Nothing Special   »   [go: up one dir, main page]

GE ELEC Living in The IT ERA Finals

Download as pdf or txt
Download as pdf or txt
You are on page 1of 47

Issue No.

1 Page 120 of 166


ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 2 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Lesson 5
IT, Culture and the Society (6 hours)

Competence, Course Outcomes and Learning Outcomes

Competence:
Technology: works with a variety of technologies/ Perform Computer Operations
Course Outcome/s:
By the end of this course, the student is able to:
1. Describe the cultural, economic and social implications of such technologies for society.
2. Apply critical thinking about “new media”.
3. Discuss IT trends along with the issues and challenges these developments bring.
Learning Outcomes:
At the end of the lesson, the student is able to:
1. Evaluate the impact of IT on the society and social behavior;
2. Discuss the capabilities, applications and challenges of IoT;
3. Identify the common methods in implementing IT automation;
4. Analyze the influence of IT on culture and social behavior; and online reviews,
weblogging/social media and YouTube learners on culture.

Overview

The impact of IT on the society have had some positive as well as negative effects. Thus, this
lesson is intended to discuss the emerging technologies and its impact on the society. It will also
focus on the two technologies that greatly influence the present-day culture and society – the IoT
and automation.
Moreover, this lesson will allow you to analyze the influence of IT on culture and social
behavior. Online reviews, weblogging, social media and YouTube will be discussed on their impact
on culture. Finally, netiquette will be given emphasis to teach you on how to behave socially while
engaging in any social activities brought about by IT.

©All Rights Reserved


Issue No. 1 Page 121 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 2 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Discussion

Learning Module 5.1 The Impact of IT on the Society


Computers and other forms of technology impact our daily lives in so many ways. Computers
can be seen anywhere else – in stores, restaurants, hospitals, hotels, schools, offices and other
establishments. On regular basis, we use computers and Internet to obtain information, experience
online entertainment, buy products and services and communicate with others. Many of us carry a
smartphone or other gadgets with us all times so we can remain in touch with others on a continual
basis and can access Internet information as we need it. It is even possible these mobile devices to
pay for purchases, play online games with others, watch online movies and much more.
Business organizations also use computers tremendously, such as to maintain employee and
customer records, manage inventories, maintain online stores and other web sites, process sales,
control robotics and other machines in factories, and provide top management employees with up-
to-date information they need in decision making.
The government uses computers for storing and organizing vital information about its citizens,
e-mail functions, payment distribution, law enforcement and military purposes and other important
tasks. In short, computers and information technology are used in endless of ways.
Trends in computing and information technologies have been taken into account by most of
the organizations and companies nowadays, shifting from manual business processes to automated
ones. The use of these technologies have improved company’s products and services. Among the
previous trends that were mentioned in the previous lessons, the internet of things (IoT) and
automation seem to have greatly influenced present-day culture and society; thus it is imperative to
discuss these thrusts in detail.

5.2 Internet of Things (IoT)


The so-called Internet of Things (IoT) has been trending since 2016. The vision of IoT has
evolved due to convergence of multiple technologies, including pervasive wireless communication,

©All Rights Reserved


Issue No. 1 Page 122 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 2 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

data analytics, machine learning, and use of hardware technology such as sensors,
microprocessors, and microcontrollers.
IoT is a set-up of devices and objects which are connected together in a given network. Their
connection, often wirelessly, is possible using both hardware and software.
Capabilities of Internet of Things (IoT)
A major requirement for IoT is a strong internet connection, as all devices must be able to
communicate with one another for the upload and download of needed data. But aside from
connectivity, it should also be capable of the following (Mattern & Floerkemeier):
a. Integration across technology and business
An IoT platform must be capable of integrating all of these so that the data may be
used efficiently to improve productivity and even make predictions for optimum system
performance.
Sensors can be used to help improve business processes, such as machines used for
manufacturing and production, security systems, and even automatic turning on and off of a
light switch. Technology used for each application may vary, depending on the complexity and
use. Software used to interpret incoming data and sending commands to the hardware must
be taken into account, plus the different protocol and standards for connection, like Bluetooth,
WiFi, etc.
b. Data analysis and synchronization
IoT should be capable of providing analytics to help organizations in their decision-
making. However, for this to be effective, data must be synchronized to allow integration with
all of the business aspects, including top management, operations, and even customer
relations.
c. Security and service
With all of these devices being used and all of these data being collected, a major
concern is obviously security. To improve security, IoT devices are usually divided into
networks and each network has a different network access, some more restricted than others,
without compromising connection and system integration.

