You are on page 1of 103

GEE 103

LIVING IN INFORMATION
TECHNOLOGY (IT) ERA
LEARNING MODULE

School:
CAPIZ STATE UNIVERSITY, MAIN CAMPUS

Address: Fuentes Drive, Roxas City, Philippines 5800

Subject: GEE 103 - LIVING IN INFORMATION TECHNOLOGY (IT) ERA

Semester Offered: 2ND Semester S.Y. 2020-2021

Facilitators: Contact Information


Jean B. Benson
Lorie Mae Biscan
Angel D. Verdadero
Carlito B. Malicosio 0909 141 1665 / 0996 723 9015
GEE 103 - LIVING IN INFORMATION TECHNOLOGY (IT) ERA
Second Semester S.Y. 2020-2021
Revised: March 2021

I. Capiz State University

Vision: Center of Academic Excellence Delivering Quality Service to all

Mission: Capiz State University is committed to provide advanced knowledge and


innovation; develop skills, talents and values; undertake relevant research,
development and extension services; promote entrepreneurship and environmental
consciousness; and enhance industry collaboration and linkages with partner
agencies.

Goals: Globally competitive graduates


Institutionalized research culture
Responsive and sustainable extension services
Maximized profit of viable agro-industrial business ventures
Effective and efficient administration

Core Values: God- Centered, Excellence, Integrity, Transparency and Accountability and;
Dedication to quality Service

Guiding Principles: Academic Freedom, Responsibility, Academic Standards

Institutional Learning Outcome

The College of Engineering, Architecture and Technology is committed to develop a sustainable


program capable of producing competent, well-disciplined, productive, morally upright graduates
equipped with the latest state of the art technical knowledge, and engage in technical research,
innovation and development that contribute to the advancement of the quality of life in the
engineering, technology and architecture profession.

College of Engineering, Architecture and Technology CREATES Graduates who are:

 C- Collaborative
 R- Research Oriented and Innovative
 E- Effective in the specialized field
 A- Academically and intellectually prepared
 T- Technologically/technically equipped
 E- Entrepreneurship Driven
 S- Socially Aware, environmentally conscious and service oriented.

Campus: Main Campus

Program/Degree: Bachelor of Industrial Technology

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 2 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Program/Degree Outcomes:

A. Common to all programs in all types of schools. The graduates have the ability to:
a) Articulate and discuss the latest developments in the specific field of practice
b) Effectively communicate orally and in writing using both English and Filipino
c) Work effectively and independently in multi-disciplinary and multi-cultural teams
d) Act in recognition of professional, social and ethical responsibility
e) Preserve and promote “Filipino historical and cultural heritage”
B. Common to Bachelor of Industrial Technology Students of CapSU
f) Apply knowledge of basic mathematics and sciences to solve technical problems
g) Conduct experiments as well as to analyze and interpret data.
h) Develop/Innovative a system, component or process to meet desired need within
constraints such as economic, environmental, social, political, ethical, health and safety,
manufacturability and sustainability in accordance with standards.
i) Recognize the need for and engage in life-long learning.
j) Apply techniques, skills and modern technical practices
C. Program Outcomes for BIT (Specific Electronics Technology)
At the successful completion of the program curriculum, students will be able to:
a. Globally competitive technician in the field of electronics
b. Equip with Basic Skills and knowledge in electronics
c. Understand the importance of electronics technology in their daily life
d. Have a moral and professional value in dealing with service, troubleshooting, and
entrepreneurial situation
e. High moral standards in the enthusiastic ability in the field of electronics.

School Year / Semester Offered: 2nd Semester S.Y. 2020-2021

Course Description: Science, culture and ethics of information technology, its influence on
modern living and human relationships, and uses for personal, professional, and social
advancement.

Pre-Requisite: none

Course Credit/Unit: 3 units; 3 hour lecture, 0 hours laboratory (3 hours per week)

Course Outcomes: This course is meant to prepare students for work in industry in the
information processing fields as well as prepare students for business and computer-related
courses. In particular, it aims to:
1. provide a basic knowledge of computer hardware and software;
2. introduce the business areas to which computers may be applied;
3. provide an introduction to ICT in organization and information systems;
4. develop the skills in communication, verbal and written, which play an important part in
organization/ industry in computing and information processing;
5. provide sufficient training in programming to enable the design, writing and documenting
of a program or suite of programs in a high-level language;
6. develop knowledge of capabilities of generic software.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 3 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Online Learning and Instruction
This course uses either zoom, video conferencing or google meet for:
 All announcements
 Lecture, slides, practical and tutorial questions, practical instructions, and other
resources.
 Online quizzes
 Communication of marks using the e-gradebook
 A discussion board for course-related discussion
 Lecture recordings and key-concept videos

XI. Learning and Teaching Activities

This course includes lectures, tutorials and practical session using computer aided application.
Lectures: Pre-recorded key-concept videos provided online
Tutorials: Students have the opportunity to work collaboratively with their peers to solve
problems and to seek assistance from an instructor.
Tutorial participation will contribute to a small component of the assessment.
Practical: In the practical session, students work in pairs to make a portfolio, projects and
etc.

XI. Criteria for Grading:


1. Attendance ………………………………………............................... 5%
2. Projects/Researches/Assignments/Porfolio & Reaction Papers…...25%
3. Quizzes…………….……………………………………………………..20%
4. Class Standing/ Class Participation/Recitations…………………..…20%
5. Mid-Term/Final Examinations…………………………………………..30%
100%
Final Grade
Mid-Term - 30%
Finals - 70%
Total - 100%

Course Requirements
1. Pass the quizzes and major examinations.
2. Attendance during class (Note: Since a new normal, please contact your instructor from
time to time)
3. Class participation and involvement in activities
4. Submit required outputs/portfolio/activity paper

Policies
1. Requirements should be submitted on the stated deadline.
2. Duplication and/or plagiarized outputs will be considered dishonesty subject for
disciplinary action specifically dismissal from the course enrolled.

Remarks:
This syllabus is flexible and may include additional topics and activities deemed necessary
by the faculty in consultation with the students.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 4 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
DISCLAIMER

This syllabus is intended to provide a basic structure to this course. Adherence to this syllabus
will be as close as possible, but it is still subject to change at the discretion of the instructor. The
class schedule will be discussed at the beginning of each class session.
Grading scale, attendance policy and withdrawal policy will be in accordance with the student
handbook and university code.
To adjust and conserved the number of pages to be printed out there are some information which
is not been included such as key term and references if ever you wanted to see them please let
us know.

HOW TO USE THIS MODULE?

In this module, we will explore the living in the Information Technology Era. Each module is
organized as follows:

Most Essential describe the knowledge or skills students should acquire by the end of a
Learning particular assignment, class, course, or program, and help students
Outcomes understand why that knowledge and those skills will be useful to them
Opening Activity Provides a activity for the students as a pre test
Or a definition of terms and also a word that serves as a key, as to the
Key Terms
meaning of another word, a sentence, passage, or the like.
The center of a module is where the learning takes place. This is the heart
Lecture notes
of the lesson. It may be presented as pages to read, illustrations to view,
and
videos to watch, web site links to visit, or any number of learning
lesson content
experiences.
Summarizes everything you need to do during the week, including
Activities page readings, discussions, assignments, and supplemental activities. It serves
as a check-list of all the learning activities you need to complete.
End page and
Marks the end of a module and also cited the references of this module
Referencing

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 5 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
MODULE CONTENT
Topics Most Essential Learning Outcomes Page
General Orientation: - Understand and explain the meaning
- University’s VMG of the University’s VMGO, CapSU
- CapSU Quality Policy Quality Policy and College’s Program
- College’s Program Outcomes Outcomes.
- Class Rules - Recite the University’s VMGO and
CapSU Quality Policy.
- Understand the class rules.
MODULE 1 - Define ICT
INTRODUCTION TO INFORMATION - Trace the evolution of technology,
AND COMMUNICATION particularly computers
- Opening Activity
- Identify the different parts of the
- Key Terms
- Information and Communication computer system, and categorize the
Technology: An Overview different computer peripherals
- IT vs. ICT - Assess why computers are
- Evolution of Technology considered powerful thinking
- History of Computer machines
- Components of Computer - Explain the role of technology in
- Why Computers are Powerful
media and how it affects
- Classifying Computers
- Digital Age, Information Age, and communications; and
Computer Age - Recognize the current trends in
- Media in the Digital Age information technology
- Evolution of Media
- Overview of Current Trends
- Impact of ICT on Individuals,
Organizations, and Society
- Ethical Issues in ICT
- Key Points
- Checkpoints
- Tasks
MODULE 2 At the end of this chapter, the students
COMPUTER IN OUR DAILY LIFE should be able to:
- Opening Activity - Familiarize themselves with the
- Key Terms computer number system
- How Computer Works? - Discuss the role of the ASCII code in
- How Computers Interpret Data? computer system and explain how
- How Computers Communicate with computers use it
One Another? - Examine how a computer’s system
- How Computers Connect to Other bus works
Computers? - Identify the different computer network
- How Human Communicate with system and the wired and wireless
Computer? connections
- How Computer Impact Everyday Life? - Distinguish between system software
- Key Points and application software
- Tasks - Compare and contrast a desktop app
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 6 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
and a mobile app in terms of content,
layout, and design; and
- Explain the impact of computers on
daily life.
MODULE 3 At the end of this chapter, the students
THE INTERNET AND WORLD WIDE should be able to:
WEB - Trace the history of the internet
- Opening Activity - Identify the ways of access and
- Key Terms connect to the internet
- The Internet - Analyze how data travels through the
internet
- Jobs the Internet Can Do
- Perform search functions on the web.
- How Data Travels the Internet? - Create a personal web page.
- What Computers do on the Internet?
- The world wide web
- Key Points
- Tasks

MIDTERM
MODULE 4 At the end of this chapter, the students
INFORMATION, CONTROL, AND should be able to:
PRIVACY - Distinguish a physical resource from a
- Opening Activity conceptual resource
- Key Terms - Identify the characteristics of
- Introduction to Resources information as a resource
- Analyze the phenomenon of
- Information as a Resources
information overload brought by high
- Information Economics internet penetration
- Information Overload - Explain the major points of the revised
- Information Control Intellectual Property Code of the
- Information Privacy Philippines (Republic Act No. 10372);
- Key Points and
- Checkpoints - Highlight the importance of
information control and privacy by
- Tasks
creating a video
advertisement/awareness campaign
MODULE 5 At the end of this chapter, the students
IT, CULTURE, AND THE SOCIEY should be able to:
- Opening Activity - Recall the current trends in the field of
- Key Terms information technology
- The Impact of IT on the Society - Discuss the Internet of Things and its
influence on the society
- Internet of Things (IoT)
- Explain automation and its impact on
- Automation the society
- The Influence of IT on Culture and - Analyze how IT influences culture and
Social Behavior social behavior
- Influence on Culture - Enumerate the rules of netiquette
- Influence on Social Behavior - Describe cyberbullying and identify
the steps to combat it
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 7 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
- Key Points - Familiarize themselves with and
- Checkpoints demonstrate the imperatives of
- Tasks professional conduct for IT
professionals
MODULE 6 At the end of this chapter, the students
IT TRENDS, ISSUES, AND should be able to:
CHALLENGES - Describe how the given IT trends
- Opening Activity affect the Filipino’s way of living
- Key Terms - Discuss the issues and challenges in
- Trends IT that the different sectors face
- Research further on the influence of
- Issues and Challenges
IT on a specific sector
- Key Points
- Tasks

FINAL
SUBMISSION OF OUTPUTS, ACTIVITIES, PROJECTS, PORTFOLIO

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 8 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
MODULE 1

INTRODUCTION TO INFORMATION AND


COMMUNICATIONS TECHNOLOGY (ICT)

MOST ESSENTIAL LEARNING OUTCOMES


At the end of this chapter, the students should be able to:
 define ICT;
 trace the evolution of technology, particularly computers;
 identify the different parts of the computer system, and categorize the different computer
peripherals;
 assess why computers are considered powerful thinking machines;
 explain the role of technology in media and how it affects communication; and
 recognize the current trends in information technology.

OPENING ACTIVITY
Small Group Discussion
Form a groups using your group chats. Each group is assigned to a specific electronic device.
Group 1 • a mobile phone Group
Group 2 • a laptop speaker Group
Group 3 • a power bank Group
Group 4 • a flash drive Group
Group 5 • a headset or earphones

Discuss among yourselves the use of the device, the frequency of your usage, and your
experience in using it. Share your group’s insights with the class.

INTRODUCTION

Information and Communications


Technology: An Overview

The concept of technology has evolved throughout the years. As the rate of human progress
continues to increase, society has adapted in such a way that technology no longer appeals to
mechanical or electrical systems alone. The term technology presently includes advancements
in communication and how information is handled, thus enabling governments, organizations,
industries, and ordinary individuals to improve on their decision making, business processes, and
everyday living. The term information and communications technology or ICT was defined in a
study conducted by Zuppo (2012) as “related to technologies that facilitate the transfer of
information and various types of electronically mediated communication.” However, this definition
was considered too broad that Zuppo created an ICT hierarchy to identify key aspects such as
ICT in education, business, and the economic sector. These classifications, however, contain
some degree of commonality.

The need for devices, such as mobile phones, laptops, and tablets, is identified in all instances.
This fact is perhaps due to the human need to “belong.” According to Baumeister and Leary
(1995), the “belongingness hypothesis” states that people have a basic psychological need to
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 9 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
feel closely connected to others, and that caring, affectionate bonds from close relationships are
a major part of human behavior. This need can be fulfilled through the different modes of
communication, be it face-to-face, online, through voice, or simply through a text message,
manifested in the number of people with mobile devices such as smartphones, tablets, and the
latest technologies such as “wearable devices.” Nowadays, it is no longer surprising to find a
person owning several of these gadgets, which may not necessarily be for different purposes.
ICT is ubiquitous and access to it is relatively affordable and somewhat effortless. This makes
the demand much higher as different sectors, industries, and organizations now also incorporate
ICT in their daily business processes.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 10 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
The International Telecommunication Union (ITU) conducts an annual study on the prevalence
of ICT around the world. The report, called the ICT Development Index (IDI), includes quantitative
indicators regarding ICT access, usage, and skills in different regions and countries. Figure 1.2
denotes the upward trend of people needing ICTs, with the estimate that mobile subscriptions
now outnumber world population.

IT versus ICT
When do we use the term ICT and how does it differ from IT? ICT, or information and
communications technology, is often used in a more general sense, and is described as using
computers and other digital technologies to assist individuals or institutions in handling or using
information. ICT is technology that supports activities involving information such as gathering,
processing, storing, and presenting data. Increasingly, these activities also involve collaboration
and communication.
IT, or information technology, pertains to the industry that involves computers, software,
networking, and other IT infrastructure to help relay or manage information important in modern-
day living as seen primarily in. large companies or corporations. Simply put, IT is a subset of ICT
as the technology used in the field of IT aids in the use of ICT (Wang, 2016).

Breakdown of ICT
ICT is made up of three words, namely information, communications, and technology.

► Information
Information refers to the knowledge obtained from reading, investigation, study, or research.
Some of the tools that transmit information are the telephone, television, and radio. Not to be
confused with data, information is regarded as processed data. Computers normally process
data that are later understood as information. For example, while typing on your laptop, you
usually punch in random letters on your keyboard to make up words and sentences. The typing
on the keyboard is considered as input data while the words and sentences you see on your
computer monitor is considered as output information.

Information is needed to make decisions and to foresee the future. For example, scientists can
detect the formation of a tsunami using the latest technology and warn the public to avoid
disasters in the affected areas.

Processed information is called knowledge. Knowledge helps fulfill daily tasks. For example,
knowledge is used to predict tomorrow’s weather and decide if there is a need to bring an
umbrella. Knowledge is also used to analyze the stock market and check which company is worth
investing in.

► Communication
Communication is an act of transmitting messages. It is a process in which information is
exchanged between individuals through verbal and non-verbal means.
In the prehistoric days, humans communicated through signs or symbols as evidenced by cave
paintings and drawings, rock art, stone carvings, and the like. Forms of communication have
evolved through time as communicating more and more complex ideas has become necessary.
With technology, communication is faster, more convenient, and more efficient. When face-to-
face meeting is not possible, long distance communication or virtual communication is now
common and easy with the use of smartphones and computers with internet access.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 11 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
►Technology
Technology has evolved in ways that improve people’s daily activities. As mentioned above,
technology has made communication much easier and faster through telephones, fax machines,
mobile devices, and the internet. It has also made broadcasting of information, such as news or
weather reports, more effective. Radio, television, satellites, and the World Wide Web are
powerful tools that can be used by individuals to gather needed information to aid them in their
office, school or house work, or in simple day-to-day activities.

Evolution of Technology
The evolution of technology has always depended on one thing: the human rationale. Humans
tend to think of ways on how to discharge tasks or workload, or do daily activities easily.
The concept of technology always starts with the basic tool. In order to
build a house, one cannot simply use his or her own two hands to cut
wood and attach the wooden pieces together. A hacksaw, hammer, and
set of nails are needed to accomplish the task. The concept of a wheel
has also made transportation much easier, and enabled people to move
several objects from one place to another with ease.

Figure 1.3 A boy pushes a wheelbarrow that carries his possessions


through the customs checkpoint.

By combining a set of tools, people have come up with machines that can do the tasks faster
and more efficiently. A single-wheel transportation tool has inspired the creation of a machine
capable of transporting, not just objects, but also passengers. Thus, vehicles have nowadays
become more of a necessity rather than a form of luxury.

Figure 1.4 Private car vs. public transport

Another type of machine that is considered a necessity is the computer. A computer is an


electronic device, operating under the control of instructions stored in its own memory, that can

Figure 1.5 Computer basic usage Figure 1.6 Touch screen technology
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 12 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
accept data, manipulate the data according to specified rules, produce results, and store the
results for future use. However, as technology evolves, so do machines. Computers today are no
longer the same computers your parents must have first used. Most machines, including
computers, have evolved through the process of automation.

Automation is defined as “the technique of making an apparatus, a process, or a system operate


automatically.” Automation includes a broad range of technologies normally connecting computer
systems to other systems, such as sensors, wireless applications, expert systems, and systems
integration, among others. The integration is made in such a way that these interconnected
systems are capable of self-acting or self-regulation.

Figure 1.7 Toyota’s automated production

Figure 1.8 The intelligent car in the future - with a sense-able dashboard

Automated systems can reduce the instances of errors, which are usually caused by human-
based decision and comprehension. Production companies often use automated systems as part
of their business process as automation increases productivity and lessens the time to market.

However, an automated system is not the same as an intelligent system. Intelligent systems are
far more complex and are capable of learning. This is where the concept of artificial intelligence
comes in. One of the latest inventions in the automotive industry is the intelligent car which is
capable of driving and parking by itself.
History of Computer

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 13 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
With the evolution of technology, computers have taken a major role in the last three decades.
This is due to the fact that people have become increasingly dependent on computers to do their
daily tasks in school, at work, or in their routines. What started off as simply for research purposes,
computers are now designed to be more compact, more mobile, and more integrated in people’s
daily activities.

Computers have evolved based on the type of components used in the design. At present,
scientists and researchers haveidentified five generations based on design, suitability, and
reliability. These generations of computers are briefly defined below (Pepito, 2002).

Figure 1.9. Smart Wearables

First-generation Computer (1946-1959)

The first electronic computer was developed in 1946. Designed


by J. Presper Eckert and John W. Mauchly from the University
of Pennsylvania and financed by the United States Army, the
Electronic Numeric Integrator and Calculator (ENIAC) is
considered to be the first-generation computer. ENIAC was a
modular computer, composed of several panels capable of
performing different functions. However, it could store only
limited or small amount of information and only do arithmetic
operations such as addition and subtraction of up to 10 digits.
The computer was roughly 167 square meters in size, and
weighed 27 tons.

Second-generation Computer (1959-1965)


In this second generation, the transistor was used as the Figure 1.10. (Picture at the right) the
interior sections of the computer. Transistors were much ENIAC showing vacuum tubes and
smaller, faster, and more dependable than the vacuum tubes how they operate.
of the first- generation computer. They generated less heat
and consumed less electricity but were still very costly.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 14 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Figure 1.11 Transistors

Third-generation Computer (1965-1971)

In 1965, Jack Kilby invented the integrated circuit (IC) that was used instead of transistors as the
interior sections to build the computer. A single IC has many transistors, resistors, and capacitors
that even the full circuit board of a transistor can be replaced entirely with one chip. This chip
made the computers smaller, unfailing, and effective. In this third generation, remote processing,
time-sharing, and multiprogramming operating system were used.

Figure 1.12 Third-generation computer using the integrated circuit

Fourth-generation Computer (1971-1980)

From 1971 to 1980, very large scale integrated (VLSI) circuits were used to build computers.
These circuits have about 5,000 transistors and other circuit elements with their connected
circuits

Figure 1.13 Fourth-generation computer using a microprocessor


Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 15 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
on a single chip known as the microprocessor. These fourth- generation computers such as
personal computers became more powerful, dense, reliable, and inexpensive. The other
application of this microprocessor technology can be used and applied for pocket calculators,
television sets, automotive devices, and audio and video appliances.

Fifth-generation Computer (1980-onwards)

In this fifth generation, the VLSI technology has evolved into what is called ultra large-scale
integration (ULSI) technology, with the manufacture of microprocessor chips having 10 million
electronic components. This generation involves computer intelligence which is associated with
artificial intelligence (AI), natural language, and expert systems that interpret the means and
practices of producing computers that think like human beings.

Figure 1.14 Fifth-generation computer

Components of a Computer

What makes a computer work? By definition, a computer is an electronic device that manipulates
information or data. It has the ability to store, retrieve, and process data. It contains both hardware
components and software applications.

The hardware pertains to the computer’s physical devices. It is any part of the computer that can
be seen and touched. A computer’s hardware consists of interrelated electronic devices that are
used to manipulate the computer’s operation, input devices, and output devices.

Input Devices
Working with a computer would be ineffective if one does not intermingle with it because the
machine cannot accept and receive instructions and/or deliver an output on its own. Input devices
enter or send data and instructions from the user or from another computer system on the internet
while output devices send back the administered data to the user or to another computer system.

The following are some of the most common and important input devices of a computer:
 Keyboard - is the most common input device that accepts letters, numbers, and commands
from the user.
 Mouse - lets one select options from on-screen menus. A mouse is used by moving it on a
flat surface, pressing its two buttons (left and right), and scrolling the wheel that is located
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 16 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
between the buttons.
 There are also alternatives to using a mouse. A trackball has a ball that can rotate using a
finger or the palm of a hand to move the pointer. A touchpad also called a trackpad is a
touch-sensitive pad that lets the user move the pointer by touching and dragging his or her
finger on the pad. Touchpads are commonly built-in on laptop computers.
 Microphone - allows a user to speak into the computer to input data and instructions. While
there are available stand-alone microphones for computers, most of the time, users buy a
headset—a combination of microphone and earphones—for the sake of practicality.
 Scanner - converts printed material (such as text and pictures) into a form the computer can
use. There are different types of scanners available; the most common is the flatbed scanner.
Scanners look like miniature printers with a flip-up cover protecting the glass platen. They are
often built into multi-function printers (MFPs). Another type becoming common nowadays is
the hand-held or portable scanners. Portable scanners can be small enough to fit inside
one’s pocket. Pen scanners are just a bit bigger than fountain pens and can scan the text of
a document line by line. They do not give high-resolution scans and are more expensive than
flatbed scanners.
 Digital camera - allows one to take pictures then transfer the photographed images to the
computer or printer instead of storing the images on a traditional film.
 PC video camera - is a digital video camera that enables users to create a movie or take still
photographs electronically. With the PC video camera attached to the computer, users can
see each other as they communicate via the computer.

Output Devices

An output device is any hardware component that transmits information to one or more people.
The three commonly used output devices are as follows:
 Printer - produces text and graphics on a physical medium such as paper. The two types of
printer are the impact printer and the non-impact printer. An impact printer makes contact
with the paper by pressing an inked ribbon against the paper using a hammer or pins. An
example of an impact printer is the dot-matrix printer. A non-impact printer does not use a
striking device to produce characters on the paper, and because it does not hammer against
the paper, the printer produces less noise. Examples of non-impact printers are inkjet printers
and laser printers.
 Monitor - displays text, graphics, and videos on a screen. Many monitors look similar to a
television. The three types of monitor available in the market are the following:
 Cathode ray tube (CRT) - is a vacuum tube containing an electron gun at one end and a
fluorescent screen at another end. From this electron gun, a process called thermionic
emission generates a strong beam of electrons. These electrons travel through a narrow path
within the tube with high speed using various electromagnetic devices and finally strike the
phosphor points present on the fluorescent screen, thus creating an image. Monitors employ
the CRT technology used most commonly in the manufacturing of television screens. A stream
of intense high-energy electrons is used to form images on a fluorescent screen.
 Liquid crystal display (LCD) - is a flat-panel display that consists of a layer of color or
monochrome pixels arranged schematically between a couple of transparent electrodes and
two polarizing filters. Optical effect is achieved by polarizing the light in varied amounts and
making it pass through the liquid crystal layer.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 17 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Figure 1.15 Different types of monitor. (a) Liquid Crystal Display; (b) Cathod Ray Tube;
(c) Light-Emitting Diode

Light-emitting diode (LED) - is a flat-panel display that uses light-emitting diodes for
backlighting. The display is of LCD only but the backlighting is done by LEDs. LED monitors are
said to use much lesser power than CRT and LCD. Thus, they are also considered environment-
friendly.
Speaker - allows one to hear music, voice, and other sounds. The signal used to produce the
sound that comes from a computer speaker is created by the computer’s sound card.

System Unit

The system unit is the enclosure composed of the main elements of a computer that are used
to administer data. This can be referred to as a computer case or tower. The circuitry of the
system unit containing the primary components of a computer with connectors into which other
circuit boards can be positioned is recognized as motherboard.

Storage Devices

A computer can be utilized with only processing, memory, input, and output devices. To make it
very valuable, however, a computer also needs a place to hold program files and all related files
when they are not in use. The goal of using a storage is to keep data permanently.
There are many types of storage devices which include the flash disk drive, a small portable
storage device often referred to as pen drives, thumb drives, or jump drives. It has a memory
capacity of 2GB, 4GB, 8GB, 16GB, 32GB, 64GB, 128GB, 1TB, and now up to 2TB. Another type
of storage is the hard disk drive. Most personal computers have at least one non-removable
hard disk that is regarded as a non-volatile memory which permanently stores and retrieves data.

