Git Module
Git Module
GIT
Table of Contents
MODULE 1: Information Technology in Basics .................................................................... 3
MODULE 2 ....................................................................................................................... 41
Appendix ......................................................................................................................... 83
2
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
MODULE 1: Information Technology in
Basics
Unit 01: Information Technology Defined
Technology has reshaped our lives at home, at work and in
education. Almost all businesses have an online presence and most
business processes require the use of computers in some way.
Information Technology is the use of any computer, storage, networking and other physical
device to create, process, store, secure and exchange all forms of electronic data. IT focuses on
the information processing from the collection, to the processing, and the sharing of
information. IT deals with the methods and tools used in the information processing.
Information is now a necessity in today’s society, sometimes even provided real-time and
reaches people in different parts of the world. This is an engagement in the 21st century that is
lucrative in a business setting. IT, beyond communications, offers many personal career paths
and company growth leading to competitive advantage in each respective field. To become more
competent in each respective field, one must know basic computer skills and must build a
foundation using the fundamental technology concepts.
We go beyond learning the basic definition of information technology in the classroom, but also
in an online or digital presence. An individual’s ability to find, evaluate, and compose clear
information through writing and other media on various digital platforms is known as digital
literacy. Computer literacy is also known as digital literacy. An individual must keep up with the
changes in technology and become computer literate.
Now why do we need to study information technology? Simply because we use these
technologies in our everyday lives, and we need to further understand how these hardware and
software are working. Computer skills are needed regardless of setting and field, whether at
home, work, school or play. By understanding computers, you become self-sufficient whether
you use it for research, communications or time management. By mastering
fundamentals, you will develop a strong base to support furtherance of your knowledge in the
years to come.
3
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Some computer roles in our lives
1. Tiny embedded computers control alarm clocks, entertainment centers and home
appliances
2. Today’s automobiles cannot run efficiently without embedded computer systems
3. An estimated 10 mil people work from home instead of commuting to work
because of PCs and networking technologies
4. People use social media for communications nearly 10 times as often as snail mail
and 5 times more than a telephone.
5. Routine daily tasks such as banking, buying groceries are affected by computer
technologies
In a world that being defined by technology and digital trends, the demand for digital literacy has
increased exponentially. We need to expand our knowledge to avoid unfamiliar situations and
modernize our skills to stay relevant in a dynamic work environment. That is why it is important
for us to learn the fundamentals of information technology.
Unit 02: Components of a Computer System
A lot of people believe that computers are extremely complicated devices because of the tasks
they perform. Like any machine, there are components that are complicated from an outsider
perspective, but as soon as you learn about these components, the complexity unravels and
becomes understandable.
As previously discussed, a computer is a machine, a collection of parts that work together. The
collection of parts is categorized in many ways, in this case they are categorized according to
their function. In this unit, we learn the different components (parts) of a computer system. The
most important parts, how the different components work together to achieve success in terms
of using a computer will be shown.
4
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
A computer system is a collection of parts, a computer combined with hardware and software
used to perform desired tasks. No matter the size and capability of a computer system, it
consists of four (04) parts: hardware, software, data, and the user.
Hardware
Refers to the tangible, physical computer equipment and devices which provide support for the
major functions of the computer system. Mainly the mechanical aspects of the computer. As
seen in Figure 03-A, the hardware controls the input of data into the computer system and the
output of information from the computer system. All these devices are interconnected with each
other. Below are some classifications of hardware based on their functions.
Input Devices – Used to enter data or instructions into a computer system. Input devices
fall into two categories: manual input devices (needs to be operated by a human to input
data) and automatic input devices (can input data on their own. Each input device is
concerned with a specific type of data: Scanner – documents or images, Digital Camera –
still and moving images
Figure 03-B: Common Manual Input Devices Figure 03-C: Common Automatic
Input Devices
Output Devices – Used to convey information from the computer system to one or more
people. When raw data has been processed it becomes usable information. Output
devices are pieces of hardware that send this usable information out of the computer.
Output devices send information out temporarily and some send information out
permanently: temporary output device (monitors) and permanent output devices
(printers which output information onto paper as hard copy).
5
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Figure 03-D: Common Output Devices
Almost all input and output devices are known as ‘Peripheral Devices’. These are non-
essential hardware components that usually connect to the system externally.
Peripherals are called non-essential because the system can operate without them.
6
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Figure 03-F: Motherboard
o Processor – The Central Processing Unit (CPU) is the brain of the computer.
Electronic component that interprets and carries out basic instructions. The CPU
'controls' what the computer does and is responsible for performing calculations
and data processing.
7
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Figure 03-H: Example of a Read-only Memory
8
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Table 03-A: Differences between RAM and ROM
RAM ROM
Contents are lost when the computer is turned off. ✓
Contents are not lost when the computer is turned ✓
off.
Stores instructions that tell the computer how to ✓
start up.
Stores data and programs currently in use. ✓
Your computer will perform faster with more of this. ✓
This cannot be written to (altered) ... only read. ✓
Stands for Random Access Memory. ✓
Stands for Read Only Memory. ✓
Storage Devices – Holds data, instructions and information permanently for future use. It
records (writes) and/or retrieves (reads) items to and from storage media. Secondary
storage devices are used to store data that is not instantly needed by the computer.
Secondary storage devices permanently store data and programs for as long as we need.
These devices are also used to back-up data in case original copies are lost or damaged.
There are two categories of storage devices: internal storage (internal hard disk drives)
and external storage (external hard disk drive, memory sticks, etc.)
Examples:
o Magnetic Storage Device – one of the most popular types of storage used.
- Hard drive – An internal hard drive is the main storage device in a computer.
An external hard drive is also known as removable hard drive. It is used to
store portable data and backups.
o Optical Storage Device – uses lasers and lights as its mode of saving and
retrieving data.
- Blu-ray disc – A digital optical storage device which was intended to replace
the DVD format.
- CD-ROM disc – An optical storage device that is read-only or cannot be
modified nor deleted.
- CD-R and CD-RW disc – CD-R is a recordable disc that can be written to once,
while CD-RW is a rewritable disc that can be written to multiple times.
- DVD-R, DVD+R, DVD-RW and DVD+RW disc – DVD-R and DVD+R are
recordable discs that can be written to once, while DVD-RW and DVD+RW
are rewritable discs that can be written to multiple times. The difference
between the + and – is in the formatting and compatibility.
o Flash Memory Device – is now replacing magnetic storage device as it is
economical, more functional and dependable.
9
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
-Memory card – An electronic flash memory device used to store digital
information and commonly used in mobile electronic devices.
- Memory stick – A memory card that is removable.
- SSD – Solid State Drive – A flash memory device that uses integrated circuit
assemblies to save data steadily.
- USB flash drive, jump drive or thumb drive – A small, portable storage device
connected through the USB port.
o Online and Cloud – is now becoming widespread as people access data from
different devices.
- Cloud storage – Data is managed remotely and made available over a
network. Basic features are free to use but upgraded version is paid monthly
as a per consumption rate.
- Network media – Audio, Video, Images or Text that are used on a computer
network. A community of people create and use the content shared over the
internet.
Communication Devices – Enables a computer to send and receive data, instructions, and
information to and from one or more computers. A hardware device capable of
transmitting an analog or digital signal over the telephone, other communication wire, or
wirelessly.
Examples: Bluetooth devices, Infrared devices, Modem (over phone line), Network card
(using Ethernet), Smartphone, Wi-Fi devices (using a Wi-Fi router)
Memory Classification
1. According to DATA RETENTION
a. VOLATILE MEMORY
Type of computer memory that requires power to maintain its stored data – data
is lost as soon as power is cut-off from the device
b. NON-VOLATILE MEMORY
Type of computer memory that can retain stored data even after computer
power is turned-off
2. According to ACCESS TECHNIQUE
a. Random Access
Type of computer memory whose contents can be accessed in any order, i.e.
random
b. Sequential Access
Type of computer memory where contents can be access only in sequential
order from start to finish
Example: A movie stored in a BluRay Disc is accessed in sequential order so that
the movie stored therein can be viewed from start to finish
3. According to ACCESS RIGHTS
a. Read/Write Access
10
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Type of computer memory whose contents can be retrieved with a read
operation and contents can be modified with a write operation
b. Read-Only Access
Type of computer memory that only allows read operations – its contents is
prefabricated during the production of the device.
Example:
Memory Dervice Data Retention Access Technique Access Rights
RAM Device Volatile Random Read/Write
ROM Device Non-volatile Random Read-Only
BluRay Disc Non-volatile Sequential Read-Only
Magnetic Tape Non-volatile Sequential Read/Write
Audio CD Non-volatile tracks [in the album] Read-Only
(containing multiple can be chosen at
tracks for a single random;
album) a single track is
played sequentially
Software
Software is known as the series of related instructions that make the computer perform tasks. In
other words, software tells the computer what to do. The term ‘program’ or ‘application’ refers
to any piece of software. Some software exists to help the computer perform tasks and manage
resources; some software performs tasks that are more specific. The types of software are
systems software and application software.
