Etech SHS

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 60

 COURSE OUTLINE 

ETECH – Empowerment Technology

DURATION TOPICS

Week 1  Data and Types of Data


 Data Processing Cycles
Week 2  Data Processing Operations
 History of Computing
Week 3  Definition of Computer
 Fields of Computer Use
Week 4  Advantages and Disadvantages of using computer
 Computer Capabilities and Limitations
Week 5  Basic Parts of Computer
 Elements of Computer System
Week 6  Hardware Technology
 Input / Output / Storage
Week 7  Software Technology
 Peopleware
Week 8  Operating System

Week 9  Computer Ethics


 Netiquette
Week 10  Republic Act 10175 – Cybercrime Prevention Act of 2012

Week 11  Number System Conversion


 Binary – Decimal Conversion and Vice versa
 Binary – Octal and Hexadecimal Conversions
Week 12  Octal – Binary Conversion
 Hexadecimal – Binary Conversion
Week 13  Binary Fundamental Operations
 Addition of Binary
 Subtraction of Binary
Week 14  Multiplication of Binary
 Division of Binary
Week 15
 Word Processing Application
Week 16

Week 17
 Electronic Spreadsheet Application
Week 18

ETECH – Empowerment Technology 1 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
DATA AND DATA PROCESSING

DESIRED LEARNING OUTCOMES (DLO)


At the end of the topic, the student must:
1. Define the term Data
2. Identify the different types of data
3. Trace the Data Processing Cycle

Data - is defined as any collection of facts. It is the information that can be stored and
used by the computer program.

Data Processing - is the manipulation of data into a more useful form. It is the
modern name for paperwork and involves the collecting, processing, and distributing of
facts and figures to achieve a desire result.

Data Processing System - refers to the equipment or devices and procedures by


which the result is achieved.

DATA PROCESSING CYCLE

1. Input – Initial data or input data are Processin


Input
prepared in some convenient form g
for processing. The form will
depend on the processing machine.

2. Processing – Input data are


changed and usually combined with
other information to produce data in Output
a more useful form

ETECH – Empowerment Technology 2 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
3. Output – the results of the preceding processing steps are collected. The
particular form of the output data depends on the use of the data.

HISTORY OF COMPUTING & DATA PROCESSING OPERATIONS

DESIRED LEARNING OUTCOMES (DLO)


At the end of the topic, the student must:
1. Trace the History of Computer
2. Identify the different Data Processing Operations

The Earliest Computing Devices


- The earliest data processing equipment were all manual-mechanical devices due to
the absence of electricity and adequate industrial technology. Among the most
popular were:

1. Abacus – The first manual data processing device developed in CHINA, 12th
century A.D. The device has a frame with beads strung on wires or rods and
arithmetic calculations are performed by manipulating the beads.

2. Napier’s bones – Invent by John Napier, a Scottish Mathematician become


famous for his invention of Logarithms.

3. Oughtred’s Slide Rule – invented by William Oughtred. Slide Rule consists of two
movable rulers placed side by side.

4. Pascal’s Calculator – invent by Blaise Pascal, the first modern scientist to develop
and build calculator that could add and subtract. It is wide known as “Pascaline”.

ETECH – Empowerment Technology 3 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
5. Leibniz’s Calculator – invent by Gottfried Leibniz, at the age of 26 taught himself
mathematics and proceeded to invent calculus.

6. Babbage’s Analytical Engine – invent by Charles Babbage, the Father of the


Modern Computer. He designed to automate a standard procedure for calculating
the roots of polynomials.

7. Hollerith’s Punched-Card Machine – invented by Herman Hollerith, statistician


with the US Bureau of the Census. Invented the 3 to 5 inch punched cards to
record the data.

DATA PROCESSING OPERATIONS

1. Recording – is the transfer of data into other form of documents

2. Merging – is combining one or more data to make it one useful information

3. Storing – is the safe-keeping of data for future use

4. Retrieving – is the process of getting back information from storage

5. Feedback

6. Verifying – is the process of double-checking free from errors

7. Duplicating – is the production of data in same copy

8. Classifying – is the separation of data according to its category

9. Sorting – is the separation of data according to an identified manner

10. Calculating – is the arithmetic manipulation of data

11. Summarizing and reporting

ETECH – Empowerment Technology 4 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
COMPUTER SYSTEM

DESIRED LEARNING OUTCOMES (DLO)


At the end of the topic, the student must:
1. Define the term computer
2. Identify the different elements of Computer System
3. Identify the basic parts of computer
4. Identify the fields of computer use

COMPUTER
- is a programmable machine designed to sequentially and automatically carry out a
sequence of arithmetic or logical operations. It is an electronic system designed to
manipulate data.

Computer has four basic functions:

1. accepts data Input


2. processes data Processing
3. produces output Output
4. stores results Storage

FIELDS OF COMPUTER USE

1. Computers in Education – used in Computer Based Training (CBT)


2. Computers in Telecommunication – used in Short Message Service (SMS) and Voice
over Internet Protocol (VoIP)
3. Computers in Publishing – used in magazines, newspaper and book
4. Computers in Science and Research – used in laboratories and research
5. Computers in Health Services – used in hospitals and health information
6. Computers in Travels – used in online booking, air traffic controls, naval navigations and
others
7. Computers in Space Exploration – used to control satellites and space crafts

ETECH – Empowerment Technology 5 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
8. Computers in Business – used in banks and other establishments
9. Computers in Engineering and Architecture – used in computer Aided Design (CAD)
programs
10. Computers in Entertainment – used in TV and Film animations
11. Computers in Government Services – used in government offices
12. Computers in Manufacturing – used in Computer Aided Manufacturing (CAM)
13. Computers in Military Operations – used in military weapons.

COMPUTER CAPABILITIES
1. Ability to perform certain logic operation
2. Ability to provide new time dimension
3. Ability to store and retrieve information
4. Ability to control error
5. Ability to check itself

COMPUTER LIMITATIONS
1. Dependence on prepared instructions
2. Inability to derive meanings from objects
3. Inability to generate information
4. It cannot correct wrong instructions

WHY COMPUTERS SOMETIMES FAIL


1. Input Errors
2. Errors in instructing a computer
3. The communication gap
4. Improper controls
5. Lack of standards
6. Lack of adequate manufacturer support
BASIC PARTS OF COMPUTER SYSTEM

There are three basic parts of computer system namely: (1) Monitor, (2) System Unit
and (3) Keyboard. In current set-up, the mouse is included as basic parts. The parts
ETECH – Empowerment Technology 6 | Page
GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
which are not included as basic parts are called computer peripherals like printer,
head set, scanner, speaker and others.

1. Keyboard - it is partially modeled after the


typewriter keyboard, which uses the
arrangement of buttons and keys. QWERTY is
the common known lay-out of the keyboard.

2. Monitor - called a visual display unit - Displays information


in visual form, using text and graphics. The portion of the
monitor that displays the information is called the  screen. Like
a television screen, a computer screen can show still or
moving pictures.

3. System Unit – known as a base unit, is the main body of


a desktop computer, typically consisting of a plastic
enclosure containing the motherboard, power supply,
cooling fan, internal disk drives.

ELEMENTS OF COMPUTER SYSTEM

ETECH – Empowerment Technology 7 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
1. Hardware – refers to the physical equipment or components of the computer
system. These are the tangible parts of the system. The parts that can be touch
by the hands like monitor, system unit, keyboard, printer and speaker.

