Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

ITE FINAL TERM | WEEK 13 Term of Protection inventor is prohibited from utilizing the protected innovation without

VIGNETTE 1. The copyright in works shall be protected during the life of the the consent of the original patent holder, even if they independently
Apple Trade Secrets Revealed? author and for fifty (50 years after his death. This rule also applies create the identical thing without being aware of the first inventor's
Nicholas Ciarelli, an ardent supporter of Apple, has run the to posthumous works. creation.
company's website (www.thinksecret.com) since he was 13 years old. 2. In case of works of joint authorship, the economic rights shall be Prior art is the existing body of knowledge that is available to a person
He is currently a Harvard student and serves as the paper's editor. protected during the life of the last surviving author and for fifty of ordinary skill in the art.
Ciarelli, whose website disseminates news and rumors about Apple, (50) years after his death. An invention must pass the following four tests to be eligible for a
angered the company by announcing the advent of a new Mac mini for 3. In case of anonymous or pseudonymous works, the copyright patent:
$499 and the iLife software bundle two weeks before they were shall be protected for fifty (50) years from the date on which the  It must fall into one of five statutory classes of items that can be
formally shown at the Macworld Conference and Expo in San work was first lawfully published: Provided, That where, before patented: processes, machines, manufactures (such as objects
Francisco. the expiration of the said period, the author's identity is revealed need by humans or machines), compositions of matter (such as
Apple, which is renowned for keeping its business strategies or is no longer in doubt, the provisions of above guidelines shall chemical compounds), and new uses in any of the previous four
and products very under wraps, responded to the illegal release as an apply, as the case may be: Provided, further, That such works if classes.
assault on its priceless trade secrets. Its lawyers launched a lawsuit, not published before shall be protected for fifty (50) years  It must be useful.
alleging that Ciarelli's requested information regarding items that counted from the making of the work. (  It must be novel.
hadn't yet been introduced. from those who gave Apple information in 4. In case of works of applied art the protection shall be for a period  It must not be obvious to a person having ordinary skill in the
violation of their confidentiality agreements by disclosing information of twenty-five (25) years from the date of making. same field.
that was later made public online. 5. In case of photographic works, the protection shall be for fifty The Court has ruled that three classes of items cannot patented: abstract
According to Ciarelli's comment, "I use the same legal news (50) years from publication of the work and, if unpublished, fifty ideas, laws of nature, and natural phenomena. Mathematical subject
gathering techniques as any other journalist." I talk to sources, look into (50) years from the making. matter, standing alone, is also not entitled to patent protection. Thus,
tips, follow up on leads, and confirm information. I think these methods In case of audio-visual works including those produced by process Pythagoras could not have patented his formula for the length of the
are evident in Think Secret's track record. analogous to photography or any process for making audio-visual hypotenuse of a right triangle (c² = a²+ b²).
On the one hand, some contend that the Uniform Trade recordings, the term shall be fifty (50) years from date of publication
Secrets Act bars disclosure of information obtained from those subject and, if unpublished, from the date of making. When someone uses another person's patent without authorization, this
to nondisclosure agreements by third parties; on the other hand, many is called a patent infringement. There is no set cap on the financial
contend that Ciarelli's actions were protected under the First Protection for Performers, Producers and Broadcasting punishment for patent infringement, unlike copyright infringement. In
Amendment and that Apple should have concentrated on finding and Organizations fact, if a court finds that the infringement was done on purpose, it has
disciplining the employees who leaked the information. (1.) The rights granted to performers and producers of sound the power to double the amount of damages sought by the patent
recordings under this law shall expire: owners by up to three times. A counterattack on the allegations of
Intellectual Property (a) For performances not incorporated in recordings, fifty (50) years infringement and the legality of the patent itself is the most typical
A piece of art, a book, a movie, a formula, an invention, from the end of the year in which the performance took place; defense against patent infringement. The plaintiff must still
some music, a procedure, etc. that is unique and "owned" or produced and demonstrate each aspect of at least one claim and that the infringement
by a single individual or group is referred to as intellectual property. (b) For sound or image and sound recordings and for performances resulted in harm, even if the patent is legitimate.
Music, literature, movies, and other created works are all incorporated therein, fifty (50) years from the end of the year in
protected by copyright laws. Patent laws safeguard successful which the recording took place. Software Patents
inventions. Combining copyright, patent, and trade secret laws creates In case of broadcasts, the term shall be twenty (20) years from the date The creators of "original l works of authorship in any
a complicated body of law that deals with intellectual property rights. the broadcast took place. The extended term shall be applied only to tangible medium of expression, now known or later developed, from"
For example, some inventors argued that copyrights, patents, and trade old works with subsisting protection under the prior law. are granted copyright and patent protection, which states that the
secrets hinder creation by making it more difficult to expand on the government shall have the authority "to promote the Progress Science
ideas of others. Such regulations can also raise possible ethical Software Copyright Protection and useful Arts, by securing for limited Times to Authors and Inventors
difficulties for IT firms and consumers. Computer software copyright utilization brings up the exclusive Rights to their respective Writings and Discoveries."
It is difficult to define and regulate the correct amount of challenging concerns of interpretation. For instance, a software which individuals have the only right to perceive, reproduce, or
access to intellectual property. developer may study the functionality of a copyrighted program made otherwise convey, whether directly or with the use of a computer or
by a rival and then produce a similar application that achieves the same mechanism. share it, show it out, perform it, or copy it. in duplicate. the
Copyrights goals and functions. The copyright holders must demonstrate an creation of derivative works.
The creators of "original l works of authorship in any uncanny similarity between their program and the new software that
tangible medium of expression, now known or later developed, from" can only be explained by copying in order to establish infringement. If Submarine Patents and Patent Farming
are granted copyright and patent protection, which states that the the new software can prove that, there is no violation, though. For A definition or format that has been adopted as a de facto
government shall have the authority "to promote the Progress Science instance, two software developers may theoretically create two distinct standard by the industry or that has received the approval of a reputable
and useful Arts, by securing for limited Times to Authors and Inventors versions for a straightforward game like tic-tac-toe without violating standards body is referred to as a standard. Operating systems, data
the exclusive Rights to their respective Writings and Discoveries." the copyright of the other formats, communication protocols, and electrical interfaces all have
which individuals have the only right to perceive, reproduce, or standards. Because they allow hardware and software from many
otherwise convey, whether directly or with the use of a computer or Patents manufacturers to function together, standards are incredibly helpful.