Systems Software – Systems software includes the programs that are dedicated to
managing the computer itself, such as the operating system, file management utilities,
and disk operating system (or DOS). Without systems software installed in your
computers, no instructions would be executed for the tasks needed to be done.
Examples: Utility software (antivirus, disk tools), system servers, device drivers, operating
systems, windows/graphical user interface (GUI) systems
11
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Examples: MS Office Word, Adobe Photoshop, Microsoft Edge, Calculator, Minesweeper,
Steam
Data
Consists of individual facts or pieces of information that are used by the computer system to
produce information. Data by themselves may not make much sense to a person. The
computer’s primary job is to process data in various ways, making them useful. Without data,
the computer wouldn’t be able to function properly.
Example: The grades of fifty students in one class, all different pieces of data which doesn’t make
much sense yet, but when a chart is created from the data, and frequencies are developed. This
now makes sense at a glance.
Users
The operator of a computer is known as ‘peopleware’, other books call them liveware, or human
ware. The user commands the computer system to execute on instructions. Some computer
systems are complete without a person’s involvement, but not all computers are totally
autonomous. Basically, anyone who communicates with a computer system or uses the
information it generates.
Knowing the parts of a computer system allows us, users, to understand better each function of
the computer system and our make the experience of using the computer system more efficient.
Also, according to Gary Shelly, a computer is defined as “An electronic device operating under
the control of instructions stored in its memory that can accept data, process the data, produce
and store results for future use”. Computers can also store data for future use with the
appropriate storage devices.
12
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
A computer is a programmable device that can automatically perform a sequence of calculations
or other operations on data once programmed for the task. It can store, retrieve, and process
data according to internal instructions. Computers can be categorized in many ways: by size and
capacity, by data handling and operating system capabilities, based on the number of
microprocessors, and based on the number of users. In this module, we’re going to classify
computers according to the size and capacity.
A supercomputer is a computer at the leading edge of data processing capability, with respect to
calculation speed. Supercomputers are used for scientific and engineering problems (high-
performance computing) which crunch numbers and data, while mainframes focus on
transaction processing.
The term originally referred to the large cabinets called “main frames” that housed the central
processing unit and main memory of early computers. Later, the term was used to distinguish
high-end commercial machines from less powerful units. Most large-scale computer system
architectures were established in the 1960s, but continue to evolve. Mainframe computers are
often used as servers.
13
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
(03) Minicomputers were introduced in the mid-1960s. It
has the most of the features and capabilities of a large
computer but more compact in size. This is also called a
mid-range computer. Minicomputers were primarily used
for process control and performing financial and
administrative tasks, such as word processing and
accounting. Some machines were designed for medical laboratory and teaching aids.
A microcomputer is a small and relatively inexpensive computer that has a microprocessor as its
central processing unit. It includes memory, a microprocessor, and minimal input/output
circuitry built on a single printed circuit board. Micro-computers are classified into workstations
– Also known as desktop machines, workstations are mostly used for intensive graphical
applications, personal computers – more affordable and easier to use than workstations and are
self-sufficient computers intended for one user, laptop computers and Mini PCs – Mini PCs are
tiny computers that can fit in the palm of your hand.
14
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Because the software in embedded computers is designed to only execute certain tasks, the
computer’s software in one device can be totally distinct from that of another.
The hardware of an embedded computer is also specially designed to withstand stresses in its
intended environment. For instance, an embedded computer installed under the hood of a car is
designed to withstand high temperatures. Embedded computers are everywhere. They are in
phones, microwaves, airplanes, automobiles, and calculators.
Some computers handle small and big data and simultaneous number of users, some computers
are more powerful because of the data they are processing, which are most often used by
organizations, such as businesses or schools.
A. Abacus: One of the earliest known calculating devices, the abacus has roots dating back to
around 2400 BCE in ancient Mesopotamia and China. It allowed users to perform basic
arithmetic operations through the manipulation of beads on rods.
15
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
B. Pascaline: Invented by Blaise Pascal in 1642, the Pascaline was an early mechanical calculator
capable of performing addition and subtraction. It featured gears and wheels to handle
numerical computations.
A. Analytical Engine: Designed by Charles Babbage in the 1830s, the Analytical Engine was a
conceptual mechanical computer that laid the groundwork for modern computing. It featured
basic arithmetic operations, loops, and conditional branching.
16
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
B. Jacquard Loom: In the early 1800s, Joseph-Marie Jacquard developed a loom that used
punched cards to control the weaving patterns, effectively introducing the concept of
programming through punched cards.
17
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
A. Colossus: During World War II, British engineer Tommy Flowers developed Colossus, the
world's first programmable electronic digital computer. It was used to break encrypted German
codes and played a crucial role in the Allied victory.
B. ENIAC: Completed in 1945, the Electronic Numerical Integrator and Computer (ENIAC) was the
first general-purpose electronic computer. It was massive and used vacuum tubes for
computation.
C. UNIVAC I: Developed by J. Presper Eckert and John Mauchly in 1951, UNIVAC I was the first
commercially available computer, widely used for scientific and business applications.
18
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
IV. The Birth of Modern Computing (1950s-1960s)
A. Transistors: In 1947, the invention of transistors by John Bardeen, Walter Brattain, and
William Shockley at Bell Labs revolutionized computing. Transistors replaced bulky vacuum
tubes, making computers smaller, faster, and more reliable.
B. IBM 360: Introduced in 1964, the IBM System/360 series was a family of mainframe
computers that offered compatibility across models, setting a new standard for computer
architecture.
19
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
C. ARPANET: In the late 1960s, the U.S. Department of Defense's Advanced Research Projects
Agency (ARPA) created ARPANET, the precursor to the modern internet, which allowed
computers to communicate with each other for the first time.
A. Altair 8800: In 1975, the MITS Altair 8800 became one of the first commercially successful
microcomputers, inspiring hobbyists and entrepreneurs like Bill Gates and Paul Allen to develop
software for it.
20
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
B. Apple II: Introduced in 1977, the Apple II was one of the first mass-produced, user-friendly
personal computers, making a significant impact on the home computing market.
C. IBM PC: Launched in 1981, the IBM Personal Computer (IBM PC) became the industry
standard, accelerating the adoption of personal computers in businesses and homes.
21
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
A. World Wide Web: In 1989, Tim Berners-Lee invented the World Wide Web, making the
internet accessible to non-technical users and transforming the way we access and share
information.
B. Dot-com Bubble: The late 1990s saw a surge of internet-based companies, leading to the dot-
com bubble, with examples like Pets.com and Webvan, which eventually burst in the early
2000s.
A. Smartphones and Tablets: The introduction of the iPhone in 2007 revolutionized mobile
computing, leading to a proliferation of smartphones and tablets that have become integral to
modern life.
22
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
B. Cloud Computing: Cloud computing services, such as Amazon Web Services (AWS) and
Microsoft Azure, provide scalable and on-demand computing resources over the internet,
enabling businesses and individuals to access data and applications from anywhere.
D. Quantum Computing: Quantum computers, exemplified by companies like IBM and Google,
leverage the principles of quantum mechanics to perform complex calculations exponentially
faster than traditional computers.
23
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Unit 05: Information Technology and Emerging Trends
Objectives: By the end of this lesson, the student will be able to
1. discuss and describe the different industrial revolutions,
2. describe what is the difference between innovation and invention,
3. compute for productivity as an effect of information technology on workers or on the
organization as a whole.
We are living in extraordinary times where extraordinary technologies are within reach from
anywhere, by anyone. We almost always take these technologies for granted because they
have become part of the everyday life of people.
To start with this module, see the presentation for IT Trends: Lesson04GITTechTrends
24
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
The rise of information and communication technologies (ICT) – that is, computers,
software, telecommunications and the internet – and the large impact that these new
technologies are having on the way that society functions, have prompted many to claim that we
have entered a new era.
Industrial Revolutions
A period of development in the latter half of the 18th century, where there is change from
one economy to another.
Generally, the term refers to eras when rapid and significant technological changes
fundamentally alter the way that production is carried out in society, affecting not only how
people work but also how they live their lives.
Industrial revolution involves technological, socioeconomic, and cultural aspects. It
occurs when technological change fundamentally transforms the way in which a society carries
out the production and distribution of goods.
The changes could be inventions, innovations, product innovations, or process
innovations. The term ‘invention’ refers to the discovery of new products or processes, while
‘innovation’ refers to the commercialization (bringing to the market) of new products or
processes.
Invention is the discovery of new products and processes.
