0% found this document useful (0 votes)
103 views76 pages

Gened 10

The document provides an overview of a course on living in the information technology era. It outlines the course objectives, units, and topics that will be covered including introductions to information and communication technology, the internet, information privacy and security, and trends/issues related to IT.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views76 pages

Gened 10

The document provides an overview of a course on living in the information technology era. It outlines the course objectives, units, and topics that will be covered including introductions to information and communication technology, the internet, information privacy and security, and trends/issues related to IT.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 76

MODU

LE
LIVING IN INFORMATION
TECHNOLOGY ERA

For Educational Purpose Only


Not for Sale

CHRISTOPHER R.
VERGRA

Living in IT Era
0
LIVING IN IT ERA

COURSE BRIEF OUTLINE


I. PRELIMINARIES
A. Curriculum Program : BSED/BSIE
B. Course Code : GE10
C. Course Title : Living in Information Technology Era
D. Credit Unit : 3 Units
E. Time Duration : 3 hrs/week (54 hrs/sem)
F. Pre-requisite : N/A

II. COURSE DESCRIPTION

This course explores the science, culture, and ethics of information


technology, its various uses and applications, as well as its influence on culture
and society. It also aims to strike a balance between conceptual instruction and
socially- and culturally-oriented discussions as it not only explains the basic
concepts or key terms in IT but also features the major IT trends along with the
issues and challenges these developments bring. Moreover, it uses the
outcomes-based approach with assessment tests and tasks to effectively
measure student learning.

III. COURSE OUTCOMES


CO 1 Identify the uses of the ICT theories and principles.
CO 2 Appreciate the importance of ICT in everyday living
CO 3 Familiarize with the key points in internet evolution
CO 4 Understand the existing law in Information Technology
CO 5 Demonstrate right conduct and behavior in using Internet
CO 6 Become responsible young netizens who are able to maximize
the benefits of information technology without compromising values and ethics will
be developed.

IV. STUDENT OUTCOMES

Student Outcomes
After graduation, the students should have
1. Acquired knowledge on the basic concepts in information technology
2. Acquired skills in the use of internet.
3. Become responsible netizen
4. Acquired knowledge on Laws related to IT and its consequence

TABLE OF CONTENTS
Living in IT Era
1
LEARNING UNIT I:
INTRODUCTION TO INFORMATION AND TECHNOLOGY
Importance of IT 5
Categories of Computers 8
Computer and Its Components 11
Activities 15

LEARNING UNIT II:


THE INTERNET AND THE WORLD WIDE WEB
Internet Connections 20
The World Wide Web 23
Types of Website 26
Netiquette 29
Activities 32

LEARNING UNIT III:


INFORMATION, CONTROL, AND PRIVACY
Ethical Issues in Information Technology (It) 38
Intellectual Property Code of The Philippines 40
Data Privacy Act Of 2012 42
Activities 45

LEARNING UNIT IV:


NETWORK SECURITY
Introduction 50
Malware 53
Cybercrime Prevention Act Of 2012 56
Anti-Bullying Act Of 2013 59
Activities 62

LEARNING UNIT V:
IT TRENDS, ISSUES, AND CHALLENGES
Truth and Security Issues 67
Quality-Of-Life and Economic & Political Issues 70
Activities 73

References 75

Living in IT Era
2
LIVING IN IT ERA

Learning Module 1
INTRODUCTION TO INFORMATION
AND COMMUNICATIONS
TECHNOLOGY

One machine can do the work of fifty ordinary


men. No machine can do the work of one
extraordinary man.

– Elbert Hubbard

Living in Information Technology Era


Module Overview

Living in IT Era
3
This learning unit present you will learn the basic concepts
Learning Outcomes
At the end of this module, you are expected able to:
1. Define Information Technology
2. Identify what is an ICT System and its importance
3. Differentiate the categories of computers
4. Enumerate and understand the components of ICT System

Timeframe: 2-3 weeks

Tips for Studying at Home Effectively


1. Try Active Studying
2. Get A Good Night’s Sleep
3. Study at The Right Time
4. Have A Designated Study Area
5. Eat Properly
6. Get Chores Out of The Way
7. Create A Timetable
8. Use A Timer

Unit 1.1: Importance of IT


Activating your Prior Knowledge:
What do you think are the best invention in the
past three (3) decades?

Living in IT Era
4
Give your top 3 inventions that change the way you live.
1.______________________________
2. _____________________________
3. _____________________________

You are a member of the “Always On” generation, accustomed to spending 8


hours or more a day looking at various screens—on cellphones, on computers, on TVs. You
are a “digital native”, as one anthropologist put it, constantly busy with text messaging,
email, and the internet

Based on the study conducted by University of Pennsylvania’s Wharton School


(2009), Information Technology serve as a game changer and consider among the top
innovations in the last 30 years.

TOP INNOVATIONS OF THE LAST 30 YEARS

Central to this concept is the internet—the “Net,” or “net” that sprawling collection
of data residing on computers around the world and accessible by high-speed connections.
Everything that presently exists on a personal computer, experts suggest, will move onto
the internet, giving us greater mobility and wrapping the internet around our lives.

Expanding your Knowledge!


This unit covers the importance of information technology in
different aspect or field of discipline. Particularly it discusses how
information technology impact the way you live today.

Living in IT Era
5
Information technology (IT). It is a general term that describes any technology that
helps to produce, control, store, communicate and/or distribute the information. IT merges
high-speed communications computing links that carry data, sound, and video. Examples
of IT include personal computers as well as modern types of telephones, televisions,
appliances and various mobile devices.

PARTS OF INFORMATION TECHNOLOGY


1. Computer Technology
A computer is a programmable, multi-use system that takes data — raw statistics and
figures — and transforms, or manipulates, it into information that we can use, including
summaries, numbers, or reports. The aim is to accelerate the problem solving and the
productivity boom.

2. Communications Technology
Communications technology, also known as telecommunications technology, is
composed of electromagnetic devices and long distance communication systems. The key
examples are telephone, radio, news broadcasts, and cable television. There has been the
introduction of communication between computers in more recent times — that's what
happens when people "move online" on the internet.

IMPORTANCE OF IT IN DIFFERENT FIELD OF DISCIPLINE

1. Education - If properly incorporated into the curriculum and classroom, information


technology can (1) allow students to personalize their education; (2) automate several
repetitive and difficult teaching and class management tasks; and (3) reduce the
workload of teachers per student so that they can spend more time with individual
students.

2. Health -Computer technology is changing Medicine methods dramatically. All medical


information can now be transmitted to a doctor in digital format, including that created
by X-ray, lab test, and pulse monitor. Image transfer technology allows for the rapid
delivery of radiological images such as CT scans and MRIs to electronic charts and
doctors ' offices.

3. Money - “The future of money is increasingly digital, likely virtual, and possibly
universal,” says one writer. Digital means that something is developed, replicated, or
carried on through a machine or computer network and we have definitely come a long
way to being a cashless society.

4. Leisure - Information technology is used for any type of entertainment, from


videogames to telegambling. This is also used in the arts, from photography to design.
Let's only consider two cases, music and movie.

Living in IT Era
6
5. Government & Electronic Democracy - The Internet
and other information technologies have helped
government provide quality services and paved the way
for greater public participation in government operations.

6. Jobs & Careers - Today almost every job and career need some kind of computer
skills. These are ordinary jobs where machines are widely used as devices. In some
cases, specialized occupations in which advanced computer technology combined with
technical training offers radically different career styles for people.

THE FIRST CAMERA NEEDED AN INCREDIBLY LONG


EXPOSURE
The first photograph ever taken in 1826 took 8 hours to expose!
The creator of that camera, Louis Daguerre, was able to lower that
time drastically to just 15 minutes in 1839
Synthesize your -- https://www.thefactsite.com/top-100-technology-facts/

Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. What aspect of your life was greatly influence by information technology?
2. How helpful technology in your everyday living?
3. As future a teacher, how significant technology in your future profession

CONGRATULATIONS!
You have finished the first lesson of this module; you may now
proceed answering the Activity 1.1 to apply what you have learned
and to develop your ability to think critically.

For Questions, You may send personal message to my messenger


account or send an SMS to my cell phone number. Thank you!

Unit 1.2: CATEGORIES OF


COMPUTERS
Living in IT Era
7
Activating your Prior Knowledge:
What are the devices you commonly used to
communicate or access internet?
List down 3 devices that you used more often.
1. ___________________________________

2. ______________________________

3. ______________________________

Expanding your Knowledge!

Computers come in a number of shapes and sizes and can


be categorized by their processing power: supercomputers,
mainframe computers, workstations, microcomputers, and
microcontrollers. We are considering servers, too.

CATEGORIES OF COMPUTERS
1. Supercomputers
It is normally priced from 50
million pesos to more than 175 million
pesos, supercomputers are high-capacity
machines with thousands of processors
that can perform more than several
trillion calculations per second. These
are the most expensive and fastest
available machines. "Supers," as they are
called, were used for tasks involving the
processing of large quantities of data,
such as making the census count,
weather forecasting, aircraft construction, molecular modeling and breaking encryption
codes.

2. Mainframe computers
The only type of computer available until the late 1960s, mainframes are water-
or air-cooled computers that cost 250,000–250 million peesos and vary in size from
small, to medium, to large, depending on their use. Small mainframes are often referred
to as midsize computers; they used to be referred to as minicomputers, but the term is
seldom used today. Mainframes are used for handling millions of transactions by major
entities – such as banks, airlines, insurance firms, and universities.Users also use a
terminal to access a mainframe, which has a display screen and a keyboard that can
input that output data but can not process data by itself. Mainframes process the
instructions in billions per second.
3. Workstations
Workstations were introduced in the early 1980s and are large, versatile

Living in IT Era
8
personal computers primarily used for complex scientific, mathematical and
engineering calculations and computer-aided design and manufacturing. Workstations
are used for activities such as designing airplane fuselages, developing prescription
drugs, and making movie special effects, offering certain capabilities comparable to
those of mid-size mainframes.

4. Microcomputers
Microcomputers, also known as personal computers (PCs), which cost P15,000
to over P250,000, can fit, it can be carried around, fix next to a desk. There are many
types of microcomputers: desktop PCs, tower PCs, notebooks (laptops), netbooks,
mobile internet devices (MIDs), and personal digital assistants — handheld computers
or palm-tops.

DESKTOP PCs
Desktop PCs are older microcomputers
whose case or main house sits on a desk, often
with a front keyboard and a monitor (screen) on
top.

NOTEBOOKS
Notebook computers, also known as laptop
computers, are lightweight compact computers
with integrated display, keyboard, hard disk
drive, CD / DVD drive, battery and AC adapter
that can be connected to an electrical outlet; they
weigh between 1.8 and 9 pounds anywhere.

MOBILE INTERNET DEVICES


(MIDs) or SMART PHONES

Mobile Internet Devices (MIDs)


are smaller than notebook computers but
larger and more powerful than PDAs (see
below) for consumers and business
professionals. Completely incorporated
into the internet, they are fully compatible
with microcomputers and laptop desktops. The initial models concentrate on

Living in IT Era
9
communication with the data, not speech.

PERSONAL DIGITAL ASSISTANTS


Personal digital assistants (PDAs), also known as portable computers or
palmtops, combine personal management tools — scheduling calendars, address books,
to-do lists — with the ability to send email and faxes in some instances. Many PDAs
have screens that are friendly to the eye. Others link for sending or receiving
information to desktop computers, too.

5. Microcontrollers
Microcontrollers (embedded computers) are the small, specialized
microprocessors used in "smart" appliances and cars, also called embedded computers.
For example, these microcontrollers allow microwave ovens to store data on how long to
cook your potatoes and at what power setting. Microcontrollers were used to create a
new world of electronic industrial appliances — e-pliances. They are, for example,
behind single-function items such as digital cameras, MP3 and MP4 players and
organizers that have developed into hybrid types such as devices that store images and
videos as well as music.