mechanism. share it, show it out, perform it, or copy it. in duplicate. the A patent is a property right granted to innovators. A patent A patented technology, method, or idea may unintentionally
creation of derivative works. enables its owner to prohibit anyone from creating, using, or selling a or intentionally be included into a standard. If this is the case, the patent
protected invention and provides legal action against anybody found to holder may demand a fee from any party who implements the standard
have violated the patent's terms. A patent, as opposed to a copyright, or may refuse to grant particular parties permission to utilize the patent,
forbids independent production in addition to copying. The second preventing them from utilizing the standard in practice. A submarine
patent is one that is concealed within a standard and doesn't come to acceptance of responsibility not to disclose any trade secrets after the electronic information and the expansion of the Internet. Hundreds of
light until the standard is widely used. A cunning patent owner may interview. online "paper mills" that let consumers obtain whole term papers only
persuade a standards group to utilize a patented product without Noncompete clauses are another tool that workers may use serve to exacerbate the issue. Many customers pay little attention
disclosing the patent's existence. The patent holder may eventually seek to prevent competitors from using their intellectual property when despite certain paper mills' cautions that their services should only be
payments from each party using the standard. Patent farming is the term important employees go. For a certain amount of time, sometimes one used for study. As a result, plagiarism is becoming a problem in
for this tactic. to two years, such agreements educational settings ranging from primary schools to graduate
Patent No. 5,838,906, which is owned by the University of programs. A lot of people copy work outside of academia. It has been
California and licensed exclusively to a tiny software business called LEGAL OVERVIEW charged against well-known playwrights, singers, journalists, and even
Eolas Technologies, could be an example of a submarine patent. The The Battle Over Customer Lists software engineers.
patent explains how a web browser may use outside programs. The In sectors where businesses compete for many of the same
owner of the patent sued Microsoft for using the idea after concealing customers, losing consumer information to rivals is an increasing Reverse Engineering
it for years. After a federal jury determined that Microsoft's Internet worry. There are several instances of employees using their employer's Reverse engineering is the act of disassembling something
Explorer browser violated the patent, the university and Eolas were client list for personal gain. For instance, Harrah's Entertainment said in order to comprehend it, create a replica of it, or enhance it. Although
given a $520 million award in August 2003. In response to a request that a former employee stole a list of 450 rich customers' names, reverse engineering was first used on computer hardware, it is now
from the well-known Tim Berners-Lee, the founder of the World Wide addresses, and histories of their credit and accounts from a Harrah's frequently used on software as well. Reverse engineering entails
Web and head of the World Wide Web Consortium, the patent office database before quitting to work at a rival casino. dissecting software to produce a new model of the system in a different
started an examination of the patent in November 2003. He maintained Additionally, a hacker obtained access to AOL's subscriber list configuration or at a higher degree of abstraction. Reverse engineering
that the existence of prior art—previous uses of the technology— and used the email addresses to advertise his online gambling company. frequently starts by utilizing program code, which allows you to extract
should render the 1998 patent null and void. A federal judge affirmed AOL's 30 million members' information is kept in the company's data design-stage elements at a higher abstraction level in the life cycle. In
the initial ruling in January 2004, ordering Microsoft to pay $520 warehouse, to which only a few workers have access. The hacker, who other words, compared to the program code of the same information
million because Internet Explorer violated the patent. Microsoft's plea had been employed at AOL for over five years, didn't have access to system, design-level aspects are less concrete and more conceptual.
for a new trial was denied by the court, and to make matters worse, she the information, but he used the guise of another worker to access it. Compiler and decompiler concerns are related to other
also mandated the payment of more than $45 million in interest. AOL maintains credit card details separately, thus the hacker only reverse engineering problems. A compiler is a language converter that
obtained screen names, zip codes, credit card types, and phone transforms the assertions of computer programs written in a source
Trade Secret Laws numbers. language (such as COBOL, Pascal, or C) into machine language, which
A trade secret is a piece of commercial information that has been Does a company's client list thus constitute a trade secret covered is composed of binary codes made up of Os and 1s that a computer can
kept secretive, has some element of originality or uniqueness, has by intellectual property law? Legally speaking, a client list is not understand and use. Software is typically provided in machine
secretly taken work or expense to acquire, and represents something of always regarded as a trade secret. The court won't recognize the list as language form when it is purchased by a client from a software
economic worth. Information, such as a formula, pattern, compilation, important, sensitive information if a corporation doesn't do the same producer. Reverse engineering compilers and decompilers are devices
program, device, technique, method, or procedure, that: internally. When making this decision, the courts must take into that can interpret machine language and generate source code.
 Derives independent economic value, actual or potential, from account two factors. First, did the company exercise caution by taking By analyzing the coding and functioning of a competitor's
not being generally known to, and not being readily the following measures to keep the list a secret? software, one can use decompilers and other reverse engineering
ascertainable by, persons who can obtain economic value from  Labeling confidential techniques to create a new program that either mimics the original or
its disclosure or use.  Storing in locked facility or in a password-protected computer interacts with it. Therefore, reverse engineering offers a means of
 Is the subject of efforts that are reasonable under the  Limiting access to a small number of people on a need-to-know gaining access to data that another company may have designated as
circumstances to maintain its secrecy. basis confidential or copyrighted.
Only when businesses take precautions to secure information is it  Requiring employees to sign nondisclosure agreement that Reverse engineering is increasingly forbidden under
deemed a trade secret. Identification of all the information that has to specifically mentions customer lists software license agreements. Reverse engineering can be helpful in
be protected—including secret company strategies, market research, Second, did the company invest time or resources to create the client finding security flaws and defects in software.
and patent applications—is the first step in designing a trade secret list? The more a company invested in developing its customer list and
protection strategy. the more of a competitive advantage the list gives the company, the Open-Source Code
Employees pose the biggest threat to the company's trade more probable it is that the list will be accepted as a trade secret by the Proprietary software creators historically have not made
secrets since they might unintentionally leak them or steal them to courts. A client list that is easily reconstructed by gaining access to their source code accessible, although current developers do not adhere
benefit financially. Employees must be informed by their employers of publicly accessible sources, including trade publications or even the to that idea. Any software whose source code is made accessible for
the value of protecting company information confidentiality. phone directory, will not be considered a trade secret. usage or modification as users or other developers see fit is referred to
Information that is considered to be trade secret should be clearly as having open-source code. The fundamental idea behind open-source
marked as private and should only be available to a select group of Since many people mistakenly believe that customer lists are public software is that when code is accessible to programmers for reading,
persons. When it comes to business information nondisclosure, the information, employees should be made aware of the privacy of such redistribution, and modification, the software advances, may be
majority of firms have rigorous standards. lists. In certain organizations, staff members are informed about court modified to fit new demands, and defects are quickly found and
cases involving customer lists that were stolen and threatened with corrected. Supporters of open-source software think that this method
Organizations frequently try to prevent workers from disclosing secrets legal action for stealing trade secrets. generates better software than the conventional closed approach. There
by including nondisclosure terms in employment contracts because is a considerable quantity of open-source software accessible, such as
they run the risk of losing trade secrets when important employees go. KEY INTELLECTUAL PROPERTY ISSUES the MySQL AB, Ingres, and Linux operating system.