25
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Machines Telephones Automobiles Television
Product innovations result in the production of a new product, such as the change from a
three-wheel car to a four-wheel car, or the change from LP (Long Play/Playing) records to CDs
(Compact Discs). Process innovations increase the efficiency of the methods of production of
existing products, for example the invention of the assembly-line technique.
Here are the different Industrial Revolutions with their products / services,
transportation, production system, and communication.
First Industrial Revolution - 1765
Started in England during the late 18th century, concentrated in Britain and initially
focused on textile manufacturing.
● Significant evolutions: Cort’s puddling; rolling process for making iron, Crompton’s mule
for spinning cotton, Watt steam engine
● Products / Services – Vegetables, Coal, Iron, Discovery of chemicals
● Transportation – Railroads, Basic farming
● Production System – Manual Labor to mechanical
● Communication - Printed materials
26
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Second Industrial Revolution - 1870
● Started with the development of transistors and the rise of electronics and digital
technology.
● Products / Services – Internet, rise of electronics, source of energy: nuclear power
● Production System - Automation
27
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Fourth Industrial Revolution
See Lesson04Video1IndustrialRevolutions.mp4
Klaus Schwab described the fourth industrial revolution as marked by an era of technological
revolution that is blurring the lines between the physical, digital and biological spheres.
Watch Lesson04Video2FourthIndustrialRevolution.mp4
IT and PRODUCTIVITY
Economists interested in the pervasive effects of technological change in different
industrial revolutions have devised the concept of a General Purpose Technology (GPT). It is a
28
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
technology of wide application used in various industries and whose impact is strong on their
functioning.
Main Characteristics of a GPT
As you read the list, consider how a new technology such as electricity or information
technology fulfils each criterion.
● It must have a wide scope for improvement and elaboration - this means that the
technology does not appear as a complete and final solution, but as a technology that
can be improved through the different opportunities for technological change that
surround it.
● It must be applicable across a broad range of uses - this means that its use is not
restricted, for example, to only one industry but open to many different types of
industries and consumers.
● It must have a potential use in a wide variety of products and processes - this means
that the new technology should not result in the creation of only one set of products
(such as a computer), but a wide set of products (such as complex new air-traffic control
systems or new inventory controls).
● It must have strong complementarities with existing or potential new technologies - this
means that the technology does not only replace existing methods but also works with
them, ensuring an even broader impact on the systems of production and distribution.
Productivity
Productivity is the quality of producing something. It is a measure of the efficiency of a person,
machine, factory, system, etc., in converting inputs into useful outputs. It is an indication of the
efficiency of production or distribution.
29
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
You want to know the percentage increase represented by the second year's output, 12,000,
over the first year's output, 10,000. Subtracting 10,000 from 12,000 gives us the increase.
Divide the answer by 10,000 to calculate the increase relative to the first year. Then multiply
by 100 to turn the answer into a percentage.
So, output increased by 20 percent. As the number of workers stayed the same, this is also
the increase in productivity.
Question2: Calculate the percentage increase in productivity if the output expands from 12,000
in year 2 to 15,000 in year 3.
Answer:
30
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Suppose that the price of a product is Php 500 in 2000 and Php 750 in 2001 and Php
1000 in 2002. In this simple example, our market basket consists of only one product. Selecting
year 2000 as the base year, we can express the prices in years 2001 and 2002 relative to the
price in year 2000 as follows:
The price in year 2000 (base year) is equal to 100 percent
Industry structure refers mainly to the way in which power is distributed among firms.
This can be described by factors such as the number of firms in the industry and the distribution
of market shares.
Sustainability of Productivity
All economies fluctuate in a business cycle. For a few years, growth is quite rapid, output
and incomes rise, and unemployment falls. This is the ‘boom’. Then the cycle turns. Growth
slows, and in a true recession the total output of the economy falls. This is the down-turn of the
cycle. The industry life cycle focuses on those economic mechanisms that cause firms to be
born (to ‘enter’ an industry), to grow, and to die (to ‘exit’ an industry).
31
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
● Additive Manufacturing - Involving digitally controlled devices to add layer on layer of
material(s) to create objects from 3D digital models. This is usually done in the industrial
sector such as architectural, medical, dental, aerospace, automotive, furniture and
jewelry.
● Industrial Internet of Things - the use of connected sensors attached to different objects
throughout the production process to feed live data to central computers, usually seen
on the factory floor.
32
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
● Industrial Biotech - the use of biological processes of living organisms for industrial
purposes, drawing on recent scientific insights such as systems genomics and
metabolomics. Uses enzymes and microorganisms to make bio-based products in
sectors such as chemicals, food ingredients, detergents, paper, textiles and biofuels.
Electric Vehicles and Industrial Biotech concern innovations of specific products (and
related processes), and have a more narrow applicability to particular sectors
1. Upgrading of occupations
2. Higher level of ICT competence
3. Decline of repetitive and routine industrial work brought about by digital factories
33
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
While there are innumerable positives that can be drawn from these Game
Changing Technologies, it is imperative that we also take a look at the adverse
effects that these technologies cause.
Like many other things, there are always two sides of the story. On one end,
productivity numbers received a massive boost thanks to new technologies. On
the other end, there is a question of whether the same numbers are not telling
the whole story.
While new technologies, even new applications being downloaded, have made
an impact, some of them have caused other people to rely too much on
technology and not develop their own skills anymore. Technology, in some ways,
has become workers of our time instead of serving as a tool to help us.
Quite possibly, the worst effect of it is the accessibility of such technologies. With
only a fraction of the people in the world having the chance to know how to take
advantage of these new technologies, what happens to those who are not as
fortunate?
It matters that we look into all the effects of technology. It is only through looking
at the other side that we can actually discover how to improve what we currently
have and develop new technologies that would benefit everyone.
34
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Platform Model
● platform - controller of the channel or platform and arbiter of the participants in the
platform
● consumers/customers - buyers or users of the outputs offered through the platform
● producers/providers - supplier of the outputs sold through the platform
References
● NEUFEIND, M., RANFT, F., AND O’REILLY, J. (2018) Work in the Digital Age:
Challenges of the Fourth Industrial Revolution. Rowman & Littlefield International Ltd
● The Open University (2016). Information Technology: a new era. Walton Hall, Milton
Keynes, MK7 6AA. https://www.open.edu/openlearn/people-politics-law/politics-policy-
people/ sociology/information-technology-new-era/content-section-1
GRADED Activity 1
Part 1: Unit 1(10 pts)
1. What do technologies look like when they are still being discovered?
35
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
2. How did the life of people change back then?
3. Are we going through a similar change right now?
4. What’s in store for the future?
5. Have we actually progressed as a result of the technologies that we have discovered
throughout time? Explain in 2-3 sentences.
Part 2: Unit 1(10 pts)
1. Which technology of the past do you think had the most impact in the way of life of
people today? Discuss in 3-5 sentences.
2. Did new technologies help in making humans more productive or have these caused a
decrease in the efficiency of work of people? Explain your answer in 3-5 sentences.
Part 3: Unit 2(15 pts)
What do you think is the way forward with the Game Changing Technologies that we
currently have? What are its flaws, and how can these be improved further? Explain your
answer in 8-10 sentences.
Part 4 (25 pts)
Going over the technologies in the past and how it has evolved to the technologies we
have in the present gave us an idea of what is possible in the future. It is with the creativity and
ingenuity of us, human beings, that we are able to make sense of technological developments
and turn them into productivity boosting tools.
But technologies are not developed to match exactly what every person needs. After all,
each person has something different to do and to work on. It is thus important for these
technologies to be transformed into something that is geared towards making every person
productive despite the difference in their needs. Technologies are being specialized. So how
exactly does these technologies work?
36
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Companies use information as a weapon in the battle to increase productivity, deliver
quality products and services, maintain customer loyalty, and make sound decisions.
Information technology can mean the difference between success and failure. Information
technology (IT) is the application of a combination of hardware and software used to retrieve,
store, transmit and manipulate data, often in the context of a business or other enterprise.
Data are facts that are recorded and stored. Information is processed data used in
decision making. The value of information is the benefit produced by the information minus the
cost of producing it.
Information Systems
The Internet has drastically reduced the intermediaries within a transaction. Internet-
based commerce is called e-commerce (electronic commerce) or I-commerce (Internet
commerce). The E-commerce includes two main sectors: B2C (business-to-consumer) and
B2B (business-to-business).
B2C (Business-to-Consumer)
● Using the Internet, consumers can go online to purchase an enormous variety of
products and services. This new shopping environment allows customers to do
research, compare prices and features, check availability, arrange delivery, and choose
payment methods in a single convenient session.
38
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
B2B (Business-to-Business)
● Business-to-business (B2B), also called B-to-B, is a form of transaction between
businesses, such as one involving a manufacturer and wholesaler, or a wholesaler and a
retailer.
