0% found this document useful (0 votes)
281 views

Module 5 Ge Elec 3

This document provides an overview of a learning module that discusses how information technology impacts culture and society. It covers topics like the Internet of Things (IoT), automation, and how IT influences culture and social behaviors. The module will explain how IoT integrates technology and business through data collection and analysis. It will also discuss how increased automation through information and communication technologies has impacted various industries and processes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
281 views

Module 5 Ge Elec 3

This document provides an overview of a learning module that discusses how information technology impacts culture and society. It covers topics like the Internet of Things (IoT), automation, and how IT influences culture and social behaviors. The module will explain how IoT integrates technology and business through data collection and analysis. It will also discuss how increased automation through information and communication technologies has impacted various industries and processes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Saint Michael College, Cantilan, Incorporated

Cantilan, Surigao del Sur


College Department

LEARNING MODULE Prepared by: Lowella E. Lao-ay


in GE Elec 3 – Living in the IT Era Course/Year: BEED/BSED/AB/BSBA/BSTM

I. MODULE 5 : IT, Culture, and the Society

II. INTRODUCTION

This module will discuss the Internet of Things (IoT) that poses both advantages and disadavantages
wherein IoT is capable of integrating technology and business, providing analytics, and securing network
connections.

III. TOPICS
1. The Impact of IT on the Society
2. Internet of Things (IoT)
3. Automation
4. The Influence of IT on Culture and Social Behavior
5. Influence on Culture
6. Influence on Social Behavior

IV. TIME FRAME : 5 hrs.

V. OBJECTIVES

1. Recall the current methods in the field of information technology;


2. Discuss the Internet of Things and its influence on the society;
3. Explain automation and its impact on the society;
4. Analyze how IT influences culture and social behavior;
5. Enumerate the rules of netiquette;
6. Describe cyberbullying and identify the steps to combat it; and
7. Familiarize themselves with and demonstrate the imperatives of professional conduct for IT professionals.

VI. SUMMARY OF TOPICS

THE IMPACT OF IT ON THE SOCIETY

As previously discussed, the seven major trends for 2017 are as follows:

1. IoT and smart home technology


2. Augmented reality and virtual reality
3. Machine learning
4. Automation
5. Big data
6. Physical-digital integrations
7. Everything on demand

Majority of organizations and companies nowadays have taken these trends into account, shifting
manual business processes to automated ones and using ICT to improve their products and services. Among
these seven trends, the internet of Things (IoT) and automation seem to have greatly influenced present-day
culture and society; thus, it is imperative to discuss these thrusts in detail.

INTERNET OF THINGS (IoT)

Internet of Things (IoT) is a set-up of devices and objects which are connected together in a given
network. Their connection, often wirelessly, is possible using both hardware and software.
The hardware part is often made up of sensors that collect data, which are then sent to other devices
for analysis and possible interpretation. Popular examples are health wearable devices such as step counters
that are connected to a mobile phone via bluetooth. An app installed in the phone records the results in a daily,
weekly, or monthly basis for the mobile phone user to keep track of his or her progress.

Capabilities of IoT

A major requirement for IoT is a strong internet connection, as all devices


must be able to communicate with one another for the upload and download of
needed data. But aside from connectivity, IoT should also be capable of the
following (Mattern & Floerkemeier):
Fig. 5.1 Everyday objects & activities
connected to the internet

1. Integration across technology and business


Sensors can be used to help improve business processes, such as machines used for manufacturing
and production, security systems, and even simple ones like automatically turning on and off a light switch.
Obviously, technology used for each application may vary, depending on the complexity and use. Software
used to interpret incoming data and sending commands to the hardware must also be taken into account. Add
to that the different protocols and standards used for connecting, such as WiFi, Bluetooth, etc. An IoT platform
must be capable of integrating all of these so that the data may be used efficiently to improve productivity and
even make predictions for optimum system performance.

2. Data analysis and synchronization


IoT should be capable of providing analytics to help organizations in their decision-making. However,
for this to be effective, data must be synchronized to allow integration with all of the business aspects, including
top management, operations, and even customer relations (Markkula, 2016).

3. Security and service


With all of these devices being used and all of these data being collected, a major concern is obviously
security. To improve security, IoT devices are usually divided into networks and each network has a different
network access, some more restricted than others, without compromising connection and system integration.
A typical example is your mobile phone notifying you if you will allow a new device to connect to it via Bluetooth.
Normally, it will ask for a pairing connection via a simple 'accept' or using a more secure line such as a pin
code.