Another storage device is the compact disc. It is a flat, round, and portable metal disc. One type
of compact disc is a CD-ROM, which can be accessed using most CD and DVD drives. Another
type of compact disc is a DVD-ROM, which has enough storage capacity to store a full-length
movie.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 18 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Figure 1.16 Storage devices

Why Computers are Powerful

Computers are powerful for a variety of reasons. They work with remarkable speed, reliability,
consistency, and accuracy. Computers can store large amounts of data and information. Also,
computers allow users to communicate with other users or computers. A user is anyone who
communicates and interacts with a computer or makes use of the information it generates.

► Speed
In the system unit, operations get done through electronic circuits. When data, instructions, and
information drift along these circuits, they travel at incredibly fast speeds. Most computers bring
out billions of operations in a single second. The world’s fastest computer can perform trillions of
operations in one second.

► Reliability and consistency


The electronic components in modern computers are dependable because they have a low failure
rate. The high reliability of components enables the computer to produce consistent results.

► Accuracy
Computers process large amounts of data and generate error-free results, provided the data is
inputted correctly and the instructions work properly. If data is inaccurate, the resulting output is
also incorrect. A computing phrase known as garbage in, garbage out points out that the
accuracy of a computer’s output depends on the accuracy of the input.

► Communication
It is unbearable to go through a day without communication. Communication happens between
two or more people sending and receiving messages from one another. The one sending the
message is referred to as the sender while the one receiving the information is known as the
receiver. The message being transmitted can contain facts, thoughts, perceptions, judgments,
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 19 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
beliefs, attitudes, commands, and even reactions. For example, two computers connected by a
communications device, such as a modem, can share stored data, instructions, and information.
These two computers can be located in the same room or thousands of miles away from each
other in two different countries.

Classifying Computers
Computers can be classified based on size and computing power. However, as technology
advances, these classifications tend to overlap as modern computers have become smaller, yet
more powerful, and relatively cheaper.

The general classifications of computers are as follows:


 Personal computer - is a small, single-user computer based on a microprocessor. In
addition to the microprocessor, a personal computer has a keyboard for entering data, a
monitor for displaying information, and a storage device for saving data.
 Workstation - is a powerful, single-user computer. A workstation is like a personal
computer, but it has a more powerful microprocessor and a higher-quality monitor.
 Minicomputer - is a multi-user computer capable of supporting from 10 to hundreds of
users simultaneously.
 Mainframe - is a powerful multi-user computer capable of supporting hundreds or
thousands of users simultaneously.
 Supercomputer - is an extremely fast computer that can perform millions of instructions
per second. Below is a picture of NASA’s Pleiades supercomputer that has 245,536 CPU
cores and a total memory of 935 TB.

To compare, a computer with an Intel Core i3 processor, has only two cores for running its
programs and applications. Core i5 and i7 models usually have only four cores. Core i7 extreme
processors can have six to eight cores; however, most applications cannot use all the cores to
full advantage. Thus, they do not operate at full capacity. Imagine having more than 245,000
cores. How many applications and programs can your computer run in a second?

Computers are also categorized into several types due to the introduction of mobile devices and
the proliferation of internet- capable devices. Specialized computers are now classified according
to specific uses. The different types of computers are as follows:
 Desktop computers - are computers designed to be placed on a desk, and are normally
made up of a few different parts, including the computer case, central processing unit
(CPU), monitor, keyboard, and mouse.
 Laptop computers - are battery-powered computer devices whose portability makes them
possible to use almost anytime, anywhere.
 Tablet computers - are hand-held computers with touch- sensitive screen for typing and
navigation.
 Smartphones - are hand-held telephones which can do things that computers can do,
including browsing and searching the internet and even playing console games.
 Wearables - include fitness trackers and smartwatches that can be worn throughout the
day.
 Smart TVs - are the latest television sets that include applications present in computers.
For example, videos can be streamed from the internet directly onto the TV. The TV can
also be used as a computer monitor and gaming monitor.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 20 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Digital Age, Information Age, and Computer Age

Digital age, information age, and computer age, used interchangeably, capture the ubiquitous
nature of computing and the prolific use of technology in almost all aspects of human activity such
that digital interaction is a defining characteristic of human activity.
It is a period in human history characterized by the shift from traditional industry to information
technology-based economy brought by industrialization during the Industrial Revolution. The
definition of what digital means (or what information means) continues to change over time as
new technologies, user devices, and methods of interaction with other people and devices enter
the domain of research, development, and market launch.

This period is also characterized by the digital industry creating a knowledge-based society
surrounded by a high-tech global economy that exerts its influence on how the manufacturing
process and the service sector work in an efficient and convenient way.

Media in the Digital Age

Media normally refers to the means of communication that uses unique tools to interconnect
among people. The forms of media include television, radio, cellular phones, and internet (which
involves the access and use of various social media sites such as Facebook, Twitter, Instagram,
and YouTube, among others). In the digital age, however, media can be considered as the
message, the medium, and the messenger.

The Message

Media is considered to be the message itself for those who create and own the rights of content.
The forms of content can be user-generated or professionally-produced. User-generated content
(UGC) is a form of content created and owned by the users of a system. UGC has grown
exponentially especially with the wide internet coverage or easy WiFi access, increased social
media participation, and affordable smart devices.

Figure 1.18 Media as creative content


Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 21 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Below is one of the many examples of media tools used especially by millennials to generate
content.

► Blog
Keeping a diary or a journal is a traditional method of recording one’s thoughts or expressing
one’s emotions through writing. With the advent of the internet, expressing one’s feelings and
thoughts was given a new concept through online writing or blogging. A blog is a combination of
two words— web and log. It works the same way as pen and paper would but privacy becomes
irrelevant given that a blog post can be seen by anyone online. A person who writes blogs is
called a blogger.

One of the TV personalities in the Philippines who also does blogging to further express feelings,
thoughts, and opinions is Maine Mendoza, also known as “Yaya Dub,” in the Kalye Serye of the
noontime show “Eat Bulaga.”

Most recently, blogs have evolved into microblogs and video blogs. Microblogs have become
popular due to the rise of Tumblr and Twitter in which users instantly share limited content or
short messages. Now, with the increasing number of YouTube viewers, people have explored
uploading their own videos ranging from their travels and products reviews to any other random
topics. Some vloggers, Youtubers, or social media influencers even make money based on the
number of views they get and on the products they feature in their video blogs.

The Medium

The medium used refers to the tool or tools used in sending a message from the source to the
destination. Traditionally, for example, professionals send messages to the audience, such as a
news anchor delivering the news on TV and/or radio. However, with the latest technologies, the
so-called social media has become an avenue for information dissemination even taking over
news sites in bringing the latest or up-to-date content. One such example is Twitter. Users of this
application can constantly update other Twitter users about a certain topic. In this platform, Twitter
users can also share other users’ content (in the form of retweeting) and discuss any topic with
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 22 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
one another. Thus, the media, instead of just being an avenue for delivering messages, is
becoming increasingly social—with the audience themselves creating their own content and
interacting with one another.

The Messenger

The messenger is the one who delivers the message. This is why broadcasters, for example,
being the messenger of news are called “media.” In the digital space, however, does the “media”
also refer to social network users who create content themselves but are not professional
journalists? Hence, although the media can be the message, the medium, and the messenger,
in the digital age, the demarcation lines between them are somewhat blurry.

Evolution of Media

The media has transformed itself based on two things— (1) how information is presented; and
(2) how the connection is established. Woodcut printing on cloth or on paper was used in the
early 15th century. It was in 1436 when Johannes Gutenberg started working on a printing press
which used relief printing and a molding system. Now, the modern printing press delivers
messages in print, such as newspapers, textbooks, and magazines.

Figure 1.20 Printing press

In the 1800s, the telegraph was developed followed by the telephone which made the two-way
communication possible. Message sending and receiving can now be done both ways
simultaneously.

Figure 1.22 A screenshot from the 1902 French film


Figure 1.21 Telegraph in the 1800s Le Voyage dans la Lune (A trip to the moon)

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 23 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
At the beginning of the 1900s, broadcasting and recorded media were introduced. Radio and
television were used to send sound and video to homes and offices through electromagnetic
spectrum or radio waves. Audio (lower frequency band) or video (higher frequency band) content
can be received depending on the frequency used. Later on, a combination of both audio and
video information made the audience’s viewing experience more exciting. Films and movies
became popular as they catered to larger audiences.

As communication devices also evolved and became pervasive, so did information distribution.
A photo taken using a smartphone can immediately be uploaded and shared on Facebook,
Twitter, or Instagram. Community websites such as OLX.ph, a Philippine counterpart of
ebay.com, let its users buy and sell items online. This eliminates the need for going to physical
stores.

In line with this development, the audience regardless of their professions can now interact with
one another and are no longer disconnected. News sites can even get news stories for example
from Twitter or other social media sites. According to Claudine Beaumont, author from The
Telegraph, one good example of this happened on January 15, 2009, when dozens of New
Yorkers sent ‘tweets’ about a plane crash in the city. News about the US Airways Flight 1549
which was forced to land in the Hudson River in Manhattan, USA immediately spread all over the
country. All the plane’s engine shut down when it struck a flock of geese, minutes after takeoff
from New York’s LaGuardia Airport.

Figure 1.23 shows one of the first photos taken from a Twitter user, Janis Krums, showing the
drowned plane with survivors standing on its wings waiting for rescue. It was instantly forwarded
across Twitter and used by numerous blogs and news websites, causing the TwitPic service to
crash due to multiple views. In this regard, Twitter users were able to break the news of the
incident around 15 minutes before the mainstream media have alerted the public about the crash
incident.

This is a typical example of how individuals can now deliver content to everyone and connections
are no longer controlled by professionals.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 24 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Overview of Current Trends

A trend refers to something hip or popular at a certain point in time. It can be a particular style in
fashion, devices, or entertainment. A new trend may always come along to replace the old one.

Technology trends tend to change as time goes by. Following Moore’s Law, technology is bound
to upgrade itself every two years. In 1965, Gordon Moore predicted that the computing power
would dramatically increase over time. But as it increases, cost is expected to proportionally go
down. Nowadays, the two-year prediction has even decreased, with releases happening less than
two years, if not, yearly. Aside from cost, sizes of hardware have also decreased in making
devices, such as smartphones, more useful and dependable.

A few years ago, people would have a cellular phone, a digital camera, a portable music player,
and a laptop with them. They would use their phones to text and make calls, the digital camera
to take pictures, and the music player to listen to music while doing their work on their laptop.
Now, smartphones are capable of doing the aforementioned activities and a lot more through
applications or “apps” made available online. The term smartphone was coined as the cellular
or mobile phone has now become smarter—it can run apps which help people perform their day-
to-day activities. Apps turn mobile devices into miniature PCs capable of browsing the web, taking
down notes, and playing games, among others. By default, smartphones come installed with
basic apps such as making calls, sending text messages, playing music, and managing
schedules. As of 2017, Google Play has approximately 2.8 million apps available for Android
users, whereas Apple’s App Store is estimated to have 2.2 million. These apps are not just limited
to smartphones. They can be used in other mobile devices, including tablets and, another recent
trend, wearable devices.

In an article from Forbes.com, DeMers (2016) identified seven major trends in 2017.

1. IoT and smart home technology


The so-called Internet of Things (IoT) has been trending since 2016. The vision of IoT has evolved
due to the convergence of multiple technologies, including pervasive wireless communication,
data analytics, machine learning, and use of hardware technology such as sensors,
microprocessors, and microcontrollers. Controlling home appliances through a mobile phone—
such as switching the lights on and off, setting the timer for the washing machine, and controlling
the television to record shows that might be missed due to traffic—is now possible.

2. Augmented reality and virtual reality


In 2016, the release of games such as Pokemon Go and the anticipated VR headset, Oculus Rift,
served as a turning point for AR and VR technology.

3. Machine learning
Also called artificial intelligence, having machines decide for you seems to be a daunting task
and would probably make you think of robots and talking computers,
similar to Iron Man’s Jarvis. However, with the recent release of Apple’s iPhone X, it was not just
the design that improved. The iOS’ intelligent personal assistant, Siri, has also been upgraded
with enhanced learning making the use of iPhone more efficient. Its latest features include the
following:

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 25 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
 Face ID
The owner’s face is the new password. It is a more secure way to unlock the phone and keep the
data safe.

 All Bionic
All Bionic is claimed to be the “most powerful and smartest chip ever in a smartphone,” with a
neural engine capable of up to 600 billion operations per second. A neural engine, a type of
artificial intelligence, enables computers to learn from observation.

 Wireless charging
A cable is not needed to charge the device.

 iOS 11
In its latest operating system, one can scan documents in the notes app, edit live photos, and in
the U.S., even pay friends in Messages. Siri can also translate languages.

 Augmented Reality
AR is not just designed for fun. It is also meant for productivity and efficiency. It allows one to
navigate without looking at a map, visualize industrial equipment, and many others.

4. Automation
Through advanced technology, it is now possible to automate previously human-exclusive tasks.
This is very much evident through wearable devices such as step counters and heart rate
monitors used by health-conscious individuals. Information collected is automatically saved and
stored in mobile devices for analysis later on.

5. Big data
Big data is a term that describes large and complex volumes of data. But it is not how much data
an organization has it is what they do with it that matters. Big data can be analyzed for insights
which can help management make better decisions and come up with more effective strategic
plans. Waze is an example of an app which uses big data. The app helps users determine traffic,
direction and route estimations, and notifies users with accident alerts and road hazards, among
others.

6. Physical-digital integrations
Majority of organizations nowadays are moving towards system automation. As such, they
identify their physical elements and create digital data for more efficient operation and back-up.
The concept of having a “paperless company” in which transactions, reports, and services are
done using automated systems is one such example. Not only is it deemed reliable but also
environment- friendly.

7. Everything on demand
Due to the prevalence of network connectivity, it is possible to have information on demand.
Music, movies, and even drivers (e.g., Grab) are made available through the apps in a
smartphone.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 26 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Impact of ICT on Individuals, Organizations, and Society

ICT brings both positive and negative effects to individuals, organizations, and society. It
improves education, access to information, and security. However, it limits personal interaction
and physical activity and poses problems in employment and security.

Positive Effects

► Improved access to education


There are new ways of learning such as the use of learning management system (LMS) which
implements educational enhancements such as distance learning and online tutorials, virtual
reality, and interactive multimedia.

► Access to information and communication


The internet is widely used in communication. Access to it is getting better as it has become
available in almost all places such as commercial establishments and public spaces. New tools
have been promoted such as VoIP phone, Instant Messaging (IM), chat (e.g., FB Messenger,
Google Hangouts, Yahoo! Messenger, etc.), video chat (e.g., Skype, FB video chat, etc.), and
email. In addition, ICT has been maximized by most individuals nowadays for leisure and
entertainment such as watching movies, playing games, or even reading news and articles, and
for creating new relationships with people around the world.

► Security
With the advancement that ICT brings, individuals and organizations can solve any security
problems. Examples of security measure on applications are: (1) the use of encryption methods
to keep and protect data from any malicious software; (2) the use of password/s for personal
information protection; and (3) the development of physical security systems such as biometrics
in a form of fingerprint, facial recognition, iris (eye) recognition, and voice recognition.

Negative Effects

► Reduced personal interaction and physical activity


Because of virtual communication, ironically, people are less likely to talk to or meet each other
in person. And because of the comfort of working from home and the entertainment that the
internet offers (i.e., streaming movies, playing online games, etc.), physical activity is reduced
leading to health issues such as obesity and heart disease.

► Job loss or increase in unemployment


This can be considered as one of the worst effects of ICT.
 Multiple workers being replaced and reduced by a smaller number of employees capable
of doing the same volume of tasks
 Shipping or freight services in which a certain amount is added to the operating costs
for the physical process of transporting commodities or goods
 Automation through robots or machines replacing people in the assembly line

► Security
ICT brings not only improvement but also threat to security. Data or files must always be kept
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 27 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
secure and safe. The internet connection must always be safeguarded from different attacks such
as data modification, identity/IP address spoofing, password-based attacks, denial-of-service,
etc. Computers should also be protected from various forms of viruses and malware which are
released almost every day.

Ethical Issues in ICT


While some people apply ethical principles to the use of ICT, others simply do not, hence the
proliferation of cyber malpractices.
The following are some of the ethical issues in ICT:
1. Plagiarism - It is an act of theft in which a person copies another person’s ideas, words, or
writings, etc. and pass them off as his or her own. Those who committed such action may
lead to serious legal and ethical defilements.
2. Exploitation - It is an action in which one deals with a person dishonestly, unethically, and
dishonorably, in order to take advantage of the latter’s works and/or resources. This leads to
unlawful actions.
3. Libel - It can either be an insult, slur, or slander. Either written or spoken or even through
actions, it may lead to libel if the accusation is not true and without any piece of evidence.
4. Software Piracy: It refers to an act of installing or copying a software into the computer in the
absence of an end-user licensing agreement (EULA), and/or producing a copy disregarding
the copyrights.

CHAPTER KEY POINTS

 With the evolution of technology, people are now living in a period in which the economy is
based on information computerization. This industry that involves computers, software, and
networking, among others is called Information Technology (IT). It is a subset of Information
and Communications Technology (ICT) which pertains to the use of technology that supports
activities involving not only information such as gathering, storing, and presenting data, but
also collaboration and communication.
 The computer, being the main tool or equipment in IT, has evolved in many ways from the first-
generation computer to the present fifth-generation computer.
 The power of the computer, coupled with the introduction of the internet, cannot be
underestimated with its speed, reliability and consistency, accuracy, and ability to handle
communication.
 Communication and information creation and distribution have developed. Among the major
trends is the so-called Internet of Things (IoT), the expansion and application of networks and
internet to everyday objects. ICT, however, has both positive and negative impacts on
individuals, organizations, and society.

CHECKPOINT

Multiple Choice: Direction: Write your answer in a piece of paper and take a photo on it and
send it to your instructor. After that you have to compile it and put it in a white folder and pass all
your activity before final exam.

1. It refers to a technology that supports activities involving information, such as gathering,


processing, storing, and presenting data.
a. Communication c. Information
b. Information technology d. Information and communications technology
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 28 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
2. It refers to processed information that helps fulfill people’s daily tasks.
a. Communication b. Information c. Knowledge d. Technology
3. It is the technique of making an apparatus, a process, or a system operate automatically.
It includes a broad range of technologies connecting computer systems to other systems.
a. Automation b. Connection c. Network d. Server
4. It was considered as the first-generation computer that could store only limited or small
amount of information.
a. Advanced Research Projects Agency Network (ARPANET)
b. Electronic Discrete Variable Automatic Computer (EDVAC)
c. Electronic Numeric Integrator and Calculator (ENIAC)
d. Very large-scale integrated (VLSI) circuit computer
5. It is a type of an input device that lets you select options from on-screen menus.
a. Keyboard b. Mouse c. Trackball d. Scanner
6. It is referred to as the enclosure composed of the main elements of a computer used to
administer data.
a. Digital camera b. Personal computer c. Storage devices d. System unit
7. It is like a personal computer but it has a more powerful microprocessor and a higher-
quality monitor.
a. Mainframe b. Minicomputer c. Supercomputer d. Workstation
8. It is one of the ethical issues in ICT that occurs when a person copies another person’s
ideas, words, or writings, and pass them off as his or her own.
a. Exploitation b. Libel c. Piracy d. Plagiarism
9. This occurs when a person deals with another person dishonestly, unethically, and
dishonorably, in order to take advantage of the latter’s works and/or resources.
a. Exploitation b.Libel c. Piracy d. Plagiarism
10. It is the period in human history characterized by the shift from traditional industry that the
Industrial Revolution brought through industrialization, to an economy based on
information computerization.
a. Digital age c. Internet of Things
b. Information age d. Technopreneurship
TASKS
Group Activity
Prepare a 5- to 10-minute oral report about your group’s assigned electronic device by
answering the following questions:
1. Is the device a part of a computer system? If yes, is it a computer peripheral? If not, how
is this device classified?
2. Where do you usually see or use this device? Do you find it useful in your daily activities?
Why or why not?

Individual Activity
Search online for media outlets that use two or more modes of communication with their
customers. Examples are a news program on TV and a radio broadcast over the AM frequency.
Do a comparative analysis of the types of outlets the communication network currently
uses in terms of the following:
1. Content
2. Audience reach
3. Your personal preference

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 29 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
MODULE 2

COMPUTERS IN OUR DAILY LIFE

At the end of this chapter, the students should be able to:


 familiarize themselves with the computer number systems;
 discuss the role of the ASCII code in computer systems and explain how computers use it;
 examine how a computer’s system bus works;
 identify the different computer network systems and the wired and wireless connections;
 distinguish between system software and application software;
 compare and contrast a desktop app and a mobile app in terms of content, layout, and design;
and explain the impact of computers on daily life.

INTRODUCTION
HOW COMPUTERS WORK

The basic parts of a computer are the central processing unit (CPU), memory, a keyboard or
other input device, and a screen or other output device. How does a computer add or subtract,
and how can its memory remember the answers it computes? A computer does not have a human
brain inside but acts in many ways as though it does have a real one. However, while we
understand human language, the computer can understand machine language. When a person
types on the computer’s keyboard, the human brain identifies the letters, numbers, and characters
combined to create words and sentences. But the computer does not recognize letters as letters
of the alphabet; it sees the letters as a series of 0’s and l’s called the binary language.

Computer Number Systems


Humans use the decimal number system—to count, measure, and compute. The decimal
number system has ten digits, such as 1 , 2, 3, 4, 5, 6, 7, 8, and 9. A computer, on the other hand,
can only understand two digits—a 0 and a 1. These two numbers play an important role in the
way computers communicate with one another. This type of number system is called the binary
number system, with the prefix bi, which means 2. There are other types of number systems,
such as the octal number system (from the prefix octa, meaning it uses 8 digits) and the
hexadecimal number system (hexa means 6; deci means 10; meaning it uses 16 digits to
represent its values). However, these special number systems are merely a way to bridge the
computer’s binary language to a somewhat understandable human (decimal) language since
computer data can be complicated.
Table 2.1 Equivalent Number Systems Values
Decimal Binary Octal Hexadecimal Decimal Binary Octal Hexadecimal
0 0000 000 0 8 1000 010 8
1 0001 001 1 9 1001 011 9
2 0010 002 2 10 1010 012 A
3 0011 003 3 11 1011 013 B
4 0100 004 4 12 1100 014 C
5 0101 005 5 13 1101 015 D
6 0110 006 6 14 1110 016 E
7 0111 007 7 15 1111 017 F

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 30 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
How Computers Interpret Data

With the different types of number systems, it is important to understand how computers interpret
the letters on the keyboard ihrough a series of 0’s and l’s. This is normally done through ( l ie
number system conversion. Depending on the standard used, I'omputer systems convert
characters from the keyboard and later display them on the monitor. Refer to the following steps:
1. From the keyboard, pressure pads are typically found underneath each key. Upon typing
a letter, the pressure pad sends information to the CPU for processing.
2. The information is then transmitted in the form of 0’s and l’s using the ASCII code.
3. The CPU determines what character has been typed and sends the information to the
computer monitor, again in 0’s and 1 ’s.
4. The monitor displays the information in its equivalent character, this time readable and
understandable by humans.
Majority of computer systems use the American Standard Code for Information
Interchange (ASCII) for converting characters into 0’s and l’s. The ASCII code

A
is a 7-bit code used to represent letters, numbers, and basic special characters.

The uppercase character A’ as seen on the left is represented in ASCII as


0100 0001 in binary, 101 in octal, or 41 in hexadecimal system.

Below is a table showing the ASCII printable characters (as seen in your keyboard) represented
in decimal (Dec), hexadecimal (Hx), and octal (Oct) formats.

Table 2.2 ASCII Table


Dec Hx Oct Chr Dec Hx Oct Chr
32 20 040 Space 64 40 100 @
33 21 041 ! 65 41 101 A
34 22 042 ii 66 42 102 B
35 23 043 # 67 43 103 C
36 24 044 $ 68 44 104 D
37 25 045 % 69 45 105 E
38 26 046 & 70 46 106 F
39 27 047 1 71 47 107 G
40 28 050 ( 72 48 110 H
41 29 051 ) 73 49 111 I
42 2A 052 * 74 4A 112 J
43 2B 053 + 75 4B 113 K
44 2C 054 • 76 4C 114 L
45 2D 055 - 77 4D 115 M
46 2E 056 78 4E 116 N
47 2F 057 / 79 4F 117 0
48, 30 060 - 0 80 50 120 P
49 31 061 1 81 51 121 Q
50 32 062 2 82 52 122 R
51 33 063 3 83 53 123 S
52 34 064 4 84 54 124 T
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 31 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
53 35 065 5 85 55 125 U
54 36 066 6 86 56 126 V
55 37 067 7 87 57 127 w
56 38 070 8 88 58 130 X
57 39 071 9 89 59 131 Y
58 3A 072 90 5A 132 z
59 3B 073 i 91 5B 133 [
60 3C 074 < 92 5C 134 \
61 3D 075 = 93 5D 135 ]
62 3E 076 > 94 5E 136 A
63 3F 077 ? 95 5F 137
96 60 140 ' 112 70 160 P
97 61 141 a 113 71 161 q
98 62 142 b 114 72 162 r
99 63 143 c 115 73 163 s
100 64 144 d 116 74 164 t
101 65 145 e 117 75 165 u
102 66 146 f 118 76 166 V
103 67 147 g 119 77 167 w
104 68 150 h 120 78 170 X
105 69 151 i 121 79 171 y
106 6A 152 j 122 7A 172 z
107 6B 153 k 123 7B 173 {
108 6C 154 I 124 7C 174 I
109 6D 155 m 125 7D 175 }
110 6E 156 n 126 7E 176 ~
111 6F 157 0 127 7F 177 DEL

Notice how the characters are represented in decimal, octal, and hexadecimal formats. Computer
programmers create programs so that computers can do specific tasks. People who write
programs are programmers. Depending on the skills set of the programmer, a program can be
developed based on the programming language the programmer is familiar with. Another term
used for a program is codes. Writing programs is called programming or coding. However,
looking at a long string of 0’s and 1 ’s (binary format) might be considered too confusing for the
programmer, causing errors during coding. Take a look at the word “computer” in binary code as
seen by a computer:

01100011 01101111 01101101 01110000 01110101


01110100 01100101 01110010

A bit hard to read, right? The programmer might miss out on a few digits while creating a program.
Thus, to make it easier, machine codes are made “more human” by making them readable and
similar to the human language. This is identified with the different levels of programming
languages which will be discussed later in this chapter.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 32 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
So how does the computer know that 01100011 01101111 01101101 01110000 01110101
01110100 01100101 01110010 is the same as the word “computer”? Each character is converted
from the ASCII table’s hexadecimal, octal, or decimal presentation into binary language. For
example, the letter ‘c’ is equivalent to 63 in hexadecimal which when converted into binary is
equal to 01100011.

