Professional Documents
Culture Documents
23 Final
23 Final
SUBMITTED BY:
DIT – S2C2
SUBMITTED TO:
Mrs. Araceli L. Jabal, M.A. Ed.
Preface
This compilation is done to bind all the reports split amongst the
students via chronological order, by topic, and by lesson. Some reports
may have medias inserted within their reports, such as diagrams,
photos and charts that help support the main idea of their topic.
Each end of the report has the reporters’ printed name and their
signature to certify that they are the ones that have reported the
material, with this, the bundle of reports is proven as credible and
trustworthy.
ii
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Acknowledgement
And to all the students who have done their effort in submitting
their final copy of their reports for the compilation, the valiant efforts
are deeply appreciated.
We thank you.
iii
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Table of Contents
Preface ....................................................................................................... i
Acknowledgement ..................................................................................... ii
Table of Contents
digital devices communicate and manage the content and activities within
it. The concept is based on digital electronics systems which are integrated
Digital Influence
- With around 2.9 billion monthly active users, Facebook is the most popular
- Twitter has some 330 million monthly active users (MAU) based on its last
reported data that leveraged this metric in the 1st quarter of 2019. As of
2020, Twitter's monetizable daily active users (mDAU) stands at 166 million,
Authentication Information
identity.
Cyberbullying
QUIZ
A. Cyber Bullying
B. Identity Theft
C. Authentication Information
D. Network
5
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
2. Is the use of cell phones, instant messaging, e-mail, chat rooms or social
intimidate someone.
A. Digital Issue
C. Cyber Bullying
D. Authentication
A. User
B. Networks
C. Digital Environment
D. Authentication Information
equalizer (2 points)
News users
10. Advanced more rapidly than any innovation in our history – reaching
around 50 per cent of the developing world's population in only two decades
A. Digital Environment
B. Digital Influence
C. Digital Issues
D. Digital News
ESSAY: What can you do to help about Cyberbullying and how can you
References:
https://www.sciencedirect.com
https://www.igi-global.com
Reporter Reporter
7
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Digital Divide
(Delos Santos, Nicah P.)
8
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Digital Divide
- It refers to the gap between those who benefit from the digital age and
those who don't, and those that don't have restricted access. This
internet connectivity.
Infrastructure
- Research shows that the digital divide is more than just an access issue
Location
offices, schools, libraries, public spaces, internet cafes and others. There
Application
provides ratings from media and technology with the goal of providing
information on their suitability for children. It also funds research on the role
of media in the lives of children and advocates publicly for children’s friendly
QUIZ
B. Poverty and the economic barriers that limit resources and prevent
2. The gap between those who benefit from the digital age and those who
don’t
A. Digital issue
B. Digital environment
C. Digital Divide
D. System trends
11
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
A. Skills
B. Infrastructure
C. Wi-Fi
D. Internet
A. Places
B. Location
C. Areas
D. Maps
5. Literacy that shows that the digital divide is more than just an access
equipment.
A. Media literacy
B. World literacy
C. Philippine literacy
and technology
C. Networks D. Accounts
C. Account D. User
Essay 5pts.
References:
Reporter
13
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Information System
Trends
(Dequiros, Miguel T.)
14
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
introduction in the 1950s. Today devices you can hold in one hand are more
powerful than the computers used to land a man on the moon in 1969. The
Internet has made the entire world accessible to you, allowing you to
communicate and collaborate like never before. This will examine current
Global
15
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- The first trend to note is the continuing expansion of globalization. The use
of the Internet is growing all over the world, and with it the use of digital
devices. Penetration rates, the percent of the population using the Internet,
remains high in the developed world, but other continents are gaining.
5.25 billion people have access to and use the internet. That means that
66.2% of the world's population uses the internet. In 2022, Asia will continue
Personal
- Ever since the advent of Web 2.0 and e-commerce, users of information
Mobile
- Perhaps the most impactful trend in digital technologies in the last decade
has been the advent of mobile technologies. Beginning with the simple
cellphone in the 1990s and evolving into the smartphones of today, the
growth of mobile has been overwhelming. Here are some key indicators:
1.) Mobile vs. Desktop - Minutes spent each day on a mobile device are
afford a basic smartphone and mobile internet access, but can’t necessarily
2.) Daytime vs. Evening - Desktop use dominates in the daytime hours,
but mobile devices are dominant in the evening, with peak usage around
8:00 pm.
3.) Device usage - Smartphones are used more than any other technology.
Laptops are in second place, followed by tablets holding a slight edge over
desktops.
number of ways. For instance, the volume of local search queries (such as
“restaurants near me”) has declined among desktop users but continues to
Social Media Usage - Approximately 83% of all social media visits are from
In fact, roughly half of social media users only use mobile devices to access
their social network of choice. This can largely be attributed to the popularity
general.
mobile apps), desktop remains dominant. While mobile visits made up 58%
spent online. In other words, more individual searches are made on mobile,
different platforms and categories, but we can gain some insight from the
and 47% from mobile gaming. Part of this disconnect can be explained by
with the fourth quarter of 2016. This is the first decline in global smartphone
Channel Share Tracker. Premium device sales slowed after the holiday
and tax season sales were weaker as Q1 2021 saw an added stimulus
money boost.
21
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
continued to dominate the market with a combined 75% share and had
aggressive, becoming the third largest OEM in 2021. In Q1 2022, its market
refreshing its G series with new 5G devices in Q2, the Moto G Stylus 5G
2022 and Moto G 5G, which will help the OEM increase its 5G sales in 2022.
TCL also made big gains in market share to reach almost 3%. While known
for its TVs, TCL has been putting in extra marketing efforts to win mindshare
grow in share YoY, but the OEM had a slow quarter overall as the increased
OnePlus 10 Pro has been relatively weak, but the OEM hopes to recapture
some share with the new N20 5G that will launch in early Q2.”
22
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
5.) The rise and fall of tablets - In 2012 the iPad sold more than three
times as many units in its first twelve months as the iPhone did in its first
twelve months.
- According to market research firm IDC, 2021 will see the highest annual
year-over-year growth for the next five years for computing devices
grow 14.2% in 2021 to 347 million units. (That's down from a previous
forecast of 18%.) Tablets will grow just 3.4%. After 2021, tablets will enter
a period of decline, with the steepest decline expected in 2022 and more
modest decline through 2025. Desktops will also enter a period of decline
be 3.4%.
Wearable
- Wearables have been around for a long time, with technologies such as
hearing aids and, later, Bluetooth earpieces. The average smartphone user
looks at his or her smartphone 150 times a day for functions such as
messaging (23 times), phone calls (22), listening to music (13), and social
media (9). Many of these functions would be much better served if the
technology was worn on, or even physically integrated into, our bodies. This
2007, the strong growth predicted by 2021. Total wearable devices are
Collaborative
ever to share data with each other for mutual benefit. Some of this sharing
traffic statistics. Other data can be reported actively, such as adding your
Examples of Applications
Apple Maps is a web mapping service developed by Apple Inc. The default
and estimated times of arrival for driving, walking, cycling, and public
transportation navigation.
25
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
specific point, calculate routes, find the nearest places of interest or see the
Waze is a community-based tool that keeps track of the route you are
traveling and how fast you are making your way to your destination. In return
for providing your data, you can benefit from the data being sent from all of
the other users of the app. Waze directs you around traffic and accidents
Printable
printer. A 3-D printer allows you to print virtually any 3-D object based on a
layer upon layer of the model using malleable materials, such as different
types of glass, metals, or even wax. 3-D printing is quite useful for
marketability. 3-D printing has also been used to create working prosthetic
legs and an ear that can hear beyond the range of normal hearing. Here is
$399.00
27
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
can construct a building. It has a large arm and a small arm. The large arm
moves around the perimeter of the building while the small arm sprays a
produced with 3D printing using both metal and plastic. You can click here
Medical Models - Medical models are being used to help doctors train in
printed brain model similar to the one shown here, surgeons were able to
clothes that consume less raw materials. Initially the challenge was to find
materials that would not break. You can read more about 3D printing of
Findable
Examples are Lights can be turned on or off remotely and Thermostats can
be reset with anyone being present. Think of IoT as devices that you
but a fitness band could be. One keyword for IoT would be “independent”,
manufacturing formulas.
30
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
performing.
utilities.
Autonomous
1. Nanobots
is showing promise for applications in the medical field. For example, a set
a specific disease. are tiny biological machines that can deliver drugs to the
target destination to make them more efficacious and reduce side effects,
2. Self-Driving Cars
32
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
to take control of the vehicle at any time, nor is a human passenger required
can fly without a pilot. Instead of a pilot, they are either run autonomously
While most drones today are used for military or civil applications, there is
Secure
increased security. The CIA triad is a common model that forms the basis
for the development of security systems. They are used for finding
crucial to the operation of a business, and the CIA triad segments these
three ideas into separate focal points. This differentiation is helpful because
it helps guide security teams as they pinpoint the different ways in which
they can address each concern. Ideally, when all three standards have been
met, the security profile of the organization is stronger and better equipped
personnel and ensure that only those authorized individuals view this data.
The data may be divided into sections according to the security or sensitivity
level of the information. For example, a Java program developer should not
during its entire life cycle. Data must be unaltered during transit and not
data.
the availability of the network and data to the authorized users. Plans should
to the users.
is the process of determining whether a user is who they say they are.
