confidence and social skills. As the ICT has
become ubiquitous, faster and increasingly accessible to non-technical communities, social
networking and collaborative services have grown rapidly enabling people to communicate and
share interest in many more ways, sites like Facebook, Twitter LinkedIn You tube, Flicker, second
life delicious blogs wikis and many more let people of all ages rapidly share their interest of the
movement without others everywhere. But Facebook seems to be the leading area where people
communicate and share their opinions. What a change! “Nothing is permanent, but change” (As
Herodotus in the 4th century BC).
● The Internet can be seen as the international network of interconnection of computer networks,
the main purpose for the institution of the internet is the quest for information i.e. browsing,
electronic mail, new groups, fill transfer and access and use of other computers. Socialization can
be seen as a process by which a child adapts a behavior to be an effective member of the society,
which can only be achieved through learning or education.
Negative Impacts
● Job Loss: Manual operations being replaced by automation. e.g. robots replacing people on an
assembly line. Job export. e.g. Data processing work being sent to other countries where
operating costs are lower. Multiple workers being replaced by a smaller number who are able to
do the same amount of work. e.g. A worker on a supermarket checkout can serve more customers
per hour if a bar-code scanner linked to a computerized till is used to detect goods instead of the
worker having to enter the item and price manually.
● Reduced Personal Interaction: Most people need some form of social interaction in their daily
lives and if they do not get the chance to meet and talk with other people they may feel isolated
and unhappy.
● Reduced Physical Activity: This can lead to health problems such as obesity, heart disease, and
diabetes.
● Cost: A lot of ICT hardware and software is expensive, both to purchase and to maintain. An ICT
system usually requires specialist staff to run it and there is also the challenge of keeping up with
ever-changing technology.
● Competition: this is usually thought of as being a good thing, but for some organizations being
exposed to greater competition can be a problem. If the organization is competing for customers,
donations, or other means of funding nationally or even internationally, they may lose out to
other organizations that can offer the same service for less money.
1. Business: They can be employed to store and maintain accounts, personnel records, manage
projects, track inventory, create presentations and reports. They enable communication with
people both within and outside the business, using various technologies, including e-mail. They
can be used to promote the business and enable direct interaction with customers.
2. Education: Computers can be used to give learners audio-visual packages, interactive exercises
and remote learning, including tutoring over the internet. They can be used to access educational
information from intranet and internet sources, or via e-books. They can be used to maintain and
monitor student performance, including through the use of online examinations, as well as to
create projects and assignments.
3. Healthcare: It is digitized medical information making it easier to access patient data, complex
information can also be analyzed by software to aid discovery of diagnoses, as well as search for
risks of diseases. Computers control lab equipment, heart rate monitors, and blood pressure
monitors. They enable doctors to have greater access to information on the latest drugs, as well as
the ability to share information on diseases with other medical specialists.
4. Retail and Trade: This enables sellers to reach a wider market with low overheads, and buyers to
compare prices, read reviews, and choose delivery preferences. They can be used for direct
trading and advertising too, using sites such as eBay, Craigslist, or local listings on social media
or independent websites.
5. Government: Various government departments use computers to improve the quality and
efficiency of their services. Examples include city planning, law enforcement, traffic, and tourism.
Computers can be used to store information, promote services, communicate internally and
externally, as well as for routine administrative purposes.
6. Marketing: Computers enable marketing campaigns to be more precise through the analysis and
manipulation of data. They facilitate the creation of websites and promotional materials. They
can be used to generate social media campaigns. They enable direct communication with
customers through email and online chat.
7. Science: Scientists were one of the first groups to adopt computers as a work tool. In science,
computers can be used for research, sharing information with other specialists both locally and
internationally, as well as collecting, categorizing, analyzing, and storing data. Computers also
play a vital role in launching, controlling, and maintaining space craft, as well as operating other
advanced technology.
8. Publishing: Computers can be used to design pretty much any type of publication. These might
include newsletters, marketing materials, fashion magazines, novels, or newspapers. Computers
are used in the publishing of both hard-copy and e-books. They are also used to market
publications and track sales.