©All Rights Reserved


Issue No. 1 Page 123 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 2 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Example: mobile phone notifying you if you will allow a new device to connect to it via
Bluetooth.
Applications of Internet of Things (IoT)
With improved business operations and employee productivity, it is only natural that a
company adopts IoT.
a. Smart cities
Smart cities have adopted IoT in traffic management, waste disposal, and even
community monitoring for the security of the city’s residents.
b. Connected industries
The oil and gas industry is identified as one of the front-runners for IoT connectivity
which includes remote access to heavy equipment and machinery, from manufacturing to
production.
c. Connected buildings
Connected building projects involve facility-automation to reduce energy costs.
d. Connected cars
With smart cities adopting IoT for their traffic management, it is no longer surprising for
the latest car models to be equipped with sensors and network connectivity. Majority of
projects relating to smart vehicles revolve around vehicle diagnostics and monitoring.
e. Smart energy
Majority of smart energy projects focus on developing smart grinds for renewable
energy and infrastructure.

Challenges of Internet of Things (IoT)


a. System requirement
Industries normally identify different requirements, especially depending on the type of
industry they belong to. Those in the food industry may require monitoring of perishable
goods, from production and packaging to shipping. An automobile manufacturer may have the
same process, but since products are different, requirement may also change. Food will
require data regarding temperature levels, whereas cars will require mechanical precision.

©All Rights Reserved


Issue No. 1 Page 124 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 2 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

b. Connectivity
With the varying connections- wired and wireless, as well as the different protocols
governing each connection, it will be a challenge to come up with an IoT projects concerning
such protocols.
c. Power requirement
IoT devices need to run on batteries as majority of these devices are mobile. The
challenge, therefore, is how to extend the battery life on such devices, especially those used
in critical procedures, such as health, disaster management, and safety.
d. Security
One of the most highlighted issues in the application of IoT is data security. Confidential
information such as patient’s record or employees’ profile are considered at risk. Security also
includes system integration, with malicious acts such as hacking and viruses proliferating
online.
e. Development
The task of creating IoT projects may be seen daunting, so one of the challenges
identified is how to expand the capabilities of developers, and not just experts, in order to
create more “smart things”.
f. Services
With data collected from IoT, it is important as well to determine where all this will go
and to identify the platform in which these IoT applications will be placed. Nowadays, cloud
services offer end-to-end solutions to a number of IoT projects.

References

T1 – Caoili – Tayuan, R.R., Eleazar, M.V. (2019). Living in the information technology era.
Quezon City: C & E Publishing, Inc.
R20 – Gillis, A. (2021). Internet of things (IoT). IoT Agenda. Retrieved from
https://internetofthingsagenda.techtarget.com/definition/Internet-of-Things-IoT.

©All Rights Reserved


Issue No. 1 Page 125 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 2 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

It is now time to use


Checkpoint those skills you have
learned so far.
Goodluck!

