Professional Documents
Culture Documents
2) Describe and discuss the different ways by which society and culture shape the
self?
Understanding the Self is'nt just easy as it requires a lot of effort and
experiences.
However, it is essential to understand self because it can helps us grow as person.
Growing as a person will results to us of being better individual. A better
individual
can easy to adjust each emotions and know how to adapt with other people's
behavior.
Also, understanding the self provide us a strength of knowing more of who really we
are.
Knowing who really we are, can help us to identify the characteristics or behavior
we have in our selves,
it can be changeble or not and it teaches to love our self. Lastly, understanding
the self can helps us know what environment is good for us
or what things in this world is good for us as a person.This will likely results
into success,satisfaction and fulfilment in life.
2) Describe and discuss the different ways by which society and culture shape the
self?
The understanding of our self is started when we were young, this has been taught
by our parents.
We've been living on their society and we adopted the culture they have because of
teachings. The culture and the society we've been or what we have now tells of who
we are as it shape our self and it makes us different from any other.Like, the way
we socialize or deal with people, the way we speak, act or behave, the way we learn
things and making decision.
Basically, we are putting our self to them based of what culture we've learned, and
what society we are in. When we are enjoying others company we are socializing them
and our self can have thoughts, feelings, and actions based on our own culture and
society we've been in.
The way we speak, act ot behave is something that can't be denied that its based of
the culture and the society we have been. We adopted thinkings in this present time
from when we were young. It can't easily be changed of everyone self. Like, of
speaking in our own language, this a simple factor but it shape our self as this
has we've had on our culture and the society.
Lastly, the way we learn things. Every time when we learn things on our self there
is an influence of society and the culture. Simply, it can't be avoided that our
self affects by society and the culture when we were thinking. The way when we are
making a decision, it's always have an estimation, if this can be good on us or
not. Well, the decision we've made is our choice on our self and this is because of
the culture and society, the way it shaping our self.
The earliest idea of psychology about self is that defining it in two aspects,
which are "I" and "Me".
The "I" and "Me", this really subject to self but when it comes in pscychology it
has big differences. "I" is that how
we think, act and feel while "Me" is our capabilities that making us. By
understanding these two aspects, it can
helps as of defining easily our identity or who really we are. When you are in a
situation of doing a toughest decision,
the aspect of "I" is something that you can use while choosing "me" is capabilities
that you have in order to succeed on that situation.
The given idea above has similiraties of another psychological idea that self are
not fixed in one time frame together with identity, and self-concept.
It means that it has a different rule. 'Self' is the sense of 'who we are and what
we are'. The 'identity' is how we perceived by the others and the 'self-concept'
is our own perception about our self. These looks so very hard to understand but
learning this idea we can surely know on which we can really adapt our self.
The next idea is the concept of the Self-schema, as the collection of knowledge
about who we are. This idea in psychology about the self is something helpful
and meaningful. You will be having a scheme which what you have on your self. This
is somewhat can give you a knowledge of what forms your self and can
be a good factor to consider when understanding the self.
Last idea is taht giving a self of self-awareness and self-esteem. The self-
awareness and self-esteem is something that we needed to develop on our self.
By having a self-awareness and self-esteem will define you as your "true self". The
self-awareness is obviously the factor of being aware on our self by knowing our
own self,
what is our strengths or weaknesses, and how we act or behave. The self-esteem is
seeing the value or worth on our self. These two must be trained on our self but it
can't be too
much, so we can't exceed of the limitation of knowing our self.
is knowing yourself, your strengths and weaknesses, and what makes you act the way
you do
is the ability to make accurate statements about one's skills, feelings, and events
in one's life.
'identity' is used to refer to one's social 'face' – how one perceives how one is
perceived by others.
...............................................
next idea is
idea
Language
Going Abroad
I am who am I
Self, identity, and self-concept are not fixed in one time frame.
Theory of symbolic interactionism argued that self is created and developed through
human interaction.
Self and Identity are social products because of the three readin.. We do not
create ourselves out of nothing.
Whether we like it to admit or not, we actually need others to affirm and reinforce
who we think we are
What we think is important to us may also have been influenced by what is important
in our social or historical context.
Social Interaction and group affiliation, therefore, are vital factors in creating
our self-concept especially in the aspect of providing us with our social identity
or our perception of who we are based on our membership to certain groups.
*Private Self
*Public Self
People with high steem commonly describes as outgoing, adventurous and adaptable in
a lot of situations.
The study of the self in pschylogy ought that there is something makes of who we
are. It means that there's not something on ourselves of what is our real identity.
Socialization helps to shape and define our thoughts, feelings, and actions, and it
provides us with a model for our behavior.
Socialization teaches us the cultural values and norms that provide the guidelines
for our everyday life.
can be good or bad dealing with them depending upon the situation and most probably
in the culture and society we're living.
young, we've
Understanding the Self is'nt just easy as it requires a lot of effort and
experiences.
However, it is essential to understand self because it can helps us grow as person.
Growing as a person will results to us of being better individual. A better
individual
can easy to adjust each emotions and know how to adapt with other people's
behavior.
Also, understanding the self provide us a strength of knowing more of who really we
are.
Knowing who really we are, can help us to identify the characteristics or behavior
we have in our selves,
it can be changeble or not. Lastly, understanding the self can helps us know what
environment is good for us
or what things in this world is good for us as a person.This will likely results
into success,satisfaction and fulfilment in life.
2) Describe and discuss the different ways by which society and culture shape the
self?
Our culture shapes the way we work and play, and it makes a difference in how we
view ourselves and others. It affects our values—what we consider right and wrong.
This is how the society we live in influences our choices. But our choices can also
influence others and ultimately help shape our society.
Culture helps define how individuals see themselves and how they relate to others.
Remember that individuals differ in many ways: language diversity, cultural
diversity, gender diversity, religious diversity, and economic diversity (Selmi,
Gallagher, & Mora-Flores, 2015). All of these aspects of diversity work together to
form your sense of self.
For example, some cultures prefer children to be quiet and respectful when around
adults.
This does not indicate that a quiet child lacks self-confidence. It is important to
remember that not all families reinforce the mainstream American cultural values of
individualism, competition, and assertiveness.
Young children learn and absorb the stories told to them that often emphasize a
family’s values and affect a child’s self-concept.
As children grow older and attend school and spend leisure time with their peers,
they learn that others may not have the same values as their family. For instance,
a family may value academics over playing sports while another family may value the
arts and learning to play a musical instrument. Each family influences a child’s
self-concept within their cultural context. Young children may describe themselves
based upon their family’s values (for example, a young child from a culture that
stresses fitting in with others as a strong value may describe herself as “kind”
while another child from a culture that stresses individualism may describe herself
as “a good runner”). As a preschool teacher, you assume the important task of
nurturing young children’s sense of self, and you must carefully observe and listen
to each child.
We begin to learn our culture—the ways of our society—just after birth. That
process is called socialization, and it involves far more than schooling. Our
culture shapes the way we work and play, and it makes a difference in how we view
ourselves and others. It affects our values—what we consider right and wrong. This
is how the society we live in influences our choices. But our choices can also
influence others and ultimately help shape our society.
Imagine that you encounter a stranger walking down the street. How might you
describe the person? What labels would you use? We know that every person is
different from any other in countless ways, yet when we encounter others we often
rely on generalizations to describe them. “It's a natural tendency,” says
psychologist Deborah Tannen. “We must see the world in patterns in order to make
sense of it; we wouldn’t be able to deal with the daily onslaught of people and
objects if we couldn’t predict a lot about them and feel that we know who and what
they are."
