Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Republic of the Philippines

Pangasinan State University


BAYAMBANG CAMPUS
Bayambang, Pangasinan
Website: www.psu.edu.ph
Telephone: (075) 206-0802 Telefax: (075) 542-4261/4057

NAME OF STUDENT: DEVINE GRACE C. GABAT COURSE: BEE-EGE 2 - 1

DATE OF SUBMISSION: OCTOBER 4, 2020 SCORE:

ACTIVITIES IN MODULE 2
ICT POLICIES AND ISSUES: IMPLICATIONS TO TEACHING AND
LEARNING

ACTIVITY 2.1: SUMMARIZING AN ARTICLE

Assume yourself as an investigator who would like to inform your learners and co-teachers about
the current issues on technology. Search the web and find out articles or cases about

A. Freedom of Expression and Censorship

B. Privacy and Security

C. Surveillance and Data Retention

D. Pollutants from E-Waste

Choose only two articles or cases that you will work on. Prepare a summary of your research
using the format below:
Article 1 Article 2

Title: Electronic Waste: A Growing Concern in Title: Internet Privacy and Security: A Shared
Today’s Environment Responsibility

Author/s: M. Khurrum S. Bhutta,  Adnan Omar Author/s: David Gorodyansky


and Xiaozhe Yang

What the article was about: What the article was about:

It’s all about the electrical and electronic equipment It’s all about on how we protect our own privacy in
(EEE) that growth increasingly day by day it says the internet. Our responsibility to protect ourselves
possible problem if people were not act because of E- from growing threats to our online privacy and
Waste. Hence, it calls for us to show mercy and freedom. This article warned us on how to be
empathy to our mother earth. Most importantly, the
wise in a particle situation that cause us harm
article contains the major or possible problems if we
didn’t act and not well-establish on how to dispose the or threats in our lives.
E-Waste. It shows and categorizes also the estimation
technique to calculate the growth of e-Waste.

What the study found: What the study found:

In many cases, the cost of recycling e-Waste exceeds The threat from hackers and cybercriminals has
the revenue recovered from materials especially in expanded in relation to our dependence on the
countries with strict environment regulations. Internet. As our reliance grows, opportunities for
Therefore, e-Waste mostly ends up dumped in them to prey on us increase. Online data breaches are
countries where environmental standards are low or not new. They have been around since the creation of
non-existent and working conditions are poor.  the first networks, but there is a risk that they could
reach epidemic proportions cyber fraud is currently
Most developing countries lack the waste removal
the fastest growing category of crime in the U.S. and
infrastructure and technical capacities necessary to
eventually erode our freedom to use the Internet as
ensure the safe disposal of hazardous waste. And e-
we desire.
Waste has been linked to a variety of health problems
Now the battle has shifted to the cloud, and we have
in these countries, including cancer, neurological and to start walling off our digital communications, much
respiratory disorders, and birth defects. From another of which are now mobile. The more people that
perspective, some regulations, which have been inoculate themselves from malware, spear phishing
established to handle e-Waste, are often limited since attacks or hacker intrusions, the safer we all are.
they exclude many hazardous substances that are
used in electronics. Moreover, many regulations
simply fail to address the management of e-Waste.

Your opinion of the study: Your opinion of the study:

Based on the study it’s important to not disregard the About what the study want to say or imply I agree if
safety of people just to save money. I agree that if we we limit to give our privacy such as in social media
have a safe standard for this E-waste such as for example or in any other sites or applications that
recycling materials we will benefit a lot at the same required our personal information. We don’t know
what the risk comes our way so one of the safeties
time we help the Mother Earth to avoid hazardous
ways is to protect ourselves from any dangerous or
substances that cause by E-waste in our environment. suspicious site that can destroy our image.