2. Software – is a collection of computer programs and related data that provide the


instructions for telling a computer what to do and how to do it.

3. People ware - refer to anything that has to do with the role of people in the development
or use of computer software and hardware systems, including such issues as developer
productivity, teamwork, group dynamics, the psychology of programming, project
management, organizational factors, human interface design, and human-machine-
interaction.

4. Computer Data – are the information required by the computer to be able to operate,
run a program or store system configuration.

5. Connectivity – refers to maintaining connection to the internet and to the World Wide
Web and allows performing different tasks simultaneously.

6. Procedure – are steps or instructions to follow when handling and using various data,
software and hardware.

THE COMPUTER SYSTEM

ETECH – Empowerment Technology 8 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
System consists of four types of functional units
1. Central Processing Unit
2. Input Unit
3. Output Unit
4. Auxiliary or Secondary Storage Unit

The Processor is made up of the memory, arithmetic, logic and control units.

Computer Configuration – is the collection of all peripheral equipment.

CENTRAL PROCESSING UNIT - it is the “brain” of computer system

1. Control unit - supervises or monitors the function s performed by the entire


computer system according to conditions set forth by the stored program. It
controls the input/output units, the logic/arithmetic operations and the transfer of
data and instruction to and from storage within given design limits. It acts as the “
central nervous system”

Supervisor – a special program that responsible for controlling the operation of


the system. Instruction in each program is transferred one at a time to the control
units.

2. Arithmetic / Logic Unit – performs operation such as addition, subtraction,


multiplication and division.

3. Memory Unit – it is where the computer program and data are stored during
processing. This unit is a random-access storage device consisting of thousands
of storage location, each of which can be directly reached by the control unit.

HARDWARE TECHNOLOGY

ETECH – Empowerment Technology 9 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
DESIRED LEARNING OUTCOMES (DLO)
At the end of the topic, the student must:
1. Define the term computer hardware
2. Identify the different Input, Output and Storage Devices

1. Input Device – tools use to enter information and commands.

 Keyboard - it is partially modeled after


the typewriter keyboard, which uses the
arrangement of buttons and keys.

Mouse - is a small device that a computer user pushes


across a desk surface in order to point to a place on a
display screen and to select one or more actions to take
from that position

 Touch screen - is an electronic visual display that can


detect the presence and location of a touch within the
display area. The term generally refers to touching the
display of the device with a finger or hand. Touch
screens can also sense other passive objects, such as
a stylus. Touch screens are common in devices such
as all-in-one computers, tablet computers, and smart
phones.
 Light pen- is a computer input device in the form of a
light-sensitive wand used in conjunction with a
computer's CRT TV set or monitor. It allows the user to

ETECH – Empowerment Technology 10 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
point to displayed objects, or draw on the screen, in a similar way to a  touch
screen but with greater positional accuracy. It was long thought that a light pen can
work with any CRT-based display, but not with LCD screens.

 Barcode reader (or barcode scanner) is an electronic


device for reading printed barcodes. Like a flatbed
scanner, it consists of a light source, a lens and a light sensor
translating optical impulses into electrical ones. Additionally, nearly all
barcode readers contain decoder circuitry analyzing the barcode's image data
provided by the sensor and sending the barcode's content to the
scanner's output port.

 Game controller is a device used with games or


entertainment systems used to control a playable
character or object, or otherwise provide input in a
computer game.

 Scanner is a device that optically scans images,


printed text, handwriting, or an object, and converts it
to a digital image.

 Webcam - is a video camera which feeds its images in real time to


a computer or computer network

2. Output Devices – tools use to see, hear or recognize the results of your information –
processing request.

ETECH – Empowerment Technology 11 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
 Printer - is a peripheral which produces a text and/or graphics of documents
stored in electronic form, usually on physical print media such as paper. A printer
transfers data from a computer onto paper.

 Monitor - called a visual display unit) - Displays


information in visual form, using text and graphics. The
portion of the monitor that displays the information is
called the screen. Like a television screen, a computer
screen can show still or moving pictures.

 Speaker – is an electro acoustic transducer that converts


an electrical signal into sound. The speaker pulses in
accordance with the variations of an electrical signal and
causes sound waves to propagate through a medium such
as air or water.

 Headphones - are a pair of small loudspeakers, or less commonly a single


speaker, held close to a user's  ears and connected to a signal source such as an
audio amplifier, radio, CD player or portable media player. They are also known
as stereo phones or  headsets

3. Storage Devices – tools use to store information at a later time.

 Hard disk drive– is a non-volatile storage device


that stores digitally encoded data on rapidly
rotating platters with magnetic surfaces.

ETECH – Empowerment Technology 12 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
 DVD /Digital Versatile/Video Disc -  is an optical disc storage media format

 Compact Disc (also known as a CD) - is an optical


disc used to store digital data. It was originally
developed to store and playback sound recordings
exclusively.

 USB flash drive - consists of a flash memory data storage


device integrated with a USB (Universal Serial Bus)
interface. USB flash drives are typically removable
and rewritable.

Floppy disk - is a data storage medium that is


composed of a disk of thin, flexible (floppy)  magnetic
storage medium sealed in a square or rectangular plastic
carrier lined with fabric that removes dust particles.
Floppy disks are read and written by a  floppy disk
drive (FDD).

4. CPU / Central Processing Unit - is the portion of a computer system that


carries out the instructions of a computer program, and
is the primary element carrying out the functions of the
computer or other processing device. The central
processing unit carries out each instruction of the
program in sequence, to perform the basic arithmetical,
logical, and input/output operations of the system. It is also the “BRAIN” of
computer.

ETECH – Empowerment Technology 13 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
5. Telecommunication Device – tools use to send information to and receive it from
another person or computer in a network.

 Modem (modulator – demodulator) – use to connect


computer to internet

 Communication Satellite / COMSAT – ex. TELSTAR

6. Motherboard - is the central printed circuit board (PCB) in many


modern computers and holds many of the crucial
components of the system, providing connectors
for other peripherals. The motherboard is
sometimes alternatively known as the main
board or  system board

7. System Units – known as a base unit, is the


main body of a desktop computer, typically
consisting of a plastic enclosure containing the
motherboard, power supply, cooling fan, internal
disk drives.

ETECH – Empowerment Technology 14 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
8. Power Supply – It gives electricity to the whole computer , it supplies electricity

SOFTWARE TECHNOLOGY
DESIRED LEARNING OBJECTIVES (DLO)
At the end of the topic, the student must:
1. Define the term computer hardware
2. Identify the different Types of Software

TWO MAIN TYPES OF SOFTWARE

ETECH – Empowerment Technology 15 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
1. APPLICATION SOFTWARE – is the software that enables you to solve specific
problems or perform specific task. It allows doing things like create text
documents, play games, listen to music or surf the web.

 Microsoft Word – help for typing or encoding term papers and reports
 Microsoft Excel/ Spreadsheet Software – for calculation
 MS Powerpoint/ Moviemaker/ Proshow Gold – for presentation
 Payroll Software – use for the sum of all financial records of salaries,
wages, bonuses and deduction.
 Internet Explorer / Mozilla Firefox – web browsers

 Collaborative Software – also referred to as Groupware or Workgroup


Support System. Software designed to help people involved in a common
task achieve their goals. It is the basis for computer supported cooperative
work.
Example of Collaborative Software:
1. Faxing
2. Online Chat
3. Email/ Electronic mail

4. Instant Messaging – is a form of real time communication between


two or more people based on type text. The text is conveyed via devices
connected over a network such as the Internet. Allows effective and
efficient communications, featuring immediate receipt of acknowledgment
or reply. In certain cases instant messaging involves additional features,
which make it even more popular such as to see the other party by using
webcams or to talk directly for free over the internet.