Types of Authentications
only requires one factor to gain full system access. It could be a username
essentially double-checks that a user is. With this method, users enter their
app, a phone number, or device that can receive a push notification or SMS
code, or a biometric like fingerprint (Touch ID) or facial (Face ID) or voice
recognition.
C. Single Sign On - With SSO, users only have to log in to one application
and, in doing so, gain access to many other applications. This method is
operative sessions.
regulate who is able (or not able) to view, access, or use specific resources
and/or information.
trespassing, and are especially useful in facilities that require higher levels
38
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
stronger your password, the more protected your computer will be from
hackers and malicious software. You should maintain strong passwords for
QUIZ
1. In global, do the devices today are more powerful than the computers
b. No, because there are advantages and disadvantages between the two
devices.
c. Maybe, because today’s devices that you’re holding can do the same
internet population?
a. 50.8%
b. 87.5 %
c. 53.1 %
d. 67.9%
mobile internet.
41
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
a. 90%
b. 86%
c. 75%
d. 58%
5. What do you think roughly half of social media users only use mobile
d. Just because they want it to show what they want to share online.
a. US Monthly Smartphone
b. Counterpoint Research
c. The internet
d. Me
42
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
7. What does the average smartphone user look at his or her smartphone
per day?
a. 120 times
b. 50 times
c. 89 times
d. 150 times
c. A community-based tool that keeps track of the route you are traveling
and how fast you are making your way to your destination.
c. A community-based tool that keeps track of the route you are traveling
and how fast you are making your way to your destination.
c. A community-based tool that keeps track of the route you are traveling
and how fast you are making your way to your destination.
a. It is a guide for security teams as they pinpoint the different ways in which
References:
https://www.broadbandsearch.net/blog/internet-statistics
https://www.highspeedinternet.net/desktop-and-mobile-internet-usage-
statistics/
https://www.counterpointresearch.com/us-smartphone-sales-decline-6-
yoy-q1-2022-pandemic-demand-cools/
45
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
https://opentextbook.site/informationsystems2019/chapter/chapter-13-
future-trends-in-information-systems-information-systems-
introduction/#footnote-41-1
https://thejournal.com/articles/2021/08/25/as-tablets-decline-notebooks-
will-drive-growth-in-computing-devices.aspx?m=1
https://www.fortinet.com/resources/cyberglossary/cia-triad
https://www.openpath.com/blog-post/physical-access-control
https://www.identiv.com/community/2020/08/06/whats-the-difference-
between-logical-access-control-and-physical-access-control/
https://www.techtarget.com/searchsecurity/definition/access-control
https://www.sailpoint.com/identity-library/authentication-methods-used-for-
network-security/
https://www.sixt.com/magazine/tips/top-free-navigation-apps/
Dequiros, Miguel T.
Reporter
46
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Emerging and
Converging
Information
Communication
(Ignacio, Jiro C.)
47
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
transmit information.
organizations, or businesses.
exchange of data and information with others using the online world or in
layman’s terms, the internet. With the use of the internet, people can access
tons of various information within a few clicks of the mouse, as we can see,
people can stream their music online, search something, interact with
friends, watch movies and such, are effects of the evolution or emergence
of technology.
48
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- With regards to how people use the internet, it can promote and provide
- ICT permeates all aspects of life, providing newer, better, and quicker
ways for people to interact, network, seek help, gain access to information,
and learn.
really changes the lives of every person nowadays. For example, the
for us people in this 21st century, is the news that is brought to us by the
communication.
we can consider it as our second home, for the internet paves the way of us
being able to cope with the technology nowadays and access various
find as interesting, with the use of IT, the lives of people can be smooth and
free-flowing.
50
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
intelligence and behavior, whether or not it learns for itself. For example,
engines and so on. And Artificial Intelligence wouldn’t exist without ML,
world are clearly and can really be seen wherever we go, tons of technology
that has emerged and converged! Imagine, from traditional living back then,
- For the first example we have that incorporates the idea of Artificial
Intelligence (AI), is with the idea of having to have access to digital maps
and its prior navigation to any place you want to go to. Travelling to a new
destination does not require much thought any longer. Rather than relying
on confusing address directions, we can now easily open our phone's map
51
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
app and type in our destination. Again, we can see the transition traditionally
to digitally. And with this, the applications that we have in mind can be
- With this topic in mind, it is truly accompanied with what we call the Global
of the use of similar AI technology, as a result, with the concept and idea of
machine learning, the app can also navigate from your starting point to your
destination!
52
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
2. SHAREit
- For the next part, the second example of Artificial Intelligence is the
to share and receive files digitally using just the Bluetooth, WiFi and the
GPS. With these, users can remotely share files, games, songs, photos,
videos & etc. to their friends with just a few clicks of buttons on their phone!
3. GOOGLE LENS
incorporated. Google Lens! This application provides end users with their
tagline suggests, “Search what you see”, “Shop what you see”, “Translate
- Those are just the possibilities and opportunities that Google Lens can
offer and cover on, it helps us find what we find in the real world. Whenever
to know the name of, shopping for a specific brand of cloth and such. With
the help of this application, people’s lives will be changed after this kind of
camera and machine learning to not only detect an object in front of the
4. FACIAL RECOGNITION
- Facial Recognition is the term we are all familiar with, even little kids
nowadays are. From the word itself, it can be understood pretty quickly, to
which devices that use artificial intelligence that enable us to recognize our
faces. Other names can include face ID, biometric identification, identity
verification.
database.
the background. The algorithm typically starts by searching for human eyes,
followed by eyebrows, nose, mouth, nostrils, and iris. Once all the facial
both positive and negative images confirm that it is a human face. Thus,
once succeeding, the system stores the face onto a database and whenever
phones. This acts as a password option for owners to unlock using their
face, with other people’s faces, they can’t unlock it, an easy concept.
certify that the user is truthfully the one that is interacting with the system
and not a hoax person that uses their IDs, but with an additional work of
- This next topic under Artificial Intelligence (AI) is with the use of online
supplier, demand and supply can now be done digitally! Most common cash
payment applications are the ones that are commonly known, such as
- As the world is fused with traditional and digital means, we still can’t
and digital payments is one big factor of it. The world is moving too fast,
ain’t it?
56
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Comparing it to the 20th century, where people normally pay for things
cash payment but with the emergence of these technologies, online and
digital cash payments are made possible. As you can see, we can pay our
bills online, pay on restaurants with QR Codes, all of these are possible
6. SPEECH-TO-TEXT
don’t have the time to type, or if they are just primarily lazy. But with humor
aside, the intelligence and the voice recognition that is involved with the
learning and typing it in the document! The benefit of this intelligence makes
students’ learning simplified and less tedious if they took notes via speech
is available for people, then why not? The goal of technology is to make
kiosks or self-ordering kiosks and the Jollibots that was introduced lately.
58
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
A. KIOSKS
- First, we are tackling fast food kiosks that are not only in Jollibee but in
almost every fast-food chain, and not just in the Philippines but around the
world. It can be seen that this type of ordering method on restaurants can
help reduce lengthy lines and as well as having efficient and an easy task
to do to state your order, when ordering via kiosk, browse through the menu
digitally, add items and get a receipt to pay for DIGITALLY or IN CASH.
- For example, the picture depicts a person that is ordering McDonald's via
kiosk and after ordering, you’ll get a number by the side. And after this, you
will get a receipt, and you can do this relatively easy as if we people are
B. JOLLIBOTS
- And then next, are known as Jollibots, not the kid’s toys on value meals
but the cat robots that are recently invented. This Jollibot uses Artificial
table numbers.
- The greatness that the robot can bring is that it is taught by machine
learning, to serve foods that are assigned to them by the crew. And what’s
robot programmed to act like a human that can help efficiency within the
multifunctional, what a robot is programmed to do, not just serve food but
to also clean tables, and play music almost like a human crew!
60
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
8. E-COMMERCE WEBSITES
- SHOPEE! LAH-ZA-DA! I’m pretty sure almost every person is familiar with
those jingles by the two e-commerce websites that are common in our
because it serves as our go-to and convenient way to shop various things
online that might pique our interest, so, Shopee and Lazada provides to us
the results to rank the most relevant products higher, maximizing your sales,
today who have established and researched self-driving cars that made it
topic of digital maps and navigation. You first pick your destination and it
intelligence that learned to pilot a car on the streets and avoid traffic and
take the fastest routes possible! Without machine learning, this wouldn’t be
possible!
- Tesla uses machine learning under the artificial intelligence with its type,
and there are three types of machine learning, out of those three, Tesla
uses reinforcement learning. Where the AI learns via trial and error or it
learns by itself.
62
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Most of the time, this method is often observed with strategic games
every pinpoint of the map to the real world. Again, the technology is learning
- On the contrary, Tesla is not just about the self-driving feature that it gives
to people, it also has sensors to prevent theft, the user has a key on their
phone that the Tesla scans for the person to be able to use the Tesla to
themselves. Additionally, when you have a pet with the car and you are
about to do an errand, leaving the pet in the car, Tesla ventilates the car
Google Assistant. It can be the Siri of Android. What it does is it can tell you
the time, weather and even the name you have registered!
63
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- It incorporates the idea of artificial intelligence because given that you are
accurately; hence, machine learning over again! But this time, it’s
supervised learning!
- Google Assistant’s role is from the word itself, your personal assistant.