In the past, IT managers divided systems into categories based on the user group the
system served. Categories and users included office systems (administrative staff), operational
systems (operational personnel), decision support systems (middle-managers and knowledge
workers), and executive information systems (top managers). Today, traditional labels no longer
apply. For example, all employees, including top managers, use office productivity systems.
Similarly, operational users often require decision support systems. As business changes,
information use also changes in most companies. Today, it makes more sense to identify a
system by its functions and features, rather than by its users.
39
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Examples of Information Systems according to support provided
● Inventory Control (TPS)
● Reservations (TPS, MIS)
● Customer Order Processing / Point-of-Sale (TPS)
● Warranty Claim Processing (TPS)
● Records Management (MIS)
● Enrollment System (TPS)
● Attendance Monitoring (MIS)
● Payroll (TPS)
● Queuing (TPS)
40
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Top managers
● Strategic plans
Operational Employees
● Operational employees include users who rely on TP systems to enter and receive data
they need to perform their jobs.
MODULE 2
41
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
❏ A systems analyst investigates, analyzes, designs, develops, installs, evaluates, and
maintains a company’s information systems.
❏ On large projects, the analyst works as a member of an IT department team
❏ Smaller companies often use consultants to perform the work
SYSTEM DEVELOPMENT
System development is the process of defining, designing, testing and implementing a
software application.
A system development project includes a number of different phases, such as feasibility
analysis, requirements analysis, software design, software coding, testing and debugging,
installation and maintenance.
Systems Planning – It is the initial stage in the systems development life cycle (SDLC). It is the
fundamental process of understanding why an information system should be built and determine
how the project team will go about building it. It describes how IT projects get started, how
systems analysts evaluate proposed projects, the feasibility of a project, and the reasoning
behind the proposed system development.
Systems Analysis – System analysts must do analysis activities when creating a new system
or improving an old system. If an information system is built properly, it will give the expected
benefits to the company. To achieve this goal, system analysts define what the information
system requires by performing the analysis activities.
42
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Systems Analysis Activities
The systems analysis phase consists of requirements modeling, and process modeling, object
modeling, and consideration of development strategies.
Flowchart
43
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
business flowchart shows the steps that make up a business process, along with
who's responsible for each step.
They are useful for analyzing current processes, planning improvements, and
crystallizing communication between process participants
Types of Flowchart:
● Document
• Illustrates the flow of documents and information between areas of
responsibility within an organization.
• A document flowchart is particularly useful in analyzing the
adequacy of control procedures.
● System
• System flowcharts depict the relationship among the input,
processing, and output of an AIS
● Program
• A program flowchart describes the specific logic to perform a
process shown on a systems flowchart
Check the following videos for further discussion on the Flowcharting process.
● Lesson 08 FlowCharting.mp4
● Flowchart Tutorial (with Symbols, Guide and Examples)
System Requirements
In the context of software development and system design, requirements are statements that
describe what the system should do or possess to meet the needs of its users and
stakeholders. These requirements can be broadly categorized into two types: functional
44
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
requirements and non-functional requirements.
Non-functional Requirements:
Non-functional requirements, on the other hand, define the attributes and qualities that
describe how the system should perform, rather than what it should do. These requirements
focus on aspects related to system behavior, performance, security, and user experience. Non-
functional requirements answer the question, "How well does the system perform?"
Systems Design – Systems Design is the third of five phases in the systems
development life cycle (SDLC). Now you are ready to begin the physical design of the system
that will meet the specifications described in the system requirements document. Systems
design tasks include output and user interface design, data design, and system architecture.
A video by Johnny Khoury has explained how the Design Phase in SDLC (Lesson07
video01 Design Phase in SDLC) works. It is all about the design phase of creating a system.
The systems analyst must understand the logical design of the system before beginning
the physical design of any one component
• Data design
• User interface
• Architecture
• System design specification
System Design Objectives
• The goal of systems design is to build a system that is effective, reliable, and maintainable
• A system is reliable if it adequately handles errors
45
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
• A system is maintainable if it is well designed, flexible, and developed with future modifications
in mind
•User Considerations
❏ Carefully consider any point where users receive output from, or provide input to,
the system
❏ Anticipate future needs of the users, the system, and the organization – hard-
coded
❏ Provide flexibility
❏ Parameter, default
• Data Considerations
❏ Data should be entered into the system where and when it occurs because
delays cause data errors
❏ Data should be verified when it is entered, to catch errors immediately
❏ Automated methods of data entry should be used whenever possible
•Data Considerations
❏ Audit trail
❏ Every instance of entry and change to data should be logged
❏ Data should be entered into a system only once
❏ Data duplication should be avoided
•Design Trade-Offs
❏ Most design trade-off decisions that you will face come down to the basic conflict
of quality versus cost
❏ Avoid decisions that achieve short-term savings but might mean higher costs
later
Prototyping
The method by which a prototype is developed. It involves a repetitive sequence of
analysis, design, modeling, and testing. It is a common technique that can be used to design
anything from a new home to a computer network.
Prototyping Methods
46
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
• CASE tools - Computer-aided systems engineering (CASE), also called computer-
aided software engineering, is a technique that uses powerful software, called CASE
tool, to help systems analysts develop and maintain information systems.
• Application generators -A tool that supports the rapid development of computer
programs by translating a logical model directly into code. Also called a code generator.
• Report generators - a computer program whose purpose is to take data from a source
such as a database, XML stream or a spreadsheet, and use it to produce a document in
a format which satisfies a particular human readership
• Screen generators - or form painter, is an interactive tool that helps you design a
custom interface, create screens forms, and handle data entry format and procedures.
Limitations of Prototypes
❏ A prototype is a functioning system, but it is less efficient than a fully developed system
❏ Systems developers can upgrade the prototype into the final information system by
adding the necessary capability. Otherwise, the prototype is discarded
Future Trends in Software Development
47
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
User Interface
Describes how users interact with a computer system, and consists of all the hardware,
software, screens, menus, functions, output, and features that affect two-way communications
between the user and the computer.
Graphical User Interface - uses visual objects and techniques that allow users to communicate
effectively with the system.
Usability – user satisfaction, support for business functions, and system effectiveness
48
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
2.Maximize Graphical Effectiveness
Studies show that people learn better visually. The immense popularity of Apple’s iOS
and Microsoft Windows is largely the result of their GUIs that are easy to learn and use. A well-
designed interface can help users learn a new system rapidly and be more productive.
3.Think Like a User
The designer must learn to think like a user and see the system through a user’s eyes.
The interface should use terms and metaphors that are familiar to users. Users are likely to
have real-world experience with many other machines and devices that provide feedback, such
as automobiles, ATMs, and microwave ovens. Based on that experience, users will expect
useful, understandable feedback from a computer system.
4.Use Models and Prototypes
From a user’s viewpoint, the interface is the most critical part of the system design
because it is where he or she interacts with the system — perhaps for many hours each day. It
is essential to construct models and prototypes for user approval. An interface designer should
obtain as much feedback as possible, as early as possible.
5.Focus on Usability
The user interface should include all tasks, commands, and communications between
users and the information system. The opening screen should show the main option. Each
screen option leads to another screen, with more options.
6.Invite Feedback
Even after the system is operational, it is important to monitor system usage and solicit
user suggestions. The analyst can determine if system features are being used as intended by
observing and surveying users.
7.Document Everything
All screen designs should be documented for later use by programmers.
Systems Implementation – This phase begins once the client has tested and approved the
system. The system is installed at this phase to support the specified business functions. The
performance of the system is compared to the performance targets defined during the planning
phase.
49
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
1. When communicating with people online, remember how you want to be treated, that’s
probably how others want to be treated too, with respect.
2. Always be aware that you are talking to a person, not a device. Be courteous.
3. Adhere to the same standards of behavior online that you follow in real life.
4. Know where you stand. Netiquette varies from domain to domain. What is acceptable in
a chat room may not be appropriate in a professional forum so “lurk before you leap”.
5. Respect other people’s time and bandwidth.
6. Spelling and grammar count! Always check, recheck your posts and keep your language
appropriate.
7. Keep under control the posts or content that invoke rage, sadness, humiliation, self-
doubt, and others.
8. Respect other people’s privacy. Ask consent for everything! From posts sharing, to
citations, to using of materials and more.
9. Help out those people who are new to the technology.
10. Read, and research before asking. Try not to waste other people’s time.
11. Some emotions and meanings do not transmit very well in an email or a post. However,
do not use all caps if you want to communicate strong emotion. All caps will make you
look like you’re shouting. Don’t overuse smileys and emoticons because they make you
look unprofessional. Constructing your sentences carefully and editing what you write
before hitting send is often enough.
