Download as pdf or txt
Download as pdf or txt
You are on page 1of 268

IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.

#34 Lark St., Sta. Elena, Marikina City


A

COMPILATION OF REPORTS IN SOCIAL AND


PROFESSIONAL ISSUES I
(DIT – 124)

SUBMITTED BY:
DIT – S2C2

SUBMITTED TO:
Mrs. Araceli L. Jabal, M.A. Ed.

FOR THE SCHOOL YEAR:


2021 – 2022
i
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Preface

To briefly introduce, this paper involves all the compilation of


reports of section DIT – S2C2 on the subject of Social and Professional
Issues I, subject code of DIT – 124.

The reports conducted by the students of DIT are topics under


the subject of Social and Professional Issues I, which were assigned
by Mrs. Araceli L. Jabal; these topics were reported online using
Google Meet and with the use of Microsoft PowerPoint, and then
transferred on Microsoft Word for the sake of the compilation.

This compilation is done to bind all the reports split amongst the
students via chronological order, by topic, and by lesson. Some reports
may have medias inserted within their reports, such as diagrams,
photos and charts that help support the main idea of their topic.

Each end of the report has the reporters’ printed name and their
signature to certify that they are the ones that have reported the
material, with this, the bundle of reports is proven as credible and
trustworthy.
ii
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Acknowledgement

The completion of this compilation of the reports conducted by


the students of DIT – S2C2 were done and would not have been
possible without the contribution and the cooperation of the students
who have given their report for the sake of the compilation.

The contributions of the said students are deeply appreciated


and are deeply valued and greatly acknowledged as if it is a group
compilation of reports. But the students would like to express their
gratitude to the following:

Mrs. Araceli L. Jabal, for making this compilation of reports


possible, we thank you for your endless support in giving our reports
and listening to our reports that we have done and delivered with the
use of Google Meet.

And to all the students who have done their effort in submitting
their final copy of their reports for the compilation, the valiant efforts
are deeply appreciated.

Above all, to the Great Almighty, the author of knowledge and


wisdom, for his countless love.

We thank you.
iii
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Table of Contents

Preface ....................................................................................................... i

Acknowledgement ..................................................................................... ii

Table of Contents ................................................................................ iii - iv

The Global and Digital Environment ……………………………............. 1 - 6

Digital Divide ……………………........................................................... 7 - 12

Information System Trends ……………............................................. 13 - 45

Emerging and Converging Information Communication …………..... 46 - 85

The Rise of Robotics …………......................................................... 86 - 116

Miniaturized and Multifunctional Machines .................................... 117 - 122

ICT Enabled Industry ..................................................................... 123 - 129

Intelligence Gathering & Information Warfare ................................ 130 - 141

E-Health & Virtual Therapy ............................................................ 142 - 151

Mobile-based Service Industries ................................................... 152 - 163

E-Service & E-Government ........................................................... 164 - 174

Internet and Censorships .............................................................. 175 - 188

Sex and Technology ...................................................................... 189 - 216

Virtual Prostitution ......................................................................... 217 - 222

Technology and Privacy ................................................................ 223 - 231

Online Crimes ................................................................................ 232 - 244


iv
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Table of Contents

Electronics Lifestyle ....................................................................... 245 - 257

E-Learning ..................................................................................... 258 - 263


1
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

The Global and Digital


Environment
(Bermejo, Roen A. &
Buenamente, Michael C.)
2
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

The Global and Digital Environment

- A digital environment is an integrated communications environment where

digital devices communicate and manage the content and activities within

it. The concept is based on digital electronics systems which are integrated

and implemented for a global community.

Digital Influence

- Digital technologies have advanced more rapidly than any innovation in

our history – reaching around 50 per cent of the developing world's

population in only two decades and transforming societies. By enhancing

connectivity, financial inclusion, access to trade and public services,

technology can be a great equalizer.

Philippines on Digital Community

- Backed by strong government support, the Philippines' digital sector

contributes significantly to its economy today. In 2020, the Internet economy

in the Philippines was estimated to be worth USD7. 5 billion and is expected

to grow by 30 percent annually to reach USD28 billion by 2025.


3
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Newspaper vs Digital News in the Philippines

- USE OF NEWSPAPERS ON THE PHILIPPINES: 28% of all Filipinos

reads newspaper on a daily basis

- DIGITAL NEWS: social media as a source of news have risen to 72%

Facebook Users Around the World

- With around 2.9 billion monthly active users, Facebook is the most popular

social media worldwide. With an audience of this scale, it is no surprise that

the vast majority of Facebook's revenue is generated through advertising.

Twitter Users Around the World

- Twitter has some 330 million monthly active users (MAU) based on its last

reported data that leveraged this metric in the 1st quarter of 2019. As of

2020, Twitter's monetizable daily active users (mDAU) stands at 166 million,

which represents a 24% growth from 2019.


4
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

ISSUES WITHIN DIGITAL ENVIRONMENT

Authentication Information

- Authentication is the act of proving an assertion, such as the identity of a

computer system user. In contrast with identification, the act of indicating a

person or thing's identity, authentication is the process of verifying that

identity.

Cyberbullying

- Cyberbullying is the use of cell phones, instant messaging, e-mail, chat

rooms or social networking sites such as Facebook and Twitter to harass,

threaten or intimidate someone. Cyberbullying is often done by children,

who have increasingly early access to these technologies.

QUIZ

1.Act of proving assertion such as identity of computer user.

A. Cyber Bullying

B. Identity Theft

C. Authentication Information

D. Network
5
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

2. Is the use of cell phones, instant messaging, e-mail, chat rooms or social

networking sites such as Facebook and Twitter to harass, threaten or

intimidate someone.

A. Digital Issue

B. Social Media Issue

C. Cyber Bullying

D. Authentication

3. Integrated communication environment where digital devices

communicate and manage the content and activities within it.

A. User

B. Networks

C. Digital Environment

D. Authentication Information

4-5. Choose 2 out of 4 things to enhance to make technology great

equalizer (2 points)

6-7. Percentage of newspapers user in the Philippines and Social Media

News users

8-9. Backed by strong government support, the ___________________

contributes significantly to its economy today.


6
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

10. Advanced more rapidly than any innovation in our history – reaching

around 50 per cent of the developing world's population in only two decades

and transforming societies.

A. Digital Environment

B. Digital Influence

C. Digital Issues

D. Digital News

ESSAY: What can you do to help about Cyberbullying and how can you

protect your devices from malicious threats.

References:

https://www.sciencedirect.com

https://www.igi-global.com

Bermejo, Roen C. Buenamente, Michael A.

Reporter Reporter
7
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Digital Divide
(Delos Santos, Nicah P.)
8
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Digital Divide

- It refers to the gap between those who benefit from the digital age and

those who don't, and those that don't have restricted access. This

technology can include the telephone, television, personal computers, and

internet connectivity.

4 Perspectives to Analyze Digital Divide


9
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

ASPECTS OF DIGITAL DIVIDE

Infrastructure

- The infrastructure by which individuals, households, businesses, and

communities are connected to the internet.

Skills and Digital Literacy

- Research shows that the digital divide is more than just an access issue

and cannot be alleviated merely by providing the necessary equipment.

There are at least three factors at play: information accessibility, information

utilization, and information receptiveness.

Location

- Internet connectivity can be at a variety of locations such as homes,

offices, schools, libraries, public spaces, internet cafes and others. There

are also varying connections in rural, suburban, and urban areas.


10
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Application

- Common Sense Media, a non-profit organization that reviews and

provides ratings from media and technology with the goal of providing

information on their suitability for children. It also funds research on the role

of media in the lives of children and advocates publicly for children’s friendly

policies and laws regarding media.

QUIZ

1. Why does the digital divide exist?

A. God made it that way.

B. Poverty and the economic barriers that limit resources and prevent

people from obtaining an otherwise using technology.

C. People don't strive for success.

D. Because of lack of physical access to technology.

2. The gap between those who benefit from the digital age and those who

don’t

A. Digital issue

B. Digital environment

C. Digital Divide

D. System trends
11
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

3. Aspect that connects the individuals, households, businesses and

communities to the internet.

A. Skills

B. Infrastructure

C. Wi-Fi

D. Internet

4. Homes, offices, schools, libraries and a variety of…

A. Places

B. Location

C. Areas

D. Maps

5. Literacy that shows that the digital divide is more than just an access

issue and cannot be alleviated merely by providing the necessary

equipment.

A. Media literacy

B. World literacy

C. Philippine literacy

D. Skills and Digital Literacy


12
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

6. A non-profit organization that reviews and provides ratings from media

and technology

A. Application B. Social Media

C. Networks D. Accounts

7. This technology can include the telephone, television, personal computer

and internet connectivity

A. Internet B. Digital Divide

C. Account D. User

8-12. Common Types of technology

13-20. 4 types of perspectives to analyze the digital divide. Give one

example of each perspective.

Essay 5pts.

1. Does the digital divide matter? Why?

2. How does the digital divide affect you?

References:

Module in Social and Professional Issues I

Delos Santos, Nicah P.

Reporter
13
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Information System
Trends
(Dequiros, Miguel T.)
14
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Information System Trends

- Information systems have evolved at a rapid pace ever since their

introduction in the 1950s. Today devices you can hold in one hand are more

powerful than the computers used to land a man on the moon in 1969. The

Internet has made the entire world accessible to you, allowing you to

communicate and collaborate like never before. This will examine current

trends and look ahead to what is coming next.

Global
15
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- The first trend to note is the continuing expansion of globalization. The use

of the Internet is growing all over the world, and with it the use of digital

devices. Penetration rates, the percent of the population using the Internet,

remains high in the developed world, but other continents are gaining.

- With a current worldwide estimated population of 7.9 billion, approximately

5.25 billion people have access to and use the internet. That means that

66.2% of the world's population uses the internet. In 2022, Asia will continue

to account for the majority of internet users. 2,790,150,527 people in Asia

are online, which makes up 53.1% of the global internet population.


16
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Personal

- Ever since the advent of Web 2.0 and e-commerce, users of information

systems have expected to be able to modify their experiences to meet their

personal tastes. From custom backgrounds on computer desktops to

unique ringtones on mobile phones, makers of digital devices provide the

ability to personalize how we use them. More recently, companies such as

Netflix have begun assisting their users with personalization by viewing

suggestions. In the future, we will begin seeing devices perfectly matched

to our personal preferences, based upon information collected about us.


17
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Mobile

- Perhaps the most impactful trend in digital technologies in the last decade

has been the advent of mobile technologies. Beginning with the simple

cellphone in the 1990s and evolving into the smartphones of today, the

growth of mobile has been overwhelming. Here are some key indicators:

1.) Mobile vs. Desktop - Minutes spent each day on a mobile device are

2.5 times the number of minutes spent on a desktop computer.

- The biggest factor driving mobile’s dominance globally is the affordability

of mobile devices and smartphones. Lower-income individuals can often

afford a basic smartphone and mobile internet access, but can’t necessarily

afford a desktop or laptop computer. Home internet, or Wi-Fi, is another


18
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

factor. In the developed world, we may think of “the internet” as having an

internet-connected device hooked up to a Wi-Fi network.

2.) Daytime vs. Evening - Desktop use dominates in the daytime hours,

but mobile devices are dominant in the evening, with peak usage around

8:00 pm.

3.) Device usage - Smartphones are used more than any other technology.

Laptops are in second place, followed by tablets holding a slight edge over

desktops.

Types of Internet Usage on Desktop and Mobile Devices

Search Engine Activity - Approximately 58% of all search engine activity

on Google originates from mobile searches, compared to around 40% on

desktop. Desktop search activity also differs from mobile searches in a

number of ways. For instance, the volume of local search queries (such as

“restaurants near me”) has declined among desktop users but continues to

rise exponentially for those searching on mobile phones.


19
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Social Media Usage - Approximately 83% of all social media visits are from

mobile devices, compared to around 15% on desktops or laptop computers.

In fact, roughly half of social media users only use mobile devices to access

their social network of choice. This can largely be attributed to the popularity

of social media apps on smartphones, and increased smartphone use in

general.

Web Browsing - When it comes to browsing the web (outside of specific

mobile apps), desktop remains dominant. While mobile visits made up 58%

of US searches, they only accounted for approximately 42% of total time

spent online. In other words, more individual searches are made on mobile,

but more time is spent browsing the web on desktops.

Gaming - Online gaming remains exceedingly popular on both desktop PC

and mobile devices. Statistics are difficult to measure across so many

different platforms and categories, but we can gain some insight from the

data available. In terms of spending, approximately 25% of gaming

revenues come from PC gamers, compared to 28% from gaming consoles

and 47% from mobile gaming. Part of this disconnect can be explained by

the prohibitive costs of desktop devices capable of gaming, compared to

the relatively low cost of mobile gaming devices and smartphones.


20
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

4.) Smartphone sales decline - According to Gartner Group, worldwide

smartphone sales declined in the fourth quarter of 2017 by 4.7% compared

with the fourth quarter of 2016. This is the first decline in global smartphone

sales since Gartner began tracking mobile phone sales in 2004.

- US smartphone sales were down 6% YoY in Q1 2022, according to

Counterpoint Research’s latest data from its US Monthly Smartphone

Channel Share Tracker. Premium device sales slowed after the holiday

quarter, continued supply constraints affected both 5G and LTE devices,

and tax season sales were weaker as Q1 2021 saw an added stimulus

money boost.
21
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- According to Research Analyst Matthew Orf said, “Apple and Samsung

continued to dominate the market with a combined 75% share and had

some of their best performances to date. However, some attention should

also be brought to smaller OEMs that are beginning to capture more

mindshare of consumers due to LG’s exit. Motorola has been very

aggressive, becoming the third largest OEM in 2021. In Q1 2022, its market

share reached 12%, the highest quarterly share to date. Motorola is

refreshing its G series with new 5G devices in Q2, the Moto G Stylus 5G

2022 and Moto G 5G, which will help the OEM increase its 5G sales in 2022.

TCL also made big gains in market share to reach almost 3%. While known

for its TVs, TCL has been putting in extra marketing efforts to win mindshare

in prepaid channels. It won several SKUs at Metro by T-Mobile, with the

TCL 20 XE and TCL 30 XE 5G helping it gain market share. OnePlus did

grow in share YoY, but the OEM had a slow quarter overall as the increased

low-end competition resulted in contracted sales. The launch of the

OnePlus 10 Pro has been relatively weak, but the OEM hopes to recapture

some share with the new N20 5G that will launch in early Q2.”
22
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

5.) The rise and fall of tablets - In 2012 the iPad sold more than three

times as many units in its first twelve months as the iPhone did in its first

twelve months.

- According to market research firm IDC, 2021 will see the highest annual

year-over-year growth for the next five years for computing devices

worldwide. Traditional PCs (notebooks, desktops and workstations) will

grow 14.2% in 2021 to 347 million units. (That's down from a previous

forecast of 18%.) Tablets will grow just 3.4%. After 2021, tablets will enter

a period of decline, with the steepest decline expected in 2022 and more

modest decline through 2025. Desktops will also enter a period of decline

starting in 2021 and continuing through 2025. Compound annual growth

(CAGR) for tablets from 2021 to 2025 is expected to be –1.5%. For


23
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

traditional PCs, including desktops, notebooks and workstations, CAGR will

be 3.4%.

Wearable

- Wearables have been around for a long time, with technologies such as

hearing aids and, later, Bluetooth earpieces. The average smartphone user

looks at his or her smartphone 150 times a day for functions such as

messaging (23 times), phone calls (22), listening to music (13), and social

media (9). Many of these functions would be much better served if the

technology was worn on, or even physically integrated into, our bodies. This

technology is known as a “wearable.” According to the Gartner Group in

2007, the strong growth predicted by 2021. Total wearable devices are

projected to increase by about 45% from 2018 to 2021.


24
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Collaborative

- As more people use smartphones and wearables, it will be simpler than

ever to share data with each other for mutual benefit. Some of this sharing

can be done passively, such as reporting your location in order to update

traffic statistics. Other data can be reported actively, such as adding your

rating of a restaurant to a review site.

Examples of Applications

Apple Maps is a web mapping service developed by Apple Inc. The default

map system of iOS, iPadOS, macOS, and watchOS, it provides directions

and estimated times of arrival for driving, walking, cycling, and public

transportation navigation.
25
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Google Maps is a location search tool that allows you to geolocate a

specific point, calculate routes, find the nearest places of interest or see the

appearance of a place at street level through Google Street View.

Waze is a community-based tool that keeps track of the route you are

traveling and how fast you are making your way to your destination. In return

for providing your data, you can benefit from the data being sent from all of

the other users of the app. Waze directs you around traffic and accidents

based upon real-time reports from other users.


26
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Printable

- One of the most amazing innovations to be developed recently is the 3-D

printer. A 3-D printer allows you to print virtually any 3-D object based on a

model of that object designed on a computer. 3-D printers work by creating

layer upon layer of the model using malleable materials, such as different

types of glass, metals, or even wax. 3-D printing is quite useful for

prototyping the designs of products to determine their feasibility and

marketability. 3-D printing has also been used to create working prosthetic

legs and an ear that can hear beyond the range of normal hearing. Here is

the example of 3-D printer:

Original Prusa Mini

Best Budget 3D Printer

$399.00
27
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Here are more amazing productions from 3D printers.

Buildings - Researchers at MIT in 2017 unveiled a 3D printing robot that

can construct a building. It has a large arm and a small arm. The large arm

moves around the perimeter of the building while the small arm sprays a

variety of materials including concrete and insulation. Total time to construct

a dome-shaped building is just 14 hours.


28
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Musical Instruments - Flutes, fiddles, and acoustic guitars are being

produced with 3D printing using both metal and plastic. You can click here

for an example of making a violin.

Medical Models - Medical models are being used to help doctors train in

the areas of orthopedics, transplant surgery, and oncology. Using a 3D

printed brain model similar to the one shown here, surgeons were able to

save a patient from a cerebral aneurysm.


29
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Clothing - Special software is used to measure a person, then 3D printing

produces the clothing to the exact measurements. The result is well-fitting

clothes that consume less raw materials. Initially the challenge was to find

materials that would not break. You can read more about 3D printing of

clothes and shoes.

Findable

Examples are Lights can be turned on or off remotely and Thermostats can

be reset with anyone being present. Think of IoT as devices that you

wouldn’t normally consider being connected to the Internet. And, the

connection is independent of human intervention. So, a PC is not an IoT,

but a fitness band could be. One keyword for IoT would be “independent”,

not relying directly or constantly on human action.

Benefits from IoTs are virtually everywhere. Here is a quick list.

1. Optimization of Processes - IoTs in manufacturing monitor a variety of

conditions that impact production including temperature, humidity,

barometric pressure – all factors which require adjustment in application of

manufacturing formulas.
30
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

2. Component Monitoring - IoTs are added to components in the

manufacturing process, then monitored to see how each component is

performing.

3. Home Security Systems - IoTs make the challenge of monitoring activity

inside and outside your home easier.

4. Smart Thermostats - Remote control of home thermostats through the

use of IoTs allows the homeowner to be more efficient in consumption of

utilities.

5. Residential Lighting - IoTs provide remote control of lighting, both

interior and exterior, and at any time of day.

Autonomous

- Another trend that is emerging is an extension of the Internet of Things:

autonomous robots and vehicles. By combining software, sensors, and

location technologies, devices that can operate themselves to perform

specific functions are being developed.

Form of creations such as:


31
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

1. Nanobots

- A nanobot is a robot whose components are on the scale of about a

nanometer, which is one-billionth of a meter. While still an emerging field, it

is showing promise for applications in the medical field. For example, a set

of nanobots could be introduced into the human body to combat cancer or

a specific disease. are tiny biological machines that can deliver drugs to the

target destination to make them more efficacious and reduce side effects,

which are the biggest challenges of drug delivery.

2. Self-Driving Cars
32
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- An autonomous car is a vehicle capable of sensing its environment and

operating without human involvement. A human passenger is not required

to take control of the vehicle at any time, nor is a human passenger required

to be present in the vehicle at all.

3. Unmanned Aerial Vehicle (UAV)

- A UAV, often referred to as a “drone,” is a small airplane or helicopter that

can fly without a pilot. Instead of a pilot, they are either run autonomously

by computers in the vehicle or operated by a person using a remote control.

While most drones today are used for military or civil applications, there is

a growing market for personal drones.


33
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Secure

- As digital technologies drive relentlessly forward, so does the demand for

increased security. The CIA triad is a common model that forms the basis

for the development of security systems. They are used for finding

vulnerabilities and methods for creating solutions.

CIA TRIAD - The confidentiality, integrity, and availability of information is

crucial to the operation of a business, and the CIA triad segments these

three ideas into separate focal points. This differentiation is helpful because

it helps guide security teams as they pinpoint the different ways in which

they can address each concern. Ideally, when all three standards have been

met, the security profile of the organization is stronger and better equipped

to handle threat incidents.


34
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Confidentiality - Another term for confidentiality would be privacy.

Company policies should restrict access to the information to authorized

personnel and ensure that only those authorized individuals view this data.

The data may be divided into sections according to the security or sensitivity

level of the information. For example, a Java program developer should not

have access to the personal information of all employees. Methods to

ensure confidentiality include data encryption, username ID and password,

two factor authentication, and minimizing exposure of sensitive information.

Integrity - Integrity is accuracy, consistency, and trustworthiness of the data

during its entire life cycle. Data must be unaltered during transit and not

changed by unauthorized entities. File permissions and user access control

can prevent unauthorized access. Version control (responsible for

managing changes to computer programs, documents, large web sites, or

other collections of information.) can be used to prevent accidental changes

by authorized users. Backups must be available to restore any corrupted

data.

Availability - Maintaining equipment, performing hardware repairs, keeping

operating systems and software up to date, and creating backups ensure


35
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

the availability of the network and data to the authorized users. Plans should

be in place to recover quickly from natural or man-made disasters. Security

equipment or software, such as firewalls, guard against downtime due to

attacks such as denial of service (DoS). Denial of service occurs when an

attacker attempts to overwhelm resources so the services are not available

to the users.

- In a nutshell, Confidentiality ensures the privacy of data by restricting

access through authentication encryption. Integrity assures that the

information is accurate and trustworthy. Availability ensures that the

information is accessible to authorized people.


36
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Tools for Information Security

1. Authentication - is the process of recognizing a user's identity. In doing

this, authentication assures secure systems, secure processes and

enterprise information security. Authentication is the first line of defense. It

is the process of determining whether a user is who they say they are.

Types of Authentications

A. Single Factor Authentication - Historically the most common form of

authentication, Single-Factor Authentication, is also the least secure, as it

only requires one factor to gain full system access. It could be a username

and password, pin-number or another simple code. While user-friendly,

Single-Factor authentication systems are relatively easy to infiltrate by

phishing, key logging, or mere guessing. As there is no other authentication

gate to get through, this approach is highly vulnerable to attack.