How Computers Communicate with One Another

Notice how the computer uses different ways to connect to certain devices. The computer
monitor uses a wire to connect to the computer unit while the mouse wirelessly connects to the
laptop, etc. Depending on
the situation, computers use different connection methods to do their tasks.

System bus

A computer system, on its own, communicates through what is called a system bus. A system
bus is a pathway composed of cables and connectors used to carry data from a computer’s
peripheral devices—monitor, keyboard, mouse, etc.—to the CPU and the main memory. There
are three types of buses: the data bus, address bus, and control bus.

Figure 2.2 Simplified diagram of a computer system implemented with a single system bus. This
modular organization was popular in the 1970s and 1980s.

For example, how does the computer know that the printer needs more ink? How does the mouse
cursor move along with the actual mouse? And how does the speaker produce sound in time with
the video displayed on the monitor?

Data bus
A data bus can transfer data to and from the memory of a computer, or into or out of the CPU.
Examples of pieces of information that traverse the data bus include files transferred from a flash
drive to the computer’s hard drive and a document sent to the printer for printing.

Address bus
The address bus is used by the CPU to specify a physical address for instructions, files, and other
devices within the computer system. For example, in a given computer unit, there are typically 6
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 33 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
to 8 USB ports. The address bus is responsible for checking which of the USB ports has a printer
connected to it, along with the mouse, keyboard, speakers, and, sometimes, even external drives.

Control bus
A control bus is used by CPUs to communicate with other devices within the computer system.
As the address bus carries the location of the data being sent and the data bus carries the actual
data being processed, the control bus carries the commands or instructions from the CPU. It also
sends status signals from the devices, identifying if it is ready or not. The typical read/write
commands are identified through the control bus. For example, if one tries to save a file to a flash
drive that is already removed from the computer, the computer will notify the user with an error
message saying that the folder or drive where the file is intended to be saved is no longer existing.

This is because the original destination or location can no longer be sent through the address
bus because of the disconnection. Therefore, the CPU sends a halt instruction via the control
bus, stopping the data to be sent through the data bus, often seen as an error message prompt.

The amount of data sent throughout the system bus depends on the size of the bus. Latest
computer systems use a 64-bit bus; however, the majority still use a 32-bit computing size for
their computer systems. Take note, however, that the mentioned computing size is on a hardware
level. Having an operating sys em or software application that is 32-bit or 64-bit is different. Again,
the hardware is different from the software. It is advised that if your computer hardware uses a
32-bit bus (hardware), use only software programs running 32-bits. This is to avoid the hardware
from overheating. Imagine a 32-bit bus computer working double time to make up for the excess
32-bits from a 64-bit application software. A 64-bit bus, on the other hand, can process either a
32-bit or a 64-bit software application.

How Computers Connect to Other Computers


The next step in knowing how a computer is able to connect to other devices is to understand
how a computer connects to another computer. Earlier, computer peripherals using wired or
wireless connections are mentioned. It is also similar when a computer wants to connect to
another computer—with or without wires.

Computer Network Systems


Computers are able to communicate with one another over networks. A computer network is an
interconnection of two or more computers. This interconnection gives these computers the
capability to share information and resources. There are several types of networks, mostly
depending on the number of computers in it, how they are used, and what type of technology is
used in its connectivity. Below are some of the computer network systems:
 Personal area network (PAN) - is a type of connection which is often limited to an individual
person and his or her personal devices. Normally, these devices must be within the range of
10 meters with each other. For example, a person traveling with a laptop, a smartphone, and
a portable printer could interconnect the devices without having to plug anything in, using
some form of wireless technology.
 Local area network (LAN) - is a connection in which a group of computers and other devices,
such as network printers, share a common communications line within a certain area such as
a building or a small campus. LANs are often found in schools and offices to secure the
organization’s information. This is done through a computer server in which user’s access
may be restricted to avoid unwanted users. For example, some schools use LANs within their
campuses so that students can connect to the internet to do online research. Students are
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 34 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
required to login their information (such as their student ID) to connect to the internet.
However, through the school’s campus server, restrictions to sites such as online games,
pornographic materials, and the like are implemented. This means that students will not be
able to access these websites inside the campus.
 Wide area network (WAN) - may be less restrictive than LAN as rules and policies may differ
within its coverage. A WAN may be made of several LANs and PANs. A WAN can also be
made up of several more WANs. This is why WAN is considered synonymous to the internet.

Methods of Communication
There are many different types of connection media that are used in contemporary society to
connect computer networks to one another. Connections are often categorized generally into
two—wired communication and wireless communication.

► Wired communication
Different types of cables are used to connect to a given network. There are coaxial cables, fiber-
optic cables, Ethernet cables, and traditional telephone lines. These will be discussed at length
in later chapters. This chapter focuses on a standalone computer system and the types of wired
connections that are available. Computer systems have different connections which usually
depend on the motherboard’s form factor. Popular wired connections nowadays include the
following:
USB Universal Serial Bus (USB) is a connection or interface that
allows the computer to communicate with system peripherals
such as keyboard, mouse, printer, etc. as well as other devices
like digital cameras and portable fans.
FireWire It is a type of connector that can transmit data to and from
devices which have typical high data rates, such as external
hard drives. The transfer speed of a FireWire is faster than that
of a USB.
Ethernet An Ethernet cable transmits signals between a computer and
cable network' devices such as a router, switch, or other computers.

HDMI High-definition Multimedia Interface (HDMI) is a connector for


transmitting audio/video data which are compatible to
computers, projectors, and digital televisions.

Older computer units have connections that include the following:


VGA The 15-pin Video Graphics Array (VGA) connector has been
provided on many video cards, computer monitors, laptop
computers, and projectors. It is now slowly being phased out in
favor of the faster and more compact HDMI connector.
Serial An RS-232 serial connection was once a standard feature of a
personal computer used for connections to modem, printer,
mouse, and other peripheral devices. Now, it has been replaced
by USB connections.
Parallel Similar to the serial connection, parallel connections were used
before to connect other computer peripherals such as printers. It
has also been replaced since then by the USB connections.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 35 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
PS/2 The PS/2 is a 6-pin connector used to connect the mouse and
keyboard to a computer. It is color-coded to identify which
peripheral will be connected to which port. Purple is for keyboard
and green is for the mouse.
Audio The audio jacks are the 3.5 mm jacks used for microphones (as
jacks input), and speakers (as output). It uses color codes as well to
indicate the type of input and output lines.
Pink: Mic in Blue: Line in
Green: Front speakers out
Black (or dark blue in some older boards):
Rear speakers out
Orange: Center/subwoofer out
Gray: Middle speakers out
These connections are now being replaced by USB and HDMI
connections.

► Wireless communication
Wireless communications include microwave transmission, satellite communication, cellular
transmission, and radio transmission such as WiFi connectivity. Wireless technologies differ
hugely from one another, but the most popular types are Bluetooth and Wi-Fi. The Institute of
Electrical and Electronics Engineers (IEEE), a professional technical association with members
all across the globe, identified standard 802.11 for Wi-Fi and 802.15 for Bluetooth in the wireless
standards.

►Wi-Fi
Wi-Fi uses radio waves to wirelessly transmit information across a network. Wi-
Fi’s signals are transmitted in frequencies of between 2.5 and 5 gigahertz (GHz),
which are higher than radio and TV signals to avoid interference. Wi-Fi is often
used in schools, companies, and business establishments, among others. This is
to provide network connections to multiple users without the need for cables.
Majority of Wi-Fi users use mobile devices, such as tablets, laptops, and
smartphones to connect via an access point or Wi-Fi hotspot.

► Bluetooth
Bluetooth uses radio waves to connect to other devices. The connection via
Bluetooth is called pairing. Once paired, devices are able to send and receive
information provided they are within a given range which is typically 10 meters.

How Humans Communicate with Computers

Reading a long string of 0’s and l’s can be very confusing and taxing. As such, people who
invented the computer identified two areas in computer systems—computer hardware and
computer software. Through computer software, humans are able to “communicate” with the
computer.

Computer Software
The computer software is a combination of instructions, data, and programs that the computer
needs in order to do a specific task. Another term used for computer software is computer
programs. Everything the computer does can basically be controlled through these programs.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 36 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Programs are a set of codes or instructions which are usually designed or written by computer
programmers using a specific programming language. The most common type of programming
language used by programmers is called object-oriented programming. This programming
language includes Microsoft’s C# (pronounced as ‘see-sharp’), Sun Microsystem’s Java, and an
open-source programming language, PHP (Hypertext Preprocessor). Programmers have
developed two types of computer software—the system software and application software.

People might be more familiar with the application software as most of the day-to-day
tasks done in front of a computer involve the use of application programs (e.g., typing a school
assignment using Microsoft Word, editing a photo using Adobe Photoshop, browsing through
Facebook using Google Chrome, or listening to music using Apple’s iTunes). The system
software also called an operating system (OS) is the most important software running on a
computer since it manages the computer’s memory and instructions and has the ability to control
all the connected hardware and installed software applications.
The OS allows a person to interact with the computer—from the hardware components and
peripherals to all the installed software applications and files one has stored on the computer.
The interaction can occur in two ways:
1. By using a command-line operating system (e.g., DOS) in which the computer responds
according to the text command that is typed
2. With a graphical user interface (GUI) operating system (e.g., Windows) such as pictures
and buttons through mouse clicks and keyboard entries

System Platforms
Desktop systems differ from mobile systems in terms of how each platform treats the
application software installed in the system. A desktop or a laptop computer usually needs an
application program to run a certain application on it, or possibly, multiple ones at the same time.
A typical example is that of a web browser capable of running multiple web sites with different
“applications” all at the same time. In this scenario, Google Chrome is open as the user waits for
an email from a friend via Gmail, while another browser tab has YouTube open as he or she
watches video tutorials. Another browser tab with Wikipedia open is possible as the user is also
researching on different computer peripherals. All of these websites are accessed using a single
web browser. A web browser is considered to be an application software. However, this scenario
is typically played within a desktop platform.

Using a smartphone in accessing the same websites is a different experience. Instead of using a
web browser to access all three web sites, mobile applications are used. Mobile applications
have the capacity to run directly on top of the operating system without using web browsers.
Facebook, YouTube, and Gmail are typical examples of desktop applications that have mobile
counterparts.

System Software
Two of the most popular desktop system software or OS nowadays are Microsoft’s Windows and
Apple’s macOS. In mobile devices, Apple uses iOS for their devices’ system software. But while
Microsoft is also using Windows for their mobile devices’ operating system, it is not the leading
mobile OS in the world, compared to its desktop counterpart. According to the International Data
Corporation (IDC), the most popular mobile operating system as of 2016 is Android OS, acquiring
85% of the global market (IDC, 2017).

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 37 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Applications Software
The table below identifies the different types of application programs and their corresponding
software that are available in the market.

Table 2.4 Different Types of Application Programs


Application Program Type Examples
Word Processing Software Microsoft Word, WordPad, and Notepad
Database Software Oracle, Microsoft Access, etc.
Spreadsheet Software Apple Numbers, Microsoft Excel
Multimedia Software Real Player, Media Player
Presentation Software Microsoft PowerPoint, Keynote
Enterprise Software Customer Relationship Management Systems
Information Worker Software Documentation tools, Resource Management tools
Educational Software Dictionaries: Encarta, Britannica Mathematics: MATLAB
Others: Google Earth
Simulation Software Flight and Scientific Simulators
Application Suites OpenOffice, Microsoft Office
Software for Engineering and Integrated Development Environments (IDE)
Product Development

Online Applications Software


As previously discussed, application software consists of programs that are designed to perform
specific tasks for users. Specific application software products, called software packages, are
available from different vendors. Usually, these software packages cost money although a lot of
application software is now being made available for free. Often called shareware, freeware, or
public-domain software, this software can be downloaded for free but usually with fewer
capabilities compared to the ones sold.
As such, online application software is now introduced with the improved internet speed being
made available to consumers. There are various products available including software tools that
were previously identified only as computer applications.

Tomsguide.com has also listed down several popular applications available in the App Store
and Google Play that can increase productivity, improve efficiency, and provide convenience.
Below are just some of the apps on their list:
1. Any. do - a scheduler and reminder notification app
2. Microsoft Office Word, Excel, and PowerPoint - available for free download in both Android
and iOS
3. WPS Office - another office productivity suite that does the same as Microsoft’s Word, Excel,
and PowerPoint
4. Adobe Acrobat Reader - a PDF reader and annotation app which lets you view and sign PDF
forms
5. Microsoft Outlook - for reading emails, managing contacts, and calendar
6. Newton Mail - for accessing all email accounts in one “unified inbox”
7. Forge - a mobile drawing app that allows the user to create sketches and edit photos

Lastly, people who have no IT background can now create their own blogs and websites through
online tools which provide web hosting and web content management. They do not need to
learn programming languages, although some knowledge in programming will be an advantage
to further customize the web layout.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 38 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Wix.com and WordPress.com are two of the most popular website creation tools available
online. Both tools offer blogging and website content management system (CMS). Users do not
need to be programmers due to the simple and easy-to-use design of the CMS.

Table 2.5 Comparison between WordPress and Wix Application for Web Development
Wordpress Wix
Programming language Uses PHP, HTML, and CSS Uses HTML5
used
Development process Uses web templates and template Uses online drag and drop
processors tools

How Computers Impact Everyday Life


The advent of technologies specifically the development of information and communications
technology has changed the lives of people. Computers, for example, permeate everyday life as
they are used in various fields—in schools, malls, and hospitals, among others. The following
areas show how computers have made such an impact.

Education
Today, most elementary and secondary schools (public and private) and higher education
institutions (HEIs) have computers in their classrooms. ICT in general has made things
convenient and efficient for teachers, students, researchers, and school administrators.

Electronic learning (e-learning) is the newest teaching methodology in which students and
teachers can communicate and collaborate with each other through online discussion of their
lessons, activities, and examinations. Such examples are Blackboard, Edmodo, Moodle, etc.

Banking
The computer has made all banking transactions around the world easier and more secure. It
manipulates the entire banking system as it includes 24-hour electronic banking services. The
services include:
 Automated teller machine (ATM)
 Cheque deposit
 Electronic fund transfer
 Direct deposit
 Pay by phone system
 Personal computer banking/internet banking

Workforce Industry

Workers, researchers, and administrators benefit from ICT. Computers are used to expedite
production planning and control systems, to support chain management, and to facilitate product
design in the industrial sector. Machines that are fully computeroperated are now used.
Researchers use computers to gather and analyze data for hypothetical reference while
administrators use computers to manage the entire operations of the plant or factory to detect or
anticipate explicit errors or deficiencies that transpire in the process. Some of the large industrial
companies that implement ICT include Toyota Philippines, Honda Philippines, and San Miguel
Corporation.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 39 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
However, the use of ICT can be perceived as a threat to assembly-line and factory workers as
robots or fnachines take over their jobs.

Figure 2.4 Computer-operated machines (CNC)

Electronic Commerce

Electronic commerce or simply e-commerce helps boost the economy. With computers, internet,
and shared software as the main tools needed, buying and selling activities are made easier,
more efficient, and faster. Customers, sellers, and suppliers all benefit from the capabilities of
ICT. Some of the known e-commerce markets are Zalora, Lazada, Shopee, Metrodeal, Takatack,
Amazon, OLX.ph, AirBnB, Booking.com, Agoda.com, and many others.

Customers or clients use computers to communicate with sellers. This method can save time and
cost as consumers do not have to go physically to any outlets or department stores. Suppliers,
on the other hand, use computers in keeping track of their transactions which include the
monitoring of inventory.

Hospitals
The use of computers in hospitals offers many benefits to both doctors and patients. Hospitals
are creating patients’ databases of health records, treatment records, and medical records. Also,
with the help of ICT, doctors use computers and various medical applications not only for research
advancement but also for faster diagnosis of patients’ illnesses. Through computing and
monitoring technologies, tests administered in hospitals such as blood test, urine test, brain
testing, ultrasound, echocardiography, complete blood count (CBC), mammography, bone
density study, magnetic resonance imaging (MRI), X-rays, and body scanning, among others are
made possible. With the development of databases and other applications, ICTs prevent medical
errors in particular and improve the efficiency of the health system in general.

CHAPTER KEY POINTS


 The computer understands machine language, but it does not recognize letters as letters of
the alphabet. It sees letters as a series of 0’s and l’s called binary language.
 Computers understand one another through the binary number system which represents
numbers with 2 as its base and uses only the digits 0 and 1. Other number systems are octal
number system and hexadecimal number system.
 Computers use different connection methods (e.g., system bus, data bus, address bus, and
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 40 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
control bus) to do their tasks.
 A computer network is an interconnection of two or more computers that gives these computers
the capability to share information and resources. Some of the computer network systems are
personal area network (PAN), local area network (LAN), and wide area network (WAN).
 Computer network connections are categorized into wired communication and wireless
communication.
 The computer software is a combination of instructions, data, and programs that the computer
needs in order to do a specific task. Through computer software, humans are able to
“communicate” with computers.
 As computers permeate everyday life, they have made an impact to education, banking,
workforce industry, electronic commerce, and hospitals, among others.

CHECKPOINT

Multiple Choice: Direction: Write your answer in a piece of paper and take a photo on it and
send it to your instructor. After that you have to compile it and put it in a white folder and pass all
your activity before final exam.

1. It is a method of representing numbers that has 2 as its base and uses only the digits 0 and
1; each successive digit represents a power of 2.
a. Binary number system c. Decimal number system
b. Hexadecimal number system d. Octal number system
2. It refers to the interconnection of information technology devices within the range of an
individual person, normally, within the range of 10 meters.
a. Local area network (LAN) c. Metropolitan area network (MAN)
b. Personal area network (PAN) d. Wide area network (WAN)
3. It refers to the pathway composed of cables and connectors used to carry data between a
computer’s peripheral devices.
a. Address bus b. Data bus c. Control bus d. System bus
4. It is a type of bus that is used by the CPU to specify a physical address for instructions, files,
and other devices within the computer system.
a. Address bus b. Data bus c. Control bus d. System bus
5. The CPU sends a ___________ via the control bus, stopping the data to be sent through the
data bus, and often seen as an error message prompt.
a. halt instruction c. validation message
b. system platforms d. wired communication
6. This is a broad term that incorporates all procedures and forms of connecting and
communicating between two or more devices using a wireless signal.
a. Processed communication c. Wired communication
b. Wireless communication d. WiFi
7. It hosts the application software installed in the system.
a. Ethernet b. FireWire c. Bluetooth d. Platform
8. It is type of connector for transmitting audio/video data compatible with computers, projectors,
and digital televisions.
a. Asynchronous transfer mode (ATM) c. High-definition Multimedia Interface (HDMI)
b. Serial advanced technology attachment (SATA) d. Video Graphic Array (VGA)
9. It involves the use of a computer or electric device in delivering instruction to students.
a. Electronic commerce c. Text-to-speech programs
b. Electronic learning d. Video conferencing
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 41 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
10. It is a geographically distributed private telecommunications network that interconnects
multiple local area networks (LANs).
a. Metropolitan area network c. Storage/System area network
b. Wireless local area network d. Wide area network

TASKS

A. Group Activity
I. Work with the same grouping. Discuss among yourselves how the Pass the Message game
relates to the chapter discussion by answering the following questions:
1. What was the pass code in the game for? Why is it important to have a “pass code” in a
computer system?
2. How was the concept of wired and wireless connections applied in the game? Which one
do you consider wired? Wireless?
II. Imagine life without computers. How is it like? Now imagine the future with everything going
computerized or digital. How is it like?

Create a meme showing either of the two scenarios. A group representative should post it on
Facebook. Let your instructor and classmates comment or react on it.

b. Individual Activity
Search online for an application that has both a web version and a mobile version. Compare and
contrast the versions in terms of content, layout, and design. For class presentation, create a
poster highlighting the differences between the two.

REFERENCES
Haynes, M. & Brown, R. (n.d.). Everything computers of S.C., Inc. Retrieved from
http://everythingcomputersofsc.com/index. html
Hope, C. (2017, August 8). Computer vs. smartphone. Retrieved from https: / /www.
computerhope. com/issues/chOO 1398. htm
IDC. (2017, August 2). Smartphone OS market share, 017 Ql. Retrieved from
http://www.idc.com/promo/smartphone- market-share/os
Rouse, M. (2005, April). ASCII (American standard code for information interchange).
Retrieved from http://whatis. techtarget.com/definition/ASCII-American-Standard-Code-
for-Information-Interchange
Rouse, M. (2007, May). Personal area network (PAN). Retrieved from
http://searchmobilecomputing.techtarget. com/definition/personal-area-network
Schindler, E. (2017, July 17). The best online survery tools of 2018. PCMag. Retrieved from
http://sea.pcmag.com/cloud- services/8140/guide/the-best-online-survey-tools-of-2017
Sharma, V. (2016, November 2). Top 10 uses of computers in our daily lives. Retrieved from
http://www.klientsolutech.com/uses-of- computer-in-our-daily-life
Tlshopper.com. (2003-2017). Conversion calculator. Retrieved from http://www.tl
shopper.com/tools/calculate

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 42 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
MODULE 3

The Internet and World Wide Web

At the end of this chapter, the students should be able to:


 trace the history of the internet;
 identify the ways to access and connect to the internet;
 analyze how data travels through the internet;
 perform search functions on the web; and
 create a personal web page.

OPENING ACTIVITY
Film Viewing
 Watch the video from TED.com explaining the World Wide Web.
 Video link: https://ed.ted.com/lessons/what-is-the-world- wide-web-twila-camp
 How does the web reflect the society and the individuals?

INTRODUCTION
The Internet

The internet (capitalized as ;n Internet when it first came into widespread use) is defined as a
worldwide network connecting to a million of computers via dedicated routers and servers. When
computers are connected to the internet, end-users could start sending and receiving different
types of information. These types of information can be sent and received via electronic mails
(emails), text or video chats and/or conferencing, and computer programs, among others.
Now, most telephone companies all over the world also function as internet service providers. In
the Philippines, the PLDT, Inc. (formerly known as Philippine Long Distance Telephone
Company) is the largest network company; Smart Communications, Inc. and Digitel Mobile
Philippines, Inc. (commercially known as Sun Cellular) are collaborating with PLDT while Globe
Telecom has acquired Bayan

Telecommunications (commonly known as BayanTel or Bayan). These telecommunication


companies use high-speed fiber-optic cables to transmit data. But no one actually owns “the
Internet.” Large internet service providers own infrastructure through which internet is delivered.
Today, according to the 2018 Global Digital suite of reports from We Are Social and Hootsuite,
there are more than 4 billion people anywhere in the world connecting to the internet for various
reasons. Some of the uses are illustrated in Figure 3.1.

Figure 3.1 The many uses of internet

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 43 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
The Internet: Then and Now

Even though today’s internet bears little resemblance to its forebear of almost 50 years ago, it
still functions in basically the same way. The internet has evolved into something different from
the special-purpose, restricted-use network its planners originally envisioned it to be (Norton,
2012).

The Internet started from the Advanced Research Projects Agency’s Wide Area Network which
is called the ARPANET. This was established by the U.S. Department of Defense in the 1960s
so that the military’s research unit could collaborate or partner with business and government
laboratories.

Figure 3.2 Before it became known as the Internet, ARPA’s network served universities,
defense contractors, and a few government agencies. Source:
https://www.timetoast.com/timelines/computer-history-timeline-67

Afterwards, other universities and U.S. institutions were connected to ARPANET that resulted in
the growth of ARPANET different from everyone’s expectations. ARPANET then attained the
name of “Internet.”

The advancement of hypertext-based technology known as World Wide Web, WWW, or just
simply as the Web has provided the channels for displaying text, graphics, animations, etc. Its
other features of enabling easy search and offering navigation tools prompted the internet’s
unpredictable worldwide growth.

The Internet2 Environment: Future Empowerment


Internet2 is a not-for-profit networking consortium founded in 1996 by 34 university research
institutions in the U.S. It provides a collaborative environment where U.S. research and education
organizations work together and develop advanced technologies and innovative solutions such
as telemedicine, digital libraries, and virtual laboratories to assist education, research, and
community development.

Internet2 manages the Internet2 Network, a next-generation optical and internet protocol
network that is capable of delivering enhanced network services and is better, faster, and more
efficient than the typical internet or broadband connections. Internet2 maintains a secure network
testing and research environment. It began operating the Internet2 DCN (dynamic circuit
network), an advanced technology that allows user-based allocation of data circuits over the fiber-
optic network.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 44 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
As of May 2016, this community comprises 317 U.S. higher education institutions, 81
corporations, 64 affiliates and affiliate members, 43 regional and state education .networks, and
more than 65 national research and education networking partners representing over 100
countries.

The Philippines, via the Philippine Research, Education and Government Information Network
(PREGINET), is among the international peers reachable via Trans-Eurasia Information Network
(TEIN), one of the Internet2’s peering relationships. Just in August 2017, a national training
course on nuclear neurology was held in which nationwide webcast among hospitals was made
possible through the high-speed connectivity provided by PREGINET and the video conference
server hosted locally at the Department of Science and Technology-Advanced Science and
Technology Institute (DOST-ASTI). By supporting telemedicine or telehealth in the country, this
information infrastructure, therefore, enables Philippine hospitals to keep abreast of new medical
diagnostics and world-class treatment options without having to travel abroad.

Internet Today: Still Growing


Today, the internet connects thousands of networks and billions of users around the world. The
number of internet users as of January 2018 is 4.021 billion which means that more than half of
the world’s population is now online as revealed by We Are Social and Hootsuite in their 2018
Global Digital suite of reports. Despite this huge number, the internet has no central ownership.
It means that no single person or group controls the network..

Jobs the Internet Can Do

Internet users may wonder about the jobs that the internet can do. However, there is only one
simple job that the internet does, and it is to move, transfer, or assign a computerized information
from one place to another. This information can be in the form of text documents, images, audio,
video, and software programs, among others. All this information is known as data. The internet
can handle different kinds of information and assist people to perform various jobs—from the
simple tasks of handling of email, searching on websites, and sending chat messages to the more
sophisticated function of creating websites and programming possible through various software
programs.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 45 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
How Data Travels the Internet

Data and information are transferred around the world through wired or wireless transmission
media. In the Philippines, the transmission media that make up the internet backbone allow
information or data exchanges between networks at several locations across the country, such
as La Union in the northern part, and Batangas, Cavite, and Davao down south. The highspeed
equipment in these sites functions similarly to a highway interchange. Data is transferred from
one network to another until it reaches its final destination (see Figure 3.4).