12. Remember that your posts and account can be easily traced back to you even if you
write under an alias or a made-up handle. You leave data footprints whenever you’re
online. These are stored and can be retrieved. Even when using incognito. Always be a
decent and responsible netizen.
1. Thou shalt not use a computer to harm other people – If it is unethical to harm people
by making a bomb, for example, it is equally bad to write a program that handles the
timing of the bomb. Or, to put it more simply, if it is bad to steal and destroy other
people’s books and notebooks, it is equally bad to access and destroy their files.
2. Thou shalt not interfere with other people’s computer work – Computer viruses are
small programs that disrupt other people’s computer work by destroying their files,
taking huge amounts of computer time or memory, or by simply displaying annoying
messages. Generating and consciously spreading computer viruses is unethical.
3. Thou shalt not snoop around in other people’s computer files – Reading other people’s
e-mail messages is as bad as opening and reading their letters: This is invading their
privacy. Obtaining other people’s non-public files should be judged the same way as
breaking into their rooms and stealing their documents.
4. Thou shalt not use a computer to steal – Using a computer to break into the accounts of
a company or a bank and transferring money should be judged the same way as
robbery. It is illegal and there are strict laws against it.
5. Thou shalt not use a computer to bear false witness – The Internet can spread untruth
as fast as it can spread truth. Putting out false "information" to the world is bad. For
50
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
instance, spreading false rumors about a person or false propaganda about historical
events is wrong.
6. Thou shalt not copy or use proprietary software for which you have not paid – Software
is an intellectual product. In that way, it is like a book: Obtaining illegal copies of
copyrighted software is as bad as photocopying a copyrighted book. There are laws
against both. Information about the copyright owner can be embedded by a process
called watermarking into pictures in the digital format.
7. Thou shalt not use other people’s computer resources without authorization or proper
compensation – Multiuser systems use user id’s and passwords to enforce their memory
and time allocations, and to safeguard information. You should not try to bypass this
authorization system. Hacking a system to break and bypass the authorization is
unethical.
8. Thou shalt not appropriate other people’s intellectual output – For example, the
programs you write for the projects assigned in this course are your own intellectual
output. Copying somebody else’s program without proper authorization is software
piracy and is unethical. Intellectual property is a form of ownership, and may be
protected by copyright laws.
9. Thou shalt think about the social consequences of the program you are writing or the
system you are designing – You have to think about computer issues in a more general
social framework: Can the program you write be used in a way that is harmful to
society? For example, if you are working for an animation house, and are producing
animated films for children, you are responsible for their contents. Do the animations
include scenes that can be harmful to children? In the United States, the
Communications Decency Act was an attempt by lawmakers to ban certain types of
content from Internet websites to protect young children from harmful material. That
law was struck down because it violated the free speech principles in that country's
constitution. The discussion, of course, is going on.
10. Thou shalt always use a computer in ways that ensure consideration and respect for
your fellow humans – Just like public buses or banks, people using computer
communications systems may find themselves in situations where there is some form of
queuing and you have to wait for your turn and generally be nice to other people in the
environment. The fact that you cannot see the people you are interacting with does not
mean that you can be rude to them.
References
https://explorable.com/hawthorne-effect
https://methods.sagepub.com/book/key-concepts-in-social-research/n22.xml
https://online.visual-paradigm.com/diagrams/tutorials/use-case-diagram-tutorial/
https://sites.google.com/site/2012itcs371devsec3fuzzysystem3/3
https://www.investopedia.com/terms/c/click_and_mortar.asp
https://www.mbaskool.com/business-concepts/marketing-and-strategy-terms/2587-click-
only-companies.html
https://www.sciencedirect.com/topics/computer-science/sequence-diagram
https://www.slideshare.net/fajarbaskoro/systems-request
https://www.tutorialspoint.com/software_engineering/case_tools_overview.htm
51
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
https://www.visual-
paradigm.com/support/documents/vpuserguide/2821/286/7114_drawingbusin.html
https://www.youtube.com/watch?v=DMPxxijmG7M&fbclid=IwAR0hx6Uo4PSlgqmMmAO
eX4e_R6mq0s4nMw-iwcXUOiixRkvkHeWxK8UTQj8
https://www.youtube.com/watch?v=rAR5sbaphwU&fbclid=IwAR3EXVa8Rag6iV8zFswXc
FhRFOB_FaiEa7QD6QMukGoyaiQ6cRLH30xiCtY
McCombes, S. (2020, January 13). How to Do a Case Study: Examples and Methods.
Retrieved June 7, 2020, from https://www.scribbr.com/methodology/case-study/
NewLeaf. (2012). ROI or Payback Period? Retrieved June 7, 2020, from https://newleaf-
llc.com/2012/08/roi-or-payback-period/
Requirements Modeling. Part 1 https://www.youtube.com/watch?v=2t0ichoFHG8 Part
2 https://www.youtube.com/watch?v=1u5KQh_B1_U
ROSENBLATT, H. (2014) Systems Analysis and Design, 10th edition. Shelly Cashman
Series. Cengage Learning
Top five causes of scope creep ... and what to do about them. A Guide to the Project
Management Body of Knowledge (PMBOK® Guide)—Fourth edition
https://www.pmi.org/learning/library/top-five-causes-scope-creep-6675
Feronika, N. (2018, January 15). Systems Analysis Activities. School of Information
Systems. https://sis.binus.ac.id/2018/01/15/systems-analysis-activities/
System Development Lifecycle (SDLC) | Michigan Tech Information Technology. (n.d.).
Michigan Technological University. https://www.mtu.edu/it/security/policies-procedures-
guidelines/information-security-program/system-development-lifecycle/
Thakur, D. (2013, January 30). What is system maintenance? What are its different
types. Computer Notes. https://ecomputernotes.com/mis/implementation-and-
evaluation/what-is-system-maintenance-what-are-its-different-types
Computers and the internet have transformed the lives of many people in many good ways.
Unfortunately, this vast network and its associated technologies also have a number of security
threats. It is our duty to protect ourselves from these threats and attacks. Scammers, hackers
and identity thieves are looking to steal your personal information - and your money.
Computer security, the protection of computer systems and information from harm, theft, and
unauthorized use. Computer hardware is typically protected by the same means used to
protect other valuable or sensitive equipment, namely, serial numbers, doors and locks, and
alarms. The protection of information and system access, on the other hand, is achieved
through other tactics, some of them quite complex. Computer security deals with the
protection of computer systems and information from harm, theft, and unauthorized use.
Cyber security is the practice of defending computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks. It's also known as information technology
52
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
security or electronic information security. The term applies in a variety of contexts, from
business to mobile computing, and can be divided into a few common categories.
Security is a constant worry when it comes to information technology. Data theft, hacking,
malware and a host of other threats are enough to keep any IT professional up at night. We’ll
look at the basic principles and best practices that allow users to keep their systems safe.
Individuals and companies must employ the best security measures suitable to their needs to
prevent fraudulent activities.
53
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Figure 02-C: CIA Triad
Effectively executing all three principles of the Security Triad creates an ideal outcome from an
information security perspective.
54
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Reusing passwords or having the same password for multiple accounts, websites, and
other systems will become more vulnerable. Do not save passwords on websites and
devices that are unsecure. Remember to change your passwords on a schedule to keep
them fresh.
3. Log off public computers
Yes, the business centers and cybercafes that offer the use of a computer system is
convenient, but not secure. Since anyone can use them for anything, they have probably
been exposed to viruses, worms, trojans, keyloggers, and other nasty malware. Should
you use them at all? When using a public area computer, be sure to completely log off
when you are finished using it.
4. Save and Back up
Some events may be inevitable like hardware failure and virus infection, so be sure to
save every now and then. Also back up important information that is important to you.
Make sure to verify if the files you’ve saved can be easily restored.
5. Limit social network information
Facebook, Twitter, Google+, YouTube, Pinterest, LinkedIn and other social networks
have become an integral part of our online lives. Social networks are a great way to stay
connected with others, but you should be wary about how much personal information
you post. Learn how to use the privacy and security settings to protect yourself, keep
personal information personal, know and manage your friends, know what to do if you
encounter a problem.
6. Download files legally
Avoid peer-to-peer (P2P) networks and remove any file-sharing clients already installed
on your system. Since most P2P applications have worldwide sharing turned on by
default during installation, you run the risk of downloading viruses or other malware to
your computer, and having your personal and/or confidential information inadvertently
shared across the Internet, which could lead to identity theft.
7. Keep personal information safe
Do not divulge personal information online if you’re not sure about the sender or the
website. A common fraud, called "phishing", sends messages that appear to be from a
bank, shop or auction, giving a link to a fake website and asking you to follow that link
and confirm your account details.
8. Lock your computer
Whenever you leave our devices unattended, make sure that your device/s are locked.
