Etech SHS
Etech SHS
Etech SHS
DURATION TOPICS
Week 17
Electronic Spreadsheet Application
Week 18
Data - is defined as any collection of facts. It is the information that can be stored and
used by the computer program.
Data Processing - is the manipulation of data into a more useful form. It is the
modern name for paperwork and involves the collecting, processing, and distributing of
facts and figures to achieve a desire result.
1. Abacus – The first manual data processing device developed in CHINA, 12th
century A.D. The device has a frame with beads strung on wires or rods and
arithmetic calculations are performed by manipulating the beads.
3. Oughtred’s Slide Rule – invented by William Oughtred. Slide Rule consists of two
movable rulers placed side by side.
4. Pascal’s Calculator – invent by Blaise Pascal, the first modern scientist to develop
and build calculator that could add and subtract. It is wide known as “Pascaline”.
5. Feedback
COMPUTER
- is a programmable machine designed to sequentially and automatically carry out a
sequence of arithmetic or logical operations. It is an electronic system designed to
manipulate data.
COMPUTER CAPABILITIES
1. Ability to perform certain logic operation
2. Ability to provide new time dimension
3. Ability to store and retrieve information
4. Ability to control error
5. Ability to check itself
COMPUTER LIMITATIONS
1. Dependence on prepared instructions
2. Inability to derive meanings from objects
3. Inability to generate information
4. It cannot correct wrong instructions
There are three basic parts of computer system namely: (1) Monitor, (2) System Unit
and (3) Keyboard. In current set-up, the mouse is included as basic parts. The parts
ETECH – Empowerment Technology 6 | Page
GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
which are not included as basic parts are called computer peripherals like printer,
head set, scanner, speaker and others.
3. People ware - refer to anything that has to do with the role of people in the development
or use of computer software and hardware systems, including such issues as developer
productivity, teamwork, group dynamics, the psychology of programming, project
management, organizational factors, human interface design, and human-machine-
interaction.
4. Computer Data – are the information required by the computer to be able to operate,
run a program or store system configuration.
5. Connectivity – refers to maintaining connection to the internet and to the World Wide
Web and allows performing different tasks simultaneously.
6. Procedure – are steps or instructions to follow when handling and using various data,
software and hardware.
The Processor is made up of the memory, arithmetic, logic and control units.
3. Memory Unit – it is where the computer program and data are stored during
processing. This unit is a random-access storage device consisting of thousands
of storage location, each of which can be directly reached by the control unit.
HARDWARE TECHNOLOGY
2. Output Devices – tools use to see, hear or recognize the results of your information –
processing request.
SOFTWARE TECHNOLOGY
DESIRED LEARNING OBJECTIVES (DLO)
At the end of the topic, the student must:
1. Define the term computer hardware
2. Identify the different Types of Software
Microsoft Word – help for typing or encoding term papers and reports
Microsoft Excel/ Spreadsheet Software – for calculation
MS Powerpoint/ Moviemaker/ Proshow Gold – for presentation
Payroll Software – use for the sum of all financial records of salaries,
wages, bonuses and deduction.
Internet Explorer / Mozilla Firefox – web browsers
Examples:
7. Operations Manager – supervises the daily operation of the data computer center
10. Systems Programmer – writes computer codes for developing new applications
11. Network Manager – coordinates and manages organization’s voice and data
network
14. Web Designer – creates world wide web sites and pages
Time-sharing operating systems schedule tasks for efficient use of the system and may
also include accounting for cost allocation of processor time, mass storage, printing,
and other resources.
For hardware functions such as input and output and memory allocation, the operating
system acts as an intermediary between programs and the computer hardware,
although the application code is usually executed directly by the hardware and will
frequently make a system call to an OS function or be interrupted by it. Operating
systems can be found on almost any device that contains a computer—from cellular
phones and video game consoles to supercomputers and web servers.
Real-time
A real-time operating system is a multitasking operating system that aims at
executing real-time applications. Real-time operating systems often use
specialized scheduling algorithms so that they can achieve a deterministic nature
Multi-user
A multi-user operating system allows multiple users to access a computer system
concurrently. Time-sharing system can be classified as multi-user systems as
they enable a multiple user access to a computer through the sharing of time.
Single-user operating systems, as opposed to a multi-user operating system, are
usable by a single user at a time. Being able to use multiple accounts on a
Windows operating system does not make it a multi-user system. Rather, only
the network administrator is the real user.
Distributed
Embedded
Embedded operating systems are designed to be used in embedded computer
systems. They are designed to operate on small machines like PDAs with less
autonomy. They are able to operate with a limited number of resources. They are
very compact and extremely efficient by design. Windows CE and Minix 3 are
some examples of embedded operating systems.