Activity 21
Multiple Choice
Direction: Select the best answer by encircling the letter of your choice.
1. Which of the following IoT capability helps organizations in their decision making by providing
analytics?
a. Security and service c. Data analytics
b. Data analysis and synchronization d. Integration across technology
2. Which of the following is not an application of IoT?
a. System requirement c. Smart energy
b. Smart city d. Connected cars
3. Which of the following challenges in IoT is one of the most highlighted issues in its application?
a. Connectivity c. Security
b. System requirement d. Development
4. Which of the following refers to a network of physical objects like gadgets, appliances or
industrial equipment with embedded technology that allows communication and interaction with
each other?
a. Virtual reality c. Automation
b. Cloud computing d. Internet of things
5. Which of the following is not a challenge in implementing IoT?
a. Power requirement c. Security
b. Services d. Smart cities

©All Rights Reserved


Issue No. 1 Page 126 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Do this
Activity 22
Enumeration
Directions: Give what is asked and write your answers on the space provided.
1–4 At Least Four (4) Challenges of IoT
5–8 At Least Four (4) Applications of IoT
9 – 10 At Least Two (2) Capabilities of IoT

1. ___________________________________________

2. ___________________________________________

3. ___________________________________________

4. ___________________________________________

5. ___________________________________________

6. ___________________________________________

7. ___________________________________________

8. ___________________________________________

9. ___________________________________________

10. ___________________________________________

©All Rights Reserved


Issue No. 1 Page 127 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Assessment

Activity 11
Essay
Directions: Briefly explain the following statement/question. You may submit your answers
personally or through email or messenger.
1. What is the impact of information technology in your education and why is it important?
2. What is IoT, explain with example you have experienced?

For handwritten output:


a. Write your output in an A4 size bond paper
b. Write legibly

For computerized output (online/physical submission)


a. Use A4 size bond paper
b. Font style/size: Arial Narrow 12
c. Spacing: 1.5
d. Alignment: Justified
e. Margin: 1 inch in all sides

©All Rights Reserved


Issue No. 1 Page 128 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

5.3 Automation
With the available technology and standards for computer system interconnection, the
demand for system automation is on the rise. Colloquially called “computerization”, having an
automated system means automated business processes, operations, service providers, monitoring,
and even tools. Examples include automated payroll system, manufacturing plant, automated
weather forecast, etc.
With the introduction of cloud-computing, a growing number of organizations have gone into
automation because of less cost and minimal server maintenance.

Methods in Implementing IT Automation


1. Robotics Process Automation (RPA)
The Institute of Robotics Process Automation and Artificial Intelligence (IRPAAI)
defined robotic process automation (RPA) as “the application of technology that allows
employee in a company to configure computer software of a “robot” to capture and interpret
existing applications for processing a transaction, manipulating data, triggering responses and
communicating with other digital systems”.
RPA actually focuses on computers being able to make logical decisions on the
business process so that their counterparts can focus on other tasks, thus increasing work
productivity.
Application systems and software may also be considered RPA as they are applicable
to the following:
 Process Automation
The use not only of industrial robots but also of “presentation-layer automation
software” is capable of carrying out the daily operations of an organization.
Example: financial systems – payroll, customer management – online system
registration, academic institutions – online enrollment systems, learning management system

©All Rights Reserved


Issue No. 1 Page 129 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

 IT Support Management
Management of IT infrastructure and complex systems become easier using RPA. If
part of the system fails, an automated system can immediately send notifications to the IT
manager and technical support staff., informing them of the problem.
Example: Large buildings – employ automated emergency system – emergency exit
door has been opened, or fire alarm goes off, the system will automatically detect the exact
location of the opened door or active alarm, as the location of the emergency will typically be
assumed to be near that point.
 Automated Assistants
Apple’s Siri is an example of a voice recognition software used in RPAs. Instead of
machine language (binary), computers will be able to understand human language and
interact with the same.
Other example: bank – automated customer service hotline
2. Sensors
Sensors are hardware devices that have the capability to measure an event, object, or
any physical quality that is happening. Sensors have the capacity to connect to other devices
that can keep track of the data they are measuring.
Example: heart rate of a person while jogging, temperature of a room, brightness of a
light sourced
Sensors can be classified as analog or digital, but below is a list of sensors used in
automation:
 Temperature sensor
This sensor is capable of measuring temperature as well as detecting its rise or fall.
This is helpful in systems that are temperature – sensitive such as power plants and server
rooms.
 Infrared (IR) sensor
This sensor often used for security purposes detects infrared light. It is commonly used
along with an infrared light source. You might have seen it in movies I which villains trying to