9. Arts and Entertainment: Computers are now used in virtually every branch of the arts, as well as
in the wider entertainment industry. Computers can be used to create drawings, graphic designs,
and paintings. They can be used to edit, copy, send, and print photographs. They can be used by
writers to create and edit. They can be used to make, record, edit, play, and listen to music. They
can be used to capture, edit and watch videos. They can be used for playing games.
10. Communication: Computers have made real-time communication over the internet easy, thanks
to software and video conferencing services such as Skype. Families can connect with audio and
video, businesses can hold meetings between remote participants, and news organizations can
interview people without the need for a film crew. Modern computers usually have microphones
and webcams built-in nowadays to facilitate software like Skype. Older communications
technologies such as email are also still used widely.
11. Banking and Finance: Most banking in advanced countries now takes place online. You can use
computers to check your account balance, transfer money, or pay off credit cards. You can also
use computer technology to access information on stock markets, trade stocks, and manage
investments. Banks store customer account data, as well as detailed information on customer
behavior which is used to streamline marketing.
12. Transport: Road vehicles, trains, planes, and boats are increasingly automated with computers
being used to maintain safety and navigation systems, and increasingly to drive, fly, or steer.
They can also highlight problems that require attention, such as low fuel levels, oil changes, or a
failing mechanical part. Computers can be used to customize settings for individuals, for
example, seat setup, air-conditioning temperatures.
13. Navigation: Navigation has become increasingly computerized, especially since computer
technology has been combined with GPS technology. Computers combined with satellites mean
that it's now easy to pinpoint your exact location, know which way that you are moving on a
map, and have a good idea of amenities and places of interest around you.
14. Working from Home: Computers have made working from home and other forms of remote
working increasingly common. Workers can access necessary data, communicate, and share
information without commuting to a traditional office. Managers are able to monitor workers'
productivity remotely.
15. Military: Computers are used extensively by the military. They are used for training purposes.
They are used for analyzing intelligence data. They are used to control smart technology, such as
guided missiles and drones, as well as for tracking incoming missiles and destroying them. They
work with other technologies such as satellites to provide geospatial information and analysis.
They aid communications. They help tanks and planes to target enemy forces.
16. Social and Romance: Computers have opened up many ways of socializing that didn't
previously exist. Social media enables people to chat in text or audio in real time across large
distances, as well as exchange photographs, videos, and memes. Dating sites and apps help
people to find romance. Online groups help people to connect with others who have similar
interests. Blogs enable people to post a variety of views, updates, and experiences. Online forums
enable discussions between people on specialist or general topics.
17. Booking Vacations: Computers can be used by travelers to study timetables, examine route
options, and buy plane, train, or bus tickets. They can be used to explore and book
accommodation, whether traditional hotels, or through newer services, such as AirBnB. Guided
tours, excursions, events, and trips can also be explored and booked online using computers.
18. Security and Surveillance: Computers are increasingly being combined with other technologies
to monitor people and goods. Computers combined with biometric passports make it harder for
people to fraudulently enter a country or gain access to a passenger airplane. Face-recognition
technology makes it easier to identify terrorists or criminals in public places. Driver plates can be
auto scanned by speed cameras or police cars. Private security systems have also become much
more sophisticated with the introduction of computer technology and internet technology.
19. Weather Forecasting: The world's weather is complex and depends upon a multitude of factors
that are constantly changing. It's impossible for human beings to monitor and process all the
information coming in from satellites and other technologies, never mind perform the complex
calculations that are needed to predict what is likely to happen in the future. Computers can
process large amounts of meteorological information.
20. Robotics: Robotics is an expanding area of technology which combines computers with science
and engineering to produce machines that can either replace humans, or do specific jobs that
humans are unable to do. One of the first uses of robotics was in manufacturing to build cars.
Since then, robots have been developed to explore areas where conditions are too harsh for
humans, to help law enforcement, to help the military, and to assist healthcare professionals.
