Gened 10
Gened 10
LE
LIVING IN INFORMATION
TECHNOLOGY ERA
CHRISTOPHER R.
VERGRA
Living in IT Era
0
LIVING IN IT ERA
Student Outcomes
After graduation, the students should have
1. Acquired knowledge on the basic concepts in information technology
2. Acquired skills in the use of internet.
3. Become responsible netizen
4. Acquired knowledge on Laws related to IT and its consequence
TABLE OF CONTENTS
Living in IT Era
1
LEARNING UNIT I:
INTRODUCTION TO INFORMATION AND TECHNOLOGY
Importance of IT 5
Categories of Computers 8
Computer and Its Components 11
Activities 15
LEARNING UNIT V:
IT TRENDS, ISSUES, AND CHALLENGES
Truth and Security Issues 67
Quality-Of-Life and Economic & Political Issues 70
Activities 73
References 75
Living in IT Era
2
LIVING IN IT ERA
Learning Module 1
INTRODUCTION TO INFORMATION
AND COMMUNICATIONS
TECHNOLOGY
– Elbert Hubbard
Living in IT Era
3
This learning unit present you will learn the basic concepts
Learning Outcomes
At the end of this module, you are expected able to:
1. Define Information Technology
2. Identify what is an ICT System and its importance
3. Differentiate the categories of computers
4. Enumerate and understand the components of ICT System
Living in IT Era
4
Give your top 3 inventions that change the way you live.
1.______________________________
2. _____________________________
3. _____________________________
Central to this concept is the internet—the “Net,” or “net” that sprawling collection
of data residing on computers around the world and accessible by high-speed connections.
Everything that presently exists on a personal computer, experts suggest, will move onto
the internet, giving us greater mobility and wrapping the internet around our lives.
Living in IT Era
5
Information technology (IT). It is a general term that describes any technology that
helps to produce, control, store, communicate and/or distribute the information. IT merges
high-speed communications computing links that carry data, sound, and video. Examples
of IT include personal computers as well as modern types of telephones, televisions,
appliances and various mobile devices.
2. Communications Technology
Communications technology, also known as telecommunications technology, is
composed of electromagnetic devices and long distance communication systems. The key
examples are telephone, radio, news broadcasts, and cable television. There has been the
introduction of communication between computers in more recent times — that's what
happens when people "move online" on the internet.
3. Money - “The future of money is increasingly digital, likely virtual, and possibly
universal,” says one writer. Digital means that something is developed, replicated, or
carried on through a machine or computer network and we have definitely come a long
way to being a cashless society.
Living in IT Era
6
5. Government & Electronic Democracy - The Internet
and other information technologies have helped
government provide quality services and paved the way
for greater public participation in government operations.
6. Jobs & Careers - Today almost every job and career need some kind of computer
skills. These are ordinary jobs where machines are widely used as devices. In some
cases, specialized occupations in which advanced computer technology combined with
technical training offers radically different career styles for people.
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. What aspect of your life was greatly influence by information technology?
2. How helpful technology in your everyday living?
3. As future a teacher, how significant technology in your future profession
CONGRATULATIONS!
You have finished the first lesson of this module; you may now
proceed answering the Activity 1.1 to apply what you have learned
and to develop your ability to think critically.
2. ______________________________
3. ______________________________
CATEGORIES OF COMPUTERS
1. Supercomputers
It is normally priced from 50
million pesos to more than 175 million
pesos, supercomputers are high-capacity
machines with thousands of processors
that can perform more than several
trillion calculations per second. These
are the most expensive and fastest
available machines. "Supers," as they are
called, were used for tasks involving the
processing of large quantities of data,
such as making the census count,
weather forecasting, aircraft construction, molecular modeling and breaking encryption
codes.
2. Mainframe computers
The only type of computer available until the late 1960s, mainframes are water-
or air-cooled computers that cost 250,000–250 million peesos and vary in size from
small, to medium, to large, depending on their use. Small mainframes are often referred
to as midsize computers; they used to be referred to as minicomputers, but the term is
seldom used today. Mainframes are used for handling millions of transactions by major
entities – such as banks, airlines, insurance firms, and universities.Users also use a
terminal to access a mainframe, which has a display screen and a keyboard that can
input that output data but can not process data by itself. Mainframes process the
instructions in billions per second.
3. Workstations
Workstations were introduced in the early 1980s and are large, versatile
Living in IT Era
8
personal computers primarily used for complex scientific, mathematical and
engineering calculations and computer-aided design and manufacturing. Workstations
are used for activities such as designing airplane fuselages, developing prescription
drugs, and making movie special effects, offering certain capabilities comparable to
those of mid-size mainframes.
4. Microcomputers
Microcomputers, also known as personal computers (PCs), which cost P15,000
to over P250,000, can fit, it can be carried around, fix next to a desk. There are many
types of microcomputers: desktop PCs, tower PCs, notebooks (laptops), netbooks,
mobile internet devices (MIDs), and personal digital assistants — handheld computers
or palm-tops.
DESKTOP PCs
Desktop PCs are older microcomputers
whose case or main house sits on a desk, often
with a front keyboard and a monitor (screen) on
top.
NOTEBOOKS
Notebook computers, also known as laptop
computers, are lightweight compact computers
with integrated display, keyboard, hard disk
drive, CD / DVD drive, battery and AC adapter
that can be connected to an electrical outlet; they
weigh between 1.8 and 9 pounds anywhere.
Living in IT Era
9
communication with the data, not speech.
5. Microcontrollers
Microcontrollers (embedded computers) are the small, specialized
microprocessors used in "smart" appliances and cars, also called embedded computers.
For example, these microcontrollers allow microwave ovens to store data on how long to
cook your potatoes and at what power setting. Microcontrollers were used to create a
new world of electronic industrial appliances — e-pliances. They are, for example,
behind single-function items such as digital cameras, MP3 and MP4 players and
organizers that have developed into hybrid types such as devices that store images and
videos as well as music.
6. Servers
A server, or network server, is a central computer that stores data (databases)
collections and programs to link or provide services to PCs, workstations, and other
devices called clients. Those clients are connected via a wired or wireless network. The
whole network is considered a network of clients / servers.
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. What are the types of computer?
2. How each type computer differs to one another?
3. What type of computer you prepare to use?
CONGRATULATIONS!
You have finished the first lesson of this module; you may now
proceed answering the Activity 1.2 to apply what you have
learned and to develop your ability to think critically.