5. Data Conferencing – refers to a communication session among two


or more participants sharing computer data in a real time. Interaction and
ETECH – Empowerment Technology 16 | Page
GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
presentation devices such as screen, keyboard, mouse, camera, can be
shared or be able to control each other computer.

2. SYSTEM SOFTWARE – it handles task specific to technology management and


coordinates the interaction of all technology devices. It perform task like
transferring data from memory to disk or rendering text into a display devices.

 Utility Software – it is computer software designed to help manage and


tune the computer hardware and application software by performing a
single task or small range of tasks.

Examples:

 Anti Virus Software – utilities scan/detect for computer viruses.


 Disk Cleaners Software – can find files that are unnecessary to
computer operation or take-up considerable amount of space.
Helps the user to decide what to delete when hard disk is full. The
one that delete excess files.

PEOPLEWARE AND OPERATING SYSTEM

DESIRED LEARNING OUTCOMES (DLO)


At the end of the topic, the student must:
1. Define the term Peopleware
2. Identify the different I.T. career opportunities
3. Define Operating System
4. Identify the types of Operating System

ETECH – Empowerment Technology 17 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
PEOPLEWARE – represents the personnel involved in systems analysis, programming,
computer operations, and system maintenance.

DIFFERENT I.T. CAREER OPPORTUNITIES

1. Chief Information Officer – Highest ranking IS manager responsible in strategic


planning of organization

2. IS Director – responsible for managing all the system

3. Information Center Manager – manages IS services

4. Application Development Manager – manages and coordinates new system


development projects

5. Project Manager - manages a particular new system development project

6. Systems Manager – manages a particular existing system

7. Operations Manager – supervises the daily operation of the data computer center

8. Programming Manager – coordinates all programming applications

9. Systems Analyst – interfaces between users and programmers, determines


application requirements and technical specification for new applications

10. Systems Programmer – writes computer codes for developing new applications

11. Network Manager – coordinates and manages organization’s voice and data
network

12. Database Administrator – manages organization’s database and DB software


usage

13. Webmaster – manages the organizations world wide web site

14. Web Designer – creates world wide web sites and pages

15. Computer Operator – operates computer hardware system

16. Educator – employed to teach computing concepts

ETECH – Empowerment Technology 18 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
 OPERATING SYSTEM (OS)

- is a set of software that manages computer hardware resources and provides


common services for computer programs. The operating system is a vital component of
the system software in a computer system. Application programs require an operating
system to function.

Time-sharing operating systems schedule tasks for efficient use of the system and may
also include accounting for cost allocation of processor time, mass storage, printing,
and other resources.

For hardware functions such as input and output and memory allocation, the operating
system acts as an intermediary between programs and the computer hardware,
although the application code is usually executed directly by the hardware and will
frequently make a system call to an OS function or be interrupted by it. Operating
systems can be found on almost any device that contains a computer—from cellular
phones and video game consoles to supercomputers and web servers.

Examples of popular modern operating system

include Android, BSD, iOS, GNU/Linux,Mac OS X, Microsoft Windows,[3] Windows


Phone, and IBM z/OS. All these, except Windows and z/OS, share roots in UNIX.

TYPES OF OPERATING SYSTEM

Real-time
A real-time operating system is a multitasking operating system that aims at
executing real-time applications. Real-time operating systems often use
specialized scheduling algorithms so that they can achieve a deterministic nature

ETECH – Empowerment Technology 19 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
of behavior. The main objective of real-time operating systems is their quick and
predictable response to events. They have an event-driven or time-sharing
design and often aspects of both. An event-driven system switches between
tasks based on their priorities or external events while time-sharing operating
systems switch tasks based on clock interrupts.

Multi-user
A multi-user operating system allows multiple users to access a computer system
concurrently. Time-sharing system can be classified as multi-user systems as
they enable a multiple user access to a computer through the sharing of time.
Single-user operating systems, as opposed to a multi-user operating system, are
usable by a single user at a time. Being able to use multiple accounts on a
Windows operating system does not make it a multi-user system. Rather, only
the network administrator is the real user.

Multi-tasking vs. Single-tasking


When only a single program is allowed to run at a time, the system is grouped
under a single-tasking system. However, when the operating system allows the
execution of multiple tasks at one time, it is classified as a multi-tasking operating
system. Multi-tasking can be of two types: pre-emptive or co-operative. In pre-
emptive multitasking, the operating system slices the CPU time and dedicates
one slot to each of the programs. Unix-like operating systems such as Solaris
and Linux support pre-emptive multitasking, as does AmigaOS. Cooperative
multitasking is achieved by relying on each process to give time to the other
processes in a defined manner. 16-bit versions of Microsoft Windows used
cooperative multi-tasking. 32-bit versions, both Windows NT and Win9x, used
pre-emptive multi-tasking. Mac OS prior to OS X used to support cooperative
multitasking.

Distributed

ETECH – Empowerment Technology 20 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
A distributed operating system manages a group of independent computers and
makes them appear to be a single computer. The development of networked
computers that could be linked and communicate with each other gave rise to
distributed computing. Distributed computations are carried out on more than one
machine. When computers in a group work in cooperation, they make a
distributed system.

Embedded
Embedded operating systems are designed to be used in embedded computer
systems. They are designed to operate on small machines like PDAs with less
autonomy. They are able to operate with a limited number of resources. They are
very compact and extremely efficient by design. Windows CE and Minix 3 are
some examples of embedded operating systems.

BOOTING
The process of loading the system files of the operating system from the disk into the
computer memory to complete the circuitry requirement of the computer system is
called booting. The system files of MS. DOS are:

Types of Booting: There are two types of booting:

ETECH – Empowerment Technology 21 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
• Cold Booting: If the computer is in off state and we boot the computer by
pressing the power switch ‘ON’ from the CPU box then it is called as cold
booting.

• Warm Booting: If the computer is already ‘ON’ and


we restart it by pressing the ‘RESET’ button from the CPU
box or CTRL, ALT and DEL key simultaneously from the
keyboard then it is called warm booting.

How to start the Computer in Microsoft Windows’s mode? There is nothing special
you need to start this system. Just,

1. Switch ON the Power Supply.

2. Switch ON the CPU and,

3. Switch ON the Screen (Monitor).

How to Shutdown (Turn off) the Computer?

Before shutting down the Computer, close all opened windows at first. Then,

1. Click on Start button.


2. Click on Shutdown (Turn Off Computer).
Then, Computer asks you: What do you want the Computer to do?

• Standby

ETECH – Empowerment Technology 22 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
• Shutdown (Turn Off)

• Restart

• Restart in MS-DOS mode.

Note: The options will be different from one OS to another.