9. Do not click on suspicious links or pop-up notifications
Avoid visiting unknown websites or downloading software from untrusted sources.
These sites often host malware that will automatically install (often silently) and
compromise your computer. If attachments or links in the email are unexpected or
suspicious for any reason, don't click on it, just visit the actual sender website.
10. Keep applications up to date
Turn on automatic updating or make sure that all applications are also up to date.
Definition of terms
55
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Firewall: A firewall is a network security device that monitors incoming and outgoing network
traffic and decides whether to allow or block specific traffic based on a defined set of security
rules.
Hackers: A hacker is a person who breaks into a computer system. The reasons for hacking can
be many: installing malware, stealing or destroying data, disrupting service, and more. Hacking
can also be done for ethical reasons, such as trying to find software vulnerabilities so they can
be fixed.
Threats: A threat is anything that can compromise the confidentiality, integrity, or availability of
an information system.
Malware: This refers to malicious software such as viruses, worms, and Trojan horses
that can infect computers and devices, steal sensitive information, or damage systems.
Phishing: This is the practice of sending fake emails or messages that appear to come
from a trustworthy source, such as a bank or a popular website, in order to trick people
into revealing sensitive information.
Ransomware: This is a type of malware that encrypts a victim's files and demands a
ransom payment in exchange for the decryption key.
Distributed Denial of Service (DDoS) attacks: These attacks overload a website or online
service with traffic, making it inaccessible to users.
Information security, also known as InfoSec, refers to the processes and tools designed
and deployed to protect sensitive business information from modification, disruption,
destruction, and inspection.
56
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Unit 10: Cybercrime Law
Study the presentation named GIT Lecture 9 - Cybercrime Laws in the Philippines.pptx
Cybercrime Prevention Act of 2012. The State recognizes the vital role of information and
communications industries such as content production, telecommunications, broadcasting
electronic commerce, and data processing, in the nation’s overall social and economic
development. The State also recognizes the importance of providing an environment conducive
to the development, acceleration, and rational application and exploitation of information and
communications technology (ICT) to attain free, easy, and intelligible access to exchange and/or
delivery of information; and the need to protect and safeguard the integrity of computer,
computer and communications systems, networks, and databases, and the confidentiality,
integrity, and availability of information and data stored therein, from all forms of misuse,
abuse, and illegal access by making punishable under the law such conduct or conducts. In this
light, the State shall adopt sufficient powers to effectively prevent and combat such offenses by
facilitating their detection, investigation, and prosecution at both the domestic and
international levels, and by providing arrangements for fast and reliable international
cooperation.
When the attachment is opened, the file activates a code that sends an instruction to
forward the same email to all the contacts of the user
The worm spread to e-mail accounts across the globe – including US and Europe –
overwhelming the email systems of private and government organizations causing them
to shut down resulting to estimated damages worth millions of USD
This prompted the FBI to identify the source of the worm, which was then traced back
to the Philippines
57
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
“It is not clear whether the author of the virus can even be prosecuted in the Philippines, where computer
use is still uncommon among ordinary citizens and cyber-crimes are not yet define in the legal code.”
Onel De Guzman was eventually arrested by the Philippine government at the request of
the FBI but was released shortly afterwards because there was NO pre-existing
Philippine laws that he violated
58
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
ELECTRONIC DOCUMENTS shall have the legal effect, validity or enforceability as any
other document or legal writing.
NOTE: This provision gives softcopy of authentic documents the same legal validity as
physical documents
Chapter III of R.A. 8792 states the following penalties in violation of this law:
Section 33. PENALTIES
The following acts shall be penalized by fine and/or imprisonment:
1. HACKING/CRACKING
Unauthorized access into a computer system/server or information and
communication system
Any access with the intent to corrupt, alter, steal, or destroy using a computer
or computer system without the knowledge and consent of the owner of the
system
59
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
2. PIRACY
Unauthorized copying, reproduction, storage, uploading, downloading,
communication, or broadcasting of protected material [..] through the use of
telecommunication networks, e.g. the Internet, in a manner that infringes
intellectual property.
3. Violations against R.A. 7394: The Consumer Act Of The Philippines
R.A. 7394 was enacted primarily to protect the consumers …
… against hazards to health and safety, and
… against deceptive, unfair and unconscionable sales acts and practices.
Note:
Penalty for HACKING/CRACKING and PIRACY:
Pay a fine amounting to a minimum of one hundred thousand pesos (PhP
100,000) and a maximum that is commensurate to the damage incurred and …
Mandatory imprisonment of 6 months to 3 years.
Penalty for violations against R.A. 7394 will be the same penalties as provided by same
law which is to pay a fine of PhP 20,000 to PhP 2000,000 and/or imprisonment of 3 to 6
years
R.A. 10175 defines CYBERCRIME as a crime committed with or through the use of information
and communication technologies such as radio, television, cellular phone, computer and
network, and other communication device or application.
Section 4(a) OFFENSES against the CONFIDENTIALITY, INTEGRITY, and AVAILABILITY (CIA) of
COMPUTER DATA and COMPUTER SYSTEMS
The following acts under this cybercrime includes the following:
1. ILLEGAL ACCESS
The access to the whole or any part of a computer system without right.
NOTE:
“access” is the instruction, communication with, storing/retrieving data from or
use of any resources of a computer system of network
“without right” means having no consent from the owner of the computer system
GUIDE QUESTION: R.A. 8792
Does connecting to an open WIFI network (e.g. WIFI with no password), without the
consent of the network owner, constitute a violation of RA 8792?
NO! By merely accessing it, there is no clear intent to “corrupt, alter, steal or
destroy”
Does connecting to an open WIFI network (e.g. WIFI with no password), without the
consent of the network owner, constitute a violation of RA 10175?
YES! Illegal access is to “make use of any resources” without right (consent)
2. ILLEGAL INTERCEPTION
The interception […] of computer data to, from, or within a computer system.
NOTE:
Interception is listening to, recording, monitoring or surveillance of the content of
communications through the use of electronic eavesdropping or tapping devices at
the same time that the communication is occurring
61
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
3. DATA INTERFERENCE
The intentional or reckless alteration, damaging, deletion or deterioration of computer
data, electronic document or electronic data message without right – including the
introduction or transmission of viruses
NOTE:
GUIDE QUESTION: R.A. 10175
Consider the following situation:
A friend sent you a file on a flash drive infected with a virus
After you insert the flash drive in your computer, your computer get infected
and you lost your documents
Is your friend liable for any violation on RA 10175?
YES! Data interference includes “the intentional or reckless alteration, damaging,
deletion
or deterioration of computer data” – even if your friend has no malicious intent it is
still considered as “recklessness” in his/her part causing you to lose your file
4. SYSTEM INTERFERENCE
The intentional alteration or reckless hindering or interference with the functioning of
a computer or computer network by inputting, transmitting, damaging, deleting,
deteriorating, altering or suppressing computer data or program, electronic document,
or electronic data message, without right or authority, including the introduction or
transmission of viruses
NOTE:
This is more or less an extension of the previous offense whereby the affected entity
is not just data but the whole system
GUIDE QUESTION: R.A. 10175
Consider the same situation in the previous example:
A friend sent you a file on a flash drive infected with a virus
62
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
After you insert the flash drive in your computer, your computer get infected
and you lost all your files and the whole computer system went into error
Is your friend liable for any violation on RA 10175?
YES! Although it may be unintentional, data interference and system interference
was committed
SYSTEM INTERFERENCE EXAMPLE: CRYPTOJACKING or CRYPTOMINING MALWARE
Refers to software programs and malware components developed to take over a
computer’s resources and use them for cryptocurrency mining without the user’s
explicit permission
When you download through torrent sites like “thepiratebay”, you basically give
them the authority to use your computer’s CPU to “mine” cryptocurrencies – the
reason why downloading a lot of torrent file can cause your computer to heat up
SYSTEM INTERFERENCE EXAMPLE: WEBSITE DEFACING
5. MISUSE OF DEVICE
The unauthorized use, production, sale, procurement, distribution or otherwise
making available of:
i. A device designed for committing any offenses under this Act
ii. A computer password, access code, or similar data by which […] a computer
system is […] accessed with the intent of committing any offenses under this act
NOTE:
MISUSE OF DEVICE EXAMPLE: SKIMMING DEVICES and KEYLOGGERS
63
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
6. CYBER-SQUATTING
The acquisition of a domain name on the internet in bad faith to profit, mislead,
destroy reputation, and deprive others from registering the same
It is cyber squatting if the domain name that was acquired is:
i. Similar, identical or confusingly similar to an existing government-registered
trademark;
ii. In case of a personal name, identical or in any way similar with the name of a
person other than the registrant; and
iii. Acquired without right or with intellectual property interests in it
NOTE:
64
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
2. Computer-related FRAUD
The unauthorized input, alteration, or deletion of computer data or program or
interference in the functioning of a computer system, causing damage thereby with
fraudulent intent
NOTE:
The ONLY difference between forgery and fraud is if the damage incurred has a
monetary value.