Having an experienced member of the human resources Plagiarism
department conduct exit interviews with each departing employee is Plagiarism is the act of stealing and representing someone Competitive Intelligence
another approach for protecting trade secrets. Reviewing a checklist else's thoughts or words as one's own. It has become simple to copy The collecting of information that is legally attainable for
that addresses confidentiality concerns is an important part in the and paste paragraphs into term papers and other documents without the purpose of giving a business an edge over its competitors is known
interview process. The leaving employee is required to sign an using correct citation or quote marks as a result of the proliferation of as competitive intelligence. For instance, some businesses have staff
members who keep an eye on public notifications of property transfers
to spot potential competition plant or shop expansions. Continuous data Cybersquatting Computer vision
collection, analysis, and assessment are necessary for a successful Anything that enables a customer to distinguish the goods Makes useful decisions about real physical objects and scenes based on
competitive intelligence operation, along with carefully regulated of one firm from those of another is considered a trademark. A sensed images. This is to make images and objects as real as it can be.
transmission of the pertinent information to decision-makers. The trademark might be a phrase, sound, word, packaging design, or logo. At present, there are only limited ways of representing three-
strategic goals and decision-making processes of a corporation Consumers sometimes rely on the labels on items since they are unable dimensional information directly, and they are not as good as what
frequently include the use of competitive intelligence. to check goods or services to evaluate their quality or source. humans evidently use.
Industrial espionage, which uses illicit methods to gather According to trademark law, the trademark owner has the right to stop
corporate information that is not accessible to the public, is not the third parties from using the same mark or one that is confusingly Expert systems
same as competitive intelligence. Industrial espionage is a serious similar. A mark is covered by trademark protection for as long as it is Refer to programming computers to make decisions in real life
offense with severe consequences. Almost all of the information used. situations such as helping doctors diagnose disease based on
required for competitive intelligence may be gathered by reading Making their brand names a part of the domain names for symptoms. In the early 1980s, expert systems were believed to
published material or conducting interviews. An competent analyst can their websites is the greatest approach for businesses that want to have represent the future of artificial intelligence and of computers in
draw conclusions that lead to important information by combining this an online presence to leverage the strength of their brand names. When general. To date, however, they have not lived up to the expectations.
data with analytical tools and sector knowledge. Web sites were originally created, there was no process in place to Many expert systems help human experts in such fields as medicine
Analysts and businesses might face major consequences if verify the validity of requests for Web site names, which were and engineering, but they are very expensive to produce and are helpful
they don't use competitive information responsibly. For instance, the distributed based on who made them first. In the hopes that the owner only in special situations.
Procter & Gamble Company (P&G) officially acknowledged in 2001 of the trademark would purchase the domain name for a significant
that it had obtained information about Unilever, a rival in the quantity of money, cyber squatters registered domain names for well- Heuristic classification is one of the most feasible kinds of expert
multibillion dollar hair care industry, unethically. P&G's supervisors of known brands and corporate names to which they had no relation system given the present knowledge of AI. This will put some
competitive intelligence engaged a contractor, who then hired a information in one of a fixed set of categories using several sources of
subcontractor, to spy on the company's rivals. The main target was ITE FINAL TERM | WEEK 14 information. An example is advising whether to accept a proposed
Unilever, which produces Pantene, Head & Shoulders, and Pert while ARTIFICIAL INTELLIGENCE TRENDS AND ISSUES credit card purchase. Information is available about the owner of the
P&G distributes products including Salon Selectives, Finesse, and Artificial Intelligence (AI) credit card, his record of payment and the item he is buying and about
Thermasilk. A branch of computer science concerned in making computers behave the establishment from which he is buying it (e.g., about whether there
At least one incident of the spying involved searching like humans do. It was still in the ancient times that they were dreaming have been previous credit card frauds at this establishment).
public trash outside the Chicago headquarters of Unilever. to create intelligent machines that can engage on behaviors that humans
Additionally, it was claimed that agents of competition intelligence consider intelligent. It was only in the later years that smart machines AI History
disguised themselves to Unilever staff as market analysts. (P&G admits is becoming in reality. Many researchers now are creating systems that Turing’s Test is a test which analyzes or examines whether a computer
the trash digging, but it disputes any misrepresentation took place.) The mimic human thought, understand speech, and beat the best human has a humanlike intelligence. It was proposed by a British
operatives acquired vital information on Unilever's brands, including chess player and countless other feats never before possible. mathematician. The computer is said to pass the Turing’s test if the
new-product rollouts, selling prices, and operating margins. panel believes that the entity possesses humanlike intelligence.
P&G promptly suspended the campaign and dismissed the three Application of AI Turing’s test is sometimes referred to as behavioral tests for the
managers in charge of hiring the agency when senior P&G executives Game playing presence of mind, or thought, or intelligence in putatively minded
learned that the firm had been engaged by the corporation was acting Refers to programming computers to play games such as chess and entities.
unethically. Then P&G took an unprecedented action: it came clean checkers. The most common AI for game playing is chess. IBM had It was in a 1951 paper that Alan Turing proposed a test
about its own wrongdoing, admitted it to Unilever, gave them the stolen developed a computer chess player named Deep Blue which won over called “The Imitation Game” which he thought would settle the issue
data back, and began negotiating a resolution. The chairman of the the defending world champion Gary Kasparov in 1997. of machine intelligence. The first version of the game involved no
board of P&G took personal responsibility for making sure that none computer intelligence whatsoever. Imagine three rooms, each
of the data collected will ever be used in P&G business planning. High- Speech recognition connected via computer screen and keyboard. In one room sits a man,
level conversations between P&G and Unilever officials over several Is a technology where computers recognize human language to perform in the second a woman, and in the third sits a person who will serve as
weeks resulted in a covert agreement between the two businesses. . such task. In later years, speech recognition reached a practical level the "judge" who will decide as to which of the two people talking to
Tens of millions of dollars are said to have been given to Unilever by for limited purposes. This technology supposedly will replace the use him through the computer is the man. The man will attempt to help the
P&G. of keyboard because you will just give instructions to the computer. judge, offering whatever evidence he can (the computer terminals are
Several executives for hair-care companies were also moved to But human went back to the use of keyboard and mouse because of used so that physical clues cannot be used) to prove his man-hood. The
different P&G divisions. convenience in using them. woman's job is to trick the judge, so she will attempt to deceive him,
Competitive intelligence specialists concur that the and counteract her opponent's claims, in hopes that the judge will
company P&G engaged went beyond the bounds of moral business Understanding natural language erroneously identify her as the male.