3. Choose 2nd option (i.e. Shutdown/Turn Off).


4. Click on OK.
Then, wait until the message “It’s now safe to turn off your Computer”.

5. Then, Switch Off the screen.


6. Switch Off the CPU.
7. At last, Switch Off the power supply.

COMPUTER ETHICS AND NETIQUETTE

DESIRED LEARNING OUTCOMES (DLO)


At the end of the topic, the student must:
1. Discuss Computer Ethics
2. Discuss Netiquette and Rules on Netiquette

ETECH – Empowerment Technology 23 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
TEN COMMANDMENTS OF COMPUTER ETHICS
Created by the Computer Ethics Institute

1. Thou shalt not use a computer to harm other people.

2. Thou shalt not interfere with other people’s computer work.

3. Thou shalt not snoop around in other people’s computer files.

4. Thou shalt not use a computer to steal.

5. Thou shalt not use a computer to bear false witness.

6. Thou shalt not copy or use proprietary software for which you have not paid.

7. Thou shalt not use other people’s computer resources without authorization or proper
compensation.

8. Thou shalt not appropriate other people’s intellectual output.

9. Thou shalt think about the social consequences of the program you are writing or the
system you are designing.

10. Thou shalt always use a computer in ways that insure consideration and respect for
your fellow humans.

NETIQUETTE (NETwork etIQUETTE)

ETECH – Empowerment Technology 24 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
-is the proper manners when conferencing between two or more users on an online
service or the Internet.

25 RULES OF SOCIAL MEDIA NETIQUETTE

1. Put all items in an appropriate group. - Don’t abuse your network – Use your
network the right way.

2. Reply via mail.

3. Exhibit care in preparing items.

4. Read follow ups. - If someone asks you a question don’t ignore them. If they are
trying to strike conversation respond back to them because that is how you become a
good social media user.

5. Don’t be rude or abusive.

6. Avoid sarcasm and facetious remarks. Treat others how you want to be treated.

7. Use descriptive titles. - Fill out the Subject line properly. 

8. Cite references. - Don’t make claims that cannot be guaranteed. Social media is a
place to be honest and truthful.

9. Summarize the original item in follow ups.

10. In posting summaries of replies, summarize.

11. Be as brief as possible. - Don’t cram too much into your updates

12. Don’t submit items berating violators of these rules.

13. Don’t make people read the same thing more than once.

ETECH – Empowerment Technology 25 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
14. Put your best foot forward.

15. Be authentic.

16. Be generous.

17. Don’t ask people to shill for you.

18. Don’t mass-message people.

19. Link to sources. - If you quote someone, you need to link.

20. Invite with care. - Don’t send friends invitations without a proper introduction – they
don’t know who you are in most cases and they shouldn’t guess.

21. Friends are optional.

22. Don’t creep.

23. Don’t tag your friends’ (bad) photos.

24. Don’t be an egomaniac.

25. Don’t confuse strategy with netiquette.

[ Republic Act No. 10175 ]

AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION,


INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES
THEREFOR AND FOR OTHER PURPOSES

CHAPTER I
PRELIMINARY PROVISIONS

ETECH – Empowerment Technology 26 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
SECTION 1. Title. — This Act shall be known as the “Cybercrime Prevention Act of
2012”.

SEC. 2. Declaration of Policy. — The State recognizes the vital role of information and
communications industries such as content production, telecommunications,
broadcasting electronic commerce, and data processing, in the nation’s overall social
and economic development. The State also recognizes the importance of providing an
environment conducive to the development, acceleration, and rational application and
exploitation of information and communications technology (ICT) to attain free, easy,
and intelligible access to exchange and/or delivery of information; and the need to
protect and safeguard the integrity of computer, computer and communications
systems, networks, and databases, and the confidentiality, integrity, and availability of
information and data stored therein, from all forms of misuse, abuse, and illegal access
by making punishable under the law such conduct or conducts. In this light, the State
shall adopt sufficient powers to effectively prevent and combat such offenses by
facilitating their detection, investigation, and prosecution at both the domestic and
international levels, and by providing arrangements for fast and reliable international
cooperation.

SEC. 3. Definition of Terms. — For purposes of this Act, the following terms are hereby
defined as follows:

(a) Access refers to the instruction, communication with, storing data in, retrieving data
from, or otherwise making use of any resources of a computer system or
communication network.

(b) Alteration refers to the modification or change, in form or substance, of an existing


computer data or program.

(c) Communication refers to the transmission of information through ICT media,


including voice, video and other forms of data.

(d) Computer refers to an electronic, magnetic, optical, electrochemical, or other data


processing or communications device, or grouping of such devices, capable of
performing logical, arithmetic, routing, or storage functions and which includes any
storage facility or equipment or communications facility or equipment directly related to
or operating in conjunction with such device. It covers any type of computer device
including devices with data processing capabilities like mobile phones, smart phones,
computer networks and other devices connected to the internet.

(e) Computer data refers to any representation of facts, information, or concepts in a


form suitable for processing in a computer system including a program suitable to cause
a computer system to perform a function and includes electronic documents and/or
electronic data messages whether stored in local computer systems or online.

ETECH – Empowerment Technology 27 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
(f) Computer program refers to a set of instructions executed by the computer to
achieve intended results.

(g) Computer system refers to any device or group of interconnected or related devices,


one or more of which, pursuant to a program, performs automated processing of data. It
covers any type of device with data processing capabilities including, but not limited to,
computers and mobile phones. The device consisting of hardware and software may
include input, output and storage components which may stand alone or be connected
in a network or other similar devices. It also includes computer data storage devices or
media.

(h) Without right refers to either: (i) conduct undertaken without or in excess of


authority; or (ii) conduct not covered by established legal defenses, excuses, court
orders, justifications, or relevant principles under the law.

(i) Cyber refers to a computer or a computer network, the electronic medium in which


online communication takes place.

(j) Critical infrastructure refers to the computer systems, and/or networks, whether


physical or virtual, and/or the computer programs, computer data and/or traffic data so
vital to this country that the incapacity or destruction of or interference with such system
and assets would have a debilitating impact on security, national or economic security,
national public health and safety, or any combination of those matters.

(k) Cybersecurity refers to the collection of tools, policies, risk management


approaches, actions, training, best practices, assurance and technologies that can be
used to protect the cyber environment and organization and user’s assets.

(l) Database refers to a representation of information, knowledge, facts, concepts, or


instructions which are being prepared, processed or stored or have been prepared,
processed or stored in a formalized manner and which are intended for use in a
computer system.

(m) Interception refers to listening to, recording, monitoring or surveillance of the


content of communications, including procuring of the content of data, either directly,
through access and use of a computer system or indirectly, through the use of
electronic eavesdropping or tapping devices, at the same time that the communication
is occurring.

(n) Service provider refers to:

(1) Any public or private entity that provides to users of its service the ability to
communicate by means of a computer system; and

(2) Any other entity that processes or stores computer data on behalf of such
communication service or users of such service.

ETECH – Empowerment Technology 28 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
(o) Subscriber’s information refers to any information contained in the form of computer
data or any other form that is held by a service provider, relating to subscribers of its
services other than traffic or content data and by which identity can be established:

(1) The type of communication service used, the technical provisions taken thereto and
the period of service;

(2) The subscriber’s identity, postal or geographic address, telephone and other access
numbers, any assigned network address, billing and payment information, available on
the basis of the service agreement or arrangement; and

(3) Any other available information on the site of the installation of communication
equipment, available on the basis of the service agreement or arrangement.

(p) Traffic data or non-content data refers to any computer data other than the content
of the communication including, but not limited to, the communication’s origin,
destination, route, time, date, size, duration, or type of underlying service.

CHAPTER II
PUNISHABLE ACTS

SEC. 4. Cybercrime Offenses. — The following acts constitute the offense of


cybercrime punishable under this Act:

(a) Offenses against the confidentiality, integrity and availability of computer data and
systems:

(1) Illegal Access. – The access to the whole or any part of a computer system without
right.

