Professional Documents
Culture Documents
Purcom3 4
Purcom3 4
A model is often abstract. It is a representation of a real world phenomenon applied In 1948, Harold Dwight Laswell described communication as being focused on the
to different forms. The interplay of variables in the model is represented following:
graphically. It is only by knowing the flow of communication that you will be able to
make the communication process effective. Communication Models serve as a
guide in a communication process. It serves as a directory of communication to
identify problems. Communication models evolved through the years and experts
have made the process more detailed and updated. Each components of the
communication process has a particular function in the model of communication.
A. Aristotle’s Model The whole process of communication begins with the communicator (who) sending
out a message (what) using a medium (in which channel) for a receiver (to whom)
Aristotle emphasized three variables in the communication process; speaker, experiencing an effect (with what effect) afterwards.
speech, and audience.
Examples:
Examples:
Examples:
The source being the originator of the message acts as the encoder. As such, the
encoder should practice communication skills such as listening, speaking, reading,
and writing. The message includes: content; elements such as language used and
gestures employed; treatment of manner by which the message is transmitted; and
structure which refers to the arrangement of parts of flowof the message.
The channel refers to the different senses: seeing, hearing, smelling, tasting, and
touching. The receiver is the one who decodes the message.
Examples:
Social Media - websites and applications that enable users to create and share
content or to participate in social networking. Netizens is a term for group of people
users of social media.
1. Secure a password for yourself – do not share, add a security question features.
2. Avoid too much public posting that can cause cybercrimes against you.
Electronic Mails- commonly used term as E-mails are technology tools used to send
files such as large scale files of documents and purposeful transactions. This is used
in formal settings like Job Application, bills payments and Business Communication
purposes. Nowadays, Social medias such as Facebook and Instagram have links
encrypted in Emails for security purposes.
3. Short-term safe keep of files (will expire if account is inactive for six months).
VLOGGING
Video Blogs/ Vlogs – in the same rate is like TV hosting where you are the host of RESPONSIBLE NETIZENS (RESPONSIBLE SOCIAL MEDIA USERS)
your own video clip, these are video clips with concepts and ideas that are uploaded
in social media like YouTube, Facebook, Instagram, and others. Blogging in a Nowadays, in the 21st Century setting, social media is a part of living as a basis of
YouTube Channel – Creating a YouTube account and channel creates opportunities communication. Using Social Media Requires good moral and values likewise in
for creative people by posting blogs/vlogs. • Create a YouTube account. • Upload a dealing in real world
video and customize the settings • Control privacy settings • Manage your albums
POWERPOINT PRESENTATION- AID FOR ACADEMIC REPORTING
1. Check the overhead projectors compatibility to your laptop, check the HDMI or
manual socket if fits.
3. Use ideal font text visible to the eyes. Arial narrow is considered as standard.
4. Type only the details, use bullets. Do not copy paste the whole thing.
6. Insert audio or video only in one slide. The audio or video file should be copy
paste also along the PP file.
7. Create a cover page (sometimes, you can use it for certificates or posters).
PURPOSIVE COMMUNICATION CHRISTINE JANE FIGUEROA
8. Customize navigation and transition. 6. Interception refers to listening to, recording, monitoring or surveillance of the
content of communications, including procuring of the content of data, either
9. Upload it in social media such as slide share or just save in own inbox.
directly, through access and use of a computer system or indirectly, through the use
10. Use scanned photos for realistic reports. of electronic eavesdropping or tapping devices, at the same time that the
communication is occurring.
11. Use citation: name of author, book name, websites, publishers and year.
7. Cyber security refers to the collection of tools, policies, risk management
12. One idea per slide. approaches, actions, training, best practices, assurance and technologies that can
be used to protect the cyber environment and organization and user’s assets.
13. Use contrast – dark background if lighted rooms and light background for darker
8. Illegal Access. – The access to the whole or any part of a computer system
rooms.
without right.
14. One design for the whole presentation (formal or informal).
9. Cyber-squatting. – The acquisition of a domain name over the internet in bad
15. Do not do over animations. Stick to two or three. faith to profit, mislead, destroy reputation, and deprive others from registering the
same.
CYBER CRIME LAW [REPUBLIC ACT NO. 10175] Enacted on September 12, 2012
10. Computer-related Forgery.
An act defining cybercrime, providing for the prevention, investigation, suppression
11. Misuse of Devices.
and the imposition of penalties therefor and for other purposes.
12. Computer-related Fraud.
FACTS ABOUT CYBER CRIME LAW OF THE PHILIPPINES
13. Computer-related Identity Theft.
1. Act known as the ―Cybercrime Prevention Act of 2012‖.
14. Cybersex.
2. Providing an environment conducive to the development, acceleration, and
15. Child Pornography.
rational application and exploitation of information and communications
technology (ICT). 16. Any person found guilty of any of the punishable acts enumerated in Sections
4(a) and 4(b) of this Act shall be punished with imprisonment of prison mayor or a
3. To attain free, easy, and intelligible access to exchange and/or delivery of fine of at least Two hundred thousand pesos (PhP200, 000.00) up to a maximum
information. amount commensurate to the damage incurred or both.
4. The need to protect and safeguard the integrity of computer, computer and 17. Real-Time Collection of Traffic Data. — Law enforcement authorities, with due
communications systems, networks, and databases, and the confidentiality, cause, shall be authorized to collect or record by technical or electronic means
integrity, and availability of information and data stored therein, from all forms of traffic data in real-time associated with specified communications transmitted by
misuse, abuse, and illegal access by making punishable under the law such conduct means of a computer system.
or conducts.