6. Servers
A server, or network server, is a central computer that stores data (databases)
collections and programs to link or provide services to PCs, workstations, and other
devices called clients. Those clients are connected via a wired or wireless network. The
whole network is considered a network of clients / servers.

MORE PEOPLE HAVE CELL PHONES THAN TOILETS!


Out of all the 7.7 billion people in the world, over 6 billion of those
have access to a cell phone.
Meanwhile, only 4.5 billion have access to working toilets!

Synthesize your -- https://www.thefactsite.com/top-100-technology-facts/

Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. What are the types of computer?
2. How each type computer differs to one another?
3. What type of computer you prepare to use?

CONGRATULATIONS!
You have finished the first lesson of this module; you may now
proceed answering the Activity 1.2 to apply what you have
learned and to develop your ability to think critically.

For Questions, You may send personal message to my


messenger account or send an SMS to my cell phone number.
Thank you!

Unit 1.3: COMPUTER AND ITS COMPONENTS


Living in IT Era
10
Activating your Prior Knowledge:
What are the computer specifications your
mainly consider in buying?
List down 3 computer specs you mainly consider.
1. ___________________________________

2. ______________________________

3. ______________________________

The computer is only a dead set of plastic, silicon and metal before the 'Power'
button is pressed. A little burst of energy, and a series of events starts that brings life and
power into the system. But the machine is unaware, even at this point, of the potential it
holds inside itself. Today the computer is an important part of the digital era.

Initially, computers were designed to perform mathematical operations, but later


they were used to store the result of such operations, which contributes to certain data or
information being stored over time.

Data is a collection of unprocessed facts, figures, and symbols.

Information is a processed form of data. It is organized, meaningful, and useful.

Expanding your Knowledge!

A computer may be described as an advanced


electronic device which takes raw data as user input.
It uses a series of instructions (referred to as the
program) to process the data and give output. The
outcome can be automatically used or saved for
future use.

HARDWARE AND SOFTWARE

Hardware is any part of the computer which has a physical structure that can be seen and
felt, although some might be so small that it is invisible to the naked eye.

Software is the collection of instructions which tells the machine how to do the tasks. It is
intangible, i.e., not measurable and touchable, but its effect is clearly described.

HARDWARE COMPONENTS

1. Input Devices

Living in IT Era
11
Input devices are devices that allow a user to insert data and instructions such as
keyboard, mouse, microphone, scanner, trackball, joystick, tablet graphics, and digital
camera into a computer.

2. Output Devices
Output devices are used by monitor or VDUs, LCDs, printers, plotters, and
speakers to show the results or information to the user.

3. Storage devices
Storage devices are the tools used to store data and information such as hard
drives, memory sticks (pen drives), compact disks, DVDs and cassette drives from and
to transfer them to the computer.
a. In the late 1960s, floppy disks were made. A floppy disk consists of a small thin
plastic vest lined with magnetic tape. This plastic disk is covered by its outer covering
which is a hard plastic. It can carry data amounting to 1.44 MB. Such disks are
obsolete nowadays.

b. Hard Disk consists of a metal disk which is covered with the metal oxide used to
store a large amount of data. Those disks can hold up to tens or hundreds of
gigabytes of information than floppy disks.

c. Compact Disk – Read Only Memory or CD-ROM is a read only or read-write


disk. It can store vast volumes of data that can be shared out to a large number of
users. It's cheap and fast but its access time is longer than the magnetic disk. There
are two types of CDs: CD-R and CD-RW.
CD-R stands for Compact Disk – Recordable which can store 700MB of data, but
only once.
CD-RW stands for Compact Disk – ReWriteable which can read,
write and erase data as many times.

Living in IT Era
12
d. DVD, stands for Digital Versatile Disk, is an optical storage disk similar to CD-ROM,
as this is double sided with dual layer disc and can hold 4.7 GB of data.

e. Blue-Ray Disks are used to store more than 25 GB of data in less time at a very
high speed. A single layer of BD can store 13 hours of video, while more than 20
hours of video can be stored as double layer BD.

f. USB stands for Universal Serial Bus. It is a portable memory unit used to store
data which must be transferred to the other unit using the system's USB port.

g. Memory Card or flash memory card is a memory device. It is used as a medium


for quick, fast and secure storage and transfer of data from one device to another. It
is used in digital cameras, cell phones, game consoles etc.

CPU (Central Processing Unit)


The system unit is the box which protects against damage the internal electronic
components. This is composed of the central processing unit (CPU) and memory. The CPU
interprets and executes the basic instructions which the machine operates. Memory is the
position of keeping data and instructions.

MEMORY
1. Primary Memory is very fast thus data and programs must be in the primary memory
for execution. Random Access Memory (RAM) and Read Only Memory (ROM) are both
primary memories.
a. Random Access Memory refers to a memory which can be randomly picked
and used. The data processed here is gone the very moment the computer is
turned off. These are also called volatile memory.
b. Read Only Memory is permanently installed on your computer at the time of
production. The information from this memory can be read only and fresh
information cannot be written into it. It permanently stores a set of instructions
which instructs the computer how to work. After we switch on the computer, it
uses instructions stored here to carry out a series of tasks automatically, before
we can actually use the computer.

2. Secondary Memory or Auxiliary Memory: The content of the RAM is erased when
the electrical power is switched off. So, this data needs to be stored for future use,
somewhere else. Since primary storage is also expensive; we need a relatively cheaper
form of backup storage that can store vast amounts of information. As a result,
secondary memory devices are becoming an important part of the computer.

TYPES OF SOFTWARE
There are two primary types of softwares: Application software and Systems
software.

1. Application software - It comprises programs that guide the computer to perform


specific tasks. Multiple programs are also designed in to build an application. For
example: Word Processors such as OpenOffice.org Writer, MS Word etc are used to
write error free documents.

2. System software - Contains programs that allow computer hardware to work with and
execute software applications. Computer software is the interface between the user and
other applications, and the hardware of the machine.
Living in IT Era
13
a. Operating system- the OS is a computer program that controls all other programs
on your computer, stores files organizedly and guides the use of computer hardware
such as the keyboard and mouse.

b. Utility software is a software component of the program. This is used for device
analysis, setup, optimisation, or maintenance. This app does all the tasks of
housekeeping.

MOST OF TODAY’S SUCCESSFUL COMPANIES STARTED


IN GARAGES
That’s right, aside from just Apple, other huge name companies
started with humble beginnings.
HP, Google, and Microsoft all were started in a garage.
-- https://www.thefactsite.com/top-100-technology-facts/

Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. What is the difference between hardware and software?
2. What parts of computer that serve as its brain?
3. Enumerate the components of hardware.

CONGRATULATIONS!
You have finished the first lesson of this module; you may now
proceed answering the Activity 1.3 to apply what you have
learned and to develop your ability to think critically.

For Questions, You may send personal message to my


messenger account or send an SMS to my cell phone number.
Thank you!

Activity 1.1
Importance of Information Technology
Name: ___________________________________ SCORE:
Course & Section: __________________________
Date: ____________________________________

Living in IT Era
14
Knowledge in Action
Computers are almost everywhere, and they affect most walks of life—business,
education, government, the military, hobbies, shopping, research, and so on.
1. What aspects of your life have been the most evidently affected by technology?

2. Has anything been made worse or harder in your life by the advance of computers?

3.

Living in IT Era
15
4. What about things that have been made better or easier?

Activity 1.2
CATEGORIES OF COMPUTERS

Name: ___________________________________ SCORE:


Course & Section: __________________________
Date: ____________________________________

Direction: Compare and contrast the relative advantages of Personal Computer (PC) and
Smartphone. List down at least 3 relative advantage and disadvantage.
PC vs SMARTPHONE
ADVANTAGES
PC SMARTPHONE

DISADVANTAGES
PC SMARTPHONE

Living in IT Era
16
Activity 1.3
CATEGORIES AND COMPONENTS OF COMPUTERS

Name: ___________________________________ SCORE:


Course & Section: __________________________
Date: ____________________________________

A. True/False Questions
Direction: Write T if the statement is correct. Otherwise F, for erroneous statement.
________1. Mainframe computers process faster than microcomputers.
________2. Main memory is a software component.
________3. The operating system is part of the system software.
________4. Processing is the manipulation by which a computer transforms data into
information.
________5. Primary storage is the area in the computer where data or information is held
permanently.
________6. The keyboard and the mouse are examples of input devices.
________7. Movies are a form of multimedia.
________8. Computers are becoming larger, slower, and more expensive.
________9. Modems store information.
________10. A microcomputer is used to view very small objects.
________11. A hard disk is an example of software.
________12. Computers continue to get smaller and smaller.
________13. Supercomputers are particularly inexpensive

B. Completion Questions
Direction: Fill in the blanks to make the statement complete and correct.
14. The _______ _______ ________ refers to the part of the internet that presents
information in multimedia form.
15. “ _______ technology” merges computing with highspeed communications.

Living in IT Era
17
16. A(n) _______ is an electronic machine that accepts data and processes it into
information.
17. _______ are high-capacity machines with thousands of processors.
18. Embedded computers, or _______, are installed in “smart” appliances and
automobiles.
19. The kind of software that enables users to perform specific tasks is called ________
software.
20.The _______ is the display device that takes the electrical signals from the video
card and forms an image using points of colored light on the screen.

LIVING IN IT ERA

Learning Module 2

THE INTERNET AND THE WORLD


WIDE WEB

Living in IT Era
18
“Ethics change with technology.”
– Larry Niven

THE INTERNET AND THE WORLD WIDE WEB


Module Overview

In this learning module you will learn more about the types
internet connection available in the market as well its
corresponding speed. You will also identify the parts of
Uniform Resource Locator (URL) and categories of webcite
you used often. Lastly, you will learn more about the proper
behavior and etiquette in the cyber space.

Learning Outcomes
At the end of this module, you are expected able to:
1. Familiarize with the key points in internet evolution
2. Identify the types of internet connections
3. Understand the anatomy and types of Website
4. Apply netiquette in daily living

Timeframe: 2-3 weeks

Tips for Studying at Home Effectively


1. Try Active Studying
2. Get A Good Night’s Sleep
3. Study at The Right Time
4. Have A Designated Study Area
5. Eat Properly
6. Get Chores Out of The Way
7. Create A Timetable
Living in IT Era
19
8. Use A Timer

Unit 2.1: INTERNET CONNECTIONS


Activating your Prior Knowledge:
Enumerate Internet Service Provider in the
Philippines.
List down at least 3 service providers.
1. ___________________________________

2. ______________________________

3. ______________________________

The international network known as the internet consists of hundreds of


thousands of smaller networks linking educational, commercial, nonprofit, andmilitary
organizations, as well as individuals. Central to this arrangement is the client/server
network.

A client computer is a computer requesting data or services.


A server, or host computer, is a central computer supplying data or services
requested of it.

Before you can connect to the Internet for the first time, you must have some
hardware in place and choose your Internet Service Provider (also referred to as an ISP
or just a provider). An ISP is a corporation that operates dedicated computers (called
servers) you use for Internet access. ISPs charge the service a monthly fee.

Expanding your Knowledge!

TYPES OF INTERNET CONNECTIONS


Based on www.comstar.biz, a personal electronic
device can connect to the internet in a variety of ways. They
all use different hardware and each has a number of speeds
for communication.

Living in IT Era
20
1. Dial-Up (Analog 56K)
The access to dial-ups is inexpensive, but sluggish. After the device dials a phone
number a modem (internal or external) connects to the Internet. This analog signal is
converted via the modem to digital and transmitted over a landline serviced by a public
telephone network. The efficiency of the telephone lines varies, and the communication
may often be bad. The lines encounter interference frequently and this affects pace, from
28Kbps to 56Kbps throughout. If a computer or other system occupies the same line as the
handset, they can not be activated simultaneously.