©All Rights Reserved


Issue No. 1 Page 130 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

access a restricted area would avoid crossing a series of IR sensors shown as beams of red
lines. Breaking or crossing the beam of red line would trigger an alarm.
 Ultrasonic sensor
An ultrasonic sensor detects sound waves, such as how radars and sonars pick up
sounds. A typical application is a light fixture turning on if the owner claps his or her hands,
and turning off once he or the claps again.
 Touch sensor
Through touch, the sensor activates itself and becomes capable of doing its function.
The latest version of Samsung and Apple smartphones now have a one touch login to access
the device, instead of pin code or a pattern. Combining a touch sensor with biometrics, users
can now access the content of their phones with just a single touch on the home button.
 Proximity sensor
This sensor is able to detect objects within a certain range, even if the object is not
physically touching the sensor yet. It is typically used in the light fixtures of houses and
buildings. The light turns on if it detects a person is close by. This helps save on the electricity
as well as secure the premises.
 Pressure sensor
A pressure sensor helps determine the weight or impact of a certain object. It is
normally used by manufacturing companies, such as automobile companies, in designing
their airbag system. They need to create an airbag that is strong enough to cushion a driver
upon head-on collision, but not too strong to injure him or her due to the recoil.
 Level sensor
This sensor can detect the level of liquids, fluids, grainy or granular materials, such as
powders. Level sensors are used for disaster risk management systems, such as a flood
monitoring system. Level sensor can be used to determine if a flooded street will be passable
by light vehicle or not.
 Smoke/Gas sensor
This sensor is used to detect the presence of dangerous fumes such as carbon
monoxide caused by fire. Smoke alarms show how this sensor works.

©All Rights Reserved


Issue No. 1 Page 131 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

5.4 The Influence of IT on Culture and Social Behavior


There are a lot of positive influences of IT on culture and social behavior highlighted in the
past lessons. Examples are people connecting with each other through the internet social media,
human labor aided with machinery, contactless transactions, etc. However, there are also
corresponding negative influences that affect the society generally. These include people getting
more inactive, face-to-face interactions are lessened, convenience of almost everything is not good,
etc. These factors constitute some of the negative and positive influences of IT on culture and social
behavior that reflects how we live our lives currently. May it be positive or negative influence, it is
much safer to practice self-control and abstinence of too much of anything.

References

T1 – Caoili – Tayuan, R.R., Eleazar, M.V. (2019). Living in the information technology era.
Quezon City: C & E Publishing, Inc.
R4 – Laviña, C. (2015). Social, ethical, legal and professional issues in computing: with
complete explanation of Philippine cybercrime laws. Manila: Mindshapers Co., Inc.
R21 - Groover, M. P. (2020, October 22). automation. Encyclopedia Britannica.
https://www.britannica.com/technology/automation

©All Rights Reserved


Issue No. 1 Page 132 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Checkpoint It is now time to use those


skills you have learned so
far. Goodluck!
Activity 23
Multiple Choice
Direction: Select the best answer by encircling the letter of your answer.
1. Which type of sensor is normally used by manufacturing companies, such as automobile
companies, in designing their airbag system?
a. Level sensor c. Touch sensor
b. Pressure sensor d. Proximity sensor
2. Which type of sensor detects sound waves used in turning on/off lighting fixtures by clapping?
a. Ultrasonic sensor c. Temperature sensor
b. Infrared sensor d. Sound sensor
3. Which method of automation is Apple’s Siri an example of?
a. IT support management c. Automated assistant
b. Smart machines d. Process automation
4. Which type of sensor is often used to detect any burglar intrusion?
a. Temperature sensor c. Infrared sensor
b. Smoke/gas sensor d. Level sensor
5. Which of the following is the use of largely automatic equipment in a system of manufacturing or
other production process?
a. Robotics c. Internet of things
b. Artificial intelligence d. Automation