You can ask what the weather is tomorrow, schedule your alarms and
problems that are either too much workload or we’re just too lazy. But either
- Additionally, a feature that is awesome is it can help you search the song
you’re looking for whenever you don’t know the title! Just hum, sing the
lyrics or play an instrument for it to hear and decipher what music you are
finding, or pull out your G.A. whenever you hear the song in public!
- This is an efficient tool whenever you’re outside and hear a catchy song,
pull out google assistant and you can know the song pretty easily, its
efficient! Or if you heard a song and didn’t manage to pull out G.A., well at
least you can still hum or sing some lyrics of the song, as long as G.A.
understands you, it can provide accurate and some inaccurate results of the
in advance. Machine learning is the part of AI that helps machines learn and
understand on their own and can be likened similarly to our human brain.
example or pattern. Based on the sample data that the machine has been
given, it can build models to systematically map and compare new data or
situations with past events and patterns and project outcomes. Sometimes
the outcomes from machine learning falsely appear to have been produced
by intelligent means.
backbone of AI, although it cannot exist without each other. Without the idea
say it is not fully developed yet. Other terms for ML could be the algorithm
of a system.
2) The ML/AI analyzes thoroughly its title, main idea of the video, etc.
3) ML now finds patterns and finds similar videos from the data that has
been inputted.
4) Once it found patterns and similar videos, it will now show up in your
5) And then finally, the ML stores the feedback if the user did watch some
reinforcement learning.
- In supervised learning, both the input and desired output are provided and
the machine must learn how to map the former to the latter. To accomplish
inputs. The machine must uncover patterns and draw inferences by itself,
score. The algorithm seeks to receive positive scores and the model is
Supervised Learning
classifying information based on the input of the user. And from the photo
of the robot previously, it can be seen that the user teaches the robot that a
- For an example that we all can relate on and are familiar of, is YouTube’s
but if a robot did categorize video via an idea, how did it know to call it that?
Entertainment”?
Unsupervised Learning
provided any information, it learns on its own and classifies things based on
how they look like. The machine must uncover patterns and draw inferences
by itself.
69
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Reinforcement Learning
- And then, lastly for the reinforcement learning, where a machine can learn
via the interaction with the user or without the user at all, trial and error type
of learning. Learning without the user has an example of the 9th example
- A self-driving car for which getting from one location to another without
buildings apart would receive a positive score. Hence, a machine’s trial and
play against a computer (CPU) in a chess game, there are a lot of difficulty
levels that vary depending on the user’s capabilities, leading to the learning
things that composes of technology makes our life easier, we just don’t
2) 24/7 AVAILABILITY - There are many studies that show humans are
productive only about 3 to 4 hours in a day. Humans also need breaks and
time offs to balance their work life and personal life. But AI can work
endlessly without breaks. They can even handle tedious repetitive jobs
easily with the help of AI algorithms. We can access these types of materials
companies engage with users using digital assistants, which eliminates the
need for human personnel. Many websites utilize digital assistants to deliver
behind numerous innovations that will aid humans in resolving the majority
being unemployed, like for example, the Jollibots launched by the Jollibee
leading people to increase their dependency as well as them being lazy and
Intelligence everywhere we go, these are costly to make and develop with
its full functions and capabilities. Since AI is updating and improving every
day, the hardware and software need to get updated with time to meet the
plenty of costs. It’ s creation requires huge costs as they are very complex
machines.
there are still some technologies that are still in development, as a result,
some of the queries inquired by the user can sometimes be inaccurate from
QUIZ
A. It is an evolution of the human species that is created for the sake of the
a human being.
3. A person who is non-tech savvy and is currently 55 years old got hired
into a company, but he didn’t know that technology is a big deal and AI is
mostly used here. If the person worked here, what is the possible
A. The person may feel hesitant but still adjusted and found means.
B. The person may feel unfamiliar with the technology and may feel
D. The person may feel that technology is non-essential to his life therefore,
4. If a person worked for a job for almost eight years, yet after those years,
the person got fired, what is the reason for this action?
A. The technology on the company was doing better and more intelligent
B. The person got tired of the job and decided to find a new one instead.
employees.
Tesla.
B. Improved security on the cyberworld we have today and how people are
secured online.
bunch of materials.
purpose is for you to know what you see with your peripherals, what you
homework that is due 12:00 midnight, she encounters a problem that she
cannot solve, she doesn’t know the formula for it either. Therefore, she
reaches for her phone and pulls out an application that brought out the ease
and her problem is now solved and at the same time, she learned
76
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
8. Refer to item #7, if Cerise did continue her behavior on using the
application all the time, what disadvantage can you infer from this situation
10. Due to the rapid expansion and growth of the country and industry, the
prevalent in our lives, with regards to this, which real life example does not
evaluate the data inputted by the user and then return a desired output?
B. A botanist scanning a plant with Google Lens to know what kind of plant
it is.
A. SVL analyzes and classifies the data provided; USVL uses trial-and-
C. SVL draws inferences itself from the data; USVL classifies out the data
provided.
D. SVL classifies the data provided by the user; USVL learns on its own
12. If a toddler is given building blocks to play with, and in some way. the
toddler grouped the blocks by color, what kind of learning does the toddler
depict?
13. Which of the following examples best describes an idea of the jump
A. Tez, who uses a wristwatch to tell the time, now looks at the phone for
time.
B. Rhen who sets an alarm clock traditionally has an alarm set on her
phone.
C. IO who takes photos on his camera now pulls out a phone for the idea of
phonetography.
D. Liv who pays via cash on fast food restaurants before, pays via QR Code
scans nowadays.
people.
B. ML provides a wide array of learnings that a user can also have and
15. If you got the chance to live in the 20th century, you live in the same era
with your parents, where digital technology has not been invented yet, what
16. Let’s say you want to explain machine learning types to a younger
person than you. In Layman’s terms, how can you describe and differentiate
B. SV learns by sorting items given; RE clusters every item given to it; USV
is a thumb drive.
C. USV groups all items given to it; RE learns by working things out; SV
17. How do E-Commerce websites help the daily living of every civilian on
financial status.
that helps boost the sales of the sellers of the said website.
to traditional shopping.
D. Kura Sushi in Japan, a conveyor belt sushi place that uses digital
19. If you are playing Games of the Generals against a friend, what kind of
20. It was one Sunday evening, it was raining heavily, a mother and her
child were discussing how school was in the previous week; the
conversation of the mother and the child; the child then got scared and the
parent urged the child to sleep. Later on, the power comes back, and the
situation, knowing that classes are suspended the next day. What can you
A. The mother judged and knew based from the heavy rains that there
B. The mother has viewed from the news online that classes are
suspended, necessary for her child and for her personal break also.
D. The mother read the news online and informed other mothers as well
21. In what way does Spotify implement the two types of Machine Learning
(ML)?
A. Spotify tracks your recent listening on the application and then lists it on
its database.
B. Spotify tracks the recent songs you’ve played and clusters it and then
recommended to you.
C. Spotify recommends music that you might like and automatically stores
D. Spotify tracks and records the recent songs that were played and
all the time, and he used this for almost four years already. But after
was happy on some of the results and disappointed in some. What is the
23. You are bored on a Saturday evening and you are finding productive
things to do, so you have decided to play some online chess with an AI
opponent, you won against the AI. How does Machine Learning’s learning,
the player and improves itself whenever the AI loses the game, leading for
B. AI has the ability to manipulate information and win every single time
C. The AI learns like a human and is not perfect but continuously improves
24. On December 25, 2048, the fast-food restaurant is filled with a lot of
stomachs of the people, making people hangry. With this in hand, what
A. Hire more manpower to split up the jobs that they struggle with, if this
happens, the flow of the establishment can grow as fast and less tedious.
is jam-packed.
D. Identify the root cause of the problem and put additional tills and add
25. How does Netflix predict and recommend movies that are within your
A. Netflix recommends random movies that you might like and prefer as a
part of an exploration on the application, Netflix’s idea is for the user to enjoy
C. Netflix incorporates machine learning and regresses the input movie from
the user.
input, analyzes it, and generates movies that are grouped and classified
Essay (5pts):” Do you think artificial intelligence will overcome and become
References:
https://www.apptus.com/blog/machine-learning-future-of-online-
shopping/#:~:text=AI%3D%20Artificial%20Intelligence&text=We%20may
%20not%20think%20about,smart%20gadgets%20in%20our%20homes
https://itchronicles.com/information-and-communication-technology/the-
importance-of-information-and-communication-technology-ict/
https://www.techopedia.com/definition/190/artificial-intelligence-ai
https://www.suneratech.com/blog/ai-ml-and-how-they-are-applied-to-
facial-recognition-
technology/#:~:text=Facial%20recognition%20is%20one%20of,or%20vide
o%20from%20a%20database
https://youtu.be/tlThdr3O5Qohttps://nexusintegra.io/advantages-
disadvantages-artificial-intelligence/
https://towardsdatascience.com/advantages-and-disadvantages-of-
artificial-intelligence-182a5ef6588c
https://www.guavus.com/clarifying-ai-vs-machine-learning-part-3-series/
Ignacio, Jiro C.
