Professional Documents
Culture Documents
Living in The IT Era Reviewer
Living in The IT Era Reviewer
• The goal of using a storage is to keep data permanently. • Media is considered to be the message itself for those who create
• There are many types of storage devices which include the disk and own the rights of content. User-generated content (UGC)
drive, a small portable storage device often referred to as pen is a form of content created and owned by the users of a system.
drives, thumb drives, or jump drives. Another type of storage is UGC has grown exponentially especially with the wide internet
the hard disk drive. coverage or easy Wi-Fi access, increased social media
• Another storage device is the compact disc. It is a flat, round, participation, and affordable smart devices
and portable metal disc. One type of compact disc is a CD-
ROM, which can be accessed using most CD and DVD drives. Blog
Another type of compact disc is a DVD-ROM, which has
enough storage capacity to store a full-length movie.
• A blog is a combination of two words— web and log it works end-user licensing agreement (EULA), and/or producing
the same way as pen and paper would privacy becomes a copy disregarding the copyrights.
irrelevant given that a blog post can be seen by anyone online.
A person who writes blogs is called a blogger.
How Computers Impact Everyday Life • Today, the internet connects thousands of networks and
billions of users around the world. The number of internet
• Education users as of January 2018 is 4.021 billion which means that
• Banking more than half of the world's population is now online as
• Workforce Industry revealed by We Are Social and Hootsuite in their 2018
• Electronic Commerce Global Digital suite of reports. Despite this huge number,
• Hospitals the Internet has no central ownership. It means that no
single person or group controls the network.
• The internet (capitalized as Internet when it first came into How Data Travels the Internet
widespread use) is defined as a Worldwide network
• Data and information are transferred around the world through
connecting to a million of computers via dedicated routers
wired or wireless transmission media.
and servers.
• However, there is a big difference between how a telephone
• When computers are connected to the internet, end-users
call works and how the internet carries data. For example,
could start sending and receiving different types of
friend A gives friend B a telephone call; the telephone then
information. These types of information can be sent and
opens a direct connection (also known as the circuit) between
received via electronic mail (emails), text or video chats
friend A's home and friend B's home. In this scenario, a direct
and/or conferencing, and computer programs, among others.
line can be pictured out, running along miles of cable, from
friend A's telephone to friend B's telephone. As long as the
Then and Now two friends are over the telephone, that connection or circuit
stays open between the two telephones. This method of The World Wide Web
linking the telephones together is called circuit switching.
• Circuit switching, however, is inefficient because if you stay • The World Wide Web is referred to as the collection of public
connected with your friend or relative over the phone all the websites that are connected to the internet worldwide,
time, the circuit is still connected, and is, therefore, blocking together with the client computers which include personal
other people from using it. A traditional dial-up connection to computers, laptops, iPads, and cellular phone that access its
the net, in which a computer dials a telephone number to reach content.
the internet service provider, uses circuit switching. This
appears inefficient because browsing the internet and using the Web Technologies
telephone at the same time is not possible.
• The WWW is considered to be one of the applications in the
• Packet switching is a mode of transmission in which the internet and computer networks. This is based on three
message is broken into smaller parts (called packets) which fundamental technologies that are said to be part of the
are sent independently, and then reassembled at the ultimate WWW development
destination.
• Compared to circuit switching, packet switching, therefore, is Hypertext Markup Language (HTML)
much more efficient. A permanent connection is not necessary
between the two places communicating, which avoids • is a standard markup language used for creating web pages.
blocking the entire chunk of the network each time a message HTML is classified as the set of markup symbols or codes
is sent. appended in a file intended for presentation on a World Wide
Web browser page
1. Application
2. Data broken into packets
3. Router (TCP) Hypertext Transfer Protocol (HTTP)
4. Modem (IP)
5. Local ISP • is classified as the set of standards allowing users of the World
6. Long Haul Provider Wide Web to interchange information seen on web pages. Port
7. Border Gateway Protocol 80 is the standard port for HTTP connections.
8. Any Additional Network Exchanges
9. Long Haul Provider of Destination Web Servers and Web Browsers
10. Local ISP of Destination
11. Modem (IP) • is a software application for recovering, presenting, and
12. Router (TCP) navigating information resources on the World Wide Web.
13. Packets Reassembled There are different browser applications that are currently used
14. Destination Server or Computer in the WWW such as Microsoft Edge, Google Chrome, Internet
15. Application Explorer, Mozilla Firefox, Safari, and more.
• Computers do different jobs on the internet, some computers • It is observed and shown that the way the Web works is
work like electronic filing cabinets that store information and reasonably simple having its four basic stages: connection,
send it when clients request so. These are called servers. request, response, and close.