Our society—through its particular culture, customs, institutions, and more—
provides us with the labels we use to categorize the people we encounter. These
labels are based on beliefs about race, ethnicity, religion, gender, sexual
orientation, economic class, and more. Sometimes our beliefs about these categories
are so strong that they prevent us from seeing the unique identities of others.
Sometimes these beliefs also make us feel suspicion, fear, or hatred toward some
members of our society. Other times, especially when we are able to get to know a
person, we are able to see past labels and, perhaps, find common ground.
The stories in this chapter explore some of the dilemmas people face as they
establish themselves both as individuals and as members of a group, and as they
define themselves and are defined by others. As the first step in the Facing
History and Ourselves journey, this chapter introduces ideas about human behavior
and decision making that will serve as a foundation for examining the historical
case study in the chapters that follow. Teachers are encouraged to select the
readings that match their objectives and the interests and needs of their students.
Describe and discuss the different ways by which society and culture shape the
self?
Different Ways
Socialization
Culture is the teacher of parents. Every generation needs to teach the next how to
use their bodies.
One frame is to think about the time in English speaking countries before germs
were discovered. After germs were discovered we learned all new information about
what a body is and how to use it.
The thing that makes us human is the capacity to learn more in one generation than
is lost in the next. As we learn more about bodies and minds we learn more about
ourselves.
For us in modern culture, our concept of self evolves along with the evolving
understanding of the body and mind.
An identity is in the set of psychological needs along with hygiene that we learn
at the same time one word at a time.
We can’t separate what we know about the world from what we think about ourselves.
As we learn more about the world, we think of ourselves differently and vice-versa.
Parents are the first who shape your identity. When you’re a child, you look at
them and try to copy them - their speech, movements, way of life. Usually that
stays with you for life.
Later, you meet more people, friends. You participate in various social groups. If
they mean something to you, and you want to be a part of them - you'll try to fit
in. Humans unconsciously want to fit into the society they live in.
Finally, the human brain is very flexible - we can learn things during the whole
our life. And you can always choose another society if you want.
sucessful
in life
helps us
Language, for example, is a major aspect of our identity and language, both what
and how we speak, is determined from birth by environment and social culture. It is
further influenced by education.
If you are born in Shanghai to middle class Buddhist Chinese parents, that is who
you will become, albeit with adaptations based on your unique experience of life.
If you are born in Louisiana to white working class Christian American parents,
that is who you will become, albeit with adaptations based on your unique
experience of life.
This is why each of the 75. billion people alive today is unique but the same.
It’s important to know what you want from your career, what gives you fulfilment
and the type of environments or work cultures you will thrive in.
It’s important to know what you want from your career, what gives you fulfilment
and the
Describe and discuss the different ways by which society and culture shape the
self?
The different ways by which society and culture shape the self are the way we
socialize or deal in other people,
The understanding of our self is started when we were young, is has been taught by
our parents.
We've been living on their society and we adopted the culture they have. Like, the
way of socializing or dealing people,
the way we act or behave, the way we speak and the way we learn things.
In the way
hosi=pita
The root of all change starts with self-understanding. If you don’t understand
yourself, your efforts will be lost, and spent on things that are actually not
under you control.
2) Describe and discuss the different ways by which society and culture shape the
self?
When I was child I'm not worrying of what is happening on my sorroundings, I've
just wanted to be happy all day.
I don't care of what's happening on my self, as a child I just need to behave. When
I turned into a maturity stage
it takes a big changes to me, I'm now aware of what's happening on my self. I need
to think and act maturity which dictates my characteristics of my self.
Changes in environment is one of the possible reasons for the differences in me. It
influence
me to adjust on myself especially of the technological environment. A lot of
technological
devices affects my characteristics, it acn be bad or good.
The peer and family relationship is also one of the possible reasons for the
differences in me.
It brings to me a lot of changes, as I need to adopt the learnings from them. I
have a good
peer and family relationships that brings a positive changes on my self.
Plato
Augustine
This my picture when I was in Elementary. The salient characteristics that I've
remember when I was in that age is that I am not good of socialization as I am shy.
Anyone can easily figured out that shyness
characteristics on that photo as it show on that face .It's hard for me to get
feeling close on someone else even for some of my cousins. I've almost the
opportunity of learning and exploring myself that time as I don't
want to expose myself in front of people. However, I was that being a responsible
child, I used to obey my parents and my teachers. There is a time that when there
is no choice
I accept of selling banana cue inside school campus, even though I'm shy and not
sociable one, just to get a little additional allowance on school.
My behavior on this days is quite good as I am that child that always putting on
mind the learnings that my parents taught me like being courteous, industrious, and
even not
to rely on others. Last, salient characteristics that I have on that age was I'm
being faithful, as this was the day that knowing more of God. I've learned to be
faithful not just of
others self but especially to God.
This my present picture, I'm now in College. The salient characteristics that I
have now are no shyness at all, independent, matured individual,career-
consciousness,
risk-taking and quite emotional. This is an adulting stage, I'm now no shyness at
all, I need to boost my self-confident for not losing or wasting any opportunities
came on my life.
I'm now an independent man, I should not to rely other people, I need to be
independent and I believe this is making me feel ready of the future situations.
I'm also that career-consciousness
as I'm always thinking what would I be in future, Is my dreams in life will be
fulfilled? I'm always asking that question but I know to answer that I should be
more hardworking. I'm risk taker,
I need to show of my full capacity and whatever the consequences should be
accepted. Last, I'm that quite emotional, I know it's normal as I'm now an adult,
there's time coming that I feel tired
of doing anything but it's suddenly change when I feel energized. However, I God
that has a plan of my life, what ever it takes, I need to find my purpose.
Give a particular situation that other’s research helps you to solve your
problem. In what way, the other person’s research help you?
A particular situation that I have is I want to make a research about the inventive
toothbrush. This is for a child to enjoy brushing their teeth. I want that the
output of my research should be a smart brush which sends a notification to parents
when brushes his/her tooth. I have a friend who's research that he had done is also
about a smart brush. The output of his research, is brush plays a pleasant music,
when child is brushing. It also gives some instructions for a good brushing
behaviour. This is a nice spot for me as my research is can be considered as the
improvement of such existing project. My friend research can be my best references
as help me in way that I will be looking for the provided literature, theory and
studies on his existing project and put it on my own research. I will be also
looking into the results of my friends' research and know how such effective that
inventive toothbrush for children. In the way, I can say that it helps me to
improve my own research about a inventive toothbrush. At last, the only thing
should I do is to take credit for my friends' research and for any other author
who's involved to the literature and studies.
How can you give value or importance to the research works of other?
I can give value or importance to the research works of other by first not
plagiarizing their research. This is a big fail to my own research as when
plagiarizing the research works of other. They give their full effort to finish
their own research as doing it takes time. I should have an accurate quotation,
mention or acknowledge someone else's words or ideas without an internal citation.
Simply as, I should put my intention not to represent it as my own work, I should
give them credit as they are original source of work. I should also handle it with
care and not to give their works to anyone else without their permission.
Directions: Make a poem or a paragraph about what is a research and its purpose.
You can give your own title. Write it in the box.
STUDIES. I am sent to school to mingle with others aside from my family. In there I
meet my second parents in the form of teachers.
They taught me more things than what I have already learned. I also met my
classmates who became my friends and they
taught me the value of friendship and sharing.