B. Two Factor Authentication - By adding a second factor for verification,

two-factor authentication reinforces security efforts. It is an added layer that

essentially double-checks that a user is. With this method, users enter their

primary authentication credentials (like the username/password mentioned

above) and then must input a secondary piece of identifying information.

Possible secondary factors are a one-time password from an authenticator


37
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

app, a phone number, or device that can receive a push notification or SMS

code, or a biometric like fingerprint (Touch ID) or facial (Face ID) or voice

recognition.

C. Single Sign On - With SSO, users only have to log in to one application

and, in doing so, gain access to many other applications. This method is

more convenient for users, as it removes the obligation to retain multiple

sets of credentials and creates a more seamless experience during

operative sessions.

2. Access Control - Access control is a security technique that regulates

who or what can view or use resources in a computing environment. It is

the selective restriction of access to a place or other resource. It is used to

regulate who is able (or not able) to view, access, or use specific resources

and/or information.

Types of Access Control

A. Physical Access Control - are a type of physical security designed to

restrict or allow access to a certain area or building. These are installed in

order to protect businesses and property from vandalism, theft, and

trespassing, and are especially useful in facilities that require higher levels
38
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

of security and protection.

B. Logical Access Control - is defined as restricting virtual access to data;

it consists of identification, authentication, and authorization protocols

utilized worldwide. In the digital world of today, organizations must be

vigilant in protecting their data, assets, and infrastructure.

3. Password Security - Passwords provide the first line of defense against

unauthorized access to your computer and personal information. The

stronger your password, the more protected your computer will be from

hackers and malicious software. You should maintain strong passwords for

all accounts on your computer.

Common Policies Should Use

A. Require complex password – a password should not be simple, or a

word that can be found in a dictionary.

B. Change password regularly – passwords may not be reused.

C. Train employees not to give away passwords – Employees may be

tricked easily if they do not properly know about cybersecurity.


39
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

4. Encryption - is the process of encoding information. This process

converts the original representation of the information, known as plaintext,

into an alternative form known as cipher text.

Two Types of Encryptions

A. Symmetric Encryption - in symmetric

encryption the same key is used for encryption

and decryption. It is therefore critical that a

secure method is considered to transfer the

key between sender and recipient.

B. Asymmetric Encryption - symmetric

encryption uses the notion of a key pair:

a different key is used for the encryption

and decryption process. One of the keys

is typically known as the private key and

the other is known as the public key.


40
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

QUIZ

1. In global, do the devices today are more powerful than the computers

from the past? Why?

a. Yes, because of the rapid pace of the information system.

b. No, because there are advantages and disadvantages between the two

devices.

c. Maybe, because today’s devices that you’re holding can do the same

thing as the computer from the past.

d. None of the above

2. Asia continues to account for the majority of internet users.

2,790,150,527 people in Asia are online. On what percent of the global

internet population?

a. 50.8%

b. 87.5 %

c. 53.1 %

d. 67.9%

3. Why are mobile devices dominant globally?

a. Because of the unavailability of devices such as smartphone.

b. Because lower income individuals can afford basic smartphone and

mobile internet.
41
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

c. Because of its popularity year by year.

d. Because it is for the rich people only.

4. What approximately percent of all search engine activity on Google

originates from mobile searches?

a. 90%

b. 86%

c. 75%

d. 58%

5. What do you think roughly half of social media users only use mobile

devices to access their social network of choice?

a. The popularity of social media apps in mobile devices

b. It’s very pleasant to see in a small amount of screen

c. People tend to use smartphones because they’re very cheap.

d. Just because they want it to show what they want to share online.

6. US smartphone sales were down 6% YoY in Q1 2022 according to who?

a. US Monthly Smartphone

b. Counterpoint Research

c. The internet

d. Me
42
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

7. What does the average smartphone user look at his or her smartphone

per day?

a. 120 times

b. 50 times

c. 89 times

d. 150 times

8. What is the best description for Apple Maps?

a. Web mapping service developed by Apple Inc.

b. A location search tool that allows you to geolocate a specific point,

calculate routes, find the nearest places of interest

c. A community-based tool that keeps track of the route you are traveling

and how fast you are making your way to your destination.

d. A map service that is needed by most of us.

9. What is the best description for Google Maps?

a. Web mapping service developed by Apple Inc.

b. A location search tool that allows you to geolocate a specific point,

calculate routes, find the nearest places of interest

c. A community-based tool that keeps track of the route you are traveling

and how fast you are making your way to your destination.

d. A map service that is needed by most of us.


43
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

10. What is the best description for Waze?

a. Web mapping service developed by Apple Inc.

b. A location search tool that allows you to geolocate a specific point,

calculate routes, find the nearest places of interest

c. A community-based tool that keeps track of the route you are traveling

and how fast you are making your way to your destination.

d. A map service that is needed by most of us.

11. The differentiation of the CIA triad is very helpful because?

a. It is a guide for security teams as they pinpoint the different ways in which

they can address each concern.

b. It is crucial to the operation of a business, and the CIA triad segments

these three ideas into separate focal points.

c. The data may be divided into sections according to the security or

sensitivity level of the information.

d. All of the above.

12 - 13 Choose the best explanation to Confidentiality, Integrity, Availability

a. In a nutshell, Confidentiality ensures the privacy of data by restricting

access through authentication encryption. Integrity assures that the


44
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

information is accurate and trustworthy. Availability ensures that the

information is accessible to authorized people.

b. In a nutshell, Availability ensures the privacy of data by restricting access

through authentication encryption. Confidentiality assures that the

information is accurate and trustworthy. Integrity ensures that the

information is accessible to authorized people.

c. In a nutshell, Integrity ensures the privacy of data by restricting access

through authentication encryption. Availability assures that the information

is accurate and trustworthy. Confidentiality ensures that the information is

accessible to authorized people.

ESSAY 5 points (Minimum sentences: 3)

Give at least 2 benefits why the CIA triad is very helpful.

References:

https://www.broadbandsearch.net/blog/internet-statistics

https://www.highspeedinternet.net/desktop-and-mobile-internet-usage-

statistics/

https://www.counterpointresearch.com/us-smartphone-sales-decline-6-

yoy-q1-2022-pandemic-demand-cools/
45
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

https://opentextbook.site/informationsystems2019/chapter/chapter-13-

future-trends-in-information-systems-information-systems-

introduction/#footnote-41-1

https://thejournal.com/articles/2021/08/25/as-tablets-decline-notebooks-

will-drive-growth-in-computing-devices.aspx?m=1

https://www.fortinet.com/resources/cyberglossary/cia-triad

https://www.openpath.com/blog-post/physical-access-control

https://www.identiv.com/community/2020/08/06/whats-the-difference-

between-logical-access-control-and-physical-access-control/

https://www.techtarget.com/searchsecurity/definition/access-control

https://www.sailpoint.com/identity-library/authentication-methods-used-for-

network-security/

https://www.sixt.com/magazine/tips/top-free-navigation-apps/

Dequiros, Miguel T.

Reporter
46
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Emerging and
Converging
Information
Communication
(Ignacio, Jiro C.)
47
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

What is Information Communication?

- Information Communication or most likely known as Information and

Communications Technology (ICT) is the convergence of digital and

physical resources used to gather, store, process, retrieve, generate and

transmit information.

- Information is defined as a message or knowledge communicated or

received concerning a particular fact or circumstance.

- Communications, on the other hand, is the exchange of information

between two or more things, such as people, devices, governments,

organizations, or businesses.

- Combining them both, information communication, is the thorough

exchange of data and information with others using the online world or in

layman’s terms, the internet. With the use of the internet, people can access

tons of various information within a few clicks of the mouse, as we can see,

people can stream their music online, search something, interact with

friends, watch movies and such, are effects of the evolution or emergence

of technology.
48
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

What is Information Communication (Cont.)

- With regards to how people use the internet, it can promote and provide

people beneficiaries, because of how evolved, united, and the

appearance/arrival of modern technology nowadays that can help how

people live in this modern world.

- ICT permeates all aspects of life, providing newer, better, and quicker

ways for people to interact, network, seek help, gain access to information,

and learn.

- In addition, the term information and communications technology (ICT) is

generally accepted to mean all technologies that, combined, allow people

and organizations to interact in the digital world.

Examples of Information Communication

- The emergence and the availability of Information Communication today

really changes the lives of every person nowadays. For example, the

availability of the information that people can access easily is a beneficiary

for us people in this 21st century, is the news that is brought to us by the

internet that we can read anytime, anywhere. It is a diverse set of

technological tools and resources used to transmit, store, create, share or


49
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

exchange information. Below are some examples of information

communication.

CLOUD COMPUTING – Cloud computing or we can call it as the cloud

storage, is a software application used to store, manage and process data

on one’s own device.

INTERNET ACCESS – The internet is a massive home of the people and

we can consider it as our second home, for the internet paves the way of us

being able to cope with the technology nowadays and access various

information we have online.

TRANSACTIONS – Transactions can be defined as our online activity, most

specifically, when we are about to buy something in online shops.

COMMUNICATION EFFICIENCY - From the word itself, it is by us, people

exchanging valuable information that we may find useful or things that we

find as interesting, with the use of IT, the lives of people can be smooth and

free-flowing.
50
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

What is Artificial Intelligence (AI)

- AI is the ability of computer programs and robots to imitate humans’

intelligence and behavior, whether or not it learns for itself. For example,

understanding natural language, voice recognition, recommendation

engines and so on. And Artificial Intelligence wouldn’t exist without ML,

because take note, machine learning (ML) is considered as a subpart of

Artificial Intelligence (AI). The examples of Artificial Intelligence in today’s

world are clearly and can really be seen wherever we go, tons of technology

that has emerged and converged! Imagine, from traditional living back then,

to now, technology helps us for living, traditionally to digitally, what a

massive jump from the topic alone.

10 Examples of Artificial Intelligence (AI)

1. DIGITAL MAPS & NAVIGATION

- For the first example we have that incorporates the idea of Artificial

Intelligence (AI), is with the idea of having to have access to digital maps

and its prior navigation to any place you want to go to. Travelling to a new

destination does not require much thought any longer. Rather than relying

on confusing address directions, we can now easily open our phone's map
51
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

app and type in our destination. Again, we can see the transition traditionally

to digitally. And with this, the applications that we have in mind can be

Google Maps or Waze. How does it incorporate AI?

- With this topic in mind, it is truly accompanied with what we call the Global

Positioning System (GPS), wherein the AI uses machine learning to know

whether there is traffic nearby or successfully identify roads and

infrastructures around. It has been trained to calculate this based on the

traffic situations. Several ride-hailing applications have emerged as a result

of the use of similar AI technology, as a result, with the concept and idea of

machine learning, the app can also navigate from your starting point to your

destination!
52
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

2. SHAREit

- For the next part, the second example of Artificial Intelligence is the

application called SHAREit. SHAREit’s purpose is for the users to be able

to share and receive files digitally using just the Bluetooth, WiFi and the

GPS. With these, users can remotely share files, games, songs, photos,

videos & etc. to their friends with just a few clicks of buttons on their phone!

- The reason that SHAREit is under the art of

Artificial Intelligence is that it mainly has an

idea of sharing files remotely to other people

via wireless networks. The efficiency it offers

is better than having to download things from

the app store, or downloading

music/videos/movies in the first place, its

main purpose is to SHARE, as the

application name implies, sharing it to other

people. With this, our life is efficient, we can

get files from others that we might not have

direct access to, like paid games!


53
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

3. GOOGLE LENS

- Under Google’s own program/application, what we have as a

representation of today’s artificial intelligence is how the program is

incorporated. Google Lens! This application provides end users with their

appropriate need whenever they are bummed out on something, as their

tagline suggests, “Search what you see”, “Shop what you see”, “Translate

what you see” and “Identify what you see”.

- Those are just the possibilities and opportunities that Google Lens can

offer and cover on, it helps us find what we find in the real world. Whenever

it is a math problem we don’t know how to solve, or a plant species we want

to know the name of, shopping for a specific brand of cloth and such. With

the help of this application, people’s lives will be changed after this kind of

efficiency in information technology.

- Google Lens is an AI-powered technology that uses your smartphone

camera and machine learning to not only detect an object in front of the

camera lens, but understand it and offer actions such as scanning,

translation, shopping, and more.


54
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

4. FACIAL RECOGNITION

- Facial Recognition is the term we are all familiar with, even little kids

nowadays are. From the word itself, it can be understood pretty quickly, to

which devices that use artificial intelligence that enable us to recognize our

faces. Other names can include face ID, biometric identification, identity

verification.

- Facial recognition is one of the front-runner applications of AI. It is one of

the advanced forms of biometric authentication capable of identifying and

verifying a person using facial features in an image or video from a

database.

- Face recognition uses AI algorithms and ML to detect human faces from

the background. The algorithm typically starts by searching for human eyes,

followed by eyebrows, nose, mouth, nostrils, and iris. Once all the facial

features are captured, additional validations using large datasets containing

both positive and negative images confirm that it is a human face. Thus,

once succeeding, the system stores the face onto a database and whenever

a user tries to access, a correct facial recognition is a must to succeed and

use the device.


55
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Facial Recognition technology is prevalent nowadays in the 21st century,

as it can be seen on various devices and most specifically, our mobile

phones. This acts as a password option for owners to unlock using their

face, with other people’s faces, they can’t unlock it, an easy concept.

- In companies, in the logging in or logging out system, some require facial

recognition to confirm if it is the employee logging in/out work. This is to

certify that the user is truthfully the one that is interacting with the system

and not a hoax person that uses their IDs, but with an additional work of

facial recognition, it makes it more secure. Confidentiality is one key point

here in terms of the CIA triad model.

5. ONLINE CASH PAYMENTS

- This next topic under Artificial Intelligence (AI) is with the use of online

cash payments, wherein any transaction involving a consumer and a

supplier, demand and supply can now be done digitally! Most common cash

payment applications are the ones that are commonly known, such as

GCash, PayMaya, Amazon Pay, Google Pay, etc.

- As the world is fused with traditional and digital means, we still can’t

escape the inevitable digital world that is constantly evolving up to today

and digital payments is one big factor of it. The world is moving too fast,

ain’t it?
56
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Comparing it to the 20th century, where people normally pay for things

traditionally by cash, today in the 21st century, it is not only by traditional

cash payment but with the emergence of these technologies, online and

digital cash payments are made possible. As you can see, we can pay our

bills online, pay on restaurants with QR Codes, all of these are possible

because of how evolved our technology is today, the intelligence that is

programmed that made possible to make transactions online that is

beneficiary especially this recent pandemic! Anything that elevates human

interventions can serve as artificial intelligence.


57
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

6. SPEECH-TO-TEXT

- Incorporating Speech-to-text typing is one efficient way for people who

don’t have the time to type, or if they are just primarily lazy. But with humor

aside, the intelligence and the voice recognition that is involved with the

topic of speech-to-text can be considered as an artificial intelligence as if

the machine is understanding and deciphering what the user is saying,

learning and typing it in the document! The benefit of this intelligence makes

students’ learning simplified and less tedious if they took notes via speech

instead of risking their hand to have a spasm while writing, if a technology

is available for people, then why not? The goal of technology is to make

things efficient and easier anyways!

- AI speech-to-text is a field in computer science that specializes in enabling

computers to recognize and transcribe spoken language into text. It is also

called speech recognition, computer speech recognition, or automatic

speech recognition (ASR).

7. JOLLIBOTS AND FAST-FOOD KIOSKS

- For the seventh artificial intelligence, it is commonly known as fast food

kiosks or self-ordering kiosks and the Jollibots that was introduced lately.
58
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

A. KIOSKS

- First, we are tackling fast food kiosks that are not only in Jollibee but in

almost every fast-food chain, and not just in the Philippines but around the

world. It can be seen that this type of ordering method on restaurants can

help reduce lengthy lines and as well as having efficient and an easy task

to do to state your order, when ordering via kiosk, browse through the menu

digitally, add items and get a receipt to pay for DIGITALLY or IN CASH.

- For example, the picture depicts a person that is ordering McDonald's via

kiosk and after ordering, you’ll get a number by the side. And after this, you

will get a receipt, and you can do this relatively easy as if we people are

normalized and used to digital devices so it’s not new to us.


59
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

B. JOLLIBOTS

- And then next, are known as Jollibots, not the kid’s toys on value meals

but the cat robots that are recently invented. This Jollibot uses Artificial

Intelligence that involves robotics that is taught to serve people on assigned

table numbers.

- The greatness that the robot can bring is that it is taught by machine

learning, to serve foods that are assigned to them by the crew. And what’s

amazing is that it understands where to go, it can navigate to the restaurant,

that might be a sensor or a camera incorporated in the robot. Awesome! A

robot programmed to act like a human that can help efficiency within the

workplace and serve people at the restaurant. It can also be seen as

multifunctional, what a robot is programmed to do, not just serve food but

to also clean tables, and play music almost like a human crew!
60
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

8. E-COMMERCE WEBSITES

- SHOPEE! LAH-ZA-DA! I’m pretty sure almost every person is familiar with

those jingles by the two e-commerce websites that are common in our

country. But, how does e-commerce relate to artificial intelligence?

- Well, in short terms, what makes e-commerce as an artificial intelligence

because it serves as our go-to and convenient way to shop various things

online that might pique our interest, so, Shopee and Lazada provides to us

consumers efficiency and convenience.

- An AI solution that incorporates machine learning will improve the

customer experience, help you lift conversion, revenue, and profit

significantly. AI learns from visitors’ behavior in real-time, and so

incorporates machine learning - anticipating the visitors’ intents, and adapts

the results to rank the most relevant products higher, maximizing your sales,

and you can pay online to the sellers too!


61
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

9. TESLA’S SELF-DRIVING CARS

- The future is here! The world today is indubitably fast-paced, invention

after invention on technologies are coming from everywhere, research after

research, providing efficiency in people’s lives. Thanks to the inventors

today who have established and researched self-driving cars that made it

possible in today’s world. Tesla incorporates machine learning and like we

have mentioned before, on the examples of artificial intelligence, is with the

topic of digital maps and navigation. You first pick your destination and it

drives you to it, auto-pilot, hands-free!

- The future is now, self-driving cars is a luxury and a privilege, an

intelligence that learned to pilot a car on the streets and avoid traffic and

take the fastest routes possible! Without machine learning, this wouldn’t be

possible!

MACHINE LEARNING ON SELF-DRIVING CARS

- Tesla uses machine learning under the artificial intelligence with its type,

and there are three types of machine learning, out of those three, Tesla

uses reinforcement learning. Where the AI learns via trial and error or it

learns by itself.
62
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Most of the time, this method is often observed with strategic games

(chess or checkers), but for driving, it becomes a trial-and-error kind of

program when it successfully navigates the right places and distinguishes

every pinpoint of the map to the real world. Again, the technology is learning

by itself! Exploring by itself!

- On the contrary, Tesla is not just about the self-driving feature that it gives

to people, it also has sensors to prevent theft, the user has a key on their

phone that the Tesla scans for the person to be able to use the Tesla to

themselves. Additionally, when you have a pet with the car and you are

about to do an errand, leaving the pet in the car, Tesla ventilates the car

enough for the pet to breathe. It’s called pet mode!

10. GOOGLE ASSISTANT (G.A.)

- Another application by Google that has the idea of artificial intelligence is

Google Assistant. It can be the Siri of Android. What it does is it can tell you

the time, weather and even the name you have registered!
63
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- It incorporates the idea of artificial intelligence because given that you are

talking to a machine and it is taught how to respond respectively and

accurately; hence, machine learning over again! But this time, it’s

supervised learning!

- Google Assistant’s role is from the word itself, your personal assistant.

You can ask what the weather is tomorrow, schedule your alarms and

appointments, it has so many features that encompasses and alleviates our

problems that are either too much workload or we’re just too lazy. But either

way, it aims to provide efficiency in handling stuff that you cannot.

- Additionally, a feature that is awesome is it can help you search the song

you’re looking for whenever you don’t know the title! Just hum, sing the

lyrics or play an instrument for it to hear and decipher what music you are

finding, or pull out your G.A. whenever you hear the song in public!

- This is an efficient tool whenever you’re outside and hear a catchy song,

pull out google assistant and you can know the song pretty easily, its

efficient! Or if you heard a song and didn’t manage to pull out G.A., well at

least you can still hum or sing some lyrics of the song, as long as G.A.

understands you, it can provide accurate and some inaccurate results of the

song you are finding.


64
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

What is Machine Learning (ML)

- Machine learning (ML) is a sub-field of AI and data science, which is based

on learning algorithms. They can make predictions regarding future

outcomes without having been programmed specifically with that scenario

in advance. Machine learning is the part of AI that helps machines learn and

understand on their own and can be likened similarly to our human brain.

- Machine learning (ML) is a branch of analytics in which machines

continuously improve their ability to recognize patterns as they are trained

with more examples, without having to be programmed to handle each

example or pattern. Based on the sample data that the machine has been

given, it can build models to systematically map and compare new data or

situations with past events and patterns and project outcomes. Sometimes

the outcomes from machine learning falsely appear to have been produced

by intelligent means.

What is Machine Learning (Cont.)

- To introduce machine learning, as we have mentioned before it is a

subpart of artificial intelligence. First, a developer starts it with a website for

example, incorporating it with AI and under it is machine learning that

composes of three parts that can make it an ML, learning retention,


65
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

prediction and improving itself. Machine learning can be defined as the

backbone of AI, although it cannot exist without each other. Without the idea

of ML, it cannot be defined as truly an intelligence that is artificial or we can

say it is not fully developed yet. Other terms for ML could be the algorithm

of a system.

What is Machine Learning (Recommendations)

- Another example of a diagram how machine learning works in the subject

of AI Technology. We’re going to use YouTube as an example.

1) If the user inputs data/searches a video on YouTube of a particular topic,

2) The ML/AI analyzes thoroughly its title, main idea of the video, etc.

3) ML now finds patterns and finds similar videos from the data that has

been inputted.

4) Once it found patterns and similar videos, it will now show up in your

recommendation/home page on YouTube.


66
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

5) And then finally, the ML stores the feedback if the user did watch some

of the videos recommended or not. If not, then it repeats on step 1.

Three types of Machine Learning

- Machine Learning has three main types, supervised, unsupervised and

reinforcement learning.

- In supervised learning, both the input and desired output are provided and

the machine must learn how to map the former to the latter. To accomplish

this, the machine is trained on a statistically representative set of example

inputs and corresponding outputs.

- In unsupervised learning, the machine is not provided with labeled

examples or previous patterns on which to base the analysis of the data

inputs. The machine must uncover patterns and draw inferences by itself,

without having the correct answers. It will classify or cluster data by

discovering the similarity of features on its own.