• A server is a computer that is designed to process any • The first stage is where many users access the browsers such as
requests for data and deliver data to other client computers Internet Explorer, Google Chrome, and Mozilla Firefox (some
over a local network or the internet. A client is a computer or of the most used browsers) to connect to the Web server.
device that gets information from a server. Any computer Browsers work by using a unique protocol known as the
running with special software can function as a server, and HTTP which demands a particular programmed text from the
servers have different roles to play. web server. The text is actually written in HTML format that
• A computer that holds the user accounts, computer accounts, informs the browser on how it will display the text on the user's
organizational units, and application services is called the screen. Different technical terms are used in explaining how the
Active Directory Domain Services (AD DS). Web works. One of the most important terms to know is the
uniform resource locators (URLs) which is sorted as the
• Another machine that helps the Dynamic Host Configuration
internet address. A URL contains four parts, namely the
Protocol (DHCP) server is a server that configures IPv4 and
protocol identifier which indicates the protocol to use, the
IPv6 addresses specifically in giving names to each IP address
domain name which specifies the IP address where the
up to its root recognition which is called the domain name
resource is located, the path, and the file name (Mitchell,
system (DNS) server.
2017).
• Another machine that holds and manages documents is known
as the file server while the other one that holds users' mail Searching for Information on the Web
services and Web services is referred to as Web Server II. A
device that connects printers to client computers through the • A website is maintained by its owner, called a web
internet is called a print server. administrator. The owner can modify the website content as
• Besides clients and servers, the internet is made up of a well as add new information in it. However, no single
hardware device designed to receive, analyze, and send organization controls additions, deletions, and changes to all
incoming packets to another network. This is called router. websites. This means there is no single repository for all the
websites found on the internet. Several companies, however,
maintain organized directories of websites to help people find
information about specific topics (Shelly, Cashma, & • Complete – contains all the important facts
Vermaat, 2011).
• There are two mainly managed search tools that people use in • Economical – relatively economical to produce
locating information on the web: subject directories and • Reliable – can be depended on
search engines. Subject directories are developed and
maintained by human editors and not by electronic spiders or • Flexible – can be used for different purposes
robots that are used to fetch web pages automatically. A
search engine, on the other hand, uses small programs called • Relevant – important
spiders or bots (like Googlebot, Yahoo Slurp, and MSNbot) • Simple – is not overly complex
that polish the internet, follow links, and return information to
the search engine's indicator. • Timely – delivered when needed
Google search tricks released in 2016 • Verifiable – can be checked for correctness and accuracy
1. Use quotes to search for an exact phrase • Accessible – Easy access at right time to meet needs
2. Use an asterisk within quotes to specify unknown or variable
words • Secure – secure from unauthorized access
3. Use the minus sign to eliminate results containing certain Information is considered valuable mains for business purposes as
words businesses depend on it to quality products and services. Valuable
4. Search websites for keywords information helps managers make good decisions which is why
5. Compare using "vs" valuable or useful information is called knowledge.
6. Use "DEFINE: "to search for the meaning of words- slang
Included
7. Search images using images
Information is not all different from other resources. Similar to how • Browsing Previews – gives a preview of information
physical resources are managed, information is considered valuable • Branding – creating brand identity
and also has a life cycle. It begins with transforming raw materials
into a finished product—processing data to come up with valuable • Reputation – based on other reviews
information
In the digital world, an experience good may not necessarily translate
Valuable Information into a good which is physical or directly used by consumers. With
mobile games becoming more popular, users feel the need to excel in
Information is said to be valuable if it the following characteristics them, in which the need for more equipment, higher experience
(Stair & Reynolds, 2016): levels and better gaming results become more of a necessity. For this
reason, game apps offer virtual goods such character gears,
• Accurate – error-free
equipment, and even level-up boosts in exchange for virtual money.