MISTAKES. From mistakes, I learned. Not only that I learned the correct answer of
life’s
challenges but I also learn to become patient and accept that we do not always win
in life and get what we want and expect
When I see myself into an adult stage, I've considered it as the transformation of
myself.
I'm now a mature individual and being opened in a lot of things in life. I'm also
believing that getting opened for every things in life make myself more improving.
As matured individual, I've improved the aspects of social, mental, physical and
spiritual. I'm also always
looking into the mistakes in every decision I've made. When I've made a mistake I
don't even try to understimate myself because I know I can do better.
When there is an unexpected events in life, it is either good or bad, I put there
the lessons that I've learned from my mistakes.
There is so many ways thay my self is related to other selves, it can be of the
we're in same family,situation,decision,culture,beliefs,experience and etc.
For example of same beliefs, I can easily that my self related to other selves when
we have the same beliefs in life. The same beliefs in a religion is one,
it shows me that I've seen my self to them. We can have the same feelings or
reaction towards what we are believing for. The next one is also when
others have a situation to me, I can relate my self to them as we are dealing with
the situation. This is an ease for us to achieve that situation as
we can have a same decision. I think also that having the same decision is one
factor that engage my self is related to other selves.
By having same decision give me a warm and good connection to them.
As when my body died, it will be nothing. It will become a spirit, does how my self
will become too. What will happen to my self after I die, it will be lost, gone or
disappear.
There's nothing to hold on as my self is only capable with my body. Simply, saying
that my self only rely on my body as when I die, it can't be able to function
anymore and it
maybe go with my dead body. I can't consider my dead self to be worked on others
body as others have their own self too. Nevertheless, I believe that God can
resurrect my dead self and give it a new life.
Easy
The question is quite logical too but trying to understand it, it is just the
understanding of my self and my body.
It doesn't need to be mindful, what I've did is just to be literal of the
question. I catch first the question,
what is my self and next is knowing what is my body! Focusing both of the splitted
question give me an idea
of how is my self connected to my body. Knowing also how my self act and how my
body move gives
me a better idea to connect them easily.
Easy
I have answer the question, how is my self related to other selves, just as easy. I
think of ways when and how my self get a connection to others selves. Basically, I
noted some factors that
how my self can easily build a connection to others selves. I considered that
factor as how is my self related to other selves. The question also tells me about
how I know my self when others selves are involved.
This lead into self-realization that my self has a lot of relation to other selves.
Difficult
To be honest, I consider the question as a literal one but still I'm thinking of
why did this kind of question is given to understand my self. It is perfect to
consider that our self and body are connected but
the question given above gives me a confusion that they are both different in
others perspective. Like that, what will happen to my self after I die. Is'nt it
quite to consider that it will lost, gone or disappear?.
And since and its talking "after we die", then I can't really know what will happen
to my self after that event. Is it really difficult to pointed out and I've just
considered it "nothing".
We live it, but don’t explicitly think about and calculate what we are doing.
I consider myself body, mind, and developing person. For example, I know the sun
will not rise tomorrow, because the earth’s rotation on its axis hides the sun each
evening.
The video I've watched is something meaningful as it clearly promotes the safety
and health in the workplace. It's so good at all as this was the recommendation of
the
Department of Labor Employment(DOLE). The video start of saying "Safety is Right"
and it a simple phrase for an employer. It's a literal phrase for me but needed of
clearly understanding. The following video show what is that saying mean and it's
start of defining what is some accident that you can encounter in a workplace.
First one
is when an employer is slip and fall, this is most happened type of accident in a
workplace. Watch your step because it is so really hurt when once happened to you.
Second one is
the electrocution, do you ever imagine yourself getting to be electrocuted in the
middle of your work?. I wish is not too bad when once happened and quick to admit
you on hospital.
No one wants that to be happened or it's maybe you're just feeling unlucky that
day. The worse it can affect your performance in the company and the progress of
your company itself.
However, the video gives an idea of how to avoid an accident. It requires a
participation of everyone on the company from the highest to lowest position.
They've finished their job
given to them with safety and at ease. Like, putting a warning sign of "Caution!
Wet Floor" in the designated area when floor is wet, is the key to avoid slip and
fall. Everything is safe
when everyone is participating and know what is doing.
I once thinking, How such Jeff Bezos, the Amazon CEO, just once became the richest
man in the world during this pandemic times?
It was something unbelievable and it so really aspiring. I personally believe they
work so hard and it is because of so called Technopreneurship.
We can be successful on our businesses with the help of technology. The two videos
gives an idea what is the difference between the Entrepreneurship
versus Technopreneurship. It also describe why Technopreneurship is a best choice
with a ten home business idea, really fit during this pandemic times.
In my high school days, I only learned about the Entrepreneurship and I haven't
familiar about Technopreneurship. The video helps me to understand the difference
about them, how it be?.
Entrepreneurship describe as the process of designing, launching and running a new
business, which is often initially a small business, or as the "capacity and
willingness to develop, organize and manage a
business venture along with any of its risks to make a profit". It sounds like when
you are starting a business of restaurant, you want to be it succesfull. You will
be so called as entrepreneur, as you are a
risk taker, you need to put a risks to gain profit and have a willingness to learn,
develop and manage your business. It maybe you will be the one of the succesfull
entrepreneur like J.K Rowling, Jack Ma and Henry Sy
but well there is no bad of dreaming. How about the meaning of Technopreneurship?,
it describe as the process of turning "something" into a resource of high value by
converting good ideas into business ventures that
relies heavily on the application of human knowledge and technology for practical
purposes. It basically means that when you start a business of restaurant, you want
to applied a technology. So, you decide to do online
instruction to attract a lot of audience on your business. You will be so called
now as technopreneur, as you are applying now your business knowledge through the
help of technology. It maybe once you get sucessful
doing an online transaction, you will be one of the famous technopreneur like Steve
Jobs, Bill Gates and Mark Zuckerberg. What other example of technopreneurship is
the Gaming hardware company like Razer, known
for gaming laptop and peripherals.Yes, you can do on your restaurant the
combination of Entrepreneurship and Technopreneurship, this like a company of
famous online selling business, the lazada and shopee. When you want to have
another source of income, technopreneurship is really the best choose for you as it
also helps you to think of home business idea like Outsource, when you are
good in computer, graphic design, web design and etc. Second, the Online Affiliate
Program when you want to work on affiliate marketer. Third, Freelance Writing, when
you want to write online like doing blog,e-books, social media news and etc.
Fourth, Service to Home-based business, which an online community for home-based
business persons.Fifth, image consultancy, helping others to decide for clothing,
hair and make-up. Sixth, Social Media Specialist, a helping others to be their
social media specialist. Seventh, Life Coaches, be a coacher through online and
helps others to solve their life problem. Eight, a reviewers, your job is to
review a restaurant, store, hotel or anything to be reviewed. Ninth, Art Dealers,
to be a local arts or craft vendor for clients abroad. Last,Tutoring, helping
others to improve and learn new things. You can choose what you want but this won't
be all possible without your self-enthusiasm and willingness to learn.
This my picture when I was in Elementary. The salient characteristics that I've
remember when I was in that age is that I am not good of socialization as I am shy.
Anyone can easily figured out that shyness
characteristics on that photo as it show on that face .It's hard for me to get
feeling close on someone else even for some of my cousins. I've almost the
opportunity of learning and exploring myself that time as I don't
want to expose myself in front of people. However, I was that being a responsible
child, I used to obey my parents and my teachers. There is a time that when there
is no choice
I accept of selling banana cue inside school campus, even though I'm shy and not
sociable one, just to get a little additional allowance on school.