67
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- In reinforcement learning, it learns through trial and error – from the

consequences of its action and by new choices. As an action is taken, the

success of the outcome is graded and receives either a positive or negative

score. The algorithm seeks to receive positive scores and the model is

trained on continuous feedback.

Diagram of Machine Learning


68
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Supervised Learning

- On the topic of supervised learning, as it has been mentioned before, is

classifying information based on the input of the user. And from the photo

of the robot previously, it can be seen that the user teaches the robot that a

cube is a six-sided square.

- For an example that we all can relate on and are familiar of, is YouTube’s

video classifying recommendations, based on our activity on the said

website. Although it can be seen as a clustering type of machine learning,

but if a robot did categorize video via an idea, how did it know to call it that?

How does it know it’s called “Computer Programming”, “Algebra”, “Sports

Entertainment”?

Unsupervised Learning

- Meanwhile, on the topic of unsupervised learning, the machine is not

provided any information, it learns on its own and classifies things based on

how they look like. The machine must uncover patterns and draw inferences

by itself.
69
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- One example of which is the Completely Automated Public Turing test to

tell Computers and Humans Apart (CAPTCHA). This is a program or system

intended to distinguish human from machine input, typically as a way of

eliminating spam and automated extraction of data from websites.

- For the simple concept, a robot can cluster

these pictures apart, they can group stairs,

roads, buses, cars apart. But the thing is, the

machine does not know what they are, it could

just group it, therefore, the machine is

unsupervised, learning on its own.

Reinforcement Learning

- And then, lastly for the reinforcement learning, where a machine can learn

via the interaction with the user or without the user at all, trial and error type

of learning. Learning without the user has an example of the 9th example

of the AI Technology, self-driving cars.

- A self-driving car for which getting from one location to another without

crashing and navigating successfully the route, distinguishing roads and


70
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

buildings apart would receive a positive score. Hence, a machine’s trial and

error learning. And we know that reinforcement learning is sometimes

referred to as by playing games, the machine can learn, predict and

improve. And one example of which is by online chess. If a player tries to

play against a computer (CPU) in a chess game, there are a lot of difficulty

levels that vary depending on the user’s capabilities, leading to the learning

of both entities on the subject of chess, since AI with ML is again,

programmed to be like humans of this world.

Benefits of Artificial Intelligence

1) CONVENIENCE - As mentioned before, the primary goal and purpose of

technology/AI is to make people’s lives convenient and efficient. Everyday

things that composes of technology makes our life easier, we just don’t

notice it, one example is our phones.


71
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

2) 24/7 AVAILABILITY - There are many studies that show humans are

productive only about 3 to 4 hours in a day. Humans also need breaks and

time offs to balance their work life and personal life. But AI can work

endlessly without breaks. They can even handle tedious repetitive jobs

easily with the help of AI algorithms. We can access these types of materials

at any time in our life whenever we need it.

3) HUMAN ERROR REDUCTION - One of the biggest advantages of

Artificial Intelligence is that it can significantly reduce errors and increase

accuracy and precision. The decisions taken by AI in every step is decided

by information previously gathered and a certain set of algorithms. When

programmed properly, these errors can be reduced to null.

4) DIGITAL ASSISTANCE - Some of the most technologically advanced

companies engage with users using digital assistants, which eliminates the

need for human personnel. Many websites utilize digital assistants to deliver

user-requested content. Some chatbots are built in a way that makes it

difficult to tell whether we are conversing with a human or a chatbot.

5) NEW INVENTIONS - In practically every field, AI is the driving force

behind numerous innovations that will aid humans in resolving the majority

of challenging issues. For instance, recent advances in AI-based


72
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

technologies have allowed doctors to detect breast cancer in a woman at

an earlier stage. Hence, technology nowadays is continuously improving.

Detriments of Artificial Intelligence

1) REDUCED LABOR/UNEMPLOYMENT – Since it was mentioned that

artificial intelligence boosts the community and its accuracy is beyond

perfection, it can replace manpower in establishments and have the risk of

being unemployed, like for example, the Jollibots launched by the Jollibee

Corporation can replace a number of employees in the establishments since

AI is the thing that we rely on most of the times in our lives.

2) INCREASED DEPENDENCY - As mentioned previously, people most of

the times depend on the technology created and emerged nowadays,

leading people to increase their dependency as well as them being lazy and

depreciating their creativity. Ironically, it decreases manpower and

increases laziness at the same time.

3) HIGH COST – Despite the overall emergence and presence of Artificial

Intelligence everywhere we go, these are costly to make and develop with

its full functions and capabilities. Since AI is updating and improving every

day, the hardware and software need to get updated with time to meet the

latest requirements. Machines need repairing and maintenance which need


73
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

plenty of costs. It’ s creation requires huge costs as they are very complex

machines.

4) INACCURACY – Despite the evolution of artificial intelligence today,

there are still some technologies that are still in development, as a result,

some of the queries inquired by the user can sometimes be inaccurate from

what the user intends to find out.

QUIZ

Multiple Choice (25pts): This multiple-choice test is created using the

Bloom’s Taxonomy Multiple Choice Questions.

1. What is the best statement that describes artificial intelligence?

A. It is an evolution of the human species that is created for the sake of the

betterment of our lives.

B. It resembles a human itself and a human-like behavior and intelligence.

C. Artificial Intelligence is mostly robots nowadays.

D. It is a program created that is more proficient at everything it does than

a human being.

2. What is the best example of the medium of information communication

that helps us in communicating with others nowadays?

A. The Internet B. Facebook C. Artificial Intelligence D. News


74
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

3. A person who is non-tech savvy and is currently 55 years old got hired

into a company, but he didn’t know that technology is a big deal and AI is

mostly used here. If the person worked here, what is the possible

consequence that may occur?

A. The person may feel hesitant but still adjusted and found means.

B. The person may feel unfamiliar with the technology and may feel

overwhelmed therefore affecting their work status.

C. The person may discover new AI technology in the company and be a

whiz at technology, being the top-notcher of the company.

D. The person may feel that technology is non-essential to his life therefore,

continuing with his assigned work.

4. If a person worked for a job for almost eight years, yet after those years,

the person got fired, what is the reason for this action?

A. The technology on the company was doing better and more intelligent

than the person fired.

B. The person got tired of the job and decided to find a new one instead.

C. The emergence of Artificial Intelligence replaced the jobs of some

employees.

D. The person's workplace was so toxic that he decided to leave.


75
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

5. What is an example of the emergence of Information Communication

that changed people’s lives nowadays?

A. Traditional driving evolved into a self-driving technology implemented by

Tesla.

B. Improved security on the cyberworld we have today and how people are

secured online.

C. Speech-to-text can now be done without a hectic method in typing a

bunch of materials.

D. Newspaper reading back then evolved to reading news on any device

that we may have.

6. This Artificial Intelligence functions as if it is your personal helper, its

purpose is for you to know what you see with your peripherals, what you

see that you want to know. What AI is mentioned?

A. Google Assistant B. Google Lens C. Google D. Machine Learning

7. It is 11:00pm, the midnight is nigh, Cerise is still struggling with her

homework that is due 12:00 midnight, she encounters a problem that she

cannot solve, she doesn’t know the formula for it either. Therefore, she

reaches for her phone and pulls out an application that brought out the ease

and her problem is now solved and at the same time, she learned
76
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

something! What is not an advantage of the Artificial Intelligence that she

just used and benefited from?

A. Digital Assistance B. Convenience C. New Inventions D. 24/7 Availability

8. Refer to item #7, if Cerise did continue her behavior on using the

application all the time, what disadvantage can you infer from this situation

that Cerise portrays?

A. Technology Inaccuracy B. Reduced Labor

C. Increased Dependency D. Expensive Costs

9. The statement, “Artificial Intelligence imitates human’s intelligence and

behavior”, suggests that?

A. AI is programmed and coded to perform like a human being.

B. AI continues to be like one of the humans on this planet.

C. Humans are Artificial Intelligences in disguise.

D. AI mimes a human being to a convenient extent.

10. Due to the rapid expansion and growth of the country and industry, the

technology continues to expand as well. A lot of artificial intelligence is

prevalent in our lives, with regards to this, which real life example does not

evaluate the data inputted by the user and then return a desired output?

A. An employee who uses facial recognition on her phone to automatically

access the device.


77
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

B. A botanist scanning a plant with Google Lens to know what kind of plant

it is.

C. A student using voice typing on Google Docs for fast-paced typing.

D. A musician using the “search this song” feature on Google Assistant to

know the song that he intends to find.

11. Categorize and differentiate the difference of supervised learning

(SVL) from unsupervised learning (USVL).

A. SVL analyzes and classifies the data provided; USVL uses trial-and-

error on the data provided.

B. SVL’s approach is by trial-and-error; USVL’s approach is by the data

provided by the user.

C. SVL draws inferences itself from the data; USVL classifies out the data

provided.

D. SVL classifies the data provided by the user; USVL learns on its own

based on the data provided.

12. If a toddler is given building blocks to play with, and in some way. the

toddler grouped the blocks by color, what kind of learning does the toddler

depict?

A. Machine Learning B. Reinforcement Learning

C. Unsupervised Learning D. Supervised Learning


78
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

13. Which of the following examples best describes an idea of the jump

from traditional to digital living involving AI?

A. Tez, who uses a wristwatch to tell the time, now looks at the phone for

time.

B. Rhen who sets an alarm clock traditionally has an alarm set on her

phone.

C. IO who takes photos on his camera now pulls out a phone for the idea of

phonetography.

D. Liv who pays via cash on fast food restaurants before, pays via QR Code

scans nowadays.

14. Which statement best describes machine learning (ML)?

A. ML is programmed specifically for the purpose of the efficiency of the

people.

B. ML provides a wide array of learnings that a user can also have and

mimic, therefore making ML a smarter machine than humans.

C. ML is incorporated in various social media websites.

D. ML is a subpart of Artificial Intelligence that intends to project patterns

and predict the future to help people make decisions


79
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

15. If you got the chance to live in the 20th century, you live in the same era

with your parents, where digital technology has not been invented yet, what

handheld artificial intelligence today would be of great help if you

accidentally wander in an obscure place?

A. Digital Maps B. Google Lens

C. Tesla’s Self-Driving Cars D. Google Assistant

16. Let’s say you want to explain machine learning types to a younger

person than you. In Layman’s terms, how can you describe and differentiate

the three types of machine learning? Take note of these abbreviations:

Supervised (SV), Unsupervised (USV), Reinforcement (RE).

A. SV uses clustering/grouping; USV uses classification on the items given;

RE uses gaming trial and error.

B. SV learns by sorting items given; RE clusters every item given to it; USV

is a thumb drive.

C. USV groups all items given to it; RE learns by working things out; SV

categorizes and names items given to it.

D. RE gives names to every item given to it; USV learns by itself; SV

classifies things given to it.


80
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

17. How do E-Commerce websites help the daily living of every civilian on

this planet? How does it relate to AI?

A. E-Commerce websites help people to be frugal and be aware of their

financial status.

B. E-Commerce websites help the efficiency of people’s lives with regards

to the jump from traditional to digital shopping.

C. E-Commerce websites incorporate an eye-opening user interface (UI)

that helps boost the sales of the sellers of the said website.

D. E-Commerce websites bring the best with regards to choices compared

to traditional shopping.

18. All of the following are Artificial Intelligence observed by various

countries, EXCEPT one.

A. A hotel in Singapore that uses robotics in assisting hotel customers in

any designated room.

B. A supermarket in Singapore that uses machines to facilitate and cook

meals for shoppers.

C. Kalbee-un in South Korea that implements a robotic bank account that

assists when you are willing to withdraw.

D. Kura Sushi in Japan, a conveyor belt sushi place that uses digital

systems in tallying plates and accumulating the total fee.


81
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

19. If you are playing Games of the Generals against a friend, what kind of

learning can the both of you portray?

A. Reinforcement Learning B. Machine Learning

C. Supervised Learning D. Unsupervised Learning

20. It was one Sunday evening, it was raining heavily, a mother and her

child were discussing how school was in the previous week; the

conversation was free-flowing until a power interruption interrupted the

conversation of the mother and the child; the child then got scared and the

parent urged the child to sleep. Later on, the power comes back, and the

mother uses her social media account to be up to date of the ongoing

situation, knowing that classes are suspended the next day. What can you

infer from this situation?

A. The mother judged and knew based from the heavy rains that there

would be no classes tomorrow; hence, heading online to confirm that she

was right based on her intuitions.

B. The mother has viewed from the news online that classes are

suspended, necessary for her child and for her personal break also.

C. The mother used the medium of information communication to signify its

importance in certain situations wherein information would be significant.


82
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

D. The mother read the news online and informed other mothers as well

that there would be no classes the next day.

21. In what way does Spotify implement the two types of Machine Learning

(ML)?

A. Spotify tracks your recent listening on the application and then lists it on

its database.

B. Spotify tracks the recent songs you’ve played and clusters it and then

classifies it by name or genre into a specific group, having a Spotify mix

recommended to you.

C. Spotify recommends music that you might like and automatically stores

it on a Spotify Mix for you to enjoy and possibly play.

D. Spotify tracks and records the recent songs that were played and

analyzes it deeply the songs you like and dislike.

22. A 16-year-old student used Google Assistant as his personal assistant

all the time, and he used this for almost four years already. But after

discovering the feature of searching for a song, he had mixed emotions, he

was happy on some of the results and disappointed in some. What is the

possible disadvantage that can be drawn from Artificial Intelligence?

A. Artificial Intelligence can sometimes be inaccurate with the results.

B. Artificial Intelligence didn’t satisfy the desired needs of the student.

C. Artificial Intelligence is not as smart as a human being.


83
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

D. Artificial Intelligence is still in development.

23. You are bored on a Saturday evening and you are finding productive

things to do, so you have decided to play some online chess with an AI

opponent, you won against the AI. How does Machine Learning’s learning,

predicting, and improving retention correlate to the topic of online chess?

A. AI uses reinforcement learning that learns and predicts the movement of

the player and improves itself whenever the AI loses the game, leading for

both entities to learn from experience.

B. AI has the ability to manipulate information and win every single time

regardless of the level of skill the user has.

C. The AI learns like a human and is not perfect but continuously improves

itself based on the overall experience from the game.

D. The AI opponent on chess predicts the user’s movements and counters

it, this is based on what the AI has learned.

24. On December 25, 2048, the fast-food restaurant is filled with a lot of

people, friends, families, colleagues and acquaintances, a Christmas Day

celebration turned the restaurant into a jam-packed establishment,

because of this, a hectic and extensive line prolonged the famished

stomachs of the people, making people hangry. With this in hand, what

solution should the establishment do?


84
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

A. Hire more manpower to split up the jobs that they struggle with, if this

happens, the flow of the establishment can grow as fast and less tedious.

B. Produce a technology that makes the establishment advanced than the

others, attracting more customers and earning more sales.

C. Add additional tills to even up the customers whenever the establishment

is jam-packed.

D. Identify the root cause of the problem and put additional tills and add

kiosks to assist the customers evenly.

25. How does Netflix predict and recommend movies that are within your

preferences or movies that you are likely to watch?

A. Netflix recommends random movies that you might like and prefer as a

part of an exploration on the application, Netflix’s idea is for the user to enjoy

spontaneously by trying new things.

B. Netflix recommends based on the algorithm on what is trending,

regardless if the user likes or dislikes the genre.

C. Netflix incorporates machine learning and regresses the input movie from

the user.

D. Netflix recommends based on the patterns it recognizes from the user

input, analyzes it, and generates movies that are grouped and classified

that the user might prefer


85
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Essay (5pts):” Do you think artificial intelligence will overcome and become

more powerful than humans in the near future?”

References:

https://www.apptus.com/blog/machine-learning-future-of-online-

shopping/#:~:text=AI%3D%20Artificial%20Intelligence&text=We%20may

%20not%20think%20about,smart%20gadgets%20in%20our%20homes

https://itchronicles.com/information-and-communication-technology/the-

importance-of-information-and-communication-technology-ict/

https://www.techopedia.com/definition/190/artificial-intelligence-ai

https://www.suneratech.com/blog/ai-ml-and-how-they-are-applied-to-

facial-recognition-

technology/#:~:text=Facial%20recognition%20is%20one%20of,or%20vide

o%20from%20a%20database

https://youtu.be/tlThdr3O5Qohttps://nexusintegra.io/advantages-

disadvantages-artificial-intelligence/

https://towardsdatascience.com/advantages-and-disadvantages-of-

artificial-intelligence-182a5ef6588c

https://www.guavus.com/clarifying-ai-vs-machine-learning-part-3-series/

Ignacio, Jiro C.

Reporter
86
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

The Rise of Robotics


(Jarquio, Miracle S.)
87
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

The Rise of Robotics

- What comes into your mind when someone asks you "what is robotics or

robots?"

- Robotics is an interdisciplinary sector of computer science, engineering,

and technology associated with designing, developing, and using

mechanical robots that substitute for (or mimic) human actions. Pop culture

has always been interested in robots. For example, consider Optimus

Prime, R2D2, or wall-E. Unfortunately, these are overstated; humanoid

ideas of robots usually seem like a sketch of a real thing. Robots are

becoming advanced and gaining mechanical capabilities that don’t put the

likelihood of a machine like R2-D2 out of reach in the future. As technology

advances, so does the reach of what is considered robotics.

- Back in 2005, almost 90% of robots could be found dismantling cars in

automobile warehouses. These robots included mostly mechanical arms

responsible for welding or screwing on specific car parts. But now we’re

witnessing an evolved and more advanced definition of robotics that

consists of the design, development and use of bots that explore earth’s

roughest conditions, robots that help in almost every aspect of healthcare,

and even robots that assist law enforcement.


88
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Growing Popularity of Robotics

- Potential to Positively Transform Lives and Work Practices

- Increases Efficiency and Safety

- Usage Games

- Some Real-World use Cases of Robotics

- Automotive Industry

Healthcare

The First Modern Robots

The earliest robots as we know them were created in the early 1950s by

George C. Devol, an inventor from Louisville, Kentucky. He invented and

patented a reprogrammable manipulator called "Unimate," from "Universal

Automation." For the next decade, he attempted to sell his product in the

industry, but did not succeed. In the late 1960s, businessman/engineer

Joseph Engleberger acquired Devol's robot patent and was able to modify

it into an industrial robot and form a company called Unimation to produce

and market the robots. For his efforts and successes, Engleberger is known

in the industry as "the Father of Robotics."


89
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Al-Jazari is not only known as the "father of robotics" he also documented

50 mechanical inventions (along with construction drawings) and is

considered to be the "father of modern day engineering." The inventions he

mentions in his book include the crank mechanism, connecting rod,

programmable automaton, humanoid robot, reciprocating piston engine,

suction pipe, suction pump, double-acting pump, valve, combination lock,

cam, camshaft, segmental gear, the first mechanical clocks driven by water

and weights, and especially the crankshaft, which is considered the most

important mechanical invention in history after the wheel. Not bad for a guy

who lived 800 years ago!

Three types of Robotic Systems

Robotic systems are a way of automating manufacturing applications while

reducing the amount of labor and production costs and time associated with

the process. These systems are used in almost every manufacturing

industry today. While manual labor has dominated in manufacturing for

centuries, it is the robotic system that revolutionized the process.

Manufacturers are now able to produce a superior-quality product in a

reduced amount of time because of robot systems.


90
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Manipulation Robot System - is the most commonly used in the

manufacturing industry. These systems are made up of many of the robot

arms with 4-6 axes and varying degrees of freedom. They can perform

several different functions, including welding, material handling and material

removal applications.

The Mobile Robotic System - is a bit different. This system consists of an

automated platform that moves items from one place to another. While

these robot systems are used heavily in manufacturing for carrying tools

and spare parts, they are also used in the agricultural industry for

transporting products. These can also be used by several different

industries because of their ability to swim and fly, as well as move along the

ground.

Data Acquisition and Control Robotic Systems - are used to gather, process

and transmit data for a variety of signals. They are also used in software for

engineering and business. Many of the mobile robotic systems can use

signals from these systems.


91
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Advantages of Robotics

- In many situations robots can increase productivity, efficiency, quality and

consistency of products.

- Unlike humans, robots don’t get bored.

- Until they wear out, they can do the same thing again and again.

- They can be very accurate – to fractions of an inch (as is needed for

example in manufacturing of microelectronics).

- Robots can work in environments which are unsafe for humans – in the

nuclear or chemical industries for example.

- Robots don’t have the same environmental requirements that humans do,

such as lighting, air conditioning or noise protection.

- Robots have some sensors/actuators which are more capable than

humans.

Disadvantages of Robotics

- The use of robots can create economic problems if they replace human

jobs.

- Robots can only do what they are told to do – they can’t improvise.
92
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- This means that safety procedures are needed to protect humans and

other robots

- Although robots can be superior to humans in some ways, they are less

dexterous than humans, they don’t have such powerful brains, and cannot

compete with a human’s ability to understand what they can see.

- Often robots are very costly – in terms of the initial cost, maintenance, the

need for extra components and the need to be programmed to do the task.

What is RPA?

- Robotic process automation (RPA) is a technology that mimics the way

humans interact with software to perform high-volume, repeatable tasks.

RPA technology creates software programs or bots that can log into

applications, enter data, calculate and complete tasks, and copy data

between applications or workflow as required. When combined with AI and

machine learning, RPA can capture more context from the content it is

working with by reading text or handwriting with optical character

recognition (OCR), extracting entities like names, invoice terms or

addresses using natural language processing (NLP), and capturing more

context from images, such as automatically estimating accident damage in

an insurance claim picture.


93
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- RPA is growing in popularity because it can reduce costs, streamline

processing and drive better customer experiences. Another attraction of

RPA software is that business units can implement it without having to learn

new tools or ask IT teams for support -- and without changing an

organization's underlying IT infrastructure. As RPA has grown in popularity,

however, enterprises are seeing the need to integrate RPA process

automations in their IT systems. While RPA automations can dramatically

speed up a business process previously handled by humans, bots can

break when application interfaces or process workflows change.

How does RPA work?

- RPA mirrors the way people are accustomed to interacting with and

thinking about software applications. RPA's ability to copy the way humans

perform a computer-based process has contributed to its popularity

compared with automation tools such as application programming

interfaces (APIs) or low-code development that are more scalable but less

intuitive or require expert knowledge to use.

- The simplest RPA bots can be created by recording the clicks and

keystrokes as a user interacts with an app. When problems emerge, a user


94
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

can simply watch how the bot is connecting with the app and identify the

steps that need to be fine-tuned.