©All Rights Reserved


Issue No. 1 Page 133 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Do this

Activity 24
Enumeration
Direction: Give what is asked:
1–2 Two Methods in Implementing IT Automation
3–5 Three RPA Application System and Software
6 – 10 At Least Five Types of Sensors used in Automation

1. _____________________________________

2. _____________________________________

3. _____________________________________

4. _____________________________________

5. _____________________________________

6. _____________________________________

7. _____________________________________

8. _____________________________________

9. _____________________________________

10. _____________________________________

©All Rights Reserved


Issue No. 1 Page 134 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Assessment

Activity 12
Essay
Directions: Briefly explain the following question. You may submit your answers personally or
through email or messenger.

1. What is automation? Is it a threat to employment? Why or why not?

For handwritten output:


a. Write your output in an A4 size bond paper
b. Write legibly

For computerized output (online/physical submission)


a. Use A4 size bond paper
b. Font style/size: Arial Narrow 12
c. Spacing: 1.5
d. Alignment: Justified
e. Margin: 1 inch in all sides

©All Rights Reserved


Issue No. 1 Page 135 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

5.5 Influence on Culture


 Online Reviews
With the proliferation of online information, it is easy to find details on a
certain movie or a book. However, with sites such as Rotten Tomatoes, one can actually
make a decision on what movie to watch simply by reading the “reviews” of other people.
 Weblogging/Social Media
Nowadays, food bloggers post pictures of their meals in restaurants along with a food
review. This trend created a culture of people dining with friends or family without actually
interacting with them.
 YouTube Learners
YouTube is one of the most popular social media sites. People can watch videos,
comment on them, and upload their own videos, among others. Thus, YouTube serves as a
source of videos with people searching for almost about anything online – from trivial topics to
more serious subject matter. Instead of reading books or listening to their teacher’s class
lecture, students would rather watch YouTube to learn the lesson.

5.6 Influence On Social Behavior


Cyberbullying
Behavioral choices especially for teenagers or adolescents are influenced by technologies.
Cyberbullying, for example, is a serious phenomenon brought about by social media.
Cyberbullying is an unwanted, hostile behavior done by individuals to other people in the
hope of gaining control over them. Since the act is done online, the attackers may be hiding behind
their internet profile.
An internet profile, also called an internet identity, online identity, or internet persona, is a
profile created by internet users to establish their social identity in online communities,
social media sites, and other websites. Facebook requires its users to be at least 13 years of age
before they can create an account.
Cyberbullying comes in the form of messages or images, such as memes. Since messages
or images can be posted anonymously, it is hard and oftentimes, difficult to trace the source.

©All Rights Reserved


Issue No. 1 Page 136 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

The good news is that society – communities and the government – are developing ways to
stop bullying. The Philippines has identified several laws, including the Cyber Crime Prevention
Act, also known as R.A. 10175, to help catch cyberbullies.

Netiquette
Netiquette is a combination of the words internet and etiquette. It describes how one should
act online. Netiquette brings in policies for all the features and qualities of the internet, including the
use of the World Wide Web (WWW), email services, File Transfer Protocol (FTP), chart rooms, and
instant messaging.
 Netiquette for Social Media
a. The Personalize IT Rule. Make sure to put restrictions in accepting friends or followers
on your social media. It is not about having the most number of followers or friends.
What matters most is who and how you interact with.
b. The Off-limits Rule. Know your limitations when voicing your opinions on different
subjects or topics concerning your school, religion, personal information, workplace or
even some controversial topics such as politics. It will save you from dreadful
consequences later on.
c. The Tag – You’re It Rule. Be careful in tagging someone either in your status photos or
posts. You may also restrict someone from tagging you in their posts and photos.
 Netiquette for Email Services
Email is an important form of communication that is used in multiple contexts, from
professional to personal. DO follow these rules and guidelines for proper email netiquette:
a. Composing Email
 Include a subject line, a proper opening and a closing line
 Know your audience - for formal emails to colleagues or prospective employers, use
polite and professional language
 Be concise and proofread the text to make sure there are no grammatical or
spelling mistakes