conduct by going through Unilever's trash. They do, however, Allows computers to understand natural human languages. Research Later, Turing proposed a modification of the game. Instead
commend P&G for reaching out to Unilever so promptly after realizing are still working in progress in developing systems that converse in of a man and a woman as contestants, a human of either gender at one
the damage. Such quick response was deemed to be the optimum course natural language, perceive and respond to their surroundings, and terminal, and/or a computer at the other terminal will participate. Now,
of action. Unilever could have sued P&G in court if a settlement encode and provide useful access to all human knowledge and the judge's responsibility is to decide which of the contestants is human,
couldn't be reached, but it would have exposed humiliating information expertise. Natural-language processing offers the greatest potential and which the machine is. Turing proposed that if, under these
and further damaged a brand that is widely seen as being very ethical. rewards because it would allow people to interact with computers conditions, the judge was less than 50% accurate – that is, if a judge is
A public trial also had the potential to harm Unilever. The trade secrets without needing any specialized knowledge. You could simply walk up as likely to pick either human or computer – then the computer must be
at the center of the dispute may have been revealed in depositions and to a computer and talk to it. Unfortunately, programming computers to a passable simulation of a human being and hence, intelligent. The
other trial evidence. This could have made proprietary data less understand natural languages has proved to be more difficult than game has recently been modified so that there is only one contestant,
valuable. originally thought of.
and the judge's job is not to choose between two contestants, but simply earlier than the Web, or even the Internet. An article called “As we may Email
to decide whether the single contestant is human or machine. think” written by an engineer named Vannevar Bush, in 1945 described Short for electronic mail, is the transmission of messages via a
a microfilm-based machine called the Memex that could link associated computer network. It is the original service that the Internet offers.
Web Technology information or ideas through “trails”. The idea became known in the Before, only the scientists and researchers that work for government-
Internet mid-1960s when Harvard graduate, Ted Nelson, conceived the term sponsored projects to communicate to their colleagues based on other
Refers to a collection of computers and cables forming a “hypertext” to describe a computer system that could store literary locations uses this service. Today, email is said to be the primary source
communications network, just like telephones and cables forming the documents, link them according to logical relationships, and permit of communication whether for personal or business purposes. Email
telephone system. The Internet is intended to carry computer data, like readers to comment and annotate what they read. programs are used to create, send, received, forward, store, print, and
telephone network which is intended to carry conversations. The delete messages. Such programs include Outlook and Outlook Express
Internet carries various data including email, videoconferences, and Many areas of hypertext have become a reality on today’s Web. Every which are the popular among other email programs.
instant messages. The Web page contents are another type of data that Web page is based on a document stored in a file identified by a unique
is carried over the Internet. In other words, the Internet is a network of address, called a Uniform Resource Locator (URL) or a web address. File Transfer Protocol (FTP)
all networks where a user at any computer, with permission, can access You can type the URL to the Address bar of a web browser to access Is an Internet service that allows a user to upload and download files
and get information from any other computer. any documents. Another way is by clicking an underlined word or from other computers on the Internet. Uploading refers to the process
The Internet was envisioned by the Advanced Researched phrase called a hypertext link (or simply “link” or “hyperlink”) to of transferring a file to the Internet while downloading refers to the
Projects Agency (ARPA) of the US Government where they called it access related documents. An example of a URL is process of obtaining a file from the Internet. The file refers to
as ARPANET then. They aim to create a network that would allow http://www.google.com, while example of a link is documents, graphics, and other objects from a computer server. An
users of a research computer at one university to be able to "talk to" http://en.wikipedia.org/wiki/Hyperlink FTP server is a computer that allows you to upload/download files. An
research computers at other universities. This is because they wanted FTP site is a collection of files that reside in an FTP server
to protect the messages that are being routed or rerouted in the event of HTTP and HTML are the two basic building blocks from which today’s
a military attack or from any other disaster that can destroy their Web-style hypertext is crafted. You’ll have a better grasp of how the Newsgroups and Message Boards
communication. Web works and its potential for future development if you have some Is an online area that allows a group of users to discuss a particular
background on these building blocks. topic. In such a discussion, one will send a message to a group then the
Intranet other group will read and respond to the message. Usenet is what they
Is a private network contained in an enterprise that includes The two (2) major ingredients that define the Web are HTTP and call the collection of tens of thousands of newsgroup about multitude
connections through one or more gateway computers to the outside HTML. You’ll have a pretty complete list of the basic technologies topics. Topics may include news, recreation, society, business, science,
Internet. Its purpose is to share company information and computing that make the Web work. and computers.
resources among employees. It can also facilitate working in groups
and teleconferences. On the other hand, extranet is a private network A Web server stores one or more Web pages of a Web site. Each page Mailing Lists
that uses the Internet technology and the public telecommunication is saved as an HTML document. This document may be plain text, or Is another online service where email addresses are stored. All email
system to securely share a part of a business's information or operations ASCII, document with embedded HTML tags. Some of these tags addresses stored in it receives the message when a user uses it. In
with suppliers, vendors, partners, customers, or other businesses. indicate how the document is to be displayed when viewed in a essence, a mailing list is like a distribution list usually used to group
browser. Other tags comprise links to related documents, sound files, certain email addresses.
Extranet and graphics that are also stored on Web servers. Aside from storing
can be viewed as part of a company's intranet that is extended to users these files, a Web server runs a Web server software that carries Chat Rooms are a technology that consists of online and live
outside the company. It has also been described as a "state of mind" in requests for specific Web pages. communication over the Internet. It is a location in the Internet server
which the Internet is perceived to do business with other companies as Web client software called a browser is used to surf the Web that allows users to have almost like a real-time communication.
well as to sell products to customers. (as defined above). If you type a URL into the browser’s Address box, Anyone in the chat room can participate in the conversation which
you are actually requesting an HTML document of the Web page that usually is specific to a particular topic. Before you can enter a chat
In order to use Internet, you must have a web browser installed on your you want to view. The browser forms a request for the specified file room, you must be connected to a chat server through a program called
computer to access different web pages and sites. using a command provided by the HTTP communications protocol. chat client which can also be downloaded from the web.