A. Tally Sticks
● A tally stick was an ancient memory aid device to record and document numbers,
quantities, or even messages.
B. Abacus
● An abacus is a mechanical device used to aid an individual in performing mathematical
calculations. The abacus was invented in Babylonia in 2400 B.C. Invented by
Mesopotaians. The abacus in the form we are most familiar with was first used in China
in around 500 B.C. It used to perform basic arithmetic operations.
C. Napier’s Bone
● Napier's bones is a manually operated calculating device created by John Napier of
Merchiston, Scotland for the calculation of products and quotients of numbers. The
method was based on lattice multiplication, and also called radiology. Invented by John
Napier in 1614. Allowed the operator to multiply, divide and calculate square and cube
roots by moving the rods around and placing them in specially constructed boards.
D. Slide Rule
● Invented by William Oughtred in 1622. Is based on Napier's ideas about logarithms. Used
primarily for – multiplication – division – roots – logarithms –Trigonometry Not
normally used for addition or subtraction.
E. Pascaline
● Invented by Blaise Pascal in 1642. It could only do addition and subtraction, with
numbers being entered by manipulating its dials. Pascal invented the machine for his
father, a tax collector, so it was the first business machine too (if one does not count the
abacus).
F. Stepped Reckoner
● Invented by Gottfried Wilhelm von Leibniz in 1672. The machine that can add, subtract,
multiply and divide automatically.
G. Jacquard Loom
● The Jacquard loom is a mechanical loom, invented by Joseph-Marie Jacquard in 1881. It is
used in the production of textiles with complex patterns It is an automatic loom
controlled by punched cards.
H. Arithmometer
● A mechanical calculator invented by Thomas de Colmar in 1820, The first reliable, useful
and commercially successful calculating machine. The machine could perform the four
basic mathematical functions. The first mass-produced calculating machine.
L. Tabulating Machine
● Invented by Herman Hollerith in 1890. To assist in summarizing information and
accounting.
M. Harvard Mark 1
● Also known as IBM Automatic Sequence Controlled Calculator (ASCC). Invented by
Howard H. Aiken in 1943. The first electro-mechanical computer.
N. Z1
● The first programmable computer. Created by Konrad Zuse in Germany from 1936 to
1938. To program the Z1 required that the user insert punch tape into a punch tape reader
and all output was also generated through punch tape.
P. ENIAC
● ENIAC stands for Electronic Numerical Integrator and Computer. It was the first
electronic general-purpose computer. Completed in 1946. Developed by John Presper
Eckert and John Mauchly.
Q. UNIVAC 1
● The UNIVAC I (UNIVersal Automatic Computer 1) was the first commercial computer.
Designed by John Presper Eckert and John Mauchly
R. EDVAC
● EDVAC stands for Electronic Discrete Variable Automatic Computer The First Stored
Program Computer Designed by Von Neumann in 1952. It has a memory to hold both a
stored program as well as data.
Premechanical
● The pre mechanical age is the earliest age of information technology. It can be defined as the time
between 3000B.C. and 1450A.D. We are talking about a long time ago. When humans first started
communicating they would try to use language or simple picture drawings known as
petroglyphs which were usually carved in rock. Early alphabets were developed such as the
Phoenician alphabet.
● As alphabets became more popular and more people were writing information down, pens and
paper began to be developed. It started off as just marks in wet clay, but later paper was created
out of a papyrus plant. The most popular kind of paper made was probably by the Chinese who
made paper from rags. Now that people were writing a lot of information down, they needed
ways to keep it all in permanent storage. This is where the first books and libraries are developed.
You’ve probably heard of Egyptian scrolls which were popular ways of writing down
information to save. Some groups of people were actually binding paper together into a book-like
form. Also, during this period were the first numbering systems. Around 100A.D. was when the
first 1-9 system was created by people from India. However, it wasn’t until 875A.D. (775 years
later) that the number 0 was invented. And yes, now that numbers were created, people wanted
stuff to do with them, so they created calculators. A calculator was the very first sign of an
information processor. The popular model of that time was the abacus.