Applications of IoT
With improved business processes and employee productivity, it is only natural for organizations to
adopt IoT. In a study conducted by IOT Analytics, it was found that most of the 1,600 IoT projects are applied
in cities (Scully, 2018).
Topping the list are as follows:
1. Smart cities
Smart cities have adopted IoT in traffic management, waste disposal, and even community monitoring
for the security of the city's residents.
2. Connected industries
The oil and gas industry is identified as one of the front-runners for IoT connectivity which includes
remote access to heavy equipment and machinery, from manufacturing to production.
3. Connected buildings
Connected building projects involve facility-automation to reduce energy costs.
4. Connected cars
With smart cities adopting IoT for their traffic management, it is no longer surprising for the latest car
models to be equipped with sensors and network connectivity. Majority of projects relating to smart vehicles
revolve around vehicle diagnostics and monitoring.
5. Smart energy
Majority of smart energy projects focus on developing smart grids for renewable energy and
infrastructure.

Challenges of IoT
But while things may look good using IoT, there are issues raised in adopting it fully. Texas
Instruments, Inc. (2016) has identified six challenges in its implementation:
1. System requirements

Industries normally identify different requirements, especially depending on the type of industry they
belong to. Those in the food industry may require monitoring of perishable goods, from production and
packaging to shipping, An automobile manufacturer may have the same process, but since products are
different, requirements may also change. Food will require data regarding temperature levels, whereas
cars will require mechanical precision.

2. Connectivity

With the varying connections-wired and wireless, as well as the different protocols governing each
connection, it will be a challenge to come up with an IoT project concerning such protocols.

3. Power requirements

IoT devices need to run on batteries as majority of these devices are mobile. The challenge,
therefore, is how to extend the battery life on such devices, especially those used in critical procedures,
such as health, disaster management, and safety.

4. Security

One of the most highlighted issues in the application of loT is data security. Confidential information
such as patients' records or employees' profiles are considered at risk. Security also includes system
integrity, with malicious acts such as hacking and viruses proliferating online.

5. Development

The task of creating lot projects may seem daunting. So one of the challenges identified is how to
expand the capabilities of developers, and not just experts, in order to create more "smart things."

6. Services

With data collected from lot, it is important as well to determine where all this will go and to identify
the platform in which these lot applications will be placed Nowadays, cloud services offer end-to-end
solutions to a number of loT projects.

AUTOMATION

With the available technology and standards for computer system interconnection, the demand for
system automation is on the rise. Colloquially called "computerization," having an automated system means
automated business processes, operations, service provider, monitoring, and even tools. With the use of
computer systems--hardware, software, or both-the typical cumbersome and error-prone procedures have
become automated. Examples include an automated payroll system, in which the employee payroll and
payslips are automatically generated every payday; a manufacturing plant that packs powdered Juices in foil
containers/sachets where machines with sensors are used to fill up the packs up to the last milligram
accurately, and even an automated weather forecast. With the introduction of cloud-computing, a growing
number of organizations have gone into automation because of less cost and minimal server maintenance.

Below are two of the common methods in implementing IT automation:

→ Robotic Process Automation (RPA)

The Institute for Robotic Process Automation and Artificial Intelligence (IRPAAI) defined robotic
process automation (RPA) as "the application of technology that allows employees in a company to configure
computer software or a "robot" to capture and interpret existing applications for processing a transaction,
manipulating data, triggering responses and communicating with other digital systems" (Institute for Robotic
Process Automation & Artificial Intelligence, 2018, para. 3). While some may think of "robots" similar to those
seen in movies, RPA actually focuses on computers being able to make logical decisions on the business
process so that their human counterparts can focus on other tasks, thus increasing work productivity. This
may not necessarily translate into hardware. Application systems and software may also be considered as
RPA as they are applicable to the following:

• Process Automation

The use not only of industrial robots but also of "presentation-layer automation software" is
capable of carrying out the daily operations of an organization. Process automation may include
finance systems such as payroll, customer management systems such as online system registration,
and academic institutions offering online enrollment systems, among others.

A school that has a learning management system will be helpful for both the students and the
teacher, especially in submitting requirements such as a homework research. The typical manual
procedure for students submitting their homework will be, to come to class, wait for the teacher, and
submit their papers personally. Automating the system requires the students to simply login to their
school website, open their individual account for the current semester, search the subject they need
access to, and upload their assignments at the comfort of their homes.