Much of internet runs on the ordinary public telephone network. However, there is a big difference
between how a telephone call works and how the internet carries data. For example, friend A
gives friend B a telephone call; the telephone then opens a direct connection (also known as the
circuit) between friend As home and friend B’s home. In this scenario, a direct line can be pictured
out, running along miles of cable, from friend A’s telephone to friend B’s telephone. As long as
the two friends are over the telephone, that connection or circuit stays open between the two
telephones. This method of linking the telephones together is called circuit switching.

Figure 3.4 How data is sent through the internet

Circuit switching is one of the most common schemes utilized to build a communications network,
such as the case of ordinary telephone calls. Circuit switching, however, is inefficient because if
you stay connected with your friend or relative over the phone all the time, the circuit is still
connected, and is, therefore, blocking other people from using it. A traditional dial-up connection
to the net, in which a computer dials a telephone number to reach the internet service provider,
uses circuit switching. This appears inefficient because browsing the internet and using the
telephone at the same time are not possible.

As time goes by, technologies are improved and developed as well. Most data that moves over
the internet in an entirely different way is called packet switching. This is a mode of transmission
in which the message is broken into smaller parts (called packets) which are sent independently,
and then reassemble at the ultimate destination. Suppose an email from the Philippines is sent
to someone in South Korea, Singapore, Thailand, China, Italy, the U.S. and other countries.
Instead of having a knotty circuit between the home in the Philippines and those in the mentioned
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 46 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
countries, and sending the email in one go, the email is “broken” into tiny pieces (happens at the
back of the system). Theoretically, these packets are assigned their ultimate destination. They
travel via different routes, and when they reach their definitive destination, these packets will then
reassemble to make the email message one and complete.

Compared to circuit switching, packet switching, therefore, is much more efficient. A permanent
connection is not necessary between the two places communicating, which avoids blocking the
entire chunk of the network each time a message is sent. The table below shows the differences
between circuit switching and packet switching.

Table 3.1 Comparison between Circuit Switching and Packet Switching


Switching Pros Cons Key Features
Method
Circuit It offers a Dedicated channels can It offers the capability of storing
Switching dedicated cause delays because messages temporarily to reduce
transmission a channel is unavailable network congestion.
channel that is until one side
reserved until it is disconnects. It uses a
disconnected. dedicated physical link
between the sending
and receiving devices.
Packet Packets can be Packets can get lost The two types of packet switching
Switching routed around while taking alternative are datagram and virtual circuit.
network routes to the Datagram packets are
congestion. destination. Messages independently sent and can take
Packet switching are divided into packets different paths throughout the
makes efficient that contain source and network. Virtual circuit uses a
use of network destination information. logical connection between the
bandwidth. source and the destination device.

What Computers Do on the Internet

Computers do different jobs on the internet. Some computers work like electronic filing cabinets
that store information and send it when clients request so. These are called servers.

A server is a computer that is designed to process any requests for data and delivers data to
other client computers over a local network or the internet. A client is a computer or device that
gets information from a server. Any computer running with special software can function as a
server, and servers have different roles to play. A computer that holds the user accounts,
computer accounts, organizational units, and application services is called the Active Directory
Domain Services (AD DS). Another machine that helps the Dynamic Host Configuration Protocol
(DHCP) server is a server that configures IPv4 and IPv6 addresses specifically in giving names
to each IP address up to its root recognition which is called domain name system (DNS) server.
Another machine that holds and manages documents is known as the file server while the other
one that holds users’ mail services and Web services is referred to as Web Server II. A device
that connects printers to client computers through the internet is called a print server. It accepts
print jobs from the computers, queues these jobs, and sends them to the appropriate printers.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 47 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Besides clients and servers, the internet is made up of a hardware device designed to receive,
analyze, and send incoming packets to another network. This is called router. Having several
computer devices both at home and in school, you probably have a router that connects all of
your devices to the internet. The router can be compared to a simple mailbox placed at the corner
of a street and which represents your single point of entry to the worldwide network.

The World Wide Web

The World Wide Web (WWW) is referred to as the collection of public websites that are
connected to the internet worldwide, together with the client computers which include personal
computers, laptops, iPads, and cellular phones that access its content.

Web Technologies
The WWW is considered to be one of the applications in the internet and computer networks.
This is based on three fundamental technologies that are said to be part of the WWW
development:
 Hypertext markup language (HTML) - is a standard markup language used for creating web
pages. HTML is classified as the set of markup symbols or codes appended in a file intended
for presentation on a World Wide Web browser page.
 Hypertext transfer protocol (HTTP) - is classified as the set of standards allowing users of
the World Wide Web to interchange information seen on web pages. Port 80 is the standard
port for HTTP connections.
 Web servers and web browsers - is a software application for recovering, presenting, and
navigating information resources on the World Wide Web. There are different browser
applications that are currently used in the WWW such as Microsoft Edge, Google Chrome,
Internet Explorer, Mozilla Firefox, Safari, and more.

The World Wide Web Today


Last March 12, 2017, WWW turned 28 years, a milestone that recalls the invention of the WWW
which has changed humanity forever, and developed a new virtual world within a generation.

There are known websites that enhanced their features in terms of design and development style
to adapt to the speedily growing techniques of the users’ way of retrieving the Web from large
screen computers to small-screen mobile phones.

It is observed and shown that the way the Web works is reasonably simple having its four basic
stages: connection, request, response, and close. The first stage is where many users access
the browsers such as Internet Explorer, Google Chrome, and Mozilla Firefox (some of the most
used browsers) to connect to the Web server. Browsers work by using a unique protocol known
as the HTTP which demands a particular programmed text from the web server. The text is
actually written in HTML format that informs the browser on how it will display the text on the
user’s screen. Different technical terms are used in explaining how the Web works. One of the
most important terms to know is the uniform resource locators (URLs) which is sorted as the
internet address. A URL contains four parts, namely the protocol identifier which indicates the
protocol to use, the domain name which specifies the IP address where the resource is located,
the path, and the file name (Mitchell, 2017).

According to W3Counter, a free unit counter that offers website analytics, Chrome is the most
used web browser with (60.6% share) as of March 2018. Among other web browsers in the list
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 48 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
are Safari (15.4%), Internet Explorer and Edge (7.6%), Firefox (7.2%), and Opera (2.9%).

Searching for Information on the Web

A website is maintained by its owner, called a web administrator. The owner can modify the
website content as well as add new information in it. However, no single organization controls
additions, deletions, and changes to all websites. This means there is no single repository for all
the websites found on the internet. Several companies, however, maintain organized directories
of websites to help people find information about specific topics (Shelly, Cashma, & Vermaat,
2011).

There are two mainly managed search tools that people use in locating information on the web:
subject directories and search engines. Subject directories are developed and maintained by
human editors and not by electronic spiders or robots that are used to fetch web pages
automatically. A search engine, on the other hand, uses small programs called spiders or bots
(like Googlebot, Yahoo Slurp, and MSNbot) that polish the internet, follow links, and return
information to the search engine’s indicator.

If you enter a phrase with spaces between the words in the search text, most search engines
return links to pages that include all of the words. There are several techniques that can be used
to improve web searches such as:
 Using specific words and placing the most important terms first in the search text or phrase
 Using quotation marks to create exact phrases—this helps the search engine find what it
is looking for by using the exact sequence of words
 Listing all possible spellings, for example, organization and organisation

In addition to searching for web pages, many search engines allow searching for images, news
articles, and various reports in different formats.

One of the most popular search engines now is Google. Below is an overview of some of the
most useful Google search tricks released in 2016, from basic tips to new features.
1. Use quotes to search for an exact phrase - By typing in double-quotes (”) at the start
and end for a certain word or phrase, Google will provide the exact word or phrasing you
need.
2. Use an asterisk within quotes to specify unknown or variable words - the asterisk
symbol (*) will provide possibilities. It is helpful, for example, if you are trying to determine
a song from its lyrics, but you forgot some of the words or if you are trying to complete a
sentence, but could not remember what it was.
3. Use the minus sign to eliminate results containing certain words - While the asterisk
gives you possibilities, the minus sign (-) eliminates results of certain words. Just type the
minus sign prior to the word you do not want to include in the search.
4. Search websites for keywords - You can specify certain content, format, or files you want
Google search to provide. For instance, if you want to specifically search for PDF files
regarding a certain topic, simply type the keyword PDF followed by a colon symbol (:) and
the topic you are searching for.
5. Compare using “vs” - By using the “vs” or “versus” between two words you want to
compare, Google will provide an in-depth analysis of the two words, such as pointing out
similarities and differences.
6. Use “DEFINE:” to search for the meaning of words— slang included - The “DEFINE:”
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 49 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
keyword provides a dictionary definition of a word. Also, you will be able to see etymology
and a graph of its use over time.
7. Search images using images - Using your mobile device’s camera, you can search for
images online by going to Google Images, activating your camera phone and taking a
picture of the image you are searching for. Google will provide you with similar images on
the web.

CHAPTER KEY POINTS


 The Internet started with the so-called ARPANET which was established by the U.S.
Department of Defense in the 1960s so that the military’s research unit can collaborate or
partner with business and government laboratories.
 Circuit switching and packet switching are the two modes of data transmission.
 Existing for almost three decades, the World Wide Web or WWW has developed a new
virtual world within a generation.
 Some websites have enhanced features to adapt to the speedily growing techniques of
the user’s way of retrieving the Web from large screen computers to small-screen mobile
phones.

CHECKPOINT

Multiple Choice: Direction: Write your answer in a piece of paper and take a photo on it and
send it to your instructor. After that you have to compile it and put it in a white folder and pass all
your activity before final exam.

1. It is used primarily for direct hardware manipulation and direct access to specialized
processor instructions. It is also used to address critical performance issues.
a. Assembly language c. Machine language
b. Human language d. Programming language
2. It is the method that the internet uses to store domain names and their corresponding IP
addresses.
a. ADDS b. DHCP c. DNS d. FTP
3. It is the tool used to access the internet.
a. Web browser b. Web community c. Web page d. Website
4. This refers to a collection of related web pages and associated items, such as documents
and pictures, stored in a web server.
a. Web browser b. Web community c. Web navigator d. Website
5. It allows the user to write a letter, design a flyer, and create other types of documents.
a. Microsoft Word b. Notepad c. Wizard d. Word processor
6. This refers to the process of broadcasting original content on the internet.
a. Hosting b. Navigating c. Paging d. Publishing
7. It is a set of instructions and operations for a computer to perform certain tasks.
a. Host b. Interpreter c. Program d. Programmer
8. It is a not-for-profit networking consortium in the U.S. which aims to improve the internet,
such as relieving bottlenecks in the current architecture.
a. Domain b. Infrastructure c. Internet2 d. Schema
9. It is a programming language that provides little or no abstraction from a computer’s
instruction set architecture.
a. Computer language c. Human language
b. High-level language d. Low-level language
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 50 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
10. It is a programming language that enables a programmer to write programs that are more
or less independent of a particular type of computer.
a. Computer language c. Human language
b. High-level language d. Low-level language

TASKS

A. Group Activity
 Form a group of at least five members. Make a list of your top 10 favorite websites and
identify the reasons for choosing them. Indicate how often you visit those websites, why
you visit them, and how these sites affect your daily life.
B. Individual Activity
I. Perform a search using the same keywords with Yahoo! and Google. Then, compare and
contrast the search results. What did you find out? Share your findings with the class.
II. In this exercise, you have an option of the programming languages you wish to use to create
a simple personal web page. You can apply the CSS style code to the created personal web
page and get a first impression of what CSS style can do.

STEP 1: Create a simple homepage.


Open Notepad (© > All Programs > Accessories > Notepad) Or
your chosen text editor, and copy the content of the following HTML code (see
www.w3schools.com) to the newly opened “Untitled Document”:

① ②

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 51 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Before you start, read and analyze the source code carefully and try to understand every single
line of the code. Replace all the content inside the square bracket [], with your own style of
content, and save the file as “MyPersonalWebPagel.htmf’ by selecting “Save as...” from the File
menu of Notepad.

STEP 2: Display the attributes by using the style sheet.


Based on the HTML code example in STEP 1, all the contents are displayed in your b’rowser by
your browser’s default style. If you try to execute the previous example, you will notice that the
background is white, the text color is black, and header 1 element is displayed in 24 font sizes of
Times New Roman typeface.
Copy the style sheet data in the following text file into your “MyPersonalWebPagel.html” web
page, between <head> and </head>.

① ②

Save the “MyPersonalWebPagel_StyleSheetl.html” and open it using your choice of browser


and observe the difference between the previous web page from STEP 1 and your new
“MyPersonalWebPagel.html” after applying the styles on your HTML code.

STEP 3: Modify the attributes in the style sheet.


For the final touch of your web page, modify the following attributes:
 Background color
 Font family
 Font size
 Color
 Text alignment
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 52 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
These attributes modification must be applied in the style sheet used in STEP 2. Assign your own
choice of values to these attributes and observe the difference when you apply the different
values.

Attributes Values
Background #FFOOOO, #00FF00, #FFFFOO, #CCEEFF, #9ECE44, #16638F, #421 D42,
color #F59F1 A, #FD9B02, #CADEB9, #C3961 F, #212F1 D, #296587, #11471C,
#BC9C73, #4AOOOO, #9C5600

Font family “Sans-Serif”, “Arial”, “Calibri”, “Malgun Gothic”, “Maiandra GD”, “Candara”, “Times
New Roman”, “Book Antiqua”, “Courier New”, “Tahoma"
(Note: There are some fonts that might not be available to you if you are not using
Windows.)
Font size 10, 12, 14, 16, 18, 24,32, 48, 72
Text Left, Center, Right
alignment
Here is an example on how to apply modifying of attribute

Save your file as “MyPersonalWebPage1_StyleSheet2.html”.

STEP 4: Submission
Submit the following files:
1. Submit softcopy of the 3 HTML files:
a. MyPersonalWebPagel.html
b. MyPersonalWebPagel_StyleSheetl .html
c. MyPersonalWebPage 1 _StyleSheet2. html
2. Submit hardcopy of the 3 HTML files.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 53 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
MODULE 4

INFORMATION, CONTROL, AND PRIVACY

At the end of this chapter, the students should be able to:


1. distinguish a physical resource from a conceptual resource;
2. identify the characteristics of information as a resource;
3. analyze the phenomenon of information overload brought by high internet penetration;
4. explain the major points of the revised Intellectual Property Code of the Philippines
(Republic Act No. 10372); and
5. highlight the importance of information control and privacy by creating a video
advertisement/awareness campaign.

OPENING ACTIVITY

Reading
Read the following paragraph excerpted from the “Letter to Isaac McPherson, August 13, 1813”
in The Writings of Thomas Jefferson, Vol. XIJI, edited by A. Lipscomb (1904):

“If nature has made any one thing less susceptible than all others of exclusive property, it is the action
of the thinking power called an idea, which an individual may exclusively possess as long as he keeps
it to himself; but the moment it is divulged, it forces itself into the possession of everyone, and the
receiver cannot dispossess himself of it. Its peculiar character, too, is that no one possesses the less,
because every other possesses the whole of it. He, who receives an idea from me, receives instruction
himself without lessening mine; as he who lights his taper at mine, receives light without darkening
me. That ideas should freely spread from one to another over the globe, for the moral and mutual
instruction of man, and improvement of his condition, seems to have been peculiarly and benevolently
designed by nature, when she made them, like fire, expansible over all space, without lessening their
density at any point, and like the air in which we breathe, move, and have our physical being, incapable
of confinement or exclusive appropriation. Inventions then cannot, in nature, be a subject of property.”

1. What is your understanding of exclusive property?


2. How did Thomas Jefferson understand the principle of an “idea” as a non-exclusive
property?
3. Is there a possibility of an “idea” becoming exclusive?
4. Do you agree with Thomas Jefferson’s concept of an “idea”?

INTRODUCTION

Introduction to Resources

Organizations treat company assets, such as buildings, equipment, and their manpower as
important resources. Resources .ire the total means available to a company for increasing
production or profit, including land, labor, capital, and raw materials.

Without resources, organizations would cease to exist. Imagine a bank without money, a
manufacturing plant without lorklifts, or a school without teachers. These resources are known as
physical resources. They are tangible and can be easily identified. Physical resources usually
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 54 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
start from acquisition and are then assembled to be available for use when needed. Very often,
the assembly process entails converting an essentially raw material into a refined form, such as
wood, cement, and steel for building construction. Once these resources have been assembled,
a manager strives to maximize their use; this includes allocating space for office use and
identifying key areas in the building plans. Finally the manager asks for replacement or repairs
and maintenance of these resources at a critical time—before they become inefficient or obsolete.

The other type of resource is called conceptual resources. Conceptual resources are non-
tangible and are considered valuable for what they represent rather than their physical makeup.
Money is considered a conceptual resource as each paper bill represents a specific monetary
value as opposed to the paper where it is printed. The same goes for human resources. While
everyone can be considered employees in a company, their skills, knowledge, and job experience
set them apart from one another, thus identifying the staff, managers, executives, and laborers.

Information as a Resource
Information can be simply defined as “facts about something or someone that are provided or
learned.” Facts are considered relevant truths which have been validated and identified. Data are
considered facts; therefore, processed data are considered as information as they are
organized in such a way that they have additional value beyond the value of the facts themselves.
Unlike other organizational resources, information is considered:

►Expandable
Information can be expanded without compromising its integrity. In fact, by having additional
information, much more can be understood from it. An example is a person’s personal
information. While knowing his or her name, contact details and current work may be useful,
having the person’s full curriculum vitae becomes more useful for those in, for example, the HR
Department.

►Compressible
Although expanded information can give a more detailed explanation, it may not always be
needed. An example of this is in news sites. Instead of a barrage of details, news sites would
often give one-liner headlines that provide enough information about the news. Another example
is research abstracts. An abstract is normally a half- or a one-page summary of the entire
research.
►Transportable
Information, especially digital information, is easily transportable. With the use of the internet and
various technologies, information can be sent though any of the following:
 send via email
 share via Facebook
 copy onto a flash drive
 upload on YouTube
►Diffusive
Gossip or rumors tend to spread easily. Unfortunately, the same applies to any kind of
information—be it true or not.

►Sharable
Since information can be easily spread, it is considered sharable as well. Information can be kept
calling it a secret. However, once a person decides to tell it to someone, then he or she will no
longer have control over it. In some cases, certain parts of the secret can be kept. One such
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 55 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
example is the secret recipe of KFC. It is known that there are 11 secret herbs and spices, but as
to what these herbs and spices are, people can only guess.

Information is not all different from other resources. Similar to how physical resources are
managed, information is considered valuable and also has a life cycle. It begins with
transforming raw materials into a finished product—processing data to come up with valuable
information. Weather forecasting is one such example. Scientists use statistical data from
previous days to predict possible weather conditions the next day. Another example is the
academic grades of students in a university. By determining the students’ weighted average from
first year to senior year, the school can identify valedictorians and salutatorians based on their
academic standing.

Just like physical resources, managing information is just as important as managing any other
resource in the organization, such as people, money, and equipment. Information, information-
related activities, technologies, and personnel are also important organizational resources.

Valuable Information
Let us say your professor assigns you to research on the different parts of a computer system.
You plan to look for information online through search engines such as Google. How can you tell
if the information you get is useful, or in this case, valuable for your research?
Information is said to be valuable if it has the following characteristics (Stair & Reynolds, 2016):

►Accurate
Accurate information is error-free. In some cases, inaccurate information is generated because
inaccurate data was processed. Analysts call this as “garbage-in-garbage- out.” By typing “parts
of a computer” in the search bar, Google gives you a list of several websites which contain the
information you are looking for. However, how do you determine which are accurate and which
are inaccurate? Usually, it is better to trust sites that are formal in nature rather than informal
ones such as blogs or forums.

Table 4.1 Formal Information vs. Informal Information


Formal Information Informal Information
It is official and authoritative. It is more casual, and less
authoritative.
It is meant to be taken seriously and is presented in a formal It is presented in a less formal
manner. manner.
It is usually more carefully prepared and verified than It is possibly less reliable.
informal information, and its accuracy and reliability should
also be higher.

►Complete
Complete information contains all the important facts. This is especially important in the field of
medicine. Missing information could spell disaster, or worse, lead to death. If the information
regarding allergies has been left out, doctors might inadvertently give wrong medication that could
cause severe allergic reactions to the patient.

►Economical
Information should be relatively economical to produce. Decision-makers must always balance
the value of information with the cost of producing it. With the spread of the internet, information
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 56 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
dissemination has become easier, faster, and a lot cheaper. However, is the price worth it for the
integrity of the information?

►Reliable
Reliable information can be depended on. In many cases, the reliability of information depends
on the validity of the data collection method. In other cases, reliability depends on the source of
information, which brings us back to valuable information being economical. Torrent sites offer
pirated software, music, and movies for free. However, the resolution of the movie downloaded,
for example, might not be clear and might even contain malware and virus that could infect the
computer system.

►Flexible
Flexible information can be used for different purposes. Depending on the situation, personal
information can be used for a variety of ways. A school ID can be used to enter the school
premises. The same ID can be used to transact business with the registrar’s office during
enrolment. It can be used to open a bank account or to apply for a student driver’s permit.

►Relevant
Relevant information is important to the decision-maker. For example, your assignment calls for
searching “parts of a computer” online. You do not visit sites that tackle “parts of the human body”
because they are irrelevant to your research topic.

►Simple
Information should also be simple, not overly complex. Sophisticated and detailed information
may not be needed. Complex information may sometimes lead to confusion which could result in
inaccuracy of details.

►Timely
Timely information is delivered when it is needed. This is true in the case of weather predictions,
stock market forecasts, and traffic management.

►Verifiable
This means that information can be checked for correctness and authenticity. Most authors
include references, bibliography, or citations in their works to enable readers to verify the content.

►Accessible
Information should be easily accessible by authorized users to be obtained in the right format at
the right time to meet their needs. In Korea, the U.S., the U.K., and China, a mobile phone can
be used to pay for day-to-day transactions. A mobile pay app can be downloaded on the
smartphone in which the user’s credit card or debit card is enrolled. Samsung Pay, Apple Pay,
and Google Pay all use near-field communications (NFC) technology so instead of swiping
the physical card for payment, the mobile phone is simply tapped on the card reader or terminal
and payment is immediately recorded (Sawides, 2017).

►Secure
Information should be secure from access by unauthorized users. Mobile pay systems such as
Samsung Pay and Apple Pay use biometric authentication, typically a fingerprint scan, before
a transaction is made. This ensures that only the owner of the phone can use the app for
payments.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 57 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Value of Information
Information is considered valuable mainly for business purposes as businesses depend on it to
produce quality products and services. This helps organizations become globally competitive and
be up to date with the latest trends and technology. With businesses gearing towards IT
automation, the strategy now is to come up with business activities that shorten time frames while
increasing productivity. All of this is possible if companies have access to valuable information.
Valuable information helps managers make good decisions which is why valuable or useful
information is called knowledge.

Information, as a resource, has four characteristics, namely it (1) has zero marginal cost; (2) is
non-rivalrous; (3) is non-exclusive; and (4) does not exhibit high degrees of transparency (Leickly,
2004).

►Zero-marginal cost
The cost of producing the first copy of an information good may be substantial, but the cost of
producing (or reproducing) additional copies is negligible. Avengers: Age of Ultron released in
2015 is one of the most expensive Hollywood movies ever made with an estimated budget of
US$250,000,000. However, buying a DVD copy of the said movie today would cost about $20 in
Amazon.com.

►Non-rivalrous
Simultaneous consumption of information by consumers is possible. Movies nowadays are sold
not only as DVD copies. There are also digital formats which anyone can watch online or
download on their mobile devices, either as a rental or paid subscription.

►Non-exclusive
Exclusion is not a natural property of information goods, though it is possible to construct
exclusion artificially. However, the nature of information is that if it is known, it is difficult to exclude
others from its use. Through emails and SMS, one can identify only intended recipients of the
message through a specific email address or a phone number. However, emails and SMS have
the capability of forwarding the exact information to other recipients, without the original sender
knowing it. This is much more evident in social media such as Facebook, in which a “share”
automatically means sending to everyone else.

►No transparency
To evaluate the information, the information must be known, so one has to invest in learning how
to evaluate it. A programmer undergoing boot camp training to learn a new programming
language needs to invest time, money, and effort. The more complicated the training, the more
expensive the cost and the longer the time needed to learn it.

Information Economics

Since people have widely different values for a particular piece of information, value-based pricing
leads naturally to differential pricing. In economics a good is considered to be an experience
good if consumers must experience it to value it. Virtually any new product is an experience
good, and marketers have developed strategies such as free samples, promotional pricing, and
testimonials to help consumers learn about new goods.

Information, on the other hand, may be treated differently, since it is not the asset that provides
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 58 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
value in today’s economy: what provides value is the information about the asset. When buying
a shirt, customers are given the opportunity to try it on prior to deciding if they want to buy it or
not. Food catering companies offer free taste tests of their complete menu so their customers get
to experience the food they offer prior to reserving for an event. With information, organizations
cannot give the full experience to customers as this could mean lost interest afterwards.

►Browsing previews
An example of this strategy is movie trailers. Movie trailers that normally run from 1 to 3 minutes
give viewers a glimpse of what the film is all about. Trailers normally include highlights from the
film which can leave the audience excited to watch the entire film later on. Another example is
music downloaded from iTunes. A 5- to 15-second preview of the song can be listened to prior to
buying it. This gives the user an idea of the song he or she wants to download if it is worth the
amount to be paid.

►Branding
Big names such as Microsoft and Apple have no issues when it comes to launching new products
as people have already established their trust on these brands. According to American
telecommunications (telco) company, Sprint, when Apple introduced iPhone 7 in September
2016, pre-order sales shot up by 375% compared to the launch of iPhone 6.

►Reputation
When a movie is announced, people would often be skeptical if it would be good enough.
However, the reputation of directors and the cast of actors and actresses normally remove this
skepticism. For example, Michael Bay is known for successfully directing the Transformers
movie franchise. This reputation has made his movies blockbuster hits as people have made a
connection that if it is a Michael Bay film, it must be good. This is the reason why his films would
often include an introduction as a “Michael Bay film” instead of just the movie introducing itself.