My behavior on this days is quite good as I am that child that always putting on
mind the learnings that my parents me taught like being courteous, industrious, and
even not
to rely on others. Last, salient characteristics that I have on that age was I'm
being faithful, as this was the day that knowing more of God. I've learned to be
faithful not just of
others self but especially to God.
This my picture when I was in High School. This was the time, that I feel some
changes on myself. When I turned into highschool I put that in my mind
that it was the start of not calling me a child anymore. This was the adolescent
time, the start of knowing more what is right and what is wrong. The salient
characteristics
that I've remember when I was in that age is that I am working hard to know
something especially on my study!
Quarrelsome
Self-confident
Resourcefulness
Mood Swings
Appearance-Consciousness
Career-Consciousness
Hobbies
Impact of the Peer-Group is the Strongest:
Socialization
Need for Independence
Self-Focused Behavior
Changes
Family Relationships
Busy Schedules
The young teen needs to argue, disagree and oppose others, especially parents,
teachers and other authority figures.
This my picture when I was in Elementary. The salient characteristics that I've
remember when I was in that age is that I am not good of socialization as I am shy.
Anyone can easily figured out that shyness
characteristics on that photo as it show on that face .It's hard for me to get
feeling close on someone else even for some of my cousins. I've almost the
opportunity of learning and exploring myself that time as I don't
want to expose myself in front of people. However, I was that being a responsible
child, I used to obey my parents and my teachers. There is a time that when there
is no choice
I accept of selling banana cue inside school campus, even though I'm shy and not
sociable one, just to get a little additional allowance on school.
My behavior on this days is quite good as I am that child that always putting on
mind the learnings that my parents me taught like being courteous, industrious, and
even not
to rely on others. Last, salient characteristics that I have on that age was I'm
being faithful, as this was the day that knowing more of God. I've learned to be
faithful not just of
others self but especially to God.
This my picture when I was in High School. This was the time, that I feel some
changes on myself. When I turned into highschool I put that in my ramind
that it was the start of not calling me a child anymore. This was the adolescent
time, the start of knowing more what is right and what is wrong. The salient
characteristics
that I've remember when I was in that age is that I am working hard to know
something especially on my study! What in my mind that time is that to focus on
study even it is so hard. At the same time, I was that
focus on finding peers, looking of people that can I share my vibes with and can
understand when I am sad. During that time, I also have that salient
characteristics of resourcefulness, is that when I have this things I need to keep
it as I always put it my mind that maybe I can use it in the future. I am also that
always has a mood swings, there is a time that I'm happy but later on I will be sad
and feel like things is just temporary. However, despite of being shy, I'm still
have a self-confident to try other things as I love to explore. My family
relationships that time is just enough, there's a time that I'm quite rebellious.
As I became sad when my parents refuses things I want in my life because I always
have pride of doing things without their guide. I admit that wrong behavior, I
don't realize that they just thinking what's best to me and I should keep my prides
off.
Energetic
Adventurous
Matured Individual
Looking for Peers
Self-centered Attitudes
Need for Independence
Self-centered Attitudes
Working Hard
Faitful to God
This my present picture, I'm now in College. The salient characteristics that I
have now are no shyness at all, independent, matured individual,career-
consciousness,
risk-taking and quite emotional. This is an adulting stage, I'm now no shyness at
all, I need to boost my self-confident for not losing or wasting any opportunities
came on my life.
I'm now an independent man, I should not to rely other people, I need to be
independent and I believe this is making me feel ready of the future situations.
I'm also that career-consciousness
as I'm always thinking what would I be in future, Is my dreams in life will be
fulfilled? I'm always asking that question but I know to answer that I should be
more hardworking. I'm risk taker,
I need to show of my full capacity and whatever the consequences should be
accepted. Last, I'm that quite emotional, I know it's normal as I'm now an adult,
there's time coming that I feel tired
of doing anything but it's suddenly change when I feel energized. However, I God
that has a plan of my life, what ever it takes, I need to find my purpose.
Fully Matured
Independent
Self-Confident
Risk Taker
Career-Conciousness
Apperance-Conciousness
Adventurous
Emotional
Faitful to God
Qualitative research is a type of research which the gathered information has done
through interview,
Instruction: Explain the following. Write your answer in any word application
available in your tablet.
1. What is Microcontroller? Give the different classification of microcontroller.
Most electronic devices you use today have a microcontroller in them of some form
or another. A microcontroller is an integrated circuit (IC) that can be programmed
to perform a set of functions to
control that collection of electronic devices. It is easy to use with simple
sensors and output devices, they can communicate with desktop computers fairly
simply as well. What makes the microcontroller
unique is that being programmable.By just a single chip, it can integrate all the
components of a computer system. All components are optimized to perform the
functions necessary to control a larger system.
The different classification of microcontroller are depends upon its type:
According to the number of bits,an 8-bit microcontroller, 16-bit microcontroller
and 32-bit microcontroller. An 8 bit microcontrollers
have the majority of the market right now, but 16 and 32 bit microcontrollers are
available and gaining market share.Next, According to memory devices, the embedded
memory microcontroller, it has all
the functional blocks available on a chip like 8051 MCU and external memory
microcontroller, that has not all the functional blocks available on a chip like
8031 MCU. Last, According to instruction set,
a CISC or a Complex Instruction Set Computer, it allows the programmer to use one
instruction in place of many simpler instructions and the RISC stands for Reduced
Instruction set Computer,which allows
each instruction to operate on any register or use any addressing mode and
simultaneous access of program and data.
The MCU vs. MPU question may seem simple, but there are some prominent differences.
Microcontrollers (MCUs) tend to be less expensive than, simpler to set-up, and
simpler to operate than microprocessors (MPUs).
An MCU can be viewed as a single-chip computer, whereas an MPU has surrounding
chips that support various functions like memory, interfaces, and I/O.
One of the main differences between microcontrollers and microprocessors is that a
microprocessor will typically run an operating system while MCUs only have basic
options for interfacing with the outside world.
The purpose of an MCU is to run a fairly simple control loop forever or until it
breaks or otherwise stops. MCUs tend to be less expensive than MPUs.
• CPU
CPU- It used to carry and decode the data. It finally completes the allocated task
effectively. By using a central processing unit, instruction set is typically
modified to deal with new I/O.
It also may be an adaptation of an existing microprocessor or a completely new
architecture.
I/O Ports/System -It was tailored to provide services usually required in embedded
control applications. Basically, these ports are used to interface otherwise drive
different appliances like
binary I/O pins (buffered, built-in pull ups, etc.), which are pins that can either
write (output) a ‘1’ (Vdd) or ‘0’ (Gnd) value, or read (input) a ‘1’ or ‘0’ value.
A timers/counters, are special registers
within the microcontroller that are configured as binary counters. Pulse Width
Modulation (PWM) outputs, are special purpose outputs that can generate a specified
train of pulses. Capture inputs, are
used to count external events.AD and DA converters, an internal Analog-to-Digital
converter (some with multiple channels). Lastly, UART or other communication
controllers.
4. What are the other components of MCU. Give the other components of MCU.
Reset Options-A system reset sets all the register values to zero and it allows the
controller to recover from the crash. It releases the program and sets the
controller to start over again.
Stack pointer- It keeps track of the last stack location used while the processor
is busy manipulating data values, checking ports, or checking interrupts.