2. ______________________________
3. ______________________________
The computer is only a dead set of plastic, silicon and metal before the 'Power'
button is pressed. A little burst of energy, and a series of events starts that brings life and
power into the system. But the machine is unaware, even at this point, of the potential it
holds inside itself. Today the computer is an important part of the digital era.
Hardware is any part of the computer which has a physical structure that can be seen and
felt, although some might be so small that it is invisible to the naked eye.
Software is the collection of instructions which tells the machine how to do the tasks. It is
intangible, i.e., not measurable and touchable, but its effect is clearly described.
HARDWARE COMPONENTS
1. Input Devices
Living in IT Era
11
Input devices are devices that allow a user to insert data and instructions such as
keyboard, mouse, microphone, scanner, trackball, joystick, tablet graphics, and digital
camera into a computer.
2. Output Devices
Output devices are used by monitor or VDUs, LCDs, printers, plotters, and
speakers to show the results or information to the user.
3. Storage devices
Storage devices are the tools used to store data and information such as hard
drives, memory sticks (pen drives), compact disks, DVDs and cassette drives from and
to transfer them to the computer.
a. In the late 1960s, floppy disks were made. A floppy disk consists of a small thin
plastic vest lined with magnetic tape. This plastic disk is covered by its outer covering
which is a hard plastic. It can carry data amounting to 1.44 MB. Such disks are
obsolete nowadays.
b. Hard Disk consists of a metal disk which is covered with the metal oxide used to
store a large amount of data. Those disks can hold up to tens or hundreds of
gigabytes of information than floppy disks.
Living in IT Era
12
d. DVD, stands for Digital Versatile Disk, is an optical storage disk similar to CD-ROM,
as this is double sided with dual layer disc and can hold 4.7 GB of data.
e. Blue-Ray Disks are used to store more than 25 GB of data in less time at a very
high speed. A single layer of BD can store 13 hours of video, while more than 20
hours of video can be stored as double layer BD.
f. USB stands for Universal Serial Bus. It is a portable memory unit used to store
data which must be transferred to the other unit using the system's USB port.
MEMORY
1. Primary Memory is very fast thus data and programs must be in the primary memory
for execution. Random Access Memory (RAM) and Read Only Memory (ROM) are both
primary memories.
a. Random Access Memory refers to a memory which can be randomly picked
and used. The data processed here is gone the very moment the computer is
turned off. These are also called volatile memory.
b. Read Only Memory is permanently installed on your computer at the time of
production. The information from this memory can be read only and fresh
information cannot be written into it. It permanently stores a set of instructions
which instructs the computer how to work. After we switch on the computer, it
uses instructions stored here to carry out a series of tasks automatically, before
we can actually use the computer.
2. Secondary Memory or Auxiliary Memory: The content of the RAM is erased when
the electrical power is switched off. So, this data needs to be stored for future use,
somewhere else. Since primary storage is also expensive; we need a relatively cheaper
form of backup storage that can store vast amounts of information. As a result,
secondary memory devices are becoming an important part of the computer.
TYPES OF SOFTWARE
There are two primary types of softwares: Application software and Systems
software.
2. System software - Contains programs that allow computer hardware to work with and
execute software applications. Computer software is the interface between the user and
other applications, and the hardware of the machine.
Living in IT Era
13
a. Operating system- the OS is a computer program that controls all other programs
on your computer, stores files organizedly and guides the use of computer hardware
such as the keyboard and mouse.
b. Utility software is a software component of the program. This is used for device
analysis, setup, optimisation, or maintenance. This app does all the tasks of
housekeeping.
Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. What is the difference between hardware and software?
2. What parts of computer that serve as its brain?
3. Enumerate the components of hardware.
CONGRATULATIONS!
You have finished the first lesson of this module; you may now
proceed answering the Activity 1.3 to apply what you have
learned and to develop your ability to think critically.
Activity 1.1
Importance of Information Technology
Name: ___________________________________ SCORE:
Course & Section: __________________________
Date: ____________________________________
Living in IT Era
14
Knowledge in Action
Computers are almost everywhere, and they affect most walks of life—business,
education, government, the military, hobbies, shopping, research, and so on.
1. What aspects of your life have been the most evidently affected by technology?
2. Has anything been made worse or harder in your life by the advance of computers?
3.
Living in IT Era
15
4. What about things that have been made better or easier?
Activity 1.2
CATEGORIES OF COMPUTERS
Direction: Compare and contrast the relative advantages of Personal Computer (PC) and
Smartphone. List down at least 3 relative advantage and disadvantage.
PC vs SMARTPHONE
ADVANTAGES
PC SMARTPHONE
DISADVANTAGES
PC SMARTPHONE
Living in IT Era
16
Activity 1.3
CATEGORIES AND COMPONENTS OF COMPUTERS
A. True/False Questions
Direction: Write T if the statement is correct. Otherwise F, for erroneous statement.
________1. Mainframe computers process faster than microcomputers.
________2. Main memory is a software component.
________3. The operating system is part of the system software.
________4. Processing is the manipulation by which a computer transforms data into
information.
________5. Primary storage is the area in the computer where data or information is held
permanently.
________6. The keyboard and the mouse are examples of input devices.
________7. Movies are a form of multimedia.
________8. Computers are becoming larger, slower, and more expensive.
________9. Modems store information.
________10. A microcomputer is used to view very small objects.
________11. A hard disk is an example of software.
________12. Computers continue to get smaller and smaller.
________13. Supercomputers are particularly inexpensive
B. Completion Questions
Direction: Fill in the blanks to make the statement complete and correct.
14. The _______ _______ ________ refers to the part of the internet that presents
information in multimedia form.
15. “ _______ technology” merges computing with highspeed communications.
Living in IT Era
17
16. A(n) _______ is an electronic machine that accepts data and processes it into
information.
17. _______ are high-capacity machines with thousands of processors.
18. Embedded computers, or _______, are installed in “smart” appliances and
automobiles.
19. The kind of software that enables users to perform specific tasks is called ________
software.
20.The _______ is the display device that takes the electrical signals from the video
card and forms an image using points of colored light on the screen.
LIVING IN IT ERA
Learning Module 2
Living in IT Era
18
“Ethics change with technology.”
– Larry Niven
In this learning module you will learn more about the types
internet connection available in the market as well its
corresponding speed. You will also identify the parts of
Uniform Resource Locator (URL) and categories of webcite
you used often. Lastly, you will learn more about the proper
behavior and etiquette in the cyber space.