Mechanical
● The mechanical age is when we first start to see connections between our current technology and
its ancestors. The mechanical age can be defined as the time between 1450 and 1840. A lot of new
technologies are developed in this era as there is a large explosion of interest in this area.
Technologies like the slide rule (an analog computer used for multiplying and dividing) were
invented. Blaise Pascal invented the Pascaline which was a very popular mechanical computer.
Charles Babbage developed the difference engine which tabulated polynomial equations using
the method of finite differences.
● There were lots of different machines created during this era and while we have not yet gotten to
a machine that can do more than one type of calculation in one, like our modern-day calculators,
we are still learning about how all of our all-in-one machines started. Also, if you look at the size
of the machines invented in this time compared to the power behind them it seems (to us)
absolutely ridiculous to understand why anybody would want to use them, but to the people
living in that time ALL of these inventions were HUGE.
Electromechanical
● Now we are finally getting close to some technologies that resemble our modern-day technology.
The electromechanical age can be defined as the time between 1840 and 1940. These are the
beginnings of telecommunication. The telegraph was created in the early 1800s. Morse code was
created by Samuel Morse in 1835. The telephone (one of the most popular forms of
communication ever) was created by Alexander Graham Bell in 1876. The first radio developed
by Guglielmo Marconi in 1894. All of these were extremely crucial emerging technologies that led
to big advances in the information technology field.
● The first large-scale automatic digital computer in the United States was the Mark 1 created by
Harvard University around 1940. This computer was 8ft high, 50ft long, 2ft wide, and weighed 5
tons - HUGE. It was programmed using punch cards. How does your PC match up to this hunk
of metal? It was from huge machines like this that people began to look at downsizing all the
parts to first make them usable by businesses and eventually in your own home.
Electronic
● The electronic age is what we currently live in. It can be defined as the time between 36 1940 and
right now. The ENIAC was the first high-speed, digital computer capable of being reprogrammed
to solve a full range of computing problems. This computer was designed to be used by the U.S.
Army for artillery firing tables. This machine was even bigger than the Mark 1 taking up 680
square feet and weighing 30 tons - HUGE. It mainly used vacuum tubes to do its calculations.
● There are 4 main sections of digital computing. The first was the era of vacuum tubes and punch
cards like the ENIAC and Mark 1. Rotating magnetic drums were used for internal storage. The
second generation replaced vacuum tubes with transistors, punch cards were replaced with
magnetic tape, and rotating magnetic drums were replaced by magnetic cores for internal
storage. Also during this time high-level programming languages were created such as
FORTRAN and COBOL. The third generation replaced transistors with integrated circuits,
magnetic tape was used throughout all computers, and magnetic cores turned into metal oxide
semiconductors. An actual operating system showed up around this time along with the
advanced programming language BASIC. The fourth and latest generation brought in CPUs
(central processing units) which contained memory, logic, and control circuits all on a single chip.
The personal computer was developed (Apple II). The graphical user interface (GUI) was
developed.
Example: UNIVAC III, RCA 501, Philco Transac S-2000, NCR 300 series, IBM 7030 Stretch, IBM
7070, 7080, 7090 series
Example of Web 1.0: Mp3.com, Home Page, Directories, Page Views, HTML/Portals.
Advantage Disadvantage
Most read only on the web. If focused on the company's Read only web
home pages.
Dividing the world wide web into usable directories Limited user interaction
B. Blogs
● This is a discussion or informational website published on the world wide web consisting
of discrete, often informal diary-style text entries (posts). Posts are typically displayed in
reverse chronological order, so that the most recent post appears first, at the top of the
web page.
Example : Wordpress, Blogger, and Tumbler.
C. Wikis
● This is a hypertext publication collaboratively edited and managed by its own audience
directly using a web browser. A typical wiki contains multiple pages for the subjects or
scope of the project and may be either open to the public or limited to use within an
organization for maintaining its internal knowledge base.