However, there are cases in which some would pay real money, Adam Thierer in 2011, identified four issues which further
usually in U.S. dollars, in exchange for a virtual item. complicate the problem on information control:
• Easy duplication and transmission of information • Volume – news and media outlets abound in print and
online
• Increase in communication methods
• Unprecedented Individual Empowerment – post
• Growth archives of historical information anything they want
MOBILE SOCIAL MEDIA AND MOBILE COMMERCE Intellectual Property
With the introduction of the internet, market shifted from a brick- Intellectual property (IF) refers to a number of distinct types of
and-mortar set-up to an online operation more commonly known as intangible assets for which a set of exclusive rights are recognized.
e-commerce. And now with mobile internet, people can access IP includes musical, literary, and artistic works such as Taylor Swift's
internet services without the need for computers, They have their new album, J. K. Rowling's new book, and the latest iPhone.
smartphones, tablets, and other mobile devices connected to the However, IP is not just limited to these items. It can also include
network to send and receive information wherever they are and words, phrases, symbols, and even designs.
whenever they want to. This connectivity has paved the way to two
new scenarios in communication: IP is any creation or product of the human mind and may be
expressed in the form of original ideas, expressions, and processes.
• Mobile social media – accessing social media sites using Intellectual property rights (IPR) are the rights given to persons over
social media their creations. They usually give the creator an exclusive right over
the use of his or her creation for a certain period of time. According
• M-Commerce
to the Intellectual Property Code of the Philippines (Republic No.
8293 s. 1998), IPR consists of the following:
M-Commerce
M-commerce or mobile commerce was a term used during the 1997 a. Copyright and Related Rights
Global Mobile Commerce Forum by Kevin Duffey. He described it
b. Trademarks and Service Marks
as the delivery of electronic commerce capabilities directly into the
consumer's hand, anywhere, via wireless technology. The use of c. Geographic Indications
mobile devices has paved the way for data to be transmitted and
received much faster, without compromising security and scalability. d. Industrial Design
Industries that are now embracing m-commerce include:
e. Patents
• Financial Services – online banking
f. Layout Designs of Integrated Circuits
• Mobile ticketing – receipts of transactions
g. Protection of Undisclosed Information
• Service/Retail – place and pay for orders
The Intellectual Property Office Of the Philippines (IP Philippines)
• Information Services – delivery news, stock quotes, sport is the government agency in charge of the implementation of the law
figures, emergency reports, and weather and traffic protecting intellectual property rights in the Philippines as provided
for under R. A. 8293, the Intellectual Property Code Of the
Information Control Philippines, and the revised Intellectual Property Code Of the
Philippines known as R.A. 10372.
A large requirement for information control comes from commerce,
industry, and copyright owners in general. Information control comes Copyright and Related Rights
in the form Of keeping Secrets inside a business or selling IPR
(Intellectual Property Rights) to those prepared to purchase it. Copyright is a set of exclusive rights granted by a state to the creator
Information control is about allowing those who have appropriate of an original work or their assignee for a limited period of time in
authority access to and use of information on the basis of the exchange for public disclosure of the work, and includes the right to
authority that they hold. copy, distribute, and adapt the work. Copyright owners can license
or permanently transfer or assign their exclusive rights to others.
Software Piracy Digital rights, on the other hand, the permission granted to
individuals to legitimately perform actions involving the use of a
According to The Software Alliance (mvw.bsa.org) (2018), software computer, any electronic device, or a communications network. It is
piracy is "the unauthorized copying or distribution of copyrighted particularly related to the protection and realization of existing rights
software... can be done through copying downloading, sharing, in the context of new digital technologies, especially the internet.
selling or installing multiple copies of software onto personal or work
computers. " Digital Rights Management
Information Control
Digital rights management (DRM) is used to describe the processes This policy regarding the computer's IP address and cookie
by which the author or publisher of a work exerts his or her rights to information is mostly common to other services including Google
control what the purchaser of the work is entitled to do. This Mail. Facebook, etc. Yahoo is considered a trusted wwebsite
represents the control by which one can prevent a person or an
organization from copying, printing, editing, or otherwise making the
privileged information available to other people.