Reporter
86
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- What comes into your mind when someone asks you "what is robotics or
robots?"
mechanical robots that substitute for (or mimic) human actions. Pop culture
ideas of robots usually seem like a sketch of a real thing. Robots are
becoming advanced and gaining mechanical capabilities that don’t put the
responsible for welding or screwing on specific car parts. But now we’re
consists of the design, development and use of bots that explore earth’s
- Usage Games
- Automotive Industry
Healthcare
The earliest robots as we know them were created in the early 1950s by
Automation." For the next decade, he attempted to sell his product in the
Joseph Engleberger acquired Devol's robot patent and was able to modify
and market the robots. For his efforts and successes, Engleberger is known
cam, camshaft, segmental gear, the first mechanical clocks driven by water
and weights, and especially the crankshaft, which is considered the most
important mechanical invention in history after the wheel. Not bad for a guy
reducing the amount of labor and production costs and time associated with
arms with 4-6 axes and varying degrees of freedom. They can perform
removal applications.
automated platform that moves items from one place to another. While
these robot systems are used heavily in manufacturing for carrying tools
and spare parts, they are also used in the agricultural industry for
industries because of their ability to swim and fly, as well as move along the
ground.
Data Acquisition and Control Robotic Systems - are used to gather, process
and transmit data for a variety of signals. They are also used in software for
engineering and business. Many of the mobile robotic systems can use
Advantages of Robotics
consistency of products.
- Until they wear out, they can do the same thing again and again.
- Robots can work in environments which are unsafe for humans – in the
- Robots don’t have the same environmental requirements that humans do,
humans.
Disadvantages of Robotics
- The use of robots can create economic problems if they replace human
jobs.
- Robots can only do what they are told to do – they can’t improvise.
92
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- This means that safety procedures are needed to protect humans and
other robots
- Although robots can be superior to humans in some ways, they are less
dexterous than humans, they don’t have such powerful brains, and cannot
- Often robots are very costly – in terms of the initial cost, maintenance, the
need for extra components and the need to be programmed to do the task.
What is RPA?
RPA technology creates software programs or bots that can log into
applications, enter data, calculate and complete tasks, and copy data
machine learning, RPA can capture more context from the content it is
RPA software is that business units can implement it without having to learn
- RPA mirrors the way people are accustomed to interacting with and
thinking about software applications. RPA's ability to copy the way humans
interfaces (APIs) or low-code development that are more scalable but less
- The simplest RPA bots can be created by recording the clicks and
can simply watch how the bot is connecting with the app and identify the
more robust bots that can adapt to changes in screen size, layout or
workflows. More sophisticated RPA tools use machine vision to interpret the
- Some RPA tools are also able to use these initial recordings to create
hybrid RPA bots that start by simply recording an existing workflow and then
of hybrid bots take advantage of the simplicity of RPA development and the
- In other RPA implementations, process mining and task mining tools are
starting templates for RPA automations. The process mining can analyze
across multiple apps. All the major RPA vendors are starting to develop
- RPA tools can also be connected to AI modules that have capabilities like
- There are a number of challenges related to RPA, which have limited its
use.
they can be hard to govern and manage and therefore hard to scale.
- Limited abilities - While its name includes the words "process automation,"
many critics have pointed out that RPA software tools automate tasks. More
work is often required to stitch multiple tasks together into a process. Craig
observe the "rule of five" in building RPA applications because they tend to
break when a bot must make more than five decisions, manipulate more
GDPR. For example, if an RPA bot moved data outside of a given country
Efficiency - RPA bots manually plod through an application in the same way
Applications of RPA
approvals or rejections.
analytics.
processes.
increasingly digital world. Although they are two different technologies, both
terms are often used as synonyms. But what are the differences and
simulated environment.
- Instead of viewing a screen in front of them, users are immersed and able
- Virtual Reality and Augmented Reality are two sides of the same coin. You
could think of Augmented Reality as a VR with one foot in the real world.
Benefits of AR and VR
possible, complete with sight and sound. The VR headsets provide high-
resolution content with a wide field of view. Whether you’re flying or fighting
and training purposes and the experience is made possible with graphical
of VR, honestly because it’s very common in our everyday lives. The
Advantages:
Disadvantages:
2. Real-time interaction.
will place the 3D digital content within the user’s field of view. Early-stage
environment by examining the features present in the data in real time. This
space where the user is located. Clearly, this technology uses the location
104
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
and sensors of a smart device to position the virtual object at the desired
object with an updated virtual image of that object for the human eye.
special cameras, is used for human eyes to outline specific objects with
lines to facilitate certain situations. For example, it can be used for car
Advantages:
improved.
105
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Disadvantages:
5G
standard after 1G, 2G, 3G, and 4G networks. 5G enables a new kind of
Who invented 5G
- No company or person owns 5G, but there are several companies within
has played a major role in inventing the many foundational technologies that
drive the industry forward and make up 5G, the next wireless standard.
from the air interface to the service layer. Other 3GPP 5G members range
- The previous generations of mobile networks are 1G, 2G, 3G, and 4G.
107
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
First Generation: 1G
Second Generation: 2G
Multiple Access)
Third Generation: 3G
Fourth Generation: 4
- 1G, 2G, 3G, and 4G all led to 5G, which is designed to provide more
- With high speeds, superior reliability and negligible latency, 5G will expand
the mobile ecosystem into new realms. 5G will impact every industry,
108
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
and home systems connecting users and devices to the core network.
Macro Cells use multiple input and output antennas that enable one to send
efficiently. The core manages the advanced features of 5G, like network
that not only elevates mobile broadband experiences, but also supports new
109
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
can also natively support all spectrum types (licensed, shared, unlicensed)
and bands (low, mid, high), a wide range of deployment models (from
- 5G is also designed to get the most out of every bit of spectrum across a
low bands below 1 GHz, to mid bands from 1 GHz to 6 GHz, to high bands
5G is faster than 4G
efficiency.
Mission-critical communications
- 5G can enable new services that can transform industries with ultra-
Massive IoT
sensors in virtually everything through the ability to scale down in data rates,
111
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
solutions.
Advantage of 5G Technology
Gbps (5G)) and decrease latency (response time between devices). These
desired “smart cities”. The correct performance of these new dynamics will
Disadvantages of 5G Technology
devices that can support it; current 4G devices do not have this capability
bandwidth and expand coverage, and this is not cheap. This situation will
necessarily lead to delays in its implementation due to the high costs that
- Risks in security and proper data handling - All of this requires optimal
data management, and this is where the most conflictive part of the
and even governments, not only issues such as Big Data techniques are
QUIZ
QUESTIONS:
and achievements.
50 mechanical inventions.
6. This means that safety procedures are needed to protect humans and
other robots.
8. Robots have some sensors/ actuators which are more capable than
humans.
9. Robots can only do what they are told to do they can't improvise
(Essay)10pts.
How can RPA help make your daily work life easier?
References:
https://www.linkedin.com/company/fintelics/?viewAsMember=true.
https://www.fintelics.com/
https://www.robots.com/articles/three-types-of-robotic-systems
115
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
https://www.lib.iastate.edu/news/father-
robotics#:~:text=Al%2DJazari%20is%20not%20only,connecting%20rod%
2C%20programmable%20automaton%2C%20humanoid
https://cs.stanford.edu/people/eroberts/courses/soco/projects/1998-
99/robotics/history.html#:~:text=In%20the%20late%201960s%2C%20busi
nessman,%22the%20Father%20of%20Robotics.%22
https://www.futurelearn.com/info/courses/begin-
robotics/0/steps/2845#:~:text=In%20many%20situations%20robots%20ca
n,example%20in%20manufacturing%20of%20microelectronics
https://www.iberdrola.com/innovation/virtual-
reality#:~:text=Virtual%20Reality%20(VR)%20is%20a,Virtual%20Reality%
20headset%20or%20helmet.
https://www.sciencedirect.com/topics/computer-science/virtual-reality-
technology
https://learn.g2.com/virtual-reality
https://www.techtarget.com/whatis/definition/augmented-reality-
AR?amp=1
https://softtek.eu/en/tech-magazine-en/user-experience-en/what-are-the-
different-types-of-augmented-reality/
116
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
https://www.teamviewer.com/en-us/augmented-reality-ar-vs-virtual-reality-
vr/
https://www.qualcomm.com/5g/what-is-5g
Jarquio, Miracle S.
Reporter
117
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Miniaturized and
Multifunctional
Machines
(Lotoc, Michella A.)
118
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Mobile Phones
just phone, is a portable telephone that can make and receive calls over
a radio frequency link while the user is moving within a telephone service
- Mobile phones (or cell phones as they are often called in the USA) have
radically altered the way that people work, socialize, organize, and entertain
themselves.
- Communication
- Entertainment
- Navigation
- Remote work
- Calculator
- Learning
Computers
needed and used for "full" operation. This term may also refer to a group of
anywhere.
Engine Downsizing
smaller combustion engines over larger ones of the same power capacity
- Mobility
- Compact
QUIZ
machines nowadays?
References:
https://datapdf.com/the-single-probe-a-miniaturized-multifunctional-device-
for-s.html
Lotoc, Michella A.
Reporter
123
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What is ICT?
telecommunications.
ICT Industry
What is Outsourcing?
Types of BPO
Front-Office Outsourcing
support lines, or any front office services, businesses can benefit from
- Customer Service
- Technical Support
- Helpdesk Support
- Marketing
126
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Back-Office Outsourcing
businesses can focus on their core mission rather than engaging in time-
- Accounting
- IT Services
- Logistics
- Human Resources
127
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Off-Shore Outsourcing
qualified labor and services at a lower rate, which helps reduce overhead
costs, and potentially lower product or service prices for the end-user.