Information Overload

Information is now available so quickly, ubiquitously, and inexpensively. Last March 2016, Cisco
conducted a study that by the end of 2016, global internet traffic will have reached 1.1 zettabytes
per year, and by 2019, global traffic is expected to hit 2 zettabytes per year. Just how big is 1
zettabyte? A typical external drive is 1 terabyte in size. One zettabyte is equal to 1,000,000,000
terabytes or one billion external drives. This is because information is produced at rapidly-
increasing rates due to the following reasons:

►Easy duplication and transmission of information


A picture posted on Facebook which is also posted on Instagram and Twitter means that the
same picture has been posted three times on three different sites.

Mobile Social Media and Mobile Commerce

The abundance of mobile devices has greatly changed the way people manage their day-to-day
activities. In business, for example, having a shop where customers can easily go to used to be
enough. However, with the introduction of the internet, market shifted from a brick-and-mortar
set-up to an online operation more commonly known as e-commerce. And now with mobile
internet, people can access internet services without the need for computers. They have their
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 59 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
smartphones, tablets, and other mobile devices connected to the network to send and receive
information wherever they are and whenever they want to. This connectivity has paved the way
to two new scenarios in communication:

Mobile social media


Mobile social media is the accessing of social media sites, such as Facebook and Snapchat,
using a mobile device. The device may have an app installed to open Instagram, for example, or
it can use a browser installed in the mobile device to open Twitter. A study conducted by
ComScore in 2016 reveals the impact of social media on internet users. The same study also
shows that nearly 80% of individuals browse through their social media accounts using their
mobile phones.

Noticeably, people are using their desktops less and less in accessing websites. Mobile has
grown so fast that it’s now the leading digital platform, with a total activity on smartphones and
tablets accounting for 62% of digital media time spent, and apps alone now representing the
majority of digital media time at 54% (Leila & Lipsman, 2016).

M-commerce
M-commerce or mobile commerce was a term used during the 1997 Global Mobile Commerce
Forum by Kevin Duffey. He described it as the delivery of electronic commerce capabilities
directly into the consumer’s hand, anywhere, via wireless technology. The use of mobile devices
has paved the way for data to be transmitted and received much faster, without compromising
security and scalability The global trend in using mobile devices for socializing and doing
commercial transactions is increasing. Companies are now using digital platforms to market their
products and services.

Industries that are now embracing m-commerce include:


1. Financial services - Banks have introduced online banking a few years back. However,
nowadays, majority of bank transactions such as money transfers, bills payment, and even
stock portfolios and stock transactions can now be done using the bank’s mobile app.
2. Mobile ticketing - As payments can be done online, receipts of transactions can also be
sent on mobile devices. Airline companies encourage their customers to book their flights
online, after which, their booking reservation is sent via email or through their mobile app.
The booking ticket can be shown at the airport and is accepted even as an electronic copy
3. Service/retail - As consumers are now able to place and pay for orders using their mobile
devices, the e-commerce trend has shifted from desktop computers to mobile devices.
And it does not just include retail items. It also includes content purchasing such as music,
movies, and images, among others. Another trend seen is the in-application purchases
made by mobile phone users. This is prevalent in gaming applications in which users buy
virtual goods for power boost or upgrade to the next game level.

4. Information services - These include the delivery of news, stock quotes, sports figures,
emergency reports, and weather and traffic updates to a single mobile device. Waze is an
example of an application that delivers customized traffic information which is based on a
user’s actual travel patterns. It uses geo-location technology to pinpoint the whereabouts
of the user while on the move. Another example of an application that uses location-based
services is Google Maps.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 60 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Information Control

With so much information around, how do you make sure they are safe from illegal activities? A
large requirement for information control comes from commerce, industry, and copyright owners
in general. Information control comes in the form of keeping secrets inside a business or selling
IPR (Intellectual Property Rights) to those prepared to purchase it.

Information control is about allowing those who have appropriate authority access to and use of
information on the basis of the authority that they hold. But why is there a need for control in the
first place? Earlier in this chapter, the concept of information being non-rivalrous and non-
exclusive has been discussed. An example is movies being sold in different formats— DVDs,
MP4, etc. If that is the case, how can you make sure that the said movie will not be distributed
illegally?

Software Piracy
Let’s say you wanted to watch the latest movie showing in the cinemas. However, you decided
to save the money instead, so you bought a pirated DVD copy of the film in one of the market
places you passed by on your way home. Upon watching it, you noticed the film was taken by a
video camera inside the cinema and you can hear the audience laughing, and see shadows
walking back and forth, which obviously were not part of the film.

In the end, you decided to download a torrent file of the film, hoping for a better quality, only to
discover that it was the same pirated video you saw in the pirated DVD.

According to The Software Alliance (www.bsa.org) (2018), software piracy is “the unauthorized
copying or distribution of copyrighted software... can be done through copying, downloading,
sharing, selling or installing multiple copies of software onto personal or work computers.” Most
software has licenses, such as activation keys, that are normally identified with just one
computer. Having a pirated software means trying to use the same key for several computers.
Some people upload software onto a website so others can download it, as is the case of using
torrent to upload/download a movie.
Examples of software piracy as identified by The Software Alliance (2018) include:
 Distributing software or mobile apps from the internet in a manner that violates the license
terms
 Buying a single copy of a software program and installing it on multiple devices without
authorization
 Making and/or sharing copies of installation CDs
 Sharing the login credentials (without authorization) used to access a web-based software
application (“Software as a Service”)

Some might say, “I paid for the software already, shouldn’t that be mine to use and distribute
wherever and whenever I want to?” As with the discussion earlier this chapter regarding
information having zero-marginal cost, buying a DVD copy of a movie costing 10 dollars, does
not mean buying the movie itself. Thus, paying for the movie does not mean you are buying the
actual movie, but paying for the license to watch it for personal use. So just because a person
bought an original DVD of the movie does not mean that he or she can create copies and
distribute it or share it online.

This typical scenario boils down to the fact that information is difficult to control. While measures
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 61 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
are in place, such as DVD region codes and such, Adam Thierer in 2011, identified four issues
which further complicate the problem on information control: (1) convergence, (2) scale, (3)
volume, and (4) unprecedented individual empowerment/user-generation of content.

1. Convergence. Technological advancements and social media have paved the way for media
content such as music and movies to be distributed from their “traditional” distribution
platforms. What consumers used to buy in the form of CDs or DVDs, media content can now
be searched, accessed, and consumed using multiple devices and even through different
distribution networks. One such example is Spotify. Consumers before would buy physical
albums in the form of CDs, then later transitioned to digital copies typically bought via iTunes
Store for Apple. However, with social media having a big effect on song reviews and
recommendations, a mobile app such as Spotify is able to create playlists which can be
listened to, and if wanted, downloaded for a fee. As a result, it is now possible to disseminate,
find, or consume the same content/ information via multiple devices or distribution networks.
This convergence of devices and networks, according to Thierer (2011), has created issues
instead of maintaining an effective information control policy. Another such example is an
application called VideoFX which is available in Google Play. According to the app description,
you can “create amazing lip sync music videos with special effects and your choice of music.
Simply select a music track and start lip syncing! Make videos that you’ll be proud to share
with your friends!” In one mobile device, you can take a video, select a saved music file, and
send it to a social media platform such as Facebook or Twitter. The issue here is, what if the
music used is copyrighted?

2. Scale. For those who like to watch Japanese anime and Korean dramas, English subtitles are
a must. Before, fans would wait days or weeks before the subtitles become available for
viewing. This is because the subtitles are actually translated, edited, and embedded by fans
of the show, most of whom are not professionals. Majority of them are students and young
adults who simply like watching the series. With technology and fast internet connectivity,
viewers no longer need to wait days to watch the foreign shows with English subtitles.
Oftentimes, the subtitles are ready within a few hours after the show has been aired in its local
country. This is because the internet has given everyone access to anything they would like
to search, upload, and download anywhere in the world. Technology such as Google
Translate has also helped make translation of these shows much faster. Concerns regarding
copyright have greatly increased because of this. But while some countries such as China
and North Korea impose certain restrictions on what their citizens can and cannot access
online, Thierer (2011) mentions that “the scale of modern digital speech and content
dissemination [still] greatly complicates government efforts to control information flows.”
3. Volume. Nowadays, news and media outlets abound in print and online. News agencies such
as Manila Bulletin or The Philippine Star have not only print copies of their news (i.e.,
newspapers) but also digital copies which can be accessed through their websites mb.com.ph
and www.philstar.com, respectively. Broadcasting companies such as ABS-CBN and GMA7
also have television broadcasts, radio broadcasts, TV radios, and news websites, most of
which have the same content. This development can be attributed to the increasing volume
of media content and communications activities happening across the world, greatly
complicating government regulatory efforts to control information.
4. Unprecedented individual empowerment. The popularity of social me'dia such as
Facebook, Twitter, and Instagram has made it possible for individuals to post anything they
want. This also includes creation of blogs which have become mainstream media for
individuals to showcase their talents, skills, and hobbies. This creates issues when it comes
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 62 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
to. content restriction as most people are doing this using their private accounts. Unless
reported, the said content will be difficult to control. So how do we control information
dissemination? Organizations, such as The Software Alliance, software industries such as
Microsoft and IBM, as well as government entities in countries across the globe, are working
hand in hand to solve the issue of software piracy. One solution they have come up with is
identifying exclusive rights to information, as with any given physical asset. This has led to the
identification of intellectual property rights.

Intellectual Property (IP)

Intellectual property (IP) refers to a number of distinct types of intangible assets for which a set
of exclusive rights are recognized. IP includes musical, literary, and artistic works such as Taylor
Swift’s new album, J. K. Rowling’s new book, and the latest iPhone. However, IP is not just limited
to these items. It can also include words, phrases, symbols, and even designs. Are you familiar
with the following logos found in Figure 4.6?

Figure 4.6 Popular Logo

IP is any creation or products of the human mind and may be expressed in the form of original
ideas, expressions, and processes. Intellectual property rights (IPR) are the rights given to
persons over their creations. They usually give the creator an exclusive right over the use of his
or her creation for a certain period of time. According to the Intelectual Property Code of the
Philippines (Republic Act No. 8293 s. 1998), IPR consists of the following:
1. Copyright and related rights
2. Trademarks and service marks
3. Geographic indications
4. Industrial design
5. Patents
6. Layout designs (topographies) of Integrated Circuits (ICs)
7. Protection of undisclosed information

The Intellectual Property Office of the Philippines (IP Philippines) is the government agency
in charge of the implementation of the law protecting intellectual property rights in the Philippines
as provided for under R.A. 8293, or the Intellectual Property Code of the Philippines, and the
revised Intellectual Property Code of the Philippines known as R.A. 10372.

Copyright and Related Rights

Copyright is a set of exclusive rights granted by a state to the creator of an original work or their
assignee for a limited period of time in exchange for public disclosure of the work, and includes
the right to copy, distribute, and adapt the work. Copyright owners can license or permanently
transfer or assign their exclusive rights to others. Digital rights, on the other hand, is the
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 63 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
permission granted to individuals to legitimately perform actions involving the use of a computer,
any electronic device, or a communications network. It is particularly related to the protection and
realization of existing rights in the context of new digital technologies, especially the internet.
Copyright provides protection for original expression which includes literary, artistic, scholarly,
and scientific creations such as books, articles, newspapers, lectures, letters, musical
compositions, and paintings. It also extends to derivative works such as illustrations, maps,
photographic works, advertisements, computer programs, etc.

In the Philippines, all copyrighted materials are recorded and stored at the National Library or the
Supreme Court Library (R.A. 10372, 2013).

Digital Rights Management

Digital rights management (DRM) is used to describe the processes by which the author or
publisher of a work exerts his or her rights to control what the purchaser of the work is entitled to
do. This represents the control by which one can prevent a person or an organization from
copying, printing, editing, or otherwise making the privileged information available to other people.

With the introduction of technology and the internet, the print age is slowly becoming obsolete
with publishers shifting to the digital age. Before, a person needed to copy or re-print a physical
book for additional copies. With digital technologies, copies are made at zero cost with minimal
detection. And it is not just books. Movies, music, software applications, etc. can now be copied
and shared faster, with less cost. With this set-up, the prevalence of peer-to-peer (P2P) and
torrent sites have made information control much harder.

While information gets to be disseminated faster to consumers, control as to how it is shared


becomes an issue. Downloading pirated music online does not help the music artists as they are
deprived of the royalties they are entitled to. At the same time, getting the music for free does not
mean being safe from malicious software and hacking attacks.

Thus, companies and organizations have come up with possible solutions to this digital dilemma.
The following are techniques designed to control access and reproduction of online information:

1. Encryption. Encryption is the process of converting data or information in such a way that
only authorized parties can understand. Its primary purpose is to protect the confidentiality of
digital data stored on computer systems or transmitted via the internet or other computer
networks. Encryption occurs every time someone uses an ATM or buys something online with
a smartphone, makes a mobile phone call, or presses a key fob to unlock a car. This is done
so that information being sent is kept safe and secure. DRM systems for multimedia often
encrypt material in such a way that only a particular device can play or retrieve it, enforcing
constraints on how it is used. DVDs use an encryption scheme to prevent users from viewing
discs on unauthorized players. This is the concept of region coding discussed earlier. Region
coding prevents discs sold in one part of the world from being used on players sold in another.
2. Serial keys. Also known as a product key or a software key, it is a series of alphanumeric
characters acting as a key to denote that the product or software is original. In some cases,
product keys are used for product activation. One such example is Microsoft Windows OS.
A product key is used to activate the operating system online. Online activation helps
maintain software authenticity by making sure no one else has used the same product key.
3. Scrambling. Data scrambling is done to hide sensitive information from unauthorized users.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 64 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Scrambling is accomplished by the addition of components to the original signal or the
changing of some important component of the original signal in order to make the extraction
of the original signal difficult. It is often done with the aid of encryption. While region coding
identifies which players can only play certain DVDs, computers with DVD drives become
another option for would-be pirates. Thus, the content scramble system (CSS) was introduced
to restrict access to content only for licensed applications. Meaning, even if the DVD was
recognized by the DVD player in a computer, certain applications or programs needed to play
the video might not allow it.
4. Tag embedding. Similar to how pictures can include watermarks to denote information on the
owner of the picture, tag embedding does the same to information content. Watermarks are
not complete DRM mechanisms in their own right, but are used as part of a system for
copyright enforcement, such as helping provide prosecution evidence for legal purposes,
rather than direct technological restriction.

In terms of data embedded into the actual content, the use of metadata is included to identify the
owner’s name, author, and date of purchase, among other pertinent information.

Patent
A patent is a set of exclusive rights granted by a state to an inventor for a limited period of time
in exchange for the public disclosure of an invention. The exclusive right granted to a patentee in
most countries is the right to prevent others from making, using, selling, or distributing the
patented invention without permission.

Trademark

A trademark is a distinctive sign used by an individual, business organization, or other legal entity
to identify the products or services to consumers. The mark comes from a unique source, and it
distinguishes its product (trademark) or services (service mark) from the others. Rights in a mark
shall be acquired through registration made validly in accordance with the provisions of the IP
code. For marks with geographical indications, a notice stating that a given product originates in
a given geographical area must be identified. This is relatively new in the Philippine IP regime as
marks are identified based on the territory, region, or locality attributed. In the Philippines, one of
the most popular trademarks based on locality is the Pampanga’s Best delicacies logo.

Protection of Undisclosed Information

Industries and companies need to have information control especially in dealing with sensitive
industry secrets. To protect these industry secrets, also called trade secrets, companies usually
require employees to sign contracts with non-disclosure agreements (NDAs). Trade secret is
the term used for any method, formula, device, process, or any information that gives the
business a unique competitive advantage over its competition! It includes company research and
development information, software algorithms, inventions, designs, formulas, ingredients, and
devices, among others. Examples of popular trade secrets are the formulation of Coca-Cola and
Listerine, and the recipe of Kentucky Fried Chicken (KFC).

Table 4.2 IPR terms of protection and penalties as stated in R.A. 8293
Terms of protection Penalty
Copyright Generally, throughout the life 1 st offense: P50.000 to P150,000 and/or 1-3
of the author plus 50 years years imprisonment 2nd offense: P150,000 to
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 65 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
after his or her death P500,000 and/or 3-6 years imprisonment
3rd and subsequent offenses: P500.000 to P1,5M
and/or 6-9 years imprisonment
Patent 20 years (time-bound) Not less than P100,000 to not more than
P300.000 and/or not less than 6 months to not
more than 3 years imprisonment
Trademark 10 years from the date of filing P50.000 to P200,000 and 2 to 5 years
of the application imprisonment
Information Privacy

The natural state of data is to be copied, logged, transmitted, stored, and stored again. This is
why it takes constant fighting and vigilance to prevent that breach. So what is information privacy
and how private is private?

With Facebook and Twitter often being used as a means of venting out in public, others may say,
“It’s my choice in telling everyone on Twitter what I want to say!” Some might even reveal too
much information which can be regarded or termed as inappropriate. However, again, it is their
choice to tell everyone what is supposed to be private information. If that is the case, then, what
is data privacy?

To understand the concept of data privacy, look at Yahoo’s privacy policy (now under a single
privacy policy with Oath) when registering for an email address on Figure 4.8.

To highlight a portion of the Yahoo privacy policy, Oath (2018) and its affiliates, including Yahoo,
“collect information from your devices....This information includes device specific identifiers and
information such as IP address, cookie information, mobile device and advertising identifiers,
browser version, operating system type and version, mobile network information, device settings,
and software data.” (Information Collection and Use-General)

Knowing a person’s IP address can help identify that person’s physical location anywhere in the
world. A cookie is a small file that is stored in the computer’s directory, often a temporary folder.
The cookie contains addresses of websites visited, login credentials, and even credit card
account numbers. This is done so that the next time the person visits the website, the computer
system will no longer reload the same content or data, saving time and processing power for the
computer. Obviously, however, this is dangerous, especially when using public computers, such
as those in internet shops, as the next user will be able to access the previous user’s account
without the latter’s knowing it.

Data Privacy Act 1 0 1 7 3

With all of these pieces of information made available online and the possible problems such
situation may create, countries have come up with ways to protect their data from malicious
individuals who might use them for illegal purposes. The Philippines, with its booming IT industry,
is no exception. Total IT spending reached $4.4 billion in 2016, and the sector is expected to
more than double by 2020. Filipinos are heavy social media users with 6.7 million Facebook
users, (We are Social and Hootsuite, 2018). The country is also in the process of enabling free
public Wi-Fi in major cities nationwide. To protect the privacy of Filipino citizens, Republic Act No.
10173, also known as the Data Privacy Act of 2012, was signed and approved by then President
Benigno Aquino III on August 15, 2012.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 66 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
The law defines sensitive personal information as being:
 about an individual’s race, ethnic origin, marital status, age, color, and religious,
philosophical, or political affiliations;
 about an individual’s health, education, genetic or sexual life of a person, or to any
proceeding or any offense committed or alleged to have committed;
 issued by government agencies “peculiar” (unique) to an individual, such as social security
number; and
 marked as classified by an Executive Order or an act of Congress.
All processing of sensitive and personal information is prohibited except in certain circumstances.
The exceptions are:
 consent of the data subject;
 pursuant to law that does not require consent;
 necessity to protect the life and health of a person;
 necessity for medical treatment; and
 necessity to protect the lawful rights of data subjects in court proceedings, legal
proceedings, or regulation.

It has also defined the concept of a security incident versus that of a personal data breach.

A “security incident”is an event or occurrence that affects or tends to affect data protection, or
may compromise availability, integrity or confidentiality. This definition includes incidents that
would result in a personal breach, if not for safeguards that have been put in place.
A “personal data breach,” on the other hand, is a subset of a security breach that actually leads
to “accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, 6
personal data transmitted, stored, or otherwise processed.

Digital data in the Philippines seem to be free-flowing. And the challenges of data privacy and
security also keep on coming so it is important for any organization to invest in good data security
measures.

On March 27, 2016, the Commission on Elections (Comelec) website was hacked with message
postings regarding tighter security for the then upcoming May 2016 nationwide elections. The
same day, another group of hackers posted a link to what was claimed to be the Comelec’s entire
database. The file was 340 gigabytes and was said to contain voters’ and candidates’ information.
According to security researchers at Trend Micro, the hack contains a huge amount of very
sensitive personal data, such as full names, email addresses, names of spouses, addresses,
parents’ names, and government ID numbers. It also included fingerprints of 15.8 million voters
and passport numbers of 1.3 million overseas Filipino workers. That makes this hack potentially
the “biggest government-related data breach in history” according to Trend Micro Incorporated
(2016) “surpassing the Office of Personnel Management (OPM) hack last 2015 that leaked PII,
including fingerprints and social security numbers (SSN) of 20 million US citizens” (para. 2).
A January 2017 article from CNN Philippines has reported that then Comelec Chairman Andres
Bautista will face criminal charges regarding the data breach that has occurred last March 2016.
Comelec and Bautista are said to have violated the Data Privacy Act of 2012. The National
Privacy Commission said that the organization failed as a personal information controller. NPC
also underscored the fact that data protection is more than just the implementation of security
measures. According to the law, the violation of the Data Privacy Act due to negligence is
punishable by three to six months’ imprisonment, and a fine of P500,000 to F4 million. If a
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 67 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
government official is proven guilty of this crime, he or she will be disqualified from public office.

CHAPTER KEY POINTS


 Physical, conceptual, and information resources are three types of resources that an
organization needs in order to operate.
 Information resources, unlike other resources, are expandable, compressible, transportable,
diffusive, and shareable.
 Information, as a resource, has four characteristics, namely it has zero-marginal cost; is non-
rivalrous; is non-exclusive; and does not exhibit high degrees of transparency.
 Information is produced at rapidly increasing rates due to easy duplication and transmission
of information, increase in communication methods, and growth archives of historical
information.
 The abundance of mobile devices resulted in mobile social media and m-commerce (mobile
commerce).
 Information control is about allowing those who have appropriate authority access to and use
of information on the basis of the authority that they hold.
 Intellectual property refers to a number of distinct types of intangible assets for which a set of
exclusive rights are recognized. To protect intellectual properties, copyright and digital rights
are granted to individuals.

CHECKPOINT

Multiple Choice: Direction: Write your answer in a piece of paper and take a photo on it and
send it to your instructor. After that you have to compile it and put it in a white folder and pass all
your activity before final exam.

1. Unlike other organizational resources, information can be described as follows, except:


a. transportable b. compressible c. diffusive d. expandable
2. When compared to other resources, information is similar to them in terms of the following
except:
a. its cost can be controlled with the help of accounting techniques
b. can be substituted
c. is available in a standard type, grade, and price
d. has a life cycle
3. Mr. Puti recently found out his email was hacked and said that the hacker has been
sending spam emails to all his contacts. Which of the following regulations needs to be
enforced in this issue?
a. content control b. defamation control c. privacy control d. copyright
control
4. Ms. Dilaw has a blog which she updates with photos and videos of her day-to-day
activities. She recently received a personal message demanding that the pictures of
certain images she took in an art museum be removed from her site. Which of the following
regulations did she not follow?
a. content control b. defamation control c. privacy control d. copyright control
5. MP3 files fall under the category of:
a. digital rights b. patent rights c. copyrights d. trademarks
6. Ms. Berde recently subscribed to a cable TV provider and bought a smart TV along with
it. Her smart TV gives her the capability to record shows she might miss every now and
then. Which control issue could be found in this case?
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 68 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
a. convergence c. scale
b. volume d. unprecedented individual empowerment
7. Ms. Bughaw is an active Facebook user. She recently posted a picture of herself with her
friends getting drunk during a party. Her boss saw it on her profile and said it was very
unprofessional and asked her to take it down. She did, but, her friends uploaded the same
picture and tagged her, making her picture still appear on her profile. Which control issue
is shown in this case?
a. convergence c. scale
b. volume d. unprecedented individual empowerment
8. These are also called conceptual resources.
a. tangible resources c. complex resources
b. non-tangible resources d. simple resources
9. Information that is important and useful when it is needed is considered
a. reliable b. accessible c. relevant d. complete
10. A movie being sold in different formats and mediums such as in DVDs, Google Play,
iTunes, etc. means that the movie is considered as:
a. non-rivalrous c. non-exclusive
b. not exhibiting high degrees of transparency d. having zero-marginal cost

TASKS
Individual Activity
 Identify a game you are familiar with and have played frequently online or on your mobile
phone. Explain briefly the mechanics of the game and the reasons why you like playing
this game. List the game items that players often buy to either improve their gaming skills
or upgrade their avatars. Identify the items that need virtual money and those that require
real money. Prepare a short presentation in class on the advantages and disadvantages
of having your “experience goods.”

Group Activity
Create a short video advertisement highlighting the importance on information control in the
Philippines. You can benchmark on the advertisements shown in cinemas explaining why movie
piracy is considered a crime. The goal is to make the Filipino viewers understand the need for
information control in the country.
Other groups may work on a video campaign raising the awareness on information privacy
especially among vulnerable populations such as children, teenagers, and young adults. The
guidelines are as follows:
1. Use your own script and theme.
2. The video must not exceed 3 minutes.
3. The setting/situation must be in the Philippines or related to Filipino culture.
4. Follow the rules on intellectual property in creating your video.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 69 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
MODULE 5

IT, CULTURE, AND THE SOCIETY

At the end of this chapter, the students should be able to:


 recall the current trends in the field of information technology;
 discuss the Internet of Things and its influence on the society;
 explain automation and its impact on the society;
 analyze how IT influences culture and social behavior;
 enumerate the rules of netiquette;
 describe cyberbullying and identify the steps to combat it; and
 familiarize themselves with and demonstrate the imperatives
 of professional conduct for IT professionals.

OPENING ACTIVITY

Field Observation
With a partner, go around your school and find a scenario in which IT is implemented. Examples
are a video projector used for classroom lectures; a biometric scanner used to record the
attendance of school employees; or an interactive board used by students during class
discussions. The more up-to-date the IT application, the better. Then, prepare a report guided by
the following questions:
1. How was IT implemented in the given scenario?
2. If IT were removed in the observed setup, what possible (manual) processes would have
taken place instead?
3. What advantages have you observed? How about disadvantages?