Learning Outcomes
At the end of this module, you are expected able to:
1. Familiarize with the key points in internet evolution
2. Identify the types of internet connections
3. Understand the anatomy and types of Website
4. Apply netiquette in daily living
2. ______________________________
3. ______________________________
Before you can connect to the Internet for the first time, you must have some
hardware in place and choose your Internet Service Provider (also referred to as an ISP
or just a provider). An ISP is a corporation that operates dedicated computers (called
servers) you use for Internet access. ISPs charge the service a monthly fee.
Living in IT Era
20
1. Dial-Up (Analog 56K)
The access to dial-ups is inexpensive, but sluggish. After the device dials a phone
number a modem (internal or external) connects to the Internet. This analog signal is
converted via the modem to digital and transmitted over a landline serviced by a public
telephone network. The efficiency of the telephone lines varies, and the communication
may often be bad. The lines encounter interference frequently and this affects pace, from
28Kbps to 56Kbps throughout. If a computer or other system occupies the same line as the
handset, they can not be activated simultaneously.
2. ISDN
ISDN stands for Integrated Service Digital Network. It is a wireless network that
transmits voice, picture , video and text over the current PSTN telephone network that is
transferred to circuits. Speeds range from 16kbps to 64kbps.
3. DSL
DSL stands for Digital Line Subscriber. It is still a "always on" internet connection.
In an Internet connection with DSL, both voice and internet data can flow simultaneously
over the same telephone line. DSL speed varies; Download speed ranges from 5Mbps to 100
Mbps depending on where you live but on an average.
4. Cable
Cable offers internet access through a cable modem and runs over cable TV wires.
There are different speeds depending on whether you are uploading or transmitting data
transmissions. Although the coax cable has even greater bandwidth over dial-up or DSL
telephone lines, quicker access can be obtained. The cable speeds range between 512Kbps
and 20 Mbps.
5. Fiber
A connection to the Internet via fiber provides the fastest Internet speed today. This
can provide speed of up to 1000 Mbps for download and upload. This uses light to relay the
data via the fiber optic cable. This can cover long distances with no loss. Fiber is way more
expensive than cable and DSL.
6. Wireless
As the name suggests, Wireless or Wi-Fi may not require telephone lines or cables
to connect to the Internet. It uses radio frequency instead. Wireless is just an on-line link
and it can be accessed from anywhere. In coverage areas, wireless networks are increasing
by the minute so when I say connectivity from just about anywhere, I say that. Speeds can
differ, and range from 5 Mbps to 20 Mbps.
7. Satellite
Satellite is accessing the internet via satellite in Earth's orbit. Compared with cable
and DSL, the immense distance a signal travels from earth to satellite and back again offers
a delayed link. Satellite link rates vary between 512 K and 2.0 Mbps. Nevertheless,
substantial changes are underway to make it more accessible and efficient in the field of
infrastructure and technology.
Living in IT Era
21
8. Cellular
Cellular technology provides wireless access to the Internet through cell phones.
The speed varies depending on the provider, but the most common are 3G and 4G speeds. A
3G is a term that describes a 3rd generation cellular network with a mobile speed of around
2.0 Mbps. 4G is the fourth generation of wireless cellular standards. The goal of 4 G is to
achieve a peak mobile speed of 100 Mbps, but the reality is currently around 21 Mbps.
9. Hotspot
The hotspot is a technology that is relatively similar to Wi-Fi. Hotspot provides
users with access to the Internet via WLAN in the specific area where they are located. Like
smartphones and mobile hotspots, here you can share your data with your friends.
10. Broadband
Broadband is also known as a wide band because it uses and provides a wide band
of frequencies during communication. The wider the bandwidth of the channel, the greater
the information-carrying capacity.
Here you can achieve speed up to 100 Mbps, it typically depends upon the cables we
use like in case of coaxial cable data transfer speed may vary but in optical fiber cables
speed will be high
-- https://www.thefactsite.com/top-100-technology-facts/
Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. What is the slowest type of internet connection?
2. What in the fastest types of internet connection?
3. How fast is 4G cellular network in reality?
CONGRATULATIONS!
You have finished the first lesson of this module; you may
now proceed answering the Activity 2.1 to apply what
you have learned and to develop your ability to think
critically.
For Questions, You may send personal message to my
messenger account or send an SMS to my cell phone
number. Thank you!
Living in IT Era
22
Unit 2.2: THE WORLD WIDE WEB
Activating your Prior Knowledge:
What websites you usually visit? How
frequent you visit those sites? Are those
websites help you in your everyday living?
List down at least 3 websites URL you commonly used or
visit.
1. ___________________________________
2. ______________________________
3. ______________________________
As we have said, the internet and the world wide web are not the same. The
internet is a vast network of networks, linking millions of computers via protocol,
hardware, and channels of communication. This is the infrastructure that serves not only
the web but also other communications structures
including email, instant messaging, newsgroups
and other activities that we will address
The Internet section called the web is a
multimedia-based technology that allows you to
access more than just text. This means you can
download art, music, video, and animation as well
as participate in interactive games.
BROWSERS:
Software for Surfing the Web
A browser, or web browser, is software
that helps you to locate and navigate the different
parts of the internet.
Living in IT Era
23
Examples of browsers include Microsoft Internet Explorer, Macintosh computers
for Apple Inc. and Chrome for Google
These and other browsers allow you to surf the web, just like riding a wave with a
surfboard. Surfing means navigating the Web using your mouse to travel from one place or
website to another through a set of linked paths or links.
WEBSITE
The Location on The Computer
A website, or simply a site, is a location on a specific web-based computer which
has a unique address (as we will understand, called a URL). For instance, you decided to
search information for your homework, you would probably visit www.google.com, the
website is the location of a computer somewhere on the internet.
WEB PAGES
The Documents on a Website
A website consists of a web page or a series of linked web pages. A web page is a
World Wide Web document that may include text , pictures, sound , and video. The first
page that you see at a website is like a book's title page. This is the home page, or welcome
page, that identifies the website and contains links to other website pages
ANATOMY OF A URL
URLS: ADDRESSES FOR WEB PAGES
It needs to know the address of the domain, the URL, before your browser can
connect to a web site. The URL (Uniform Resource Locator) is a string of characters,
pointing anywhere on the web to a particular piece of information. Put another way, the
URL is the unique address of the website.
Elements of URL
2. Domain name (web server name): www.nps.gov/A domain is simply a place on the
internet, the web server in question. Domain names state the address location and
form. The last part of the domain, called the top-level domain, is an extension of
three letters that describes the domain type:. Gov,.com,.net,.edu,.org,.mil,.int —
governmental, commercial, networked, educational, non-profit, military, or
international.