(2) Illegal Interception. – The interception made by technical means without right of any
non-public transmission of computer data to, from, or within a computer system
including electromagnetic emissions from a computer system carrying such computer
data.

(3) Data Interference. — The intentional or reckless alteration, damaging, deletion or


deterioration of computer data, electronic document, or electronic data message,
without right, including the introduction or transmission of viruses.

(4) System Interference. — The intentional alteration or reckless hindering or


interference with the functioning of a computer or computer network by inputting,
transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or
program, electronic document, or electronic data message, without right or authority,
including the introduction or transmission of viruses.

(5) Misuse of Devices.

ETECH – Empowerment Technology 29 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
(i) The use, production, sale, procurement, importation, distribution, or otherwise making
available, without right, of:

(aa) A device, including a computer program, designed or adapted primarily for the
purpose of committing any of the offenses under this Act; or

(bb) A computer password, access code, or similar data by which the whole or any part
of a computer system is capable of being accessed with intent that it be used for the
purpose of committing any of the offenses under this Act.

(ii) The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with intent
to use said devices for the purpose of committing any of the offenses under this section.

(6) Cyber-squatting. – The acquisition of a domain name over the internet in bad faith to
profit, mislead, destroy reputation, and deprive others from registering the same, if such
a domain name is:

(i) Similar, identical, or confusingly similar to an existing trademark registered with the
appropriate government agency at the time of the domain name registration:

(ii) Identical or in any way similar with the name of a person other than the registrant, in
case of a personal name; and

(iii) Acquired without right or with intellectual property interests in it.

(b) Computer-related Offenses:

(1) Computer-related Forgery. —

(i) The input, alteration, or deletion of any computer data without right resulting in
inauthentic data with the intent that it be considered or acted upon for legal purposes as
if it were authentic, regardless whether or not the data is directly readable and
intelligible; or

(ii) The act of knowingly using computer data which is the product of computer-related
forgery as defined herein, for the purpose of perpetuating a fraudulent or dishonest
design.

(2) Computer-related Fraud. — The unauthorized input, alteration, or deletion of


computer data or program or interference in the functioning of a computer system,
causing damage thereby with fraudulent intent: Provided, That if no

damage has yet been caused, the penalty imposable shall be one (1) degree lower.

(3) Computer-related Identity Theft. – The intentional acquisition, use, misuse, transfer,
possession, alteration or deletion of identifying information belonging to another,

ETECH – Empowerment Technology 30 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
whether natural or juridical, without right: Provided, That if no damage has yet been
caused, the penalty imposable shall be one (1) degree lower.

(c) Content-related Offenses:

(1) Cybersex. — The willful engagement, maintenance, control, or operation, directly or


indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of
a computer system, for favor or consideration.

(2) Child Pornography. — The unlawful or prohibited acts defined and punishable
by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through
a computer system: Provided, That the penalty to be imposed shall be (1) one degree
higher than that provided for in Republic Act No. 9775.

(3) Unsolicited Commercial Communications. — The transmission of commercial


electronic communication with the use of computer system which seek to advertise, sell,
or offer for sale products and services are prohibited unless:

(i) There is prior affirmative consent from the recipient; or

(ii) The primary intent of the communication is for service and/or administrative
announcements from the sender to its existing users, subscribers or customers; or

(iii) The following conditions are present:

(aa) The commercial electronic communication contains a simple, valid, and reliable
way for the recipient to reject. receipt of further commercial electronic messages (opt-
out) from the same source;

(bb) The commercial electronic communication does not purposely disguise the source
of the electronic message; and

(cc) The commercial electronic communication does not purposely include misleading
information in any part of the message in order to induce the recipients to read the
message.

(4) Libel. — The unlawful or prohibited acts of libel as defined in Article 355 of the
Revised Penal Code, as amended, committed through a computer system or any other
similar means which may be devised in the future.

SEC. 5. Other Offenses. — The following acts shall also constitute an offense:

(a) Aiding or Abetting in the Commission of Cybercrime. – Any person who willfully
abets or aids in the commission of any of the offenses enumerated in this Act shall be
held liable.

ETECH – Empowerment Technology 31 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
(b) Attempt in the Commission of Cybercrime. — Any person who willfully attempts to
commit any of the offenses enumerated in this Act shall be held liable.

SEC. 6. All crimes defined and penalized by the Revised Penal Code, as amended, and
special laws, if committed by, through and with the use of information and
communications technologies shall be covered by the relevant provisions of this
Act: Provided, That the penalty to be imposed shall be one (1) degree higher than that
provided for by the Revised Penal Code, as amended, and special laws, as the case
may be.

SEC. 7. Liability under Other Laws. — A prosecution under this Act shall be without
prejudice to any liability for violation of any provision of the Revised Penal Code, as
amended, or special laws.

CHAPTER III
PENALTIES

SEC. 8. Penalties. — Any person found guilty of any of the punishable acts enumerated
in Sections 4(a) and 4(b) of this Act shall be punished with imprisonment of prision
mayor or a fine of at least Two hundred thousand pesos (PhP200,000.00) up to a
maximum amount commensurate to the damage incurred or both.

Any person found guilty of the punishable act under Section 4(a)(5) shall be punished
with imprisonment of prision mayor or a fine of not more than Five hundred thousand
pesos (PhP500,000.00) or both.

If punishable acts in Section 4(a) are committed against critical infrastructure, the
penalty of reclusion temporal or a fine of at least Five hundred thousand pesos
(PhP500,000.00) up to maximum amount commensurate to the damage incurred or
both, shall be imposed.

Any person found guilty of any of the punishable acts enumerated in Section 4(c)(1) of
this Act shall be punished with imprisonment of prision mayor or a fine of at least Two
hundred thousand pesos (PhP200,000.00) but not exceeding One million pesos
(PhP1,000,000.00) or both.

Any person found guilty of any of the punishable acts enumerated in Section 4(c)(2) of
this Act shall be punished with the penalties as enumerated in Republic Act No. 9775 or
the “Anti-Child Pornography Act of 2009”: Provided, That the penalty to be imposed
shall be one (1) degree higher than that provided for in Republic Act No. 9775, if
committed through a computer system.

Any person found guilty of any of the punishable acts enumerated in Section 4(c)(3)
shall be punished with imprisonment of arresto mayor or a fine of at least Fifty thousand
pesos (PhP50,000.00) but not exceeding Two hundred fifty thousand pesos
(PhP250,000.00) or both.

ETECH – Empowerment Technology 32 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
Any person found guilty of any of the punishable acts enumerated in Section 5 shall be
punished with imprisonment one (1) degree lower than that of the prescribed penalty for
the offense or a fine of at least One hundred thousand pesos (PhP100,000.00) but not
exceeding Five hundred thousand pesos (PhP500,000.00) or both.

SEC. 9. Corporate Liability. — When any of the punishable acts herein defined are
knowingly committed on behalf of or for the benefit of a juridical person, by a natural
person acting either individually or as part of an organ of the juridical person, who has a
leading position within, based on: (a) a power of representation of the juridical person
provided the act committed falls within the scope of such authority; (b) an authority to
take decisions on behalf of the juridical person: Provided, That the act committed falls
within the scope of such authority; or (c) an authority to exercise control within the
juridical person, the juridical person shall be held liable for a fine equivalent to at least
double the fines imposable in Section 7 up to a maximum of Ten million pesos
(PhP10,000,000.00).