INTRODUCTION

The Impact of IT on the Society

As previously discussed, the seven major trends for 2017 are as follows:
1. IoT and smart home technology
2. Augmented reality and virtual reality
3. Machine learning
4. Automation
5. Big data
6. Physical-digital integrations
7. Everything on demand

Majority of organizations and companies nowadays have taken these trends into account, shifting
manual business processes to automated ones and using ICT to improve their products and
services. Among these seven trends, the internet of Things (IoT) and automation seem to have
greatly influenced present-day culture and society; thus, it is imperative to discuss these thrusts
in detail.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 70 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Internet of Things (IoT)

Internet of Things (IoT) is a set-up of devices and objects which are connected together in a given
network. Their connection, often wirelessly, is possible using both hardware and software. The
hardware part is often made up of sensors that collect data, which are then sent to other devices
for analysis and possible interpretation. Popular examples are health wearable devices such as
step counters that are connected to a mobile phone via bluetooth. An app installed in the phone
records the results in a daily, weekly, or monthly basis for the mobile phone user to keep track of
his or her progress.

Figure 5.1 Everyday objects and activities connected to the internet

Capabilities of IoT
A major requirement for IoT is a strong internet connection, as all devices must be able to
communicate with one another for the upload and download of needed data. But aside from
connectivity, IoT should also be capable of the following (Mattern & Floerkemeier):

1. Integration across technology and business. Sensors can be used to help improve
business processes, such as machines used for manufacturing and production, security
systems, and even simple ones like automatically turning on and off a light switch.
Obviously, technology used for each application may vary, depending on the complexity
and use. Software used to interpret incoming data and sending commands to the hardware
must also be taken into account. Add to that the different protocols and standards used for
connecting, such as WiFi, Bluetooth, etc. An IoT platform must be capable of integrating
all of these so that the data may be used efficiently to improve productivity and even make
predictions for optimum system performance.
2. Data analysis and synchronization. IoT should be capable of providing analytics to help
organizations in their decision-making. However, for this to be effective, data must be
synchronized to allow integration with all of the business aspects, including top
management, operations, and* even customer relations (Markkula, 2016).
3. Security and service. With all of these devices being used and all of these data being
collected, a major concern is obviously security. To improve security, IoT devices are
usually divided into networks and each network has a different network access, some more
restricted than others, without compromising connection and system integration. A typical
example is your mobile phone notifying you if you will allow a new device to connect to it
via Bluetooth. Normally, it will ask for a pairing connection via a simple ‘accept’ or using a
more secure line such as a pin code.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 71 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Applications of IoT

With improved business processes and employee productivity, it is only natural for organizations
to adopt IoT. In a study conducted by IOT Analytics, it was found that most of the 1,600 IoT
projects are applied in cities (Scully, 2018).

Topping the list are as follows:


1. Smart cities. Smart cities have adopted IoT in traffic management, waste disposal, and
even community monitoring for the security of the city’s residents.
2. Connected industries. The oil and gas industry is identified as one of the front-runners
for IoT connectivity which includes remote access to heavy equipment and machinery,
from manufacturing to production.
3. Connected buildings. Connected building projects involve facility- automation to reduce
energy costs.
4. Connected cars. With smart cities adopting IoT for their traffic management, it is no longer
surprising for the latest car models to be equipped with sensors and network connectivity.
Majority of projects relating to smart vehicles revolve around vehicle diagnostics and
monitoring.
5. Smart energy. Majority of smart energy projects focus on developing smart grids for
renewable energy and infrastructure.

Challenges of IoT
But while things may look good using IoT, there are issues raised in adopting it fully. Texas
Instruments, Inc. (2016) has identified six challenges in its implementation:
1. System requirements. Industries normally identify different requirements, especially
depending on the type of industry they belong to. Those in the food industry may require
monitoring of perishable goods, from production and packaging to shipping. An automobile
manufacturer may have the same process, but since products are different, requirements
may also change. Food will require data regarding temperature levels, whereas cars will
require mechanical precision.
2. Connectivity. With the varying connections—wired and wireless, as well as the different
protocols governing each connection, it will be a challenge to come up with an IoT project
concerning such protocols.
3. Power requirements. IoT devices need to run on batteries as majority of these devices
are mobile. The challenge, therefore, is how to extend the battery life on such devices,
especially those used in critical procedures, such as health, disaster management, and
safety.
4. Security. One of the most highlighted issues in the application of IoT is data security.
Confidential information such as patients’ records or employees’ profiles are considered
at risk. Security also includes system integrity, with malicious acts such as hacking and
viruses proliferating online.
5. Development. The task of creating IoT projects may seem daunting, so one of the
challenges identified is how to expand the capabilities of developers, and not just experts,
in order to create more “smart things.”
6. Services. With data collected from IoT, it is important as well to determine where all this
will go and to identify the platform in which these IoT applications will be placed.
Nowadays, cloud services offer end-to-end solutions to a number of IoT projects.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 72 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Automation

With the available technology and standards for computer system interconnection, the demand
for system automation is on the rise. Colloquially called “computerization,” having an automated
system means automated business processes, operations, service provider, monitoring, and
even tools.

With the use of computer systems—hardware, software, or both—the typical cumbersome and
error-prone procedures have become automated. Examples include an automated payroll
system, in which the employee payroll and payslips are automatically generated every payday; a
manufacturing plant that packs powdered juices in foil containers/sachets where machines with
sensors are used to fill up the packs up to the last milligram accurately; and even an automated
weather forecast. With the introduction of cloud-computing, a growing number of organizations
have gone into automation because of less cost and minimal server maintenance.

Below are two of the common methods in implementing IT automation:

►Robotic Process Automation (RPA)


The Institute for Robotic Process Automation and Artificial Intelligence (IRPAAI) defined robotic
process automation (RPA) as “the application of technology that allows employees in a company
to configure computer software or a “robot” to capture and interpret existing applications for
processing a transaction, manipulating data, triggering responses and communicating with other
digital systems” (Institute for Robotic Process Automation & Artificial Intelligence, 2018, para. 3).
While some may think of “robots” similar to those seen in movies, RPA actually focuses on
computers being able to make logical decisions on the business process so that their human
counterparts can focus on other tasks, thus increasing work productivity. This may not necessarily
translate into hardware. Application systems and software may also be considered as RPA as
they are applicable to the following:

 Process Automation. The use not only of industrial robots but also of “presentation-layer
automation software” is capable of carrying out the daily operations of an organization.
Process automation may include finance systems such as payroll, customer
management systems such as online system registration, and academic institutions
offering online enrollment systems, among others.
A school that has a learning management system will be helpful for both the
students and the teacher, especially in submitting requirements such as a homework
research. The typical manual procedure for students submitting their homework will be, to
come to class, wait for the teacher, and submit their papers personally. Automating the
system requires the students to simply login to their school website, open their individual
account for the current semester, search the subject they need access to, and upload their
assignments at the comfort of their homes.

 IT Support Management. Management of IT infrastructure and complex systems


becomes easier using RPA. If part of the system fails, an automated system can
immediately send notifications to the IT manager and technical support staff, informing
them of the problem. Large buildings, for example, employ an automated emergency
system, so if an emergency exit door has been opened, or a fire alarm goes off, the system
will automatically detect the exact location of the opened door or activated alarm, as the
location of the emergency will typically be assumed to be near that point.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 73 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
 Automated Assistants. Apple’s Siri is an example of a voice recognition software used in
RPAs. Instead of machine language (binary), computers will be able to understand human
language and interact with the same. Another example for automated assistants will be
banks having an automated customer service hotline. Customers call the bank, and
instead of a human operator, an automated assistant will respond asking for details such
as service choices, account numbers, etc. Customers will use their phone’s touch keys to
enter choices and numbers while the computer interprets them as input data. After
processing, a computergenerated report, such as account balances and other information
will be provided.

► Sensors
Sensors are hardware devices that have the capability to measure an event, object, or any
physical quality that is happening. Examples include the heart rate of a person while jogging, the
temperature of a room, brightness of a light source, and the like. Sensors have the capacity to
connect to other devices that can keep track of the data they are measuring. A mobile phone can
be connected to a heart rate sensor to record and monitor a person’s health on a weekly or
monthly basis. A web application can be accessed to monitor and control the CCTV operation of
a house or building. These sensors can be connected to a network, in various ways as explained
earlier. However, there are several types of sensors, and with technology made available today,
almost all of these hardware can now be automated.

Sensors can be classified as analog or digital, but below is a list of sensors used in automation:
 Temperature sensor. This sensor is capable of measuring temperature as well as detecting
its rise or fall. This is helpful in systems that are temperature-sensitive such as power plants
and server rooms.
 Infrared (IR) sensor. This sensor often used for security purposes detects infrared light. It
is commonly used along with an infrared light source. You might have seen it in movies in
which a villain trying to access a restricted area would avoid crossing a series of IR sensors
shown as beams of red lines. Breaking or crossing the beam of red line would trigger an
alarm.
 Ultrasonic sensor. An ultrasonic sensor detects sound waves, such as how radars and
sonars pick up sounds. A typical application is a light fixture turning on if the owner claps his
or her hands, and turning off once he or she claps again.
 Touch sensor. Through touch, the sensor activates itself and becomes capable of doing its
function. The latest versions of Samsung and Apple smartphones now have a one-touch
login to access the device, instead of a pin code or a pattern. Combining a touch sensor with
biometrics, users can now access the content of their phones with just a single touch on the
home button.
 Proximity sensor. This sensor is able to detect objects within a certain range, even if the
object is not physically touching the sensor yet. It is typically used in the light fixtures of
houses and buildings. The light turns on if it detects a person is close by. This helps save
on electricity as well as secure the premises.
 Pressure sensor. A pressure sensor helps determine the weight or impact of a certain
object. It is normally used by manufacturing companies, such as automobile companies, in
designing their airbag system. They need to create an airbag that is strong enough to
cushion a driver upon a head-on collision, but not too strong to injure him or her due to the
recoil.
 Level sensor. This sensor can detect the level of liquids, fluids, grainy or granular materials,
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 74 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
such as powders, etc. Level sensors are used for disaster risk management systems, such
as a flood monitoring system. Level sensors are used to determine if a flooded street will be
passable by light vehicles or not.
 Smoke/Gas sensor. This sensor is used to detect the presence of dangerous fumes such
as carbon monoxide caused by fire. Smoke alarms show how this sensor works.

With these technologies made available, it is easy for big industries, small companies, and even
private individuals to use them. Besides, the design and implementation of these technologies
have become cheaper, much simpler, and more manageable. Thus, the concern now is not how
to use this technology but the correct way of using it.

The Influence of IT on Culture and Social Behavior

With the prevalence of technology getting widespread, there are issues, both positive and
negative, that surface. In Chapter 1, the positive and negative effects that ICT brings to
individuals, organizations, and society are discussed. But regardless of whether the effect is
positive or negative, the sudden surge of ICT has created an influence on how people’s lives
have been changed, for better and for worse. However, it is important to note that any positive
effect a person wants to see should not rely solely on the technology; it should also focus on self-
realization and social interaction.

Formerly called the “texting-capital of the world” due to the high number of SMS being sent and
received on a daily basis, the Philippines is now dubbed as the “most social nation” in a 2015
study conducted by Opera Mini. The study identified that mobile phone users in the Philippines
access social media more than any other sites. In Opera Mini’s top 50-user countries worldwide,
the Philippines ranked first with an 86% page-view. With smartphones becoming cheaper and
more accessible, people get to spend more time online, wherever and whenever they want to due
to its mobility. The smartphone adoption rate has grown from 41% to 55% in a span of one year
with Android as the most popular OS. The study also found that Filipinos view on average, 699
web pages per month. That is close to 23 pages viewed per day.

Gilkey (2015) identified in his article the many hundreds of small ways that technology alters
individual and collective behavior on a daily basis. It may not be noticed, but these “small ways”
are slowly becoming prominent which is probably why the so-called “generation wars” are now
becoming popular (i.e., Baby Boomers vs. Gen X vs. Millennial) with the obvious disparity
between these generations publicized in social media.

► Influence on Culture

Online Reviews
With the proliferation of online information, it is easy to find details on a certain movie or a book.
However, with sites such as Rotten Tomatoes, one can actually make a decision on what movie
to watch simply by reading the “reviews” of other people. If the review is “good,” then the person
might watch the movie. But if the review is “bad,” then he or she might consider other movies.
This trend of having other people do the task first for others— watching the full movie and
informing people online if the film is worth watching or not—is an example of how technology
affects the basic human behavior of decision-making.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 75 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Weblogging/Social Media
Nowadays, food bloggers post pictures of their meals in restaurants along with a food review.
This trend created a culture of people dining with friends or family without actually interacting with
them. People would first take pictures of their meal and post it online. Others, during the course
of the meal, would even use their phones to update their online status instead of talking to the
other people in their group. This is one typical example of technology, in the form of weblogging
and social media, affecting social interaction.

YouTube Learners
YouTube is one of the most popular social media sites. People can watch videos, comment on
them, and upload their own videos, among others. Thus, YouTube serves as a source of videos
with people searching for almost about anything online— from trivial topics to more serious
subject matter. This fact influences the acquisition of knowledge and learning of certain skill sets.
Instead of reading books or listening to their teacher’s class lecture, students would rather watch
YouTube to learn the lesson. Again, this is another situation in which technology affects the
culture, this time, of learning.

► Influence on Social Behavior

Cyberbullying
Behavioral choices especially of teenagers or adolescents are influenced by technologies.
Cyberbullying, for example, is a serious phenomenon brought about by social media.

Cyberbullying is an unwanted, hostile behavior done by individuals to other people in the hope of
gaining control over them. Cyberbullies can be classmates, neighbors, or officemates. Victims of
bullying often end up with personal traumas. And since the act of bullying is done online, the
attackers may also be individuals you do not know as they hide behind their internet profiles.

An internet profile, also called an internet identity, online identity, or internet persona, is a
profile created by internet users to establish their social identity in online communities, social
media sites, and other websites. Because some consider an online identity to be a possible
breach in privacy, this has led to the creation of an online “mask,” an online profile created through
a series of questions (username, gender, age, etc.). However, this “mask” may lead to a
misdirection, or in a worse case, to misinformation. For example, while a handle or username
“student2006” may mean that the user is a student, “2006” may mean either the user’s year of
birth or year of entering school.

Unfortunately, some internet profiles are created to intentionally mislead or misinform people. In
the previous example, it is possible that the username is randomly created and it is not at all
related to the user’s real identity. Choosing a gender also gives the user the option to either be a
boy or a girl. Setting the birthdate online gives the person the option to either be younger or older
especially since Facebook requires its users to be at least 13 years of age before they can create
an account. Registering someone who is 13 years and below on their behalf is also not allowed
and is considered to be a violation of their terms and conditions (Facebook, 2018). However,
again, one can indicate any age and continue using Facebook when he or she is below the
minimum age requirement. This misdirection or misinformation may have dangerous
consequences, which is why it is important to follow the netiquette rule on personalizing IT.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 76 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
The internet profile, be it true or misleading, apparently gives people the confidence they would
not normally have if they are in a face-to-face confrontation. A seemingly innocent picture, for
instance, or a grammatically wrong post may be criticized or bashed.

Cyberbullying comes in the form of messages or images, such as memes. Since messages or
images can be posted anonymously, it is hard and oftentimes, difficult to trace the source. It
becomes more problematic if the message or image gets re-posted and distributed quickly online,
or goes “viral.” Finding the original post might prove to be even harder.

Victims of cyberbullying may experience the same trauma as a real-life bullying victim. The
difference, however, is that cyberbullying is on a much larger scale. Defending oneself from this
kind of attack is difficult as most of the cyberbullies use internet personas which, as previously
discussed, may be real or not. Even their actual location may be difficult to trace.

The good news is that the society—communities and the government—are devising ways to stop
bullying - be it digital or otherwise. As discussed in the previous chapter, the Philippines has
identified several laws, including the Cyber Crime Prevention Act, also known as R.A. 10175, to
help catch cyberbullies.

But, ultimately, in order to prevent cyberbullying from happening, individuals especially the youth
are encouraged to talk to their families and friends in case they experiencing such a situation
online. Involving parents and teachers in young individuals’ social media activities such as adding
them to Facebook may help, if not, stop cyberbullying as they can also see any untoward
incidents happening to these youngsters while online (Prevent Cyberbullying, 2017).

► Netiquette
Netiquette is a combination of the words internet and etiquette. It describes how one should act
online. Netiquette brings in policies for all the features and qualities of the internet, including the
use of the World Wide Web (WWW), email services, File Transfer Protocol (FTP), chat rooms,
and instant messaging. There are different types of netiquette implemented all over the world.

→ Netiquette for Social Media


The use of social media such as Facebook, Twitter, Instagram, Linkedln, and others is neither a
bad habit nor a good habit in one’s personal life. Using social media is good for easy
communication with friends and even long-lost friends and relatives. But there are some netizens
who use their social media accounts to discredit other people by posting or shouting ruthless
words about a particular person or sharing a status that maligns one’s character or reputation.

Some of the rules of netiquette for social media are as follows (Spira, 2010):
a) The Personalize IT Rule. Make sure to put restrictions in accepting friends or followers
on your social media (e.g., Facebook, Twitter, Instagram, Linkedln). It is not about having
the most number of followers or friends. What matters is who you interact with and how
you interact with them.
b) The Off-limits Rule. Know your limitations when voicing out your opinions on different
subjects or topics concerning your school, religion, personal information, workplace, and
even some controversial subjects such as politics. Knowing your limitations can save you
from dire consequences later on.
c) The Tag - You’re It Rule. Be careful in tagging someone either in your status post or
photos. You may also restrict someone from tagging you in their posts and photos. Always
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 77 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
think of your safety, as well as others’ personal boundaries.

→Netiquette for Email Services, Chat Rooms, and Instant Messaging


Email services such as sending and receiving an email from someone (professional to personal)
anywhere in the world are used in numerous contexts. Shown in the figure are some guidelines
in composing an email.

Figure 5.2 Guidelines in composing an email

→Netiquette for Chat Rooms and Instant Messaging

Joining chat rooms and sending instant messages, although mandatory in social media, have
become a trend for users. This is especially beneficial for people working in different places such
as a person working overseas while his or her friend or relative is in the Philippines. Instead of
spending for telcom services, the person just needs internet connection.

Still, there are guidelines for using instant messaging applications. For instance, someone might
interrupt and request you to accept him or her or to be connected to your account without your
knowing who that person really is.
a) Think long and hard before accepting a private conversation, especially with someone not
on your friends list. Not everyone online may be as they seem to be.
b) In a group chat, include only those that are in your friends list.
c) If possible, do not give your personal information while chatting, including your photos or
“selfies.”
d) When in doubt, save a copy or make a back-up of your conversation (chat).
e) You must log out from your account at all times, especially if you are in a public place,
such as a computer shop.
f) You may opt to customize your account settings from public to private account.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 78 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Professional Ethics

While netiquette applies to all netizens, IT professionals specifically follow an ethical practice as
they are the front liners, support, and backend of ICT.

The Association of Computing Machinery (ACM) has identified 24 imperatives of professional


conduct for IT professionals. It contains many, but not all, issues IT professionals are likely to
face while using, creating, and implementing ICT.

Section 1 outlines the fundamental ethical considerations while Section 2 provides additional,
more specific considerations of professional conduct. Section 3 is intended specifically for
individuals who have a leadership role, whether in the workplace or in a volunteer capacity such
as in organizations like ACM. Principles involving compliance with this Code are laid out in
Section 4.

1. GENERAL MORAL IMPERATIVES

As an ACM member, I will....

1.1 Contribute to society and human well-being.

This principle concerning the quality of life of all people affirms an obligation to protect
fundamental human rights and to respect the diversity of all cultures. An essential aim of
computing professionals is to minimize negative consequences of computing systems, including
threats to health and safety. When designing or implementing systems, computing professionals
must attempt to ensure that the products of their efforts will be used in socially responsible ways,
will meet social needs, and will avoid harmful effects on health and welfare.

In addition to a safe social environment, human well-being includes a safe natural environment.
Therefore, computing professionals who design and develop systems must be alert to, and make
others aware of, any potential damage to the local or global environment.

1.2 Avoid harm to others.


“Harm” means injury or negative consequences, such as undesirable loss of information, loss of
property, property damage, or unwanted environmental impacts. This principle prohibits use of
computing technology in ways that result in harm to any of the following: users, the general public,
employees, and employers. Harmful actions include intentional destruction or modification of files
and programs leading to serious loss of resources or unnecessary expenditure of human
resources such as the time and effort required to purge systems of “computer viruses.”

Well-intended actions, including those that accomplish assigned duties, may lead to harm
unexpectedly. In such an event, the responsible person or persons are obligated to undo or
mitigate the negative consequences as much as possible. One way to avoid unintentional harm
is to carefully consider potential impacts on all those affected by decisions made during design
and implementation.

To minimize the possibility of indirectly harming others, computing professionals must minimize
malfunctions by following generally accepted standards for system design and testing.
Furthermore, it is often necessary to assess the social consequences of systems to project the
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 79 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
likelihood of any serious harm to others. If system features are misrepresented to users, co-
workers, or supervisors, the individual computing professional is responsible for any resulting
injury.

1.3 Be honest and trustworthy.


Honesty is an essential component of trust. Without trust an organization cannot function
effectively. The honest computing professional will not make deliberately false or deceptive
claims about a system or system design, but will instead provide full disclosure of all pertinent
system limitations and problems.
A computer professional has a duty to be honest about his or her own qualifications, and about
any circumstances that might lead to conflicts of interest.
Membership in volunteer organizations such as ACM may at times place individuals in situations
where their statements or actions could be interpreted as carrying the “weight” of a larger group
of professionals. An ACM member will exercise care to not misrepresent ACM or positions and
policies of ACM or any ACM units.

1.4 Be fair and take action not to discriminate.


The values of equality, tolerance, respect for others, and the principles of equal justice govern
this imperative. Discrimination on the basis of race, sex, religion, age, disability, national origin,
or other such factors is an explicit violation of ACM policy and will not be tolerated.

Inequities between different groups of people may result from the use or misuse of information
and technology. In a fair society, all individuals would have equal opportunity to participate in, or
benefit from, the use of computer resources regardless of race, sex, religion, age, disability,
national origin, or other such similar factors. However, these ideals do not justify unauthorized
use of computer resources nor do they provide an adequate basis for violation of any other ethical
imperatives of this code.

1.5 Honor property rights including copyrights and patent.


Violation of copyrights, patents, trade secrets, and the terms of license agreements is prohibited
by law in most circumstances. Even when software is not so protected, such violations are
contrary to professional behavior. Copies of software should be made only with proper
authorization. Unauthorized duplication of materials must not be condoned.

1.6 Give proper credit for intellectual property.


Computing professionals are obligated to protect the integrity of intellectual property. Specifically,
one must not take credit for other’s ideas or work, even in cases where the work has not been
explicitly protected by copyright, patent, etc.

1.7 Respect the privacy of others.


Computing and communication technology enables the collection and exchange of personal
information on a scale unprecedented in the history of civilization. Thus, there is increased
potential for violating the privacy of individuals and groups. It is the responsibility of professionals
to maintain the privacy and integrity of data describing individuals. This includes taking
precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or
accidental disclosure to inappropriate individuals. Furthermore, procedures must be established
to allow individuals to review their records and correct inaccuracies.

This imperative implies that only the necessary amount of personal information be collected in a
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 80 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
system, that retention and disposal periods for that information be clearly defined and enforced,
and that personal information gathered for a specific purpose not be used for other purposes
without consent of the individual(s). These principles apply to electronic communications,
including electronic mail, and prohibit procedures that capture or monitor electronic user data,
including messages, without the permission of users or bona fide authorization related to system
operation and maintenance. User data observed during the normal duties of system operation
and maintenance must be treated with strictest confidentiality, except in cases where it is
evidence for the violation of law, organizational regulations, or this Code. In these cases, the
nature or contents of that information must be disclosed only to proper authorities.

1.8 Honor confidentiality.


The principle of honesty extends to issues of confidentiality of information whenever one has
made an explicit promise to honor confidentiality or, implicitly, when private information not
directly related to the performance of one’s duties becomes available. The ethical concern is to
respect all obligations of confidentiality to employers, clients, and users unless discharged from
such obligations by requirements of the law or other principles of this Code.

2. MORE SPECIFIC PROFESSIONAL RESPONSIBILITIES

As an ACM computing professional, I will....

2.1 Strive to achieve the highest quality, effectiveness and dignity in both the process and
products of professional work.

Excellence is perhaps the most important obligation of a professional. The computing


professional must strive to achieve quality and to be cognizant of the serious negative
consequences that may result from poor quality in a system.

2.2 Acquire and maintain professional competence.


Excellence depends on individuals who take responsibility for acquiring and maintaining
professional competence. A professional must participate in setting standards for appropriate
levels of competence, and strive to achieve those standards. Upgrading technical knowledge and
competence can be achieved in several ways: doing independent study; attending seminars,
conferences, or courses; and being involved in professional organizations.

2.3 Know and respect existing laws pertaining to professional work.


ACM members must obey existing local, state, provincial, national, and international laws unless
there is a compelling ethical basis not to do so. Policies and procedures of the organizations in
which one participates must also be obeyed. But compliance must be balanced with the
recognition that sometimes existing laws and rules may be immoral or inappropriate and,
therefore, must be challenged. Violation of a law or regulation may be ethical when that law or
rule has inadequate moral basis or when it conflicts with another law judged to be more important.
If one decides to violate a law or rule because it is viewed as unethical, or for any other reason,
one must fully accept responsibility for one’s actions and for the consequences.

2.4 Accept and provide appropriate professional review.


Quality professional work, especially in the computing profession, depends on professional
reviewing and critiquing. Whenever appropriate, individual members should seek and utilize peer
review as well as provide critical review of the work of others.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 81 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
2.5 Give comprehensive and thorough evaluations of computer systems and their impacts,
including analysis of possible risks.
Computer professionals must strive to be perceptive, thorough, and objective when evaluating,
recommending, and presenting system descriptions and alternatives. Computer professionals are
in a position of special trust, and therefore have a special responsibility to provide objective,
credible evaluations to employers, clients, users, and the public. When providing evaluations, the
professional must also identify any relevant conflicts of interest, as stated in imperative 1.3.

As noted in the discussion of principle 1.2 on avoiding harm, any signs of danger from systems
must be reported to those who have opportunity and/ or responsibility to resolve them. See the
guidelines for imperative 1.2 for more details concerning harm, including the reporting of
professional violations.

2.6 Honor contracts, agreements, and assigned responsibilities.


Honoring one’s commitments is a matter of integrity and honesty. For the computer professional,
this includes ensuring that system elements perform as intended. Also, when one contracts for
work with another party, one has an obligation to keep that party properly informed about progress
toward completing that work.