- Call Centers
- Help desk
- Accounting Services
Nearshore Outsourcing
businesses in the US, this could include Canada and Mexico, as well as
skills are available at a lower cost in a nearby nation, but certain factors,
128
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Onshore/Domestic BPO
vendor in one city, state, or province can be contracted for services provided
References:
https://oworkers.com/what-are-the-benefits-of-business-process-
outsourcing/
Moncada, Justin M.
Reporter
130
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Intelligence Gathering
& Information Warfare
(Mondoñedo, Redentor C.)
131
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Intelligence Gathering
the Internet.
the property you provide security for like major roads, public transit routes,
targeted individuals.
Competitive Intelligence
- Relies solely on legal and ethical means to gather data, piece it together
decision-makers.
133
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Corporate Espionage
information.
Information Warfare
Information Warfare
awareness so that the target will make decisions against their interest but
not clear when information warfare begins, ends, and how strong or
information in some way. Either to try and gain more information, destroy
Information Operations
Defensive – Safeguard the nation and allies from similar actions, also
known as IW hardening.
Sources of attack
• Internal
• External
Forms of attack
• Data attack
• Software/Threats Attack
• Physical Attack
Classes of attack
• Passive Attack
• Active Attack
Types of Attacks
- Denial of Service
- Web Defacement
- Theft
- Bugs
137
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Awareness
- Policies
- Information Assurance
- Military forces
- Intelligence
- Once inside, set Logic Bombs, Trojan Horses and Trap Doors.
Advantage:
• Less cost
• Information Technology
Disadvantage:
• Trust
• Unexpected result
• Terrorism
• Undeclared War
QUIZ
2.) Conventional warfare is a war in which nuclear weapons are the main
3.) In traditional warfare, the goal is to kill or injure people and destroy
facilities.
computer networks.
5.) Theft is a term used to describe a crime that involves taking a person’s
website and replace content on the site with their own messages.
7.) Offensive is to safeguard the nation and allies from similar actions
10.) Destruction of cities is the more damage there is the more it will cost to
fix.
a. Asymmetric warfare
b. Nuclear Warfare
c. Conventional Warfare
140
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
d. Chemical Warfare
2. The most dangerous weapons on earth. One can destroy a whole city,
a. Nuclear Warfare
b. Chemical warfare
c. Asymmetric warfare
d. Civil warfare
a. Chemical Warfare
b. Nuclear Warfare
c. Civil Warfare
d. Conventional Warfare
a. HUMINT
b. OSINT
c. Intelligence Gathering
d. Cyber Intelligence
141
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
environment of the property, you provide security for like major roads, public
a. Imaginary intelligence
b. Human intelligence
c. Cyber intelligence
d. Open-source Intelligence
Enumeration:
Essay: In your opinion, how does information warfare affect us? (5pts)
References:
https://www.sciencedirect.com/topics/social-sciences/information-warfare
https://www.sciencedirect.com/topics/computer-science/intelligence-
gathering
Mondoñedo, Redentor C.
Reporter
142
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
E-Health
E-Health Tools
The Coala Heart Monitor and system consists of the following parts:
The Coala Heart Monitor: A small hand-held device that is pressed against
the chest for simultaneous recordings of ECG and heart sounds through
from the app to the Coala Care Portal server for analysis and the analyzed
result can be viewed within minutes in the Coala App. The app also features
The Coala Care Portal: The sever that provides detection of cardiac rhythm
2. Enhancing Quality - E-health may enhance the quality of health care for
sense that their effectiveness and efficiency should not be assumed but
this area.
shared manner.
global providers. These services can range from simple advice to more
and ethnicity etc. E-health could provide services for the rich or poor.
What is Telemedicine
phone, laptop, and computers. The internet and the rise of smart devices
Telehealth
Telecare
- It refers to the technology that keeps the freedom and safety for the
patients while still living at their homes. For example, computers and
telecommunication technology.
Telemedicine vs Telehealth
in person. Telemedicine can offer certain types of therapy like speech and
through technology.
1. Virtual psychotherapy
pronunciation difficulties.
It helps people master specific life skills. For example, a person with speech
issues resulting from a stroke might choose speech therapy, then use
149
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
occupational therapy to help them master the motor skills necessary to use
face therapy
Convenience – because you can schedule sessions anytime that are the
can also make it difficult to access treatment when you really need it.
useful for a variety of situations, but not when it comes to people that require
involved in your plan. The scope of online therapy can be limited, so it may
QUIZ
4.) E-health tools are technologies used to help patients monitor and
16-20 As an I.T student do you think using ICT to deliver health care is
effective? why?
References:
https://www.publichealthnotes.com/what-is-e-health-its-characteristics-
benefits-and-challenges/
https://www.publichealthnotes.com/what-is-e-health-its-characteristics-
benefits-and-challenges/
https://chironhealth.com/telemedicine/what-is-telemedicine/
https://www.medicalnewstoday.com/articles/virtual-therapy
https://www.verywellmind.com/what-is-online-therapy-2795752
Reporter
152
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
entertainment services including voice, internet, SMS, text, and other data
Service.
- Mobile development has become a priority and the new normal for many
competition. In this article, we’ve compiled the main mobile trends now and
- Currently, there are about 5.31 billion unique mobile users worldwide,
The revenue of Android and iOS mobile applications reached $133 billion
- Many of the largest mobile services providers have made steps towards
addressing sustainability. but even the leader still has room to grow in this
area. Vodafone, the largest provider in Europe. Africa and the Middle East,
is leading the industry with its integrated sustainability strategy; while China
- Some of the global mobile services industry players are Vodafone, China
Orange, etc.
#11 out of all global companies in the 2010 Newsweek Global Green
Rankings. What makes Vodafone stand out from the competition is its
challenges as a key stimulus for innovation within its business. With its
broad reach in emerging economies in Africa, Asia and the Middle East, the
2010. 60 percent market penetration rate. It is best known for its excellent
able to get up-to-date price information on crops and livestock and are able
the sustainability movement. However, over the last few years, they have
initiatives to help them become more energy efficient and to engage their
impact.
- Globe
- Gomo
- Sun cellular
- TM
- Smart
- TNT
- PLDT
- Converge ICT
157
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
the largest mobile network in the Philippines and one of the largest fixed-
- GOMO is the country’s first fully digital telco owned and operated by
mobile network provider in the country minus its own frequency (because it
groups as well, making it Globe’s value brand offering. The service has
gained popularity for its discounted call and messaging services, with the
million mobile subscribers as of 2020, under the brands Smart, Sun, and
TNT. Smart’s wireless broadband subscribers number 3.8 million under the
- TNT (formerly known as Piltel, Mobiline, Phone Pal, and still unofficially
Philippines.[1] By April 2000, Piltel launched its GSM brand, Talk ‘N Text.
Piltel also reported 16,590,737 subscribers to its GSM brand, Talk ‘N Text,
before its transfer to Smart. Piltel used the 912 area code for its
- Converge ICT is the fastest growing fiber internet and other digital
products and services we offer run through the first pure end-to-end fiber
Businesses
- We live in an era where we can get the information we need at the tap of
UK. Whether it’s due to resistance or being too busy to change, there may
digital process. But for the businesses that have adapted to a digital
Businesses
based technology and the use of mobile devices have resulted in a cost-
effective way to start and scale a business. Mobile technology has provided
160
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
workers with the option of working remotely. Without the need to work from
a base you can place a worker somewhere else in the world while they still
better connected there is an increased vision of where workers are and what
can now operate on a mobile device, managers can ensure they have all
the correct health and safety protocol send and stored on the device, by
even if they are working remotely. Mobile services such as Slack and
communication channels.
161
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
than waiting for workers to return to the office. This provides a better service
now access all of their job information on a device, and with the use of digital
forms job data can be captured and transferred immediately back to the
office.
4. Time and Money Savings - One of the most valuable things in life is our
streamlines various processes e.g., apps can now replace physical forms,
more free time which can be reinvested back into the business to focus on
growth and development. With the option to take payment on devices and
complete all aspects of a job through the use of mobile technology, workers
don't need much interference from the office or have to waste time driving
number of apps aimed at removing the paper trail and providing mobile
workers with the right tools to operate when they are out and about, service
162
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
deal with paper or have to deliver job sheets back to the office. Cloud-based
QUIZ
6-10. Give 5 Key Impacts that Mobile Technology has on Service Based
Businesses
yourself.
21-30. Explain the impact of Mobile Based Service Industries in your life
and cite scenarios if Mobile Based Service Industries does not exist. (At
least 5 sentences.
References:
https://www.slideshare.net/kellyhautjames/james-kelly-mobile-industry-
researchf
https://www.slideshare.net/kellyhautjames/mobile-services-industry
163
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
https://en.m.wikipedia.org/wiki/TM_(cellular_service)#:~:text=TM%20(form
erly%20known%20as%20Islacom,Filipino%20telecommunications%20co
mpany%20Globe%20Telecom.
https://www.mymobileworkers.com/blog/impacts-of-mobile-technology-on-
service-based-businesses
https://www.trade.gov/market-intelligence/philippine-telecommunications-
market
https://www.definitions.net/definition/PLDT
https://corporate.convergeict.com/
Reporter
164
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
E-Service &
E-Government
(Pabello, Gian Carlo S.)
165
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What is E-Government?
With digital services, the government can deliver information and services
Disadvantages of E-Government?
digital divide and digital inequalities that bar certain people from accessing
- Often does not offer the “potential to reach many users including those
- Homeless people.
- People in poverty.
166
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Reduces inequality.
- More innovation.