Basically, the area in memory that is used to store data and program information is
called the stack. The most common use of the stack is to store the program address
of the next instruction to be executed.
Since the processor processes command sequentially, one after the other until
complete, it relies on the stack to temporarily store the address of the next
instruction in case the main program is interrupted.
A special device called the stack pointer keeps track of the last stack location
used while the processor is busy manipulating data values, checking ports, or
checking interrupts.
External interrupts-It can accept inputs from I/O ports, interrupts are used for
accepting inputs generated by external events. Interrupt event directs the flow of
program execution with a totally independent piece of code.
The MCU Connections does this by interpreting data it receives from its I/O
peripherals using its central processor. The temporary information that the
microcontroller receives is stored in its data memory, where the processor accesses
it and uses instructions stored in its program memory to decipher and apply the
incoming data. It then uses its I/O peripherals to communicate and enact the
appropriate action.
The microcontroller chip is a high-speed device, but as compared with a computer it
is slow. Thus each instruction will be executed within the microcontroller at a
quick speed.
Once the supply is turned ON, then the quartz oscillator will be activated through
the control logic register. For a few seconds, as the early preparation is in
development, then
parasite capacitors will be charged.Once the voltage level achieves its highest
value & oscillator’s frequency turns into the stable process of writing bits over
special function registers.
Everything happens based on the CLK of the oscillator & overall electronics will
start working. All this takes extremely few nanoseconds.The main function of a
microcontroller is, it
can be considered like self-contained systems using a processor memory. Its
peripherals can be utilized like an 8051 Microcontroller. When the microcontrollers
majority in use at
\present are embedded within other kinds of machinery like telephones appliances,
automobiles & computer systems peripherals.
Followings are the main point to consider before choosing a microcontroller for
projects. To choose microcontroller one should consider following points :
You should make a list of hardware’s, you need to connect with microcontroller. How
much external peripherals you want to connect with microcontroller. For example how
many digital and analog sensors you are using in your project? How many output
devices you are using like speakers, relays, Liquid crystal display and LED’s etc.
It will give you idea of input and output ports you required for microcontroller.
For example you need 5 sensor and 5 LED’s in your project, its mean you will need 5
input ports with analog to digital converter. Because sensors usually give analog
output. For 5 LED’s you will need 5 output ports. So total you will need 10
input/output . Similarly you can decide how many ports you need of microcontroller
for your required project.
If you want to transfer data from microcontroller to another microcontroller or any
other device, you must need communication ports. you can either use serial
communication or parallel communication. you can use either TX/RX based serial
communication. USB port can also be used for parallel communication.
Similarly you may need of PWM ports, UART, SPI and USB ports. It depends on your
requirement.
you should check what is the highest speed microcontroller can support. How much
fast you want to perform tasks in your project. So you should consider processing
speed of microcontroller by checking highest operating frequency of
microcontroller.
What is the packaging of microcontroller? Either it is in DIP package or QFP
package? Which one you prefer?
What should be the minimum and maximum power consumption of microcontroller?
Size of RAM and ROM in microcontroller. what would be the size of program you are
going to burn in microcontroller? Because program stores in ROM.
How many timers and counters required for project.
How many number of general purpose input/output ports are required.
What is cost per unit of microcontroller. This is most important factor while
designing real life products using microcontroller.
How easily resources are available for selected microcontroller
How easily microcontroller will be available in large quantity in future. If you
are going to design a real life product using microcontroller, you must need it in
large quantity. Unavailability in large quantity make your efforts useless.
So these are the most important step to choose microcontroller for industrial and
students projects. If you think you know about more point to consider before
choosing microcontroller, share with us in comments.
. MICROCONTROLLERS
2. A microcontroller is an integrated circuit (IC) that can be programmed to
perform a set of functions to control a collection of electronic devices. A self-
contained system in which a processor, support, memory, and input/output (I/O) are
all contained in a single package. Being programmable is what makes the
microcontroller unique.
3. From left to right: PIC 12F508, PIC 16F84A, PIC 16C72, Motorola 68HC05B16, PIC
16F877, Motorola 68000
4. 1 – ACCORDING TO BITS 4-BIT MICROCONTROLLERS ALU performs arithmetic and
logical operations on a nibble (4-bits) at an instruction. Internal bus width of
4-bit. Small size, minimum pin count and low cost controllers. Low power
consumption and used for low end applications like LED & LCD display drivers,
portable battery chargers. Examples: Renasa M34501 256 and ATAM862 series from
ATMEL.
5. 8-BIT MICROCONTROLLER ALU performs arithmetic and logical operations on a byte
(8-bits) at an instruction. Internal bus width of 8-bit. Examples: Intel 8051
family and Motorola MC68HC11 family.
6. 16-BIT MICROCONTROLLER ALU performs arithmetic and logical operations on a
word (16-bits) at an instruction. Internal bus width of 16-bit microcontroller is
of 16-bit. Enhanced performance, computing capability and greater precision as
compared to the 8-bit microcontrollers. Examples: Intel 8096 family, Motorola
MC68HC12 and MC68332 families.
7. 32-BIT MICROCONTROLLER ALU performs arithmetic and logical operations on a
double word (32-bits) at an instruction. Internal bus width of 32-bit. Much
more enhanced performance, computing capability with greater precision as compared
to 16-bit microcontrollers. Examples: Intel 80960 family, Motorola M683xx and
Intel/Atmel 251 family.
8. 2 - ACCORDING TO MEMORY/DEVICES EMBEDDED MICROCONTROLLERS An embedded system
has a microcontroller unit that has all the functional blocks (including program as
well as data memory) available on a the same chip. Example: 8051 having Program &
Data Memory, I/O Ports, Serial Communication, Counters and Timers and Interrupt
Control logic on the chip.
9. EXTERNAL MEMORY MICROCONTROLLERS An external system has a microcontroller unit
that does not have all the functional blocks available on a chip. All or part of
the memory units are externally interfaced using an interfacing circuit called the
glue circuit. Example: 8031 has no program memory on the chip.
10. 3 - ACCODING TO INSTRUCTION SET CISC (COMPLEX INSTRUCTION SET COMPUTER)
ARCHITECTURE MICROCONTROLLERS Has an instruction set that supports many
addressing modes for the arithmetic and logical instructions, data transfer and
memory accesses instructions. Many of the instructions are macro like. Allows
the programmer to use one instruction in place of many simpler instructions.
Example: Intel 8096 family.
11. RISC (REDUCED INSTRUCTION SET COMPUTER) ARCHITECTURE MICROCONTROLLERS
Contains an instruction set that supports fewer addressing modes for the arithmetic
and logical instructions and for data transfer instructions. Allows simultaneous
access of program and data. Instruction pipelining increases execution speed
Allow each instruction to operate on any register or use any addressing mode.
Smaller chip and pin count. Very low power consumption.
12. 4 - ACCORDING TO MEMORY ARCHITECTURE The architectures of microcontrollers
differ in the way data and programs are stored and accessed. 1. VON-NEUMAN
/PRINCETON ARCHITECTURE Single data bus that is used to fetch both instructions
and data. Program instructions and data are stored in a common main memory. When
such a controller addresses main memory, it first fetches an instruction, and then
it fetches the data to support the instruction.
13. Simplifies the microcontroller design because only one memory is accessed.
The weakness is that two separate fetches can slow up the controller’s operation.
Example: Motorola 68HC11.