 A web browser is an application software allowing users to
Meanwhile, the Web server is “listening” for any HTTP Instant messaging
access and view web pages.
requests. When the request arrives, the Web server examines it, locates Is in essence a chat but you can choose certain users that you want to
 A web page is a page consisting of HTML documents stored on
the HTML document that is being requested, and sends it back to the communicate with. Not like chat rooms that talk about a particular
a web server.
computer. When the request is fulfilled, the server moves on to process topic, IM allows you to communicate all the topics that you want. Many
 In contrast, web sites are a collection of connected web pages other requests. If in case additional components are needed for the Web
stored on a web server. users make use of IM for personal purposes but be sure to always
page that the browser is displaying - a graphic, for instance, the browser observe “Netiquettes”.
The most popular web browsers nowadays are Microsoft Internet must issue a new request to the server for that component.
Explorer and Mozilla Firefox which is downloadable for free. The
appearance of a web page or site varies depending on the versions of Internet Telephony
The Web is only one of the services that the Internet offers. Commonly known as Voice over IP (Internet Protocol), allows the user
the web browsers. For higher versions of browsers, the animation and They almost changed our ways of communicating to others, such as
appearance of the page and site are more enhanced because of their to speak to other users over the Internet using computers, mobile
through emails, discussion of certain topic, and the likes. Many times, computer, or mobile devices. You will need a high- speed Internet
added support for animation, virtual reality, and sound files. communications take place completely in writing – without the parties connection, Internet telephone service, and a microphone or telephone
ever meeting each other. to be able to use this technology and place a call.
Hypertext Transfer Protocol (HTTP) and Hypertext Markup
Language (HTML) are the two most important elements of the Web.
Both contain “hypertext” in their names. Hypertext is a key concept
for understanding the Web. The idea of hypertext originated much
The following are various types of web sites to choose and search A search engine is a program that finds web sites and pages. It helps service costs while enhancing the quality of goods and speeding
from. the user find particular information about certain topics or locate up service delivery.
Portals particular web pages for which they do not know the exact web address.  From an online standpoint, EC offers the possibility to purchase
Are sites that offers you a variety of Internet services such as search There are thousands of search engines available, some are general and and sell goods and data through the Internet as well as other
engine/or subject directory, news, sports and weather, free web can perform searches on any topic but some restricts to certain subjects online services.
publishing services, reference tools such as yellow pages, stock quotes like finding people, job hunting, or locating real estate.
and maps, shopping malls and auctions, email and other forms of online Electronic commerce applications started in…
communication. A search text box is available. It is where you enter a topic, a subject Electronic commerce applications started in the early 1970’s, with
or a keyword which can be a simple word or phrases that will define such innovation as electronic fund transfers (EFT). However, only
News web sites the item about which you want information. Search engines respond significant firms, financial institutions, and a few brave small
Provides you newsworthy material including stories and articles with results that include thousands of links to web pages that answer in businesses were included in the applications. Then came EDI, which
relating to current events, life, money, sports, and weather. Most news little or no bearing on your research. broadened the scope of transaction processing from financial to other
that is uploaded on the Internet is not included in the print because it is types and increased the number of participating businesses from
the most updated media. Newspapers, televisions, and radios are the Google is the largest search engine in the web whose purpose is to financial institutions to manufacturers, merchants, and services, among
ones that maintain the news web sites. organize the world’s information and make it universally accessible others. Then came a ton of more uses, like stock trading and reservation
and useful. Queries received by Google reaches several hundred systems for vacation. The phrase "electronic commerce" was
Informational web sites contain factual information. Many millions each day through its various services. As of February 2004, established with the early 1990s commercialization of the Internet and
government agencies provide information such as tax codes, loans you Google received 2.5 billion queries. its quick expansion to millions of prospective consumers. C
can mortgage from SSS. Other organizations provide information such applications also grew quickly at this time. The creation of networks,
as public transportation schedules and published research findings. Google uses an algorithm called PageRank that ranks web pages which protocols, software, and standards was one factor in the technology's
matches a given search string. The algorithm computes a recursive quick development. The rise in competition and other commercial
figure of merit for web pages based on the weighted sum of the pressures is the additional factor.
Business/Marketing web sites PageRanks of the pages linking to them. Aside from indexes and
Provide you marketing and business contents that promotes and sells HTML that Google caches, there are other 13 file types that it can  Ubiquity - Internet/Web technology is accessible anywhere,
products and services. Up to date, most business and marketing search: PDF, Word documents, Excel spreadsheets, Flash SWF, plain anytime, via mobile devices, including at work, at home, and
companies have their own web sites where you can place your orders text files, among others. elsewhere. The boundaries of the market are no longer applicable,
online and simply browse in their products. and it is no longer restricted by time or place. There is now a
Educational web sites Yahoo! is the first navigational portal to the web created by Jerry Yang "marketspace" where people may shop. Both customer
Offer you exciting and challenging course in formal and informal and David Filo, both electrical engineering graduates at Stanford convenience and shopping prices are improved.
teaching and learning. There exist many educational web sites that University. They built this portal by creating and organizing their own  Global Reach - The technology is applicable everywhere on
allow online training for employees and classes for colleges. Most favorite web sites in 1994. The next year, Yang and Filo, together with Earth, spanning national borders. Cross-cultural and cross-
instructors use these types of web sites to enhance classroom teaching some fellow students named it Yahoo! and released it to the Internet national commerce is possible without hindrance or change.
by publishing course materials, grades, and other related class community. Potentially billions of clients and millions of companies are
information. included in the term "marketspace" globally
Yahoo! stands for Yet Another Hierarchical Officious Oracle. What  Universal Standards – There is just one set of technological
Entertainment web sites makes Yahoo! unique than the others is that its staff members build the norms, and those are the Internet norms. Around the world, there
Offer users an interactive and engaging environment. Popular directory by assuming the role of a typical web researcher. is just one set of technical media standards.
entertainment web sites offer music, videos, sports, games, ongoing  Richness – It is possible to send text, audio, and video
web episodes, and the likes. Other complicated web sites tie up with communications. Each of them is incorporated into a single
other networks to allow users to vote in their polls on television shows. ITE FINAL TERM | WEEK 15 marketing message and consumer experience.
E-COMMERCE TRENDS AND ISSUES  Interactivity – Through user contact, the technology functions.
Advocacy web sites Electronic commerce (EC) Customers participate in a conversation that dynamically adapts
Provide contents that describe a cause, opinion, or idea. Its purpose is Is a new trend in modern selling and merchandising technologies that the experience to each person and involves them in the process of
to convince the reader of the validity of the cause, opinion, or idea. allows customers to engage in all stages of a purchase decision while getting products to market.