COMPUTER-RELATED FRAUD EXAMPLES:
Hacking into a bank’s database and changing your account balance from PhP 500
to
PhP 5,000
Asking people to send you a “prepaid load” by pretending to be a “relative from
abroad”
3. Computer-related IDENTITY THEFT
The intentional acquisition, use, misuse, transfer, possession, alteration or deletion
of identifying information belonging to another [person] without right
NOTE:
COMPUTER-RELATED IDENTIFY THEFT EXAMPLE:
Those fake social media accounts that has a user profile that contains “identifying
information” – like picture or name – belonging to another person with the
intention of using it for malicious purposes, such as pretending to be the actual
person even if it is not
65
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
2. CHILD PORNOGRAPHY
The unlawful or prohibited acts defined and punishable by R.A. 9775: The Anti-Child
Pornography Act of 2009 committed through a computer system
This includes any representation – whether visual or audio – by electronic or any
other means of a child engaged or involved in real or simulated explicit sexual
activities
NOTE:
GUIDE QUESTION: R.A. 10175
Are “hentai” clips – sexually explicit Japanese comics or anime – considered as a
violation of this law?
NO … unless the hentai clip itself contains a character which is explicit identified as a
minor. If so, the said material is prohibited and the creator/distributor of the said
material are liable for violation of this law.
3. ONLINE LIBEL
Libel is the public and malicious imputation of a crime – real or imaginary – or any
act, omission, condition, status or circumstance tending to cause the dishonor,
discredit, or contempt of a […] person, or to blacken the memory of the dead
FOUR ELEMENTS OF LIBEL
a. Allegations of a discreditable act or condition concerning another;
b. Publication of the charge;
c. The person being defamed is clearly identified; and
d. Existence of malice.
NOTE:
GUIDE QUESTION: R.A. 10175
66
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
NO! LIKING or REACTING may be a sign of approval to the said post but NO
STATEMENT was mentioned – none of the FOUR ELEMENTS OF LIBEL is present!
GUIDE QUESTION: R.A. 10175
If you SHARED the said post, are you liable?
NO! The libelous statement was NOT made by the person who SHARED it!
If you COMMENTED on the said post with “OO NGA!”, are you liable?
NO! Similar to LIKING or REACTING, commenting “OO NGA!” does not discredit or
allege Maria David – none of the FOUR ELEMENTS OF LIBEL is present!
If you COMMENTED on the said post with “OO NGA! MAGNANAKAW KAYONG MAG-
INA”, are you liable?
YES! This statement is not merely an approval but also states an allegation towards
Maria David and her mother.
This makes the person liable for libel since the comment can be seen publicly as well.
The following and similar acts, though they may not constitute a criminal offense, shall produce
a cause of action for damages, prevention and other relief:
(1) Prying into the privacy of another's residence;
(2) Meddling with or disturbing the private life or family relations of another;
(3) Intriguing to cause another to be alienated from his friends;
67
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
(4) Vexing or humiliating another on account of his religious beliefs, lowly station in life,
place of birth, physical defect, or other personal condition.
68
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
GUIDE QUESTION: RIGHT TO PRIVACY
Sample Case: (Zulueta vs C.A., 1996)
Situation:
Cecilia entered the clinic of Dr. Martin – her husband – and in the presence of
witnesses, forcibly opened the drawers and cabinet and took 157 documents and
papers consisting of greetings cards, cancelled checks, diaries, and photographs
between Dr. Martin and his alleged paramours.
For instance, there are certain instances that a person assumes that there is reasonable
expectation of privacy such that at that particular moment nobody can see or hear him/her.
For instance, CCTV cameras may be watching an employee’s every move while inside the
company grounds. The only place where there is reasonable expectation of privacy is inside
the toilet facilities of the company.
69
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
The private area of the person would not be visible to the public, regardless of whether
that person is in a public or private place.
If the persons in the photo knew and consented to the video recording or taking of the
photo, can anyone reproduce, distribute, or broadcast it?
NO! The person merely consented to the taking of the photo or the video recording and did
not give written consent for its reproduction, distribution, and broadcasting.
Section 4: PENALTIES.
The penalty for the commission of any of the prohibited acts above are as follows:
Imprisonment of 3 years to 7 years imprisonment; and
Fine of Php 100,000.00 to Php 500,000.00
70
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
2. REGULATES the collection, recording, organization, storage, updating or modification,
retrieval, consultation, use, consolidation, blocking, erasure or destruction of PERSONAL
DATA.
3. Ensures that the Philippines COMPLIES WITH INTERNATIONAL STANDARDS set for data
protection.
DEFINITION OF TERMS.
1. PERSONAL INFORMATION CONTROLLER (PIC)
The individual, corporation, or body who decides what to do with data.
2. PERSONAL INFORMATION PROCESSOR (PIP)
One who processes data for a PIC. The PIP does not process information for the PIP’s
own purpose.
3. CONSENT OF THE DATA SUBJECT
Any freely given, specific, informed indication of will, whereby the data subject agrees
to the collection and processing of personal information about and/or relating to him
or her.
The agreement must inform:
a. Purpose, nature, and extent of processing;
b. Period of consent/instruction;
c. Rights as a data subject.
4. BREACH
A security incident that:
a. Leads to unlawful or unauthorized processing of personal, sensitive, or
privileged information;
b. Compromises the availability, integrity, or confidentiality of personal data.
Any personal information about a particular Any information or opinion about a particular
individual that can be used in identifying a individual that may be used to harm or
person. discriminate a person.
This includes, but not limited to: This includes, but not limited to:
Name Phone Race or ethnic origin
Address number Criminal record
E-mail Religious affiliations
Medical record
address
71
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
a. What personal data will be collected
b. How the personal data will be collected
c. Why personal data will be collected
The data processing policies of the PIC must be known to the data subject.
The information to be provided to the data subject must be in clear and plain
language.
3. PRINCIPLE OF PROPORTIONALITY
The amount of data collected for processing should be adequate, relevant, and
not excessive in proportion to the purpose of the data processing.
Efforts should be made to limit the processed data to the minimum necessary.
72
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
The disclosure must be made before the entry of the data into the processing
system or at the next practical opportunity
2. Right to OBJECT
The right to refuse to the processing of personal data.
This includes the right to be given an opportunity to withhold consent to the
processing in case of any changes or any amendment to the information
supplied or declared.
3. Right to ACCESS
The right to find out whether a PIC holds any personal data about you.
4. Right to RECTIFICATION
This involves the right to dispute the inaccuracy or error in the personal data and
have the PIC correct it immediately.
It also includes access to new and retracted information, and simultaneous
receipt thereof.
Recipients previously given erroneous data must be informed of inaccuracy and
rectification upon reasonable request of the data subject.
5. Right to ERASURE OR BLOCKING
This is the right to suspend, withdraw, or order the blocking, removal, or
destruction of his/her personal information from the PIC’s filing system
The right to erase or block can be invoked in the following circumstances:
o There are data which are incomplete, outdated, false, or unlawfully
obtained.
o The data was used for unauthorized purposes.
o The data is no longer necessary for purposes of collection.
o The processing of data was found to be unlawful.
o The PIC or PIP violated the rights of the data subject.
6. Right to DAMAGES
This is the right to be receive compensation for any damages sustained due to
inaccurate, incomplete, outdated, false, unlawfully obtained, or unauthorized use
of personal data.
If there are circumstances where you discovered that your personal data was
mishandled, you have the right to ask for compensation for the damage it has
caused you.
7. Right to DATA PORTABILITY
The right to obtain a copy of data undergoing processing in [a commonly used]
electronic or structured format that allows for further use by the data subject.
Takes into account the right to have control over personal data being processed
based on consent, contract, for commercial purposes, or through automated
means.
73
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
8. Right to FILE A COMPLAINT
The right to file a complaint in circumstances wherein the PIC or the PIP has
breached the privacy of the data subject
74
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
GUIDE QUESTION: R.A. 10173
May a teacher/professor search the contents of a student’s cellular phone?
NO! Any search through a student’s cellular phone without justification under a law or
regulation is UNLAWFUL, and may be considered as “unauthorized processing of data”
However, there are exceptions:
Are usernames, password, IP and MAC address, location cookies and birthday (month and
day only) are considered personal information?
YES!*
* Only when they are combined with other pieces of information that may allow an
individual to be * distinguished from others.
75
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Provided access to (sensitive) personal information due to negligence or was
unauthorized under the Data Privacy Act or any existing law.