Living in IT Era
24
3. The Directory name: yose / The directory name is the name of the directory server
or folder from which your browser needs to pull the file. This is "Yosemite" yose
here. Yellowstone National Park shouts
4. The file name and extension: home.htm The file is the particular page or
document that you are seeking. Here it is home.htm, because you have gone to the
home page, or welcome page, for Yosemite National Park. The .htm is an extension
to the file name, and this extension informs the browser that the file is an HTML file.
Let us consider what HTML means.
-- https://www.thefactsite.com/top-100-technology-facts/
Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. Enumerate 3 web browser.
2. What is the meaning of “www”?
3. What are the elements of URL?
CONGRATULATIONS!
You have finished the first lesson of this module; you may now
proceed answering the Activity 2.2 to apply what you have
learned and to develop your ability to think critically.
Living in IT Era
25
Unit 2.3: TYPES OF WEBSITE
Activating your Prior Knowledge:
Give examples of website you regularly visit
List down at least 3 websites URL you commonly used or visit.
1. Education: ______________________________
3. Ecommerce: _________________________
There are millions of websites can be found as we browse using the internet, each
website has created for different purposes depending to our needs. Now, let us try find out
the common categories of website we are using today.
TYPES OF WEBSITE
According to Barraclough (2020), it is clear there are
more than just ten different types of websites in the
world, he picked the most common categories to give
you a general idea.
1. Blog
Usually run by a person or a small group, any subject can be covered by a
blog – whether its travel tips, financial advice or doughnut review. Although often
written in an informal or conversational style, professional blogging has become
an increasingly popular online money-making tool.
2. Corporate
You may not be selling directly through a corporate website, but you can
use these sites to provide information about your business and to let potential
customers know how to get in touch with you.
3. Ecommerce
An ecommerce site, otherwise known as
an online store, allows you to make online
payments for products or services. Stores can
Living in IT Era
26
function as stand-alone websites or can be combined with a blog or corporate
website.
4. Portfolio
Just like a physical portfolio, these types of websites are used to display and
promote examples of previous work. Primarily used by those in the creative industry,
a portfolio website can be used like a CV, demonstrating your skills in order to
impress clients, customers, or future employers.
5. News or magazine
It needs no further clarification for news and magazine websites. A news
website's primary purpose is to keep its readers up-to - date with current affairs,
whereas online magazines are more oriented with entertainment.
6. Social media
We all know Facebook and Twitter, but
there are many other forms that social media sites
can take in. Usually, these sites are created to allow
people to share thoughts , images, or ideas, or
simply to connect with others in relation to a
particular topic. Likewise, social media platforms
are rapidly becoming the gateway for people to read
up on the news.
7. TV or video streaming
Netflix, along with similar
sites like NowTV, have revolutionised the
way the world watches television.
8. Educational
Furthermore, educational websites are very self-
explanatory. These websites are designed to display
information about specific topics, using either interactive
games or engaging designs to keep the user hooked.
9. Portal
Portals are primarily used within businesses, schools, or organisations for
internal purposes. Such websites also require a process of signing in, allowing
students to access the website of the school, or providing staff access to their emails,
warnings and files all in one location.
CONGRATULATIONS!
You have finished the first lesson of this module; you may now
proceed answering the Activity 2.3 to apply what you have
learned and to develop your ability to think critically.
Living in IT Era
28
Unit 2.4: NETIQETTE
Activating your Prior Knowledge:
Recently, a social media influencer/vlogger
was involved in an issue wherein he mocked a
tricycle driver because of their financial status. It
gains the public attention for being insensitive and
discriminate that results to him being bashed online.
What do you think about the actions of the vlogger?
What is your advice to the vlogger?
It is justifiable to fire back and bash him also?
NETIQUETTE
Rule 2: Adhere to the same standards of behavior online that you follow in real
life
While it can be argued that behavioral standards in the virtual world may be
different, they certainly shouldn't be lower. Whenever you live in "cyberspace" you should
do your best to act within the laws and ethical ways of society.
Living in IT Era
29
Often times you will be judged by the quality of your writing, so keep the following
tips in mind:
Always check for spelling and grammar errors
Know what you're talking about and state it clearly
Be pleasant and polite
Between adult users in the Philippines, 93% use social networking sites,
which is quite higher than the 74% that use it in the U.S.
They mostly use it to talk about music and movies, and slightly fewer use it
to talk about sports.
-- https://www.thefactsite.com/top-100-technology-facts/
Living in IT Era
30
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. Identify common types of websites.
2. Schoology, Google Classroom and Quizziz, can be categorize to what type of
website?
3. Shoppe, Lazada and Zalora, can be categorize to what type of website?
CONGRATULATIONS!
You have finished the first lesson of this module; you may now
proceed answering the Activity 2.4 to apply what you have
learned and to develop your ability to think critically.
Activity 2.1
TYPES OF INTERNET CONNECTIONS
Living in IT Era
31
Date: ____________________________________
Multiple Choice: Read and analyze each question. Write the letter of your choice in the space
provided.
______1. The Internet is a ________________________.
a. vast network of LANs and WANs
b. small network of LANs and WANs
c. line of LANs and WANs
d. None of the above
______2. If you are using ______internet connection your connection would be very slow.
a. DSL
b. Dial-up access
c. Cable
d. Broadband
______3. It refers to a high-speed connection using regular copper telephone lines
a. Broadband
b. DSL
c. Wi-Fi
d. ISDN
______4. The fastest type of broadband connection is _________________.
a. Fiber to the Premises
b. Radio Cellular Networks
c. DSL
d. Satellite Network
______5. This company/ organization provides services that can be found only if you have
internet access. It is categorized as?
a. ISP
b. WISP
c. OSP
d. ISDN
______6. This type of internet connection will be disrupted if the weather is too cloudy.
a. Satellite Internet Connection
b. Wi-Fi
c. Cellular Radio Network
d. Broadband
______7. This type of internet connection requires mobile networks and mobile devise to
function.
a. Radio Cellular Networks
b. Wi-Fi
c. Fixed Wireless
d. DS
Activity 2.2
TYPES OF WEBSITES
Living in IT Era
32
Date: ____________________________________
Direction: Differentiate the terms in the world wide web. Discuss briefly their features
and functions
Activity 2.3
TYPES OF WEBSITES
Living in IT Era
33
Date: ____________________________________
Multiple Choice: Read and analyze each question. Write the letter of your choice in the space
provided.