These web sites usually present views of a particular group or completing those steps electronically rather than over the phone with a  Information Density - The technology improves information
association. printed catalog or in a physical shop. A client may view product quality while lowering information expenses. Costs associated
information, choose products to buy, make safe purchases, and have with information processing, storage, and communication
Blog, short for web log, the transaction handled financially through electronic commerce. significantly decrease, but the currency, accuracy, and timeliness
Is a journal format regularly updated that reflect to the interests, significantly increase. Information becomes accessible,
opinions, and personalities of the author and sometimes the site Kalakota and Whinston (1997) define EC from these perspectives: affordable, and reliable.
visitors. These consist of ideas and collection of thoughts in an informal  From the standpoint of communications, EC refers to the  Personalization/customization - The technology enables the
style of a single individual. Personal web sites are a private individual’s transmission of data, goods or services, or financial transactions delivery of tailored communications to both groups and
site usually not associated in any organization. This is usually about over telephone lines, computer networks, or other electronic individuals. Based on individual traits, products and services are
someone’s interest that may contain their own images, favorite music channels. customized and marketing messages are personalized.
and videos, and the likes for some personal reasons. Some intend for  From a business standpoint, EC is the use of technology to
job hunting and so they post their resumes. Some simply want to share automate workflow and commercial transactions.
life experiences with the world.  From the standpoint of services, EC is a tool that responds to the
demand of businesses, customers, and management to reduce
The benefits of ecommerce to merchants or organizations are as  New business opportunities difficulty with P2P companies is creating workable, ethical business
follows:  More accurate and up-to-date consumer data (potentially anyway) structures. P2P networks like Kazaa and Groove are examples.
 National and international marketplaces are added to the  Opportunity for added value services
marketplace via electronic commerce. A firm may simply and  Better customer support Mobile Commerce
rapidly find the greatest suppliers, the most suited business  Lower operating costs Is a subset of e-commerce that utilizes mobile phones and Palm devices
partners internationally, and more clients with little investment in for transactions. This has mostly gained popularity in Japan and
money. Benefits of B2C to Consumers Europe, where it uses new wireless technology to supplement
 Paper-based information creation, processing, distribution, and  Convenience established online business models. Phone-based 3G, Wi-Fi, and
retrieval costs are reduced by e-commerce. Companies can  Information Bluetooth are the main technologies utilized in mobile commerce. Even
reduce the administrative expenses associated with purchasing, if this technology is a letdown in the US, it is always improving.
 Ability to compare and choose among many offers
for instance, by using an electronic procurement system.  Lower prices, at times but not always
 The period between capital expenditure and the receiving of  Personal Service
goods and services is shortened by e- commerce. ITE FINAL TERM | WEEK 16-17
 Additional advantages include a better image, better customer Business-to-Business (B2B) is a kind of e-commerce that benefits TRENDS IN EDUCATION
service, streamlined procedures, enhanced output, and increased companies. Purchases are a crucial B2B activity. Purchasing differs 1. Online Education
flexibility. from purchasing in that departments rather than lone people are Online education is a notion that can be offered much more easily than
engaged, official procedures are followed, significant sums of money ever before because of the broad adoption and influence of mobile
The benefits of ecommerce to consumers are as follows: may be exchanged, and intricate discussions and contracts may be devices. Students with transportation issues or working adults can still
 Customers may conduct business through e-commerce from involved. access education without restrictions. Working adults who want to
virtually anywhere, 24 hours a day, 365 days a year. master new skills and technologies are increasingly interested in online
 Customers have more options thanks to e-commerce since they Advantages of B2B education. The digital world is slowly being embraced by higher
may choose from a wide variety of sellers and items. education as well. Executive management courses, supplementary
 Lower:
 Why Customers commonly find cheaper goods and services o Purchasing costs
credentials, professional education, and online certifications are all
through e-commerce because it enables them to search around growing in popularity. Many working people choose to enroll in
o Sales costs
and make rapid comparisons. courses that they can easily learn while at work or at home.
o Marketing costs
 Rather than waiting days or weeks for information, customers  Reduced inventory
In the Philippines, online education is a new frontier. This suggests a
may now get it right away. platform for offering instruction to students in remote locations via
 Efficient logistics videos and tutorials, where they may do so for a reasonable
 Lower cycle time price. Numerous schools around the country have chosen the Dynamic
The disadvantages of ecommerce are as follows:  Better consumer support
 Cost and justification - Building EC in-house may be quite Learning Program (DLP) and Learning Management System (LMS) as
B2B electronic commerce: areas of growth cutting-edge instructional frameworks. These can aid in learning even
expensive, and any errors brought on by inexperience could cause  Goods
delays. Although there are numerous prospects for outsourcing, it if students are unable to attend class. In the Philippine educational
o Computing and electronics system, the following are now the norm:
can be difficult to know where and how to start. o Motor vehicles
 Security and privacy - These concerns are particularly o Petrochemicals
 Internet allowed school operations
significant in the business-to-consumer sector, particularly o Utilities  teachers meet online with the students to stay connected
security concerns that, when suitable encryption is employed, are  Services with them
believed to be less serious than they actually are. Privacy
o Financial  school administration meets online to follow-up on tasks
protections are continually being enhanced. The EC sector has a
very lengthy and tough problem convincing clients that online
o Professional  online classes to ensure that students continue to receive the
o Administration intervention needed, and to facilitate skills across different
transactions and privacy are actually highly safe. However, the
o Travel telecom platforms and settings
customers viewed these concerns to be very vital.
 Lack of trust and user resistance - Customers are reluctant to Consumer-to-Consumer (C2C)  instructional materials were prepared in such a way that
utilize electronic money, paperless transactions, or unidentified, Is a sort of e-commerce where users sell to other customers directly. there would be lesser online meetings and in consideration
faceless sellers. So it could be challenging to convert from Examples include people advertising in classified advertisements on of the students who don’t have gadgets and have limited
physical to internet retailers. websites like www.buyandsell.com.ph and selling homes, vehicles, cell Internet access
 Other limiting factors – Online experiences are not tactile. Some phones, and other items. Another example of C2C is selling knowledge
buyers want to touch products, such as clothing, in order to fully and skills and marketing personal services online. To promote goods Article: Printed materials, online classes 'most preferred' for distance
understand what they are purchasing. for sale or services, some auction sites operate intranets and other learning – DepEd
corporate internal networks. By Michelle Abad
Major types of E-Commerce The Department of Education says the opening of classes on August 24
Business-to-Consumers (B2C) is a kind of online trade that caters to Benefits of C2C is pushing through, despite criticism regarding the government’s
direct customers. Purchasing is the key activity here. There are retail readiness for implementing distance learning
 Increases liquidity (products, service, advice)
sales to certain customers. For instance, a consumer or customer is the  Reduced search costs
type of shopper that often uses Amazon.com.