©All Rights Reserved


Issue No. 1 Page 137 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

b. Sending and Responding to Email


 Address all of the sender's questions or concerns
 Confirm that the email of the recipient is correct
 Be careful using the Reply to All button
 If necessary, protect privacy of recipients by using the blind carbon copy (bcc) field
c. DON'T make these mistakes:
 Writing in capital letters that MAKE IT SEEM LIKE YOU ARE SHOUTING
 Opening emails or attachments from unknown or suspicious senders
 Overusing the priority, high importance or receipt settings
 Sending or forwarding personal or private information without the original sender's
consent
 Including unnecessary information or diverging from the purpose of the email
 Using emoticons or abbreviations i.e. :) or "lol" unless writing informally to friends or
family
 Subscribing to unknown distribution lists

Figure 5.1 Guidelines in composing an email

©All Rights Reserved


Issue No. 1 Page 138 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

 Netiquette for Chat Rooms and Instant Messaging


Chat and instant messaging (IM) are short messages sent and read in real time,
allowing you to converse more quickly and easily than email.
Chat and IM are generally used when both (or all) people are online, so your
message can be read immediately. By comparison, an email message won't be seen until
the recipient checks his email, meaning that chat and IM are better for quick messages and
conversations.
The terms chat and IM are sometimes used interchangeably. However, they can
have slightly different meanings:
 Chat often occurs in a virtual chat room, which can include many different people
who may or may not know each other. Many chat rooms focus on a particular topic
or interest. Examples: Facebook, Twitter, Tumbler, etc.
 IM usually includes a list of your contacts, called a Buddy List or Friend List, which
allows you to see who is online. IM is especially suited for one-on-one
communication, but it's possible to send messages to multiple people at once. IM is
technically a kind of chat, and some IM services use the term "chat" instead.
Examples: Discord, Skype, Jabber, etc.
Here are the general guidelines in joining a chat room or IM conversation:
 Think long and hard before accepting a private conversation, especially with
someone not on your friends list.
 In group chat, include only those that are in your friends list.
 If possible, do not give your personal information while chatting, including your
photos and “selfies”
 When in doubt, save a copy or make a back-up of your conversation (chat).
 You must log out from your account in all times, especially if you are in a public
place, such as a computer shop
 You may opt to customize your account settings from public to private account.

©All Rights Reserved


Issue No. 1 Page 139 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

References

T1 – Caoili – Tayuan, R.R., Eleazar, M.V. (2019). Living in the information technology era.
Quezon City: C & E Publishing, Inc.
R4 – Laviña, C. (2015). Social, ethical, legal and professional issues in computing: with
complete explanation of Philippine cybercrime laws. Manila: Mindshapers Co., Inc.
R22 – Shea, V. (2021, March 9). Digital Literacy: Computer Skills, Netiquette & Internet
Safety. Library & Learning Commons. Retrieved from
https://bowvalleycollege.libguides.com/c.php?g=10214&p=52001
R23 – Goodwill Community Foundation, Inc. (2021). Beyond Email - Chat and Instant
Messaging. GFC Learn.org. Retrieved from
https://edu.gcfglobal.org/en/beyondemail/chat-and-instant-messaging/1/.