If the commission of any of the punishable acts herein defined was made possible due
to the lack of supervision or control by a natural person referred to and described in the
preceding paragraph, for the benefit of that juridical person by a natural person acting
under its authority, the juridical person shall be held liable for a fine equivalent to at
least double the fines imposable in Section 7 up to a maximum of Five million pesos
(PhP5,000,000.00).

The liability imposed on the juridical person shall be without prejudice to the criminal
liability of the natural person who has committed the offense.

CHAPTER IV
ENFORCEMENT AND IMPLEMENTATION

SEC. 10. Law Enforcement Authorities. — The National Bureau of Investigation (NBI)


and the Philippine National Police (PNP) shall be responsible for the efficient and
effective law enforcement of the provisions of this Act. The NBI and the PNP shall
organize a cybercrime unit or center manned by special investigators to exclusively
handle cases involving violations of this Act.

SEC. 11. Duties of Law Enforcement Authorities. — To ensure that the technical nature
of cybercrime and its prevention is given focus and considering the procedures involved
for international cooperation, law enforcement authorities specifically the computer or
technology crime divisions or units responsible for the investigation of cybercrimes are
required to submit timely and regular reports including pre-operation, post-operation and
investigation results and such other documents as may be required to the Department
of Justice (DOJ) for review and monitoring.

SEC. 13. Preservation of Computer Data. — The integrity of traffic data and subscriber
information relating to communication services provided by a service provider shall be
preserved for a minimum period of six (6) months from the date of the transaction.

ETECH – Empowerment Technology 33 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
Content data shall be similarly preserved for six (6) months from the date of receipt of
the order from law enforcement authorities requiring its preservation.

Law enforcement authorities may order a one-time extension for another six (6)
months: Provided, That once computer data preserved, transmitted or stored by a
service provider is used as evidence in a case, the mere furnishing to such service
provider of the transmittal document to the Office of the Prosecutor shall be deemed a
notification to preserve the computer data until the termination of the case.

The service provider ordered to preserve computer data shall keep confidential the
order and its compliance.

SEC. 14. Disclosure of Computer Data. — Law enforcement authorities, upon securing


a court warrant, shall issue an order requiring any person or service provider to disclose
or submit subscriber’s information, traffic data or relevant data in his/its possession or
control within seventy-two (72) hours from receipt of the order in relation to a valid
complaint officially docketed and assigned for investigation and the disclosure is
necessary and relevant for the purpose of investigation.

SEC. 15. Search, Seizure and Examination of Computer Data. — Where a search and
seizure warrant is properly issued, the law enforcement authorities shall likewise have
the following powers and duties.

Within the time period specified in the warrant, to conduct interception, as defined in this
Act, and:

(a) To secure a computer system or a computer data storage medium;

(b) To make and retain a copy of those computer data secured;

(c) To maintain the integrity of the relevant stored computer data;

(d) To conduct forensic analysis or examination of the computer data storage medium;
and

(e) To render inaccessible or remove those computer data in the accessed computer or
computer and communications network.

Pursuant thereof, the law enforcement authorities may order any person who has
knowledge about the functioning of the computer system and the measures to protect
and preserve the computer data therein to provide, as is reasonable, the necessary
information, to enable the undertaking of the search, seizure and examination.

Law enforcement authorities may request for an extension of time to complete the
examination of the computer data storage medium and to make a return thereon but in
no case for a period longer than thirty (30) days from date of approval by the court.

ETECH – Empowerment Technology 34 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
SEC. 16. Custody of Computer Data. — All computer data, including content and traffic
data, examined under a proper warrant shall, within forty-eight (48) hours after the
expiration of the period fixed therein, be deposited with the court in a sealed package,
and shall be accompanied by an affidavit of the law enforcement authority executing it
stating the dates and times covered by the examination, and the law enforcement
authority who may access the deposit, among other relevant data. The law enforcement
authority shall also certify that no duplicates or copies of the whole or any part thereof
have been made, or if made, that all such duplicates or copies are included in the
package deposited with the court. The package so deposited shall not be opened, or
the recordings replayed, or used in evidence, or then contents revealed, except upon
order of the court, which shall not be granted except upon motion, with due notice and
opportunity to be heard to the person or persons whose conversation or
communications have been recorded.

SEC. 17. Destruction of Computer Data. — Upon expiration of the periods as provided


in Sections 13 and 15, service providers and law enforcement authorities, as the case
may be, shall immediately and completely destroy the computer data subject of a
preservation and examination.

SEC. 18. Exclusionary Rule. — Any evidence procured without a valid warrant or


beyond the authority of the same shall be inadmissible for any proceeding before any
court or tribunal.

SEC. 19. Restricting or Blocking Access to Computer Data. — When a computer data


is prima facie found to be in violation of the provisions of this Act, the DOJ shall issue
an order to restrict or block access to such computer data.

SEC. 20. Noncompliance. — Failure to comply with the provisions of Chapter IV hereof


specifically the orders from law enforcement authorities shall be punished as a violation
of Presidential Decree No. 1829 with imprisonment of prision correctional in its
maximum period or a fine of One hundred thousand pesos (Php100,000.00) or both, for
each and every noncompliance with an order issued by law enforcement authorities.

CHAPTER VIII
FINAL PROVISIONS

SEC. 27. Appropriations. — The amount of Fifty million pesos (PhP50,000,000.00) shall


be appropriated annually for the implementation of this Act.

SEC. 28. Implementing Rules and Regulations. — The ICTO-DOST, the DOJ and the
Department of the Interior and Local Government (DILG) shall jointly formulate the
necessary rules and regulations within ninety (90) days from approval of this Act, for its
effective implementation.

SEC. 29. Separability Clause — If any provision of this Act is held invalid, the other
provisions not affected shall remain in full force and effect.

ETECH – Empowerment Technology 35 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
SEC. 30. Repealing Clause. — All laws, decrees or rules inconsistent with this Act are
hereby repealed or modified accordingly. Section 33(a) of Republic Act No. 8792 or the
“Electronic Commerce Act” is hereby modified accordingly.

SEC. 31. Effectivity. — This Act shall take effect fifteen (15) days after the completion of
its publication in the Official Gazette or in at least two (2) newspapers of general
circulation

Approved,

(Sgd.) FELICIANO BELMONTE JR. (Sgd.) JUAN PONCE ENRILE


Speaker of the House President of the Senate
of Representatives

This Act which is a consolidation of Senate Bill No. 2796 and House Bill No. 5808 was
finally passed by the Senate and the House of Representatives on June 5, 2012 and
June 4, 2012, respectively.

 Approved: SEP 12 2012

(Sgd.) BENIGNO S. AQUINO III


President of the Philippines

BINARY NUMBER SYSTEM

DESIRED LEARNING OUTCOMES (DLO)


At the end of the topic, the student must:
1. Solve conversion of binary and other number systems.