Example: Wikipedia, Wikibooks, Wikiversity, Coombs, Wiktionary, Wikivoyage,
Wikidata, Wikinews, Wikispecies, and Media Wiki.
Types of Websites:
● eCommerce Website
○ It is a website people can directly buy products from you’re probably used a number of
eCommerce websites before, most big brands and plenty of smaller ones have one. Any
website that includes a shopping cart and a way for you to provide credit card
information to make a purchase falls into this category.
● Business Website
○ It is any website that’s devoted to representing a specific business. It should be branded
like the business(the same logo and positioning) and communicate the types of products
and/or services the business offers.
● Entertainment Website
○ If you think about your internet browsing habits, you can probably think of a few
websites that you visit purely for entertainment purposes.
● Portfolio Website
○ These are sites devoted to showing examples of past work. Service providers who want
to show potential clients the quality of the work they provide can use a portfolio website
to collect some of the best samples of past work they’ve done. This type of website is
simpler to build than a business website and more focused on a particular task: collecting
work samples.
● Media Website
○ It collects news stories or other reporting. There’s some overlap here with entertainment
websites, but media websites are more likely to include reported pieces in addition to or
instead of content meant purely for entertainment.
● Brochure Website
○ These are a simplified form of business websites. For businesses that know they need an
online presence, but don’t want to invest a lot into it (maybe you’re confident you’ll
continue to get most of your business from other sources), a simple brochure site that
includes just a few pages that lay out the basics of what you do and provide contact
information may be enough for you.
● Nonprofit Website
○ In the same way that businesses need websites to be their online presence, nonprofits do
as well. A nonprofit website is the easiest way for many potential donors to make
donations and will be the first place many people look to learn more about a nonprofit
and determine if they want to support it.
● Educational Website
○ The websites of educational institutions and those offering online courses fall into the
category of educational websites. These websites have the primary goal of either
providing educational materials to visitors or providing information on an educational
institution to them.
● Infopreneur Website
○ These websites overlap a bit with business and eCommerce websites, but they represent a
unique type of online business. Infopreneurs create and sell information products. That
could be in the form of courses, tutorials, videos or eBooks.
● Personal Website
○ Not all websites exist to make money in some way or another. Many people find value in
creating personal websites to put their own thoughts out into the world. This category
includes personal blogs, vlogs, and photo diaries people share with the world.
● Web Portal
○ These are often websites designed for internal purposes at a business, organization, or
institution. They collect information in different formats from different sources into one
place to make all relevant information accessible to the people who need to see it. They
often involve a login and personalized views for different users that ensure the
information that’s accessible is most useful to their particular needs.
The Internet
● The Internet or “net” (network of network)is the largest computer network in the world that
connects billions of computer users. The word internet comes from the combination between
“interconnection” and “network”. Network is a collection of computers and devices connected
via communication channels and transmission media that allow sharing resources (hardware,
software, data, information). Generally, nobody owns the internet.
1. Servers - This is a computer program that provides service to another computer program
and its user.
Types of Servers:
➢ Application Server - a program in computer that provides the business logic for
an application program.
➢ Web Server - a computer program that serves requested HTML pages or files.
➢ Mail Server - is an application that receives incoming e- mail from local users
and remote senders and forward outgoing email for delivery
➢ File Server - is a computer responsible for central storage and management of
data files so that other computers on the same network can access them.
4. Domain Name System (DNS) - This is the phonebook of the internet. We access
information online through the domain names.
Example of DNS: www.facebook.com, www.pup.edu.ph,www.academia.edu
Name Entity
.com commercial
.org organization
.net network
.edu education
.ph Philippines
.au Australia
5. Internet Service Provide (ISP) - This is an organization that provides services for
accessing, using or participating in the internet.
Example: Sky Broadband, PLDT, Converge
C. Uses of Internet
Look for Information Watch & post videos
Video teleconferencing (video call, video chat) Monitor home while away
Module 4
Lesson 1: Netiquette
What is Netiquette?