2. ISDN
ISDN stands for Integrated Service Digital Network. It is a wireless network that
transmits voice, picture , video and text over the current PSTN telephone network that is
transferred to circuits. Speeds range from 16kbps to 64kbps.

3. DSL
DSL stands for Digital Line Subscriber. It is still a "always on" internet connection.
In an Internet connection with DSL, both voice and internet data can flow simultaneously
over the same telephone line. DSL speed varies; Download speed ranges from 5Mbps to 100
Mbps depending on where you live but on an average.

4. Cable
Cable offers internet access through a cable modem and runs over cable TV wires.
There are different speeds depending on whether you are uploading or transmitting data
transmissions. Although the coax cable has even greater bandwidth over dial-up or DSL
telephone lines, quicker access can be obtained. The cable speeds range between 512Kbps
and 20 Mbps.

5. Fiber
A connection to the Internet via fiber provides the fastest Internet speed today. This
can provide speed of up to 1000 Mbps for download and upload. This uses light to relay the
data via the fiber optic cable. This can cover long distances with no loss. Fiber is way more
expensive than cable and DSL.

6. Wireless
As the name suggests, Wireless or Wi-Fi may not require telephone lines or cables
to connect to the Internet. It uses radio frequency instead. Wireless is just an on-line link
and it can be accessed from anywhere. In coverage areas, wireless networks are increasing
by the minute so when I say connectivity from just about anywhere, I say that. Speeds can
differ, and range from 5 Mbps to 20 Mbps.

7. Satellite
Satellite is accessing the internet via satellite in Earth's orbit. Compared with cable
and DSL, the immense distance a signal travels from earth to satellite and back again offers
a delayed link. Satellite link rates vary between 512 K and 2.0 Mbps. Nevertheless,
substantial changes are underway to make it more accessible and efficient in the field of
infrastructure and technology.

Living in IT Era
21
8. Cellular
Cellular technology provides wireless access to the Internet through cell phones.
The speed varies depending on the provider, but the most common are 3G and 4G speeds. A
3G is a term that describes a 3rd generation cellular network with a mobile speed of around
2.0 Mbps. 4G is the fourth generation of wireless cellular standards. The goal of 4 G is to
achieve a peak mobile speed of 100 Mbps, but the reality is currently around 21 Mbps.

9. Hotspot
The hotspot is a technology that is relatively similar to Wi-Fi. Hotspot provides
users with access to the Internet via WLAN in the specific area where they are located. Like
smartphones and mobile hotspots, here you can share your data with your friends.

10. Broadband
Broadband is also known as a wide band because it uses and provides a wide band
of frequencies during communication. The wider the bandwidth of the channel, the greater
the information-carrying capacity.

Here you can achieve speed up to 100 Mbps, it typically depends upon the cables we
use like in case of coaxial cable data transfer speed may vary but in optical fiber cables
speed will be high

GOOGLE SEARCHES HIT THE BILLIONS EVERY MONTH.


There are over 35 billion Google searches each month.
In May 2019, the top three most Googled words were “facebook” at 233
million searches, “youtube” with 194 million searches, and “amazon” with
103 million searches.

-- https://www.thefactsite.com/top-100-technology-facts/

Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. What is the slowest type of internet connection?
2. What in the fastest types of internet connection?
3. How fast is 4G cellular network in reality?

CONGRATULATIONS!
You have finished the first lesson of this module; you may
now proceed answering the Activity 2.1 to apply what
you have learned and to develop your ability to think
critically.
For Questions, You may send personal message to my
messenger account or send an SMS to my cell phone
number. Thank you!
Living in IT Era
22
Unit 2.2: THE WORLD WIDE WEB
Activating your Prior Knowledge:
What websites you usually visit? How
frequent you visit those sites? Are those
websites help you in your everyday living?
List down at least 3 websites URL you commonly used or
visit.
1. ___________________________________

2. ______________________________

3. ______________________________

As we have said, the internet and the world wide web are not the same. The
internet is a vast network of networks, linking millions of computers via protocol,
hardware, and channels of communication. This is the infrastructure that serves not only
the web but also other communications structures
including email, instant messaging, newsgroups
and other activities that we will address
The Internet section called the web is a
multimedia-based technology that allows you to
access more than just text. This means you can
download art, music, video, and animation as well
as participate in interactive games.

Expanding your Knowledge!

THE FACE OF THE WEB: BROWSERS,


WEBSITES, & WEB PAGES

BROWSERS:
Software for Surfing the Web
A browser, or web browser, is software
that helps you to locate and navigate the different
parts of the internet.

Living in IT Era
23
Examples of browsers include Microsoft Internet Explorer, Macintosh computers
for Apple Inc. and Chrome for Google
These and other browsers allow you to surf the web, just like riding a wave with a
surfboard. Surfing means navigating the Web using your mouse to travel from one place or
website to another through a set of linked paths or links.

WEBSITE
The Location on The Computer
A website, or simply a site, is a location on a specific web-based computer which
has a unique address (as we will understand, called a URL). For instance, you decided to
search information for your homework, you would probably visit www.google.com, the
website is the location of a computer somewhere on the internet.

WEB PAGES
The Documents on a Website
A website consists of a web page or a series of linked web pages. A web page is a
World Wide Web document that may include text , pictures, sound , and video. The first
page that you see at a website is like a book's title page. This is the home page, or welcome
page, that identifies the website and contains links to other website pages

ANATOMY OF A URL
URLS: ADDRESSES FOR WEB PAGES
It needs to know the address of the domain, the URL, before your browser can
connect to a web site. The URL (Uniform Resource Locator) is a string of characters,
pointing anywhere on the web to a particular piece of information. Put another way, the
URL is the unique address of the website.

Elements of URL

1. The protocol: http:/ A protocol is a set of rules of communication to exchange


information, as stated. It stands for HyperText Transfer Protocol ( HTTP), the rules
of communication that allow browsers to link to web servers.

2. Domain name (web server name): www.nps.gov/A domain is simply a place on the
internet, the web server in question. Domain names state the address location and
form. The last part of the domain, called the top-level domain, is an extension of
three letters that describes the domain type:. Gov,.com,.net,.edu,.org,.mil,.int —
governmental, commercial, networked, educational, non-profit, military, or
international.

Living in IT Era
24
3. The Directory name: yose / The directory name is the name of the directory server
or folder from which your browser needs to pull the file. This is "Yosemite" yose
here. Yellowstone National Park shouts

4. The file name and extension: home.htm The file is the particular page or
document that you are seeking. Here it is home.htm, because you have gone to the
home page, or welcome page, for Yosemite National Park. The .htm is an extension
to the file name, and this extension informs the browser that the file is an HTML file.
Let us consider what HTML means.

THE FIREFOX LOGO ISN’T A FOX


There is a common misbelief that because the browser is named Firefox, the
logo must be a fox.
Surprisingly, the cute furry creature in the logo is actually a red panda!

-- https://www.thefactsite.com/top-100-technology-facts/

Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. Enumerate 3 web browser.
2. What is the meaning of “www”?
3. What are the elements of URL?

CONGRATULATIONS!
You have finished the first lesson of this module; you may now
proceed answering the Activity 2.2 to apply what you have
learned and to develop your ability to think critically.

For Questions, You may send personal message to my


messenger account or send an SMS to my cell phone number.
Thank you!

Living in IT Era
25
Unit 2.3: TYPES OF WEBSITE
Activating your Prior Knowledge:
Give examples of website you regularly visit
List down at least 3 websites URL you commonly used or visit.
1. Education: ______________________________

2. Social Media: ________________________

3. Ecommerce: _________________________

There are millions of websites can be found as we browse using the internet, each
website has created for different purposes depending to our needs. Now, let us try find out
the common categories of website we are using today.

Expanding your Knowledge!

TYPES OF WEBSITE
According to Barraclough (2020), it is clear there are
more than just ten different types of websites in the
world, he picked the most common categories to give
you a general idea.

1. Blog
Usually run by a person or a small group, any subject can be covered by a
blog – whether its travel tips, financial advice or doughnut review. Although often
written in an informal or conversational style, professional blogging has become
an increasingly popular online money-making tool.

2. Corporate
You may not be selling directly through a corporate website, but you can
use these sites to provide information about your business and to let potential
customers know how to get in touch with you.

3. Ecommerce
An ecommerce site, otherwise known as
an online store, allows you to make online
payments for products or services. Stores can

Living in IT Era
26
function as stand-alone websites or can be combined with a blog or corporate
website.

4. Portfolio
Just like a physical portfolio, these types of websites are used to display and
promote examples of previous work. Primarily used by those in the creative industry,
a portfolio website can be used like a CV, demonstrating your skills in order to
impress clients, customers, or future employers.

5. News or magazine
It needs no further clarification for news and magazine websites. A news
website's primary purpose is to keep its readers up-to - date with current affairs,
whereas online magazines are more oriented with entertainment.

6. Social media
We all know Facebook and Twitter, but
there are many other forms that social media sites
can take in. Usually, these sites are created to allow
people to share thoughts , images, or ideas, or
simply to connect with others in relation to a
particular topic. Likewise, social media platforms
are rapidly becoming the gateway for people to read
up on the news.

7. TV or video streaming
Netflix, along with similar
sites like NowTV, have revolutionised the
way the world watches television.

8. Educational
Furthermore, educational websites are very self-
explanatory. These websites are designed to display
information about specific topics, using either interactive
games or engaging designs to keep the user hooked.

9. Portal
Portals are primarily used within businesses, schools, or organisations for
internal purposes. Such websites also require a process of signing in, allowing
students to access the website of the school, or providing staff access to their emails,
warnings and files all in one location.

10. Wiki or community forum


A website wiki helps people to share and write material together online. The
most common example is Wikipedia itself which allows anyone to modify, add to,
and analyze each article's content.

Millions of hours of TV and movies are watched every day on Netflix.


The world spends about 164 million hours every day streaming Netflix,
Living in IT Era
which is equivalent to 18,812 years’ worth of TV and movies every 24 27
hours.
Now my binge-watching habits don’t seem so bad!
Synthesize your Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. Identify common types of websites.
2. Schoology, Google Classroom and Quizziz, can be categorize to what type of
website?
3. Shoppe, Lazada and Zalora, can be categorize to what type of website?

CONGRATULATIONS!
You have finished the first lesson of this module; you may now
proceed answering the Activity 2.3 to apply what you have
learned and to develop your ability to think critically.

For Questions, You may send personal message to my


messenger account or send an SMS to my cell phone number.
Thank you!

Unit 2.4: NETIQUETTE

Living in IT Era
28
Unit 2.4: NETIQETTE
Activating your Prior Knowledge:
Recently, a social media influencer/vlogger
was involved in an issue wherein he mocked a
tricycle driver because of their financial status. It
gains the public attention for being insensitive and
discriminate that results to him being bashed online.
What do you think about the actions of the vlogger?
What is your advice to the vlogger?
It is justifiable to fire back and bash him also?

Expanding your Knowledge!

NETIQUETTE

Netiquette, or network etiquette, is concerned


with the "proper" way to communicate in an online
environment. Consider the following "rules," adapted
from Virginia Shea's The Core Rules of Netiquette in
1994, whenever you communicate in the virtual world.

Rule 1: Remember the Human


Practice the Golden Rule when electronically communicating, whether through
email , instant message, discussion post, text, or some other method: Do unto others as you
would have others do unto you. Before clicking "send" or "submit," ask yourself, "If anyone
else had written it, would I be fine with this?"

Rule 2: Adhere to the same standards of behavior online that you follow in real
life
While it can be argued that behavioral standards in the virtual world may be
different, they certainly shouldn't be lower. Whenever you live in "cyberspace" you should
do your best to act within the laws and ethical ways of society.