NUMBER SYSTEMS

ETECH – Empowerment Technology 36 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
CONVERSION:

DECIMAL BINARY OCTAL HEXADECIMAL


0 0000 000 0000
1 0001 001 0001
2 0010 010 0010
3 0011 011 0011
4 0100 100 0100
5 0101 101 0101
6 0110 110 0110
7 0111 111 0111
8 1000 1000
9 1001 1001
10-A 1010 1010
11-B 1011 1011
12-C 1100 1100
13-D 1101 1101
14-E 1110 1110
15-F 1111 1111

DECIMAL – BINARY CONVERSION

EXAMPLE: 139 convert to ________2

DIVISION QUOTIENTS REMAINDERS


139/2 69 1
69/2 34 1
34/2 17 0
17/2 8 1
8/2 4 0

ETECH – Empowerment Technology 37 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
4/2 2 0
2/2 1 0
1/2 0 1

THEREFORE: 139 = 10000112

BINARY – DECIMAL CONVERSION

EXAMPLE:
a. 101 = 1x22 + 0x21 + 1x20

=4+0+1
=5

b. 1100 = 1x23+ 1x22 + 0x21 + 0x20

= 8+4+0+0
= 12
DECIMAL – OCTAL CONVERSION

EXAMPLE:

A.)18 convert to ___________8

DIVISION QUOTIENT REMAINDERS


18/8 2 2
2/8 0 2

THEREFORE: 1810 = 22 8

ETECH – Empowerment Technology 38 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
B.) 255 convert to __________8

DIVISION QUOTIENT REMAINDERS


255/8 31 7
31/8 3 7
3/8 0 3

THEREFORE: 25510 = 3778

OCTAL – DECIMAL CONVERSION

EXAMPLES:

A.) 258 = 2x81 + 5x80


= 16 + 5
= 2110

Answer : 258 = 2110

B.) 4608 = 4x82 + 6x81 + 0x80


= 256 + 48 + 0
= 30410

Answer: 4608 = 30410

DECIMAL – HEXADECIMAL CONVERSION

EXAMPLE: 36210 convert to ___________16

ETECH – Empowerment Technology 39 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
DIVISIONS QUOTIENT REMAINDERS
362/16 22 10 – A
22/16 1 6
1/16 0 1

Answer: 36210 = 16A16

HEXADECIMAL – BINARY CONVERSION

A.) 2C8516 = 101100100001012

Solution:

2 C 8 5
0010 1100 1000 0101

B.) 8A5B16 = 10001010010110112

Solution:

8 A 5 B
1000 1010 0101 1011

C.) 78EB16 = 01111000111010112

Solution:

ETECH – Empowerment Technology 40 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
7 8 E B
0111 1000 1110 1011

BINARY – HEXADECIMAL CONVERSION

When converting binary to hexadecimal equivalents, the binary number is first


partitioned into 4-bit sequences beginning on the right and then replaced by its
hexadecimal equivalent. Zeroes may be added to make the number digits a multiple of
four.

a.) 1011101100100112 = 5C93

Solution:
101 1101 1001 0011
5 13 - C 9 3

b.) 101101011000111002 = 16B1C

Solution:
1 0110 1011 0001 1100
1 6 11 - B 1 12 - C

c.) 10000111010002 = ?
Solution:

ETECH – Empowerment Technology 41 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
BINARY ADDITION

Now that we know binary numbers, we will learn how to add them. Binary addition is
much like your normal everyday addition (decimal addition), except that it carries on a
value of 2 instead of a value of 10.

For example: in decimal addition, if you add 8 + 2 you get ten, which you write as 10; in
the sum this gives a digit 0 and a carry of 1. Something similar happens in binary
addition when you add 1 and 1; the result is two (as always), but since two is written as
10 in binary, we get, after summing 1 + 1 in binary, a digit 0 and a carry of 1.

Therefore in binary:
0+0=0
0+1=1
1+0=1
1 + 1 = 10 (which is 0 carry 1)

Example. Suppose we would like to add two binary numbers 10 and 11. We start from
the last digit. Adding 0 and 1, we get 1 (no carry). That means the last digit of the
answer will be one. Then we move one digit to the left: adding 1 and 1 we get 10.
Hence, the answer is 101. Note that binary 10 and 11 correspond to 2 and 3
respectively. And the binary sum 101 corresponds to decimal 5: is the binary addition
corresponds to our regular addition.

ETECH – Empowerment Technology 42 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
BINARY SUBTRACTION

Here are some examples of binary subtraction. Work the columns right to left
subtracting in each column. If you must subtract a one from a zero, you need to
“borrow” from the left, just as in decimal subtraction.

Truth Table:

1–1=0
1–0=1
0–0=0
0 – 1 = 0 with a borrow of 1

Example 1

1011011 – 10010 = 1001001

1011011
− 10010
1001001

Example 2

10011 – 1100 = 0 0 1 1 1

ETECH – Empowerment Technology 43 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
10011
- 1100
00111

BINARY MULTIPLICATION

Binary multiplication uses the same algorithm, but uses just three order-independent
facts: 0 x 0 = 0, 1 x 0 = 0, and 1 x 1 = 1 (these work the same as in decimal). If you
perform the multiplication phase with these facts, you’ll notice two things: there are
never any carries, and the partial products will either be zeros or a shifted copy of the
multiplicand.

In the introduction, I showed this example: 1011.01 x 110.1. I wrote it as if you followed
the decimal algorithm to the letter. Here’s how it looks if you follow the simpler “write
zero or multiplicand” algorithm (it’s the same result, but with blanks representing 0s; this
matches better conceptually with what we are now doing):

ETECH – Empowerment Technology 44 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
BINARY DIVISION
Truth Table:

0/1=0
1/1=1

ETECH – Empowerment Technology 45 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
Steps of Binary Division

Step 0

Does 11 go into 1? No, because it’s greater than 1. Does 11 go into 10? No,
because it’s greater than 10. Does 11 go into 101? Yes, because it’s less than or
equal to 101. (Remember, these are binary numerals; pronounce them “one-
one”, “one-zero”, “one-zero-one”, etc.)

Step 1

1. Divide: Does 11 go into 101? (Yes, we already know that from step 0.)
How many times does it go in? One time. There is no guessing. It’s easy
to see 11 is less than 101, so we know it goes in. And if it goes in, it goes
in only once.
2. Multiply: 1 x 11 = 11. (Remember how simple it is to “multiply” a binary
number by a single digit — just copy the number down if that single digit is
1, or write down 0 if that single digit is 0.)
3. Subtract: 101 – 11 = 10.
4. Bring down: Bring down the 1 to make 101.

Step 2

5. Divide: Does 11 go into 101? Yes, 1 time.


6. Multiply: 1 x 11 = 11.
7. Subtract: 101 – 11 = 10.
8. Bring down: Bring down the 1 to make 101.

Step 3

ETECH – Empowerment Technology 46 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
9. Divide: Does 11 go into 101? Yes, 1 time.
10. Multiply: 1 x 11 = 11.
11. Subtract: 101 – 11 = 10.
12. Bring down: Bring down the 1 to make 101.

Step 4

13. Divide: Does 11 go into 101? Yes, 1 time.


14. Multiply: 1 x 11 = 11.
15. Subtract: 101 – 11 = 10.
16. Bring down: Bring down the 0 to make 100.

Step 5

17. Divide: Does 11 go into 100? Yes, 1 time.


18. Multiply: 1 x 11 = 11.
19. Subtract: 100 – 11 = 1.
20. Bring down: Bring down the 0 to make 10.

Step 6

21. Divide: Does 11 go into 10? No (write down a 0).


22. Multiply: (We don’t need to record this step; we’re just going to get 0.)
23. Subtract: (We don’t need to record this step; we’re just going to get 10.)
24. Bring down: Bring down the 0 to make 100.