Data Privacy Act 10173
Intellectual Property To protect the privacy of Filipino citizens, Republic Act No, 101 73,
The following are techniques designed to control access and also known as the Data Privacy Act Of 2012, was signed and
reproduction of online information: approved by then President Benigno Aquino III On August 15, 2012.
• Encryption – authorized person can only understand The law defines sensitive personal information as being:
• Serial Keys – key that denotes the product or software is • about an individual's race, ethnic origin, marital Status, age,
original color, and religious, philosophical, Or political affiliations;
• Scrambling – used to hide sensitive information • about an individual's health, education, genetic or sexual life
of a person, or to any proceeding or any offense committed or alleged
• Tag Embedding – watermarks to denote ownership to have committed;
• Security and Service o Process automation may include finance systems such as
payroll, customer management systems such as online system
Applications of IoT registration, and academic institutions offering online enrollment
systems, among others.
With improved business processes and employee productivity, it is
only natural for organizations to adopt IoT. In a study conducted by • IT Support Management
IOT Analytics, it was found that most of the 1 ,600 IoT projects are
o Management of IT infrastructure and complex systems
applied in cities (Scully, 2018).
becomes easier using RPA If part of the system fails, an automated
• Smart Cities system can immediately send notifications to the IT manager and
technical support staff, informing them of the problem.
• Connected Industries
• Automated Assistants
• Connected Buildings
o Apple's Siri is an example of a voice recognition software
• Connected Cars used in RPAs. Instead of machine language (binary), computers will
be able to understand human language and interact with the same.
• Smart Energy Another example for automated assistants will be banks having an
Challenges of IoT automated Customer service hotline Customers call the bank, and
instead of a human operator, an automated assistant will respond
But while things may look good using IoT, there are issues raised in asking for details such as service choices, account numbers, etc.
adopting it fully. Texas Instruments, Inc. (2016) identified six Customers will use their phone's touch keys to enter choices and
challenges in its implementation: numbers while the computer interprets them as input data. After
processing, a computer- generated report, such as account balances
• System Requirement and other information will be provided.
• Connectivity Sensors
• Power Requirements Sensors are hardware devices that have the capability to measure an
• Security event, object, or any physical quality that is happening. Examples
include the heart rate of a person while jogging, the temperature of a
• Development room, brightness of a light source, and the like. Sensors have the
capacity to connect to other devices that can keep track of the data
• Services they are measuring, A mobile phone can be connected to a heart rate
sensor to record and monitor a person's health on a weekly or
Automation monthly basis. A web application can be accessed to monitor and
With the available technology and standards for computer system control the CCTV operation of a house or building. These sensors
interconnection, the demand for system automation is on the rise. can be connected to a network, in various ways as explained earlier.
Colloquially called "computerization," having an automated system However, there are several types of sensors, and with technology
means automated business processes, operations, service provider, made available today, almost all of these hardware can now be
monitoring, and even tools. automated.
c. The Tag — You're It Rule. Be careful in tagging someone The IoT is becoming an increasingly growing topic of conversation
either in your status post or photos. You may also restrict someone both in the workplace and in the society at large. It has the potential
from tagging you in their posts and photos. Always think of your to impact how we live and how we work. For instance, through the
safety, as well as others' personal boundaries. use of sensors, electronics, and robotics, major companies have
reported increase in productivity as well as accuracy of results in their
Netiquette for Chat Rooms and Instant Messaging production lines. The following articles present the positive effects
of IoT and the role of the internet and network connectivity in
Joining chat rooms and sending instant messages, although business.
mandatory in social media, have become a trend for users. This is
especially beneficial for people working in different places such as a • IT Automation
person working overseas while his or her friend or relative is in the
Philippines. Instead of spending for telcom services, the person just Automating what used to be manual procedures is the trend in
needs internet connection. organizations and industries. As with IOT, automation helps a many
companies achieve greater productivity among its employees by
Still, there are guidelines for using instant messaging applications. using computers and software programs to do the tasks. Such
For instance, someone might interrupt and request you to accept him automation includes accounting systems, production systems, and
or her or to be connected to your account without your knowing who even security systems. The news articles below mention how a
that person really is. simple attendance monitoring system has become much easier as
well as how companies and employees can benefit from using
a. Think long and hard before accepting a private technology in their daily work.