• IT Support Management

Management of IT infrastructure and complex systems becomes easier using RPA. If part of the
system fails, an automated system can immediately send notifications to the IT manager and technical
support staff, informing them of the problem. Large buildings, for example, employ an automated
emergency system, so if an emergency exit door has been opened, or a fire alarm goes off, the system
will automatically detect the exact location of the opened door or activated alarm, as the location of
the emergency will typically be assumed to be near that point.

• Automated Assistants

Apple's Siri is an example of a voice recognition software used in RPAs. Instead of machine
language (binary), computers will be able to understand human language and interact with the same.
Another example for automated assistants will be banks having an automated customer service
hotline. Customers call the bank, and instead of a human operator, an automated assistant will
respond asking for details such as service choices, account numbers, etc. Customers will use their
phone's touch keys to enter choices and numbers while the computer interprets them as input data.
After processing, a computer generated report, such as account balances and other information will
be provided.

→ Sensors

Sensors are hardware devices that have the capability to measure an event, object, or any physical
quality that is happening. Examples include the heart rate of a person while jogging, the temperature of a
room, brightness of a light source, and the like. Sensors have the capacity to connect to other devices that
can keep track of the data they are measuring. A mobile phone can be connected to a heart rate sensor to
record and monitor a person's health on a weekly or monthly basis. A web application can be accessed to
monitor and control the CCTV operation of a house or building. These sensors can be connected to a network,
in various ways as explained earlier. However, there are several types of sensors, and with technology made
available today, almost all of these hardware can now be automated.

Sensors can be classified as analog or digital, but below is a list of sensors used in automation:

• Temperature sensor

This sensor is capable of measuring temperature as well as detecting its rise or fall. This is
helpful in systems that are temperature sensitive such as power plants and server rooms.

• Infrared (IR) sensor

This sensor often used for security purpose detects infrared light. It is commonly used along
an infrared light source. You might have seen it in movies in which a villain trying to access a restricted
area would avoid crossing a series of IR sensors shown as beams of red lines. Breaking or crossing
the beam of red line would trigger an alarm.

• Ultrasonic sensor
An ultrasonic sensor detects sound waves, such as how radars and sonars pick up sounds.
A typical application is a light fixture turning on if the owner claps his or her hands, and turning off
once he or she claps again. Touch sensor

Through touch, the sensor activates itself and becomes capable of doing its function. The
latest versions of Samsung and Apple smartphones now have a one-touch login to access the device,
instead of a pin code or a pattern. Combining a touch sensor with biometrics, users can now access
the content of their phones with just a single touch on the home button.

An ultrasonic sensor detects sound waves, such as how radars and sonars pick up sounds.
A typical application is a light fixture turning on if the owner claps his or her hands, and turning off
once he or she claps again

• Touch sensor

Through touch, the sensor activates itself and becomes capable of doing its function. The
latest versions of Samsung and Apple smartphones now have a one-touch login to access the device,
instead of a pincode or a pattern. Combining a touch sensor with biometrics, users can now access
the content of their phones with just a single touch on the home button.

• Proximity sensor

This sensor is able to detect objects within a certain range, even if the object is not physically
touching the sensor yet. It is typically used in the light fixtures of houses and buildings. The light turns
on if it detects a person is close by. This helps save on electricity as well as secure the premises

• Pressure sensor

A pressure sensor helps determine the weight or impact of a certain object. It is normally used
by manufacturing companies, such as automobile companies, in designing their airbag system. They
need to create an airbag that is strong enough to cushion a driver upon a head-on collision, but not
too strong to injure him or her due to the recoil.

• Level sensor

This sensor can detect the level of liquids, fluids, grainy or granular materials, such as
powders, etc. Level sensors are used for disaster risk management systems, such as a flood
monitoring system. Level sensors are used to determine if a flooded street will be passable by light
vehicles or not.

• Smoke/Gas sensor

This sensor is used to detect the presence of dangerous fumes such as carbon monoxide
caused by fire. Smoke alarms show how this sensor works.

With these technologies made available, it is easy for big industries, small companies, and
even private individuals to use them. Besides, the design and implementation of these technologies
have become cheaper, much simpler, and more manageable. Thus, the concern now is not how to
use this technology but the correct way of using it.