4 Types of E-Government
- Government-to-Citizen (G2C).
- Government-to-Business (G2B).
- Government-to-Employee (G2E).
- Government-to-Government (G2G).
167
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Examples of G2C
- The essentials for achievement of G2B services for secure and authentic
Examples of G2B
- E-taxation
- Electronic auctions.
Examples of G2E
- E-learning methods.
- G2G has been referring to raising the quality of the government process
within government.
Examples of G2G
- Verification.
- It reduces inequality.
QUIZ
public
C. E-Services
D. E-Government
171
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
A. Individual departments
B. Robots
C. E-Government
D. Police
B. E-Government
C. Technology
D. E-services
A. Government to citizens
B. Government to individual
C. Government to information
D. Government to accountability
A. Setting up websites
B. E-Government
C. Technology
D. Government to citizens
172
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
B. Government
C. E services
D. Technology
B. Agencies
C. Government portals
D. Payment mechanism
B. E-Government
C. Payment mechanism
D. Technology
A. Government to employees
B. Government to Business
C. Government to government
D. Government to citizens
173
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
A. E-learning methods.
B. E-Government
C. Technology
D. Government to citizens
Essay: (5 points)
References:
https://granicus.com/dictionary/digital-government-
services/#:~:text=Digital%20government%20services%20(also%20called,
applying%20for%20a%20pet%20license.
https://e-governnsc.weebly.com/types.html
https://www.researchgate.net/figure/Types-of-e-
government_fig1_307892702
https://en.m.wikipedia.org/wiki/E-government
174
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
https://schoolofpoliticalscience.com/what-is-e-governance/
https://www.google.com/amp/s/snov.io/glossary/g2b/amp/
Reporter
175
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Internet Censorship
(Ragodon, Roan Angel R. &
Raro, Justin C.)
176
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Internet Censorship
- The Internet is the foremost important tool and the prominent resource that
is being used by almost every person across the globe. It connects millions
send emails, photos, videos, and messages to our loved ones. Or in other
is connected to the Internet then only you will be able to access all the
Advantages of Internet
- Entertainment
- Comfort to human
177
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Disadvantages of Internet
- Time wastage
- Cyber Crimes
- Effects on children
and Internet numbers. Although the phrases internet and world wide web
- The internet came in the year 1960 with the creation of the first working
using ARPANET, the first message was transferred from one computer to
Since then, the internet has developed and evolved to provide for service
such as:
across computer networks. "Email" refers to both the delivery system and
3.) Online movies and gaming - An online game is a video game that is
played partially or entirely over the internet or any other available computer
games (MMORPG).
4.) Data transfer / File sharing, often through File Transfer Protocol
(FTP) - FTP (File transfer Protocol) is a network protocol that allows you to
Messages are typically transmitted between two or more parties, when each
user inputs text and triggers a transmission to the recipient(s), who are all
is a website where users may have online discussions in the form of posted
180
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
messages. Unlike chat rooms, messages are frequently longer than one
8.) Online Shopping - is searching for and purchasing goods and services
over the Internet through the use of a web browser. The main allure of online
shopping is that consumers can find and purchase items they need (which
are then shipped to their front door) without ever leaving the house.
limited to the activity of financial services firms and their professionals, while
provide.
What is Censorship?
government is unconstitutional.
181
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
films, television and radio programs, news reports, and other forms of
Have
marketers use video and 70% say videos have yielded good results. There
are several ways to use video on your site. A video of your machines in
operation on your shop floor can substitute for an in-person tour, which
182
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
might not be practical for potential customers. You can also use video to
show how your machines work, the quality of your work environment, your
safety and quality practices, and to introduce your team and company.
2.) Case Studies - Case studies are one of the best ways to show potential
customers how your solutions can work for them. Use your case studies to
focus on telling your success stories rather than on selling your services,
and divide each case study into the problem your customer needed to solve,
the solution you provided, and the benefit that resulted. Create an online
potential customers to easily find the case studies most relevant to them.
manufacture a part for them by showing similar products you’ve made for
4.) Testimonials - Let your satisfied customers help you get new ones.
Make asking for a quick quote or comment part of your final transaction with
etc.
183
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
place to house all those print documents you used to mail to customers:
6.) Thought Leadership- Your website has huge potential for establishing
your credibility and educating site visitors. Showcase your expertise with
Censorship vs Regulation
unconstitutional.
Methods of Censorship
speech, books, music, films, and other arts, the press, radio, television, and
184
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
others.
Regulation
clause, whereby the FCC deprives stations of editorial rights over political
viewpoint diversity, broadcasters often argue that FCC rules infringe upon
Western world. This history sets the stage for a discussion of modern
discussion then shifts to the legal structures that govern speech and the
press in the United States, government control of political speech, and some
that most of those who have thought about and acted on such issues in
other times and places have been at least as humane and as sensible in
term derives from the census office in early Rome, where the censor served
as both census taker and supervisor of public behavior and morals. Prior to
the invention of the printing press in the fifteenth century, the majority of
largely in response to the invention of the printing press, which both the
QUIZ
1. It is the foremost important tool and the prominent resource that is being
A. Censorship B. Internet
Domain Name System (DNS), media types, and other Internet Protocol-
A. Censorship B. Internet
4. Control of the information and ideas circulated within a society has been
A. Internet B. Email
Essay
References:
https://en.wikipedia.org/wiki/Internet_censorship
https://humanrights.gov.au/our-work/5-current-issues-internet-censorship-
bullying-discrimination-harassment-and-freedom
https://www.security.org/vpn/internet-censorship/
https://www.aclu.org/other/what-censorship
https://www.ipxo.com/blog/what-is-iana/
https://www.websolutions.com/blog/the-6-types-of-content-every-
manufacturing-website-must-have/
https://en.wikipedia.org/wiki/Censorship#:~:text=Censorship%20is%20the
%20suppression%20of,institutions%20and%20other%20controlling%20bo
dies.
https://www.encyclopedia.com/social-sciences/encyclopedias-almanacs-
transcripts-and-maps/censorship-and-regulation-expression
https://study.com/learn/lesson/censorship-history-types-examples-what-is-
censorship.html
Reporter Reporter
189
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Pornography
and other media that is intended to cause sexual excitement. The distinction
(“prostitute”) and graphein (“to write”), was originally defined as any work of
Kinds of Pornography
primarily directed toward an adult male audience. The magazines that have
the widest distribution (like Playboy and Penthouse) do not violate the
But other magazines that do violate these standards are still readily
sold in most adult bookstores and have become a growth industry for
bookstores or the mail and watch them in the privacy of their homes.
illegal acts.
being relaxed and many pornographic movies are being distributed and
- The fifth type of pornography is audio porn. This includes "Dial-a- Porn"
telephone calls, which are the second fastest growth market of pornography
Pornography in History
as those of Khajuraho.
the celebrated erotic manuals, such as the Roman poet Ovid’s Ars amatoria
arousal.
the 17th century. Makura-e (pillow pictures) were intended for entertainment
as well as for the instruction of married couples. This interest in very frank
- In Europe too, new technologies (above all, the printing press) promoted
audiences of all socioeconomic levels and sexual tastes. At about this time,
for social and political protest. It provided a vehicle for the exploration of
daring ideas that were condemned by both church and state, including
sexual freedom for women as well as for men and the practices of
- By the time that Queen Victoria came to the throne in Great Britain in
flourish during the Victorian Age in Britain and in the United States in the
19th century the inventions of photography and later of motion pictures were
widely available no later than the 1920s, and in the 1960s their popularity
194
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
1980s and digital videodiscs (DVDs) in the 1990s enabled the wide
even more widely available with the emergence of the Internet in the 1990s.
Internet. The use of webcams opened the industry even further to amateurs,
allowing individuals to post live depictions of themselves, often for fees. The
pornography, which can also have literary merit but which is usually
- There are erotic elements in literary works of all times and from all
literature from about the 5th century AD, Persian lyric poems called ghazals,
Ovid’s Ars Amatoria, the 16th-century Chinese novel Chin p’ing, William
Shakespeare’s Venus and Adonis, the writings of the Marquis de Sade, and
195
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
D.H. Lawrence’There are erotic elements in literary works of all times and
the event, recurrent symptoms, and identification with the exploiter. Parents
hearing the facts, minimized the severity of the exploitation, and withheld
to get out of the house to escape abusive parents and family. Leaving home
and family also means leaving school and becoming vulnerable to abuse —
- Even worse is the modern means of abuse through online use, particularly
for sexual abuse and trafficking through illegal recruitment. This has
sexual abuse, and trafficking of women and children in the world. In 2020,
it was estimated that there were 2 million online child abuse and exploitation
cases from the Philippines. During the pandemic, it is said to have increased
- Poverty is one factor though not the only factor to which we have to add
as property, chattels really. They are expected to help the family in whatever
way the family decides. Thus, you have children out of school working on
the streets, in their families' livelihood activities or need for services, making
them forgo their right to education, health care and a good home
demands that the children help it instead of the family helping the children
they bring into the world because the family wants a higher standard of
living, whatever the cost to the children. Some families which use their
197
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
children for online pornography or sex think that because it is online and not
children rebel or escape, they continue with the activity, particularly sexual
activity, because that is where they can manage to get their own income to
use as they please. They know nothing else from the neglect of education
and care. Schooling, higher ambitions, family life itself are thus abandoned
faces a 5-to-20-year prison sentence. There are also fines and payments
that are often required to any identifiable victim of the offense. Not to
under federal law are incredibly severe. The mandatory minimum sentence
Fourteenth Congress
Section 2. Declaration of Policy. - The State recognizes the vital role of the
youth in nation building and shall promote and protect their physical, moral,
199
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
(a) Guarantee the fundamental rights of every child from all forms of neglect,
(b) Protect every child from all forms of exploitation and abuse including,
or a State party concerning the rights of children which include, but not
limited to, the Convention on the Rights of the Child, the Optional Protocol
to the Convention on the Rights of the Child of the Child on the Sale of
Crime.
