Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

MIL REVIEWER o Shows some part of the

subject in more detail while


Media and Information Language
still giving on impression of
 Media Language the whole subject.
o Codes, conventions, formats,  Medium Close-up (MCU)
symbols and narrative structures o Half way between mid shot
that indicate the meaning of and close up.
media messages to an audience.  Close Up (CU)
 Codes o A certain feature or part of
o Systems of signs that when put the subject takes up the
together create meaning. whole frame.
o Semiotics- study of signs  Extreme Close Up (ECU)
o TYPES OF CODES o The ECU gets right in the
 Symbolic Codes- shat is and shows extreme detail.
beneath the surface of what we  ADVANCE CAMERA SHOT
see (objects, setting, body  Cut-in
language, clothing, color, etc.)  Show some part of the
or ironic symbols that are easily subject in detail.
understood.  Cut away
 Examples are  A shot of something other
 red-stop than the subject
 green-go  Two Shot
 A shot of two people, framed
 yellow-slow down
similarly to a mid shot.
 Written codes- Use of language
 Over-the-shoulder
style and textual layouts
 Looking from a person at the
(headlines, captions, speech
subject.
bubbles, language styles, etc.)
 Noddy Shot
 Technical Codes- are ways in
 Usually refers to a shot of
which equipment is used to tell
the interviewer listening and
the story.
reacting to the subject
 Sounds, camera
 Point-of-View
angles and types
 Looking/shows a view of
of shots and
from the subject’s
lighting and
perspective.
camera technique.
 Weather Shot
 BASIC CAMERA SHOT
 The subject is the weather
 Extreme Wide Shot (EWS)
can be used other purposes.
o View far from the object that
 CAMERA ANGLES
he isn’t even visible often
 Bird’s Eye View
used as an establishing shot.
o This show a scene from
 Very Wide Shot (VWS)
directly overhead, a very
o The subject is visible
unnatural and strange angle.
(barely), but the emphasis is
 High Angle
still on placing him in his
o The Camera is elevated
environment.
above the action using a
 Wide Shot (WS)
crane to give a general view.
o The subject takes up the full
 Eye Level
frame or at least as much as
o A fairy neutral shot
comfortably possible.
 Mid Shot (MS)
o The camera is positioned as
much through it is a human Legal, Ethical, and Societal Issues in
actually observing a scene. Media and Information
 Low Level
o This increase height and  Republic Act No. 10175 (Cybercrime
gives a sense of speed of Prevention Act of 2012)
confusion.  Is a law in the Philippines approved
 Warm’s-eye View on September 12, 2012
o A view of an object from  Aims to address legal issues
below as though the concerning online interaction and
observer were a worm. Internet.
 Dutch/conted Angle  Cybercrime offenses:
o Sometimes the camera is o Cybersquatting
tilted to suggest imbalance, o Cybersex
transition and instability. o Child Pornography
 CAMERA MOVEMENTS o Identity Theft
 Pan Shot o Illegal Access to data
o Moving the camera lens to o Libel
one side or another. Look to  Cyber- relating to, or involving
your left, then look to your computer networks (such as the
right. Internet)
 Tilt  Cyberspace- refers to the virtual
o Moving the camera lens up computer world, and more specifically, is
or down while keeping its an electronic medium used to form a
horizontal axis constant. Nod global computer network to facilitate
your head up and down- this online communication.
is tilting  Cybercrime- refers to the criminal
 Truck activities carried out by means of
o Tracking is like dolling, but it computers or the internet.
involves motion left or right,  Cyberbullying- the use of electronic
truck left mean “move the communication to bully a person,
camera physically to the left typically by sending messages of an
while maintaining its intimidating and threatening nature.
perpendicular relationship.”  Hacking- refers to the practice of
 Zoom modifying or altering computer software
o Involves changing the focal and hardware to accomplish a that is
length of the lens to make considered to be outside of the creator’s
the subject appear closer or original objective
further away in the frame.  Hackers- individuals who engage
 Dolly in computer hacking activities.
o This is a motion towards or  Phishing- is the attempt to obtain
motion from the name come sensitive information such as
from the old “dolly tracks” usernames, passwords, and credit card
that used to be laid down for details (indirectly, money), often for
the heavy camera to move malicious reasons, by disguising as a
along. trustworthy entity in an electronic
 communication.
 Pedestal  Illegal Downloading- refers to
o Moving the camera up or obtaining files that you do not have the
down without changing its right to use from the internet.
vertical and horizontal axis.
 Digital Piracy- the practice of illegally
copying and selling digital music, video,
o Types of Plagiarism
computer software, etc.
1. SOURCE NOT CITED
 Identity Theft- Is the deliberate use of
a. The Ghost Writer- the writer
someone else’s identity, usually as a
turn in another’s work, word-
method to gain a financial advantage or
by-word, as his or her own
obtain credit and other benefits in the
b. The Photocopy- the writer
other person’s name, and perhaps to the
copies significant portion s of
other people’s disadvantage or loss.
text straight from single
 Cyber Defamation- is an unprivileged
source, without alteration
false statement of fact which trends to
c. The Potlack Paper-The writer
harm the reputation of a person or
copies several different
company.
sources, tweaking the
 TWO TYPES OF CYBER
sentences to make them fit
DEFAMTION
together while retaining
o Libel- Written
most of the original phrasing.
o Slander- Verbal d. The Poor Disguise- The writer
Child Pornography has altered the paper’s
appearance slightly by
 Cybersex- also called computer sex, changing key words and
internet sex, netsex. phrasing.
1. Is a virtual sex encounter in e. The Labor of Lazier- the
which two or more people writer takes the time to
(connected remotely via paraphrase most of the
internet) send each other paper from other sources
sexually explicit contents or and make it all fit together.
sexually explicit Act. f. The Self-stealer- the writer
 Child Pornography- is a form of child borrows generously from his
sex exploitation. or her previous work.
 Cybersquatting- is registering, 2. SOURCES CITED
trafficking in, or using an internet a. Forgotten Footnote- the
domain name with bad faith intent to writer mentions an author’s
profit from the goodwill of trademark name for a source, but
belonging to someone else. neglects to include specific
 Copyright- a legal device that gives the information on the location
creator of a literary, artistic, musical, or of the materials referred.
other creative work the sole right to b. Misinformer- the writer
publish and sell that work. provides inaccurate
o Violation of a copyright is called information regarding the
infringement sources, making it
 Plagiarism- an act or instance of using impossible to find them.
or closely imitating the language and c. To perfect Paraphrase- the
thoughts of another author without writer properly cites a
authorization; the representation of the source, but neglects to put in
author’s work as one’s own, as by not quotation marks on text that
crediting the original author. has been copied.
d. Resourceful Cites- The writer
properly cite all resources,
paraphrasing and using
quotations properly and
appropriately. The catch?
The paper contains no
original work.
e. The Perfect Crime- the writer
properly quotes and cite
sources in some places but
goes on to paraphrase other
arguments from the source
without citation.
 Fair Use- is a legal concept that allows
the reproduction of copyrighted material
for certain purposes without obtaining
permission and without paying.
 Computer Addiction- the excessive
use of computers to the extent that is
interferences with daily life.
 Digital Divide- An economic inequality
between groups in term of access to use
or, or knowledge of ICT.
 Virtual Self- the persona you create
about yourself virtually.
 Netiquette- the correct or acceptable
way of communicating on the internet.

You might also like