A computing professional has a responsibility to request a change in any assignment that he or


she feels cannot be completed as defined. Only after serious consideration and with full
disclosure of risks and concerns to the employer or client, should one accept the assignment.
The major underlying principle here is the obligation to accept personal accountability for
professional work. On some occasions, other ethical principles may take greater priority.

A judgment that a specific assignment should not be performed may not be accepted. Having
clearly identified one’s concerns and reasons for that judgment, but failing to procure a change
in that assignment, one may yet be obligated, by contract or by law, to proceed as directed.

The computing professional’s ethical judgment should be the final guide in deciding whether or
not to proceed. Regardless of the decision, one must accept the responsibility for the
consequences.
However, performing assignments “against one’s own judgment” does not relieve the
professional of responsibility for any negative consequences.

2.7 Improve public understanding of computing and its consequences.


Computing professionals have a responsibility to share technical knowledge with the public by
encouraging understanding of computing, including the impacts of computer systems and their
limitations. This imperative implies an obligation to counter any false views related to computing.

2.8 Access computing and communication resources only when authorized to do so.
Theft or destruction of tangible and electronic property is prohibited by imperative 1.2-“Avoid harm
to others.” Trespassing and unauthorized use of a computer or communication system is
addressed by this imperative. Trespassing includes accessing communication networks and
computer systems, or accounts and/or files associated with those systems, without explicit
authorization to do so. Individuals and organizations have the right to restrict access to their
systems so long as they do not violate the discrimination principle (see 1.4). No one should enter
or use another’s computer system, software, or data files without permission. One must always
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 82 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
have appropriate approval before using system resources, including communication ports, file
space, other system peripherals, and computer time.

3. ORGANIZATIONAL LEADERSHIP IMPERATIVES

As an ACM member and an organizational leader, I will....


BACKGROUND NOTE: This section draws extensively from the draft IFIP Code of Ethics,
especially its sections on organizational ethics and international concerns. The ethical obligations
of organizations tend to be neglected in most codes of professional conduct, perhaps because
these codes are written from the perspective of the individual member. This dilemma is addressed
by stating these imperatives from the perspective of the organizational leader. In this context
“leader” is viewed as any organizational member who has leadership or educational
responsibilities. These imperatives generally may apply to organizations as well as their leaders.
In this context “organizations” are corporations, government agencies, and other “employers,” as
well as volunteer professional organizations.

3.1 Articulate social responsibilities of members of an organizational unit and encourage


full acceptance of those responsibilities.
Because organizations of all kinds have impacts on the public, they must accept responsibilities
to society. Organizational procedures and attitudes oriented toward quality and the welfare of
society will reduce harm to members of the public, thereby serving public interest and fulfilling
social responsibility. Therefore, organizational leaders must encourage full participation in
meeting social responsibilities as well as quality performance.

3.2 Manage personnel and resources to design and build information systems that
enhance the quality of working life.
Organizational leaders are responsible for ensuring that computer systems enhance, not
degrade, the quality of working life. When implementing a computer system, organizations must
consider the personal and professional development, physical safety, and human dignity of all
workers. Appropriate human-computer ergonomic standards should be considered in system
design and in the workplace.

3.3 Acknowledge and support proper and authorized uses of an organization’s computing
and communication resources.
Because computer systems can become tools to harm as well as to benefit an organization, the
leadership has the responsibility to clearly define appropriate and inappropriate uses of
organizational computing resources. While the number and scope of such rules should be
minimal, they should be fully enforced when established.

3.4 Ensure that users and those who will be affected by a system have their needs clearly
articulated during the assessment and design of requirements; later, the system must be
validated to meet requirements.
Current system users, potential users, and other persons whose lives may be affected by a
system must have their needs assessed and incorporated in the statement of requirements.
System validation should ensure compliance with those requirements.

3.5 Articulate and support policies that protect the dignity of users and others affected by
a computing system.
Designing or implementing systems that deliberately or inadvertently demean individuals or
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 83 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
groups is ethically unacceptable. Computer professionals who are in decision-making positions
should verify that systems are designed and implemented to protect personal privacy and
enhance personal dignity.

3.6 Create opportunities for members of the organization to learn the principles and
limitations of computer systems.
This complements the imperative on public understanding (2.7). Educational opportunities are
essential to facilitate optimal participation of all organizational members. Opportunities must be
available to all members to help them improve their knowledge and skills in computing, including
courses that familiarize them with the consequences and limitations of particular types of
systems. In particular, professionals must be made aware of the dangers of building systems
around oversimplified models, the improbability of anticipating and designing for every possible
operating condition, and other issues related to the complexity of this profession.

4. COMPLIANCE WITH THE CODE

As an ACM member, I will....

4.1 Uphold and promote the principles of this Code.


The future of the computing profession depends on both technical and ethical excellence. Not
only is it important for ACM computing professionals to adhere to the principles expressed in this
Code, each member should encourage and support adherence by other members.

4.2 Treat violations of this code as inconsistent with membership in the ACM.
Adherence of professionals to a code of ethics is largely a voluntary matter. However, if a member
does not follow this code by engaging in gross misconduct, membership in ACM may be
terminated.

This Code and the supplemental Guidelines were developed by the Task Force for the Revision
of the ACM Code of Ethics and. Professional Conduct: Ronald E. Anderson, Chair, Gerald Engel,
Donald Gotterbarn, Grace C. Hertlein, Alex Hoffman, Bruce Jawer, Deborah G. Johnson, Doris
K. Lidtke, Joyce Currie Little, Dianne Martin, Donn B. Parker, Judith Perrolle, and Richard S.
Rosenberg. The Task Force was organized by ACM/SIGCAS and funding was provided by the
ACM SIG Discretionary Fund. This Code and the supplemental Guidelines were adopted by the
ACM Council on October 16, 1992.

This Code may be published without permission as long as it is not changed in any way and it
carries the copyright notice.
Copyright 1997, Association for Computing Machinery, Inc.

CHAPTER KEY POINTS

 The Internet of Things (IoT) poses both advantages and disadvantages. Other than
connectivity, IoT is capable of integrating technology and business, providing analytics,
and securing network connections. On the other hand, IoT faces many challenges in
system requirements, connectivity, power requirements, security, development, and
services.
 The demand for system automation is on the rise. With the use of computer systems, the
typical cumbersome and error-prone procedures have become automated.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 84 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
 The sudden surge of ICT has created an influence on how people’s lives have been
changed, for better and for worse. ICT’s influence established a culture of relying on online
reviews, lesser personal interaction due to weblogging and social media, and YouTube or
video streaming for knowledge acquisition.
 Since ICT has also greatly influenced social behavior, netiquette (from internet and
etiquette) brings in policies for all the features and qualities of the internet.
 IT professionals follow an ethical practice as they are the frontliners, support, and backend
of ICT. The Association of Computing Machinery (ACM) has identified 24 imperatives of
professional conduct for IT professionals.

CHECKPOINT

Multiple Choice: Direction: Write your answer in a piece of paper and take a photo on it and
send it to your instructor. After that you have to compile it and put it in a white folder and pass all
your activity before final exam.

1. An IT trend which uses machine learning


a. IoT and Smart Home technology c. Big data
b. Artificial intelligence d. Automation
2. Which method of automation is Apple’s Siri an example of?
a. Automated assistant c. Smart machines
b. Process automation d. IT support management
3. When you enter a room, the light turns on automatically without turning on any light switch.
What type of sensor is used in this scenario?
a. Infrared sensor b. Touch sensor c. Pressure sensor d. Proximity sensor
4. Which type of sensor is often used to detect any burglar intrusion?
a. Infrared sensor c. Gas sensor
b. Temperature sensor d. Level sensor
5. IoT implementation is challenging. One problem area has something to do with an
enterprise dealing with production, manufacturing, ordering, and supplying goods. This
type of issue is considered under
a. Connectivity c. Security
b. System requirements d. Services
6. The use of e-learning is one advantage of using technology. This advantage falls under
the category of _______________.
a. Access to information c. Security
b. Improved access to education d. Service
7. An internet profile also refers to the following terms, except:
a. Internet identity b. Online identity c. Internet persona d. Online avatar
8. According to Facebook, you must be at least years old before you can create an
account.
a. 13 b. 15 c. 16 d. 18
9. A meme is a personalized and edited posted online and often used by cyberbullies to
bully their victims
a. Text b. Article c. Image d. Profile
10. It describes how one should act while online.
a. Netiquette c. IT professionalism
b. Etiquette d. ACM imperatives of professional conduct

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 85 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
TASKS

A. Individual Activity
Write a self-reflection on cyberbullying by answering the following questions:
1. Have you, or has anyone you know, been cyberbullied?
2. What were the steps you, or that person, took to stop 'the incident? What are the other
ways that you think can combat cyberbullying?
3. What did you, or that person, learn from the experience?

B. Group Activity
Form yourselves into groups of three to four members each, and make a list of the latest
technological devices you are familiar with or have used. Identify at least 3 technology trends and
write down their pros and cons. Present your report in class. Provide pictures or bring the actual
devices if possible.

REFERENCES
DeMers, J. (2016, November 16). 7 Technology trends that will dominate 2017. Forbes.
Retrieved from https ://www.forbes.com/sites/jaysondemers/2016/11/16/ 7-technology-
trends-that-will-dominate-2017
Facebook. (2018). How do I report a child under the age of 13?. Retrieved from
https://www.facebook.com/help/15779354 0954833
Gilkey, C. (2015, April 21). Technology and culture influence each other. Retrieved from
http://www.productiveflourishing.com/technology-and-culture-influence-each-other
Institute for Robotic Process Automation & Artificial Intelligence. (2018). What is robotic process
animation?. Retrieved from http:// irpaai.com/what-is-robotic-process-automation
Intel Corporation, (n.d.). 50 years of Moore’s law. Retrieved from
https://www.intel.sg/content/www/xa/en/silicon- innovations/moores-law-technology.html
Markkula, T. (2016, March 29). Basis of IoT: Data, analytics, prediction, and optimization.
Houston Analytics. Retrieved from http://blog.houston-analytics.com/blog/basis-of-iot-
data- analytics-prediction-and-optimization
Mattern, F., & Floerkemeier, C. (2010). From the internet of computers to the internet of things.
Retrieved from http:// vs.inf.ethz.ch/publ/papers/Internet-of-things.pdf
Opera Team. (2015, July 30). The Philippines—from text- messaging capital to most social
nation. Opera Business Blog. Retrieved from http://www.operasoftware.com/blog/smw/
the-philippines-from-text-messaging-capital-to-most-social- nation
Scully, P. (2018, February 22). The top 10 IoT segments in 2018 areas - based on 1,600 real
IoT projects. Retrieved from https://iot- analytics.com/top-10-iot-segments-2018-real-iot-
projects
Spira, J. (2010, April 27). The top 10 rules of netiquette for social media. Retrieved from
http://socialmediamore.com/the-top- 10-rules-of-netiquette-for-social-media
Statista: The Statistics Portal. (2017). Statistics and market data on mobile internet & apps.
Retrieved from https://www.statista. com/markets/424/topic/538/ mobile-internet-apps
Texas Instruments Incorporated. (2016). Challenges in the internet of things. Retrieved from
http://www.ti.com/ww/en/internet_ ofjhings/iot-challenges.html
U.S. Department of Health and Human Services. (2017). Prevent cyberbullying. Retrieved from
https://www.stopbullying.gov/ cyberbullying/prevention/index.html

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 86 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
MODULE 6

IT TRENDS, ISSUES, AND CHALLENGES

At the end of this chapter, the students should be able to:


 describe how the given IT trends affect the Filipino’s way of living;
 discuss the issues and challenges in IT that the different sectors face; and
 research further on the influence of IT on a specific sector.

OPENING ACTIVITY
Debate
1. Go online and open your web browser.
2. On the address bar, type in ph.news.yahoo.com/tech.
3. Identify news articles about the top technologies in the Philippines and read them. Take
notes if necessary.
4. In class, form two groups to discuss about the advantages and disadvantages of these
technologies to Filipinos. One group will discuss the advantages and the other group will
discuss the disadvantages.

INTRODUCTION

Trends
This chapter features articles and studies showing trends in IT from recent years. The topics
include the industry sector’s use of technology specifically IoT and automation. Articles regarding
online banking as well as the business sector’s online presence through e-commerce are
likewise included. IT trends on education and case studies on the use of technology in health are
also presented. Lastly, this chapter covers several issues in IT that the different sectors face.

Industry
The industry sector in the Philippines is made up of local and foreign companies that provide
different products and services to Filipinos. Some companies in the food industry include
Universal Robina and Monde Nissin while those in the beverage industry include San Miguel
Brewery and Pepsi Philippines.

Two major trends are seen in this sector—automation and the application of Internet of Things
(IoT), hence the introduction of smart industries.

Internet of Things (IoT)

The IoT is becoming an increasingly growing topic of conversation both in the workplace and in
the society at large. It has the potential to impact how we live and how we work. For instance,
through the use of sensors, electronics, and robotics, major companies have reported increase
in productivity as well as accuracy of results in their production lines. The following articles
present the positive effects of IoT and the role of the internet and network connectivity in business.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 87 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Groups to mull over loT development in Philippines
by Rizal Raoul Reyes and Dennis Estopace
March 14. 2016
With spending on the Internet of Things (loT) in the Philippines expected to grow 13 times
from its 2014 market value, several groups are focusing on the potential of the new technology
in local business development.
One group is Industry Platform Pte. Ltd. (IPPL), a Singapore incorporated firm focused
on the global telecommunications sector.
In a statement, Ippl said it forecast IoT in the Philippines to grow from $55.1 million in
2014 to $766.8 million in 2020. The firm is organizing a second conference in May, wherein an
expected 300 representatives of local end users across major verticals will be attending the
conference and exhibitions. Dubbed as “Asia IoT Business Platform," IPPL said its 2015
conference was participated by 89 percent of local companies with attendees made up of key
executives from the information technology and operational divisions, who are actively exploring
technology solutions, to drive business efficiencies, improve services and ensure security. The
conference follows the IoT Summit Philippines held early this month.
Its head organizer, Elaine Cedillo, said there is a need to organize more activities to
inform Filipino consumers of the benefits of IoT.
"We want to push further to continue to educate the different business and industrial
sectors and prepare the start-up community for 2020, where everything is expected to be
connected to the internet,” Cedillo was quoted in a statement as saying. "Plus we want to build
awareness about the convenience brought by this technology."
The first IoT Summit Philippines showcased different innovative solutions in the areas of
“connected living,” health care and "wearables."
On the other hand, the IPPL said the seventh edition of Asia IoT Business Platform will
feature sessions on market trends and outlook, industrial IoT, transport and logistics, smart city,
big data, cloud, security, health care, banking and finance.

Ionics, IBM team up on high-tech products


by Doris Dumlao-Abadilla December 18, 2015

A unit of electronics manufacturer Ionics Inc. has teamed up with global technology giant
IBM to develop high-tech products that ride on the Internet of Things (IoT) using cloud, mobile
and big data analytics.
In a disclosure to the Philippine Stock Exchange on Friday, Ionics subsidiary lonics-EMS
announced its partnership with IBM to develop loT-based “smart factory" capability.
IoT refers to a network of physical objects like gadgets, consumer appliances or industrial
equipment with embedded technology that allows communication and interaction with each
other.
“The technology keys on the strengths of IBM's cloud solutions paired with lonics-EMS’s
42 years of manufacturing excellence and IoT product development expertise,” the disclosure
said.
Based on the disclosure, lonics-EMS will work with IBM to build a platform for the
development of cloud-based apps for clients on Bluemix via the IBM Internet of Things
Foundation.
Bluemix—an implementation of IBM's open cloud architecture based on open source
platform Cloud Foundry—delivers enterprise- level services that can easily integrate with cloud
applications.
"The renewed collaboration between lonics-EMS and IBM on cloud, mobile, and big data
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 88 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
analytics marks the next generation of long-standing relationship between the two companies.
Together, we will bring IoT solutions to mutual customers. The smart factory would be a game-
changer," said Lawrence Qua, chair and chief executive officer of lonics-EMS.
Cloud computing lets users access big volumes of files and applications over the Internet
using multiple devices.
Big data refers to voluminous amount of data from traditional and digital sources that
could be mined for valuable insights on human behavior such as trends, patterns, and
associations, in turn boosting business intelligence.
“The dramatic increase of connected devices provides organizations the ability to gather
near real-time data and extract new insights that weren't possible until now," said Luis Pineda,
president and country general manager at IBM Philippines. "This is driving a major shift in the
electronics industry allowing manufacturers to focus on delivering a more compelling experience
to the consumer. Our relationship with lonics-EMS is a significant step in this direction as we
help bring innovation to the manufacturing industry."
With access to services and APIs—short for "application program interface" or a set of
routines, protocols, and tools for building software applications—the disclosure said Bluemix
could easily extend an Internet-connected device such as a sensor or controller into the cloud,
build an application alongside the device to collect the data and send real-time insights. This is
in turn seen creating more solutions for medical, social, mobile, security, and IoT.
Using lonics-EMS’ strong expertise in hardware design and four-decade experience in
manufacturing, the collaboration is seen to enable manufacturing clients to develop applications
for predictive analytics and draw on data from the IoT to enhance various areas such as asset
performance management, operational risk management, and predictive maintenance. This will
significantly improve manufacturing efficiencies and capabilities that are essential for the
development of advanced • devices in several loT verticals particularly for e-Health (medical)
and automotive customers, the disclosure said.
The synergy of ionics-EMS and IBM stems from their respective positions of strength to
enable the manufacturing industry capture opportunities in the era of big data analytics, loT,
cloud, and mobile, setting a higher bar for global manufacturing services,” the disclosure said.
Ionics-EMS and IBM have had a long partnership that began in 1990 and continued over
the decades with evolving programs and technologies. Their loT-based products will be
demonstrated at the global consumer electronics and consumer technology trade show CES
2016 in Las Vegas, Nevada this January 6-9, the disclosure said.

IT Automation

Automating what used to be manual procedures is the trend in organizations and industries. As
with IoT, automation helps many companies achieve greater productivity among its employees
by using computers and software programs to do the tasks. Such automation includes accounting
systems, production systems, and even security systems. The news articles below mention how
a simple attendance monitoring system has become much easier as well as how companies and
employees can benefit from using technology in their daily work.

Makati fully implements biometric timekeeping system


by Mike Frialde July 29, 2014

MANILA, Philippines - The Makati City government has fully implemented the use of the
Automated Biometrics Timekeeping System in monitoring the daily attendance of employees
working in its offices at the City Hall complex in Barangay Poblacion.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 89 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Makati Mayor Jejomar Erwin Binay said the move was in keeping with the commitment of the
city government to harnessing technology to promote transparency and efficiency in its
operations and services.
"Aside from ensuring the accuracy of daily time records and thwarting attempts of time theft, the
new timekeeping system also promotes fast and efficient payroll calculations," Binay said.
Vissia Marie Aldon, city personnel officer, said using the system eliminated the possibility of
employees making ‘proxy’ time-in or time-out for other employees.
The head of the Human Resources Development Office (HRDO) also said 10 stand-alone
fingerprint time recorders initially procured were used for over 3,000 city personnel working in
offices within the City Hall complex during the dry run. Employees were required to sign in and
out on a timesheet to serve as back-up in case the system malfunctioned.
Aldon said since the test run went without a hitch, the HRDO has now fully implemented the
biometrics attendance system. She said the city government will be purchasing additional
fingerprint time recorders so that all 34 offices and departments of the city government, including
the University of Makati, Ospital ng Makati, and other agencies outside City Hall, would be
served.
Prior to the system’s test run, all employees at the City Hall complex underwent fingerprint
capturing procedure conducted by HRDO personnel in their respective offices.

Property consultant bares future of work


by Rizal Raoul Reyes June 10, 2017

Telecommunication companies and property developers will be having closer collaboration in


developing the future workplace, according to a document.
In a research paper titled "The Future of Work,” Jones Lang LaSalle Inc. head of corporate
solutions research in Asia Pacific Susan Sutherland said the traditional office workplace is
gradually going to be replaced by a new concept anchored on technology developments.
Sutherland cited the Internet of Things, artificial intelligence, and robotics as examples of the
latter.
"We will see greater working relations between the developers and the telecom companies as
clients will demand buildings that can be technology-ready for their operations,” Sutherland told
the BusinessMirror. “Smart buildings are also way of the future. They also want to optimize cost."
She believes in the future, "there will be closer ties between developers and telcos to put up
smart buildings.”
Sutherland said Philippine business leaders must embrace the changes in the workplace such
as the use of technology in their processes and operations to become more relevant to new
environment and next generation of workforce.
For instance, Sutherland said a client in the business process outsourcing industry may need a
facility for its automation process or robotics-driven operations.
“Automation is rapidly taking place into more service jobs.”
Although the Philippines is still considered an emerging market, Sutherland said the Philippines
can still keep pace with the rapid changes in the workplace. As long as organizations are
receptive and have an open mind, they can join the march towards that change, according to
Sutherland. She said these views were based on discussion with JLL’s clients about the role of
technology in their operations.
‘“Future of Work' is really about how our clients can think of the future of the workplace and the
impact of the corporate real estate," Sutherland said. “Technology is a big factor in the
discussion.”
She added the “work-from-home” concept is one that can be adopted as one of the changes in
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 90 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
the workplace, “especially for a place like Metro Manila where daily monstrous traffic jams is the
‘new normal.”'
“We certainly see that it can be beneficial but it is really up to the company to determine what
their needs are.”
Sutherland also pointed out that organizations can pursue future-proofing programs on its
employees to ensure they are equipped to handle disruptions. One future-proofing program is
to provide them the skills and the knowledge such as data analytics to handle new trends in the
business environment, she explained.
Furthermore, it would be quite useful for an organization to also focus on the Internet of Things,
artificial intelligence, robotics and automation and predictive capability, according to Sutherland.

Banking

Online banking also known as “internet banking” or “web banking” allows a user to execute
financial transactions via the internet. An online bank offers customers just about every service
traditionally available through a local branch, including deposits, money transfers, and bill
payments. The news articles that follow explore the rise of digital banking customers as more and
more Filipinos rely on their internet connection to avail of different bank services.

More Filipinos warming up to online banking


by Doris Dumlao April 3, 2013

Three out of four Filipinos are now comfortable conducting online banking transactions,
based on a Citigroup online poll.
"We are seeing a marked shift to online and mobile banking, and in Asia, we already see
98 percent of all transactions taking place outside a branch," Citi Philippines consumer business
manager Bea Tan said in a statement on Wednesday.
This conclusion was derived from an annual online poll that measures the Fin-Q or
financial quotient of Filipino consumers. The survey covered 3,500 online respondents across
seven countries including the Philippines. Five hundred interviews were held in each of the
participating countries that include Australia, India, Indonesia, Korea, Singapore, and Taiwan.
The survey showed that 75 percent of the people covered, those who have either a bank
deposit or credit card account, were now doing almost all their banking transactions through
their computer, tablet, or mobile phone. Only one of every four respondents continue to visit the
branch, and mostly for face-to- face meetings with the bank managers or account officers. Only
9 percent of respondents said they had yet to try online banking.
The same survey showed that popular transactions online included account inquiries, bills
payment, and funds transfers between accounts. This trend was attributed by Citi to new
technologies that offered customers user-friendly solutions and enhanced security. The Citi Fin-
Q Survey also showed that Filipinos were showing growing interest in using online banking
beyond the usual transactions. About 92 percent of respondents wanted to "take their banking
with them" and be able to access all of their finances while traveling, and 78 percent expressed
interest in global investment opportunities.
In line with this, Tan said Citi was committed to remain a step ahead of its clients' needs
especially in the online banking space where Citi had gained considerable ground.
“As of September 2012, we have already registered more than 1,000,000 mobile banking
users for Citi in Asia, and we are confident that the number has grown since," she said.
One online banking innovation cited by Citi is the newly- launched One-Time Personal
Identification Number (PIN) which uses Citibank Online, the bank's multi-awarded Internet
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 91 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
banking platform. The One-Time PIN is a unique six-digit PIN, sent via SMS, which allows users
to access their account details and complete online transactions via Citibank Online. Users of
Citibank Online need to key in their username and password first before they will be prompted
for a One-Time PIN. The One-Time PIN acts as a second- level authentication method to ensure
that online transactions are secure.
The One-Time PIN may also be generated via the Citi Mobile Banking App, an application
available to Apple and Android device users. Also available for a minimal fee is Citi’s Online
Security Device, which generates One-Time PINs in one click.
Another recent addition to Citi's roster of online banking services is the "Call Me” service
for clients who wish to apply for another credit card, or those who have yet to own a Citibank
credit card. Consumers can click on the "Call Me" button at the upper right section of Citibank
Online’s homepage to request Citi to call.
As the number of online banking users rises, Citi said its mobile application had also
gained foothold in the mobile banking space. This app represents a suite of mobile banking
applications for Android, BlackBerry, and iPhone. It enables credit card and bank clients to
access their accounts and complete a range of banking transactions using their preferred
smartphones.

Security Bank’s government payment service cited at HK’s The Asset Triple-A awards
by InterAksyon June 12, 2017

MANILA - Security Bank Corporation emerged as winner in two public sector categories
at the recently concluded The Asset Triple A Awards 2016 held in Hong Kong.
The Bank was named ‘Best Regional Specialist Award’ and 'Best in Treasury and
Working Capital for the Philippines' under the public sector category in recognition of its efficient
government payment services and performance in corporate treasury management, trade
finance, supply chain, and risk management.
“Our electronic government payments system (e-Gov payments) was introduced nine
years ago through DigiBanker to aid the government agencies in serving the public. It utilizes
top-security internet operations and streamlines processes for an efficient delivery of quality
services,” said president and CEO Alfonso L. Salcedo, Jr.
The Bank, through its electronic platform for cash management solutions DigiBanker,
gained the trust of government agencies. The Bank’s government payment facility covers
financial transactions for Home Development Mutual Fund (Pag-IBIG), Social Security System
(SSS), Philippine Health Insurance Corporation (PhilHealth), Bureau of Internal Revenue (BIR),
and the Bureau of Customs (BOC).
DigiBanker deploys strict security measures through online facility utilizing SSL with 256-
bit encryption, which is the highest and first in local banks along with Verisign EV SGC
certification, said the bank in a press release. It is fully equipped with technologies that enable
ease of large file transfers and provide a more secure platform and firewall.
Through the years. Security Bank jaid it has maintained its reputation as the only bank
that has a fully integrated system with the Philippine Health Insurance Corporation (PhilHealth),
a server-to-server connectivity for streamlined processing of premium contribution settlement
and posting.
Security Bank cited its distinction as the first bank that launched the process of host-to-
host connectivity with the Philippine Clearing House Corporation (PCHC) and the Bureau of
Customs (BOC), as well as the first bank to offer 24/7 payments capability.
This automation was also cited by the Philippine government as the first to have adopted
an online facility for payments of custom duties and taxes enabling shortened turnaround time
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 92 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
of the release of goods and helping port decongestion. It also helps the government in
preventing issues which may hamper manual payment process.
The Bank said it also works together with state shelter agency Pag-IBIG to encourage
customers on the benefits of automation. The host-to-host system through the Pag-IBIG
RealTime module ensures timely and accurate posting of payments.
"Our Bank's continued proactive approach and risk management framework is part of our
commitment to deliver the promise of BetterBanking,” Salcedo said.
In the past four years, The Asset has cited Security Bank's electronic cash management
system as the 'Best e-Solutions Partner Bank in the Philippines' from 2013-2016. The Asset
Triple A Digital Enterprise Awards also recognized Security Bank as the ‘Best Electronic Bank'
in 2015 and 2016.