- In practice, these basic recordings often serve as a template for building

more robust bots that can adapt to changes in screen size, layout or

workflows. More sophisticated RPA tools use machine vision to interpret the

icons and layout on the screen and make adjustments accordingly.

- Some RPA tools are also able to use these initial recordings to create

hybrid RPA bots that start by simply recording an existing workflow and then

dynamically generating workflow automation on the back end. These kinds

of hybrid bots take advantage of the simplicity of RPA development and the

scalability of native workflow automation.

- In other RPA implementations, process mining and task mining tools are

used to automatically capture business process workflows that serve as

starting templates for RPA automations. The process mining can analyze

the logs of ERP and CRM applications, for example, to automatically

generate a map of common enterprise processes. Task mining tools use a

locally running app with machine vision to capture a user's interactions

across multiple apps. All the major RPA vendors are starting to develop

these kinds of process mining integrations.


95
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- RPA tools can also be connected to AI modules that have capabilities like

OCR, machine vision, natural language understanding or decision engines,

resulting in what is called intelligent process automation. These capabilities

are sometimes packaged into cognitive automation modules designed to

support best practices for a particular industry or business process.

- There are a number of challenges related to RPA, which have limited its

use.

- Scalability - Enterprises have struggled to scale RPA automation initiatives

because, although RPA's software bots are relatively easy to implement,

they can be hard to govern and manage and therefore hard to scale.

- Limited abilities - While its name includes the words "process automation,"

many critics have pointed out that RPA software tools automate tasks. More

work is often required to stitch multiple tasks together into a process. Craig

Le Clair, an analyst at Forrester Research, has cautioned enterprises to

observe the "rule of five" in building RPA applications because they tend to

break when a bot must make more than five decisions, manipulate more

than five apps or make more than 500 clicks.


96
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Security - RPA bots sometimes need to access sensitive information to

complete their tasks. If they are compromised, they pose an additional

security risk for firms.

Limited resiliency - RPA failures can occur when applications change in

ways that are not anticipated by developers.

New QA issues - Bots require a variety of new QA practices to ensure they

continue to work as intended.

Privacy - Bots may be involved in working with personally identifiable

information governed by privacy requirements. Teams need to ensure this

data is processed in conformance with local data protection laws such as

GDPR. For example, if an RPA bot moved data outside of a given country

without encryption that would be a violation of Article 44 of GDPR. RPA

vendors are starting to seek ISO 27701 certification as a foundation for

managing sensitive information.

Efficiency - RPA bots manually plod through an application in the same way

a human does. This may not be as efficient as automating applications

through APIs or workflow automations baked into the application itself.


97
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Applications of RPA

Some of the top applications of RPA include the following:

Customer service - RPA helps companies provide better customer service

by automating contact center tasks, including verifying e-signatures,

uploading scanned documents and verifying information for automatic

approvals or rejections.

Accounting Organizations use RPA - for general accounting, operational

accounting, transactional reporting and budgeting.

Financial services - Companies in the financial services industry use RPA

for foreign exchange payments, automating account openings and closings,

managing audit requests and processing insurance claims.

Healthcare - Medical organizations use RPA for handling patient records,

claims, customer support, account management, billing, reporting and

analytics.

Human resources - RPA can automate HR tasks, including onboarding and

offboarding, updating employee information and time sheet submission

processes.

Supply chain - management RPA can be used in supply chain management

for procurement, automating order processing and payments, monitoring

inventory levels and tracking shipments.


98
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Virtual Reality vs Augmented Reality

Augmented Reality and Virtual Reality are important terms in an

increasingly digital world. Although they are two different technologies, both

terms are often used as synonyms. But what are the differences and

similarities between AR and VR?

- Virtual Reality (VR) is the use of computer technology to create a

simulated environment.

- Instead of viewing a screen in front of them, users are immersed and able

to interact with 3D worlds.


99
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Augmented Reality (AR) is the integration of digital information with the

user’s environment in real time.

Augmented Reality (AR) is an experience where designers enhance parts

of the user’s physical world with computer-generated input.

Difference between AR and VR

- Virtual Reality and Augmented Reality are two sides of the same coin. You

could think of Augmented Reality as a VR with one foot in the real world.

Augmented Reality simulates artificial objects in the real environment,

Virtual Reality creates an artificial environment to inhabit.

- Compared to AR, virtual reality (VR) provides a more immersive

experience by creating a completely artificial environment that replaces

reality. Augmented reality, on the other hand, augments the real-world

experience with virtual elements.


100
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Since VR provides a more immersive experience than AR, it often requires

special equipment and high-end computers. AR can be accessed with

smartphones or tablets which makes it accessible to a wider audience.

Benefits of AR and VR

1. Providing Training in a Safe and Affordable Manner

2. A better Way of Practicing Skills

3. Developing Soft Skill and Expertise

4. Helping Employees Develop Technical Skills

5. Getting Employees Ready for Emergencies

6. Enhance the Effectiveness of Learning Materials

7. The Best Way for Gamification

Three types of Virtual Reality

- NON-IMMERSIVE SIMULATION- Give users the most realistic experience

possible, complete with sight and sound. The VR headsets provide high-

resolution content with a wide field of view. Whether you’re flying or fighting

the bad guys, you’ll feel like you’re really there.


101
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- SEMI-IMMERSIVE SIMULATION - Provide users with a partially virtual

environment to interact with. This type of VR is mainly used for educational

and training purposes and the experience is made possible with graphical

computing and large projector systems.

- FULLY-IMMERSIVE SIMULATION- Are often forgotten as an actual type

of VR, honestly because it’s very common in our everyday lives. The

average video game is technically considered a non-immersive virtual

reality experience. Think about it, you’re sitting in a physical space,

interacting with a virtual one.


102
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Virtual Reality (VS): Advantages and Disadvantages

- Virtual Reality (VS): Advantages and Disadvantages

Advantages:

- Immersive learning is possible in an interactive environment.

- Users can explore the virtual world in all its facets.

- The education sector benefits from these new possibilities.

Disadvantages:

- A genuine interaction in the virtual environment is not possible.

- It is tempting to transfer one’s life completely to the virtual world.

- Even though training or learning in the VR environment is very beneficial,

it cannot completely replace the real training experience.


103
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Three Basic Characteristics of AR

1. Combination of real and virtual world.

2. Real-time interaction.

3. Accurate 3D registration of real and virtual objects.

Different types of Ars and their differences

- Marker-based AR - applications use target images (markers) to position

objects in a given space. These markers determine where the application

will place the 3D digital content within the user’s field of view. Early-stage

AR technologies were based on markers.

- Markerless AR - allows virtual 3D objects to be positioned in the real image

environment by examining the features present in the data in real time. This

type of guidance relies on the hardware of any smartphone, be it the

camera, GPS or accelerometer, among others, while the augmented reality

software completes the job.

Four Categories of Markerless AR

- Location-based AR- aims at the fusion of 3D virtual objects in the physical

space where the user is located. Clearly, this technology uses the location
104
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

and sensors of a smart device to position the virtual object at the desired

location or point of interest.

- Projection-based AR - This methodology is used for the delivery of digital

data within a stationary context, i.e. project-based AR focuses on rendering

virtual 3D objects within the user’s physical space.

- Overlay AR - Typically, this AR is used to replace the original view of an

object with an updated virtual image of that object for the human eye.

Overlay AR provides multiple views of a target object with the option to

display additional relevant information about that object.

- Contour-based AR - Essentially, this technology, through the use of

special cameras, is used for human eyes to outline specific objects with

lines to facilitate certain situations. For example, it can be used for car

navigation systems to enable safe driving in low visibility situations.

Augmented Reality (AR): Advantages and Disadvantages

Advantages:

- Enables individualized learning and enhances the learning process.

- AR offers a wide range of applications that are continuously being

improved.
105
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Technology makes it possible to increase accuracy and efficiency.

- Experience or knowledge can be shared over long distances.

Disadvantages:

- The costs of implementing AR are comparatively high.

- Many devices have only a low level of performance.

- A key disadvantage is the lack of user privacy.

- If the focus on security is neglected, the introduction of augmented reality

can lead to a security breach.

5G

- 5G is the 5th generation mobile network. It is a new global wireless

standard after 1G, 2G, 3G, and 4G networks. 5G enables a new kind of

network that is designed to connect virtually everyone and everything

together including machines, objects, and devices.

- 5G wireless technology is meant to deliver higher multi-Gbps peak data

speeds, ultra-low latency, more reliability, massive network capacity,

increased availability, and a more uniform user experience to more users.

Higher performance and improved efficiency empower new user

experiences and connect new industries.


106
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Who invented 5G

- No company or person owns 5G, but there are several companies within

the mobile ecosystem that are contributing to bringing 5G to life. Qualcomm

has played a major role in inventing the many foundational technologies that

drive the industry forward and make up 5G, the next wireless standard.

- 3GPP is driving many essential inventions across all aspects of 5G design,

from the air interface to the service layer. Other 3GPP 5G members range

from infrastructure vendors and component/device manufacturers to mobile

network operators and vertical service providers.

What are the differences between previous generations?

- The previous generations of mobile networks are 1G, 2G, 3G, and 4G.
107
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

First Generation: 1G

1980s: 1G delivered analog voice.

Second Generation: 2G

Early 1990s: 2G introduced digital voice (e.g., CDMA – Code Division

Multiple Access)

Third Generation: 3G

Early 2000s: 3G brought mobile data (e.g., CDMA2000)

Fourth Generation: 4

2010s: 4G LTE ushered in the era of mobile broadband.

- 1G, 2G, 3G, and 4G all led to 5G, which is designed to provide more

connectivity than was ever available before.

- 5G is a unified, more capable air interface. It has been designed with an

extended capacity to enable next-generation user experiences, empower

new deployment models and deliver new services.

- With high speeds, superior reliability and negligible latency, 5G will expand

the mobile ecosystem into new realms. 5G will impact every industry,
108
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

making safer transportation, remote healthcare, precision agriculture,

digitized logistics — and more — a reality.

Where is 5G being used?

5G Consists of two main components:

- RADIO ACCESS NETWORK - Includes Small Cells, Macro Cells, towers

and home systems connecting users and devices to the core network.

Macro Cells use multiple input and output antennas that enable one to send

and receive large volumes of data simultaneously, and Small Cells

complement these macro cells. Meanwhile, the core network of 5G

manages all the internet and data connections.

- CORE NETWORK- Is designed to integrate with the internet much more

efficiently. The core manages the advanced features of 5G, like network

function virtualization and network slicing.

How is 5G better than 4G?

5G is a unified platform that is more capable than 4G.

- While 4G LTE focuses on delivering much faster mobile broadband

services than 3G, 5G is designed to be a unified, more capable platform

that not only elevates mobile broadband experiences, but also supports new
109
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

services such as mission-critical communications and the massive IoT. 5G

can also natively support all spectrum types (licensed, shared, unlicensed)

and bands (low, mid, high), a wide range of deployment models (from

traditional macro-cells to hotspots), and new ways to interconnect (such as

device-to-device and multi-hop mesh).

5G uses spectrum better than 4G

- 5G is also designed to get the most out of every bit of spectrum across a

wide array of available spectrum regulatory paradigms and bands—from

low bands below 1 GHz, to mid bands from 1 GHz to 6 GHz, to high bands

known as millimeter wave (mmWave).

5G is faster than 4G

- 5G can be significantly faster than 4G, delivering up to 20 Gigabits-per-

second (Gbps) peak data rates and 100+ Megabits-per-second (Mbps)

average data rates.


110
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

5G has more capacity than 4G

- 5G is designed to support a 100x increase in traffic capacity and network

efficiency.

5G has lower latency than 4G

- 5G has significantly lower latency to deliver more instantaneous, real-time

access: a 10x decrease in end-to-end latency down to 1ms.

Three Main Types of Connected Services

Enhanced mobile broadband

- In addition to making our smartphones better, 5G mobile technology can

usher in new immersive experiences such as VR and AR with faster, more

uniform data rates, lower latency, and lower cost-per-bit.

Mission-critical communications

- 5G can enable new services that can transform industries with ultra-

reliable, available, low-latency links like remote control of critical

infrastructure, vehicles, and medical procedures.

Massive IoT

5G is meant to seamlessly connect a massive number of embedded

sensors in virtually everything through the ability to scale down in data rates,
111
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

power, and mobility—providing extremely lean and low-cost connectivity

solutions.

Advantage of 5G Technology

- Higher Download Speed - The 5G network will have the capacity to

increase download speeds by up to 20 times (from 200 Mbps (4G) to 10

Gbps (5G)) and decrease latency (response time between devices). These

speeds will maximize the browsing experience by facilitating processes

that, although possible today, still present difficulties.

- Hyperconnectivity - The 5G network promises the possibility of having a

hyper-interconnected environment to reach the point of having the much

desired “smart cities”. The correct performance of these new dynamics will

depend on the bandwidth of 5G and the Internet of Things (IoT).

- Process optimization - It is also expected to revolutionize areas such as

medicine (remote operations, for example), and traffic management and

autonomous vehicles, as well as its implementation in the construction

sector to optimize resources and reduce risks


112
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Disadvantages of 5G Technology

- Immediate Obsolescence - The transition to the 5G network will require

devices that can support it; current 4G devices do not have this capability

and will become immediately obsolete.

- Technological exclusion - The implementation of the 5G network also

implies a lack of immediate accessibility for average pockets, combined with

a delay in its implementation due to a lack of means for its use.

- Insufficient Infrastructure - For the 5G network to function properly will

require a whole ambitious investment in infrastructure to increase

bandwidth and expand coverage, and this is not cheap. This situation will

necessarily lead to delays in its implementation due to the high costs that

governments will have to cover for 5G to function properly

- Risks in security and proper data handling - All of this requires optimal

data management, and this is where the most conflictive part of the

advantages versus disadvantages lies. And the fact is that, in the

management of all this information, both from companies and individuals

and even governments, not only issues such as Big Data techniques are

involved in its study.


113
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

QUIZ

QUESTIONS:

1. He invented and patented a reprogrammable manipulator called

"uminate" from universal automation.

2. He is known as the father of robotics in the industry because of his efforts

and achievements.

3. He led a research team in developing a robot called "Shakey".

4. He is not only known as the father of robotics he has also documented

50 mechanical inventions.

5. It is responsible for welding or screwing on specific car parts.

(6-10 Choose if Advantages Of robotics or Disadvantages of robotics.)

6. This means that safety procedures are needed to protect humans and

other robots.

7. The use of robots can create problems in our economy.

8. Robots have some sensors/ actuators which are more capable than

humans.

9. Robots can only do what they are told to do they can't improvise

10. Unlike humans, robots don't get bored.

11-13. What are the 3 types of Virtual Reality?


114
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

14-17. What are the 4 categories of markerless augmented reality?

18. This type of guidance relies on the hardware of any smartphone, be it

the camera, GPS or accelerometer, among others.

A. Markerless AR B. Contour based AR

C. Marker based AR D. Location based AR

19. In early 1990 this Generation introduced digital voice.

A. Second Generation B. Fourth Generation

C. First Generation D. Fifth Generation

20. 5G manages all the internet and data connection.

A. Macro cell B. Radio Access network

C. Core network D. Small cell

(Essay)10pts.

How does 5G affect the environment?

How can RPA help make your daily work life easier?

References:

https://www.linkedin.com/company/fintelics/?viewAsMember=true.

https://www.fintelics.com/

https://www.robots.com/articles/three-types-of-robotic-systems
115
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

https://www.lib.iastate.edu/news/father-

robotics#:~:text=Al%2DJazari%20is%20not%20only,connecting%20rod%

2C%20programmable%20automaton%2C%20humanoid

https://cs.stanford.edu/people/eroberts/courses/soco/projects/1998-

99/robotics/history.html#:~:text=In%20the%20late%201960s%2C%20busi

nessman,%22the%20Father%20of%20Robotics.%22

https://www.futurelearn.com/info/courses/begin-

robotics/0/steps/2845#:~:text=In%20many%20situations%20robots%20ca

n,example%20in%20manufacturing%20of%20microelectronics

https://www.iberdrola.com/innovation/virtual-

reality#:~:text=Virtual%20Reality%20(VR)%20is%20a,Virtual%20Reality%

20headset%20or%20helmet.

https://www.sciencedirect.com/topics/computer-science/virtual-reality-

technology

https://learn.g2.com/virtual-reality

https://www.techtarget.com/whatis/definition/augmented-reality-

AR?amp=1

https://softtek.eu/en/tech-magazine-en/user-experience-en/what-are-the-

different-types-of-augmented-reality/
116
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

https://www.teamviewer.com/en-us/augmented-reality-ar-vs-virtual-reality-

vr/

https://www.qualcomm.com/5g/what-is-5g

Jarquio, Miracle S.

Reporter
117
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Miniaturized and
Multifunctional
Machines
(Lotoc, Michella A.)
118
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

What are Miniaturized and Multifunctional Machines?

- It is the trend to manufacture ever smaller mechanical, optical and

electronic product and devices.

- Examples include miniaturization of mobile phones, computers and

vehicle engine downsizing.

Examples of Miniaturized and Multifunctional Machine

Mobile Phones

- A mobile phone, cellular phone, cell phone, cellphone, handphone, hand

phone or pocket phone, sometimes shortened to simply mobile, cell, or

just phone, is a portable telephone that can make and receive calls over

a radio frequency link while the user is moving within a telephone service

area. The radio frequency link establishes a connection to the switching

systems of a mobile phone operator, which provides access to the public

switched telephone network (PSTN).


119
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Mobile phones (or cell phones as they are often called in the USA) have

radically altered the way that people work, socialize, organize, and entertain

themselves.

- Communication

- Photos and videos

- Fashion and self – expression

- Entertainment

- Video real time

- Navigation

- Remote work

- Calculator

- Learning

- News and events updates

- Crime prevention and evidence gathering

Computers

- A computer is a digital electronic machine that can be programmed

to carry out sequences of arithmetic or logical operations computation

automatically. Modern computers can perform generic sets of operations

known as programs. These programs enable computers to perform a wide


120
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

range of tasks. A computer system is a "complete" computer that includes

the hardware, operating system (main software), and peripheral equipment

needed and used for "full" operation. This term may also refer to a group of

computers that are linked and function together, such as a computer

network or computer cluster.

- Miniaturization has inherent advantages such as greater density and thus

shorter signal paths. Smaller electronics therefore enable higher

frequencies and clock rates.

- It’s easier to transport making your work mobile as it can be done

anywhere.

Engine Downsizing

- In the automotive industry, engine downsizing is the practice of utilizing

smaller combustion engines over larger ones of the same power capacity

when manufacturing vehicles. It is the result of car manufacturers


121
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

attempting to provide more efficient vehicles that emit fewer emissions,

often mandated by legislative standards. The term generally relates to

traditional internal combustion engines powered by petrol or diesel.

Benefits of Miniaturized and Multifunctional Machines

- Mobility

- Compact

- Faster data processing because of smaller components

- Cost efficiency materials

QUIZ

1-4. What are miniaturized and multifunctional machines?

5-6. Give 2 examples of miniaturized and multifunctional machines

7-10. Give the benefits of miniaturizing and multifunctional machines?

11-15. For you, what is the importance of miniaturized and multifunctional

machines nowadays?

16-20. Give 1 example of miniaturized and multifunctional machines and

explain why they better than other examples


122
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

References:

https://datapdf.com/the-single-probe-a-miniaturized-multifunctional-device-

for-s.html

Lotoc, Michella A.

Reporter
123
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

ICT Enabled Industry


(Moncada, Justin M.)
124
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

What is ICT?

- ICT Stands for Information and Communication Technology.

- ICT Refers Technologies that provide access to information through

telecommunications.

ICT Industry

- As the computer industry expanded beyond number crunching to data

storage and decision support, the IT industry evolved.

- The ICT industry is a result of that evolution; a convergence between the

IT industry and the telecommunication industry.

Business Process Outsourcing (BPO)

What is Business Process Outsourcing?

- Business process outsourcing (BPO) is a business practice in which an

organization contracts with an external service provider to perform an

essential business function or task.


125
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

What is Outsourcing?

- Outsourcing is an agreement in which one company hires another

company to be responsible for a planned or existing activity that is or could

be done internally, and sometimes involves transferring employees and

assets from one firm to another.

Types of BPO

Front-Office Outsourcing

- This term refers to customer-facing services, including tech support,

customer service, sales, and marketing. These services are frequently

outsourced due to technical knowledge requirements and can be

accomplished off-premises. By outsourcing web development, customer

support lines, or any front office services, businesses can benefit from

specialized talent with unique knowledge and cut costs.

Front-Office Outsourcing Examples

- Customer Service

- Technical Support

- Helpdesk Support

- Marketing
126
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Back-Office Outsourcing

- Back-office business process outsourcing involves contracting services

that are not customer-facing. These services include IT, accounting,

business process automation, human resources, quality assurance, and

more. Subtypes of BPO have emerged, including IT-Enabled Services

(ITES) BPO, such as IT analysts, Legal Process Outsourcing (LPO), such

as paralegals or advisors, and Knowledge Process Outsourcing (KPO),

such as outsourcing an individual who understands and can

implement/manage a specific program. By outsourcing these tasks,

businesses can focus on their core mission rather than engaging in time-

consuming and expensive internal training and onboarding.

Back-Office Outsourcing Examples

- Accounting

- IT Services

- Logistics

- Human Resources
127
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Off-Shore Outsourcing

- Offshoring occurs when services are outsourced overseas. This is

incentivized by available resources, political stability, lower labor costs,

various tax savings, and more. A common example is companies

outsourcing their customer service departments by contracting with call

center vendors across the world. As a result, businesses can access

qualified labor and services at a lower rate, which helps reduce overhead

costs, and potentially lower product or service prices for the end-user.

Off-Shore Outsourcing Examples

- Call Centers

- Help desk

- Accounting Services

Nearshore Outsourcing

- Nearshore business process outsourcing is the act of contracting the

services of vendors in countries that are geographically closer. For

businesses in the US, this could include Canada and Mexico, as well as

Central America. This form of outsourcing usually occurs when specialized

skills are available at a lower cost in a nearby nation, but certain factors,
128
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

such as time zones or language proficiencies, need to be taken into

account. An example of this is when a Silicon Valley company outsources

IT and coding services to specialists in Canada, or when a Canadian

company outsources marketing services from a marketing firm in the U.S.

Onshore/Domestic BPO

- Domestic outsourcing is exactly as it sounds: the act of outsourcing and

receiving services within the boundaries of a country. In other words, a

vendor in one city, state, or province can be contracted for services provided

to business in another city, state, or province. This can be prompted by a

number of factors, such as the availability of specialized skills in certain

regions, or local differences in rates and costs.


129
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

References:

https://oworkers.com/what-are-the-benefits-of-business-process-

outsourcing/

Moncada, Justin M.