Rule 3: Know where you are in cyberspace


"Netiquette differs from domain to domain" (Shea, 1994) Depending on where you
are in the virtual world, the same written correspondence might be permissible in one
region, where it may be considered unacceptable in another. How you send to a friend
might not suit a classmate or colleague in an email.

Rule 4: Respect other people's time and bandwidth


It is your duty, as a virtual world communicator, to ensure that the time spent
reading your words is not wasted. Make your written correspondence relevant to the end,
without odd text or needless graphics or attachments that can take your recipient download
for a long period of time.

Rule 5: Make yourself look good online

Living in IT Era
29
Often times you will be judged by the quality of your writing, so keep the following
tips in mind:
 Always check for spelling and grammar errors
 Know what you're talking about and state it clearly
 Be pleasant and polite

Rule 6: Share expert knowledge


So, in the "founding fathers" spirit of the Internet, share what you do! Are you an
expert on anything? Post resources and references concerning your topic. Have you recently
expanded your awareness of a subject that might be of interest to others? Say that, too.

Rule 7: Help keep flame wars under control


"Flaming is what people do when they share a firmly held view without holding back
any feelings" (Shea, 1994). Though "flaming" is not inherently forbidden in virtual
communication, "flame wars" must be regulated, or the group's camaraderie may be
undermined, when two or three people exchange angry messages with each other.

Rule 8: Respect other people's privacy


If it's an online class discussion board, Facebook page, or an email, depending on
what you're reading in the virtual world, you might be exposed to any personal or private
information that needs to be treated with caution.

Rule 9: Don't abuse your power


Much as in face-to - face contexts, there are people who have more "strength" in
cyberspace than others. Perhaps it is you who possess all the strength and expertise! Just
remember: understanding better than others do or having better strength than others does
not grant you the right to take advantage of someone else.

Rule 10: Be forgiving of other people's mistakes


Not everyone has the same amount of experience working in the virtual world. And
not everyone knows the rules of netiquette. At some point, you will see a stupid question,
read an unnecessarily long response, or encounter misspelled words; when this happens,
practice kindness and forgiveness as you would hope someone would do if you had
committed the same offense.

Filipinos use social media more than Americans

Between adult users in the Philippines, 93% use social networking sites,
which is quite higher than the 74% that use it in the U.S.

They mostly use it to talk about music and movies, and slightly fewer use it
to talk about sports.
-- https://www.thefactsite.com/top-100-technology-facts/

Synthesize your Knowledge

Living in IT Era
30
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. Identify common types of websites.
2. Schoology, Google Classroom and Quizziz, can be categorize to what type of
website?
3. Shoppe, Lazada and Zalora, can be categorize to what type of website?

CONGRATULATIONS!
You have finished the first lesson of this module; you may now
proceed answering the Activity 2.4 to apply what you have
learned and to develop your ability to think critically.

For Questions, You may send personal message to my


messenger account or send an SMS to my cell phone number.
Thank you!

Activity 2.1
TYPES OF INTERNET CONNECTIONS

Name: ___________________________________ SCORE:


Course & Section: __________________________

Living in IT Era
31
Date: ____________________________________

Multiple Choice: Read and analyze each question. Write the letter of your choice in the space
provided.
______1. The Internet is a ________________________.
a. vast network of LANs and WANs
b. small network of LANs and WANs
c. line of LANs and WANs
d. None of the above
______2. If you are using ______internet connection your connection would be very slow.
a. DSL
b. Dial-up access
c. Cable
d. Broadband
______3. It refers to a high-speed connection using regular copper telephone lines
a. Broadband
b. DSL
c. Wi-Fi
d. ISDN
______4. The fastest type of broadband connection is _________________.
a. Fiber to the Premises
b. Radio Cellular Networks
c. DSL
d. Satellite Network
______5. This company/ organization provides services that can be found only if you have
internet access. It is categorized as?
a. ISP
b. WISP
c. OSP
d. ISDN
______6. This type of internet connection will be disrupted if the weather is too cloudy.
a. Satellite Internet Connection
b. Wi-Fi
c. Cellular Radio Network
d. Broadband
______7. This type of internet connection requires mobile networks and mobile devise to
function.
a. Radio Cellular Networks
b. Wi-Fi
c. Fixed Wireless
d. DS

Activity 2.2
TYPES OF WEBSITES

Name: ___________________________________ SCORE:


Course & Section: __________________________

Living in IT Era
32
Date: ____________________________________

Direction: Differentiate the terms in the world wide web. Discuss briefly their features
and functions

BROWSERS WEBSITES WEBPAGE

Activity 2.3
TYPES OF WEBSITES

Name: ___________________________________ SCORE:


Course & Section: __________________________

Living in IT Era
33
Date: ____________________________________

Multiple Choice: Read and analyze each question. Write the letter of your choice in the space
provided.
______1. A site that amuses, pleases, or diverts.
a. commercial
b. entertainment
c. advocacy
d. news
______2. A site generally used to post online diaries, which may include discussion forums.
a. web blog
b. personal
c. commercial
d. entertainment
______3. A website is any website that’s devoted to representing a specific business.
a. business
b. eCommerce
c. entertainment
d. portfolio
______4. Youtube.com is an example of what type of website?
a. Community Forum
b. Video media sharing
c. Personal
d. Business
______5. A site devoted to showing examples of past work.
a. Portfolio
b. Entertainment
c. Media
d. Nonprofit
______6. A website that uses any combination of games, articles, videos and images to educate
their audience.
a. Personal
b. Web Portal
c. Community Forum
d. Educational
______7. Websites that are a simplified form of business websites is called?
a. Brochure
b. Business
c. Media
d. Portfolio

Activity 2.4
NETIQUETTE

Name: ___________________________________ SCORE:


Course & Section: __________________________
Date: ____________________________________
Living in IT Era
34
Multiple Choice: Read and analyze each question. Write the letter of your choice in the
space provided.

______1. What do you do if you feel you are being cyber-bullied?


a. Tell a trusted adult like a parent or teacher.
b. Tell no one, it's embarrassing.
c. Just delete anything referring to you on the internet.
d. Call the police.
______2. How are you judged in cyberspace?
a. No one can see you, so no one can judge you
b. You are judged by what you do on the Internet and how it looks - by
your spelling, grammar, and netiquette
c. You are judged by your intent - if you didn't mean to hurt someone's
feelings, then it's okay
d. You are judged by how you look - your profile picture is important
______3. You should never give out which of the following on the Internet?
a. Name
b. Age
c. Address
d. All of the above
______4. What is considered shouting over the Internet?
a. Screaming at your computer
b. Writing in all CAPS
c. Putting a lot of exclamation marks at the end of a sentence
d. Not answering a friend request on Facebook
______5. If you get an embarrassing picture from someone you know you should
NEVER...
a. Tells your parents or a teacher.
b. Talks to the person again
c. Discourages the person from sending pictures like that
d. Sends it on to other friends

LIVING IN IT ERA

Living in IT Era
35
Learning Module 3

INFORMATION, CONTROL, AND


PRIVACY

“The real danger is not that computers will begin


to think like men, but that men will begin to think
like computers.”
- Sydney Harris

THE INFORMATION, CONTROL, AND PRIVACY


Module Overview

For the third learning module we will now move to the


emerging issues and laws related to data and information
under information technology. Specifically, you will be
familiarized to major ethical issues in IT, intellectual
Living in IT Era
property code and data privacy act of the Philippines. 36
Learning Outcomes
At the end of this module, you are expected able to:
1. Understand issues arise with emergency of information technology
2. Familiarize with the existing law related to information technology

Timeframe: 2-3 weeks

Tips for Studying at Home Effectively


1. Try Active Studying
2. Get A Good Night’s Sleep
3. Study at The Right Time
4. Have A Designated Study Area
5. Eat Properly
6. Get Chores Out of The Way
7. Create A Timetable
8. Use A Timer

Unit 3.1: ETHICAL ISSUES IN


INFORMATION TECHNOLOGY
Activating your Prior Knowledge:
FACEAPP FRENZY

Living in IT Era
37
Faceapp is a mobile application that allows users to change their physical
appearance with the help of filters.
Terms of use of the software are becoming a global issue. It states that users effectively
revoke their rights over their uploaded images, including other related personal data such
as names and usernames, thus allowing the developers of FaceApp to do whatever they
want with the data collected (Miranda, 2019).

What are thoughts about issue?

Do you think it is still acceptable to use mobile applications collects personal data without
user protection?

Do we need to pay attention to this matter? Why?

Expanding your Knowledge!

ETHICAL ISSUES IN INFORMATION


TECHNOLOGY (IT)
Information technology has a wide variety of
applications at large-scale in education, business,
health, manufacturing, banking and scientific
research. With the leading advancement in
information technology, awareness about security
concerns, privacy issues and IT's key negative impacts
is needed. To deal with these issues in IT society it is
important to find out the ethical issues (Sharma, nd).
Some of the major ethical issues faced by Information Technology (IT) are:
1. Personal Privacy - In information technology it is an important aspect of ethical
issues. Maintaining the privacy and data security is a big problem for the IT community
and organizations. With the question of privacy also comes unintended exposure to
unauthorized persons and safeguards to protect data accuracy.

2. Access Right - Through great technical progress, access right is a high priority
problem for the IT and cyberspace. Internet network cannot be kept safe from
unauthorized access. The intrusion detection system is usually used to assess if the user
is an intruder or an authorized person.

3. Harmful Actions - Computer ethics harmful behavior refers to the IT damage or


adverse effects such as loss of valuable knowledge, loss of income, loss of possession,
degradation of income and undesirable significant impacts. To recover from the harmful
acts you need extra time and effort to delete the viruses from the computer systems.

4. Patents - A patent may preserve the exclusive, hidden element of an invention. This is
very difficult to secure a patent, relative to securing a copyright. The patent holder needs
to reveal to a qualified programmer the full description of a system to create a
programme.

5. Copyright - Information protection professionals should be familiar with the copyright


law definition involved. Copyright law acts as a very effective legal mechanism for

Living in IT Era
38
securing computer software, both before an infringement of copyright and definitely
after a violation of copyright.

6. Trade Secrets - A trade secret secures something valuable and useful. The legislation
covers the private dimensions of theories that are only known to the discoverer or to his
confidants. When revealed, trade secret is lost as such, and trade secrets are covered
only by the law.

7. Liability - The developer of software makes promises and assertions to the user about
the nature and quality of the product which can be restricted as an express guarantee.
To protect against liability all agreements should be in writing. A waiver of express
warranties that exclude a supplier from taking responsibility for informal, speculative
statements or predictions made during the stage of the agreement.

8. Piracy - Piracy is an activity where illegal copies of the software are created. The
software industry is ready to face software piracy. The courts are tackling a growing
number of software protection actions.

iTunes has an unusual Terms & Conditions

When agree to the Terms & Conditions for iTunes, you are agreeing to not
use it to make nuclear weapons.
-- https://www.thefactsite.com/top-100-technology-facts/

Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really absorbed
its core ideas. Try to mentally answer the following questions, which will help you assess
your reading progress.
1. What ethical issues in information technology you are most prone?
2. In your own opinion, what ethical issues is the most dangerous?
3. Do you think the netizen should address these issues immediately? Why?

CONGRATULATIONS!
You have finished the first lesson of this module; you may now
proceed answering the Activity 3.1 to apply what you have
learned and to develop your ability to think critically.

For Questions, You may send personal message to my


messenger account or send an SMS to my cell phone number.
Thank you!