______1. A site that amuses, pleases, or diverts.
a. commercial
b. entertainment
c. advocacy
d. news
______2. A site generally used to post online diaries, which may include discussion forums.
a. web blog
b. personal
c. commercial
d. entertainment
______3. A website is any website that’s devoted to representing a specific business.
a. business
b. eCommerce
c. entertainment
d. portfolio
______4. Youtube.com is an example of what type of website?
a. Community Forum
b. Video media sharing
c. Personal
d. Business
______5. A site devoted to showing examples of past work.
a. Portfolio
b. Entertainment
c. Media
d. Nonprofit
______6. A website that uses any combination of games, articles, videos and images to educate
their audience.
a. Personal
b. Web Portal
c. Community Forum
d. Educational
______7. Websites that are a simplified form of business websites is called?
a. Brochure
b. Business
c. Media
d. Portfolio
Activity 2.4
NETIQUETTE
LIVING IN IT ERA
Living in IT Era
35
Learning Module 3
Living in IT Era
37
Faceapp is a mobile application that allows users to change their physical
appearance with the help of filters.
Terms of use of the software are becoming a global issue. It states that users effectively
revoke their rights over their uploaded images, including other related personal data such
as names and usernames, thus allowing the developers of FaceApp to do whatever they
want with the data collected (Miranda, 2019).
Do you think it is still acceptable to use mobile applications collects personal data without
user protection?
2. Access Right - Through great technical progress, access right is a high priority
problem for the IT and cyberspace. Internet network cannot be kept safe from
unauthorized access. The intrusion detection system is usually used to assess if the user
is an intruder or an authorized person.
4. Patents - A patent may preserve the exclusive, hidden element of an invention. This is
very difficult to secure a patent, relative to securing a copyright. The patent holder needs
to reveal to a qualified programmer the full description of a system to create a
programme.
Living in IT Era
38
securing computer software, both before an infringement of copyright and definitely
after a violation of copyright.
6. Trade Secrets - A trade secret secures something valuable and useful. The legislation
covers the private dimensions of theories that are only known to the discoverer or to his
confidants. When revealed, trade secret is lost as such, and trade secrets are covered
only by the law.
7. Liability - The developer of software makes promises and assertions to the user about
the nature and quality of the product which can be restricted as an express guarantee.
To protect against liability all agreements should be in writing. A waiver of express
warranties that exclude a supplier from taking responsibility for informal, speculative
statements or predictions made during the stage of the agreement.
8. Piracy - Piracy is an activity where illegal copies of the software are created. The
software industry is ready to face software piracy. The courts are tackling a growing
number of software protection actions.
When agree to the Terms & Conditions for iTunes, you are agreeing to not
use it to make nuclear weapons.
-- https://www.thefactsite.com/top-100-technology-facts/
Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really absorbed
its core ideas. Try to mentally answer the following questions, which will help you assess
your reading progress.
1. What ethical issues in information technology you are most prone?
2. In your own opinion, what ethical issues is the most dangerous?
3. Do you think the netizen should address these issues immediately? Why?
CONGRATULATIONS!
You have finished the first lesson of this module; you may now
proceed answering the Activity 3.1 to apply what you have
learned and to develop your ability to think critically.
Living in IT Era
39
CBN Corporation against television network ABC Development Corporation (formerly TV5,
now The 5 Network) and television host Willie Revillame for allegedly copying Wowowee's
defunct noontime series.
Government Agencies:
The agency of the government in charge of the implementation of the Intellectual
Property Code is the Intellectual Property Office which replaced the Bureau of Patents,
Trademarks and Technology Transfer.
Significant features of the law
1. A shift was made from the "first-to-invent system" under R. A. 165 [old law] to "first-to-
file system" under the new law.
2. In the case of inventions, the period of the grant was increased from 17 years from grant
under the old law to 20 years from date of filing under the new law.
3. In the case of utility models, grant was 7 years without renewal
4. In the case of industrial designs, the previous grant of 5 years plus renewals of 5 years
each was maintained.
5. The examination is made only upon request [possibly with or without examination]
6. Publication is affected after 18 months from filing date or priority date
Penalties
Living in IT Era
40
1. Under the present law, the penalties for repetition of infringement range from
PhP100,000 to PhP300,000 and/or 6 months to 3 years of imprisonment and the
offense prescribes in 3 years.
2. Penalties for infringement, unfair competition, false designation of origin and false
description or representation range from fine of PhP50,000 to PhP200,000 and/or 2 to
5 years of imprisonment.
-- https://www.thefactsite.com/top-100-technology-facts/
Synthesize
your Knowledge
Now that you have read the module’s content, let us now try to check if you really absorbed
its core ideas. Try to mentally answer the following questions, which will help you assess
your reading progress.
1. Enumerate the intellectual property rights under the law.
2. What government agencies is created to facilitate the implementation of the law?
3. How much is the maximum penalties for infringement?
CONGRATULATIONS!
You have finished the first lesson of this module; you may
now proceed answering the Activity 3.2 to apply what
you have learned and to develop your ability to think
critically.
For Questions, You may send personal message to my
messenger account or send an SMS to my cell phone
number. Thank you!
Living in IT Era
41
of the information available, they are engaged in activities that undermine the sovereignty
and independence of India, the protection of India, state security and public order."
Do you think it is still acceptable to use TikTok considering those privacy issues?
The act is a necessary and important precaution in a world economy that’s swiftly
going digital. In 2014, it was estimated that 2.5 quintillion — or 2.5 billion billion — bytes of
data were created every day. This includes unprecedented knowledge about what real
individuals are doing, watching, thinking, and feeling.
Companies need to be held accountable not
only for what they're doing with customer data, but
how they're protecting that data from third parties.
The last few years of security breaches, network
glitches and ethical problems inside some of the
major banks in the country have told us that a lot of
work needs to be done
What is RA 10173?
RA 10173, or the Data Privacy Act, protects individuals from unauthorized
processing of personal information that is
1. private, not publicly available; and
2. identifiable, where the identity of the individual is apparent either through direct
attribution or when put together with other available information.
Living in IT Era
42
1. First, all personal information must be collected for defined, lawful, and that reasons. In
certain terms, consumers must opt in to use their data for such straightforward and
legal purposes.
2. Secondly, sensitive details must be properly managed. Information shall be kept correct
and appropriate, used only for the purposes specified, and held only for as long as
reasonably possible. Customers must be vigilant in ensuring that other, unauthorized
parties do not have access to the information of their customers.
3. Third, personal information must be discarded in a way that does not make it visible
and accessible to unauthorized third parties.
-- https://www.thefactsite.com/top-100-technology-facts/
Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. RA 10173 is also known as?