14. 2. HARVARD ARCHITECTURE Separate data bus and an instruction bus. Execution
occur in parallel. Much faster execution than Von-Neuman architecture. Design
complexity. Example: intel MCS-51 family and PIC microcontrollers.
15. Central Processing Unit (CPU) The central processing unit processes the
program. It executes the instructions stored in the program memory pointed to by
the program counter in synchronization with the clock signal. ALU The
arithmetic/logic unit (ALU) performs mathematical and logical operations on data.
Oscillator A complex digital device that generates steady pulse rate required for
timing. All of the separate functions are controlled by one central timing system.
The timing pulse provides the basis for proper sequence of all the separate
sections of the microcontroller chip.
16. Read Only Memory (ROM) ROM holds the program instructions and the constant
data. Microcontrollers use one or more of the following memory types for this
purpose: ROM (mask-programmed ROM), PROM (one-time programmable ROM, which is
not field programmable), EPROM (field programmable and usually UV erasable),
EEPROM (field programmable, electrically erasable, byte erasable) and flash
(similar to EEPROM technology). Microcontrollers can have 4K, 8K and 16K, etc. of
ROM
17. Random Access Memory (RAM) is used to hold intermediate results and other
temporary data during the execution of the program. Typically, microcontrollers
have a few hundreds of bytes of RAM. Special-Function Registers control various
functions of a microcontroller. These are divided into two groups: Registers
wired into the CPU - Do not necessarily form part of addressable memory. - Used to
control program flow and arithmetic functions. - Examples, status register, program
counter, stack pointer, etc.
18. Registers Register is used to hold the contents of data being manipulated.
Registers required by peripheral components - The contents of these registers
include set a timer or enable serial communication. - Examples, a program counter,
stack pointer, RAM address register, program address register and PC incrementer.
19. Peripheral Components The analogue-to-digital converter - provides an
interface between the microcontroller and the sensors that produce analogue
electrical equivalents of the actual physical parameters to be controlled. The
digital-to-analogue converter - provides an interface between the microcontroller
and the actuators that provide the control function. I/O ports - provide an
interface between the microcontroller and the peripheral I/O devices such as the
keyboard, display, etc. Counters/timers - are used to keep time and/or measure
the time interval between events, count the number of events and generate baud
rates for the serial ports.
20. Watchdog timer A specialized program found as part of the microcontroller
designed to prevent the microcontroller from halting or “locking up” because of a
user-written program since the instructions are processed step-by-step. Uses a
routine that is based on timing. If a program has not been completed or repeated as
a loop within a certain amount of time, the watchdog timer issues a reset command.
A system reset sets all the register values to zero. The reset feature allows
the controller to recover from the crash. It releases the program and sets the
controller to start over again.
21. Stack Pointer and Program Counter
1. What does the Intellectual Property Code of the Philippines Republic Act No
8293 imply?
The Intellectual Property Code of the Philippines Republic Act No 8293 implies to
shall protect and secure the exclusive rights of scientists, inventors, artists and
other gifted citizens to
their intellectual property and creations, particularly when beneficial to the
people, for such periods as provided in this Act. The use of intellectual property
bears a social function. To
this end, the State shall promote the diffusion of knowledge and information for
the promotion of national development and progress and the common good. It is also
the policy of the
state to streamline administrative procedures of registering patents, trademarks
and copyright, to liberalize the registration on the transfer of technology, and to
enhance the enforcement of intellectual property rights in the Philippines.
The Intellectual Property Office of the Philippines (IPOPHL) is the lead agency in
the country mandated to implement State Policies on intellectual property (IP). It
was created by Republic Act No. 8293
or the Intellectual Property Code of the Philippines (IP Code), which was signed
into law on June 6, 1997 by the late Senator Raul S. Roco and which took effect on
January 1, 1998 under the presidency of Fidel V. Ramos.
This act is prescribing the Intellectual Property Code and establishing the
Intellectual Property Office, providing for its powers and functions, and for other
purposes. The Vision of this act is that "An Intellectual Property-conscious
Philippines in a demystified, development-oriented, and democratized IP System by
2020."
The mission is that "We commit to deliver high quality, fast, reliable, effective
and efficient services to promote innovation and encourage the creation,
utilization, protection of and respect for intellectual property". One of the
management goals is to achieve institutional excellence by investing in people,
technology, and infrastructure and develop and nurture a culture of excellence,
deep commitment, and integrity.
The acts which considered as a violation of the Intellectual Property Code also
known as RA 8293 are infringement of patent, trademark or copyright rights,
counterfeiting, reproduce of copyrights or trademarks, and misappropriating trade
secrets. Violating intellectual property may happen accidentally or purposefully
for some specific gain.
As violation of intellectual property rights, "infringement" with regard to
patents, copyright, and trademarks, and "misappropriation" with respect to trade
secrets, can be a
breach of civil law or criminal law, which depends on the type of intellectual
property involved, the jurisdiction, and the nature of the action. Under the this
latter law, penalties
for this infringement, range from fine of PhP50,000 to PhP200,000 and/or 2 to 5
years of imprisonment. The legal protection of RA 8293 enables the creators to earn
recognition, financial benefits and more. The
feeling of being protected of their creations, allows an environment of innovation
to flourish.
SECTION 156. Actions, and Damages and Injunction for Infringement. - 156.1. The
owner of a registered mark may recover damages from any person who infringes his
rights, and the measure of the damages suffered shall be either the reasonable
profit which the complaining party would have made, had the defendant not infringed
his rights, or the profit which the defendant actually made out of the
infringement, or in the event such measure of damages cannot be readily ascertained
with reasonable certainty, then the court may award as damages a reasonable
percentage based upon the amount of gross sales of the defendant or the value of
the services in connection with which the mark or trade name was used in the
infringement of the rights of the complaining party. (Sec. 23, first par., R.A. No.
166a)
The purpose of Cybercrime Prevention Act of 2012 ias to protects ICT users, in
general, and mitigates and/or prevents harm to people, data, systems, services, and
infrastructure, in particular; protects human rights;
enables the investigation and prosecution of crimes committed online (outside of
traditional real-world settings); and facilitates cooperation between countries on
cybercrime matters. It is also to provide the rules of
conduct and standards of behaviour for the use of the internet, computers, and
related digital technologies, and the actions of the public,government, and private
organizations; rules of evidence and criminal procedure,
and other criminal justice matters in cyberspace; and regulation to reduce risk
and/or mitigate the harm done to individuals, organizations, and infrastructure
should a cybercrime occur. Accordingly, cybercrime law
includes substantive, procedural and preventive law.
For purposes of this Act, the following terms are hereby defined as follows:
(a) Access refers to the instruction, communication with, storing data in,
retrieving data from, or otherwise making use of any resources of a computer system
or communication network.
(h) Without right refers to either: (i) conduct undertaken without or in excess of
authority; or (ii) conduct not covered by established legal defenses, excuses,
court orders, justifications,
or relevant principles under the law.
2. What crimes are punishable under the Cybercrime Prevention Act of 2012?
The crimes that punishable under the Cybercrime Prevention Act of 2012 are the
offenses against the confidentiality, integrity and availability of computer data
and systems such as illegal access, illegal interception
data interference, system interference.This act also penalizes the content-related
offenses such as cybersex, child pornography and libel which may be committed
through a computer system and misuse of devices
such as cyber-squatting, computer-related fraud and computer-related identity
theft.