Peer-to-Peer (P2P)
Benefits of B2C to Business Is a kind of online commerce that connects people and enables them to
 Lower distribution costs share data and resources without the usage of a central server. The
5. Formative assessment solutions
While the survey reflects the responses of a few million students, they More emphasis will be placed on the value of learning outcomes, which
still do not reflect the answers of all 16.6 million students who enrolled is why formative assessment strategies are employed. In this digital
for the school year 2020-2021 as of July 1. So far, this is also just age, the traditional evaluation choices, such as simple memory exams
roughly 59% of the turnout of 2019, with 27.7 million enrollees. at the conclusion of a term, may be less effective. Learning has an
influence through formative assessments because they gauge student
The department estimates an enrollment turnout this year of 80%. development, evaluate how well the curriculum is being delivered, and
The DepEd is shifting to a distance learning approach for the next examine personal and social skills. In fact, because these procedures
school year to comply with President Rodrigo Duterte’s directive to are adaptive, students will experience the results in a customized way.
postpone face-to-face classes until there is an available coronavirus This is another reason why institutions increasingly choose formative
vaccine. The school year is set to open on August 24. assessment over traditional cookie-cutter methods.
6. Cost Management in Education
Distance learning will be implemented in 3 different ways – online Administrations will need in-depth planning as technology advances in
classes, printed modules, and broadcasted lessons through television the education sector to guarantee appropriate investment. The control
or radio. (FAST FACTS: DepEd’s distance learning) of costs in the education sector will significantly improve with the right
plan. To save operating costs, educational institutions are anticipated
As of Wednesday, July 1, the DepEd’s units are “busy preparing the to spend more on cloud technology in the upcoming years. Due to
PREPARATION. A teacher at the Mabini Elementary School in Baguio self-learning modules for all subjects and grade levels.” Meanwhile, common services, it will also increase operational efficiency in the
City prepares emergency kits for students and disinfects the premises regional offices are adjusting the distance learning programs to make education sector.
to prevent transmission of the coronavirus. Photo by Mau them more suitable to the situations on the ground. With the adoption of blockchain technology in the education industry,
Victa/Rappler printing and paper costs will go down. Every crucial document,
2. Integrated Learning Solutions including degrees, certificates, and other legal papers, will be available
MANILA, Philippines – The most preferred options students chose for It is not a practical idea for schools to wait until all learning is digital online. This will also lower the cost of manpower, which is typically
distance learning are printed modules or online classes for the next before introducing children to it. The majority of schools now embrace needed at institutes to handle, store, and maintain a large amount of
school year, according to the Learner Enrollment and Survey Form the realities of integrated learning systems. They want to meet the least data. The cost of other sectors will decrease, but the computational
(LESF) conducted by the Department of Education (DepEd). amount of demands on the digital infrastructure while still using component will cost more money. Now, more and more classes are
conventional textbooks as the foundation. In actuality, it is unjust for linked. Therefore, the need for better computational resources is
In a slide presented in a July 1 press briefing, the DepEd found around certain students to continue to be ignorant of the advantages of digital inevitable. This expense will improve operations. Sending
2 million students want to learn online, while 3.8 million students want education due to connectivity and infrastructural problems. Learning information, executing transactions, and many other tasks will move to
printed materials as a mode of instruction (also called the “modular” results may be greatly enhanced by using clever solutions, such as a digital formats and become easier.
method). print textbook linked to audio-visual information for a smartboard and 7. The Changing Role of a Teacher
connected to an online evaluation system. The 21st century has changed the concept of a teacher too. More than
a data feeder, the teacher has become someone who nurtures the
3. Personalized Learning learners adequately. This trend has become the crux of the student-
As students may learn without worrying about device, location, or centered approach to learning. The teacher has become a person who
scheduling restrictions, this will be a noteworthy trend of the year. As guides his/ her class through activities and sharing the wonder of
a result, students may study without being constrained by their discovery. Though involved in the activities, a teacher should keep an
comprehension level, learning style, or areas of strength or eye on monitoring the personal progress of individuals and helping the
weakness. For children with exceptional needs, this actually changes ones who need special attention and help.
the game since they now have the flexibility or freedom to learn at their
own speed and be prepared at the conclusion of the academic year. For Issues Regarding the Educational System
instance, dyslexic students are being helped by applications like The colonial history of the Philippines, encompassing the Spanish,
Dragon Speak to study through audiobooks in order to get over the American, and Japanese periods of authority and occupation, has had a
limits of textbook approaches. significant impact on the country's educational system. The most
significant and enduring contributions to the country's educational
4. Professional Development of Teachers system, though they were made by all of its conquerors, emerged
Of course, instructors are a crucial component of the learning ecology. during the American occupation (1898); it was at this aforementioned
In order for students to experience the best of the current technology, it time that 1. English became the default language of instruction, and 2.
Screenshot sourced by Rappler from the Department of Education is crucial to acquaint them with the competences and abilities of the First, a public education system was developed, one that was explicitly
The LESF is filled out by all parents who enroll their children in school. current generation. This only serves to increase the demand for modeled after the American educational system and was further
While there were 16.6 million enrollees at the time of the presentation professional development courses as they may improve their lateral managed by the recently created Department of Instruction. The
on July 1, DepEd planning director Roger Masapol explained there is thinking skills while also learning new teaching-learning Philippines has a vast and widely comprehensive educational system
a "lag" in encoding the answers for the LESF, and so the total methodologies. To enable instructors of all grade levels have an including elements like higher education, much like the United States
respondents reflected on the survey were 10.9 million. influence on current learning patterns, school officials are taking steps of America.
to arrange these programs and training. Surprisingly, the tendency is
Masapol also said parents may choose to not answer every question, now evident at educational institutions in the public and private sectors. The current educational system in the Philippines firstly consists of six
and those who did answer could choose more than one answer for their years of obligatory schooling (from grades 1 to 6), which are loosely
preferred modes.
separated into two levels, each consisting of three years. The Primary there are therefore more pupils enrolled in public schools, particularly
Level is the first level, while the Intermediate Level is the second level. at the high school level. According to the Department of Education's President Aquino discussed the government's achievement of a zero
Although the Philippine educational system has long served as a model 2013 estimate, there are 7,470 high schools and 38, 503 primary backlog in classroom supplies, desks and chairs, and textbooks in his
for other Southeast Asian nations, this has changed in recent years, and schools. fourth state of the nation address (SONA), noting that 56,085 new
the system has deteriorated. This is particularly evident and true in the teachers were hired in 2013 to fill the gap left by the shortage of
nation's more remote and impoverished regions. Mismatch teaching materials. However, according to information gathered by the
The gap between educational preparation and employment Department of Education, there were 19, 579, 60 million textbook
The Philippines' educational system is plagued by a number of opportunities is considerable. This has the potential to be a significant shortages, 2.5 million chair shortages, and 80, 937 shortages of water
problems on a national level problem at the tertiary level and is also the root of the continued high and sanitation facilities during the start of classes (June 2013).