BOOTING
The process of loading the system files of the operating system from the disk into the
computer memory to complete the circuitry requirement of the computer system is
called booting. The system files of MS. DOS are:
How to start the Computer in Microsoft Windows’s mode? There is nothing special
you need to start this system. Just,
Before shutting down the Computer, close all opened windows at first. Then,
• Standby
• Restart
6. Thou shalt not copy or use proprietary software for which you have not paid.
7. Thou shalt not use other people’s computer resources without authorization or proper
compensation.
9. Thou shalt think about the social consequences of the program you are writing or the
system you are designing.
10. Thou shalt always use a computer in ways that insure consideration and respect for
your fellow humans.
1. Put all items in an appropriate group. - Don’t abuse your network – Use your
network the right way.
4. Read follow ups. - If someone asks you a question don’t ignore them. If they are
trying to strike conversation respond back to them because that is how you become a
good social media user.
6. Avoid sarcasm and facetious remarks. Treat others how you want to be treated.
8. Cite references. - Don’t make claims that cannot be guaranteed. Social media is a
place to be honest and truthful.
11. Be as brief as possible. - Don’t cram too much into your updates
13. Don’t make people read the same thing more than once.
15. Be authentic.
16. Be generous.
20. Invite with care. - Don’t send friends invitations without a proper introduction – they
don’t know who you are in most cases and they shouldn’t guess.
CHAPTER I
PRELIMINARY PROVISIONS
SEC. 2. Declaration of Policy. — The State recognizes the vital role of information and
communications industries such as content production, telecommunications,
broadcasting electronic commerce, and data processing, in the nation’s overall social
and economic development. The State also recognizes the importance of providing an
environment conducive to the development, acceleration, and rational application and
exploitation of information and communications technology (ICT) to attain free, easy,
and intelligible access to exchange and/or delivery of information; and the need to
protect and safeguard the integrity of computer, computer and communications
systems, networks, and databases, and the confidentiality, integrity, and availability of
information and data stored therein, from all forms of misuse, abuse, and illegal access
by making punishable under the law such conduct or conducts. In this light, the State
shall adopt sufficient powers to effectively prevent and combat such offenses by
facilitating their detection, investigation, and prosecution at both the domestic and
international levels, and by providing arrangements for fast and reliable international
cooperation.
SEC. 3. Definition of Terms. — For purposes of this Act, the following terms are hereby
defined as follows:
(a) Access refers to the instruction, communication with, storing data in, retrieving data
from, or otherwise making use of any resources of a computer system or
communication network.
(1) Any public or private entity that provides to users of its service the ability to
communicate by means of a computer system; and
(2) Any other entity that processes or stores computer data on behalf of such
communication service or users of such service.
(1) The type of communication service used, the technical provisions taken thereto and
the period of service;
(2) The subscriber’s identity, postal or geographic address, telephone and other access
numbers, any assigned network address, billing and payment information, available on
the basis of the service agreement or arrangement; and
(3) Any other available information on the site of the installation of communication
equipment, available on the basis of the service agreement or arrangement.
(p) Traffic data or non-content data refers to any computer data other than the content
of the communication including, but not limited to, the communication’s origin,
destination, route, time, date, size, duration, or type of underlying service.
CHAPTER II
PUNISHABLE ACTS
(a) Offenses against the confidentiality, integrity and availability of computer data and
systems:
(1) Illegal Access. – The access to the whole or any part of a computer system without
right.
(2) Illegal Interception. – The interception made by technical means without right of any
non-public transmission of computer data to, from, or within a computer system
including electromagnetic emissions from a computer system carrying such computer
data.
(aa) A device, including a computer program, designed or adapted primarily for the
purpose of committing any of the offenses under this Act; or
(bb) A computer password, access code, or similar data by which the whole or any part
of a computer system is capable of being accessed with intent that it be used for the
purpose of committing any of the offenses under this Act.
(ii) The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with intent
to use said devices for the purpose of committing any of the offenses under this section.
(6) Cyber-squatting. – The acquisition of a domain name over the internet in bad faith to
profit, mislead, destroy reputation, and deprive others from registering the same, if such
a domain name is:
(i) Similar, identical, or confusingly similar to an existing trademark registered with the
appropriate government agency at the time of the domain name registration:
(ii) Identical or in any way similar with the name of a person other than the registrant, in
case of a personal name; and
(i) The input, alteration, or deletion of any computer data without right resulting in
inauthentic data with the intent that it be considered or acted upon for legal purposes as
if it were authentic, regardless whether or not the data is directly readable and
intelligible; or
(ii) The act of knowingly using computer data which is the product of computer-related
forgery as defined herein, for the purpose of perpetuating a fraudulent or dishonest
design.
damage has yet been caused, the penalty imposable shall be one (1) degree lower.