Summary: Summary:

Recycling has environmental benefits at every stage We need to voice out our opinions about the safety
in the life cycle of a computer product from the raw of our privacy and security. Equally important is for
material from which it is made to its final method of everyone to adjust their online habits to help prevent
disposal. Aside from reducing greenhouse gas privacy risks and security breaches. Choosing more
emissions, which contribute to global warming, careful passwords, limiting where, when and with
whom you share sensitive data, and using a VPN to
recycling also reduces air and water pollution encrypt your data every time you go online are
associated with making new products from raw simple steps everyone can take for the safety of
materials. By utilizing used, unwanted, or obsolete individual.
materials as industrial feedstock or for new materials
or products, we can do our part to make recycling It is our responsibility to protect ourselves from the
Internet community and for tomorrow’s users.
work.

Reference: (URL) Reference: (URL)

https://www.hindawi.com/journals/ecri/2011/474230 https://www.wired.com/insights/2013/10/internet-
/ privacy-and-security-a-shared-responsibility/
ACTIVITY 2.2: ONLINE INTERVIEW

Interview the following persons

1 ICT manager

1 student

1 teacher

Ask the following questions for each:

1. Do you have an ICT facility in the school?

2. What composes this facility?

3. Who can use the facility?

4. What are policy guidelines and rules in the use of the facility?

5. What are the safety rules that need to be followed by any user?

Record all the information, separate the answers of the interviewees and encode their answers in
this Activity Sheet. Provide documentation/ evidences of the Interview.

ICT MANAGER: MS. EVELYN JIMENEZ

1. Do you have an ICT facility in the school?

Answer: Yes, we have an ICT facility in Sanlibo National High School.

2. What composes this facility?

Answer: ICT facility comprises of Smart TV, Projector, Computer sets, and Printer.
3. Who can use the facility?

Answer: Everyone in school has an opportunity to use the ICT facility, most specially the
teaching and non-teaching staff, and the students.

4. What are policy guidelines and rules in the use of the facility?

Answer: Every ICT facility has policy guidelines and rules that must be followed and some of it
are posted inside the room. In Sanlibo NHS, in order for you to use the ICT facility, 1st rule is to
wear shoe rag; you cannot enter unless you are wearing shoe rag. And the rest are the common
and basic policy guidelines like- Always do proper shutdown when using computer, food and
drinks are prohibited while using ICT facility, Do not change the wall paper of the computer,
ICT facility can only be used for teaching-learning process, and most important is for you to
leave the ICT facility in proper order.(Clean As You Go).We have to take good care of all the
facilities not only the ICT because it was given to us by the government.

5. What are the safety rules that need to be followed by any user?

Answer: The safety rules that must be followed by any user are: a. Always check first the plug
before using it, make sure there is no open wire to avoid grounding. b. When using computers,
avoid leaving your document open to avoid stealing by the next user

TEACHER: MRS. LORNA DEL ROSARIO

1. Do you have an ICT facility in the school?

Answer: Yes

2. What composes this facility?

Answer: PCs, Projector, Television and Wi-Fi


3. Who can use the facility?

Answer: Students and Faculty

4. What are policy guidelines and rules in the use of the facility?

Answer: For educational purpose only

5. What are the safety rules that need to be followed by any user?

Answer: No food, drinks, cigarettes allowed.

STUDENT: JUSTINE TAN

1. Do you have an ICT facility in the school?

Answer: Yes

2. What composes this facility?

Answer: Composes of science labs, art room, books and uniform store, and the school library.

3. Who can use the facility?

Answer: The only people who can use school computer equipment are staff, current learners of
the school and other people whom the principal or board can use the equipment.

4. What are policy guidelines and rules in the use of the facility?
Answer: The use of ICT facilities such as computers and network by students and staff is
regulated by rules and behaviour based on the principle that the ICT facilities are used in
professional and responsible, ethical, reasonable and careful way.

These are the following guidelines and rules:

1. The use of computers and network is intended for study or work.

2. Access codes are personal; lending is forbidden.

3. Prevent the spreading of computer viruses.

4. Do not circulate defamatory or offensive material.

5. Not play internet games or install games.

6. Report any issues/problems to ICT staff (such as computer damage, inappropriate internet
sites and things not working).

5. What are the safety rules that need to be followed by any user?

Answer: Keep personal information limited; make sure your internet connection is secure. Use a
secure VPN connection, be careful what you download, make online purchases from secure sites,
be careful what you post, keep your antivirus program up to date.

You might also like