Reporter
130
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Intelligence Gathering
& Information Warfare
(Mondoñedo, Redentor C.)
131
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Intelligence Gathering

- Is the process of collecting information, meaning, pronunciation,

translation and examples.

Intelligence Gathering separated into different modes

Open-Source Intelligence (OSINT)

- is the process of gathering intelligence from publicly available resources

(including Internet and others).

Cyber Intelligence (OSINT)

- is the process of explicitly gaining intelligence from available resources on

the Internet.

Human Intelligence (HUMINT)

- is the process of gaining intelligence from humans or individuals by

analyzing behavioral responses through direct interaction.


132
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Imagery Intelligence (IMINT)

- Imagery intelligence includes things like maps and GPS images. It is

extremely useful for helping to understand the surrounding environment of

the property you provide security for like major roads, public transit routes,

parking lots, and public spaces.

What is the purpose of Intelligence Gathering?

- Intelligence gathering simply requires an Internet connection, with little

additional cost incurred by the attacker. intelligence gathering refers to

querying online public resources that provide information specific to the

targeted individuals.

Types of Intelligence Gathering

Competitive Intelligence

- Relies solely on legal and ethical means to gather data, piece it together

to form information, and analyze it to create intelligence for the use of

decision-makers.
133
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Corporate Espionage

- Espionage – the collection, collation, and analysis of illicitly gained

information.

Corporate Espionage – the theft of trade secrets for economic gain.

Information Warfare

- According to NATO - is an operation conducted in order to gain an

information advantage over the opponent.

Information Warfare

- is the manipulation of information trusted by a target without the target's

awareness so that the target will make decisions against their interest but

in the interest of the one conducting information warfare. As a result, it is

not clear when information warfare begins, ends, and how strong or

destructive it is. Information warfare is also known as cyberwarfare,

electronic warfare and cyberattack.


134
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Difference of Information Warfare to Traditional Warfare

- In traditional warfare, the goal is to kill or injure people and destroy

facilities. Contrastingly, in information warfare, the goal is to manipulate

information in some way. Either to try and gain more information, destroy

existing information or change the information that is circulating.

Information Operations

- Is an action taken to affect adversary information and information systems

while defending one’s own information and information systems.


135
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Information Warfare Categories

Offensive - deny, corrupt, destroy, or exploit an adversary’s information,

and influence the adversary’s perception.

Exploitative – exploit available information to enhance the nation’s

decision/action cycle, and disrupt the adversary’s cycle

Defensive – Safeguard the nation and allies from similar actions, also

known as IW hardening.

Information Operation Target


136
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Attacks in Information Warfare

Sources of attack

• Internal

• External

Forms of attack

• Data attack

• Software/Threats Attack

• Physical Attack

Classes of attack

• Passive Attack

• Active Attack

Types of Attacks

Most common type of attacks

- Denial of Service

- Web Defacement

- Theft

- Viruses and Worms

- Bugs
137
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Defense in Information Warfare

- Awareness

- Policies

- Information Assurance

- Military forces

- Intelligence

- Cooperation between government and private sector

Information Warfare Tactics Process

- Covertly probe and document the results.

- Once inside, check for other systems.

- Once inside, find and transmit sensitive information.

- Once inside, set Logic Bombs, Trojan Horses and Trap Doors.

- Erase evidence of intrusion.

- Search for additional systems of the nation-state.


138
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Advantages and Disadvantages of Information Warfare

Advantage:

• Less human casualities

• Less cost

• Information Technology

Disadvantage:

• Trust

• Unexpected result

• Terrorism

• Undeclared War

QUIZ

True or False. (10pts)

1.) Information Warfare is the manipulation of information trusted by a target

without the target's awareness.

2.) Conventional warfare is a war in which nuclear weapons are the main

factor used to force the enemy to surrender.


139
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

3.) In traditional warfare, the goal is to kill or injure people and destroy

facilities.

4.) Bugs are malicious programs that self-replicate on computers via

computer networks.

5.) Theft is a term used to describe a crime that involves taking a person’s

property without his consent.

6.) Viruses and worms Is an attack in which malicious parties penetrate a

website and replace content on the site with their own messages.

7.) Offensive is to safeguard the nation and allies from similar actions

8.) Defensive is to deny or exploit an adversary’s information

9.) Freedom is war can gain independence from a mother country

10.) Destruction of cities is the more damage there is the more it will cost to

fix.

Multiple Choice (5pts)

1. a form of warfare conducted by using battlefield tactics between two or

more states in open confrontation

a. Asymmetric warfare

b. Nuclear Warfare

c. Conventional Warfare
140
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

d. Chemical Warfare

2. The most dangerous weapons on earth. One can destroy a whole city,

potentially killing millions, and jeopardizing the natural environment

a. Nuclear Warfare

b. Chemical warfare

c. Asymmetric warfare

d. Civil warfare

3. A war between citizens of the same country

a. Chemical Warfare

b. Nuclear Warfare

c. Civil Warfare

d. Conventional Warfare

4. Is the process of collecting information, meaning, pronunciation,

translation and examples.

a. HUMINT

b. OSINT

c. Intelligence Gathering

d. Cyber Intelligence
141
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

5. It is extremely useful for helping to understand the surrounding

environment of the property, you provide security for like major roads, public

transit routes, parking lots, and public spaces.

a. Imaginary intelligence

b. Human intelligence

c. Cyber intelligence

d. Open-source Intelligence

Enumeration:

1.) Give the 5 types common Attack? (5pts)

2.) Give 3 Disadvantages of Information Warfare? (3pts)

3.) Give 2 Advantages of Information Warfare? (2pts)

Essay: In your opinion, how does information warfare affect us? (5pts)

References:

https://www.sciencedirect.com/topics/social-sciences/information-warfare

https://www.sciencedirect.com/topics/computer-science/intelligence-

gathering

Mondoñedo, Redentor C.

Reporter
142
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

E-Health and Virtual


Therapy
(Tatlong Hari, Jarred David)
143
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

E-Health

- begins at least in 1999 and is supported by electronic procedures and

communications, which is a relatively new health care practice It does not

only refer to "Internet Medicine", as defined, but also to "almost anything

linked to computers and medicine. locally, regionally and worldwide by

using information and communication technology. E-Health is an emerging

field in the intersection of medical informatics, public health and services,

referring to health services and information delivered or enhanced through

the internet and related technologies.

E-Health Tools

- are technologies that may include electronic medical records (EMRs),

personal health records (PHRs), mobile apps, patient portals, information

repositories, and many other internet-based programs or software used to

help patients monitor and manage their health.

The Coala Heart Monitor and system consists of the following parts:

The Coala Heart Monitor: A small hand-held device that is pressed against

the chest for simultaneous recordings of ECG and heart sounds through

electrodes and a stethoscope membrane.


144
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

The Coala App: Installed on a compatible Smartphone, together with the

Coala Heart Monitor is used to record, store, transmit, and view

measurements directly in your Smartphone. Measurements are transmitted

from the app to the Coala Care Portal server for analysis and the analyzed

result can be viewed within minutes in the Coala App. The app also features

a messaging system where you can receive messages and notifications

from your Healthcare provider.

The Coala Care Portal: The sever that provides detection of cardiac rhythm

deviations, stores all your recorded measurements and manages your

Coala App account.

What are the 10 Es in E-Health

1. Efficiency - increasing in health care efficiency and decreasing its costs.

One of the ways of decreasing cost would be by avoiding duplicative or

unnecessary diagnostic or therapeutic intervention, though enhanced

communication possibilities between health care establishments and

through patient involvement


145
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

2. Enhancing Quality - E-health may enhance the quality of health care for

example by allowing comparisons between different providers, involving

consumers as additional power for quality assurance, and directing patient

streams to the best quality providers.

3. Evidence based - e-health interventions should be evidence-based in a

sense that their effectiveness and efficiency should not be assumed but

proven by rigorous scientific evaluation. Much work still has to be done in

this area.

4. Empowerment - by making the knowledge bases of medicine and

personal electronic records accessible to consumers over the Internet, e-

health opens new avenues for patient-centered medicine, and enables

evidence-based patient choice.

5. Encouragement - of a new relationship between the patient and health

professional, towards a true partnership, where decisions are made in a

shared manner.

6. Education - for both patient and providers to expand knowledge through

research or healthcare information

7. Enabling - promotes information discussion and communication

between health care institutions in a consistent way.


146
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

8. Extension - the scope of health care beyond its conventional boundaries.

This is meant in both a geographical sense as well as in a conceptual sense.

e-health enables consumers to easily obtain health services online from

global providers. These services can range from simple advice to more

complex interventions or products such as pharmaceuticals.

9. Ethics - e-health consist of new forms of patient and physician

communication, poses new challenges

and pressures to ethical issues.

10. Equity - e-health should be accessible regardless of age, gender, race,

and ethnicity etc. E-health could provide services for the rich or poor.

What is Telemedicine

- It is a way of providing health care through electronic devices like cell

phone, laptop, and computers. The internet and the rise of smart devices

gives healthcare capability to provide health care to patients in their home,

workplace or assisted living facilities as an alternative to in-person visits.

Telehealth

- Is a wide phrase that includes health information services, examples of

telehealth are health education services, monitoring vital signs, monitoring


147
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

blood pressure and remote consultations? telehealth allows the healthcare

provider to diagnose and evaluate the patients remotely.

Telecare

- It refers to the technology that keeps the freedom and safety for the

patients while still living at their homes. For example, computers and

cellphones are used as monitoring devices, medical warning systems, and

telecommunication technology.

Telemedicine vs Telehealth

- Telehealth is different from telemedicine because it refers to a wider scope

of remote healthcare services. Telemedicine refers to clinical services while

telehealth refers to non-clinical services. For example, provider training,

administrative meetings and continuing medical education.

Benefits of Telemedicine Services

- Physicians or providers can assist patients without actually meeting them

in person. Telemedicine can offer certain types of therapy like speech and

physical therapy, also, mental health related cases.


148
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

What is Virtual Therapy

- It is a type of telemedicine; it includes any treatment that a person seeks

through technology.

Types of Virtual Therapy

1. Virtual psychotherapy

Sometimes called telepsychology, treats people with mental health issues,

relationship or sexual health problems, or significant stress via video chat,

email, phone, text massaging.

2. Virtual physical therapy

Offers traditional care but in an online or phone-based setting.

Some physical therapy apps offer additional exercises or allow a client to

track their progress between sessions.

3. Virtual speech therapy

It can treat speech disorders, such as stutter, aphasia from a stroke, or

pronunciation difficulties.

4. Virtual occupational therapy

It helps people master specific life skills. For example, a person with speech

issues resulting from a stroke might choose speech therapy, then use
149
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

occupational therapy to help them master the motor skills necessary to use

a speech assistive device.

Benefits of Virtual Therapy

Accessibility - because you can attend counseling or consultation with

your doctor with the use of technology.

Affordability - typically virtual therapy is 80% less expensive than face-to-

face therapy

Convenience – because you can schedule sessions anytime that are the

most convenient for you.

Disadvantages of Virtual Therapy

Privacy issue - Since information is being transmitted online, the situation

makes privacy leaks and hacks more of a concern. Technology problems

can also make it difficult to access treatment when you really need it.

Lack of response to crisis situations - If a client is experiencing suicidal

thoughts or has suffered a personal tragedy, it can be difficult or even

impossible for the therapist to provide direct assistance.


150
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Not appropriate for serious psychiatric illnesses - E-therapy can be

useful for a variety of situations, but not when it comes to people that require

close and direct treatment or in-person intervention.

For example, if you have a serious addiction or have more severe or

complex symptoms of a mental health condition, online therapy may not be

recommended unless other in-person therapies or treatments are also

involved in your plan. The scope of online therapy can be limited, so it may

not be effective for more complex situations.

QUIZ

Test I: True or False

1.) E-health begins at least in the 1950's.

2.) E-health is only defined as "internet medicine".

3.) E-health is a new way of delivering health care.

4.) E-health tools are technologies used to help patients monitor and

manage their health.

5.) Coala App is an example of an E-health tool.

Test II: Give the following

6 - 10. Give 5 out of 10 e's in e-health.


151
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

11 & 12. Difference between telemedicine and telehealth.

13. What is virtual therapy?

14 - 15. Give the types of virtual therapy.

Test III: Essay

16-20 As an I.T student do you think using ICT to deliver health care is

effective? why?

References:

https://www.publichealthnotes.com/what-is-e-health-its-characteristics-

benefits-and-challenges/

https://www.publichealthnotes.com/what-is-e-health-its-characteristics-

benefits-and-challenges/

https://chironhealth.com/telemedicine/what-is-telemedicine/

https://www.medicalnewstoday.com/articles/virtual-therapy

https://www.verywellmind.com/what-is-online-therapy-2795752

Tatlong Hari, Jarred David

Reporter
152
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Mobile Based Service


Industries
(Pabello, Brian Angelo S.)
153
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Mobile Based Service Industries

- The mobile services industry is defined as those companies, which

together enable the provision of telecommunication, information, and

entertainment services including voice, internet, SMS, text, and other data

Service.

Mobile Services Market Current Trends

- Mobile development has become a priority and the new normal for many

businesses. Without mobile-optimized solutions, companies undoubtedly

risk losing a significant number of clients and lagging behind the

competition. In this article, we’ve compiled the main mobile trends now and

for the coming years.

- The increased adoption of mobile devices has led to the remarkable

growth of the mobile app industry.

- Currently, there are about 5.31 billion unique mobile users worldwide,

according to GSMA Intelligence.

In 2021, users downloaded 230 billion applications to their mobile devices,

which is a 63% increase since 2016, according to Statista.


154
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

The revenue of Android and iOS mobile applications reached $133 billion

in 2021, according to BusinessofApps.

Major Industry Players

- Many of the largest mobile services providers have made steps towards

addressing sustainability. but even the leader still has room to grow in this

area. Vodafone, the largest provider in Europe. Africa and the Middle East,

is leading the industry with its integrated sustainability strategy; while China

Mobile has committed to a range of both environmental and social

initiatives. AT&T, the largest provider in the United States.

- Some of the global mobile services industry players are Vodafone, China

Mobile, and AT&T, Reliance communications, MTN group, bsnl, Verizon,

Orange, etc.

- Vodafone is recognized as a sustainability leader in the industry. It ranked

#11 out of all global companies in the 2010 Newsweek Global Green

Rankings. What makes Vodafone stand out from the competition is its

comprehensive sustainability strategy, which is aimed at leveraging mobile

technology to shape a more sustainable society particularly in the


155
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

developing world. Aside from making progress on reducing its carbon

emissions, Vodafone sees opportunity in leveraging sustainability

challenges as a key stimulus for innovation within its business. With its

broad reach in emerging economies in Africa, Asia and the Middle East, the

company is developing services that "enable more efficient and effective

healthcare; access to basic financial services to mobile payment solutions,

and machine-to-machine applications that can bring substantial carbon and

energy cost savings".

- China Mobile is the first mainland Chinese Company to be listed on the

Dow Jones Sustainability Index. The company is committed to triple-

bottom-line principles as well as active stakeholder engagement, as the

company believes that Responsibility Makes Perfection (China Mobile,

2010. 60 percent market penetration rate. It is best known for its excellent

services to underprivileged people living in rural areas. The company has

tirelessly sought to provide excellent information and communication

services to those that would otherwise be at a disadvantage. Farmers are

able to get up-to-date price information on crops and livestock and are able

to buy and sell agricultural products using China Mobile Services


156
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Historically, AT&T has not been recognized in the industry as a leader in

the sustainability movement. However, over the last few years, they have

made significant company-wide shifts in the prioritization of sustainability

initiatives. Today. AT&T is deeply engaged in environmental sustainability

efforts, and through their commitment, they have developed aggressive

initiatives to help them become more energy efficient and to engage their

key stakeholders in helping the company minimize their environmental

impact.

Local Industry Players

- Globe

- Gomo

- Sun cellular

- TM

- Smart

- TNT

- PLDT

- Converge ICT
157
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Globe Telecom, Inc., commonly shortened as Globe, is a major provider

of telecommunications services in the Philippines. The company operates

the largest mobile network in the Philippines and one of the largest fixed-

line and broadband networks.

- GOMO is the country’s first fully digital telco owned and operated by

Singapore’s Singtel and is locally powered by Globe. It functions like every

mobile network provider in the country minus its own frequency (because it

is riding on Globe’s network

- Sun Cellular is a wholly-owned subsidiary of DIGITEL, and is one of the

Philippines’ leading mobile telecommunications companies. It was

established by DIGITEL in September 2001 to provide wireless public and

private telecommunications services.

- TM was launched on September 12, 2001 as Touch Mobile, initially

catering to the middle-income market, and has since covered lower-income

groups as well, making it Globe’s value brand offering. The service has

gained popularity for its discounted call and messaging services, with the

“All Network” offers allowing TM subscribers to communicate with users

from other local networks


158
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Smart Communications Inc., commonly referred to as Smart (and officially

stylized/ self-styled as SMART), is a wholly owned wireless communications

and digital services subsidiary of PLDT Inc., A telecommunications and

digital services provider based in the Philippines.[3] The company has 73

million mobile subscribers as of 2020, under the brands Smart, Sun, and

TNT. Smart’s wireless broadband subscribers number 3.8 million under the

brands Smart Bro and Sun Wireless Broadband.

- TNT (formerly known as Piltel, Mobiline, Phone Pal, and still unofficially

known as Talk ‘N Text) is a cellular service of Smart Communications in the

Philippines.[1] By April 2000, Piltel launched its GSM brand, Talk ‘N Text.

Piltel also reported 16,590,737 subscribers to its GSM brand, Talk ‘N Text,

before its transfer to Smart. Piltel used the 912 area code for its

AMPS/CDMA service. However, it is now used for TNT.

- PLDT, Inc., formerly known as the Philippine Long Distance Telephone

Company, is a Philippine telecommunications, internet and digital service

holdings company. It is one of the country's major telecommunications

providers, along with Globe Telecom and startup Dito Telecommunity


159
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Converge ICT is the fastest growing fiber internet and other digital

consumer-centric services provider in the country today. The premium

products and services we offer run through the first pure end-to-end fiber

internet network in the country.

Impacts of Mobile Technology on Service Based

Businesses

- We live in an era where we can get the information we need at the tap of

a button, but this is not reflected in many service-based businesses in the

UK. Whether it’s due to resistance or being too busy to change, there may

never seem like an appropriate time for these companies to change to a

digital process. But for the businesses that have adapted to a digital

environment, they have been heavily impacted by a range of factors.

5 Key Impacts of Mobile Technology on Service Based

Businesses

1. Faster Business Growth - Looking back 10 years and the cost of

starting a new business was significantly higher than it is today. Cloud-

based technology and the use of mobile devices have resulted in a cost-

effective way to start and scale a business. Mobile technology has provided
160
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

workers with the option of working remotely. Without the need to work from

a base you can place a worker somewhere else in the world while they still

have access to the IT network, staying connected to the business and

appealing to a wider audience.

2. Worker Satisfaction & Safety - Technology has introduced flexible

working; working at any time from any location. As a result, it increases

worker satisfaction. Furthermore, with mobile technology keeping all parties

better connected there is an increased vision of where workers are and what

jobs they have completed, leading to more accurate appraisals. As workers

can now operate on a mobile device, managers can ensure they have all

the correct health and safety protocol send and stored on the device, by

instant messenger, email or job management software. Any paper

documentation can be replaces ensuring the worker can't lose it, as it is

easily retrievable on the device.

3. Better Communication - Since businesses have adopted digital ways

of working, communication has vastly improved amongst the workforce –

even if they are working remotely. Mobile services such as Slack and

WhatsApp allow for instantaneous messages to be sent, enabling tighter

communication channels.
161
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

With instant communication channels amongst the workforce, any job

details can be gathered and customers can be informed in minutes, rather

than waiting for workers to return to the office. This provides a better service

for customers, heightening the chance of customer retention. Workers can

now access all of their job information on a device, and with the use of digital

forms job data can be captured and transferred immediately back to the

office.

4. Time and Money Savings - One of the most valuable things in life is our

time. Mobile technology reduces hours of wasted time as the connectivity

streamlines various processes e.g., apps can now replace physical forms,

whilst filing, scanning and administration processes are able to be reduced

or removed. With technology removing many onerous processes, it creates

more free time which can be reinvested back into the business to focus on

growth and development. With the option to take payment on devices and

complete all aspects of a job through the use of mobile technology, workers

don't need much interference from the office or have to waste time driving

around to collect and drop off job data.

5. Removing Paper - Even now, most UK businesses still rely on paper or

spreadsheets to record and store job information. With an increasing

number of apps aimed at removing the paper trail and providing mobile

workers with the right tools to operate when they are out and about, service
162
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

businesses can operate more efficiently. Mobile workers no longer have to

deal with paper or have to deliver job sheets back to the office. Cloud-based

technology enables businesses of all sizes to transfer documents and files

from any location.

QUIZ

1-5. Give 5 Local Industry Players

6-10. Give 5 Key Impacts that Mobile Technology has on Service Based

Businesses

11-15. What is the Definition of Major Industry Players?

16-20. Choose 1 of 5 Key Impacts that Mobile Technology has on Service

Based Businesses and explain how it impacts on businesses and on

yourself.

21-30. Explain the impact of Mobile Based Service Industries in your life

and cite scenarios if Mobile Based Service Industries does not exist. (At

least 5 sentences.

References:

https://www.slideshare.net/kellyhautjames/james-kelly-mobile-industry-

researchf

https://www.slideshare.net/kellyhautjames/mobile-services-industry
163
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

https://en.m.wikipedia.org/wiki/TM_(cellular_service)#:~:text=TM%20(form

erly%20known%20as%20Islacom,Filipino%20telecommunications%20co

mpany%20Globe%20Telecom.

https://www.mymobileworkers.com/blog/impacts-of-mobile-technology-on-

service-based-businesses

https://www.trade.gov/market-intelligence/philippine-telecommunications-

market

https://www.definitions.net/definition/PLDT

https://corporate.convergeict.com/

Pabello, Brian Angelo S.

Reporter
164
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

E-Service &
E-Government
(Pabello, Gian Carlo S.)
165
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

What is E-Government?

- Digital government services (also called e-government) are defined as

service delivery within government — as well as between government and

the public — using information and communication technologies.

- Traditionally, government services have been delivered in person, by

individual departments in different locations, and often using paper forms.

With digital services, the government can deliver information and services

to citizens anytime, anywhere, and on any platform or device.

Disadvantages of E-Government?

- The main disadvantages concerning e-government are that there exists a

digital divide and digital inequalities that bar certain people from accessing

the full benefits of digitization.

- Often does not offer the “potential to reach many users including those

who live in remote areas.

- Have low literacy levels

- Existence on poverty line incomes.