Unit 3.2: INTELLECTUAL


PROPERTY CODE OF THE PHILIPPINES
Activating your Prior Knowledge:
ABS-CBN vs. Willie Revillame
In the news report released by news.abs-cbn.com (2019), the
Supreme Court upheld the dismissal by the Court of Appeals of
the P127-million copyright infringement case brought by ABS-

Living in IT Era
39
CBN Corporation against television network ABC Development Corporation (formerly TV5,
now The 5 Network) and television host Willie Revillame for allegedly copying Wowowee's
defunct noontime series.

What is your opinion about the case?

Do you think Willie Revillame violates the law?

Does the Supreme Court provide a correct decision in the case?

Expanding your Knowledge!

Republic Act No. 8293


An Act prescribing the Intellectual Property
Code and establishing the Office of Intellectual
Property, providing for its powers and functions,
and for other purposes otherwise known as the
Philippines Intellectual Property Code. Robles
(2020), introduces the Law Overview.

Intellectual property rights under the I. P. Code:


The intellectual property rights under the Intellectual Property Code are as follows:
1. Copyright and related rights;
2. Trademarks and service marks;
3. Geographic indications;
4. Industrial designs;
5. Patents;
6. Layout designs [topographies] of integrated circuits; and
7. Protection of undisclosed information.

Government Agencies:
The agency of the government in charge of the implementation of the Intellectual
Property Code is the Intellectual Property Office which replaced the Bureau of Patents,
Trademarks and Technology Transfer.
Significant features of the law
1. A shift was made from the "first-to-invent system" under R. A. 165 [old law] to "first-to-
file system" under the new law.
2. In the case of inventions, the period of the grant was increased from 17 years from grant
under the old law to 20 years from date of filing under the new law.
3. In the case of utility models, grant was 7 years without renewal
4. In the case of industrial designs, the previous grant of 5 years plus renewals of 5 years
each was maintained.
5. The examination is made only upon request [possibly with or without examination]
6. Publication is affected after 18 months from filing date or priority date

Penalties

Living in IT Era
40
1. Under the present law, the penalties for repetition of infringement range from
PhP100,000 to PhP300,000 and/or 6 months to 3 years of imprisonment and the
offense prescribes in 3 years.
2. Penalties for infringement, unfair competition, false designation of origin and false
description or representation range from fine of PhP50,000 to PhP200,000 and/or 2 to
5 years of imprisonment.

THERE ARE FAKE APPLE STORES IN CHINA


Some of the fake Apple stores are so convincing, that even the employees
thought they were working for Apple.
They are usually selling real Apple products, and the employees even wear
the same shirts that actual Apple associates wear.

-- https://www.thefactsite.com/top-100-technology-facts/

Synthesize
your Knowledge
Now that you have read the module’s content, let us now try to check if you really absorbed
its core ideas. Try to mentally answer the following questions, which will help you assess
your reading progress.
1. Enumerate the intellectual property rights under the law.
2. What government agencies is created to facilitate the implementation of the law?
3. How much is the maximum penalties for infringement?

CONGRATULATIONS!
You have finished the first lesson of this module; you may
now proceed answering the Activity 3.2 to apply what
you have learned and to develop your ability to think
critically.
For Questions, You may send personal message to my
messenger account or send an SMS to my cell phone
number. Thank you!

Unit 3.3: DATA PRIVACY ACT OF 2012


Activating your Prior Knowledge:
TIKTOK DATA PRIVACY ISSUES
According to article published in CNBC.COM (2020), the
Indian government banned Chinese-owned TikTok, along with
dozens of other mobile apps, over alleged data and privacy issues.
Conferring to the report, the Indian Ministry of Information
Technology "has decided to block 59 applications because, in view

Living in IT Era
41
of the information available, they are engaged in activities that undermine the sovereignty
and independence of India, the protection of India, state security and public order."

Are you an avid user of TikTok? Why?

Do you think it is still acceptable to use TikTok considering those privacy issues?

What is your suggestion to improve their services?

Expanding your Knowledge!

DATA PRIVACY ACT OF 2012.


Amihan (2017) provides a guide to Data
Privacy Act for beginners. In 2012, the
Philippine Congress passed Republic Act No
10173, also known as the Data Privacy Act
(DPA) of 2012. Five years on, the DPA's
Implementing Rules and Regulations were put
into force on 9 September 2016, forcing all
businesses to comply.

The act is a necessary and important precaution in a world economy that’s swiftly
going digital. In 2014, it was estimated that 2.5 quintillion — or 2.5 billion billion — bytes of
data were created every day. This includes unprecedented knowledge about what real
individuals are doing, watching, thinking, and feeling.
Companies need to be held accountable not
only for what they're doing with customer data, but
how they're protecting that data from third parties.
The last few years of security breaches, network
glitches and ethical problems inside some of the
major banks in the country have told us that a lot of
work needs to be done

What is RA 10173?
RA 10173, or the Data Privacy Act, protects individuals from unauthorized
processing of personal information that is
1. private, not publicly available; and
2. identifiable, where the identity of the individual is apparent either through direct
attribution or when put together with other available information.

What does this entail?

Living in IT Era
42
1. First, all personal information must be collected for defined, lawful, and that reasons. In
certain terms, consumers must opt in to use their data for such straightforward and
legal purposes.

2. Secondly, sensitive details must be properly managed. Information shall be kept correct
and appropriate, used only for the purposes specified, and held only for as long as
reasonably possible. Customers must be vigilant in ensuring that other, unauthorized
parties do not have access to the information of their customers.

3. Third, personal information must be discarded in a way that does not make it visible
and accessible to unauthorized third parties.

4. Unauthorized collection, improper handling or illegal disposal of personal information


is punishable by up to six ( 6 ) years in prison or up to five million pesos (PHP
5,000,000) depending on the type and severity of the violation.

Who needs to register?

Companies with a minimum of 250 employees or access to personal and identifiable


information of at least 1,000 people are required to register with the National Privacy
Commission and comply with the 2012 Data Privacy Act.

How do I remain in compliance of the Data Privacy Act?


The National Privacy Commission, which was created to enforce RA 10173, will check
whether companies are compliant based on a company having 5 elements:
1. Appointing a Data Protection Officer
2. Conducting a privacy impact assessment
3. Creating a privacy knowledge management program
4. Implementing a privacy and data protection policy
5. Exercising a breach reporting procedure

FINDING A SECURITY BUG IN FACEBOOK’S CODE WILL PAY


OFF.

To be exact, Facebook pays $500 for reporting any vulnerability in their


security.
Even better, $500 is just the minimum that it starts at, so you could
potentially earn more!

-- https://www.thefactsite.com/top-100-technology-facts/

Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. RA 10173 is also known as?
2. Who are covered by the law?
3. What are the penalties for violation of the law?

CONGRATULATIO
You haveLiving in IT
finished theEra
first lesson of th
43
now proceed answering the Activity
you have learned and to develop yo
Activity 3.1
ETHICAL ISSUES

Name: ___________________________________ SCORE:


Course & Section: __________________________
Date: ____________________________________

Multiple Choice: Read and analyze each question. Write the letter of your choice in the
space provided.

a. Personal Privacy b. Access Right c. Harmful Actions


d. Patents e. Copyright f. Trade Secrets

Living in IT Era
44
g. Liability h. Piracy

________1. Accidental disclosure to inappropriate individuals and provisions to protect


the accuracy of data
________2.a very powerful legal tool in protecting computer software, both before a
security breach and surely after a security breach
________3.refers to the damage or negative consequences to the IT such as loss of
important information, loss of property, loss of ownership, destruction of property and
undesirable substantial impacts.
________4. This law protects the private aspects of ideas which is known only to the
discover or his confidants.
________5.Software developer makes promises and assertions to the user about the
nature and quality of the product that can be restricted as an express warranty.
________6.Network on the internet cannot be made secure from unauthorized access.
________7. Obtaining a _____ is very difficult as compared with obtaining a copyright.
________8. It is an activity in which the creation of illegal copy of the software is
made. It is entirely up to the owner of the software as to whether or not users can make
backup copies of their software.

Activity 3.2
INTELLECTUAL PROPERTY LAW

Name: ___________________________________ SCORE:


Course & Section: __________________________
Date: ____________________________________

Multiple Choice: Read and analyze each question. Write the letter of your choice in the
space provided.

______1. What does this symbol mean?


a. means your trademark has been registered
b. means your trademark has not been registered
Living in IT Era
45
c. means your copyright has been registered
d. means your copyright has a creative commons license
______2. What happens after trademarks are registered?
a. No one else can use that trademark for those products.
b. The business makes a lot of money.
c. Other businesses can still use that trademark for their products.
d. The business gets new customers.
______3. What does this symbol indicate?
a. Trademark
b. Copyright
c. Service mark
d. patent
______4. Coca-Cola and Coke are trademarked names for a certain drink made by the
Coca-Cola Company, which means
a. no other business can make a cola drink.
b. no other business can use the name Pepsi.
c. no other business can use the name Coca-Cola or Coke.
d. no other business can use the name Coca-Cola or Coke or any name that is
similar.
______5. What kind of material can be covered on "Copyright"?
a. Books and plays
b. photographs and movies
c. Music and dances
d. All of these can be protected.

Activity 3.3
DATA PRIVACY LAW

Name: ___________________________________ SCORE:


Course & Section: __________________________
Date: ____________________________________

Multiple Choice: Read and analyze each question. Write the letter of your choice in the
space provided.

______1. What is the name of a legal document that explains how a website gathers and
uses your private information?
a. Seal of approval

Living in IT Era
46
b. Checklist
c. Privacy policy
d. None of the above
______2. Which website would best protect your private information?
a. Website A: has a privacy policy, a seal of approval, and the name of a
person your parents can talk to about privacy.
b. Website B; says "safe for kids" on the page where your type in your private
information
c. Website C: has links to other websites for kids
d. None of the above
______3. How do you know when a website you are using has a safe, secured
connection?
a. If it is your friends site then it is safe
b. If the web address looks legitimate
c. A red flashing pop up message appears
d. A lock appears in the top right or bottom right corner of your browser
______4. Oversharing on social media is one of the biggest detrimental concerns to a
teens privacy.
a. True
b. False
c. Sometimes True
d. Sometimes False
______5. Why might a website store cookies on your device?
a. To track your data
b. To make it easier to login
c. To record browsing history
d. All of the these

LIVING IN IT ERA

Learning Module 4
Living in IT Era
47
NETWORK SECURITY

“Technology is best when it brings people


together.”
--Matt Mullenweg

NETWORK SECURITY
Module Overview

In this learning module you will gain understanding


in the basic terminologies used network security. You all be
aware to types of cyber attacks and its possible harm to you
and your computer. Moreover, you will learn the existing
law related to cybercrime such as cybercrime law and anti-
cyber bullying act.

Living in IT Era
48
Learning Outcomes
At the end of this module, you are expected able to:
1. Differentiate between freeware and open source software
2. Define cyberethics, cybersafety and cybersecurity
3. Identify the different kinds of threats to cyber security
4. Identify the different categories of cyber crime

Timeframe: 2-3 weeks


Tips for Studying at Home Effectively
1. Try Active Studying
2. Get A Good Night’s Sleep
3. Study at The Right Time
4. Have A Designated Study Area
5. Eat Properly
6. Get Chores Out of The Way
7. Create A Timetable
8. Use A Timer

Unit 4.1: INTRODUCTION TO NETWORK


SECURITY
Activating your Prior Knowledge:
755,973 FB accounts in PH hacked

According to the National Privacy


Commission (NPC), personal information of over
755,000 Facebook users in the Philippines was
compromised in 2018 making them likely targets
of spam operations and phishing attacks.

User accounts numbered 387,322 based in the Philippines had their basic profile
details compromised, such as full name, email address and phone number.

Living in IT Era
49
Others might have had it worse.
Read more: https://technology.inquirer.net/80437/755973-fb-accounts-in-ph-hacked#ixzz6SDrlgxuV
Follow us: @inquirerdotnet on Twitter | inquirerdotnet on Facebook

What are thoughts about the hacking incident?