The crimes that punishable under the Cybercrime Prevention Act of 2012 are the
offenses against the confidentiality, integrity and availability of computer data
and systems such as illegal access, illegal interception
data interference, system interference.This act also penalizes the content-related
offenses such as cybersex, child pornography and libel which may be committed
through a computer system and misuse of devices
such as cyber-squatting, computer-related fraud and computer-related identity
theft.
Cyber libel is considered as the crimes that punishable under the Section 4(c)(4)
of R.A. 10175 or Cybercrime Prevention Act of 2012.
This is related to content-related offenses like cybersex and child pornography.
Proceeding from the definition of libel under Article 353
of the Revised Penal Code, it means of the unlawful or prohibited acts of libel, as
amended, committed through a computer system or
any other similar means which may be devised in the future. It must be noted that
the Revised Penal Code punishes the person who shall
publish, exhibit or cause the publication or exhibition of a libelous post, or the
editor or business manager of a book, pamphlet, newspaper,
magazine or serial publication containing the libelous material:
Individuals found guilty of cybersex face a jail term of prision mayor (6 years and
one day to 12 years) or a fine of at least P200,000 but not exceeding P1 million.
Child pornography via computer carries a penalty one degree higher than that
provided by RA 9775, or the Anti-Child Pornography Act of 2009. Under RA 9775,
those who produce, disseminate or publish child pornography will be fined from
P50,000 to P5 million, and slapped a maximum jail term of reclusion perpetua, or 20
to 40 years.
Section 6: Any crimes committed in the Revised Penal Code will have the penalty
that will be imposed by one degree higher than the existing code. Also, special
cases in the Penal code are included and will be punished.
People who commit or violate libel will be prosecuted. Also, any liability for
violation of the Revised Penal Code will be punished as amended or special laws.
Section 8: any person found guilty will be penalized with Php 200,000.00 up to a
maximum amount commensurate to the damage incurred or both. A person committing
such acts
will pay Php 250,000.00 - Php 1,000,000.00.
A fine of Php 100,000.00 and /or imprisonment will be given if the person does not
comply with the law enforcers. These punishments will be given each and every time
the person does not comply with the authorities.
SEC. 8. Penalties. — Any person found guilty of any of the punishable acts
enumerated in Sections 4(a) and 4(b) of this Act shall be punished with
imprisonment of prision mayor or a fine of at least Two hundred thousand pesos
(PhP200,000.00) up to a maximum amount commensurate to the damage incurred or both.
Any person found guilty of the punishable act under Section 4(a)(5) shall be
punished with imprisonment of prision mayor or a fine of not more than Five hundred
thousand pesos (PhP500,000.00) or both.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)(1)
of this Act shall be punished with imprisonment of prision mayor or a fine of at
least Two hundred thousand pesos (PhP200,000.00) but not exceeding One million
pesos (PhP1,000,000.00) or both.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)(2)
of this Act shall be punished with the penalties as enumerated in Republic Act No.
9775 or the “Anti-Child Pornography Act of 2009”: Provided, That the penalty to be
imposed shall be one (1) degree higher than that provided for in Republic Act No.
9775, if committed through a computer system.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)(3)
shall be punished with imprisonment of arresto mayor or a fine of at least Fifty
thousand pesos (PhP50,000.00) but not exceeding Two hundred fifty thousand pesos
(PhP250,000.00) or both.
Any person found guilty of any of the punishable acts enumerated in Section 5 shall
be punished with imprisonment one (1) degree lower than that of the prescribed
penalty for the offense or a fine of at least One hundred thousand pesos
(PhP100,000.00) but not exceeding Five hundred thousand pesos (PhP500,000.00) or
both.
SEC. 9. Corporate Liability. — When any of the punishable acts herein defined are
knowingly committed on behalf of or for the benefit of a juridical person, by a
natural person acting either individually or as part of an organ of the juridical
person, who has a leading position within, based on: (a) a power of representation
of the juridical person provided the act committed falls within the scope of such
authority; (b) an authority to take decisions on behalf of the juridical person:
Provided, That the act committed falls within the scope of such authority; or (c)
an authority to exercise control within the juridical person, the juridical person
shall be held liable for a fine equivalent to at least double the fines imposable
in Section 7 up to a maximum of Ten million pesos (PhP10,000,000.00).
If the commission of any of the punishable acts herein defined was made possible
due to the lack of supervision or control by a natural person referred to and
described in the preceding paragraph, for the benefit of that juridical person by a
natural person acting under its authority, the juridical person shall be held
liable for a fine equivalent to at least double the fines imposable in Section 7 up
to a maximum of Five million pesos (PhP5,000,000.00).
The liability imposed on the juridical person shall be without prejudice to the
criminal liability of the natural person who has committed the offense.
Through its dynamism, the cyberspace has enabled users to engage in the online
world; from the ability of an individual to access the internet and utilize social
media platforms in communicating
with the online community, to giving one an opportunity to share his/her
sociopolitical views, stand on a certain issue or current event, etc., people are
able to leave a social trace that could influence
others. Moreover, they give them an opportunity to react/take statements
offensively or with acceptance, and with approval or disapproval. This perhaps
triggered lawmakers to tackle issues present
in the online space. RA 10175 or the Philippines Cybercrime Prevention Act of 2012
centers on “protecting” the welfare of users in the cyberspace against offenses
such as “Data Interference” and
“Illegal Access” as stated on the published law. However, does this really protect
users given that a lawyer who is expert in legal matters criticized it for the
lapses found on some of the provisions?
Legal expert Disini together with four citizens appeal for a reassessment of RA
10175 to the higher court on the provision/s that violate/s speech freedom; citing
Section 4(4) of the same law under
its punishable acts chapter:
These media enable media to create an open environment while speeding delivery of
important information to the public. The web is rapidly evolving
and is having impact on millions of people’s behaviors and opinions all over the
world. Little more than a decade ago, all you could really do was read static
content on web sites. Today, anyone can create rich and interactive content from
anywhere in the world where there is a network connection and with any device.
The Internet and the Web has become an important part of Philippine Society.
In a world today, technology and internet now increased, many people are engaged
with this matter. When the time has change people tend to used internet as
addiction, criminality such
as child pornography, illegal recruitment, illegal access, Cybersex , cyber
discrimination or libel and others.
With all these issues regarding internet or cyber world, can minimize or prevent
through this Republic Act no. 10175,Congress of the Philippines, these are laws
that can help so that people
are aware of something about the Cyber Crime Law, Penalties, Policies and
Responsibilities. This act can help people and the society because the computer
network today are spreading and
growing over a years ago, it needs to be secure all the aspects of it, that’s why
there are laws of it, a law which creates protection, prevention, awareness and
give justice for the victims of the
cyber crimes which happening today, especially to the Philippines. Many Filipino
are used to have many internet accounts especially to the social medias like
Facebook, Twiitter and others which
can influence by others, and some of it used it as crime which are totally
happened. Now when i read those Chapters and Sections of the R.A No. 10175, it is
really useful today and for other
generations, because it improves the security which are supported by many
government officials such as NBI, PNP, DOJ and other supported the implementation
of the law/ act, level of awareness
and emphasize the ethical usage of the cyber or computer network.
REPUBLIC ACT NO. 10175; CONGRESS OF THE PHILIPPINES, it would be a great start to
make the people open their eyes, and shows to them what are their duties and
responsibilities as
a human in and outside the cyber world.