76
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
3. Improper disposal of (sensitive) personal information
Negligently dispose, discard or abandon the (sensitive) personal information of an
individual in an area accessible to the public or placed the (sensitive) personal
information of an individual in a container for trash collection.
4. Processing of personal information and sensitive personal information for
unauthorized purposes
Process personal information for purposes not authorized by the data subject or not
otherwise authorized by the Data Privacy Act or under existing laws.
IT security is about protecting things that are of value to an organization. Security controls exist
to reduce or mitigate the risk to those assets. They include any type of policy, procedure,
technique, method, solution, plan, action, or device designed to help accomplish that goal.
Recognizable examples include firewalls, surveillance systems, and antivirus software.
There are two (02) ways to classify controls in an organization: (01) by type – physical,
technical, or administrative – and (02) by function – preventive, detective, and corrective –.
Control Types
Physical Controls – Describes anything tangible that’s used to prevent or detect
unauthorized access to physical areas, systems, or assets. This includes gates, access
cards, CCTVs, and motion sensors.
Technical Controls – (also known as logical controls) Includes hardware or software
mechanisms used to protect assets. Common examples are authentication solutions,
firewalls, and antivirus software.
Administrative Controls – Refers to policies, procedures, or guidelines that define
personnel or business practices in accordance with the organization's security goals.
77
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
These can apply to the hiring and termination of employees, equipment and Internet
usage, separation of duties, and auditing.
Control Functions
Preventive Controls – These is any security measure that is designed to prevent or stop
any malicious activity from happening. These can be fences, alarms, and antivirus
software.
Detective Controls – These is any security measure taken or implemented to detect and
alert to unwanted or unauthorized activity in progress or after it has occurred. It can be
alerting guards or notifications from a motion sensor.
Corrective Controls – Any measures taken to repair damage or restore resources and
capabilities following an unauthorized or unwanted activity. This may include rebooting
the system, or terminating a process, or quarantining a virus.
78
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
GRADED Activity 2
Part 1: Unit 3(10 pts)
1. What use does the internet have for you? Explain in 3-5 sentences.
2. If you have a phone, a laptop, or any similar kinds of technology, which 2 apps or
softwares do you use often to be more productive? Explain in no more than 3 sentences
each how you think these apps or softwares work and what makes them useful for you.
Part 2: Unit 3 (15 pts)
1. Information is commonly referred to as processed data, data being the raw material. The
key factor here is that data needs to undergo certain processes before it becomes
information. With this in mind, give 5 examples of data being transformed into
information. Present your work in a creative and concise output that organizes the data,
the process it will undergo, and the resulting information.
2. Think of any business around you (your bank, convenience store, etc.) and identify ways
on how you think they can be more productive. Explain in 3-5 sentences.
Part 3: Unit 3 (5 pts)
1. Computers perform many jobs that previously were performed by people. Will computer-
based transactions and expanded e-commerce eventually replace person to-person
contact? From a customer’s point of view, is this better? Why or why not?
2. What types of information systems might a large company use?
Part 4: Unit 4 (10 pts)
Solve the following problem applying the method used in the video uploaded in your powerpoint
presentation. You may check: Lesson 07 Video 01 Payback period
Problem. Assume the following cash flow for 2 projects. Assuming that the cash flows are
occurring at the end of the year. Find the payback period for both these projects.
0 -1000 -1000
1 600 100
2 400 400
3 200 600
4 200 600
5 100 700
Solution:
79
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Part 5: Unit 5 (15 pts)
Content marketing can be a very hectic mess unless you organize it into clear business
processes. Consider the following process:
The content writer takes up & finishes the first draft of an article. Includes
descriptions of any custom images that are to be used in the article
The marketer gathers influencer contact information, to be used for advertising
and marketing once the article is done
The editor proof-reads the article, makes points on grammar, style, spelling, etc.
The designer creates custom images as asked, sending them over to the content
writer
The writer takes the comments into consideration, fixes any mistakes, and adds
the images to the article
The SEO expert makes sure that the article meets the right optimization best-
practices & publishes the article
The marketer uses a combination of advertising & email outreach to make sure
that the article is read.
Activity: Construct the business process diagram and apply the flowcharting process
discussed.
Note: This example is taken from: https://tallyfy.com/business-process/
References
https://explorable.com/hawthorne-effect
https://methods.sagepub.com/book/key-concepts-in-social-research/n22.xml
https://online.visual-paradigm.com/diagrams/tutorials/use-case-diagram-tutorial/
https://sites.google.com/site/2012itcs371devsec3fuzzysystem3/3
https://www.investopedia.com/terms/c/click_and_mortar.asp
https://www.mbaskool.com/business-concepts/marketing-and-strategy-terms/2587-click-
only-companies.html
https://www.sciencedirect.com/topics/computer-science/sequence-diagram
https://www.slideshare.net/fajarbaskoro/systems-request
https://www.tutorialspoint.com/software_engineering/case_tools_overview.htm
https://www.visual-
paradigm.com/support/documents/vpuserguide/2821/286/7114_drawingbusin.html
80
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
https://www.youtube.com/watch?v=DMPxxijmG7M&fbclid=IwAR0hx6Uo4PSlgqmMmAO
eX4e_R6mq0s4nMw-iwcXUOiixRkvkHeWxK8UTQj8
https://www.youtube.com/watch?v=rAR5sbaphwU&fbclid=IwAR3EXVa8Rag6iV8zFswXc
FhRFOB_FaiEa7QD6QMukGoyaiQ6cRLH30xiCtY
McCombes, S. (2020, January 13). How to Do a Case Study: Examples and Methods.
Retrieved June 7, 2020, from https://www.scribbr.com/methodology/case-study/
NewLeaf. (2012). ROI or Payback Period? Retrieved June 7, 2020, from https://newleaf-
llc.com/2012/08/roi-or-payback-period/
Requirements Modeling. Part 1 https://www.youtube.com/watch?v=2t0ichoFHG8 Part
2 https://www.youtube.com/watch?v=1u5KQh_B1_U
ROSENBLATT, H. (2014) Systems Analysis and Design, 10th edition. Shelly Cashman
Series. Cengage Learning
Top five causes of scope creep ... and what to do about them. A Guide to the Project
Management Body of Knowledge (PMBOK® Guide)—Fourth edition
https://www.pmi.org/learning/library/top-five-causes-scope-creep-6675
With the internet being the center for acquiring information nowadays, and more and more
systems being developed to suit the needs of different businesses, all of which make use of the
internet as a medium for marketing and operations, there is a question of how the security of
everyone is maintained. Having a singular tool used as a platform by different business and
individuals alike has definitely made it easier for everyone to communicate and do transactions.
But it has also made it easier for others to exploit the vulnerability of persons who are not
knowledgeable about the risks of using the internet.
To start with this module, take some time to reflect on the following questions:
1. Have you ever felt that your security is compromised while using the internet?
2. Do you think you have done something that might have been illegal?
3. Have you ever searched anything in Google and used it as part of one of your outputs?
4. Have you created anything that was used by someone else without your consent
81
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
Explore Activity
1. Search for an example of an apparent cybercrime. From this example, give your thoughts on
how you think that could have been prevented.
2. Downloading files through the internet is rampant, whether legal or not. An example of which
is downloading of movies, TV series, or animes via a torrent client. Currently, this is an illegal
act, but authorities have little resources to stop this completely. Do you think this kind of
activity must be stopped, or do you think this is something that must be accepted as legal?
82
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.
References:
• Course notes - Atty Marco Polo E. Cunanan. Public Attorney II, PAO San Fernando (P)
District. Lecturer, Tarlac State University School of Law
• Federis & Associates Intellectual Property Firm. (2013). What is Copyright? Retrieved
from FEDERIS Intellectual Property Law: http://www.federislaw.com.ph/faqs-
resources/copyright/
• Lawphil.net and Chanrobles.com
• Republic Act No. 10173. (2012). Retrieved from Official Gazette:
https://www.officialgazette.gov.ph/2012/08/15/republic-act-no-10173/
• Republic Act No. 10175. (2012). Retrieved from Official Gazette:
https://www.officialgazette.gov.ph/2012/09/12/republic-act-no-10175/
Appendix
Unit 01 Question2: Calculate the percentage increase in productivity if the output
expands from 12,000 in year 2 to 15,000 in year 3.
Answer:
Take the output in year 3 which is 15,000 and subtract it with the output in year 2 which is
12,000 to get the increase from year 2 to year 3.
15,000-12,000 = 3,000
Then divide it from the output from year 2 which is 12,000 then multiply it by 100 to get the
increase by percentage
83
Property of and for the exclusive use of SLU. Reproduction, storing in a retrieval system, distributing, uploading or posting online, or transmitting in any form or by any
means, electronic, mechanical, photocopying, recording, or otherwise of any part of this document, without the prior written permission of SLU, is strictly prohibited.