Have you personally experienced your social media account being hacked?

What did you do to avoid this?

Expanding your Knowledge!


Cyberspace is a rapidly changing, man-made planet.
It varies from the static physical universe, because it has no
limits, no geographical area, and no gravity, of course. It is
infinite, its shape, attributes and characteristics constantly
change
This complex, infinite, and intangible medium needs
to be controlled to prevent it from bursting. Cyberspace
control implies control of both man and machine. Ethics, law
and health are involved.

In cyberspace we have
1. Cyberethics - Exploring acceptable and ethical practices around digital media and
online environments. It covers plagiarism, bullying and, to name a few, hacking.
2. Cybersafety - Defining how one 's functioning online. This provides guidelines on how
to keep personal information safe and restricted
3. Cybersecurity - Involving activities performed on a device to keep it safe from
individuals attempting to damage it or illegally use the data stored on it. It involves
installing firewalls and tools for the virus.

BASIC TERMINOLOGY
1. Copyright and License
a. Copyright is designed to protect original expression. Once a 'work' is made,
copyright arises. A copyright software protects all source code, written text
content, visual images / designs, illustrations, any associated music, video files or
videos.
b. License is the permission given by a copyright holder to another to use an
original work. It doesn't transfer copyright on.

2. Software Licensing - A license for the software is a legal agreement for an


application. This describes how to use the software, and determines both the
manufacturer and the user's rights.

3. Open Source, Freeware and Shareware


a. Open-source software (OSS) is computer software that is made available with
its source code.
b. Freeware is proprietary software and made available for use, for an unlimited
time, free of charge.

Living in IT Era
50
c. Shareware is copyrighted software which can be shared on a trial basis for a
limited time, with the agreement that if the user wants to use it, he must pay for
it.

4. Cyber Law - Cyber law is a modern field of law, which expands rapidly. This sets
guidelines in cyberspace for agreed human behaviour. Cyber law is based on three basic
building blocks.
a. Netizens who are the inhabitants of the internet and use it as an extension of
their physical world
b. Cyberspace which is a ‘man made machine world’ reshaping itself periodically.
c. Technology

5. Cookies - Cookies allow the website visited to store its own user information on the
computer of the user.

6. Hackers and Crackers


a. Hackers are computer programming skilled people who
use their abilities to obtain unauthorized access to the
data in a network or device.
b. Crackers modify or disable features of a software
application.

7. Firewall - A firewall is a software or hardware device that filters the information that
comes to a network or computer system through an Internet connection.

8. Cyber Ethics - Cyber Ethics applies to the code of ethical online behaviour. Specific
cyber ethics to be successful cyber-citizens must be practiced.

9. Cyber Safety
Theft of identities is an growing and very disturbing problem. The definition is
quite basic, but the mechanism can be complicated, and the effects may be rather
serious for the victim.

a. Some of the most common methods of committing identity theft is through a tactic
called phishing, which is the method of attempting to induce the recipient to supply
personal information that can be used to perform illegal acts.

b. Another terrifying threat to safety is harassment that includes bullying or


threatening conduct that an person regularly engages in.

Cyber-safety examines the ability to act safely and professionally on the Internet
and on other connected networks. These activities shield knowledge of both the personal
and reputational. Which have best practices that minimize risk from behavior-related
issues rather than problems based on hardware / software.

Here are some cyber safety guidelines to follow.


1. Set secure passwords and don’t share them with anyone.
2. Limit the amount of personal information you post.
3. Take advantage of privacy and security settings.
4. Be suspicious of unknown links or requests sent through email or text message.
5. Download only trusted applications from reputable sources or marketplaces.

Living in IT Era
51
10. Cyber Security - The media is paying a lot of attention to unprecedented attacks on
malware, virus, hackers and other phenomena of concern on the Internet. Nevertheless,
amid day-to-day horror stories, many people lack an accurate understanding of the
nature of such dangers.

COMPUTER SECURITY DAY IS CELEBRATED ON NOVEMBER


30TH
It was started in 1988 to help raise the awareness of computer related
security issues.
To celebrate Computer Security Day is easy, and important – check your
privacy settings on Facebook, change your passwords to something
stronger.
Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. Differentiate Cyberethics, Cybersafety and Cybersecurity.
2. What are the building blocks of cyber law?
3. What is the difference between hackers and crackers?

CONGRATULATIONS!
You have finished the first lesson of this module; you may
now proceed answering the Activity 4.1 to apply what
you have learned and to develop your ability to think
critically.
For Questions, You may send personal message to my
messenger account or send an SMS to my cell phone
number. Thank you!

Unit 4.2: MALWARE


Activating your Prior Knowledge:
ILOVEYOU VIRUS
The ILOVEYOU virus arrives in an e-mail
note with "I LOVE YOU" in the subject line and
includes an attachment that results in the
message being sent to everyone in the Microsoft
Outlook address book of the recipient and, even
more seriously, the destruction of any JPEG,
MP3 and all other files on the hard disk of the
recipient.

The originator are Reomel Ramores and Onel de Guzman developed this deadly
virus on May 5, 2000 but were fortunate to avoid prosecution due to lack of laws to arrest
people in Philippines for writing malicious code! The Harm— 50 million reported infections
in 10 days.

Living in IT Era
52
Have you already experienced your files being corrupted?

How can you avoid virus or malware in your smartphone or computer?

It is okay let those people to create virus? Why?

Expanding your Knowledge!


CYBER ATTACKS
Malware, software with a sneaky purpose, such as virus
attacks, worms, adware, Trojan horses, and spyware. This is the
most common threat to a device. Later in the lesson the malware
is explored in depth.

Security breaches that attempt to gain unauthorized


access to the system, including cracking passwords, changing
privileges, breaking servers. In other words, the hacking of a computer or a computer
network.

Denial of service (DoS) attacks intended to prevent a system from getting valid
access.

Web attacks that attempts to breach a website. Two of the most common such
attacks are SQL injection and cross-site scripting.

Session hijacking, where an attacker attempts to take over a session.

DNSpoisoning, which seeks to compromise a DNS server so that users can


be redirected to unsafe websites.

MALWARE
Malware is used to interrupt the functioning of computers, collect confidential
information or access private computer systems.
1. Viruses - A computer virus is a self-replicating system. To help it spread from one
device to another, a device virus binds itself to a program or file.

2. Worms - A worm is analogous to a virus, and is known as a virus subclass. Worms


damage the infected network, while viruses corrupt or change files on a targeted
computer

3. Adware - Adware refers to computer


software, which is typically offered free of
charge but often includes ads.

4. Trojan horses - A Trojan horse is a program


that seems simple and harmless but does have a
function that is destructive.

Living in IT Era
53
5. Spyware - Spyware is simply software that literally spies on what is being done on a
computer.

The DOs and DONTs of network security


1. Pay close attention to website URLs.
2. Keep operating system, browser, anti-virus and other critical software up to date.
3. Turn off the option to automatically download attachments from your emails
4. Save and scan any attachments before opening them.
a. Be sure your anti-virus software is up to date.
b. Save the file to your computer or a disk.
c. Run an anti-virus scan using your computer’s software.

OVER 6,000 NEW COMPUTER VIRUSES ARE CREATED AND


RELEASED EVERY MONTH
This number has drastically risen since 1990, at which point there were only
50 known computer viruses.
Today, 90% of emails contain some form of malware and most people don’t
know about it.

Synthesize your -- https://www.thefactsite.com/top-100-technology-facts/

Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. Identity the categories of cyber-attacks.
2. What categories of software that has a mischievous purpose such as virus attacks,
worms, adware, Trojan horses, and spyware?
3. It refers to a cookie used by a website to record a few brief facts about a visit to
that website, or spyware could be of a more dangerous

CONGRATULATIONS!
You have finished the first lesson of this module; you may
now proceed answering the Activity 1.1 to apply what you
have learned and to develop your ability to think critically.

For Questions, You may send personal message to my


messenger account or send an SMS to my cell phone number.
Thank you!

Living in IT Era
54
Unit 4.3: CYBERCRIME PREVENTION ACT
OF 2012
Activating your Prior Knowledge:
87% of Filipino Internet users have been
victims of cybercrimes–DOJ
In a news article of inquirer.net, the
primer cited a 2010 survey from security
software company Symantec in the Philippines
that as many as 87 percent of Filipino internet
users (nearly 9 out of 10) were classified as
victims of cyber crimes and malicious activity.
These included being victimized in
activities such as malware (virus and Trojan) invasion; online or phishing scams; sexual
predation; and services in social networking site like Facebook and Twitter.

Read more: https://technology.inquirer.net/21557/87-of-filipino-internet-users-have-been-victims-of-cybercrimes-doj#ixzz6SEE5ryjG

Follow us: @inquirerdotnet on Twitter | inquirerdotnet on Facebook

Are you also a victim of cybercrime in the past? How?


Do you think we have enough law to protect us from cybercrime?

Living in IT Era
55
Expanding your Knowledge!
REPUBLIC ACT NO. 10175
A law is created to prevent cybercrime. It
was entitled “Cybercrime Prevention Act of 2012”
The policy stated that law would punish
any type of medium that is misused, exploited or
illegally accessed. This also says the state should
use domestic & foreign forms to avoid these
offenses.

PUNISHABLE ACTS
A. Offenses against the confidentiality, integrity and availability of computer
data and systems

1. Illegal Access – The access to the whole or any part of a computer system without
right.

2. Illegal Interception. – The interception made by technical means without right of


any non-public transmission of computer data to, from, or within a computer system
including electromagnetic emissions from a computer system carrying such
computer data.

3. Data Interference. — The intentional or reckless alteration, damaging, deletion or


deterioration of computer data, electronic document, or electronic data message,
without right, including the introduction or transmission of viruses.

4. System Interference. — The intentional alteration or reckless hindering or


interference with the functioning of a computer or computer network by inputting,
transmitting, damaging, deleting, deteriorating, altering or suppressing computer
data or program, electronic document, or electronic data message, without right or
authority, including the introduction or transmission of viruses.

5. Misuse of Devices - Unauthorized use of computer password, access code, or


similar data by which the whole or any part of a computer system is capable of being
accessed with intent that it be used for the purpose of committing any of the offenses
under Republic Act 10175.

6. Cyber-squatting - Acquisition of domain name over the Internet in bad faith to


profit, mislead, destroy reputation, and deprive others from the registering the same.
This includes those existing trademarks at the time of registration; names of persons
other than the registrant; and acquired with intellectual property interests in it.

B. Computer-related Offenses
1. Computer-related Forgery - Unauthorized input, alteration, or deletion of
computer data resulting to inauthentic data with the intent that it be considered or

Living in IT Era
56
acted upon for legal purposes as if it were authentic, regardless whether or not the
data is directly readable and intelligible.

2. Computer-related Fraud - Unauthorized input, alteration, or deletion of


computer data or program or interference in the functioning of a computer system,
causing damage thereby with fraudulent intent.

3. Computer-related Identity Theft - Unauthorized acquisition, use, misuse,


transfer, possession, alteration or deletion of identifying information belonging to
another, whether natural or juridical.

C. Content-related Offenses:
1. Cybersex - Willful engagement, maintenance, control, or operation, directly or
indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the
aid of a computer system, for favor or consideration.

2. Child Pornography - Unlawful or prohibited acts defined and punishable by


Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed
through a computer system.

3. Libel -The unlawful or prohibited acts of libel as defined in Article 355 of the
Revised Penal Code, as amended, committed through a computer system or any
other similar means which may be devised in the future.

4. Other Offenses - Aiding or Abetting in the Commission of Cybercrime. – Any


person who willfully abets or aids in the commission of any of the offenses
enumerated in this Act shall be held liable.