2. Who are covered by the law?
3. What are the penalties for violation of the law?
CONGRATULATIO
You haveLiving in IT
finished theEra
first lesson of th
43
now proceed answering the Activity
you have learned and to develop yo
Activity 3.1
ETHICAL ISSUES
Multiple Choice: Read and analyze each question. Write the letter of your choice in the
space provided.
Living in IT Era
44
g. Liability h. Piracy
Activity 3.2
INTELLECTUAL PROPERTY LAW
Multiple Choice: Read and analyze each question. Write the letter of your choice in the
space provided.
Activity 3.3
DATA PRIVACY LAW
Multiple Choice: Read and analyze each question. Write the letter of your choice in the
space provided.
______1. What is the name of a legal document that explains how a website gathers and
uses your private information?
a. Seal of approval
Living in IT Era
46
b. Checklist
c. Privacy policy
d. None of the above
______2. Which website would best protect your private information?
a. Website A: has a privacy policy, a seal of approval, and the name of a
person your parents can talk to about privacy.
b. Website B; says "safe for kids" on the page where your type in your private
information
c. Website C: has links to other websites for kids
d. None of the above
______3. How do you know when a website you are using has a safe, secured
connection?
a. If it is your friends site then it is safe
b. If the web address looks legitimate
c. A red flashing pop up message appears
d. A lock appears in the top right or bottom right corner of your browser
______4. Oversharing on social media is one of the biggest detrimental concerns to a
teens privacy.
a. True
b. False
c. Sometimes True
d. Sometimes False
______5. Why might a website store cookies on your device?
a. To track your data
b. To make it easier to login
c. To record browsing history
d. All of the these
LIVING IN IT ERA
Learning Module 4
Living in IT Era
47
NETWORK SECURITY
NETWORK SECURITY
Module Overview
Living in IT Era
48
Learning Outcomes
At the end of this module, you are expected able to:
1. Differentiate between freeware and open source software
2. Define cyberethics, cybersafety and cybersecurity
3. Identify the different kinds of threats to cyber security
4. Identify the different categories of cyber crime
User accounts numbered 387,322 based in the Philippines had their basic profile
details compromised, such as full name, email address and phone number.
Living in IT Era
49
Others might have had it worse.
Read more: https://technology.inquirer.net/80437/755973-fb-accounts-in-ph-hacked#ixzz6SDrlgxuV
Follow us: @inquirerdotnet on Twitter | inquirerdotnet on Facebook
Have you personally experienced your social media account being hacked?
In cyberspace we have
1. Cyberethics - Exploring acceptable and ethical practices around digital media and
online environments. It covers plagiarism, bullying and, to name a few, hacking.
2. Cybersafety - Defining how one 's functioning online. This provides guidelines on how
to keep personal information safe and restricted
3. Cybersecurity - Involving activities performed on a device to keep it safe from
individuals attempting to damage it or illegally use the data stored on it. It involves
installing firewalls and tools for the virus.
BASIC TERMINOLOGY
1. Copyright and License
a. Copyright is designed to protect original expression. Once a 'work' is made,
copyright arises. A copyright software protects all source code, written text
content, visual images / designs, illustrations, any associated music, video files or
videos.
b. License is the permission given by a copyright holder to another to use an
original work. It doesn't transfer copyright on.
Living in IT Era
50
c. Shareware is copyrighted software which can be shared on a trial basis for a
limited time, with the agreement that if the user wants to use it, he must pay for
it.
4. Cyber Law - Cyber law is a modern field of law, which expands rapidly. This sets
guidelines in cyberspace for agreed human behaviour. Cyber law is based on three basic
building blocks.
a. Netizens who are the inhabitants of the internet and use it as an extension of
their physical world
b. Cyberspace which is a ‘man made machine world’ reshaping itself periodically.
c. Technology
5. Cookies - Cookies allow the website visited to store its own user information on the
computer of the user.
7. Firewall - A firewall is a software or hardware device that filters the information that
comes to a network or computer system through an Internet connection.
8. Cyber Ethics - Cyber Ethics applies to the code of ethical online behaviour. Specific
cyber ethics to be successful cyber-citizens must be practiced.
9. Cyber Safety
Theft of identities is an growing and very disturbing problem. The definition is
quite basic, but the mechanism can be complicated, and the effects may be rather
serious for the victim.
a. Some of the most common methods of committing identity theft is through a tactic
called phishing, which is the method of attempting to induce the recipient to supply
personal information that can be used to perform illegal acts.
Cyber-safety examines the ability to act safely and professionally on the Internet
and on other connected networks. These activities shield knowledge of both the personal
and reputational. Which have best practices that minimize risk from behavior-related
issues rather than problems based on hardware / software.
Living in IT Era
51
10. Cyber Security - The media is paying a lot of attention to unprecedented attacks on
malware, virus, hackers and other phenomena of concern on the Internet. Nevertheless,
amid day-to-day horror stories, many people lack an accurate understanding of the
nature of such dangers.
CONGRATULATIONS!
You have finished the first lesson of this module; you may
now proceed answering the Activity 4.1 to apply what
you have learned and to develop your ability to think
critically.
For Questions, You may send personal message to my
messenger account or send an SMS to my cell phone
number. Thank you!
The originator are Reomel Ramores and Onel de Guzman developed this deadly
virus on May 5, 2000 but were fortunate to avoid prosecution due to lack of laws to arrest
people in Philippines for writing malicious code! The Harm— 50 million reported infections
in 10 days.
Living in IT Era
52
Have you already experienced your files being corrupted?
Denial of service (DoS) attacks intended to prevent a system from getting valid
access.
Web attacks that attempts to breach a website. Two of the most common such
attacks are SQL injection and cross-site scripting.
MALWARE
Malware is used to interrupt the functioning of computers, collect confidential
information or access private computer systems.
1. Viruses - A computer virus is a self-replicating system. To help it spread from one
device to another, a device virus binds itself to a program or file.
Living in IT Era
53
5. Spyware - Spyware is simply software that literally spies on what is being done on a
computer.
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. Identity the categories of cyber-attacks.
2. What categories of software that has a mischievous purpose such as virus attacks,
worms, adware, Trojan horses, and spyware?
3. It refers to a cookie used by a website to record a few brief facts about a visit to
that website, or spyware could be of a more dangerous
CONGRATULATIONS!
You have finished the first lesson of this module; you may
now proceed answering the Activity 1.1 to apply what you
have learned and to develop your ability to think critically.