Education

Most colleges and universities in the Philippines use a learning management system (LMS) to
deliver, manage, and keep track of students’ progress. This LMS, which is delivered online,
relates to the e-learning system. E-learning is learning that utilizes electronic technologies to
access educational curriculum outside of a traditional classroom. In most cases, it refers to a
course, program, or degree delivered completely online. Some call this as distance learning. The
news articles that follow discuss how telecom companies such as Globe and PLDT are giving
back to the society by introducing technology to public schools and making sure students, as well
as teachers, become global learners.

Global Filipino Schools enhance e-Learning with Cloudtone tablets


by Manila Bulletin February 13, 2017

Select public schools under the Global Filipino School (GFS) program of Globe Telecom
can now further enhance digital learning and promote love of reading among K-12 students
through the help of 220 tablets donated by Cloudfone, one of the leading providers of
smartphones and tablets in the country.
Globe and Cloudfone launched the partnership by holding a different kind of reading
session at the Andres Bonifacio Integrated School in Mandaluyong City where 40 grades 5 and
6 students enjoyed stories told by Globe employee volunteers using the tablets.
The first 11 schools which implemented the GFS program received Cloudpad 900TV
tablets pre-loaded with an ebookreader app. The tablets are on top of the regular Globe Digital
Laboratory package that are provided to all GFS containing netbooks/tablets, WiFi devices, and
a mobile cart with a built-in projector screen.
With the help of the tablets, students and teachers can fully explore the GFS Library
(http://www.gfslibrary.com), a free, web- based platform that provides free and quick access
to digital story books for children and young adults as well as textbooks on core subjects such
as math, science, English, Filipino, music, and arts, among others.
They may also use the Globe-provided internet service to connect to the GFS Library and
to download as many titles as needed for their learning needs.
Under GFS, schools are provided with unparalleled online connectivity to give homeroom
teachers access to limitless teaching and learning engagements available on the internet.

PLDT Enterprise rolls out e-learning program to aid millennials' studies


by Sunstar Philippines September 26, 2016

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 93 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
PLDT Enterprise, via its Digital Mobility team, leads innovation in e-Learning or digital
technology-backed education, as it recently launched Smart’s new e-Learning Program for the
academe and training institutions.
The program consists of a suite of products that leverage the benefits of internet-based
technologies jn schools. This erases the perception that many people have of technology such
as gadgets as mere distractions to students' studies.
The products in the suite are specifically developed to benefit not only students and
teachers, but also administrators and parents, among others.
“Our view is that the devices will serve more as effective study aids, and act less as
distractions,” said 'GioAbaquin, head of Digital Mobility, Disruptive Business Group (DBG), the
emerging technologies business unit of PLDT Enterprise.
“Today's millennials have learned to accept the role that devices play in their daily lives.
It is important to bring in this new technology into the classroom, for both the obvious, physical
reasons, such as lighter physical loads versus heavy books and notebooks, as well as for
technological benefits," Abaquin said.
“Mobile learning supports the learning process rather than being integral to it. Mobile
learning can also be a useful add-on tool for students with special needs. It can be used as a
‘hook’ to re-engage disaffected youth,” added Chet Alviz, head of SMACS (Social, Mobile,
Analytics, Cloud and Security).
For the e-Learning App, there will be package options such as app-only, app with SIM,
as well as tablet bundles.
More than a Learning Management System (LMS), the Smart e-Learning program
creates an end-to-end Digital Campus Experience. Smart is set to roll out the e-Learning
program with select schools.
The whole suite offers PLDT iGate, Smart WiFi, Smart M2M SIMs, Smart Prepaid SIMs,
customized website with e-Commerce capability to help establish online presence. Vehicle and
Personnel trackers for the school transport, as well as for student use, customized App,
including evolved learning solutions such as Smart's e-Learning LMS and Microsoft Office 365.
All these can be accessed by authorized teachers, administrators, and students in and out of
the campus.
“We are very pleased to have included in our service portfolio an educational digital tool
that benefits not only students, but also the entire school ecosystem. Parents, for example, will
be able to gain access to their child's developmental progress. Educators, on the other hand,
will be able to freely interact with both students and parents on the more important aspects of
today's learning experience," added Nico Alcoseba, head of PLDT’s Disruptive Business Group.
PLDT Enterprise stressed digital technology-backed education is ever more rising and it
believes the Philippines has a high potential for growth in e-Learning adoption. Ambient Insight,
an international market research firm that specializes in e-Learning and Mobile Learning, said
in a statement that in Asia alone, the market for learning and training programs supported by
electronic technology is expected to reach $11.5 billion by 2016, or more than twice the $5.2
billion in 2011.
The two countries with the highest growth rates in the world are Vietnam and Malaysia,
respectively, at 44.3 percent and 39.4 percent. Also in the top 10 are Romania and China. The
Asian region is also known for a high adoption in mobile technology, due to the proliferation of
low-priced mobile devices.
At present, the Philippines ranks at seventh place in terms of growth rate in e-Learning.
The country joins Thailand, India, Kenya, Slovakia, and Azerbaijan with growth rates of between
30 percent and 35 percent.
This shows that the Philippines is well on the way towards adapting eLearning for
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 94 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
educational institutions—and even in businesses. Smart’s goal is to be at the forefront of that
digital change, at home, at work, and even in school.

Business

Electronic commerce or e-commerce is a term for any type of business, or commercial transaction
that involves the transfer of information across the internet. It covers a range of different types of
businesses, from consumer-based retail sites and auction or music sites, to business exchanges
trading goods and services between corporations. It is currently one of the most important aspects
of the internet to emerge.

E-commerce growth to drive logistics business in PH


by Bernie Cahiles-Magkilat May 22, 2017

E-commerce in the Philippines is going to post very high growth that will drive the logistics
industry to improve to cope with demand for a seamless experience operation from
manufacturer to retailer to customer, according to JDA Software Group, Inc., the world's leading
digital supply chain solutions provider.
Amit Bagga, JDA regional vice-prssident for Asia Pacific, told reporters during the
company's event dubbed “The Next Game Changer: Optimizing Supply Chain Planning and
Logistics" held Wednesday at Okada Manila that e-commerce is growing exponentially in the
country.
JDA has been focused on providing the retail supply chain solutions in the country in the
past 15 years already.
With strong e-commerce, Bagga said the next thing to flourish is the logistics industry.
Already, JDA is expanding its product offering in the country from the local retail supply chain
solutions from-to the more challenging local logistics solutions to provide a seamless
experience.
Its retail supply chain solutions business in the country accounts for 80 percent of its
business while the logistics business is only 20 percent. But Bagga was confident that with its
transportation and warehousing solutions, JDA will be able to make logistics a very large
component of its business.
“1 am confident we will exit out with logistics becoming a very large component of our
business. So, minimum of 30 percent minimum, aggressively 1 would say logistics will be 30 to
50 percent of our business here in the next two years,” he said.
So far 8 of top 10 retailers in the country have been using the JDA retail solutions for a
total of 15-16 retailers.
At the event, JDA was offering its Transport Management Solutions (TMS) for local
logistics firms that would like to provide seamless experience and cost-efficient operation.
“Logistics companies should stop thinking of themselves as moving a box from one point
to another," he said.
Logistics firms need data to make informed decisions. Logistics solution is also more
important because of the country's archipelagic situation and the cost of inventory. To further
save on cost, logistics should be tied with the cost of inventory, he explained.
“Look at how you can customize your transportation to lower cost of inventory; that is the
real strategy,” he said.
According to Bagga, JDA TMS is unique on two things because it does not only talk about
planning, movement of goods, but optimizing the routes, network, optimizing inventory
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 95 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
movements to give the logistics company the entire scenario that it can play to optimize and
minimize cost of inventory.
The other unique feature is it can point which warehouse to use and how much time will
it take to move that, how to connect with labor, and optimize labor.
Coming from the discussion with top CEOs and top logistics heads at their event, Bagga
was optimistic in being able to close deals with 2-3 logistics companies this year.

Philippine e-commerce to reach 200bn by 2020


by First Circle

Recent statistics have estimated the internet population in the Philippines to be the fastest
growing in the world. It is determined to have enjoyed a growth rate of 530% over the last 5
years. The e-commerce industry is also set to grow at an annual growth rate of 101.4% between
2016 and 2020. The Philippines is home to a sizeable youth population and is well placed to
see continued online retail activity in the coming years.
This is not only a local trend; the Asia-Pacific region has been booming in e-commerce
sales over the last number of years and has surpassed North America and Western Europe in
terms of Business to Consumer (B2C) sales. The graph below displays the exponential growth
that the Asia-Pacific region has been enjoying versus the corresponding growth figures for other
parts of the world.

E-Commerce activity is dependent on access to the internet and as the world’s online
footprint increases, consumers will inevitably increase the amount of products they buy online.
Statistica.com has forecasted that the total number of smartphone users in the Philippines will
reach 38.4 million by 2020, as displayed in the figure below.

The Department of Trade and Industry (DTI) in the Philippines has reaffirmed its commitment to
facilitate this growth in e-commerce market. “The coming years will be bullish for Philippine E-
commerce and come 2020, our strategies and plans for the industry will exhibit a 20/20 vision –
utterly perfect and accurate.” Undersecretary Prudencio Reyes Jr. declared in the recently
concluded E-Commerce Forum.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 96 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Health

E-health (or eHealth) refers to the use of information and communications technology in health
care. It covers a lot of territory, which is why digital health industry experts often contest exactly
what the term means—and to add to the confusion, it is also frequently used as a synonym for
Health IT.

Eysenbach (2001) in an editorial published by the Journal of Medical Internet Research (2001)
defines eHealth as:
"an emerging field in the intersection of medical informatics, public health and business, referring to
health services and information delivered or enhanced through the Internet and related technologies...
In a broader sense, the term characterizes not only a technical development, but also a state-of-mind,
a way of thinking, an attitude, and a commitment for networked, global thinking, to improve health care
locally, regionally, and worldwide by using information () and communication technology” (para. 3).

The World Health Organization (WHO) defines eHealth as:


“the cost-effective and secure use of information and communications technologies in support of
health and health-related fields, including healthcare services, health surveillance, health literature,
and health education, J, knowledge and research ” (para. 1).

How digital health is bridging the healthcare gap in the Philippines


by Jof Enriquez October 28, 2014

Digital health in the Philippines traces its roots to the University of the Philippines (Manila)
National Telehealth Center (UPM-NTHC), which pioneered open-source telemedicine and
mHealth projects that connected remote patients with specialists in the Philippine General
Hospital (PGH). This community-based approach in delivering eHealth solutions has gathered
momentum in recent years, as the lack of doctors, nurses, and other allied health workers in
underserved areas became more severe.

mHealth

The Philippine government has tapped the private sector in further developing its eHealth
projects. Backed by Qualcomm Wireless Reach, Wireless Access for Health (WAH) leverages
the high penetration of mobile devices in the Philippines, low-cost tablets and smartphones, and
open-source software. Erin Gavin, project manager, described it as using "3G technology to
improve health care by reducing the time required for reporting and improving access to
accurate and relevant patient information for clinicians and government decision-makers.”

The project has “expanded the CHITS EMR platform that supports data collection and reporting
from the barangays [local government unit] through the mobile midwife platform and sends
patient alerts through the Synchronized Patient Alert Via SMS feature." WAH enhanced CHITS
to be compatible with the Philippine Field Health Service Information System (FHSIS).

WAH allows health workers to track patient data, generate reports, and record outbreaks.
Accessing patient records now takes seconds instead of minutes, and health reports—
previously taking days via courier to arrive—now takes only minutes to transmit.

As of March 2014, the platform has achieved the following:


Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 97 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
 Adopted in 68 clinics in 14 provinces
 Served > 2,500 patients a day
 950 clinicians trained
 1 million patient consultations
 500,000 patient records recorded
Recent mHealth programs include the SMS TeleReferrals used by the DOH in its "Doctor-to-
the-Barrio" (DTTB) program, and health education programs giving mobile phone users
reminders on vaccination, dengue prevention, tuberculosis, and health seminars. The rCHITS
(Real time Monitoring of Vital Maternal and Child Health Indicators through the Community
Health Information Tracking System) project uses SMS for field workers to report maternal and
child health services rendered, create appointments, and remind patients.

Issues and Challenges

Industry
With the introduction of computer systems at work, one main issue raised is maintaining the
computer system’s security and integrity. Modes of communication within an office environment
normally entail exchanging of emails or discussions in local chat rooms. This scenario opens the
doors for malicious software that can be shared, whether intentionally or not, to the entire
organization. Malicious software, or malware, is a general term used to describe any type of
software that can cause harm to a computer system. Examples of malware include the following:

1. Virus. It is a computer program usually hidden within another program that inserts itself into
other programs or files. Once inside the computer system, it usually performs malicious
actions, such as destroying data or deleting processing files in the computer causing it to
crash.
2. Worm. A worm is a stand-alone malware that replicates itself in order to spread to other
computers. It almost always causes at least some harm to a computer system, such as
slowing down the network connection. Compared to a virus, a worm causes less damage;
however, a worm can also act as a virus by replicating itself, causing damage to multiple parts
in the system.
3. Trojan. It refers to a malicious program which initially appears to be useful, routine, or
interesting in order to persuade a victim to install it. Unlike computer viruses and worms,
Trojans generally do not attempt to inject themselves into other files or otherwise propagate
themselves. However, a Trojan may contain a virus or a worm, which, once opened, can
cause damage to the computer.
4. Spyware. A spyware is a software that aims to gather information about an organization or a
person without his or her knowledge. It may send particular information to another entity
without the consumer’s consent. Most advertising companies use this for marketing purposes.
An extension of this is another malware called adware. A more dangerous type of spyware is
one that asserts control over a device without the user’s knowledge, such as a keystroke
logging or spy cams.
5. Ransomware. It is type of malware that can block access to a victim’s data. The hacker uses
his or her technical knowledge or skills to gain unauthorized access to data or systems. The
hacker also threatens the victim that specific data will be deleted, for example, until a ransom
is paid. Some simple ransomware is not that difficult to reverse, especially for someone who
has knowledge in IT; however, more advanced malware uses a technique called cryptoviral
extortion, in which the victim’s files are encrypted, and the hacker would demand a ransom
for the file to be decrypted.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 98 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
One of the most recent malware attack which has hit almost 74 countries, affecting several
industries worldwide was the ransomware “WannaCry.” The article below discusses how the
ransomware attack happened.

Alarm grows over global ransomware attacks


by Agence France-Presse May 13, 2017

Security experts expressed alarm Friday over a fast-moving wave of cyberattacks around
the world that appeared to exploit a flaw exposed in documents leaked from the U.S. National
Security Agency.
The attacks came in the form of ransomware, a technique used by hackers that locks a
user's files unless they pay the attackers in bitcoin.
The scope of the attacks was not immediately clear, amid varying estimates from security
researchers. But the malware was linked to attacks on hospitals in Britain as well as the Spanish
telecom giant Telefonica and was also spreading in other countries.
The malware's name is WCry, but analysts were also using variants such as WannaCry,
WanaCryptOr, WannaCrypt, or Wana DecryptOr.
Microsoft released a security patch earlier this year for the flaw, but many systems have
yet to be updated, researchers said.
Researcher CostinRaiu of the Russian-based security firm Kaspersky said in a tweet, "So
far, we have recorded more than 45,000 attacks of the #WannaCry ransomware in 74 countries
around the world. Number still growing fast.”
Jakub Kroustek of Avast said on Twitter the security firm had detected “36,000 detections
of #WannaCry (aka #WanaCypt0r aka #WCry) #ransomware so far. Russia, Ukraine, and
Taiwan leading. This is huge."
Kaspersky said the malware was released in April by a hacking group called Shadow
Brokers which claimed to have discovered the flaw from the NSA.
In the United States, the package delivery giant FedEx acknowledged it was hit by
malware after one researcher cited the company as a target.
“Like many other companies, FedEx is experiencing interference with some of our
Windows-based systems caused by malware," the company said in a statement.
“We are implementing remediation steps as quickly as possible.”

Banking

While online banking may be convenient, there are still skeptics to this given the sensitive data
being transacted online: money. Recently, a supposed faulty system upgrade caused customers
of Bank of the Philippine Islands (BPI) to either lose money from their accounts or receive huge
amounts of money that were not theirs. The article below described the situation which occurred
for 48 hours, leaving their customers irate and panicked.

BPI: Problems with accounts will be resolved ‘within the day’


by VJ Bacungan, CNN Philippines June 8, 2017

Metro Manila (CNN Philippines, June 7) - All errors that appeared as unauthorized
transactions in the accounts of Bank of the Philippine Islands (BPI) clients will be resolved today
and no one will lose any money, the bank said.
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 99 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
Clients of the bank were alarmed Wednesday when they discovered strange withdrawals
and deposits in their accounts.
As long lines of bewildered account holders were starting to form in some branches, BPI
issued a statement saying that an "internal data processing error" had caused some accounts
debited or credited twice for a past transaction.
The bank said the error caused some transactions at BPI and BPI Family Savings,
between April 27 and May 2, to be double-posted on June 6.
It assured the public that the bank had identified the cause of the error and would
temporarily suspend online and mobile banking channels to help address the issue faster.
“We are currently correcting the mispostings. We apologize for the inconvenience that
this may have caused," it said.
BPI Senior Vice President Katherine Sta. Maria told CNN Philippines the bank was fixing
the problem.
She denied that the bank’s system was hacked, advising clients to go to the nearest
branch for their transactions.
“We will make sure that all our clients who were affected by this, their accounts will be
corrected within the day," she said. “It is not a hack or scam... Internally po, may nagkamali
[something went wrong].”
BPI assured that none of its clients would lose money as a result of the technical glitch
and that the bank would continue to service them.
The Bangko Sentral ng Pilipinas (BSP) also dismissed rumors about any hacking.
“Not true, but there was system error that resulted in double debits and credits,” incoming
BSP Governor Nestor Espenilla said in a message to the Finance Department.

Education

With online learning being accepted into schools as part of the teaching and learning
methodology, one of the things that schools need to consider is monitoring and management.
Having a learning management system does not necessarily mean students are constrained into
using it to learn. There are more websites that offer learning opportunities for students such as
TIME for kids, National Geographic, and NASA, among others. However, the use of LMS still
poses issues and challenges to both students and teachers.

5 common problems faced by students in e-learning and how to overcome them.


By Sunil Kumar
July 10, 2015

1. Adaptive Struggle
Switching from traditional classroom and face-to-face instructor training to computer-based
training in a virtual classroom makes the learning experience entirely different for students.
Their resistance to change doesn’t allow them to adapt to the online learning environment,
whereas it takes time for them to get accustomed to Course Management System (CMS) and
the methods of computer-based education. While passive listening and note-taking are
expected in a traditional classroom, online discussions or creating a web page demand springing
into action. Students with a “traditional" mindset find it difficult to adapt; however, they need to
accept the new learning circumstances with an open mind and heart. Understanding the benefits
of e-Learning and even discussing them with their peers may change this mindset and better
prepare students for online classes.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 100 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
2. Technical Issues
Many students are not provided with the high bandwidth or the strong internet connection that
online courses require, and thus fail to catch up with their virtual classmates: Their weak
monitors make it hard to follow the Course Management System and their learning experience
becomes problematic. Moreover, most of them live off campus and find it difficult to keep in tune
with the technical requirements of the chosen course. Some of them don't even own computers
and seek help in Learning Resource Centers for technical assistance. The only solution to this
problem is knowing exactly what kind of technological support they will need for a certain course
before enrolling in it, as well as properly equipping themselves for the course’s successful
completion.

3. Computer Literacy
Although students are generally tech savvy, and thus able to manage computers well, lack of
computer literacy is a major issue among students today. Many of them cannot operate basic
programs such as Microsoft Word and PowerPoint and, therefore, are not able to handle their
files. Furthermore, many students find fixing basic computer problems troublesome, as they
have no knowledge in this area. However, technological proficiency is a must for following online
courses, as it enables students to manage their assignments and courseware in an organized
manner without struggling. Basic courses in computer literacy enhance students' knowledge in
the field; having a fundamental knowledge of computer hardware would help them participate in
online classes without interruptions and hindrances.

4. Time Management
Time management is a difficult task for e-Learners, as online courses require a lot of time and
intensive work. Furthermore, whereas it is mostly adults who prefer web-based learning
programs for their place and time flexibility, they rarely have the time to take the courses due to
their various everyday commitments. A regular schedule planner would be a significant help to
these learners, as they could even set reminders for their courses and assignments.

5. Self-Motivation
Self-motivation is an e-Learning essential requirement; however, many online learners lack it,
much to their surprise. After enrolling in distance learning courses, many learners fall behind
and nurture the idea of giving up, as difficulties in handling a technological medium also seem
insurmountable. Students need to find the motivation to follow the new educational trends and
also properly equip themselves for future challenges in their education and careers. Only a
positive attitude will help them overcome the challenges in eLearning; though this is hard to
practice, students need to understand that it is necessary in order to reap the e-Learning’s
benefits in the future.

Business

As previously discussed, some companies use adware to track information about their customers
for marketing purposes. You might ask, how is that possible?

Whenever you buy items online in sites like Lazada, Amazon, or Zalora, your personal details,
such as your name name, gender, items purchased, etc. are saved by these retailers. Later on,
while browsing other websites such as Facebook, you notice advertisements streaming at the
Date Developed: Issued by:
GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 101 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
bottom of the page. The advertisements include items from Lazada or Amazon which you were
browsing earlier. How did Facebook know what you were looking at in those sites?

An adware is a program designed to display advertisements on your computer, redirect your


search requests to advertising websites, and collect marketing-type data about yourself—for
example, the types of websites that you visit—so that customized advertisements can be
displayed.

Is it a bad thing? It depends. An adware can be considered a legitimate alternative offered to


consumers who do not wish to pay for software. There are many ad-supported programs, games,
or utilities that are distributed as adware, which is often called as freeware. Some applications
have pop-up advertisements that if a user wishes to remove them, a certain fee should be paid
to make the apps ad-free.

Health
Patient records are always kept confidential. However, with the introduction of technology, and
with hospitals and clinics leaning towards automation, patient records have shifted from paper to
digital. With this, concerns regarding data security and data confidentiality of patients have
increased. But why is there such an interest in patient records?

According to the International Association of Privacy Professionals, “a medical record is more


valuable than a credit card on the black market. According to the World Privacy Forum, a medical
record, including a name, address, Social Security number and health ID number, typically goes for
$50 on the online black market [whereas] an active credit card sells for just $3. ” This makes it more
lucrative for cyber criminals as patient data becomes digital.

In the Philippines, hospitals are required to comply with the Data Privacy Act (DPA) of 2012 and
implement data protection measures in their data processing systems to protect the confidentiality
of their patients’ personal information and medical records.

Violations of data privacy involve penalties. Under the DPA, the penalty for unauthorized
disclosure of personal information is PI million. The penalty extends to P2 million if the act
involves sensitive personal information.

In the United States, the Health Insurance Portability and Accountability Act (HIPAA) in 1996 was
designed to promote the confidentiality and portability of patient records, as well as to develop
data security standards for consistency in the healthcare industry. Under this act, organizations
adhere to HIPAA compliance standards related to protecting their systems, and patients can feel
confident that their personal medical information will remain private. With technological
advancements, howcvn, the rules seemed inadequate. Thus, the HIPAA Security Final Rule, the
last of the three HIPAA rules, was published in the February 20, 2003 issue of Federal Register
with an effective date of April 21, 2003.

The HIPAA Security Rule establishes national standards to protect individuals’ electronic
personal health information that is created, received, used, or maintained by a covered entity.
The Security Rule requires appropriate administrative, physical and technical safeguards to
ensure the confidentiality, integrity, and security of electronic protected health information.

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 102 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01
CHAPTER KEY POINTS

 Two major trends are seen in the industry sector—automation and the application of
Internet of Things (IoT)—hence, the introduction of smart industries.
 Online banking, e-learning (distance learning), e-commerce, and e-health are products of
these trends.
 Despite these trends, the security and integrity of computer systems are at risk. Various
malwares and adwares pose threat on the confidentiality of information. Fraud online
transactions have also become prevalent.

CHECKPOINT

Multiple Choice: Direction: Write your answer in a piece of paper and take a photo on it and
send it to your instructor. After that you have to compile it and put it in a white folder and pass all
your activity before final exam.

1. It allows a user to execute financial transactions via the internet.


a. E-learning b. Online banking c. Internet of Things d. IT automation
2. It refers to the voluminous amount of data from traditional and digital sources that could
be mined for valuable insights on human behavior such as trends, patterns, and
associations, in turn boosting business intelligence.
a. Big data b. Digibanker c. IT automation d. Learning management system
3. It refers to the use of information and communications technology in health care.
a. IT automation b. Telecare c. E-commerce d. E-health
4. It is a stand-alone malware that replicates itself in order to spread to other computers.
a. Worm b. Virus c. Ransomware d. Spyware
5. It is a type of malware that can block access to a victim’s data.
a. Virus b. Ransomware c. Spyware d. Worm

TASK

Research further on the influence of IT on any of the following sectors:


 Banking
 Education
 Health
 Business
 Others

Date Developed: Issued by:


GEE 103 March 1, 2021
LIVING IN THE CAPSU
Page 103 of 103
INFORMATION Developed by: Main Campus
TECHNOLOGY (IT) ERA J. Benson, L.M. Biscan
A. Verdadero & C. Malicosio Revision: # 01

You might also like