(3) Computer-related Identity Theft. – The intentional acquisition, use, misuse, transfer,
possession, alteration or deletion of identifying information belonging to another,
(2) Child Pornography. — The unlawful or prohibited acts defined and punishable
by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through
a computer system: Provided, That the penalty to be imposed shall be (1) one degree
higher than that provided for in Republic Act No. 9775.
(ii) The primary intent of the communication is for service and/or administrative
announcements from the sender to its existing users, subscribers or customers; or
(aa) The commercial electronic communication contains a simple, valid, and reliable
way for the recipient to reject. receipt of further commercial electronic messages (opt-
out) from the same source;
(bb) The commercial electronic communication does not purposely disguise the source
of the electronic message; and
(cc) The commercial electronic communication does not purposely include misleading
information in any part of the message in order to induce the recipients to read the
message.
(4) Libel. — The unlawful or prohibited acts of libel as defined in Article 355 of the
Revised Penal Code, as amended, committed through a computer system or any other
similar means which may be devised in the future.
SEC. 5. Other Offenses. — The following acts shall also constitute an offense:
(a) Aiding or Abetting in the Commission of Cybercrime. – Any person who willfully
abets or aids in the commission of any of the offenses enumerated in this Act shall be
held liable.
SEC. 6. All crimes defined and penalized by the Revised Penal Code, as amended, and
special laws, if committed by, through and with the use of information and
communications technologies shall be covered by the relevant provisions of this
Act: Provided, That the penalty to be imposed shall be one (1) degree higher than that
provided for by the Revised Penal Code, as amended, and special laws, as the case
may be.
SEC. 7. Liability under Other Laws. — A prosecution under this Act shall be without
prejudice to any liability for violation of any provision of the Revised Penal Code, as
amended, or special laws.
CHAPTER III
PENALTIES
SEC. 8. Penalties. — Any person found guilty of any of the punishable acts enumerated
in Sections 4(a) and 4(b) of this Act shall be punished with imprisonment of prision
mayor or a fine of at least Two hundred thousand pesos (PhP200,000.00) up to a
maximum amount commensurate to the damage incurred or both.
Any person found guilty of the punishable act under Section 4(a)(5) shall be punished
with imprisonment of prision mayor or a fine of not more than Five hundred thousand
pesos (PhP500,000.00) or both.
If punishable acts in Section 4(a) are committed against critical infrastructure, the
penalty of reclusion temporal or a fine of at least Five hundred thousand pesos
(PhP500,000.00) up to maximum amount commensurate to the damage incurred or
both, shall be imposed.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)(1) of
this Act shall be punished with imprisonment of prision mayor or a fine of at least Two
hundred thousand pesos (PhP200,000.00) but not exceeding One million pesos
(PhP1,000,000.00) or both.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)(2) of
this Act shall be punished with the penalties as enumerated in Republic Act No. 9775 or
the “Anti-Child Pornography Act of 2009”: Provided, That the penalty to be imposed
shall be one (1) degree higher than that provided for in Republic Act No. 9775, if
committed through a computer system.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)(3)
shall be punished with imprisonment of arresto mayor or a fine of at least Fifty thousand
pesos (PhP50,000.00) but not exceeding Two hundred fifty thousand pesos
(PhP250,000.00) or both.
SEC. 9. Corporate Liability. — When any of the punishable acts herein defined are
knowingly committed on behalf of or for the benefit of a juridical person, by a natural
person acting either individually or as part of an organ of the juridical person, who has a
leading position within, based on: (a) a power of representation of the juridical person
provided the act committed falls within the scope of such authority; (b) an authority to
take decisions on behalf of the juridical person: Provided, That the act committed falls
within the scope of such authority; or (c) an authority to exercise control within the
juridical person, the juridical person shall be held liable for a fine equivalent to at least
double the fines imposable in Section 7 up to a maximum of Ten million pesos
(PhP10,000,000.00).
If the commission of any of the punishable acts herein defined was made possible due
to the lack of supervision or control by a natural person referred to and described in the
preceding paragraph, for the benefit of that juridical person by a natural person acting
under its authority, the juridical person shall be held liable for a fine equivalent to at
least double the fines imposable in Section 7 up to a maximum of Five million pesos
(PhP5,000,000.00).
The liability imposed on the juridical person shall be without prejudice to the criminal
liability of the natural person who has committed the offense.