(d) To possess any form of child pornography with the intent to sell,
more articles of child pornography of the same form shall be prima facie
commission of prohibited acts as, but not limited to, dens, private rooms,
business;
child pornography;
(k) To conspire to commit any of the prohibited acts stated in this section.
commission of any of the said prohibited acts and decide to commit it; and
under this Act. Towards this end, the following rules shall be observed:
(a) The judge, prosecutor or any officer of the law to whom the complaint
impartial proceeding and after considering all circumstances for the best
(b) The name and personal circumstances of the child, including the child's
(c) Any record regarding a child shall be confidential and kept under seal.
Except upon written request and order of the court, a record shall be
(d) Any form of child pornography that is part of the court records shall be
(1) Any form of child pornography may be viewed only by the parties, their
(2) Neither form of child pornography nor any portion thereof shall be
any part thereof unless he/she signs a written affirmation that he/she has
received and read a copy of the protection order; that he/she submits to the
jurisdiction of the court with respect to the protective order; and that, in case
court; and
203
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
shall be unlawful for any editor, publisher and reporter or columnist in case
producer and director of a film in case of the movie industry, or any person
Any violation of this provision shall be subject to the penalty provided for
Section 14. Care, Custody and Treatment of a Child Victim. - The DSWD
shall ensure that the child who is a victim of any form of child pornography
is provided appropriate care, custody and support for their recovery and
- The child and his family shall be entitled to protection as well as to the
rights and benefits of witnesses under Republic Act No. 6981, otherwise
under Section 3(d) of Republic Act No. 7309, otherwise known as "An Act
Other Purposes", so that the child may claim compensation therein. (k) To
Distribution
Section 5 of this Act shall suffer the penalty of reclusion perpetua (pardon)
and a fine of not less than Two million pesos (Php2,000,000.00) but not
(b) Any person found guilty of violating Section 4(a), (b) and (c) of this Act
shall suffer the penalty of reclusion temporal in its maximum period and a
fine of not less than One million pesos (Php1,000,000.00) but not more than
(c) Any person found guilty of violating Section 4(d), (e) and (f) of this Act
shall suffer the penalty of reclusion temporal in its medium period and a fine
205
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
of not less than Seven hundred fifty thousand pesos (Php750,000.00) but
(d) Any person found guilty of violating Section 4(g) of this Act shall suffer
the penalty of reclusion temporal in its minimum period and a fine of not less
than Five hundred thousand pesos (Php500,000.00) but not more than
(e) Any person found guilty of violating Section 4(h) of this Act shall suffer
the penalty of prision mayor in its maximum period and a fine of not less
than Three hundred thousand pesos (Php300,000.00) but not more than
(f) Any person found guilty of violating Section 4(I) of this Act shall suffer
the penalty of prision mayor in its minimum period and a fine of not less than
Three hundred thousand pesos (php300,000.00) but not more than Five
(g) Any person found guilty of violating Section 4(j) of this Act shall suffer
the penalty of prision correccional in its maximum period and a fine of not
less than Two hundred thousand pesos (Php200,000.00) but not more than
(h) Any person found guilty of violating Section 4(k) of this Act shall suffer
the penalty of prision correccional in its medium period and a fine of not less
206
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
than One hundred thousand pesos (php100,000.00) but not more than Two
(i) Any person found guilty of violating Section 4(l) of this Act shall suffer the
penalty of arresto mayor in its minimum period and a fine of not less than
Fifty thousand pesos (Php50,000.00) but not more than One hundred
(j) Any person found guilty of violating Section 11 of this Act shall suffer the
penalty of prision correccional in its medium period and a fine of not less
than One million pesos (Php1,000,000.00) but not more than Two million
offense, the penalty shall be a fine not less than Two million pesos
(k) Any ISP found guilty of willfully and knowingly failing to comply with the
notice and installation requirements under Section 9 of this Act shall suffer
the penalty of a fine of not less than Five hundred thousand pesos
for the first offense. In case of subsequent offense, the penalty shall be a
fine of not less than One million pesos (Php1,000,000.00) but not more than
207
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
operate;
professionals, credit card companies and banks, found guilty of willfully and
of this Act shall suffer the penalty of a fine of not less than One million pesos
for the first offense. In the case of a subsequent offense, the penalty shall
be a fine of not less than Two million pesos (Php2,000,000.00) but not more
(m) Any person found guilty of violating Section 13 of this Act shall suffer
the penalty of arresto mayor in its minimum period and a fine of not less
than One hundred thousand pesos (Php100,000.00) but not more than
having control or moral ascendancy over the child, the penalty provided
208
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
herein shall be in its maximum duration; Provided, That this provision shall
(b) If the offender is a juridical person, the penalty shall be imposed upon
the owner, manager, partner, member of the board of directors and/or any
the complete service of his/her sentence and shall forever be barred from
(d) The penalty provided for in this Act shall be imposed in its maximum
for the violation of this Act, the court shall order the confiscation and
instruments used in the commission of the crime, unless they are the
property of a third person not liable for the unlawful act; Provided, however,
That all awards for damages shall be taken from the personal and separate
insufficient, the deficiency shall be taken from the confiscated and forfeited
- All proceeds derived from the sale of properties used for the commission
of any form of child pornography shall accrue to the special account of the
DSWD which shall be used exclusively for the implementation of this Act.
- When the proceeds, tools and instruments used in the commission of the
shall be ordered to pay the amount equal to the value of the proceeds, tools
(b) Counseling;
(c) Free legal services, which shall include information about the victim's
rights and the procedure for filing of complaints, claims for compensation
210
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
by the child;
Sustained supervision and follow through mechanism that will track the
shall develop and implement the necessary programs that will prevent any
form of child pornography, as well as protect, heal and reintegrate the child
into the mainstream of society. Such programs shall include beat but not
pornography and other acts covered by the law and the establishment of a
charges in court; (2) giving information needed by the foreign state; and (3)
pornography in the court; Provided, That if the DOJ refuses to act on the
request of for delaying the execution thereof: Provided, further, That the
principles of mutuality and reciprocity shall, for this purpose, be at all times
recognized.
212
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Approved,
PROSPERO C. NOGRALES
This Act which is a consolidation of Senate Bill No. 2317 and House Bill No.
6440 was finally passed by the Senate and the House of Representatives
MARILYN B. BARUA-YAP
Secretary General
EMMA LIRIO-REYES
QUIZ
Identification:
1. Who was the president of the Philippines when the act known as the
“Anti-Child Pornography Act of 2009 was finally passed by the Senate and
2. What erotic literary work text that originated from India dated 400 BCE?
are expected to help the family in whatever way or means to earn money.
Multiple Choice:
6. What is the title of the Act known as the “Anti-Child Pornography Act of
2009?
the ________ in nation building and shall promote and protect their
well-being.
a. Children
b. Society of youth
c. Nation
d. Youth
215
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
a.) Not less than Two (2) million pesos but not more than Five (5) million
pesos
b.) Not less than Two (3) million pesos but not more than Five (4) million
pesos
c.) Not less than Two (4) million pesos but not more than Five (5) million
pesos
d.) Not less than Two (1) million pesos but not more than Five (5) million
pesos
10. This type of pornography is rented or sold in most adult bookstores and
Essay: What is your stand or opinion when it comes to PUBS that shows
References:
https://www.similarweb.com/top-websites/philippines/
https://philstarlife.com/self/818315-pornhub-year-in-review-
philippines?page=2
https://globalnation.inquirer.net/97567/filipinos-rank-15th-in-global-porn-
watching
http://www.amlc.gov.ph/images/PDFs/2020%20DEC%20CHILD%20POR
NOGRAPHY%20IN%20THE%20PHILIPPINES%20POST-
2019%20STUDY%20USING%20STR%20DATA.pdf
Reporter
217
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Virtual Prostitution
(Mira, Jastine John T.)
218
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
whom neither have ever seen/met in real life before. Usually, the two meet
simulation, meaning the video or the movie plays all around the person
leaders like Pornhub actively pursued such content in the early 2010s.
with virtual reality porn only 3.2% of users use sex toys (Teledildonics like
uptrend for interactive sex toys use on their platform and are expecting this
to keep growing. The current situation of the world, with the pandemic, is
- Cybersex, also called computer sex, Internet sex, netsex and, colloquially,
connected remotely via computer network send each other sexually explicit
Crime Relationships
- There are several ways to incur violations of the law when on the internet
and some of these include cybersex criminal activities that may involve the
others.
220
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Cybersex
fraud, and their abuse is streamed live on the internet via webcam, video,
Child Pornography
Sexting
- It’s legal for consenting adults to send sexual images and suggestive
being slapped with hefty fines, the person is also at risk of facing prison
time.
221
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Cyberstalking
their targets lewd messages and pictures. While some offenders may make
accounts.