THE INFLUENCE OF IT ON CULTURE AND SOCIAL BEHAVIOR

With the prevalence of technology getting widespread, there are issues, both positive and negative,
that surface. In Chapter 1, the positive and negative effects that ICT brings to individuals, organizations, and
society are discussed. But regardless of whether the effect is positive or negative, the sudden surge of ICT
has created an influence on how people's lives have been changed, for better and for worse. However, it is
important to note that any positive effect a person wants to see should not rely solely on the technology, it
should also focus on self-realization and social interaction
Formerly called the "texting-capital of the world" due to the high number of SMS being sent and
received on a daily basis, the Philippines is now dubbed as the "most social nation" in a 2015 study conducted
by Opera Mini. The study identified that mobile phone users in the Philippines access social media more than
any other sites. In Opera Mini's top 50-user countries worldwide, the Philippines ranked first with an 86% page-
view. With smartphones becoming cheaper and more accessible, people get to spend more time online,
wherever and whenever they want to due to its mobility. The smartphone adoption rate has grown from 41%
to 55% in a span of one year with Android as the most popular OS. The study also found that Filipinos view
on average, 699 web pages per month. That is close to 23 pages viewed per day.
However, with this type of technological progress, it is observed that the attitude and behavior of
people, not just Filipinos, are evolving to meet technology's evolution. For example, the invention of the
telephone in 1800s paved the way for long-distance communication. It created a behavior for people to stay
at home and call someone instead of going to the other person's house and have a face-to-face conversation.
Fast forward to 2017, people call each other on their mobile phones just to ask what they want to eat for lunch.
With the invention of cars and other modes of transportation, humans have created a culture of how they do
commuting, the concept of carpooling. and even the options of where to spend vacations. It is the same with
the introduction of technology and the internet. The fast-paced evolution of mobile technology and the internet
has greatly changed how people perceived communication. In previous chapters, it is mentioned how online
commerce started on the web. but later on evolved into a mobile platform, revolutionizing the way customers
buy products and services.
Gilkey (2015) identified in his article the many hundreds of small ways that technology alters individual
and collective behavior on a daily basis. It may not be noticed, but these "small ways" are slowly becoming
prominent which is probably why the so-called "generation wars" are now becoming popular (i.e., Baby
Boomers vs. Gen X vs. Millennials) with the obvious disparity between these generations publicized in social
media.

INFLUENCE ON CULTURE

Online Reviews

With the proliferation of online information, it is easy to find details on a certain movie or a book.
However, with sites such as Rotten Tomatoes, one can actually make a decision on what movie to watch
simply by reading the "reviews" of other people. If the review is "good," then the person might watch the movie.
But if the review is "bad," then he or she might consider other movies. This trend of having other people do
the task first for others – watching the full movie and informing people online if the film is worth watching or
not is an example of how technology affects the basic human behavior of decision-making.

Weblogging/Social Media

Nowadays, food bloggers post pictures of their meals in restaurants along with a food review. This
trend created a culture of people dining with friends or family without actually interacting with them. People
would first take pictures of their meal and post it online. Others, during the course of the meal, would even use
their phones to update their online status instead of talking to the other people in their group. This is one typical
example of technology, in the form of weblogging and social media, affecting social interaction.

YouTube Learners

YouTube is one of the most popular social media sites. People can watch videos, comment on them,
and upload their own videos, among others. Thus, YouTube serves as a source of videos with people
searching for almost about anything online – from trivial topics to more serious subject matter. This fact
influences the acquisition of knowledge and learning of certain skill sets. Instead of reading books or listening
to their teacher's class lecture, students would rather watch You Tube to learn the lesson. Again, this is another
situation in which technology affects the culture, this time, of learning.

INFLUENCE ON SOCIAL BEHAVIOR

Cyberbullying

Behavioral choices especially of teenagers or adolescents are influenced by technologies.


Cyberbullying, for example, is a serious phenomenon brought about by social media.

Cyberbullying is an unwanted, hostile behavior done by individuals to other people in the hope of
gaining control over them. Cyberbullies can be classmates, neighbors, or officemates. Victims of bullying often
end up with personal traumas. And since the act of bullying is done online, the attackers may also be
individuals you do not know as they hide behind their internet profiles.
An internet profile, also called an internet identity, online identity, or internet persona, is a profile
created by internet users to establish their social identity in online communities, social media sites, and other
websites. Because some consider an online identity to be a possible breach in privacy, this has led to the
creation of an online "mask," an online profile created through a series of questions (username, gender, age,
etc.). However, this "mask" may lead to a misdirection, or in a worse case, to misinformation. For example,
while a handle or username "student2006" may mean that the user is a student, 2006" may mean either the
user's year of birth or year of entering school.