CHAPTER IV
ENFORCEMENT AND IMPLEMENTATION
SEC. 11. Duties of Law Enforcement Authorities. — To ensure that the technical nature
of cybercrime and its prevention is given focus and considering the procedures involved
for international cooperation, law enforcement authorities specifically the computer or
technology crime divisions or units responsible for the investigation of cybercrimes are
required to submit timely and regular reports including pre-operation, post-operation and
investigation results and such other documents as may be required to the Department
of Justice (DOJ) for review and monitoring.
SEC. 13. Preservation of Computer Data. — The integrity of traffic data and subscriber
information relating to communication services provided by a service provider shall be
preserved for a minimum period of six (6) months from the date of the transaction.
Law enforcement authorities may order a one-time extension for another six (6)
months: Provided, That once computer data preserved, transmitted or stored by a
service provider is used as evidence in a case, the mere furnishing to such service
provider of the transmittal document to the Office of the Prosecutor shall be deemed a
notification to preserve the computer data until the termination of the case.
The service provider ordered to preserve computer data shall keep confidential the
order and its compliance.
SEC. 15. Search, Seizure and Examination of Computer Data. — Where a search and
seizure warrant is properly issued, the law enforcement authorities shall likewise have
the following powers and duties.
Within the time period specified in the warrant, to conduct interception, as defined in this
Act, and:
(d) To conduct forensic analysis or examination of the computer data storage medium;
and
(e) To render inaccessible or remove those computer data in the accessed computer or
computer and communications network.
Pursuant thereof, the law enforcement authorities may order any person who has
knowledge about the functioning of the computer system and the measures to protect
and preserve the computer data therein to provide, as is reasonable, the necessary
information, to enable the undertaking of the search, seizure and examination.
Law enforcement authorities may request for an extension of time to complete the
examination of the computer data storage medium and to make a return thereon but in
no case for a period longer than thirty (30) days from date of approval by the court.
CHAPTER VIII
FINAL PROVISIONS
SEC. 28. Implementing Rules and Regulations. — The ICTO-DOST, the DOJ and the
Department of the Interior and Local Government (DILG) shall jointly formulate the
necessary rules and regulations within ninety (90) days from approval of this Act, for its
effective implementation.
SEC. 29. Separability Clause — If any provision of this Act is held invalid, the other
provisions not affected shall remain in full force and effect.
SEC. 31. Effectivity. — This Act shall take effect fifteen (15) days after the completion of
its publication in the Official Gazette or in at least two (2) newspapers of general
circulation
Approved,
This Act which is a consolidation of Senate Bill No. 2796 and House Bill No. 5808 was
finally passed by the Senate and the House of Representatives on June 5, 2012 and
June 4, 2012, respectively.
NUMBER SYSTEMS
EXAMPLE:
a. 101 = 1x22 + 0x21 + 1x20
=4+0+1
=5
= 8+4+0+0
= 12
DECIMAL – OCTAL CONVERSION
EXAMPLE:
THEREFORE: 1810 = 22 8
EXAMPLES:
Solution:
2 C 8 5
0010 1100 1000 0101
Solution:
8 A 5 B
1000 1010 0101 1011
Solution:
Solution:
101 1101 1001 0011
5 13 - C 9 3
Solution:
1 0110 1011 0001 1100
1 6 11 - B 1 12 - C
c.) 10000111010002 = ?
Solution:
Now that we know binary numbers, we will learn how to add them. Binary addition is
much like your normal everyday addition (decimal addition), except that it carries on a
value of 2 instead of a value of 10.
For example: in decimal addition, if you add 8 + 2 you get ten, which you write as 10; in
the sum this gives a digit 0 and a carry of 1. Something similar happens in binary
addition when you add 1 and 1; the result is two (as always), but since two is written as
10 in binary, we get, after summing 1 + 1 in binary, a digit 0 and a carry of 1.
Therefore in binary:
0+0=0
0+1=1
1+0=1
1 + 1 = 10 (which is 0 carry 1)
Example. Suppose we would like to add two binary numbers 10 and 11. We start from
the last digit. Adding 0 and 1, we get 1 (no carry). That means the last digit of the
answer will be one. Then we move one digit to the left: adding 1 and 1 we get 10.
Hence, the answer is 101. Note that binary 10 and 11 correspond to 2 and 3
respectively. And the binary sum 101 corresponds to decimal 5: is the binary addition
corresponds to our regular addition.
Here are some examples of binary subtraction. Work the columns right to left
subtracting in each column. If you must subtract a one from a zero, you need to
“borrow” from the left, just as in decimal subtraction.