➢ Simply stated, it’s network etiquette – that is the etiquette of cyberspace and “etiquette” means
the forms required by good breeding or prescribed by authority to be required in social or official
life. In other words, netiquette is a set of rules for behaving properly online. Netiquette, or
network etiquette, is concerned with the "proper" way to communicate in an online environment.
Consider the following "rules," adapted from Virginia Shea's The Core Rules of Netiquette,
whenever you communicate in the virtual world. When you use e-mail, instant messenger, video
calls, or discussion boards to communicate with others online, please be sure to follow the rules
of professional online communications known as netiquette. These rules will help you
communicate with instructors, classmates, and potential employers more effectively and will help
prevent misunderstandings.
Republic Act No. 10175 Cybercrime Prevention Republic Act No. 10173 Data Privacy Act of 2012
Act of 2012
A. Copyright - The exclusive legal right, given to an originator or an assignee to print, publish,
perform, film, or record literary, artistic, or musical material, and to authorize others to do the
same.
● Copyright Infringement - This is the violation, piracy or theft of a copyright holder's
exclusive rights through the unauthorized use of a copyrighted material or work.
B. Plagiarism - An act or instance of using or closely imitating the language and thoughts of another
author without authorization.
C. Computer Addiction
● Offline - generally used when speaking about excessive gaming behavior, which can be
practiced both offline and online.
● Online - Also known as “Internet Addiction”, gets more attention in general from
scientific research than offline computer addiction, mainly because most cases of
computer addiction are related to the excessive use of the Internet.
● Virtual Self - The persona you create about yourself virtually.
Criminal Activities
a. Hacking
● Unauthorized access of or interference with computer systems, servers, or other
information and communication systems. Unauthorized access to corrupt, alter, steal, or
destroy electronic data using computers or other information and communication
systems without the computer or system owner’s knowledge and consent The
introduction of computer viruses resulting in the corruption, alteration, theft, or loss of
such data
● Illegal Access
● Illegal Interception
● Data Interference
● System Interference
● Misuse of Devices
● Infection of IT Systems with Malware – if the act is committed against critical
infrastructure of the Philippines the penalty is between 12-20 years reclusion temporal.
Six years up to twelve years of imprisonment also known as prison mayor.
c. Electronic Theft
● Illegal Downloading, Obtaining files that you do not have the right to use from the
internet. Digital Piracy, Practice of illegally copying and selling digital music, video,
computer software, etc. Copyright Infringement
● Penalty of Php 50,000 – 500, 000 and or prison mayor
d. Cyberbullying
● The use of electronic communication to bully a person, typically by sending a message of
an intimidating or threatening nature. The Anti-Bullying Act of 2013 (RA 10627).
e. Cybersex
● Willful engagement, maintenance, control, or operation, directly or indirectly of any
lascivious exhibition of sexual organs or sexual activity with the aid of a computer
system for favor or consideration. There is a discussion on this matter if it involves
“couples” or “people in relationship” who engage in cybersex.
● Penalty at least Php 200,000 and or prison mayor
f. Child Pornography
● Is a form of child sexual exploitation. Unlawful or prohibited acts defined and punishable
by Republic Act No. 9775 or the anti- Child Pornography Act of 2009, committed through
a computer system.
● Penalty of 12-20 years of imprisonment or reclusion temporal.
g. Cyber Defamation
● Is an unprivileged false statement of fact which tends to harm the reputation of a person
or company.
● Penalty of 6-12 years of imprisonment or prison mayor.
Hacking
● Hacking is a term used to describe actions taken by someone to gain unauthorized access to a
computer. The availability of information online on the tools, techniques, and malware makes it
easier for even non-technical people to undertake malicious activities. The process by which
cyber criminals gain access to your computer.
Pharming
● Pharming is a common type of online fraud. A means to point you to a malicious and illegitimate
website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be
redirected to a fake website.
Phishing
● Phishing is used most often by cyber criminals because it's easy to execute and can produce the
results they're looking for with very little effort. Fake emails, text messages and websites created
to look like they're from authentic companies. They're sent by criminals to steal personal and
financial information from you. This is also known as “spoofing”.