Living in IT Era
54
Unit 4.3: CYBERCRIME PREVENTION ACT
OF 2012
Activating your Prior Knowledge:
87% of Filipino Internet users have been
victims of cybercrimes–DOJ
In a news article of inquirer.net, the
primer cited a 2010 survey from security
software company Symantec in the Philippines
that as many as 87 percent of Filipino internet
users (nearly 9 out of 10) were classified as
victims of cyber crimes and malicious activity.
These included being victimized in
activities such as malware (virus and Trojan) invasion; online or phishing scams; sexual
predation; and services in social networking site like Facebook and Twitter.
Living in IT Era
55
Expanding your Knowledge!
REPUBLIC ACT NO. 10175
A law is created to prevent cybercrime. It
was entitled “Cybercrime Prevention Act of 2012”
The policy stated that law would punish
any type of medium that is misused, exploited or
illegally accessed. This also says the state should
use domestic & foreign forms to avoid these
offenses.
PUNISHABLE ACTS
A. Offenses against the confidentiality, integrity and availability of computer
data and systems
1. Illegal Access – The access to the whole or any part of a computer system without
right.
B. Computer-related Offenses
1. Computer-related Forgery - Unauthorized input, alteration, or deletion of
computer data resulting to inauthentic data with the intent that it be considered or
Living in IT Era
56
acted upon for legal purposes as if it were authentic, regardless whether or not the
data is directly readable and intelligible.
C. Content-related Offenses:
1. Cybersex - Willful engagement, maintenance, control, or operation, directly or
indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the
aid of a computer system, for favor or consideration.
3. Libel -The unlawful or prohibited acts of libel as defined in Article 355 of the
Revised Penal Code, as amended, committed through a computer system or any
other similar means which may be devised in the future.
PENALTIES
1. Prision mayor (imprisonment of six years and 1 day up to 12 years) or a
fine of at least Two hundred thousand pesos (P200,000) up to a maximum
amount commensurate to the damage incurred or BOTH.
-- https://www.thefactsite.com/top-100-technology-facts/
Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. RA 10175 is also known as?
Living in IT Era
57
2. Identify the punishable acts under Content-related Offenses.
3. What are possible penalties of violating this law?
CONGRATULATIONS!
You have finished the first lesson of this module; you may
now proceed answering the Activity 4.2 to apply what you
have learned and to develop your ability to think critically.
Living in IT Era
58
Expanding your Knowledge!
ANTI-BULLYING ACT OF 2013
Living in IT Era
59
(d) Enable students to anonymously report bullying or retaliation: Provided,
however, That no disciplinary administrative action shall be taken against a
perpetrator solely on the basis of an anonymous report;
(e) Subject a student who knowingly makes a false accusation of bullying to
disciplinary administrative action;
(f) Educate students on the dynamics of bullying, the anti-bullying policies of the
school as well as the mechanisms of such school for the anonymous reporting of acts
of bullying or retaliation;
(g) Educate parents and guardians about the dynamics of bullying, the anti-bullying
policies of the school and how parents and guardians can provide support and
reinforce such policies at home; and
(h) Maintain a public record of relevant information and statistics on acts of bullying
or retaliation in school:
SEC. 4. Mechanisms to Address Bullying. – The school principal or any person
who holds a comparable role shall be responsible for the implementation and
oversight of policies intended to address bullying.
If it is determined that bullying or retaliation has occurred, the school principal or
the designated school officer or person shall:
(a) Notify the law enforcement agency if the school principal or designee believes
that criminal charges under the Revised Penal Code may be pursued against the
perpetrator;
(b) Take appropriate disciplinary administrative action;
(c) Notify the parents or guardians of the perpetrator; and
(d) Notify the parents or guardians of the victim regarding the action taken to
prevent any further acts of bullying or retaliation.
-- https://www.thefactsite.com/top-100-technology-facts/
Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. RA 10627 is also known as?
2. It refers to any bullying done through the use of technology.
3. What are the acts of cyber bullying?
A. Categorize the following under Cyber ethics/ Cyber safety / Cyber security.
________1. Do not share your password
________2. Do not use foul language.
________3. Immediately report any suspect data or security breaches to your supervisor
and/or authorities.
________4. Install firewalls and antivirus softwares
________5. Do not copy information from the Internet and claim it as yours (plagiarism).
________6. Be wary of strangers and cautious of potentially misleading or false
information.
________7. Manage your computer settings to allow only data that comes from a known
or safe place
________8. Do not download copyrighted materials.
________9. Download only trusted applications from reputable sources or marketplaces
________10. Restrict access and make personal information secure to prevent
identity theft.
B. Answer the following questions:
11. What is the difference between Shareware and Freeware softwares?
Living in IT Era
61
12. Write a short note on your understanding of hacking.
Activity 4.2
MALWARE
Multiple Choice: Read and analyze each question. Write the letter of your choice in the
space provided.
Living in IT Era
62
a. On memory sticks.
b. Through email attachments.
c. By being disguised as legitimate software.
d. Dodgy web links
Activity 4.3
CYBER CRIME LAW
1. Create your original infographics about Cyber Crime Prevention Act of 2012.
A. Overview of the Law
B. Punishable acts (Choose the top/common)
C. Penalties
Note: Use CANVA (Mobile Application) or other software for your infographics.
Otherwise, draw an illustration/drawing in the space provided if no internet
connection.
Living in IT Era
63
LIVING IN IT ERA
Learning Module 5
Living in IT Era
64
“Technology is best when it brings people
together.”
--Matt Mullenweg
Learning Outcomes
At the end of this module, you are expected able to:
1. Identify the key issues in information technology
2. Determine ways digitized output can be manipulated to fool people
3. Enumerate some key threats to computers
4. Analyze how information technology create environmental, mental-health,
pornography, and workplace problems
5. Breakdown how may technology affect employment and the gap between rich and
poor
Living in IT Era
65
4. Have A Designated Study Area
5. Eat Properly
6. Get Chores Out of The Way
7. Create A Timetable
8. Use A Timer
TRUTH ISSUES
Living in IT Era
66
new device. It has, however, generated some major new reputation issues ,
particularly for journalism. How do we know that the truth is what we see or hear?
Consider the matter below.
1. Manipulation of Sound - Pop music vocals have been sounding "tone- and
pitch-perfect" in recent times and even some hip-hop singers have reached their
notes with excessive accuracy, one writer points out. How ca you do this? By
means of a technology called Auto-Tune that "can take a vocal and immediately
nudge it to the appropriate note or shift it to the right pitch. It can transform
wavering performance into something technically flawless.” Unfortunately, when
most songs seem to have perfect pitch, they are harder to differentiate from one
another, leading to bland sameness.