First, because the Internet has become the information highway of economic growth,
second, because Internet Communication Technology and Computers have
become a critical part of our daily lives and third, for all its imperfection
cyberspace is a forum for ideas and a bastion of freedom, a fortress of Democracy
.The Cybercrime Prevention Act of 2012 is the first law in the Philippines which
specifically criminalizes computer crime, which preceding to the passage of the law
had
no strong legal guide in Philippine jurisprudence. Sometimes, a human being’s
ability to misunderstand seems almost endless that is why certain groups have risen
to question
the legality of this law and some filed petitions to nullify some provisions of the
law and the act has been criticized for its provision on criminalizing libel, which
seems to be a
restriction in freedom of expression.The Aquino administration’s insistence that
the country needs this law that essentially strips netizens of their freedom of
expression, speech,
and privacy only raises fears that the government is manhandling the laws of the
land to silence critics and rebels and so it was dubbed as “e-Martial Law”
legislation.
Including online libel for defamatory utterances and publications sets back the
campaign to strike out the 80-year-old criminal penalties for libel under the
Revised Penal Code.
Even though some are in favor of the new law because there is no doubt that we need
a law on cybercrime to address the new breed of crimes spawned by the Internet such
as
online pornography and cyber prostitution they still could not deny the fact that
its definition is indeed still vague. According to Aurea Calica of The Philippine
Star, Malacanang
stressed the importance of the Cybercrime Prevention Act to address Internet-
related crimes. “I think nobody will argue that identity fraud should be a crime.
Nobody will argue that our women and children need to be protected if they’re
exploited for pornography on the Internet,” Valte said.As the Law was enacted
surely most of
the citizens thoughts circled on what this law can do, what are the benefits that
we may get or do we even get benefits from it being implemented? And as criticized
by many,
numerous advantages and disadvantages of the law are thought such as protection for
business in the internet, Cyber Sex and Cyber Bullying may now be a crime and
punishable,
hacking and theft may be combatted with lifted technology knowledge for the
government and the BPO may quickly respond to the demands of foreign clients for a
strong legal
environment that can secure their data from being stolen and sold.Effect on the
Country While the new Act received mixed reactions from several sectors,
particularly with how its
provisions could potentially affect freedom of expression, freedom of speech and
data security in the Philippines the local business process outsourcing industry
has received the new
law well, citing an increase in the confidence of investors due to measures for
the protection of electronic devices and online data.Media organizations and legal
institutions though have
criticized the Act for extending the definition of libel as defined in the Revised
Penal Code of the Philippines, which has been criticized by international
organizations as being obsolete:
the United Nations for one has remarked that the current definition of libel as
defined in the Revised Penal Code is inconsistent with the International Covenant
on Civil and Political Rights,
and therefore violates the respect of freedom of expression.While many Facebook and
Twitter users and the portals of media organizations in the Philippines have
replaced their profile pictures
with black screens to protest the law, hacktivists had joined protests against the
law by defacing several government websites for its provisions regarding e-libel,
which they said violates the Constitution’s
guarantee of freedom of expression.As reported by Camille Diola, of the Philippine
Star, the hackers, collectively known as “Anonymous Philippines,” defaced the
online presence of local government units
including Bukidnon, Bolinao and Calasiao both in Pangasinan and Luna in Apayao
Province and replaced them with a black screen, a logo and a message citing their
right to freedom of expression.
And as seen at the hacked webpages the hacktivitists left messages stating “What
happened to the law? Are all laws meant to be broken?Are they made to fool people,
deprive them of their rights in
exchange of what we believe as Heavens for Politicians? ” while quoting Article
III, Section 4 of the Constitution providing the freedom of speech and expression.
And as they all continue these actions,
a group of petitioners against the Cybercrime Prevention Act of 2012 has amended
their complaint, asking the Supreme Court to also declare as unconstitutional some
sections of the Revised Penal Code.
And these are; Article 355, which punishes libel and sets penalties for its
commission, Article 353, which defines libel, Article 354, which states that malice
is presumed for every defamatory accusation even
if it is true, subject to limited exceptions, Article 361, which states that truth
can be used as defense against libel so long as the material in question is
published with good motives and for justifiable ends, and
lastly Article 362, which states ‘malice’ can still result in criminal liability
even for privileged matters as stated in Article 354.
Also regarding the “cybersex” provision of the cybercrime law, the petitioners said
this section is “vague and overbroad. ” And of course the youth, which is mostly
affected by this implemented law,
also decided to take part in helping junk or amend the said law by filing petition
to nullify some provisions of RA 10175. After all the scandal and backlash, Sen
Miriam Defensor Santiago urged the
Senate to pass a bill she filed, a new and improved version of the anti-cybercrime
law, on November 12, calling it the “anti-cybercrime law version 2. .
” The proposed bill of the lady senator protects the right of the citizens against
illegal searches and seizures by providing guidelines for any collection of any
data, including the securing of warrants, obligating
notification and limiting seizure to data and excluding physical property. In
addition, R. A. 10175 violates the right to privacy and the Constitutional
guarantee against search and seizure through allowing the
warrantless real – time collection of data.Moreover, the proposed bill provides for
court proceedings in cases where websites or networks are to be taken down, and
prohibits censorship of content without a court order.
Finally, she seeks to clarify the mandate and organization of the proposed
Committee of Information and Communications Technology to avoid confusion in the
future. After quite some time on October 9, 2012,
\finally, the Supreme Court issued a temporary restraining order (TRO) because of
several petitions, rants and protests, stopping implementation of the Act for 120
days.Cybercrime Law: Protection or Suppression?
At present time, the controversial law is still a “hot issue”. There are ongoing
online debates, discussions and opinions about its vital role in regulating the
cybercrimes here in the Philippines.
As allies and critics speak out their fearless opinions about the provisions of
this law, it is also a challenge for everybody to overcome too much internet use in
order to malign gossip or even use it for their
own selfish desires.No matter how hard we try to unite everybody’s opinion with
regard to the Cybercrime Law there will always be two sides of the story. Do we
really need this law or is it just a matter
of practicing self-regulation armed with right moral values? According to Ric on
Internet Marketing, SEO in the Philippines, on an interview with philstar. com, the
Center for Media Freedom ; Responsibility
stressed how this law would affect internet regulations among Filipino “netizens”
and their restricted mindset of the country’s leader while on the other hand,
Mr.Benedict Hernandez, Business Process Association
of the Philippines (BPAP) President said that, anti-cybercrime law is seen as a
potential instrument for the progressive growth of the IT and BPO industry since
the new law adds another layer of protection against
theft and fraud for the industry. Should the Cybercrime Law be passed just for the
reason that in social networking sites like Facebook and Twitter it will not
tolerate bullying or harassment?That it will not just allow
users to speak interest, but take action on all reports of abuse behavior directed
at private individuals and that in such case the misunderstandings between each
other may be lessened? Libel can be under that bullying case.
It is defined as public and malicious freely on matters of public charge of a
crime, or of a vice or defect, real or imaginary or any act, blunder, condition,
status or circumstance tending to discredit or cause the dishonor
or contempt of a natural or juridical person, or to blacken the memory of one who
is dead.Or should it not be passed because being free from this kind of anti-people
law is one single step to elevate the lives of every
Filipino people, to become more productive, achieve maximum development and, as the
government always reiterate, to become the citizens of the world? How can we all
fulfill these if the cybercrime law continues to
surround us, limiting us from things that we ought to know and do? There might be
other options to avoid crimes online, not by merely passing of suppressing and
vague laws so why not think of those other options that
would or can be approved by both the citizens and the government?By doing so both
parties should, and clearly would, benefit from whatever other option they could
think of that could replace the Cybercrime Prevention