PENALTIES
1. Prision mayor (imprisonment of six years and 1 day up to 12 years) or a
fine of at least Two hundred thousand pesos (P200,000) up to a maximum
amount commensurate to the damage incurred or BOTH.

2. If committed against critical infrastructure: Reclusion temporal


(imprisonment for twelve years and one day up to twenty years) or a fine of at
least Five hundred thousand pesos (P500,000) up to a maximum amount
commensurate to the damage incurred or BOTH

SOME PEOPLE ARE AFRAID OF TECHNOLOGY


Aptly named technophobia, this fear stemmed from the Industrial
Revolution and workers being afraid that machines would take their jobs.
It applies in a similar way to today’s society, as well as people being scared
of technology getting too advanced, such as artificial intelligence
technology.

-- https://www.thefactsite.com/top-100-technology-facts/

Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. RA 10175 is also known as?

Living in IT Era
57
2. Identify the punishable acts under Content-related Offenses.
3. What are possible penalties of violating this law?

CONGRATULATIONS!
You have finished the first lesson of this module; you may
now proceed answering the Activity 4.2 to apply what you
have learned and to develop your ability to think critically.

For Questions, You may send personal message to my


messenger account or send an SMS to my cell phone number.
Thank you!

Unit 4.4: ANTI-BULLYING ACT OF 2013


Activating your Prior Knowledge:
Online bullying remains
prevalent in the Philippines, other
countries
In the Philippines, latest national data
show that cyberviolence affects almost half of
children aged 13-17. The prevalence of
cyberviolence for males (44 per cent) is almost
the same for females (43 per cent).

One-third of Filipino children's cyber-violence is in the form of verbal harassment


over the internet or mobile phone, while a fourth is through sexual messages. More females
had received sexual or material messages than males. However, twice as many males as
females reported having their nude body or sexual acts exposed on the internet or
smartphone, whether true or falsified.
www.unicef.org/philippines/press-releases/online-bullying-remains-prevalent-philippines-other-countries

Did you also experience cyber bullying?

What did you do to overcome your situation?

What can you advice to the victims of cyber bullying?

Living in IT Era
58
Expanding your Knowledge!
ANTI-BULLYING ACT OF 2013

REPUBLIC ACT NO. 10627


An Act requiring all primary and secondary
schools to enact policies to avoid and deal with
bullying actions in their institutions
SEC. 2. Acts of Bullying. The law define
bullying to any severe or repeated use by one or
more students of a written, verbal or electronic
expression, or a physical act or gesture, or any
combination thereof, directed at another student that has the effect of actually
causing or placing the latter in reasonable fear of physical or emotional harm or
damage to his property; creating a hostile environment at school for the other
student; infringing on the rights of the other student at school; or materially and
substantially disrupting the education process or the orderly operation of a school;
such as, but not limited to, the following:
(a) Any unwanted physical contact between the bully and the victim like
punching, pushing, shoving, kicking, slapping, tickling, headlocks, inflicting
school pranks, teasing, fighting and the use of available objects as weapons;
(b) Any act that causes damage to a victim’s psyche and/or emotional well-
being;
(c) Any slanderous statement or accusation that causes the victim undue
emotional distress like directing foul language or profanity at the target,
name-calling, tormenting and commenting negatively on victim’s looks,
clothes and body; and
(d) Cyber-bullying or any bullying done through the use of
technology or any electronic means.
SEC. 3. Adoption of Anti-Bullying Policies. – All elementary and secondary
schools are hereby directed to adopt policies to address the existence of bullying in
their respective institutions. Such policies shall be regularly updated and, at a
minimum, shall include provisions which:
(a) Prohibit the following acts:
(1) Bullying on school grounds
(2) Bullying at a location, activity, function or program that is not school-
related and through the use of technology or an electronic device that is
not owned, leased or used by a school if the act or acts in question create a
hostile environment at school for the victim, infringe on the rights of the
victim at school, or materially and substantially disrupt the education process
or the orderly operation of a school; and
(3) Retaliation against a person who reports bullying
(b) Identify the range of disciplinary administrative actions that may be taken
against a perpetrator for bullying or retaliation which shall be commensurate with
the nature and gravity of the offense
(c) Establish clear procedures and strategies

Living in IT Era
59
(d) Enable students to anonymously report bullying or retaliation: Provided,
however, That no disciplinary administrative action shall be taken against a
perpetrator solely on the basis of an anonymous report;
(e) Subject a student who knowingly makes a false accusation of bullying to
disciplinary administrative action;
(f) Educate students on the dynamics of bullying, the anti-bullying policies of the
school as well as the mechanisms of such school for the anonymous reporting of acts
of bullying or retaliation;
(g) Educate parents and guardians about the dynamics of bullying, the anti-bullying
policies of the school and how parents and guardians can provide support and
reinforce such policies at home; and
(h) Maintain a public record of relevant information and statistics on acts of bullying
or retaliation in school:
SEC. 4. Mechanisms to Address Bullying. – The school principal or any person
who holds a comparable role shall be responsible for the implementation and
oversight of policies intended to address bullying.
If it is determined that bullying or retaliation has occurred, the school principal or
the designated school officer or person shall:
(a) Notify the law enforcement agency if the school principal or designee believes
that criminal charges under the Revised Penal Code may be pursued against the
perpetrator;
(b) Take appropriate disciplinary administrative action;
(c) Notify the parents or guardians of the perpetrator; and
(d) Notify the parents or guardians of the victim regarding the action taken to
prevent any further acts of bullying or retaliation.

KIDS THAT ARE ON SOCIAL MEDIA FOR 1 HOUR A DAY HAVE


LESS CHANCE OF BEING HAPPY
This is probably not much of a surprise, but studies have shown that the
more time kids spend on social media, the less likely they are to be happy
with their overall life by 14%

-- https://www.thefactsite.com/top-100-technology-facts/

Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. RA 10627 is also known as?
2. It refers to any bullying done through the use of technology.
3. What are the acts of cyber bullying?

CONGRATULATIONS! Living in IT Era


60
You have finished the first lesson of this module; you may now
proceed answering the Activity 4.3 to apply what you have
Activity 4.1
INTRODUCTION TO NETWORK SECURITY

Name: ___________________________________ SCORE:


Course & Section: __________________________
Date: ____________________________________

A. Categorize the following under Cyber ethics/ Cyber safety / Cyber security.
________1. Do not share your password
________2. Do not use foul language.
________3. Immediately report any suspect data or security breaches to your supervisor
and/or authorities.
________4. Install firewalls and antivirus softwares
________5. Do not copy information from the Internet and claim it as yours (plagiarism).
________6. Be wary of strangers and cautious of potentially misleading or false
information.
________7. Manage your computer settings to allow only data that comes from a known
or safe place
________8. Do not download copyrighted materials.
________9. Download only trusted applications from reputable sources or marketplaces
________10. Restrict access and make personal information secure to prevent
identity theft.
B. Answer the following questions:
11. What is the difference between Shareware and Freeware softwares?

Living in IT Era
61
12. Write a short note on your understanding of hacking.

Activity 4.2
MALWARE

Name: ___________________________________ SCORE:


Course & Section: __________________________
Date: ____________________________________

Multiple Choice: Read and analyze each question. Write the letter of your choice in the
space provided.

________1. How does a computer virus infect a pc?


a. Email attachments
b. Attached to files on memory sticks
c. Suspicious web links
d. All of the above
________2.What can a virus do to your computer?
a. Delete files
b. Cause inappropriate adverts to appear
c. Spy on what you are doing
d. Steal your information
________3.How does a worm infect a computer?
a. E-mail attachments
b. Through security loopholes, your computer is not up to date
c. Suspicious web links
d. On memory sticks
________4.How is adware malicious?
a. Deletes files.
b. Inappropriate and wastes your time/
c. Slows your pc down.
d. Spies on you, collecting your information
________5.How can a trojan infect your pc?

Living in IT Era
62
a. On memory sticks.
b. Through email attachments.
c. By being disguised as legitimate software.
d. Dodgy web links

Activity 4.3
CYBER CRIME LAW

Name: ___________________________________ SCORE:


Course & Section: __________________________
Date: ____________________________________

1. Create your original infographics about Cyber Crime Prevention Act of 2012.
A. Overview of the Law
B. Punishable acts (Choose the top/common)
C. Penalties
Note: Use CANVA (Mobile Application) or other software for your infographics.
Otherwise, draw an illustration/drawing in the space provided if no internet
connection.

Living in IT Era
63
LIVING IN IT ERA

Learning Module 5

IT TRENDS, ISSUES, AND


CHALLENGES

Living in IT Era
64
“Technology is best when it brings people
together.”
--Matt Mullenweg

IT TRENDS, ISSUES, AND CHALLENGES


Module Overview

This is the final part of the course or module, but it will


definitely be fruitful and informative. In this module you will
gain insight to different existing trends, issues and
challenges in information technology related to various
aspect of our everyday living.

Learning Outcomes
At the end of this module, you are expected able to:
1. Identify the key issues in information technology
2. Determine ways digitized output can be manipulated to fool people
3. Enumerate some key threats to computers
4. Analyze how information technology create environmental, mental-health,
pornography, and workplace problems
5. Breakdown how may technology affect employment and the gap between rich and
poor

Timeframe: 2-3 weeks


Tips for Studying at Home Effectively
1. Try Active Studying
2. Get A Good Night’s Sleep
3. Study at The Right Time

Living in IT Era
65
4. Have A Designated Study Area
5. Eat Properly
6. Get Chores Out of The Way
7. Create A Timetable
8. Use A Timer

Unit 5.1: TRUTH and SECURITY ISSUES


Activating your Prior Knowledge:
MOCHA USON APPEARS BEFORE NBI TO FACE
‘FAKE NEWS’ COMPLAINT
The complaint against Uson for which she was
summoned by the NBI is related to her Facebook post in
April with photos of personal protective equipment (PPE)
that the government supposedly purchased. Social media
users, however, pointed out that her post included photos
from a private foundation.
Uson said the use of the photo was an “honest mistake.”

Read more: https://newsinfo.inquirer.net/1276781/mocha-uson-appears-before-nbi-to-face-fake-news-complaint#ixzz6SJlpCwUQ

Follow us: @inquirerdotnet on Twitter | inquirerdotnet on Facebook

Do think social media users should be more responsible?


What can you advice to the people or pages sharing unverified information?
In your opinion, should the government take action to the spread of fake news?

Expanding your Knowledge!

TRUTH ISSUES

MANIPULATING DIGITAL DATA


The ability to control digitized output — images
and sounds — have brought to art a magnificent

Living in IT Era
66
new device. It has, however, generated some major new reputation issues ,
particularly for journalism. How do we know that the truth is what we see or hear?
Consider the matter below.

1. Manipulation of Sound - Pop music vocals have been sounding "tone- and
pitch-perfect" in recent times and even some hip-hop singers have reached their
notes with excessive accuracy, one writer points out. How ca you do this? By
means of a technology called Auto-Tune that "can take a vocal and immediately
nudge it to the appropriate note or shift it to the right pitch. It can transform
wavering performance into something technically flawless.” Unfortunately, when
most songs seem to have perfect pitch, they are harder to differentiate from one
another, leading to bland sameness.

2. Manipulation of Photos - John Knoll,


founder of the image-editing software known
as Photoshop in 1989, later said, "Mostly we
saw the possibilities, the fun stuff, not how
they can be misused." But Photoshop and similar applications designed to
manipulate ("morph") digital images can also be used to distort and falsify them.

3. Manipulation of Video & Television - Films and videotapes are widely


thought to accurately represent real scenes. Thus, the possibility of digital
alterations raises some real problems. Videotapes supposed to represent actual
events could easily be doctored.