Ransomware
● Ransomware is a type of malware that restricts access to your computer or your files and displays
a message that demands payment in order for the restriction to be removed. The two most
common means of infection appear to be phishing emails that contain malicious attachments and
website pop-up advertisements.
Spam
● Spam is one of the more common methods of both sending information out and collecting it from
unsuspecting people. The mass distribution of unsolicited messages, advertising or pornography
to addresses which can be easily found on the Internet through things like social networking
sites, company websites and personal blogs.
What is it?
➢ Software that collects personal information about you without you knowing. They often
come in the form of a ‘free' download and are installed automatically with or without
your consent. These are difficult to remove and can infect your computer with viruses.
Trojan Horses
● A Trojan horse may not be a term you're familiar with, but there's a good chance you or someone
you know has been affected by one. A malicious program that is disguised as, or embedded
within, legitimate software. It is an executable file that will install itself and run automatically
once it's downloaded.
Viruses
● Most people have heard of computer viruses, but not many know exactly what they are or what
they do. Malicious computer programs that are often sent as an email attachment or a download
with the intent of infecting your computer, as well as the computers of everyone in your contact
list. Just visiting a site can start an automatic download of a virus .
Wi-Fi Eavesdropping
● WiFi eavesdropping is another method used by cyber criminals to capture personal information.
Entertainment
● Digital broadcasting has completely changed the way we experience television and radio.
Cinema can now be found at the comfort of your home through applications such as Netflix,
iFlix, etc. We get entertained by the content that we see on Facebook, YouTube, and Instagram.
Computer gaming has also been an important influence in the development of graphical
interfaces. Technology has been at the forefront of changes in production and distribution of
music. We can now listen to music and podcasts using Spotify. These are some of the many
technologies we use for entertainment that arise in the Digital Age.
Business
● Businesses in today’s life have promoted a lot with the coming of ICT. Its impact cannot be over
emphasized. For example, ICT helps to increase productivity in business with the use of social
Media platforms for marketing and promotion. The use of websites now allowed companies to
develop new and cheaper ways of offering customers with opportunities of buying goods and
services at their convenient time and enhance the level of customer service. Online platform has
been the marketplace where people can transact and communicate.
Education
● ICT can play varied roles in developing an effective learning environment. It assists teachers and
helps explain core content concepts and addresses misconceptions. It acts as a stimulant and
fosters analytical thinking and interdisciplinary studies. It networks a learner with peers and
experts and develops a collaborative atmosphere.It plays the role of a guide and mentor by
providing tailor made instructions to meet individual needs. Online learning facilitates learning
through digital mode. With the help of multimedia, it enhances effectiveness of teaching-learning
and hence proves crucial for early learners, slow learners and differently abled learners. Modern
ICT tools not only deliver the content but also replicate formal learning experience via virtual
learning. The intention of virtual classrooms is to extend the structure and services that
accompany formal education programs from the physical environment to learners.
Health
● Digitalization can affect people’s health status through the emergence of new physical and
mental health risks and through its impact on the health-care delivery system. Health risks
associated with the digital transformations include mental health problems associated with the
extreme use of digital technologies, especially among children and teenagers and the crowding
out of other activities such as physical exercise. Health-care delivery is also affected by new
digital technologies, such as electronic records, new treatment options, tele- care, and
teleconsultation. An important aspect of digitalization concerns the production and use of
medical data to improve the effectiveness and efficiency of health systems. As a caveat, the
exchange and use of medical and health data must meet high data protection and data security
standards, considering its sensitivity. How and where care is delivered is also affected by digital
innovations, which challenges the traditional role of care providers, with implications for
interactions among care providers and between providers and patients. The effects of these
changes in healthcare delivery of health inequalities are potentially large, but also less well
documented.
Theories in Technology
● It is the theory which strongly believes that technology shapes the culture, values, and social
structures of a society. The main reason why society progresses is because of the kind technology
the society has. Technological innovation is the cause of social progress. Technology has the
control over society --- over human actions, culture and values. Technology greatly influences
human thought and action. In other words, society is changing because of technology.