Unfortunately, some internet profiles are created to intentionally mislead or misinform people. In the
previous example, it is possible that the username is randomly created and it is not at all related to the user's
real identity. Choosing a gender also gives the user the option to either be a boy or a girl. Setting the birthdate
online gives the person the option to either be younger or older especially since Facebook requires its users
to be at least 13 years of age before they can create an account. Registering someone who is 13 years and
below on their behalf is also not allowed and is considered to be a violation of their terms and conditions
(Facebook, 2018). However, again, one can indicate any age and continue using Facebook when he or she
is below the minimum age requirement. This misdirection or misinformation may have dangerous
consequences, which is why it is important to follow the netiquette rule on personalizing IT.

The internet profile, be it true or misleading, apparently gives people the confidence they would not
normally have if they are in a face-to-face confrontation. A seemingly innocent picture, for instance, or a
grammatically wrong post may be criticized or bashed.

Cyberbullying comes in the form of messages or images, such as memes. Since messages or images
can be posted anonymously, it is hard and oftentimes, difficult to trace the source. It becomes more
problematic if the message or image gets re-posted and distributed quickly online, or goes "viral." Finding the
original post might prove to be even harder.

Victims of cyberbullying may experience the same trauma as a real-life bullying victim. The difference,
however, is that cyberbullying is on a much larger scale. Defending oneself from this kind of attack is difficult
as most of the cyberbullies use internet personas which, as previously discussed, may be real or not. Even
their actual location may be difficult to trace.

The good news is that the society-communities and the government--are devising ways to stop bullying
- be it digital or otherwise. As discussed in the previous chapter, the Philippines has identified several laws,
including the Cyber Crime Prevention Act, also known as R.A. 10175, to help catch cyberbullies.

But, ultimately, in order to prevent cyberbullying from happening, individuals especially the youth are
encouraged to talk to their families and friends in case they experiencing such a situation online. Involving
parents and teachers in young individuals' social media activities such as adding them Facebook may help, if
not, stop cyberbullying as they can also to see any untoward incidents happening to these youngsters while
online (Prevent Cyberbullying, 2017).

Netiquette

Netiquette is a combination of the words internet and etiquette. It describes how one should act online.
Netiquette brings in policies for all the features and qualities of the internet, including the use of the World
Wide Web (WWW), email services, File Transfer Protocol (FTP), chat rooms, and instant messaging. There
are different types of netiquette implemented all over the world.

→ Netiquette for Social Media

The use of social media such as Facebook, Twitter, Instagram, LinkedIn, and others is neither a
bad habit nor a good habit in one's personal life. Using social media is good for easy communication with
friends and even long-lost friends and relatives. But there are some netizens who use their social media
accounts to discredit other people by posting or shouting ruthless words about a particular person or
sharing a status that maligns one's character or reputation.

Some of the rules of netiquette for social media are as follows (Spira, 2010):

b. The Personalize IT Rule. Make sure to put restrictions in accepting friends or followers on your
social media (e.g., Facebook, Twitter, Instagram, LinkedIn). It is not about having the most
number of followers or friends. What matters is who you interact with and how you interact with
them.
c. The off-limits Rule. Know your limitations when voicing out your opinions on different subjects
or topics concerning your school, religion, personal information, workplace, and even some
controversial subjects such as politics. Knowing your limitations can save you from dire
consequences later on.
d. The Tag - You're It Rule. Be careful in tagging someone either in your status post or photos.
You may also restrict someone from tagging you in their posts and photos. Always think of your
safety, as well as others’ personal boundaries

→ Netiquette for Email Services. Chat Rooms, and Instant Messaging

Email services such as sending and receiving an email from someone (processional to personal)
anywhere in the world are based in numerous contexts. Shown in the figure me some guidelines in composing
an email.

Fig. 5.2 Guidelines in composing an email


→ Netiquette for Chat Rooms and Instant Messaging

Joining chat rooms and sending instant messages, although mandatory in social media, have become
a trend for users. This is especially beneficial for people working in different places such as a person working
overseas while his or her friend or relative is in the Philippines. Instead of spending for telcom services, the
person just needs internet connection.

