Professional Documents
Culture Documents
MIL Reviwer (Lesson 6-9)
MIL Reviwer (Lesson 6-9)
collection of moral principles and evaluating the - protections of users from could be
implications of our actions to others and to potentially deleterious to their physical,
society at large. physiological and psychological well
being.
Digital Security
Citizenship and M&IL Education
- covers the entire safety precautions that
Digital Access
information technologies invoke from
- Responsible digital citizenship should virus protections to data protections. As
advocate for the increase access of all technologies grow and evolve Into
citizens to information technologies. something more complex, the need for
security systems become even more
Digital Communication compelling.
- involves the electronic exchange to
information through values platforms
and channels information technology COPYRIGHT
has hastened and facilitated exchange to
- Legal device that gives the creator the
information.
sole right to publish and sell that work
Digital Commerce - Rights can be sold to publishers or
recording companies
- Involve the sales and purchase of goods
and services using digital platforms in CYBERBULLYING
the internet and mobile phones.
- bullying that takes place online, or using
Digital Etiquette electronic technology such as cell
phones, computers, and tablets over
- commonly regarded as appropriate and communication tools including social
respectful behavior when using media sites, text messages, chat, and
information technologies. Etiquette websites
covers the proper use of language
specially in an environment that relies COMPUTER ADDICTION
much on the written words, as well as - the excessive use of computers to the
invoking the virtue of empathy which is extent that it interferes with daily life.
the ability to the feelings of others in as
- Example: interfere with work or sleep or
much as we would like our feelings
affects mood, relationships, and thought
considered.
processes
Digital Law
DIGITAL DIVIDE
- covers the legal environment that
- economic inequality between groups in
informs and guide the users ethical and
terms of access to, use of, or knowledge
productive use of technology defined as
of ICT
abiding with the laws of society. In the
Philippines we can refer to Magna Carta
for Internet Freedom which is crowd-
source of documents.
Ten Commandments of Computer Ethics LIBRARIES
1. Thou shalt not use a computer to harm Academic – Academic libraries may
other people. have one or more physical buildings or
rooms that are filled with books and
2. Thou shalt not interfere with other
other materials that are served to help
people's computer work.
the students for their research and other
3. Thou shalt not snoop around in other staff and faculty for their study. (Ex.
people's computer files. University of the Philippines,
Polytechnic University)
4. Thou shalt not use a computer to steal.
5. Thou shalt not use a computer to bear
false witness. Public – Libraries that can be found in
the cities and towns that are funded by
6. Thou shalt not copy or use proprietary the mass or taxation. Public libraries
software for which you have not paid. tend to make a collection that could
7. Thou shalt not use other people's pique the mass’s interest. (Ex. National
computer resources without Library of the Philippines)
authorization or proper compensation.
8. Thou shalt not appropriate other people's School – Books or any printed/non-
intellectual output. printed materials are provided by the
9. Thou shalt think about the social school authority. School Library is
consequences of the program you are established to ensure that student and
writing or the system you are designing. staffs are using reliable ideas and
information. (Ex. Camarines Sur
10. Thou shalt always use a computer in National High School)
ways that ensure consideration and
respect for your fellow humans.
Special – A privately held library that
functions as a division of a company or
Sources should be other organization, focuses on books and
other content of particular interest to that
• Reliable - Information can be verified
organization and typically solely serves
and evaluated
it personnel or members.
• Accurate - Closeness of the report to
Information professionals and
the actual data
specialized libraries or information
• Valuable - aids the user in making collections can be found in the fields of
decisions
• Law
• Authorized - Sources with expertise on • Medicine
the subject matter have sound authority • Business
• Science
• Timely - Reliability, accuracy, and value • Government
of information may vary based on the • Military
time it was produced or acquired
Information on the Internet Communication
• Information varied in form and content • Original information created by a local
• More difficult to determine its reliability group of people
and accuracy • Content about indigenous people
• Easy access to information distributed through dominant forms of
• Discipline to check and validate media or through forms of
• Factual and fiction merged communication unique to their people
• Sources always have to be validated group
- Baliktaktakan
- Kwentong barbero Superstitious Beliefs
• Bawal isukat ang damit pangkasal
Indigenous – transmission of information • Bawal magwalis sa araw ng burol
through local channels and forms. It is means by • Bawal maggupit ng kuko sa gabi
which culture is preserved, handed, down and • Friday the 13th
adapted. • Mga Alamat, Parabula at Pabula
CODES AND CONVENTIONS Semiotics
Codes - are system of signs and symbolic • The term semiotics is derived from the
meaning that when put together create meaning. Greek words semeio (interpreter of sign)
It can be divided into two categories-technical and tikos (pertaining to).
and symbolic • According to Haul (1997), the media is
always engaged in signifying practices.
• It emphasizes the importance of
Two categories of Codes providing appropriate social and cultural
context for a communicant so that the
Technical - are all the ways in which equipment message does not get “lost in
is used to tell the story in a media text. translation.”
Symbolic - show what is beneath the surface of
what we see
Models of Semiotic Theory
Media Codes
Clean over: The clean-over OTS shot is angled Handheld Camera Shot
over the shoulder of the offscreen character, but
they aren’t in the frame. • held by a camera person
• the shot relies only on the
operator's body
• has less stable shots
Zoom
Eye Level Shot or Straight on Angle A zoom shot is when the focal length of a
camera lens is adjusted to give the illusion of
A shot where the
moving closer or further away from the subject.
camera is positioned
directly at a character
or characters’ eye level
Panning Shot
movements is to
turn, or pan from
the word panorama,
The camera pans
from left to right or
vice versa across
the picture.
Tilt Shot
the camera stays
fixed but rotates up
and down on a
vertical plane
Tracking Shot
A tracking shot is any shot where the camera
follows backward, forward or moves alongside
the subject being recorded