- Homeless people.

- People in poverty.
166
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Benefits of Digital Government Services

- Reduces inequality.

- Increased public participation.

- Improved internal efficiency and productivity.

- Reduced labor costs.

- Better collaboration among departments.

- More innovation.

- E-governance raises the transparency, accountability, efficiency, and

effectiveness and inclusiveness in the governing process in terms of reliable

access to the information.

4 Types of E-Government

- Government-to-Citizen (G2C).

- Government-to-Business (G2B).

- Government-to-Employee (G2E).

- Government-to-Government (G2G).
167
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Government to Citizens (G2C)

- As people are the key concept of politics and government as well as

governance, the government is compelled to connect with citizens through

the transparent and accountable order.

- Approaches such as setting up websites where citizens can download

forms, government information, etc.

Examples of G2C

- Registration of motor vehicles.

- Issue of driving licenses.

- Availability of the e-learning modules to the citizens.

- Linking of various hospitals in different parts of the country to ensure better

medical services to citizens.


168
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Online job portal and various customer services.

- Payment of utility bills.

Government to Business (G2B)

- Is a relationship between businesses and government, where government

agencies of various levels provide services or information to a business

entity via government portals or with the help of other IT solutions.

- The essentials for achievement of G2B services for secure and authentic

transactions include: Standards for electronic transactions, a secure

payment mechanism and public key infrastructure.

Examples of G2B

- E-taxation

- Getting a license from the government etc.

- Secure Electronic Transactions.

- Electronic auctions.

- Electronic procurement marketplaces.

- Sending electronic payments.


169
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Government to Employees (G2E)

- Is a relationship between businesses and government, where government

agencies of various levels provide services or information to a business

entity via government portals or with the help of other IT solutions.

Examples of G2E

- E-learning methods.

- Sending electronic payments.

- Payment of utility bills.

- Online job portal and various customer services.

Government to Government (G2G)

- G2G has been referring to raising the quality of the government process

by cost cutting, managing performance, and making strategic connections

within government.

- It enables government institutions to be more efficient and more effective

by the use of IT tools.


170
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Examples of G2G

- Live fingerprints scanning.

- Verification.

- Electronic entry of reports and paperwork etc.

High Level of Trust in Government

- Citizens have better understanding through E-government that gives

transparency on reliable access to the information.

- It reduces inequality.

- Increased public participation.

QUIZ

Multiple-Choice (2 points each):

1. Digital government services (also called e-government) are defined as?

A. delivery within government as well as between government and the

public

B. Information communication technology

C. E-Services

D. E-Government
171
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

2. Traditionally, government services have been delivered in person by?

A. Individual departments

B. Robots

C. E-Government

D. Police

3. E-governance raises the?

A. Transparency, accountability, efficiency.

B. E-Government

C. Technology

D. E-services

4. Give one of the 4 types of e government

A. Government to citizens

B. Government to individual

C. Government to information

D. Government to accountability

5. Approaches such as?

A. Setting up websites

B. E-Government

C. Technology

D. Government to citizens
172
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

6. Choose one example of G2C

A. Registration of motor vehicles

B. Government

C. E services

D. Technology

7. Meaning of Government to Business

A. Is a relationship between businesses and government.

B. Agencies

C. Government portals

D. Payment mechanism

8. Choose one example of G2B

A. Sending electronic payments.

B. E-Government

C. Payment mechanism

D. Technology

9. Is the online interactions through instantaneous communication tools

A. Government to employees

B. Government to Business

C. Government to government

D. Government to citizens
173
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

10. Choose one example of G2E

A. E-learning methods.

B. E-Government

C. Technology

D. Government to citizens

11-14. (if the answer is correct 11-14 would be 5 points).

Give one of the three impacts of high-level trust in government.

Essay: (5 points)

For you what are the benefits of E-Government?

References:

https://granicus.com/dictionary/digital-government-

services/#:~:text=Digital%20government%20services%20(also%20called,

applying%20for%20a%20pet%20license.

https://e-governnsc.weebly.com/types.html

https://www.researchgate.net/figure/Types-of-e-

government_fig1_307892702

https://en.m.wikipedia.org/wiki/E-government
174
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

https://schoolofpoliticalscience.com/what-is-e-governance/

https://www.google.com/amp/s/snov.io/glossary/g2b/amp/

Pabello, Gian Carlo S.

Reporter
175
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Internet Censorship
(Ragodon, Roan Angel R. &
Raro, Justin C.)
176
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Internet Censorship

- The Internet is the foremost important tool and the prominent resource that

is being used by almost every person across the globe. It connects millions

of computers, webpages, websites, and servers. Using the internet we can

send emails, photos, videos, and messages to our loved ones. Or in other

words, the internet is a widespread interconnected network of computers

and electronics devices (that support the internet). It creates a

communication medium to share and get information online. If your device

is connected to the Internet then only you will be able to access all the

applications, websites, social media apps, and many more services. It is

managed by organizations that develop global protocols, such as Internet

Assigned Numbers Authority (or IANA).

Advantages of Internet

- Online Banking and Transaction

- Education, online jobs, freelancing

- Entertainment

- New job roles

- Best Communication medium

- Comfort to human
177
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- GPS tracking and google maps

Disadvantages of Internet

- Time wastage

- Bad impact on health

- Cyber Crimes

- Effects on children

- Bullying and Spreading negativity

The Internet Assigned Numbers Authority (IANA)

- The Internet Assigned Numbers Authority (IANA) is a standards

organization that oversees global IP address allocation, autonomous

system number allocation, root zone management in the Domain Name

System (DNS), media types, and other Internet Protocol-related symbols

and Internet numbers. Although the phrases internet and world wide web

are sometimes used interchangeably, they are not synonymous; the

internet refers to the worldwide communication system, comprising

hardware and infrastructure, whereas the web is one of the services

provided through the internet.


178
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

The Origin of Internet

- The internet came in the year 1960 with the creation of the first working

model called ARPANET (Advanced Research Projects Agency). It allowed

multiple computers to work on a single network, which was their biggest

achievement at that time. ARPANET uses packet switching to communicate

with multiple computer systems under a single network. In October 1969,

using ARPANET, the first message was transferred from one computer to

another. After that technology continues to grow.

Since then, the internet has developed and evolved to provide for service

such as:

1.) Email - Electronic mail, commonly shortened to “email,” is a

communication method that uses electronic devices to deliver messages

across computer networks. "Email" refers to both the delivery system and

individual messages that are sent and received.

2.) Web-enabled audio / Video conferencing services - Video

conferencing is a live, visual connection between two or more remote

parties over the internet that simulates a face-to-face meeting. Video


179
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Conferencing is important because it joins people who would not normally

be able to form a face-to-face connection.

3.) Online movies and gaming - An online game is a video game that is

played partially or entirely over the internet or any other available computer

network. Online games are widely available on modern gaming platforms,

such as PCs, consoles and mobile devices and include first-person

shooters, strategy games, and massively multiplayer online role-playing

games (MMORPG).

4.) Data transfer / File sharing, often through File Transfer Protocol

(FTP) - FTP (File transfer Protocol) is a network protocol that allows you to

send files between computers using TCP / IP (Transmission Control

Protocol / Internet Protocol). FTP is classified as an application layer

protocol in the TCP / IP series.

5.) Instant Messaging - Technology is a type of online chat allowing real-

time text transmission over the Internet or another computer network.

Messages are typically transmitted between two or more parties, when each

user inputs text and triggers a transmission to the recipient(s), who are all

connected on a common network.

6.) Internet Forms - An internet forum, often known as a message board,

is a website where users may have online discussions in the form of posted
180
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

messages. Unlike chat rooms, messages are frequently longer than one

line of text and are at least briefly stored.

7.) Social Networking - is the use of internet-based social media platforms

to get and stay connected with friends, family, or peers.

8.) Online Shopping - is searching for and purchasing goods and services

over the Internet through the use of a web browser. The main allure of online

shopping is that consumers can find and purchase items they need (which

are then shipped to their front door) without ever leaving the house.

9.) Financial Services - Financial services is a broad range of more specific

activities such as banking, investing, and insurance. Financial services are

limited to the activity of financial services firms and their professionals, while

financial products are the actual goods, accounts, or investments they

provide.

What is Censorship?

- Censorship, the suppression of words, images, or ideas that are

"offensive," happens whenever some people succeed in imposing their

personal political or moral values on others. Censorship can be carried out

by the government as well as private pressure groups. Censorship by the

government is unconstitutional.
181
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Censorship, they control of the information and ideas circulated within a

society has been a hallmark of dictatorships throughout history. In the 20th

Century, censorship was achieved through the examination of books, plays,

films, television and radio programs, news reports, and other forms of

communication for the purpose of altering or suppressing ideas found to be

objectionable or offensive. The rationales for censorship have varied, with

some censors targeting material deemed to be indecent or obscene;

heretical or blasphemous; or seditious or treasonous. Thus, ideas have

been suppressed under the guise of protecting three basic social

institutions: the family, the church, and the state.

The 6 Content Types Every Manufacturing Website Must

Have

1.) Videos - According to a 2016 study by the Content Marketing Institute

on B2B Manufacturing Content Marketing, video is the most effective

content tactic employed by manufacturers—89% of B2B manufacturing

marketers use video and 70% say videos have yielded good results. There

are several ways to use video on your site. A video of your machines in

operation on your shop floor can substitute for an in-person tour, which
182
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

might not be practical for potential customers. You can also use video to

show how your machines work, the quality of your work environment, your

safety and quality practices, and to introduce your team and company.

2.) Case Studies - Case studies are one of the best ways to show potential

customers how your solutions can work for them. Use your case studies to

focus on telling your success stories rather than on selling your services,

and divide each case study into the problem your customer needed to solve,

the solution you provided, and the benefit that resulted. Create an online

library of case studies organized by industry or application to enable

potential customers to easily find the case studies most relevant to them.

3.) Product Photo Galleries - Convince prospects that you can

manufacture a part for them by showing similar products you’ve made for

other customers. Invest in good photography and create a well-organized

photo gallery showing the types of parts you can manufacture.

4.) Testimonials - Let your satisfied customers help you get new ones.

Make asking for a quick quote or comment part of your final transaction with

customers. Ask for specifics about anything that stands out—your

capabilities, speed, price, innovation, product quality, creative solutions,

etc.
183
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

5.) Resources and Supporting Documents - Your website is the perfect

place to house all those print documents you used to mail to customers:

Spec sheets, brochures, mechanical drawings, parts lists, instructional

guides, etc. Create a library of downloadable PDFs so site visitors can

quickly get the information they need.

6.) Thought Leadership- Your website has huge potential for establishing

your credibility and educating site visitors. Showcase your expertise with

blog posts about industry trends or customer concerns, whitepapers about

innovative processes or solutions, or articles on other websites.

Censorship vs Regulation

- Censorship, or the suppression of "offensive" words, images, or ideas,

occurs whenever some people succeed in imposing their personal political

or moral values on others. Censorship can be implemented by both the

government and private pressure groups. Government censorship is

unconstitutional.

Methods of Censorship

- General censorship occurs in a variety of different media, including

speech, books, music, films, and other arts, the press, radio, television, and
184
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

the Internet for a variety of claimed reasons including national security, to

control obscenity, pornography, and hate speech, to protect children or

other vulnerable. Government and private organizations may engage in

censorship. Other groups or institutions may propose and petition for

censorship. The government censors books, social media restrictions,

corporate network blocking, and sites that promote criminal activity to a

large audience in order to restrict something they deem unfit or offensive.

Words, images, or ideas are typically censored, usually by a person or

group attempting to impose their moral, political, or personal beliefs on

others.

Regulation

- In a second form of use, censorship refers to any form of government

regulations that restrict or disable speech. Fines imposed by the Federal

Communications Commission (FCC) for "indecent" speech on radio fit this

use, as the intent is to deter further indecency. In a third, less conventional

usage, the term is modified to refer to nongovernmental restrictions on

speech. Regulations governing the latter are governed by a "no censorship"

clause, whereby the FCC deprives stations of editorial rights over political

advertisements. Although most of these regulations are aimed to increase


185
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

viewpoint diversity, broadcasters often argue that FCC rules infringe upon

their rights to free speech.

The Regulation of Expression and Censorship

- The legitimacy of the regulatory structures and actions that govern

expression and communication, as well as the extent to which these

structures meet the requirements of democratic societies, are central to

modern discussions of censorship. In this entry, we will first look at some

prominent historical examples of centralized censorship systems in the

Western world. This history sets the stage for a discussion of modern

conceptions of censorship and issues surrounding the term itself. The

discussion then shifts to the legal structures that govern speech and the

press in the United States, government control of political speech, and some

contemporary debates about expression regulation.

Early Government Censorship System

- It should be instructive to consider how the problem of censorship has

been addressed in the ancient, premodern, and modern worlds. It is

important not to assume that the modern democratic regime of self-

government is the only legitimate regime. Rather, it is prudent to assume


186
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

that most of those who have thought about and acted on such issues in

other times and places have been at least as humane and as sensible in

their circumstances as modern democrats are likely to be in theirs.

Censorship has traditionally been associated with rigid systems of

ecclesiastical and governmental control over discourse and printing. The

term derives from the census office in early Rome, where the censor served

as both census taker and supervisor of public behavior and morals. Prior to

the invention of the printing press in the fifteenth century, the majority of

manuscripts in Europe were produced in monasteries, which had complete

control over their production. Centralized book control systems arose

largely in response to the invention of the printing press, which both the

church and the state saw as a threat to their authority.

QUIZ

1. It is the foremost important tool and the prominent resource that is being

used by almost every person across the globe.

A. Censorship B. Internet

C. Internet Assigned Numbers Authority D. Internet Form

2. It is a standards organization that oversees global IP address allocation,

autonomous system number allocation, root zone management in the


187
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Domain Name System (DNS), media types, and other Internet Protocol-

related symbols and Internet numbers.

A. Censorship B. Internet

C. Internet Assigned Numbers Authority D. Internet Form

3. It is a communication method that uses electronic devices to deliver

messages across computer networks.

A. Email B. Internet Form

C. Instant Messaging D. Online Movies and Gaming

4. Control of the information and ideas circulated within a society has been

a hallmark of dictatorships throughout history.

A. Internet B. Email

C. Internet Assigned Numbers Authority D. Censorship

5. Known as a message board, is a website where users may have online

discussions in the form of posted messages.

A. Instant messaging B. Internet Form

C. Social Network D. Video Conference

6. What year did the internet come?

7-8. Give 2 advantages of the internet?

9-10. Give 2 disadvantages of the internet?

Essay

11-15. For you, what is censorship? (3-5 sentences)


188
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

References:

https://en.wikipedia.org/wiki/Internet_censorship

https://humanrights.gov.au/our-work/5-current-issues-internet-censorship-

bullying-discrimination-harassment-and-freedom

https://www.security.org/vpn/internet-censorship/

https://www.aclu.org/other/what-censorship

https://www.ipxo.com/blog/what-is-iana/

https://www.websolutions.com/blog/the-6-types-of-content-every-

manufacturing-website-must-have/

https://en.wikipedia.org/wiki/Censorship#:~:text=Censorship%20is%20the

%20suppression%20of,institutions%20and%20other%20controlling%20bo

dies.

https://www.encyclopedia.com/social-sciences/encyclopedias-almanacs-

transcripts-and-maps/censorship-and-regulation-expression

https://study.com/learn/lesson/censorship-history-types-examples-what-is-

censorship.html

Ragodon, Roan Angel R. Raro, Justin C.

Reporter Reporter
189
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Sex and Technology


(Valera, Mark Joselito S.)
190
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Pornography

- Is a representation of sexual behavior in books, pictures, statues, films,

and other media that is intended to cause sexual excitement. The distinction

between pornography (illicit and condemned material) and erotica (which is

broadly tolerated) is largely subjective and reflects changing community

standards. The word pornography, derived from the Greek porni

(“prostitute”) and graphein (“to write”), was originally defined as any work of

art or literature depicting the life of prostitutes.

Kinds of Pornography

- The first type of pornography is adult magazines. These magazines are

primarily directed toward an adult male audience. The magazines that have

the widest distribution (like Playboy and Penthouse) do not violate the

Supreme Court's standard of obscenity and thus can be legally distributed.

But other magazines that do violate these standards are still readily

available in many adult bookstores.

- The second type of pornography is video cassettes. These are rented or

sold in most adult bookstores and have become a growth industry for

pornography. People who would not go into an adult bookstore or theater

to watch a pornographic movie will obtain these video cassettes through


191
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

bookstores or the mail and watch them in the privacy of their homes.

Usually, these videos display a high degree of hard-core pornography and

illegal acts.

- The third type of pornography is motion pictures. Ratings standards are

being relaxed and many pornographic movies are being distributed and

shown carrying R-18 ratings.

- The fourth type of pornography is television. As in motion pictures,

standards for commercial television have been continuously lowered. But

an even greater threat is on cable television. Thus, many pornographic

movies are shown on cable television. Like video cassettes, cable TV

provides the average person access to pornographic material.

- The fifth type of pornography is audio porn. This includes "Dial-a- Porn"

telephone calls, which are the second fastest growth market of pornography

Pornography in History

- Because the very definition of pornography is subjective, a history of

pornography is nearly impossible to conceive; imagery that might be

considered erotic or even religious in one society may be condemned as

pornographic in another. Thus, European travelers to India in the 19th

century were appalled by what they considered pornographic


192
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

representations of sexual contact and intercourse on Hindu temples such

as those of Khajuraho.

- In Ancient Greece and Rome, for instance, phallic imagery and

depictions of orgiastic scenes were widely present, though it is unlikely that

they fulfilled anything like the social or psychological functions of modern

pornography (see phallicism). A modern use seems more likely in some of

the celebrated erotic manuals, such as the Roman poet Ovid’s Ars amatoria

(Art of Love), a treatise on the art of seduction, intrigue, and sensual

arousal.

- The Insistent Lover - Japan possessed a very highly developed culture

of visual erotica, materials. Elaborate depictions of sexual intercourse—

pictures notionally designed to provide sex education for medical

professionals, courtesans, and married couples—are present from at least

the 17th century. Makura-e (pillow pictures) were intended for entertainment

as well as for the instruction of married couples. This interest in very frank

erotica reached its height during the Tokugawa period (1603–1867).

- In Europe too, new technologies (above all, the printing press) promoted

the creation of pornographic works, which frequently contained elements of

humour and romance and were written to entertain as well as to arouse.


193
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- The modern history of Western pornography begins with the

Enlightenment (18th century), when printing technology had advanced

enough to permit the production of written and visual materials to appeal to

audiences of all socioeconomic levels and sexual tastes. At about this time,

erotic graphic art began to be widely produced in Paris, eventually coming

to be known in the Anglophone world as “French postcards.”

- Apart from its sexual element, pornography became a powerful vehicle

for social and political protest. It provided a vehicle for the exploration of

daring ideas that were condemned by both church and state, including

sexual freedom for women as well as for men and the practices of

contraception and abortion. Much pornography also focused on the

misdeeds of royals and aristocrats, thereby contributing to the discrediting

of the elites of Europe.

- By the time that Queen Victoria came to the throne in Great Britain in

1837, there were more than 50 pornographic shops on Holywell Street

(known as “Booksellers’ Row”) in London. Pornography continued to

flourish during the Victorian Age in Britain and in the United States in the

19th century the inventions of photography and later of motion pictures were

quickly put to use in the production of pornography. Pornographic films were

widely available no later than the 1920s, and in the 1960s their popularity
194
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

enjoyed a massive upsurge. The development of videocassettes in the

1980s and digital videodiscs (DVDs) in the 1990s enabled the wide

distribution of pornographic films and further encouraged their use because

they could be viewed in private. Pornographic images and films became

even more widely available with the emergence of the Internet in the 1990s.

The pornographic industry became one of the most profitable on the

Internet. The use of webcams opened the industry even further to amateurs,

allowing individuals to post live depictions of themselves, often for fees. The

Internet also increased the availability of child pornography.

- Erotica, literary or artistic works having an erotic theme; especially, books

treating of sexual love in a sensuous or voluptuous manner. The word

erotica typically applies to works in which the sexual element is regarded as

part of the larger aesthetic aspect. It is usually distinguished from

pornography, which can also have literary merit but which is usually

understood to have sexual arousal as its main purpose.

- There are erotic elements in literary works of all times and from all

countries. Among the best-known examples of erotic literature are the

Kama-sutra by Vatsyayana in India during 400 BCE-200 and other Sanskrit

literature from about the 5th century AD, Persian lyric poems called ghazals,

Ovid’s Ars Amatoria, the 16th-century Chinese novel Chin p’ing, William

Shakespeare’s Venus and Adonis, the writings of the Marquis de Sade, and
195
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

D.H. Lawrence’There are erotic elements in literary works of all times and

from all countries.

Loss about Child Pornography

- While the sexual exploitation was occurring, children complained of urinary

infection, genital soreness, headaches, appetite loss, and sleeping

difficulties. Changes in school behavior, declining grades, and acting-out

behaviors were observed. All children showed major stress symptoms

immediately after disclosure of the abuse. Children were classified as either

internal or external reactors. Two years after disclosure, four patterns of

response to stress were observed: integration of the event, avoidance of

the event, recurrent symptoms, and identification with the exploiter. Parents

reacted with various defense mechanisms. They rationalized, avoided

hearing the facts, minimized the severity of the exploitation, and withheld

information from their spouses.

- When abuse in the home is prevalent, it causes suffering to young people

to get out of the house to escape abusive parents and family. Leaving home

and family also means leaving school and becoming vulnerable to abuse —

physical, emotional and sexual. The lack of supervision and instability

brings on involvement in substance abuse in whatever form — alcohol,


196
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

drugs. Worse, vulnerability comes when children have mental problems or

learning disabilities or if they have physical disabilities. Community is very

important to a child growing up. If it is a violent one, or one with criminal

elements, they can take advantage or cause disadvantage to a child.

- Even worse is the modern means of abuse through online use, particularly

for sexual abuse and trafficking through illegal recruitment. This has

resulted in the Philippines coming out on top in online child pornography,

sexual abuse, and trafficking of women and children in the world. In 2020,

it was estimated that there were 2 million online child abuse and exploitation

cases from the Philippines. During the pandemic, it is said to have increased

by 265 percent. This is unacceptable.

- Poverty is one factor though not the only factor to which we have to add

values and attitudes. Children in Philippine society as a whole are treated

as property, chattels really. They are expected to help the family in whatever

way the family decides. Thus, you have children out of school working on

the streets, in their families' livelihood activities or need for services, making

them forgo their right to education, health care and a good home

environment. There is a materialistic element present here where the family

demands that the children help it instead of the family helping the children

they bring into the world because the family wants a higher standard of

living, whatever the cost to the children. Some families which use their
197
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

children for online pornography or sex think that because it is online and not

physical, it is not wrong. This could also be a rationalization. When abused

children rebel or escape, they continue with the activity, particularly sexual

activity, because that is where they can manage to get their own income to

use as they please. They know nothing else from the neglect of education

and care. Schooling, higher ambitions, family life itself are thus abandoned

and society ends up with a major problem of feral children engaging in

lawless and criminal activity.