4. Accuracy & Completeness - Databases—including online encyclopedias such


as Wikipedia—can provide you with more facts and faster facts but not always
better facts. Penny Williams, professor of broadcast journalism at Buffalo State
College in New York and formerly a television anchor and reporter, suggests five
limitations to bear in mind when using databases for research

SECURITY ISSUES:
Threats to Computer & Communications Systems
Internet users clearly do not have "street smarts" about online security, one survey
found, and that makes them vulnerable and another study indicated that while users
assume they can identify when they are being exploited, either legally or illegally, they are
in fact very naïve.
1. Errors & Accidents - In general, errors and accidents in computer systems
may be classified as human errors, procedural errors, software errors, “dirty
data” problems, and electromechanical problems.

2. Natural Hazards - Many accidents are not merely causing temporary system
downtime; they can destroy the entire network. Natural hazards are some
examples. Mobile phones, automatic teller machines, credit card verifiers and
bank computers are useless without power and communications links.

3. Computer Crimes - There can be two forms of computer crime. (1) This may be
an unlawful act committed against computers or telecommunications or (2) it
may be the use of computers or telecommunications to carry out an unlawful act.

Living in IT Era
67
4. Computer Criminals - there’s almost no telling where the next threat to
computer security will come from. In the previous chapters, we considered
threats in the form of hackers, crackers, and cyberterrorists.

THE THREE MOST COMMON PASSWORDS ARE ALSO THE


WEAKEST
The top three most used passwords are 123456, password, and 12345.
Definitely don’t use any of those next time you need a password change!

-- https://www.thefactsite.com/top-100-technology-facts/

Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. What are data that can be manipulated online?
2. Enumerate possible threats to computer and communication.
3. Does “fake news” is punishable by law?

CONGRATULATIONS!
You have finished the first lesson of this module; you may
now proceed answering the Activity 5.1 to apply what you
have learned and to develop your ability to think critically.
For Questions, You may send personal message to my
messenger account or send an SMS to my cell phone
number. Thank you!

Living in IT Era
68
Unit 5.2: QUALITY-OF-LIFE, ECONOMIC &
POLITICAL ISSUES
Activating your Prior Knowledge:
THE NEGATIVE ASPECTS OF SOCIAL MEDIA
Meanwhile it's a relatively new technology, little
research is available to determine the long-term
consequences, whether good or bad, of using social media.
Multiple studies, however, found a strong connection
between heavy social media and an increased risk of
depression, anxiety , loneliness, self-harm and even suicidal
thoughts (Robinson & Smith 2020).

Upon using social media, do you also experience stress?

What are the things that made feel stress in using social media?

Overall, does social media good or bad?

Expanding your Knowledge!

QUALITY-OF-LIFE ISSUES:

The Environment, Mental Health, Child


Protection, & the Workplace
We addressed some of the alarming
effects of technology on intellectual property
rights, honesty in art and media, censorship
problems , health concerns and ergonomics, and
privacy and protection in this chapter and earlier
ones. In the following we briefly discuss several
other problems related to information technology
in the quality of life.

Living in IT Era
69
1. Environmental Problems - Numerous other environmental challenges
remain—for example, manufacturing and usage by-products, disposal by-
products, environmental pollution, and possible risks of nanotechnology.

2. Mental-Health Problems

A. ISOLATION - Automation enables us to


go for days without ever talking to or
touching another human, from gas
transactions to games play. A couple of
years ago, a Stanford University study
conducted by Norman H. Nie of the
Stanford Institute for the Society's
Quantitative Research found that as people
spent more time online, they had less time for real-life family
relationships.

B. GAMBLING - Gambling is already widespread, but information


technology makes it almost unavoidable.

C. STRESS – Several studies found PCs stressful: Fifty-nine percent


admitted getting angry at their PCs within the previous year, and 41% said
they thought computers had reduced job opportunities rather than
increased them. The survey showed that workers reported "abusive and
aggressive behavior" against computers by 83 per cent of corporate
network administrators — including smashing controls, throwing mice,
and kicking system units.

3. Protecting Children: Pornography, Sexual Predators, & Online Bullies


A. PORNOGRAPHY- One of the biggest cultural developments of the last
quarter-century in the United States has been the widespread
dissemination of sexually explicit content, rendering adult entertainment
or pornography a $12 billion annual industry.

B. ONLINE SEXUAL PREDATORS - A 2005 survey of 1,501 daily


internet users aged 10–17 showed one in five children experiencing sexual
harassment over a two-year period. 139 Girls were the primary priority
and received two thirds of the requests. Furthermore, it has been found
that, given the public belief, child molesters usually are not targeting
young children who are searching for victims online. According to a survey
of 129 alleged molesters, the majority of victims are girls 13–15 who
voluntarily meet with their abusers and typically agree to have sex.

C. CYBERBULLIES - As yet another illustration


of how digital technology can adversely impact
children's social lives, there have been several
cases of so-called cyberbullying in which
children aged 9–18 use the internet to unleash
merciless taunting, malicious rumors,
degrading images, and other put-downs of
fellow adolescents who have fallen into
disadvantage.
Living in IT Era
70
ECONOMIC & POLITICAL ISSUES:
EMPLOYMENT & THE HAVES/HAVE-NOTS

Technology, the Job Killer?


Probably, ATMs are replacing bank tellers, E-Z pass electronic systems are
replacing turnpike toll takers and Internet travel agents are luring consumers away
from local travel agencies. Thousands of businesses substitute voice-software for
service representatives. 177 Machines produce stuff in the so-called lights-out
factories — for example, the tiny cutting tools that you see mounted on dental-floss
containers — even when no one is there; as much as possible is achieved without
labor. 178 Technological advancements lead gradually to economic growth, but their
contribution to social development is not solely optimistic.

Gap between Rich & Poor


Paul Krugman argues that living through one of those tough periods when
technology does not produce widely shared economic benefits but instead deepen the
divide between those with the right skills and those who do not.
Digital divide exist! In college, says one report, “some minority students are still
puttering along in the breakdown lane of the information superhighway.” 186
Although computer hardware is getting cheaper, high-speed internet connections
can be prohibitively expensive for poor and working-class families.

Whom Does the Internet Serve?


Perhaps the internet just does not particularly serve someone because of its
unruly nature — and that's both its blessing and its curse. For example , business
executives find the public internet so unstable that they have moved their most
important applications to semiprivate networks like intranets and extranets.
To several authoritarian governments such as the U.S.—China, Saudi Arabia, Iran,
Singapore, United Arab Emirates, Bahrain, to instance—that seek to regulate their
citizens' Internet access, the net poses threats to their authority.
In a World of Breakneck Change, Can You Still Thrive?
“The most surprising thing that could happen in the future,” writes futurist
Edward Cornish, “is if it offered no surprises, especially since the future has
surprised us so often in the past.”

40% OF AMERICAN COUPLES MEET ONLINE


Online dating is hugely popular these days, and apparently it seems to work!
40% of couples who got together in 2017 met online

-- https://www.thefactsite.com/top-100-technology-facts/

Synthesize your
Knowledge
Now that you have read the module’s content, let us now try to check if you really
absorbed its core ideas. Try to mentally answer the following questions, which will help you
assess your reading progress.
1. What possible mental health problems of using technology?
2. Enumerate threat that may harm children in using internet?

Living in IT Era
71
3. What is digital divide?

CONGRATULATIONS!
You have finished the first lesson of this module; you may now
proceed answering the Activity 5.2 to apply what you have
learned and to develop your ability to think critically.

For Questions, You may send personal message to my


messenger account or send an SMS to my cell phone number.
Thank you!

Activity 5.1
TRUTH AND SECURITY ISSUES

Name: ___________________________________ SCORE:


Course & Section: __________________________
Date: ____________________________________

A. Identification. Write your answer in the space provided.

________1. It is incomplete, outdated, or otherwise inaccurate data.


________2. Photoshop and similar programs designed to edit digital images can
also be used to distort and falsify.
________3. The possibility of digital alterations raises such as videotapes supposed
to represent actual events could easily be doctored.
________4. Auto-Tune is used to what type of manipulation?
________5. Who is the creator of photo shop?

B. Essay. How can you ensure that information is accurate and complete? What are things
you can advise to avoid fake news.

Living in IT Era
72
Activity 5.2
QUALITY-OF-LIFE, ECONOMIC & POLITICAL ISSUES

Name: ___________________________________ SCORE:


Course & Section: __________________________
Date: ____________________________________

1. Share you experience how internet or social media cause stress and isolation. What are
things you do to avoid this?

2. How can we address or provide solution to digital divide?

Living in IT Era
73
REFERENCES
Ambersariya, D. (2019). Types of Internet Connections- Wireless, Dial-up, DSL, Fiber,
Cable, ISDN. https://inventionsky.com/types-of-internet-connections/
Amihan (2017). he Beginner’s Guide to RA 10173 (Data Privacy Act of 2012).
https://amihan.net/2017/07/10/beginners_guide_to_ra_10173/
Avendaño, C. (2013). 87% of Filipino Internet users have been victims of cybercrimes–DOJ.
https://technology.inquirer.net/21557/87-of-filipino-internet-users-have-been-
victims-of-cybercrimes-doj#ixzz6SKHAxQRa
Barraclough, D. (2020). What are the different types of websites?
https://www.expertmarket.co.uk/web-design/different-types-of-websites
Bursztynsky, J. (2020). India bans TikTok and dozens of other Chinese apps over security
concerns. https://www.cnbc.com/
Canivel, RS (2018). 755,973 FB accounts in PH hacked.
https://technology.inquirer.net/80437/755973-fb-accounts-in-ph-hacked
Central Board of Secondary Education (2014). Information and Computer Technology. The
Secretary, Central Board of Secondary Education Shiksha Kendra 2, Community
Centre Preet Vihar, Delhi-110 092
Gonzales, C. (2020). Mocha Uson appears before NBI to face ‘fake news’ complaint.
https://newsinfo.inquirer.net/1276781/mocha-uson-appears-before-nbi-to-face-
fake-news-complaint#ixzz6SKHhh9d3
https://pixabay.com/service/license/
https://www.bitmoji.com/
Miranda, M. (2019). Data protection issues and lessons in 2019.
https://www.gmanetwork.com/news/opinion/content/720258/data-protection-
issues-and-lessons-in-2019/story/
Navallo, M. (2019). SC affirms dismissal of ABS-CBN’s P127-M copyright infringement case
vs. Willie Revillame, ABC-5. SC affirms dismissal of ABS-CBN’s P127-M copyright
infringement case vs. Willie Revillame, ABC-5
Official Gazette (2013). Republic Act No. 10627.
https://www.officialgazette.gov.ph/2013/09/12/republic-act-no-10627/
Robinson, L. & Smith, M. (2020). Social Media and Mental Health.
https://www.helpguide.org/articles/mental-health/social-media-and-mental-
health.htm
Robles, C. (2020). Intellectual Property Code Of The Philippines - An Overview.
https://www.chanrobles.com/legal7code.htm#.Xt2lhzozbIV
Sharama, A. (nd). Ethical Issues in Information Technology (IT).
https://www.geeksforgeeks.org/ethical-issues-in-information-technology-it/

Living in IT Era
74
Shea, V. (1994). Core rules of netiquette. Netiquette (Online ed., pp. 32-45). San Francisco:
Albion Books. https://coursedesign.colostate.edu/obj/corerulesnet.html
Unicef.Org. Online bullying remains prevalent in the Philippines, other countries. Online
bullying remains prevalent in the Philippines, other countries
Vindollo, S. & Buendia, MM (2016). Educational Technology 2. Adriana Publishing Co., Inc.
Williams, B. K. & Sawyer, S. C. (2011). Using information technology: A Practical
Introduction to Computers & Communications. Published by McGraw-Hill, a
business unit of The McGraw-Hill Companies, Inc., 1221. ISBN 978-0-07-351677-6

Living in IT Era
75

You might also like