Still, there are guidelines for using instant messaging applications. For instance, someone might
interrupt and request you to accept him or her or to be connected to your account without your knowing who
that person really is.

a. Think long and hard before accepting a private conversation, especially with someone not on your
friends list. Not everyone online may be as they seem to be.
b. In a group chat, include only those that are in your friends list.
c. If possible, do not give your personal information while chatting, including your photos or "selfies."
d. When in doubt, save a copy or make a back-up of your conversation (chat).
e. You must log out from your account at all times, especially if you are in a public place, such as a
computer shop
f. You may opt to customize your account settings from public to private account.

Professional Ethics

While netiquette applies to all netizens, IT professionals specifically follow an ethical practice as they
are the front liners, support, and backend of ICT.

The Association of Computing Machinery (ACM) has identified 24 imperatives of professional conduct
for IT professionals. It contains many, but not all, issues IT professionals are likely to face while using, creating,
and implementing ICT.

Section 1 outlines the fundamental ethical considerations while Section 2 provides additional, more
specific considerations of professional conduct. Section 3 is intended specifically for individuals who have a
leadership role, whether in the workplace or in a volunteer capacity such as in organizations like ACM.
Principles involving compliance with this Code are laid out in Section 4.

1. GENERAL MORAL IMPERATIVES

As an ACM member, I will....

1.1 Contribute to society and human well-being.


1.2 Avoid harm to others.
1.3 Be honest and trustworthy.
1.4 Be fair and take action not to discriminate.
1.5 Honor property rights including copyrights and patent.
1.6 Give proper credit for intellectual property.
1.7 Respect the privacy of others.
1.8 Honor confidentiality.

2. MORE SPECIFIC PROFESSIONAL RESPONSIBILITIES

As an ACM computing professional, I will ….

2.1 Strive to achieve the highest quality, effectiveness and dignity in both the process and products of
professional work.
2.2 Acquire and maintain professional competence.
2.3 Know and respect existing laws pertaining to professional work.
2.4 Accept and provide professional review.
2.5 Give comprehensive and thorough evaluations of computer system and their impacts, including
analysis of possible risks.
2.6 Honor contacts, agreements, and assigned possibilities.
2.7 Improve public understanding of computing and its consequences.
2.8 Access computing and communication resources only when authorized related to computing.

3. ORGANIZATIONAL LEADERSHIP IMPERATIVES

As an ACM member and an organizational leader, I will ….

3.1 Articulate social responsibilities of members of an organizational unit and encourage full
acceptance of those responsibilities.
3.2 Manage personnel and resources to design and build information systems that enhance the quality
of working life.
3.3 Acknowledge and support proper and authorized uses of an organization’s computing and
communication resources.
3.4 Ensure that users and those who will be affected by a system have their needs clearly articulated
during the assessment and design of requirements; later, the system must be validated to meet
requirements.
3.5 Articulate and support policies that protect the dignity of users and others affected by a computing
system.
3.6 Create opportunities for members of the organization to learn the principles and limitations of
computer systems.
4. COMPLIANCE WITH THE CODE

As an ACM member, I will ….

4.1 Uphold and promote the principles of this Code.


4.2 Treat violations of this code as inconsistent with membership in the ACM.

REFERENCES:
Living in the Information Technology Era by Ronina R. Caoili-Tayuan & Mia V. Eleazar

Checked by: Approved by:

CARMEN SHIELA C. RAGURO, MIT PROSERPINA O. YUHICO, DM


BSCS Program Head College Dean

LEARNING ACTIVITIES

A. School Observation
Go around a school and find a scenario in which IT is implemented. Examples are a video projector
used for classroom lectures; a biometric scanner used to record the attendance of school employees;
or an interactive board used by students during class discussions. The more up-to-date the IT
application, the better. Then, prepare a report guided by the following questions:

1. How was IT implemented in the given scenario?


2. If IT were removed in the observed setup, what possible (manual) processes would have taken
place instead.
3. What advantages have you observed? How about disadvantages?

B. Write a self-reflection on cyberbullying by answering the following questions:

1. Have you, or has anyone you know, been cyberbullied?


2. What were the steps you, or that person, took to stop the incident? What are the other ways that
you think can combat cyberbullying?
3. What did you, or that person, learn from the experience?

SELF – EVALUATION:

Make a list of the latest technological devices you are familiar with or have used. Identify at least
3 technology trends and write down their pros and cons. Provide pictures if possible.

You might also like