Federal Child Pornography Charges

- A conviction for a federal child pornography offense can carry a substantial

amount of prison time. A person who is convicted of knowingly possessing

child pornography can be sentenced up to 10 years in prison or up to 20

years in prison if the minor is under the age of twelve.

- A person who is convicted of distributing or receiving child pornography

faces a 5-to-20-year prison sentence. There are also fines and payments

that are often required to any identifiable victim of the offense. Not to

mention, being convicted of a child pornography offense in federal court will

require registration as a sex offender. The penalties for sexual exploitation


198
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

under federal law are incredibly severe. The mandatory minimum sentence

is 15 years and the maximum is 30 years.

Defenses in Child Pornography Charges

Fourteenth Congress

Third Regular Session

REPUBLIC ACT No. 9775

AN ACT DEFINING THE CRIME OF CHILD PORNOGRAPHY,

PRESCRIBING PENALTIES THEREFOR AND FOR OTHER PURPOSES

Be it enacted by the Senate and House of Representatives of the

Philippines in Congress assembled:

Section 1. Short Title. - This Act shall be known as the "Anti-Child

Pornography Act of 2009."

Section 2. Declaration of Policy. - The State recognizes the vital role of the

youth in nation building and shall promote and protect their physical, moral,
199
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

spiritual, intellectual, emotional, psychological and social well-being.

Towards this end, the State shall:

(a) Guarantee the fundamental rights of every child from all forms of neglect,

cruelty and other conditions prejudicial to his/her development;

(b) Protect every child from all forms of exploitation and abuse including,

but not limited to:

(1) the use of a child in pornographic performances and materials; and

(2) the inducement or coercion of a child to engage or be involved in

pornography through whatever means; and

(c) Comply with international treaties to which the Philippines is a signatory

or a State party concerning the rights of children which include, but not

limited to, the Convention on the Rights of the Child, the Optional Protocol

to the Convention on the Rights of the Child of the Child on the Sale of

Children, Child Prostitution and Child Pornography, the International Labor

Organization (ILO) Convention No.182 on the Elimination of the Worst

Forms of Child Labor and the Convention Against Transnational Organized

Crime.

Section 4. Unlawful or Prohibited Acts. - It shall be unlawful for any person:

(a) To hire, employ, use, persuade, induce or coerce a child to perform in

the creation or production of any form of child pornography;

(b) To produce, direct, manufacture or create any form of child pornography;


200
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

(c) To publish offer, transmit, sell, distribute, broadcast, advertise, promote,

export or import any form of child pornography;

(d) To possess any form of child pornography with the intent to sell,

distribute, publish, or broadcast: Provided. That possession of three (3) or

more articles of child pornography of the same form shall be prima facie

evidence of the intent to sell, distribute, publish or broadcast;

(e) To knowingly, willfully and intentionally provide a venue for the

commission of prohibited acts as, but not limited to, dens, private rooms,

cubicles, cinemas, houses or in establishments purporting to be a legitimate

business;

(f) For film distributors, theaters and telecommunication companies, by

themselves or in cooperation with other entities, to distribute any form of

child pornography;

(g) For a parent, legal guardian or person having custody or control of a

child to knowingly permit the child to engage, participate or assist in any

form of child pornography;

(h) To engage in the luring or grooming of a child;

(i) To engage in pandering of any form of child pornography;

(j) To willfully access any form of child pornography;

(k) To conspire to commit any of the prohibited acts stated in this section.

Conspiracy to commit any form of child pornography shall be committed


201
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

when two (2) or more persons come to an agreement concerning the

commission of any of the said prohibited acts and decide to commit it; and

(l) To possess any form of child pornography.

Section 5. Syndicated Child Pornography - The crime of child pornography

is deemed committed by a syndicate if carried out by a group of three (3) or

more persons conspiring or confederating with one another and shall be

punished under Section 15(a) of this Act.

Section 13. Confidentiality. - The right to privacy of the child shall be

ensured at any stage of the investigation, prosecution and trial of an offense

under this Act. Towards this end, the following rules shall be observed:

(a) The judge, prosecutor or any officer of the law to whom the complaint

has been referred to may, whenever necessary to ensure a fair and

impartial proceeding and after considering all circumstances for the best

interest of the child conduct a closed-door investigation, prosecution or trial;

(b) The name and personal circumstances of the child, including the child's

immediate family, or any other information tending to establish his/her

identity shall not be disclosed to the public;

(c) Any record regarding a child shall be confidential and kept under seal.

Except upon written request and order of the court, a record shall be

released only to the following:


202
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

(1) Members of the court staff for administrative use;

(2) The prosecuting attorney;

(3) Defense counsel;

(4) The guardian ad litem;

(5) Agents of investigating law enforcement agencies and

(6) Other persons as determined by the court.

(d) Any form of child pornography that is part of the court records shall be

subject to a protective order that provides as follows:

(1) Any form of child pornography may be viewed only by the parties, their

counsel, their expert witness and guardian ad litem;

(2) Neither form of child pornography nor any portion thereof shall be

divulged to any other person, except as necessary for investigation,

prosecution or trial; and

(3) No person shall be granted access to any form of child pornography or

any part thereof unless he/she signs a written affirmation that he/she has

received and read a copy of the protection order; that he/she submits to the

jurisdiction of the court with respect to the protective order; and that, in case

of violation thereof, he/she will be subject to the contempt power of the

court; and
203
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

(e) In cases when prosecution or trial is conducted behind closed doors, it

shall be unlawful for any editor, publisher and reporter or columnist in case

of printed materials, announcer or producer in case of television and radio,

producer and director of a film in case of the movie industry, or any person

utilizing the tri-media facilities or information technology to publish or

broadcast the names of the victims of any case of child pornography.

Any violation of this provision shall be subject to the penalty provided for

under Section 15(m) of this Act.

Section 14. Care, Custody and Treatment of a Child Victim. - The DSWD

shall ensure that the child who is a victim of any form of child pornography

is provided appropriate care, custody and support for their recovery and

reintegration in accordance with existing laws.

- The child and his family shall be entitled to protection as well as to the

rights and benefits of witnesses under Republic Act No. 6981, otherwise

known as "The Witness Protection, Security and Benefit Act".

- The child shall also be considered as a victim of a violent crime defined

under Section 3(d) of Republic Act No. 7309, otherwise known as "An Act

Creating a Board of Claims under the Department of Justice for Victims of


204
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Unjust Imprisonment or Detention and Victims of Violent Crimes and for

Other Purposes", so that the child may claim compensation therein. (k) To

conspire to commit any of the prohibited acts stated in this section.

Conspiracy to commit any form of child pornography shall be committed.

Punishment for Child Pornography Possession or

Distribution

Section 15. Penalties and Sanctions. - The following penalties and

sanctions are hereby established for offenses enumerated in this Act:

(a) Any person found guilty of syndicated child pornography as defined in

Section 5 of this Act shall suffer the penalty of reclusion perpetua (pardon)

and a fine of not less than Two million pesos (Php2,000,000.00) but not

more than Five million pesos (Php5,000,000.00);

(b) Any person found guilty of violating Section 4(a), (b) and (c) of this Act

shall suffer the penalty of reclusion temporal in its maximum period and a

fine of not less than One million pesos (Php1,000,000.00) but not more than

Two million (Php2,000,000.00);

(c) Any person found guilty of violating Section 4(d), (e) and (f) of this Act

shall suffer the penalty of reclusion temporal in its medium period and a fine
205
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

of not less than Seven hundred fifty thousand pesos (Php750,000.00) but

not more than One million pesos (Php1,000,000.00);

(d) Any person found guilty of violating Section 4(g) of this Act shall suffer

the penalty of reclusion temporal in its minimum period and a fine of not less

than Five hundred thousand pesos (Php500,000.00) but not more than

Seven hundred thousand pesos (Php700,000.00);

(e) Any person found guilty of violating Section 4(h) of this Act shall suffer

the penalty of prision mayor in its maximum period and a fine of not less

than Three hundred thousand pesos (Php300,000.00) but not more than

Five hundred thousand pesos (Php500,000.00);

(f) Any person found guilty of violating Section 4(I) of this Act shall suffer

the penalty of prision mayor in its minimum period and a fine of not less than

Three hundred thousand pesos (php300,000.00) but not more than Five

hundred thousand pesos (Php500,000.00);

(g) Any person found guilty of violating Section 4(j) of this Act shall suffer

the penalty of prision correccional in its maximum period and a fine of not

less than Two hundred thousand pesos (Php200,000.00) but not more than

Three hundred thousand pesos (Php300,000.00);

(h) Any person found guilty of violating Section 4(k) of this Act shall suffer

the penalty of prision correccional in its medium period and a fine of not less
206
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

than One hundred thousand pesos (php100,000.00) but not more than Two

hundred fifty thousand pesos (php250,000.00);

(i) Any person found guilty of violating Section 4(l) of this Act shall suffer the

penalty of arresto mayor in its minimum period and a fine of not less than

Fifty thousand pesos (Php50,000.00) but not more than One hundred

thousand pesos (Php100,000.00);

(j) Any person found guilty of violating Section 11 of this Act shall suffer the

penalty of prision correccional in its medium period and a fine of not less

than One million pesos (Php1,000,000.00) but not more than Two million

pesos (Php2,000,000.00) for the first offense. In the case of a subsequent

offense, the penalty shall be a fine not less than Two million pesos

(Php2,000,000.00) pesos but not more than Three million pesos

(Php3,000,000.00) and revocation of its license to operate and immediate

closure of the establishment;

(k) Any ISP found guilty of willfully and knowingly failing to comply with the

notice and installation requirements under Section 9 of this Act shall suffer

the penalty of a fine of not less than Five hundred thousand pesos

(Php500,000.00) but not more than One million pesos (Php1,000,000.00)

for the first offense. In case of subsequent offense, the penalty shall be a

fine of not less than One million pesos (Php1,000,000.00) but not more than
207
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Two million pesos (Php2,000,000.00) and revocation of its license to

operate;

(l) Any mall owner-operator and owner or lessor of other business

establishments including photo developers, information technology

professionals, credit card companies and banks, found guilty of willfully and

knowingly failing to comply with the notice requirements under Section 10

of this Act shall suffer the penalty of a fine of not less than One million pesos

(Php1,000,000.00) but not more than Two million pesos (Php2,000,000.00)

for the first offense. In the case of a subsequent offense, the penalty shall

be a fine of not less than Two million pesos (Php2,000,000.00) but not more

than Three million pesos (Php3,000,000.00) and revocation of its license to

operate and immediate closure of the establishment; and

(m) Any person found guilty of violating Section 13 of this Act shall suffer

the penalty of arresto mayor in its minimum period and a fine of not less

than One hundred thousand pesos (Php100,000.00) but not more than

Three hundred thousand pesos (Php300,000.00).

Section 16. Common Penal Provisions. -

(a) If the offender is a parent, ascendant, guardian, step-parent or collateral

relative within the third degree of consanguinity or affinity or any person

having control or moral ascendancy over the child, the penalty provided
208
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

herein shall be in its maximum duration; Provided, That this provision shall

not apply to Section 4(g) of this Act;

(b) If the offender is a juridical person, the penalty shall be imposed upon

the owner, manager, partner, member of the board of directors and/or any

responsible officer who participated in the commission of the crime or shall

have knowingly permitted or failed to prevent its commissions;

(c) If the offender is a foreigner, he/she shall be immediately deported after

the complete service of his/her sentence and shall forever be barred from

entering the country; and

(d) The penalty provided for in this Act shall be imposed in its maximum

duration if the offender is a public officer or employee.

Section 17. Confiscation and Forfeiture of the Proceeds, Tools and

Instruments Used in Child Pornography. - In addition to the penalty imposed

for the violation of this Act, the court shall order the confiscation and

forfeiture in favor of the government of all the proceeds, tools and

instruments used in the commission of the crime, unless they are the

property of a third person not liable for the unlawful act; Provided, however,

That all awards for damages shall be taken from the personal and separate

properties of the offender; Provided, further, That if such properties are


209
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

insufficient, the deficiency shall be taken from the confiscated and forfeited

proceeds, tools and instruments.

- All proceeds derived from the sale of properties used for the commission

of any form of child pornography shall accrue to the special account of the

DSWD which shall be used exclusively for the implementation of this Act.

- When the proceeds, tools and instruments used in the commission of the

offense have been destroyed diminished in value or otherwise rendered

worthless by any act or omission, directly or indirectly, of the offender, or it

has been concealed, removed, converted or transferred to prevent the

same from being found or to avoid forfeiture or confiscation, the offender

shall be ordered to pay the amount equal to the value of the proceeds, tools

and instruments used in the commission of the offense.

Section 18. Mandatory Services to Victims of Child Pornography. - To

ensure recovery, rehabilitation and reintegration into the mainstream of

society concerned government agencies and the LGUs shall make

available the following services to victims of any form of child pornography:

(a) Emergency shelter or appropriate housing;

(b) Counseling;

(c) Free legal services, which shall include information about the victim's

rights and the procedure for filing of complaints, claims for compensation
210
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

and such other legal remedies available to them in a language understood

by the child;

(d) Medical or psychological services;

(e) Livelihood and skills training; and

(f) Educational assistance.

Sustained supervision and follow through mechanism that will track the

progress of recovery, rehabilitation and reintegration of the child victims

shall adopted and carried out.

Section 19. Programs for Victims of Child Pornography. The Inter-Agency

Council against Child Pornography created under Section 20 of this Act

shall develop and implement the necessary programs that will prevent any

form of child pornography, as well as protect, heal and reintegrate the child

into the mainstream of society. Such programs shall include beat but not

limited to the following:

(a) Provision of mandatory services including counseling free legal services,

medical or psychological services, livelihood and skills training and

educational assistance to the child pursuant to Section 18 of this Act;

(b) Sponsorship of a national research program on any form of child

pornography and other acts covered by the law and the establishment of a

data collection system for monitoring and evaluation purposes;


211
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

(c) Provision of necessary technical and material support services to

appropriate government agencies and nongovernmental organizations:

(d) Sponsorship of conferences and seminars to provide venue for

consensus building amongst the public, the academe, government,

nongovernmental and international organizations and

(e) Promotion of information and education campaign.

Section 22. Child Pornography as a Transnational Crime. - Pursuant to the

Convention on transnational Organized Crime, the DOJ may execute the

request of a foreign state for assistance in the investigation or prosecution

of any form of child pornography by: (1) conducting a preliminary

investigation against the offender and, if appropriate, to file the necessary

charges in court; (2) giving information needed by the foreign state; and (3)

to apply for an order of forfeiture of any proceeds or monetary instrument or

properly located in the Philippines used in connection with child

pornography in the court; Provided, That if the DOJ refuses to act on the

request of for delaying the execution thereof: Provided, further, That the

principles of mutuality and reciprocity shall, for this purpose, be at all times

recognized.
212
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Section 23. Extradition. - The DOJ, in consultation with the Department of

Foreign Affairs (DFA), shall endeavor to include child pornography among

extraditable offenses in future treaties.

Approved,

PROSPERO C. NOGRALES

Speaker of the House of Representatives

JUAN PONCE ENRILE

President of the Senate

This Act which is a consolidation of Senate Bill No. 2317 and House Bill No.

6440 was finally passed by the Senate and the House of Representatives

on October 13, 2009.

MARILYN B. BARUA-YAP

Secretary General

House of the Representatives


213
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

EMMA LIRIO-REYES

Secretary of the Senate

Approved: November 17, 2009

Sgd. GLORIA MACAPAGAL-ARROYO

President of the Philippines

QUIZ

Identification:

1. Who was the president of the Philippines when the act known as the

“Anti-Child Pornography Act of 2009 was finally passed by the Senate and

the House of Representatives?

2. What erotic literary work text that originated from India dated 400 BCE?

3. It is a type of Pornography that uses a “dial-a-porn” telephone call.

4. What factor is being described where the children in Philippine society

are expected to help the family in whatever way or means to earn money.

5. It is the representation of sexual behaviour in books, pictures, statues,

films, and other media that is intended to cause sexual excitement.


214
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Multiple Choice:

6. What is the title of the Act known as the “Anti-Child Pornography Act of

2009?

a.) Republic Act No. 9775-A

b.) Republic Act No. 9775

c.) Republic Act No. 95

d.) Republic Act No. 10173

7. The word Pornography is derived from the two Greek words

a.) porni (“prostitute”) and graph (“to write”)

b.) porni (“prosti”) and graphein (“to write”)

c.) pornstar (“prostitute” and graphein (“to write”)

d.) porni (“prostitute”) and graphein (“to write”)

8. Section 2. Declaration of Policy – The state recognizes the vital role of

the ________ in nation building and shall promote and protect their

physical, moral, spiritual, intellectual, emotional, psychological and social

well-being.

a. Children

b. Society of youth

c. Nation

d. Youth
215
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

9. Section 15. Penalties and Sanctions – Any person found guilty of

syndicated child pornography shall suffer the fine of;

a.) Not less than Two (2) million pesos but not more than Five (5) million

pesos

b.) Not less than Two (3) million pesos but not more than Five (4) million

pesos

c.) Not less than Two (4) million pesos but not more than Five (5) million

pesos

d.) Not less than Two (1) million pesos but not more than Five (5) million

pesos

10. This type of pornography is rented or sold in most adult bookstores and

usually displays videos of hard-core pornography.

a.) Men’s Health Magazine

b.) Video cassettes

c.) Video VHS

d.) Betamax Videos

Essay: What is your stand or opinion when it comes to PUBS that shows

nude ladies dancing on stage? And why is the government not

PERMANENTLY closing down those establishments?


216
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

References:

https://www.similarweb.com/top-websites/philippines/

https://philstarlife.com/self/818315-pornhub-year-in-review-

philippines?page=2

https://globalnation.inquirer.net/97567/filipinos-rank-15th-in-global-porn-

watching

http://www.amlc.gov.ph/images/PDFs/2020%20DEC%20CHILD%20POR

NOGRAPHY%20IN%20THE%20PHILIPPINES%20POST-

2019%20STUDY%20USING%20STR%20DATA.pdf

Valera, Mark Joselito S.

Reporter
217
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Virtual Prostitution
(Mira, Jastine John T.)
218
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

What is Virtual Prostitution?

- An activity in which one engages in sexual activity with another person,

whom neither have ever seen/met in real life before. Usually, the two meet

online. Obscene and indecent acts evolving around virtual. sexual

stimulation and/or intercourse in exchange of money and/or. profit.

VR Porn and Interactive Toys

- VR porn essentially enables a pornographic experience in a virtual reality

simulation, meaning the video or the movie plays all around the person

wearing the VR headset, providing a more life-like experience. Industry

leaders like Pornhub actively pursued such content in the early 2010s.

- According to the statistics published on VRSelector, in 2020, in conjunction

with virtual reality porn only 3.2% of users use sex toys (Teledildonics like

Fleshlight or Kiiroo products). SexLikeReal officials are noticing an

uptrend for interactive sex toys use on their platform and are expecting this

to keep growing. The current situation of the world, with the pandemic, is

one of the reasons why virtual reality sex is increasing.


219
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Virtual Sex or Cybersex

- Cybersex, also called computer sex, Internet sex, netsex and, colloquially,

cyber or cybering, is a virtual sex encounter in which two or more people

connected remotely via computer network send each other sexually explicit

messages describing a sexual experience.

- Cybersex is a sub-type of technology-mediated sexual interactions.

- Cybersex often includes real life masturbation.

Crime Relationships

- There are several ways to incur violations of the law when on the internet

and some of these include cybersex criminal activities that may involve the

solicitation of a minor, child pornography and felony offenses that harm

others.
220
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Cybersex

- is when a victim is forced into sexual exploitation using coercion, force, or

fraud, and their abuse is streamed live on the internet via webcam, video,

photography, or other digital media.

Child Pornography

- Child pornography is considered to be any depiction of a minor or an

individual who appears to be a minor who is engaged in sexual or sexually

related conduct. This includes pictures, videos, and computer-generated

content. Even altering an image or video so that it appears to be a minor

can be considered child pornography.

Sexting

- It’s legal for consenting adults to send sexual images and suggestive

messages to each other. However, sexting with a minor is completely out

of line. Understandably, the state of Texas considers this to be a major

crime. Offenders could potentially be charged with a felony. Aside from

being slapped with hefty fines, the person is also at risk of facing prison

time.
221
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Cyberstalking

- In recent years, there’s been an increase in cyberstalking. The crime

occurs when an attacker harasses others using electronic communication.

There will be a pattern of malicious behavior. These individuals often send

their targets lewd messages and pictures. While some offenders may make

their identity known, others choose to remain anonymous by creating fake

accounts.

Sex Trafficking

- In many ways, sex trafficking is a modern form of human slavery. It’s an

extreme violation that can haunt victims for years to come. After abducting

their targets, the offenders often go online to connect with potential clients.

Contrary to common belief, victims are not always physically held against

their will. Some captures use other means to control people, such as

threatening deportation and public humiliation.

QUIZ

1.) What is the difference between prostitution and VR prostitution? (5pts)

2.) What is VR porn? (5pts)

3.) What are the other terms for Cyber Sex? (5pts)
222
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

4.) Give and explain 5 crime relationship of VR prostitution (3pts each)

References:

https://www.urbandictionary.com/define.php?term=Virtual%20Prostitution

https://www.jettonmeredithlaw.com/blog/2020/june/4-common-types-of-

internet-sex-crimes/

Module in Social and Professional Issues I

Mira, Jastine John T.

Reporter
223
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Technology and
Privacy
(Mendoza, John Ezekiel R.)
224
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Technology and Privacy

- Technology and Privacy are two intertwined notions that must be jointly

analyzed and faced. Technology is a social practice that embodies the

capacity of societies to transform themselves by creating the possibility to

generate and manipulate not only physical objects, but also symbols,

cultural forms and social relations. In turn, privacy describes a vital and

complex aspect of these social relations. Thus, technology influences

people’s understanding of privacy.

Identity Theft

- Identity theft is the crime of obtaining the personal or financial information

of another person to use their identity to commit fraud, such as making

unauthorized transactions or purchases. Identity theft is committed in many

different ways and its victims are typically left with damage to their credit,

finances, and reputation.

Types of Identity Theft

1.) TRUE NAME IDENTITY THEFT - Is a serious crime. It takes place when

a scammer uses your personal information without your knowledge or

consent to commit fraud or theft. The theft might open a new credit card
225
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

account, establish cellular phone service or open a hacking account to

obtain blank checks.