● According to Winner, technology is not the slave of the human being but rather humans are
slaves to technology as they are forced to adapt to the technological environment that surrounds
them.
Example:
● The Medium is the Message by Marshall McLuhan. The technology which is used as a channel of
communication matters more than the content.
● The invention of the stirrup. It is the foot support for horse-riders. Before its invention, riders
were not able to use swords while riding in a horse because they may lose balance. When the
stirrup was invented, it enabled armored knights to fight on horseback. Because of this, it brought
the development of feudal societies --- a military rule by nobles or lords .
● The invention of guns. Before, the weapons used were swords and archery soldiers had to be
skilled and trained in using these weapons. But a new invention in technology changed it all. A
gun was invented which requires less effort and can be used even from far distances. This
technology changed the way soldiers are trained. It also changed how soldiers fight in a war.
Social Constructivism
● Social Constructivism is the opposite of Technological Determinism. Social Constructivism
believes that humans play a main role in shaping technology rather than technology shaping
society. It believes that technology does not determine human action, but rather, human action
shapes the technology.
Technological Change
● Technological change means the technical knowledge used in the production of capital and
machinery. The various changes in technology leads to an increase in the productivity of
labor,capital and other production factors. Technological progress consists of creation of skill, new
means of production, new uses of raw materials and the widespread use of machinery.
● Technology is the most powerful means of wrestling power from nature in all possible ways. It
strengthens the facilities of man. Prof. Frankel assumes that the, “Technological change is not a
mere improvement in the technical know-how. It means much more than this. It should be
preceded by sociological change also, a willingness and desire on the part of the community to
modify their social, political and administrative institutions so as to make them fit with new
techniques of production and faster tempo of economic activity.” Technology, according to J. P.
Dewhurts, in fact, can be thought of as the change in the production process of material and
human skills.
The process of growth of technical knowledge can be divided into following stages:
a. Formulation of scientific principles
b. Application of these principles to give technical problems
c. Development of technical inventions to the point of commercial exploitation.
● The first stage is the advancement in scientific knowledge, the second is that of the application of
this knowledge to some useful purposes and third is the commercialization of invention which is
called innovation. This has a great significance in the process of development. Schumpeter has
distinguished between invention and innovation. Invention implies the discovery of new
technique while innovation is practical application of invention in production for market.
● It may be called commercialization that originates from scientific advancement. Invention is
scientific fact while innovation is economic fact. Inventions are carried on by the inventors' large
capital investments at every stage as it needs not only a scientific attitude but an attitude of the
community and an entrepreneurial skill of high order with the ability to understand the
possibilities of employing scientific incentives for commercial purposes.
The Internet
● Net - “Network of Network.”
● The word Internet is from the combination of the word interconnection and network. It is a
collection of computers and devices connected via communication channels and transmission
media that allows the sharing of resources (hardware, software, data, and information).
Contd.
● Scientists and researchers used it to communicate and share data with another through what was
known as Defense’s Advanced Research Projects Agency Network (DARPNET).
● This was in response to the Soviet Union bombings and a need to create a communication
network which was free from interference and disruption.
● Without packet switching, the government's computer network - now known as the ARPANET -
would have been just as vulnerable to enemy attacks as the phone system.
● By the end of 1970s, a computer scientist named Vinton Cerf had begun to solve this problem by
developing a way for all of the computers on all of the world’s mini-networks to communicate
with one another.
● He called his invention the “Transmission Control Protocol,” or TCP (Later, he added an
additional protocol, known as the “Internet Protocol.” The acronym we use to refer to these today
is TCP/IP.)
● In 1992, a group of student researchers at the University of Illinois developed a sophisticated
browser that they called Mosaic, (It later became Netscape.)
● Mosaic offered a user-friendly- way to search a Web: It allowed users to see words and pictures
on the same page for the first time and to navigate using scrollbars and clickable links.