SECURITY ISSUES:
Threats to Computer & Communications Systems
Internet users clearly do not have "street smarts" about online security, one survey
found, and that makes them vulnerable and another study indicated that while users
assume they can identify when they are being exploited, either legally or illegally, they are
in fact very naïve.
1. Errors & Accidents - In general, errors and accidents in computer systems
may be classified as human errors, procedural errors, software errors, “dirty
data” problems, and electromechanical problems.
2. Natural Hazards - Many accidents are not merely causing temporary system
downtime; they can destroy the entire network. Natural hazards are some
examples. Mobile phones, automatic teller machines, credit card verifiers and
bank computers are useless without power and communications links.
3. Computer Crimes - There can be two forms of computer crime. (1) This may be
an unlawful act committed against computers or telecommunications or (2) it
may be the use of computers or telecommunications to carry out an unlawful act.
Living in IT Era
67
4. Computer Criminals - there’s almost no telling where the next threat to
computer security will come from. In the previous chapters, we considered
threats in the form of hackers, crackers, and cyberterrorists.
-- https://www.thefactsite.com/top-100-technology-facts/
Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. What are data that can be manipulated online?
2. Enumerate possible threats to computer and communication.
3. Does “fake news” is punishable by law?
CONGRATULATIONS!
You have finished the first lesson of this module; you may
now proceed answering the Activity 5.1 to apply what you
have learned and to develop your ability to think critically.
For Questions, You may send personal message to my
messenger account or send an SMS to my cell phone
number. Thank you!
Living in IT Era
68
Unit 5.2: QUALITY-OF-LIFE, ECONOMIC &
POLITICAL ISSUES
Activating your Prior Knowledge:
THE NEGATIVE ASPECTS OF SOCIAL MEDIA
Meanwhile it's a relatively new technology, little
research is available to determine the long-term
consequences, whether good or bad, of using social media.
Multiple studies, however, found a strong connection
between heavy social media and an increased risk of
depression, anxiety , loneliness, self-harm and even suicidal
thoughts (Robinson & Smith 2020).
What are the things that made feel stress in using social media?
QUALITY-OF-LIFE ISSUES:
Living in IT Era
69
1. Environmental Problems - Numerous other environmental challenges
remain—for example, manufacturing and usage by-products, disposal by-
products, environmental pollution, and possible risks of nanotechnology.
2. Mental-Health Problems
-- https://www.thefactsite.com/top-100-technology-facts/
Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. What possible mental health problems of using technology?
2. Enumerate threat that may harm children in using internet?
Living in IT Era
71
3. What is digital divide?
CONGRATULATIONS!
You have finished the first lesson of this module; you may now
proceed answering the Activity 5.2 to apply what you have
learned and to develop your ability to think critically.
Activity 5.1
TRUTH AND SECURITY ISSUES
B. Essay. How can you ensure that information is accurate and complete? What are things
you can advise to avoid fake news.
Living in IT Era
72
Activity 5.2
QUALITY-OF-LIFE, ECONOMIC & POLITICAL ISSUES
1. Share you experience how internet or social media cause stress and isolation. What are
things you do to avoid this?
Living in IT Era
73
REFERENCES
Ambersariya, D. (2019). Types of Internet Connections- Wireless, Dial-up, DSL, Fiber,
Cable, ISDN. https://inventionsky.com/types-of-internet-connections/
Amihan (2017). he Beginner’s Guide to RA 10173 (Data Privacy Act of 2012).
https://amihan.net/2017/07/10/beginners_guide_to_ra_10173/
Avendaño, C. (2013). 87% of Filipino Internet users have been victims of cybercrimes–DOJ.
https://technology.inquirer.net/21557/87-of-filipino-internet-users-have-been-
victims-of-cybercrimes-doj#ixzz6SKHAxQRa
Barraclough, D. (2020). What are the different types of websites?
https://www.expertmarket.co.uk/web-design/different-types-of-websites
Bursztynsky, J. (2020). India bans TikTok and dozens of other Chinese apps over security
concerns. https://www.cnbc.com/
Canivel, RS (2018). 755,973 FB accounts in PH hacked.
https://technology.inquirer.net/80437/755973-fb-accounts-in-ph-hacked
Central Board of Secondary Education (2014). Information and Computer Technology. The
Secretary, Central Board of Secondary Education Shiksha Kendra 2, Community
Centre Preet Vihar, Delhi-110 092
Gonzales, C. (2020). Mocha Uson appears before NBI to face ‘fake news’ complaint.
https://newsinfo.inquirer.net/1276781/mocha-uson-appears-before-nbi-to-face-
fake-news-complaint#ixzz6SKHhh9d3
https://pixabay.com/service/license/
https://www.bitmoji.com/
Miranda, M. (2019). Data protection issues and lessons in 2019.
https://www.gmanetwork.com/news/opinion/content/720258/data-protection-
issues-and-lessons-in-2019/story/
Navallo, M. (2019). SC affirms dismissal of ABS-CBN’s P127-M copyright infringement case
vs. Willie Revillame, ABC-5. SC affirms dismissal of ABS-CBN’s P127-M copyright
infringement case vs. Willie Revillame, ABC-5
Official Gazette (2013). Republic Act No. 10627.
https://www.officialgazette.gov.ph/2013/09/12/republic-act-no-10627/
Robinson, L. & Smith, M. (2020). Social Media and Mental Health.
https://www.helpguide.org/articles/mental-health/social-media-and-mental-
health.htm
Robles, C. (2020). Intellectual Property Code Of The Philippines - An Overview.
https://www.chanrobles.com/legal7code.htm#.Xt2lhzozbIV
Sharama, A. (nd). Ethical Issues in Information Technology (IT).
https://www.geeksforgeeks.org/ethical-issues-in-information-technology-it/
Living in IT Era
74
Shea, V. (1994). Core rules of netiquette. Netiquette (Online ed., pp. 32-45). San Francisco:
Albion Books. https://coursedesign.colostate.edu/obj/corerulesnet.html
Unicef.Org. Online bullying remains prevalent in the Philippines, other countries. Online
bullying remains prevalent in the Philippines, other countries
Vindollo, S. & Buendia, MM (2016). Educational Technology 2. Adriana Publishing Co., Inc.
Williams, B. K. & Sawyer, S. C. (2011). Using information technology: A Practical
Introduction to Computers & Communications. Published by McGraw-Hill, a
business unit of The McGraw-Hill Companies, Inc., 1221. ISBN 978-0-07-351677-6
Living in IT Era
75