rates of educated but jobless or underemployed persons. A Cornell- Additionally, it was determined that 770 schools in Metro Manila,
Quality of Education educated congressman from the 1-Ang Edukasyon Party-list, Dean Cebu, and Davao were overcrowded. The Department of Education
The quality of education comes first. The results of the National Salvador Belaro Jr., claims that there are around 600,000 educated also made statistics available indicating that 5,425 appointments, or
Achievement Test (NAT) and the National Career Assessment unemployed people in the United States each year. The "education gap" 91% of the 61,510 teacher vacancies, had been filled.
Examination (NCAE) for the year 2014 reveal a drop in the standard of is the term he uses to describe the problem.
elementary and secondary education in the Philippines. Both the NAT Issues regarding the K-12
and NCAE results from 2014 showed that student performance fell well Brain Drain Regarding the system's ability to deliver high-quality education, there
short of the desired mean score. Having said that, the comparison of Due to the current phenomena of globalization, brain drain is a chronic is disagreement. The results of the National Achievement Test (NAT)
graduation rates between the highly urbanized city of Metro Manila, issue that is seen in the Philippine educational system. It is projected and the National Career Assessment Examination (NCAE) for the year
which also happens to be not only the country's capital but also the that 2.3 million Overseas Filipino Workers (OFWs) worked overseas 2014 reveal a drop in the standard of elementary and secondary
largest metropolitan area in the Philippines, and other regions of the at any given time between April and September 2014. This continuous education in the Philippines. Both the NAT and NCAE results from
country like Mindanao and Eastern Visayas reveals the poor quality of mass departure has severe economic repercussions as well as an 2014 showed that student performance fell well short of the desired
the Philippine educational system. Eastern Visayas and Mindanao, two unprecedented brain drain. Furthermore, Philippine society has mean score. Having said that, the comparison of graduation rates
regions of the country, have primary school completion rates of about historically paid for the education of millions of people who go on to between the highly urbanized city of Metro Manila, which also happens
30% or even lower than Manila, which can boast a primary school spend their most productive years overseas. As a result, the Philippines' to be not only the country's capital but also the largest metropolitan area
completion rate of almost 100%. This type of data comes as no surprise already subpar educational system indirectly funds the rich economies in the Philippines, and other regions of the country like Mindanao and
to the Philippine education system because children from metropolitan that host the OFWs. Eastern Visayas reveals the poor quality of the Philippine educational
regions in the country have the financial means to finish at the very system. The Department of Education also made statistics available
least their elementary school education. Social Divide indicating that 5,425 appointments, or 91% of the 61,510 teacher
There is a troublesome and obvious socioeconomic divide in the nation vacancies, had been filled.
Budget for Education with relation to educational prospects. An equalizing influence on The money for education is the second problem the
The money for education is the second problem the Philippine education has been observed in the majority of modern cultures. Due Philippine educational system is dealing with. The Philippines still
educational system is dealing with. The Philippines still maintains one to this gap in the social structure, education is now a part of the maintains one of the lowest budget allocations to education among
of the lowest budget allocations to education among ASEAN nations, institutional framework that separates the affluent from the poor. ASEAN nations, despite the Constitution of the Philippines mandating
despite the Constitution of the Philippines mandating that the that the government devote the largest share of its budget to education.
government devote the largest share of its budget to education. Lack of Facilities and Teacher Shortage in Public Schools The third significant problem that the Philippine educational system
Numerous infrastructure, including classrooms, teachers, desks and consistently faces is the cost of education (or the lack thereof). There is
Affordability of Education chairs, textbooks, and audio-visual resources, are in limited supply in a significant accomplishment gap between various social classes in
The third significant problem that the Philippine educational system Philippine public schools. 2003 Department of Education data. terms of schooling. Socioeconomically disadvantaged pupils, often
consistently faces is the cost of education (or the lack thereof). There is known as students from high- and low-income households who are
a significant accomplishment gap between various social classes in According to Undersecretary Juan Miguel Luz, there are over 17 impoverished, have much higher drop-out rates at the primary school
terms of schooling. Students from low- and high-income, impoverished million students enrolled in public schools in the Philippines, and with level. Additionally, the majority of tertiary level freshman students
households who are socioeconomically disadvantaged have much a 2.3% annual population growth rate, there are roughly 1.7 million come from quite wealthy backgrounds. Last but not least, there is a
higher dropout rates in primary school. Additionally, the majority of births each year. This means that in a few years, more people will claim significant amount of mismatch, when there is a significant amount of
tertiary level freshman students come from quite wealthy backgrounds. ownership over their share of the (limited) educational resources. In mismatch between training and real occupations. This has the potential
conclusion, there are too many pupils and not enough funding. Despite to be a significant problem at the tertiary level and is also the root of
Drop-out Rate (Out-of-school youth) the government's assertions that it is expanding the budgetary support the continued high rates of educated but jobless or underemployed
The worrisome rate of out-of-school youngsters in the nation, for education, the public school system frequently struggles with persons.
according to France Castro, secretary of the Alliance of Concerned shortages. Additionally, public colleges and universities steadily raise
Teachers (ACT). According to UNESCO data, there are 1.4 million tuition in order to earn money for infrastructure, making postsecondary
youngsters who are not enrolled in school nationwide. The Philippines education difficult to attain or, more frequently than not, unavailable to
is also the only ASEAN nation to rank in the top 5 nations with the the poor. However, it is important to recognize what the Aquino
greatest proportion of young people who are not enrolled in school. administration has accomplished with regard to classroom construction
Primary school dropout rates in 2012 were 6.38% and secondary school during its five years in office – the number of classrooms created from
dropout rates were 7.82%, according to data from the Department of 2005 to the first half of 2010 has quadrupled. Additionally, it was
Education. According to Castro, "the rising cost of oil, electricity, rice, reported that 86,478 classrooms were erected between the years of
water, and other basic commodities is further driving the poor into dire 2010 and February 2015, a figure that was much higher than the 17,305
poverty and contributing to the growing number of children who are classrooms that were constructed between 2005 and 2010 and sufficient
not in school." Therefore, when more families experience poverty, to make up for the 66,800 classroom shortfall in the previous year.

You might also like