2.) ACCOUNT TAKEOVER IDENTITY THEFT - Is an attack whereby

cybercriminals take ownership of online accounts using stolen passwords

and usernames. Typically, the theft will change the mailing address on an

account and run up bills before the victim realizes there is a problem.

3.) CYBERCRIME – Also called computer crime, the use of a computer as

an instrument to further illegal ends, such as committing fraud, trafficking in

child pornography and intellectual property, stealing identities, or violating

privacy.

Examples of Identity Theft

1.) FINANCIAL IDENTITY THEFT - This is the most common type of

identity theft. Financial identity theft seeks economic benefits by using a

stolen identity.

2.) TAX RELATED IDENTITY THEFT - In this type of exploit, the criminal

files a false tax return with the internal revenue service (IRS), for example

using a stolen social security number.

3.) MEDICAL IDENTITY THEFT - is when someone steals or uses your

personal information (like your name, Social Security number, or Medicare


226
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

number), to submit fraudulent claims to Medicare and other health insurers

without your authorization. Medical identity theft can disrupt your medical

care, and wastes taxpayer dollars.

4.) CRIMINAL IDENTITY THEFT - occurs when someone cited or arrested

for a crime uses another person's name and identifying information,

resulting in a criminal record being created in that person's name.

5.) CHILD IDENTITY THEFT – In this exploit, a child’s social number is

misused to apply for government benefits and open bank accounts or other

services. Criminals often seek information about children because the

damage may go unnoticed for a long time.

6.) SENIOR IDENTITY THEFT - occurs when their identities are stolen for

personal gain. Seniors are targeted more often for scams that involve credit

and financial accounts.

7.) IDENTITY CLONING - this happens when someone uses another

person's identity to conceal their own. The most common example of

identity cloning is individuals using another person's Social Security number

for work purposes.

8.) SYNTHETIC IDENTITY THEFT - occurs when someone uses a

combination of real and fake personal information to create an identity and

commit fraud. A fraudster may combine a stolen Social Security number

(SSN) with a fake name, date of birth and address to create a new identity,
227
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

for example. They can then use the "Frankenstein ID," as it's sometimes

called, to commit various times of fraud.

Identity Theft Techniques

1.) PHISHING AND SMISHING - Phishing involves sending you a

fraudulent email that looks to be authentic, say an email from your bank

asking you to verify your account information.

2.) DUMPSTER DRIVING - Retrieving personal paper works and discarded

mail from a dumpster is an easy way for an identity thief to get information.

3.) WIRELESS HACKING - Is an attack on wireless networks or access

points that offer confidential information such as authentication attacks, wifi

passwords, admin portal access, and other similar data. Wireless hacking

is performed for gaining unauthorized access to a private wifi network.

4.) MAIL THEFT - It is when someone other than the intended recipient

tampers with, steals, or reads mail that does not belong to them. It may

include raiding a mailbox to search for cash, credit cards, or other valuables.

Sometimes thieves are looking for bank statements, social security checks,

or personally identifiable information they can use to steal your identity.


228
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Signs of being an Identity Theft Victim

- Unfamiliar login alerts.

- Unable to access your Apple ID.

- Mysterious changes in your credit score.

- Suspicious activity on your financial records.

- Being billed for strange medical procedures.

- Denial of health coverage.

- Denial for a loan or credit.

Tips to protect yourself from Identity Theft

- Destroy private records and statements

- Safeguard your Social Security number.

- Never let your credit card out of your sight.

- Be more defensive with personal information.

- Review your credit card statements carefully.

- Secure your mail.

- Don’t leave a paper trail.

- Know who you’re dealing with.

- Monitor your credit report.

- Take your name off marketers’ hit lists.


229
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

QUIZ

1. Is the crime of obtaining the personal or financial information of another

person.

A. Technology B. Identity theft

C. Privacy

2. It takes place when a scammer uses your personal information without

your knowledge or consent.

A. Account takeover identity theft B. True name identity theft

C. Cybercrime

3. Take ownership of online accounts using stolen passwords and

usernames.

A. Account takeover identity theft B. Cybercrime

C. True name identity theft

4. The use of a computer as an instrument to further illegal ends.

A. True name identity theft B. Cybercrime

C. Tru name identity theft

5. the criminal files a false tax return with the internal revenue service

A. Financial identity theft B. Medical identity theft

C. Tax related identity theft


230
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

6. Is when someone steals or uses your personal information (like your

name, Social Security number, or Medicare number).

A. Medical identity theft B. Financial identity theft

C. Medical identity theft

7. Occurs when someone cited or arrested for a crime uses another

person's name and identifying information.

A. medical identity theft B. Criminal identity theft

C. Child identity theft

8. Seniors are targeted more often for scams that involve credit and financial

accounts.

A. Child identity theft B. Identity cloning

C. Senior identity theft

9. This happens when someone uses another person's identity to conceal

their own.

A. Identity cloning B. Senior identity theft

C. Synthetic identity theft

10. Occurs when someone uses a combination of real and fake personal

information to create an identity and commit fraud.

A. Synthetic identity theft B. Identity cloning

C. Cybercrime
231
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

(11 - 15.)

Give 5 signs of being identity theft victim

(16 – 20.)

Give 5 tips to protect yourself on Identity theft

Essay (5 points each)

1. How does identity theft affect the life of a person?

2. What is the best way to prevent identity theft?

References:

Module in Social and Professional Issues I

Mendoza, John Ezekiel R.

Reporter
232
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Online Crimes
(Ordinario, Clarence E.)
233
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

What are Online Crimes?

- Internet crime is any crime or illegal online activity committed on the

Internet, through the Internet, or using the Internet. The widespread Internet

crime phenomenon encompasses multiple global levels of legislation and

oversight. In the demanding and continuously changing IT field, security

experts are committed to combating Internet crime through preventative

technologies, such as intrusion detection networks and packet sniffers.

Internet crime is a strong branch of cybercrime. Identity theft, Internet scams

and cyberstalking are the primary types of Internet crime. Because Internet

crimes usually engage people from various geographic areas, finding and

penalizing guilty participants is complicated.

History of Cybercrime

- The first major wave of cybercrime came with the proliferation of email

during the late 80’s. It allowed for a host of scams and/or malware to be

delivered to your inbox.

- The next wave in the cybercrime history timeline came in the 90’s with the

advancement of web browsers. At the time there were a multitude to choose

from, many more than today, and most were vulnerable to viruses. Viruses

were delivered through Internet connections whenever questionable


234
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

websites were visited. Some caused your computer to run slow; others may

have caused annoying pop-up advertising to crowd your screen or redirect

you to the nastiest porn sites.

- Cybercrime really began to take off in the early 2,000’s when social media

came to life. The surge of people putting all the information they could into

a profile database created a flood of personal information and the rise of ID

theft. Thieves used the information in a number of ways including accessing

bank accounts, setting up credit cards or other financial fraud.

- The latest wave is the establishment of a global criminal industry totaling

nearly a half-trillion dollars annually. These criminals operate in gangs, use

well-established methods and target anything and everyone with a

presence on the web.

Categories of Cybercrime

1.) Crimes Against People - These crimes include cyber harassment and

stalking, distribution of child pornography, credit card fraud, human

trafficking, spoofing, identity theft, and online libel or slander.

2.) Crimes Against Property - Some online crimes occur against property,

such as a computer or server. These crimes include DDOS attacks,


235
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

hacking, virus transmission, cyber and typosquatting, computer vandalism,

copyright infringement, and IPR violations.

3.) Crimes Against Government - When a cybercrime is committed

against the government, it is considered an attack on that nation's

sovereignty. Cybercrimes against the government include hacking,

accessing confidential information, cyber warfare, cyber terrorism, and

pirated software.

Types of Cybercrimes

- Ransomware is a modern-day, technical twist on a crime that has been

around for ages. At its core, ransomware works when criminals steal

something of great value and demand payment in exchange for its return.

For most businesses, this involves the encryption of company data. When

ransomware hits, businesses come to a standstill, and employees cannot

do their jobs.

- Phishing is one of the main forms of social engineering attacks, and as

any social engineering attack, it tries to trick unsuspecting users into giving

away personal information. Usually, these cybercrimes are committed by


236
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

impersonating trusted and popular brands creating fake social media

profiles and rogue websites to lure users into them. These sites copy the

appearance of the real website to create a sense of security and usually ask

to fill forms with personal information to receive some kind of benefit, such

as discounts. The most refined of these sites might include malicious scripts

that scrap this information out of your browser, without the need of forms.

- Online Harassment is sadly very widespread in today’s world, even more

so when people feel protected by the anonymity that the internet grants us.

One of the fastest growing and most known online harassment in the last

years has been revenge porn. Online harassment and cyberbullying are

usually contained within social media in the form of posts, comments, or

direct messages, but they could also be sent through email. These

messages’ main form is mostly defamatory or threatening either against one

individual or group.

- Cyberstalking is another type of harassment that focuses on a single

person, which the criminal monitors closely. It is likely that employers,

colleagues and familiars of the victim also get contacted both to slander the

victim and to try and extract more personal information to deepen the

stalking activity.
237
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Password Attacks, these are simply meant to decrypt or even attempt to

obtain a user’s password with the help of criminal intentions. Attackers can

use Dictionary Attacks, Password Sniffers, or even Cracking programs in

such cases. These attacks are conducted by accessing passwords that are

exported or stored in a file.

How does it threaten National Security?

- For national security concerns, the likely cybercrime threats deal with

espionage activity, disruption, sabotage, politically motivated attacks, and

those which involve terrorism activities. Nowadays, Terrorists are using the

Internet for their recruitment, propaganda, planning, teach-ins, financing,

and even operational implementation. Swindling, estafa, scam or other

forms of computer fraud, counterfeiting and forgery are some of the

financially motivated cybercrime threats.

What is Cybersecurity?

- Cybersecurity is the ongoing effort to protect these networked systems

and all of the data from unauthorized use or harm. On a personal level, you

need to safeguard your identity, your data, and your computing devices. At

the corporate level, it is everyone’s responsibility to protect the


238
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

organization’s reputation, data, and customers. At the state level, national

security, and the safety and well-being of the citizens are at stake.

Advantages of Cybersecurity

- Cyber security will defend us from critical cyber-attacks.

- It helps us to browse the safe website.

- Cyber security will defend us from hacks & viruses

- The application of cyber security used in our PC needs to update every

week.

- Internet security processes all the incoming & outgoing data on our

computer.

- It helps to reduce computer chilling & crashes.

- Gives us privacy.

Safety Tips to Cybercrimes

- Use a full-service internet security suite

- Use strong passwords

- Keep your software updated

- Manage your social media settings

- Use anti-virus software and keep it updated


239
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Do not click on links in spam emails or untrusted websites

- Do not give out personal information unless secure

QUIZ

1. The act of copying and giving away files in an illegal manner is called?

A. Cyber Theft B. Cyber Vandalism

C. Cyber Robbery D. Cyber Burglary

2. Use electronic devices to harass, spy, or frighten someone is called?

A. Cyber Hunting B. Cyber Spying

C. Cyber Stalking D. Cyber Chasing

3. To protect your computer from viruses, you should install ______ in your

computer.

A. Disk Cleanup B. Backup Wizard

C. Antivirus D. Valorant

4. VIRUS stands for?

A. Very Information Resource Under Siege

B. Very Important Record User Searched

C. Very Intelligent Result Until Source

D. Very Interchanged Resource Under Search


240
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

5. It is considered an attack on that nation’s sovereignty

A. Crimes against Government

B. Crimes against People

C. Crimes against Property

D. Crimes against Animal

6. These crimes include DDoS attacks, hacking, computer vandalism, etc.,

What do you call this crime?

A. Crimes against People

B. Crimes against Property

C. Crimes against Government

D. Crimes against Animal

7. These crimes include cyber harassment, child pornography, and theft,

what did you called this?

A. Crimes against Animal

B. Crimes against People

C. Crimes against Government

D. Crimes against Property

8. Which of the following are the threats for the electronic payment system?

A. Computer worms

B. Computer virus
241
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

C. Trojan horse

D. All of the above

9. To protect yourself from computer hackers, you should turn on a?

A. Firewall B. Script

C. Antivirus D. VLC

10. Which of the following describes programs that can run independently

travel from system to system and disrupt communication

A. Worm B. Droppers

C. Trojan horse D. Viruses

11. Usually, these cybercrimes are committed by impersonating trusted and

popular brands creating fake social media profiles and rogue websites to

lure users into them. What types of cybercrime is this?

A. Ransomware

B. Phishing scam

C. Online harassment

D. Password attacks

12. This type of cybercrime is another type of harassment that focuses on

a single person, what type of cybercrime is this?

A. Online harassment

B. Cyberstalking
242
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

C. Password attacks

D. Ransomware

13. Which of the following would most likely not be a symptom of virus?

A. The CD-ROM stops functioning

B. Existing programs files and icons disappear

C. Odd messages

D. The web browser open to an unusual page

14. A ______ is a computer program that can replicate itself and spread

from one computer to another.

A. Computer Virus B. Pendrive

C. Mouse D. Antivirus

15. are often delivered to a PC through an email attachment and are often

designed to do harm

A. Portals B. Virus

C. Spam D. Email

16. Which ofs the following is known as Malicious Software?

A. Illegalware B. Badware

C. Malware D. Maliciousware
243
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

17. Firewalls are used to protect against?

A. Fire attacks

B. Virus attacks

C. Data driven attacks

D. Unauthorized access

18. A crime committed to the internet

A. Cybercrime B. Online crime

C. Animal Crime D. Crime

19. When criminals steal for something of great value and demand payment

in exchange, what type of crime is this?

A. Phishing B. Cyberstalking

C. Online harassment D. Ransomware

20. These attacks are conducted by accessing passwords that are extorted

or stored in a file.

A. Password attacks B. Cyberstalking

C. Ransomware D. Online harassment


244
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

ESSAY QUESTION (10 POINTS):

What Is the Most Harmful in The Types of Cybercrime?

References:

The History of Cyber Crime. | Le VPN (le-vpn.com)

What is Internet Crime? - Definition from Techopedia

What Are the Three Types of Cyber Crimes? | Swier Law Firm, Prof. LLC

What is Cybercrime? Types and Prevention | BlueVoyant

Advantages & Disadvantages of Cyber Security (exametc.com)

What is cybercrime? Types and how to protect yourself (kaspersky.com)

Ordinario, Clarence E.

Reporter
245
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Electronics Lifestyle
(Castro, Xena O.)
246
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

What is Electronic Lifestyle?

- A range of embedded consumer and lifestyle electronics product

development services integrating audio, video navigation and wireless

interfaces to help product development companies built next - gen futuristic

lifestyle and consumer electronic devices.

SMS Addiction

- Short for Short Message Service, leading to health problems. Assocham

Widespread availability of cheap unlimited text messages plans has been

made the service preferred mode of communication for youngster not only

in India but more so in the Philippines and its excessive use leading to

health problems among them says a study by industry body Assocham.


247
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Effects of SMS Addiction

1.) Insomnia - Also known as sleeplessness is a sleep disorder in which

people have trouble sleeping.

2.) Depression - Depression is a mood disorder that causes a persistent

feeling of sadness and loss of interest and can interfere with your daily life.
248
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

3.) Lack of Appetite - Loss of appetite can be related to lowered immune

system function feeling, unwell and having an upset stomach.

4.) Anxiety - is an emotion which is characterized by an unpleasant state

of inner turmoil and includes feelings or dread over anticipated events.


249
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- SMS ADDICTION can also affect your life when you get addicted to your

phone, you don't realize the time. You can’t do house chores and family

bonding because you are busy chatting or texting with others.

What is Online and Network Based Gaming?

- Online gaming describes "any video game that offers online interaction

with other players".

Effects of Online and Network Based Gaming?

- Various studies show that playing too much computer games " causes

physical damages and increase anxiety and depression in players.


250
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Online Shopping

- Online Shopping is the activity of buying products or services over the

internet. It means going online, landing on a seller's website, selecting

something and arranging for its delivery. The buyer either pays for the good

or service online with credit or debit card or upon delivery. In this case the

term "online" means on the internet.

Advantages of Online Shopping

- No Crowds

- No pressure

- Saves Times

- Saves Money

- Reviews of Product
251
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Disadvantages of Online Shopping

- Delayed order.

- Lack of significant discounts in online shops.

- Lack of touch and feel of merchandise in online shopping.

- Lack of experience.

- Lack of close examination in online shopping.

- Frauds in online shopping.

- Lack of interactivity in online shopping.

Blogging

- A video vlog or video log sometimes shortened to vlog is a form of blog for

which the medium is video. Vlog entries often combine embedded video

with supporting text images and other metadata.


252
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Benefits of Blogging

- Helps reach a wider audience

- Helps in gaining fame

- Allows direct engagement with the audience

- Provide information to masses

- Entertain people

- Creates revenue for the creator

- Boots your creativity

- The best medium for tutorials

What are Social Networks?

- A network and personal interaction and personal relationship, a dedicated

website or other application which enables users to communicate with each

other by posting information, comments, images.


253
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Benefits of Social Networks

- The benefits of social networks include their ability to help people connect

and stay in touch with family, friends and new contacts.

What are Personal Websites?

- A personal website can be about anything you want including hobbies,

pets. Or other interests. It can be a family website that shares your

adventures with loved ones along with an area for comments and

discussion.

Benefits of Personal Websites

- You get control your personal brand

- It's a useful way to show your creativity

- Not to mention the money you could earn


254
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Contact

- Stand out

What is Home Base?

- A home- based worker is an. Employer who performs his or her job from

home rather than a designated workspace at an employer’s site.

Benefits of Home Base

- Better work and financial opportunities

- Flexible working hours

- No more commutes

- More time for your personal life

- Better productivity

- No dress codes
255
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

- Cost savings

- Working anywhere

- A positive impact in the environment

What are Mobile Offices?

- A mobile office is a temporary or movable configuration of equipment and

services that allows a person to function as if he is working from a

permanent office.

Benefits of Mobile Offices

- Not having an office can save you money

- Without a commute you'll save time

- Less distraction increases productivity


256
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

QUIZ

1. It is a range of embedded consumer and lifestyle electronics product

development services integrating audio video navigation and wireless

interfaces to help product development companies build next-gen futuristic

lifestyle and consumer electronic devices.

2. It is a leading health problem.

3-6. (Give the effects of SMS ADDICTION)

7. It describes " any video game that offers online interaction with other

players.

8. It is the Activity of buying products or services over the internet.

9. In this term "____" means on the internet.

10-14. Advantages of online shopping.

15-17. Disadvantages of online shopping.

18-20. Benefits of blogging

21-25. What are social networks?

26-30. Benefits of home base


257
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

References:

SMS addiction leading health problem Assocham. The Economic Times

(indiatimes.com)

Online Gaming | History, Examples, Companies, & Facts| Britannica

Online shopping- definition and meaning - Market Business News

Home Based Business Definition - Entrepreneur Small Business

Encyclopedia

What is Vlogging? Definition History, & Impact on media (medikix.com)

Castro, Xena O.

Reporter
258
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

E-Learning
(Lavilla, Lourenz C.)
259
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

What is E-Learning?

- E-learning is a structured course or learning experience delivered

electronically; it can also include performance support content.

- There are also many different elements that can make up an e-learning

program, such as live or pre-recorded lecture content, video, quizzes,

simulations, games, activities, and other interactive elements.

- E-learning courses are typically managed and administered via a learning

management system (LMS).

- It helps organizations manage training events, self-paced courses, and

blended learning programs.

Importance of E-Learning

- E-learning has been introduced to empower learners to get basic

schooling and enhance skills. Also, they can obtain a degree certificate,

without actually attending school or university or any other institution.

- According to psychology, the audio-visual method of teaching leads to a

disciplined learning environment. There are effective tutor and student

engagements.

- Applying e-learning to all levels of schooling helped to ensure students

grasp the lessons adequately at a faster pace.


260
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

What is Online Education or Distance Learning?

- Online education is a flexible instructional delivery system that

encompasses any kind of learning that takes place via the Internet.

- Online learning gives educators an opportunity to reach students who may

not be able to enroll in a traditional classroom course and supports students

who need to work on their own schedule and at their own pace.

- Distance learning describes any learning that happens without the

students being physically present in the lesson.

Common Types

Online education:

•Asynchronous Online Courses

•Hybrid Courses

•Distributing Materials

Distance Learning:

•Video conferencing

•Computer-based

•Open-schedule
261
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

Advantages and Disadvantages of Online Learning

- Certainly, live instruction is great. The face-to-face contact lets teachers

and students connect in a very authentic way, which often results in strong

rapport and understanding.

Advantages Disadvantages

- Greater Flexibility - Lack of Social Interaction

- No commuting - High Chances of Distraction

- Significant Cost Savings

Benefits of Computer Based Training

- In-person training can come with many hidden costs, including travel,

instructor fees, and employee productivity.

- Studies indicate that e-Learning has the potential to reduce overall training

time by 40% – 60%. Reducing training time means more time for your

employees to work on tasks that affect your organization’s bottom line.

- The cost of hiring someone to train employees and improve retention can

be a large financial burden.


262
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

QUIZ

Give 10 own opinions to all topics (10 pts)

Give 3 Common Types of Online Education Based on the Presentation (3

pts)

Give 2 Common Types of Distance Learning Based on the Presentation (2

pts)

Give 3 Advantages of Distance Learning Based on the Presentation (3 pts)

Give 2 Disadvantages of Distance Learning Based on the Presentation (2

pts)

Give at least 2 given topics (10 pts)

References:

https://www.td.org/talent-development-glossary-terms/what-is-e-

learning#what%20is

https://www.digitalclassworld.com/blog/importance-of-elearning-in-

education

https://www.viewsonic.com/library/education/what-is-distance-learning-

and-why-is-it-so-important/?fbclid=IwAR0q--

euvfgIKU_lM_n_3TH2f2oxOlLPqNF5V9gQNcuJQXUhVY4J8vn_Yrw
263
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A

https://www.encyclopedia.com/finance/finance-and-accounting-

magazines/online-

education?fbclid=IwAR3d9Ep8wpsmgzEYnOkx8tdJUAiwsiiZfdlJMk9TtWV

zr-22TQeLBmpDgUY

https://eztalks.com/elearning/advantages-and-disadvantages-of-distance-

learning.html?fbclid=IwAR02_kSSsfBIltHOnb2jNXCnqpiFvplf--

Fx2F2JGmj0B6Slp0ZIR9_M9MI

https://inspiredelearning.com/blog/benefits-of-computer-based-training-for-

corporate-education/

Lavilla, Lourenz C.

Reporter

You might also like