conversation, especially with someone not on your friends list. Not
everyone online may be as they seem to be. Banking
b. In a group chat, include only those that are in your friends Online banking also known as "internet banking" or "'web banking"
list. allows a user to execute financial transactions via the internet. An
online bank offers customers just about every service traditionally
c. If possible, do not give your personal information while available through a local branch, including deposits, money transfers,
chatting, including your photos or "selfies. " and bill payments. The news articles that follow explore the rise of
d. When in doubt, save a copy or make a back-up of your digital banking customers as more and more Filipinos rely on their
conversation (chat). internet connection to avail of different bank services.
e. You must log out from your account at all times, especially Education
if you are in a public place, such as a computer shop.
Most colleges and universities in the Philippines use a learning
f. You may opt to customize your account settings from management system (LMS) to deliver, manage, and keep track of
public to private account. students' progress. This LMS, which is delivered online, relates to the
e-learning system. E-learning is learning that utilizes electronic
Professional Ethics technologies to access educational curriculum outside of a traditional
classroom. In most cases, it refers to a course, program, or degree
While netiquette applies to all netizens, IT professionals specifically delivered completely online. Some call this as distance learning. The
follow an ethical practice as they are the front liners, support, and news articles that follow discuss how telecom companies such as
backend of ICT. The Association of Computing Machinery (ACM) Globe and PLDT are giving back to the society by introducing
has identified 24 imperatives of professional conduct for IT technology to public schools and making sure students, as well as
professionals. It contains many, but not all, issues IT professionals teachers, become global learners.
are likely to face while using, creating, and implementing ICT.
Section 1 outlines the fundamental ethical considerations while Health
Section 2 provides additional, more specific considerations of
professional conduct. Section 3 is intended specifically for E-health (or eHealth) refers to the use of information and
individuals who have a leadership role, whether in the workplace or communications technology in health care. It covers a lot of territory,
which is why digital health industry experts often contest exactly market [whereas] an active credit card sells for just $3. " This makes
what the term means—and to add to the confusion, it is also it more lucrative for cyber criminals as patient data becomes digital.
frequently used as a synonym for Health IT.
• In the Philippines, hospitals are required to comply with the
Data Privacy Act (DPA) of 2012 and implement data protection
measures in their data processing systems to protect the
Issues and Challenges confidentiality of their patients' personal information and medical
records.
Industry
• Violations of data privacy involve penalties. Under the
With the introduction of computer systems at work, one main issue DPA, the penalty for unauthorized disclosure of personal information
raised is maintaining the computer system's security and integrity. is P1 million. The penalty extends to P2 million if the act involves
Modes of communication within an office environment normally sensitive personal information.
entail exchanging of emails or discussions in local chat rooms. This
scenario opens the doors for malicious software that can be shared,
whether intentionally or not, to the entire organization. Malicious
software, or malware, is a general term used to describe any type of
software that can cause harm to a computer system. Examples of
malware include the following:
o Virus
o Worm
o Trojan
o Spyware
o Ransomware
Banking
While online banking may be convenient, there are still skeptics to
this given the sensitive data being transacted online: money.
Education
With online learning being accepted into schools as part of the
teaching and learning methodology, one of the things that schools
need to consider is monitoring and management. Having a learning
management system does not necessarily mean students are
constrained into using it to learn. There are more websites that offer
learning opportunities for students such as TIME for kids, National
Geographic, and NASA, among others. However, the use of LMS
still poses issues and challenges to both students and teachers.
Business
An adware is a program designed to display advertisements on your
computer, redirect your search requests to advertising websites, and
collect marketing-type data about yourself—for example, the types
of websites that you visit—so that customized advertisements can be
displayed.
Health
• Patient records are always kept confidential. However, with
the introduction of technology, and with hospitals and clinics leaning
towards automation, patient records have shifted from paper to
digital. With this, concerns regarding data security and data
confidentiality of patients have increased. But why is there such an
interest in patient records?
• According to the International Association of Privacy
Professionals, "a medical record is more valuable than a credit card
on the black market. According to the World Privacy Forum, a
medical record, including a name, address, Social Security number
and health ID number, typically goes for $50 on the online black