Truth Table:
1–1=0
1–0=1
0–0=0
0 – 1 = 0 with a borrow of 1
Example 1
1011011
− 10010
1001001
Example 2
10011 – 1100 = 0 0 1 1 1
BINARY MULTIPLICATION
Binary multiplication uses the same algorithm, but uses just three order-independent
facts: 0 x 0 = 0, 1 x 0 = 0, and 1 x 1 = 1 (these work the same as in decimal). If you
perform the multiplication phase with these facts, you’ll notice two things: there are
never any carries, and the partial products will either be zeros or a shifted copy of the
multiplicand.
In the introduction, I showed this example: 1011.01 x 110.1. I wrote it as if you followed
the decimal algorithm to the letter. Here’s how it looks if you follow the simpler “write
zero or multiplicand” algorithm (it’s the same result, but with blanks representing 0s; this
matches better conceptually with what we are now doing):
0/1=0
1/1=1
Step 0
Does 11 go into 1? No, because it’s greater than 1. Does 11 go into 10? No,
because it’s greater than 10. Does 11 go into 101? Yes, because it’s less than or
equal to 101. (Remember, these are binary numerals; pronounce them “one-
one”, “one-zero”, “one-zero-one”, etc.)
Step 1
1. Divide: Does 11 go into 101? (Yes, we already know that from step 0.)
How many times does it go in? One time. There is no guessing. It’s easy
to see 11 is less than 101, so we know it goes in. And if it goes in, it goes
in only once.
2. Multiply: 1 x 11 = 11. (Remember how simple it is to “multiply” a binary
number by a single digit — just copy the number down if that single digit is
1, or write down 0 if that single digit is 0.)
3. Subtract: 101 – 11 = 10.
4. Bring down: Bring down the 1 to make 101.
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
We stop here, recognizing that we divided 100 by 11 two steps ago. This means
we have a two-digit cycle (10) from here on out. The quotient is 11.1110.
Word 2007 is a full-featured word processing program that allows you to create
professional-looking documents and revise them easily . The interface, commonly
referred to as the ribbon, consists of three components:
Compatibility Mode
A Word 2003 document opens in 2007 in a format that is called Compatibility Mode. In
order to have full functionality of Word 2007 you must convert the document from 2003
to 2007.
Home Tab
The Home tab is also known as the Primary tab, and contains the more frequently
1
used commands. The Home tab consists of five Groups as follows:
Insert Tab
Pages allows you to insert blank pages, pre-formatted cover pages, and page
breaks.
WORKBOOK ACTIVITY #1
COMPLETION: Fill-in the table below. Write your answer on the column Data. Identify
what type of data is your answer on the column Types of Data.
DRAWING: Draw and label the Expanded Data Processing Cycle on the blank space
below.
Name: Date:
ETECH – Empowerment Technology 52 | Page
GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
Course: Score:
WORKBOOK ACTIVITY #2
COMPLETION: Examine your personal life. Answer the diagram below with your
personal answers.
3 things in your life that 3 things in your life that 3 things in your life that
you want to store. you want to store and you want to sort and
retrieve. classify.
1. 1. 1.
2. 2. 2.
3. 3. 3.
COMPLETION: Fill-in the table below. Write your answer on the column provided.
2. Slide Rule
3. Analytical Engine
5. Abacus
Name: Date:
Course: Score:
WORKBOOK ACTIVITY #3
ETECH – Empowerment Technology 53 | Page
GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
IDENTIFICATION: Identify the computer peripherals. Write your answers on the space
provided.
Name: Date:
Course: Score:
WORKBOOK ACTIVITY #4
MATCHING TYPE: Match column A with answers on column B. Write the letter of your
answer before the letter.
COLUMN A COLUMN B
Information Center Manager A. manages IS services
Name: Date:
Course: Score:
WORKBOOK ACTIVITY #5
1. Why does Republic Act 10175 – Cybercrime Prevention Act of 2012 important?
WORKBOOK ACTIVITY #6
1. 11101 to decimal
2. 236 to Binary
3. DACEH to Binary
4. 1CEDB to Binary
5. 35 to Octal
WORKBOOK ACTIVITY #7
1. 10111 + 1100
2. 11110 + 110011
3. 11011 + 1111
4. 11011 – 1001
5. 11101 – 1100
6. 1010111 – 110010
WORKBOOK ACTIVITY #8
1. 10111 X 111
2. 1011 + 110 X 110
3. 101111 – 111 X 1100
4. 10011 / 1011
5. 110101 / 1101
6. 11110 / 10
6. www.wikipedia.com
7. www.gov.ph/downloads/2012/09set/20120912-RA-10175-BSA.pdf
8. www.google.com
9. http://pds.hccfl.edu.pds