Step 7

We stop here, recognizing that we divided 100 by 11 two steps ago. This means
we have a two-digit cycle (10) from here on out. The quotient is 11.1110.

ETECH – Empowerment Technology 47 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
Microsoft Word 2007

Word 2007 is a full-featured word processing program that allows you to create
professional-looking documents and revise them easily . The interface, commonly
referred to as the ribbon, consists of three components:

Word Document Icon and Name You will


recognize the first document icon as a 2003
document. . The icon on the right is for 2007
documents.

The document name for a 2003 file ends in .doc. The


document name for a 2007 file ends in .docx .

ETECH – Empowerment Technology 48 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
The Office Button is a central location
for managing and sharing documents. When you click the Office Button,
located in the upper-left corner of the window, Word displays the Office
Button menu that provides you with access to a list of common
commands.

Compatibility Mode
A Word 2003 document opens in 2007 in a format that is called Compatibility Mode. In
order to have full functionality of Word 2007 you must convert the document from 2003
to 2007.

Home Tab
The Home tab is also known as the Primary tab, and contains the more frequently
1
used commands. The Home tab consists of five Groups as follows:

 Clipboard contains cut,


copy, paste, and format painter
commands .

 Font contains the font editing features including


type, size, color, style, and effects.

 Paragraph contains formatting features


including justification, spacing, bulleting,
numbering, indent, borders, and fill.

ETECH – Empowerment Technology 49 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
 Styles contains a variety of pre-defined
style sets for easy document formatting.

 Editing contains the Find and Replace


commands.

Insert Tab

The Insert tab consists of seven Groups as follows:

 Pages allows you to insert blank pages, pre-formatted cover pages, and page
breaks.

 Illustrations allows you to insert graphics, shapes,


chart, and smart art.

 Header & Footer allows you to insert customized headers


and footers, as well as pre-defined page numbers.

 Text allows you to insert text boxes, word art,


objects, date & time, and a signature line.

 Symbols allows you to insert mathematical equations and


symbols.
ETECH – Empowerment Technology 50 | Page
GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
Page Layout Tab

The Page Layout tab consists of five groups as follows:

 Themes allows you to select from a variety of pre-determined


color themes.

 . Page Setup allows you to adjust page


margins, orientation, and size; utilize the column
format, add page breaks and section breaks;
identify the number of lines on each page or in the
entire document, and utilize the hyphenation
command.

 Page Background allows you to create a variety of background


colors and styles.

 Paragraph allows you to change paragraph


indents and line spacing.

 Arrange allows you to group, align, and rotate


objects; change the orders of objects; and text wrap.

ETECH – Empowerment Technology 51 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
Name: Date:
Course: Score:

WORKBOOK ACTIVITY #1

COMPLETION: Fill-in the table below. Write your answer on the column Data. Identify
what type of data is your answer on the column Types of Data.

Question Data (your answer Type of Data (qualitative or


here) quantitative)
The name of your pet
The place that you want to
spend your vacation
Your ideal age of getting
married
The name of your first love
Your most memorable year
Your favorite number
Your shoe size
Your brand of shirt
Your top priority 5 years from
now
Your cellular number

DRAWING: Draw and label the Expanded Data Processing Cycle on the blank space
below.

Name: Date:
ETECH – Empowerment Technology 52 | Page
GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
Course: Score:

WORKBOOK ACTIVITY #2

COMPLETION: Examine your personal life. Answer the diagram below with your
personal answers.

3 things in your life that 3 things in your life that 3 things in your life that
you want to store. you want to store and you want to sort and
retrieve. classify.

1. 1. 1.

2. 2. 2.

3. 3. 3.

COMPLETION: Fill-in the table below. Write your answer on the column provided.

Early Computing Devices Year invented/ discovered Name of Inventor/


discoverer
1. Pascaline

2. Slide Rule

3. Analytical Engine

4. Punch card Machine

5. Abacus

Name: Date:
Course: Score:

WORKBOOK ACTIVITY #3
ETECH – Empowerment Technology 53 | Page
GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
IDENTIFICATION: Identify the computer peripherals. Write your answers on the space
provided.

Name: Date:
Course: Score:

WORKBOOK ACTIVITY #4

MATCHING TYPE: Match column A with answers on column B. Write the letter of your
answer before the letter.

COLUMN A COLUMN B
Information Center Manager A. manages IS services

Chief Information Officer B. manages a particular new system development


project

Educator C. coordinates all programming applications

Webmaster D. Highest ranking IS manager responsible in strategic


planning of organization

Systems Programmer E. responsible for managing all the system

Operations Manager F. manages a particular existing system

Systems Manager G. manages the organizations world wide web site

Network Manager H. coordinates and manages organization’s voice and


ETECH – Empowerment Technology 54 | Page
GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
data network
Programming Manager I. writes computer codes for developing new
applications

IS Director J. creates world wide web sites and pages

Web Designer K. writes computer codes for developing new


applications

Project Manager L. employed to teach computing concepts

Name: Date:
Course: Score:

WORKBOOK ACTIVITY #5

ESSAY: Explain the following.

1. Why does Republic Act 10175 – Cybercrime Prevention Act of 2012 important?

2. How does corporation be affected in the liabilities of the RA 10175?

3. What are the penalties stated in the RA 10175?

4. Who are the implementing government agencies of the Cybercrime Prevention


Act and their roles of implementation?

ETECH – Empowerment Technology 55 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
Name: Date:
Course: Score:

WORKBOOK ACTIVITY #6

CONVERSION: Convert the following. Show your solutions.

1. 11101 to decimal
2. 236 to Binary
3. DACEH to Binary
4. 1CEDB to Binary
5. 35 to Octal

ETECH – Empowerment Technology 56 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
Name: Date:
Course: Score:

WORKBOOK ACTIVITY #7

SOLVING: Solve the following binary numbers.

1. 10111 + 1100
2. 11110 + 110011
3. 11011 + 1111
4. 11011 – 1001
5. 11101 – 1100
6. 1010111 – 110010

ETECH – Empowerment Technology 57 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
Name: Date:
Course: Score:

WORKBOOK ACTIVITY #8

SOLVING: Solve the following binary numbers.

1. 10111 X 111
2. 1011 + 110 X 110
3. 101111 – 111 X 1100
4. 10011 / 1011
5. 110101 / 1101
6. 11110 / 10

ETECH – Empowerment Technology 58 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
REFERENCES:

1. JEMMA Development Group, Office Productivity with Introduction to Computer,


Metro Manila, 2008

2. Jemma Development Group , Office Productivity Using MSOffice 2007, Metro


Manila, 2008

3. La Putt, Junny P. Introduction to Computer Concepts, National Bookstore, Quad


Alpha Centrum Bldg., 125 Pioneer Street, Mandaluyong City 1550, 2008.

4. Mendoza, Joybe A. Spreadsheet and Databases. Jemma Inc. Metro Manila,


2008

5. Pepito, Copernicus D. Computer Fundamentals and Information Technology,


National Bookstore, Quad Alpha Centrum Bldg., 125 Pioneer Street,
Mandaluyong City 1550, 2013

6. www.wikipedia.com

7. www.gov.ph/downloads/2012/09set/20120912-RA-10175-BSA.pdf

8. www.google.com

9. http://pds.hccfl.edu.pds

ETECH – Empowerment Technology 59 | Page


GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT
ETECH – Empowerment Technology 60 | Page
GOLDENSTATE COLLEGE
SENIOR HIGH SCHOOL DEPARTMENT

You might also like