Sex Trafficking
extreme violation that can haunt victims for years to come. After abducting
their targets, the offenders often go online to connect with potential clients.
Contrary to common belief, victims are not always physically held against
their will. Some captures use other means to control people, such as
QUIZ
3.) What are the other terms for Cyber Sex? (5pts)
222
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
References:
https://www.urbandictionary.com/define.php?term=Virtual%20Prostitution
https://www.jettonmeredithlaw.com/blog/2020/june/4-common-types-of-
internet-sex-crimes/
Reporter
223
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Technology and
Privacy
(Mendoza, John Ezekiel R.)
224
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Technology and Privacy are two intertwined notions that must be jointly
generate and manipulate not only physical objects, but also symbols,
cultural forms and social relations. In turn, privacy describes a vital and
Identity Theft
different ways and its victims are typically left with damage to their credit,
1.) TRUE NAME IDENTITY THEFT - Is a serious crime. It takes place when
consent to commit fraud or theft. The theft might open a new credit card
225
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
and usernames. Typically, the theft will change the mailing address on an
account and run up bills before the victim realizes there is a problem.
privacy.
stolen identity.
2.) TAX RELATED IDENTITY THEFT - In this type of exploit, the criminal
files a false tax return with the internal revenue service (IRS), for example
without your authorization. Medical identity theft can disrupt your medical
misused to apply for government benefits and open bank accounts or other
6.) SENIOR IDENTITY THEFT - occurs when their identities are stolen for
personal gain. Seniors are targeted more often for scams that involve credit
(SSN) with a fake name, date of birth and address to create a new identity,
227
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
for example. They can then use the "Frankenstein ID," as it's sometimes
fraudulent email that looks to be authentic, say an email from your bank
mail from a dumpster is an easy way for an identity thief to get information.
passwords, admin portal access, and other similar data. Wireless hacking
4.) MAIL THEFT - It is when someone other than the intended recipient
tampers with, steals, or reads mail that does not belong to them. It may
include raiding a mailbox to search for cash, credit cards, or other valuables.
Sometimes thieves are looking for bank statements, social security checks,
QUIZ
person.
C. Privacy
C. Cybercrime
usernames.
5. the criminal files a false tax return with the internal revenue service
8. Seniors are targeted more often for scams that involve credit and financial
accounts.
their own.
10. Occurs when someone uses a combination of real and fake personal
C. Cybercrime
231
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
(11 - 15.)
(16 – 20.)
References:
Reporter
232
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Online Crimes
(Ordinario, Clarence E.)
233
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Internet, through the Internet, or using the Internet. The widespread Internet
and cyberstalking are the primary types of Internet crime. Because Internet
crimes usually engage people from various geographic areas, finding and
History of Cybercrime
- The first major wave of cybercrime came with the proliferation of email
during the late 80’s. It allowed for a host of scams and/or malware to be
- The next wave in the cybercrime history timeline came in the 90’s with the
from, many more than today, and most were vulnerable to viruses. Viruses
websites were visited. Some caused your computer to run slow; others may
- Cybercrime really began to take off in the early 2,000’s when social media
came to life. The surge of people putting all the information they could into
Categories of Cybercrime
1.) Crimes Against People - These crimes include cyber harassment and
2.) Crimes Against Property - Some online crimes occur against property,
pirated software.
Types of Cybercrimes
around for ages. At its core, ransomware works when criminals steal
something of great value and demand payment in exchange for its return.
For most businesses, this involves the encryption of company data. When
do their jobs.
any social engineering attack, it tries to trick unsuspecting users into giving
profiles and rogue websites to lure users into them. These sites copy the
appearance of the real website to create a sense of security and usually ask
to fill forms with personal information to receive some kind of benefit, such
as discounts. The most refined of these sites might include malicious scripts
that scrap this information out of your browser, without the need of forms.
so when people feel protected by the anonymity that the internet grants us.
One of the fastest growing and most known online harassment in the last
years has been revenge porn. Online harassment and cyberbullying are
direct messages, but they could also be sent through email. These
individual or group.
colleagues and familiars of the victim also get contacted both to slander the
victim and to try and extract more personal information to deepen the
stalking activity.
237
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
obtain a user’s password with the help of criminal intentions. Attackers can
such cases. These attacks are conducted by accessing passwords that are
- For national security concerns, the likely cybercrime threats deal with
those which involve terrorism activities. Nowadays, Terrorists are using the
What is Cybersecurity?
and all of the data from unauthorized use or harm. On a personal level, you
need to safeguard your identity, your data, and your computing devices. At
security, and the safety and well-being of the citizens are at stake.
Advantages of Cybersecurity
week.
- Internet security processes all the incoming & outgoing data on our
computer.
- Gives us privacy.
QUIZ
1. The act of copying and giving away files in an illegal manner is called?
3. To protect your computer from viruses, you should install ______ in your
computer.
C. Antivirus D. Valorant
8. Which of the following are the threats for the electronic payment system?
A. Computer worms
B. Computer virus
241
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
C. Trojan horse
A. Firewall B. Script
C. Antivirus D. VLC
10. Which of the following describes programs that can run independently
A. Worm B. Droppers
popular brands creating fake social media profiles and rogue websites to
A. Ransomware
B. Phishing scam
C. Online harassment
D. Password attacks
A. Online harassment
B. Cyberstalking
242
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
C. Password attacks
D. Ransomware
13. Which of the following would most likely not be a symptom of virus?
C. Odd messages
14. A ______ is a computer program that can replicate itself and spread
C. Mouse D. Antivirus
15. are often delivered to a PC through an email attachment and are often
designed to do harm
A. Portals B. Virus
C. Spam D. Email
A. Illegalware B. Badware
C. Malware D. Maliciousware
243
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
A. Fire attacks
B. Virus attacks
D. Unauthorized access
19. When criminals steal for something of great value and demand payment
A. Phishing B. Cyberstalking
20. These attacks are conducted by accessing passwords that are extorted
or stored in a file.
References:
What Are the Three Types of Cyber Crimes? | Swier Law Firm, Prof. LLC
Ordinario, Clarence E.
Reporter
245
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
Electronics Lifestyle
(Castro, Xena O.)
246
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
SMS Addiction
made the service preferred mode of communication for youngster not only
in India but more so in the Philippines and its excessive use leading to
feeling of sadness and loss of interest and can interfere with your daily life.
248
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- SMS ADDICTION can also affect your life when you get addicted to your
phone, you don't realize the time. You can’t do house chores and family
- Online gaming describes "any video game that offers online interaction
- Various studies show that playing too much computer games " causes
Online Shopping
something and arranging for its delivery. The buyer either pays for the good
or service online with credit or debit card or upon delivery. In this case the
- No Crowds
- No pressure
- Saves Times
- Saves Money
- Reviews of Product
251
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Delayed order.
- Lack of experience.
Blogging
- A video vlog or video log sometimes shortened to vlog is a form of blog for
which the medium is video. Vlog entries often combine embedded video
Benefits of Blogging
- Entertain people
- The benefits of social networks include their ability to help people connect
adventures with loved ones along with an area for comments and
discussion.
- Contact
- Stand out
- A home- based worker is an. Employer who performs his or her job from
- No more commutes
- Better productivity
- No dress codes
255
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
- Cost savings
- Working anywhere
permanent office.
QUIZ
7. It describes " any video game that offers online interaction with other
players.
References:
(indiatimes.com)
Encyclopedia
Castro, Xena O.
Reporter
258
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
E-Learning
(Lavilla, Lourenz C.)
259
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
What is E-Learning?
- There are also many different elements that can make up an e-learning
Importance of E-Learning
schooling and enhance skills. Also, they can obtain a degree certificate,
engagements.
encompasses any kind of learning that takes place via the Internet.
who need to work on their own schedule and at their own pace.
Common Types
Online education:
•Hybrid Courses
•Distributing Materials
Distance Learning:
•Video conferencing
•Computer-based
•Open-schedule
261
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
and students connect in a very authentic way, which often results in strong
Advantages Disadvantages
- In-person training can come with many hidden costs, including travel,
- Studies indicate that e-Learning has the potential to reduce overall training
time by 40% – 60%. Reducing training time means more time for your
- The cost of hiring someone to train employees and improve retention can
QUIZ
pts)
pts)
pts)
References:
https://www.td.org/talent-development-glossary-terms/what-is-e-
learning#what%20is
https://www.digitalclassworld.com/blog/importance-of-elearning-in-
education
https://www.viewsonic.com/library/education/what-is-distance-learning-
and-why-is-it-so-important/?fbclid=IwAR0q--
euvfgIKU_lM_n_3TH2f2oxOlLPqNF5V9gQNcuJQXUhVY4J8vn_Yrw
263
IETI COLLEGE OF SCIENCE AND TECHNOLOGY, INC.
#34 Lark St., Sta. Elena, Marikina City
A
https://www.encyclopedia.com/finance/finance-and-accounting-
magazines/online-
education?fbclid=IwAR3d9Ep8wpsmgzEYnOkx8tdJUAiwsiiZfdlJMk9TtWV
zr-22TQeLBmpDgUY
https://eztalks.com/elearning/advantages-and-disadvantages-of-distance-
learning.html?fbclid=IwAR02_kSSsfBIltHOnb2jNXCnqpiFvplf--
Fx2F2JGmj0B6Slp0ZIR9_M9MI
https://inspiredelearning.com/blog/benefits-of-computer-based-training-for-
corporate-education/
Lavilla, Lourenz C.
Reporter