©All Rights Reserved


Issue No. 1 Page 140 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Checkpoint It is now time to use those


skills you have learned so
far. Goodluck!
Activity 25
Multiple Choice
Direction: Select the best answer by encircling the letter of your answer.
1. Which of the following are guidelines for courteous communication in the online environment?
a. Ethics c. IT professionalism
b. Netiquette d. Code of conduct
2. Which of the following is also known as Cyber Crime Prevention Act?
a. RA 10175 c. RA 11075
b. RA 10715 d. RA 10157
3. Which of the following influence an individual’s decision in watching a movie or not?
a. Social media c. Online review
b. Weblogging d. YouTube
4. Which of the following is an act of harassing someone online by sending or posting mean
messages, usually anonymously?
a. Phishing c. Cyberbullying
b. Hacking d. Cyberstalking
5. Which of the following is not another term for internet profile?
a. Internet identity c. Internet persona
b. Online identity d. Online avatar

©All Rights Reserved


Issue No. 1 Page 141 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Do this

Activity 26
True or False
Directions: Write O if the statement is correct, otherwise write X. place your answer before the
number.
_____ 1. Writing an email or chatting in capital letters make it seem like you are shouting.
_____ 2. Discord, Facebook, Twitter, etc. are examples of virtual chat rooms.
_____ 3. Facebook requires its users to be at least 12 years of age before they can create an
account.
_____ 4. One of the influence of IT on culture is that students tend to watch YouTube videos to learn
lessons rather than listening to their teacher’s class lecture.
_____ 5. Cyberbullying comes in the form of messages or images, such as memes.

©All Rights Reserved


Issue No. 1 Page 142 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Assessment

Activity 13
Essay
Directions: Briefly explain the following statement/question. You may submit your answers
personally or through email or messenger.
1. How does information technology influence your culture and social behavior?
2. How can netiquette be beneficial to people, especially to students?

For handwritten output:


a. Write your output in an A4 size bond paper
b. Write legibly

For computerized output (online/physical submission)


a. Use A4 size bond paper
b. Font style/size: Arial Narrow 12
c. Spacing: 1.5
d. Alignment: Justified
e. Margin: 1 inch in all sides

©All Rights Reserved


Issue No. 1 Page 143 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Required Output

Activity 5
Reflection Paper
Write a self-reflection on cyberbullying by answering the following questions:
1. Have you, or has anyone you know, been bullied?
2. What were the steps you, or that person, took to stop the incident? What are the other ways
that you think can combat bullying?
3. What did you, or that person, learn from the experience?
You may submit your answers personally or through email or messenger, follow the
guidelines of Assessment activity in writing and formatting your output.

Rubric for Grading Reflection Paper


Criteria Score
Content and Development (50%)
The content is comprehensive, accurate, and persuasive. Major points are
stated clearly and are well supported. Responses are excellent, timely and
address assignment including course concepts. Content and purpose of the
writing are clear.
Format (25%)
The paper follows all designated guidelines.
Conventions (25%)
The paper shows correct grammar and usage, follows the rules of
punctuation and no misspelled words.

©All Rights Reserved


Issue No. 1 Page 144 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Lesson 6
IT Trends, Issues and Challenges (6 hours Lecture)

Competence, Course Outcomes and Learning Outcomes

Competence:
Technology: works with a variety of technologies/ Perform Computer Operations
Course Outcome/s:
By the end of this course, the student is able to:
1. Discuss IT trends along with the issues and challenges these developments bring.
Learning Outcomes:
At the end of the lesson, the student is able to:
1. Describe how the given IT trends affect the people’s way of living; and
2. Discuss the issues and challenges in IT that the different sectors face.

Overview

This lesson features topics on the trends in IT that focuses on the industry sector’s use of
technology specifically IoT and automation. Topics regarding online banking as well as the
business sector’s online presence through e-commerce are likewise included. IT trends on
education and case studies on the use of technology in health are also presented. Lastly, this lesson
covers several issues in IT that the different sectors face.

©All Rights Reserved


Issue No. 1 Page 145 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Discussion

Learning Module 6.1 Trends


Information technology is an industry on the rise. The business structure, job growth, and
emerging technology will all shift in the coming years because of evolving IT. Current trends are
improving and presenting new functions in the field of medicine, entertainment, business, education,
marketing, law enforcement, and more. Information technology is advancing so rapidly that new
developments are quickly replacing current projections.

Industry
The industry sector in the Philippines is made up of local and foreign companies that provide
different products and services to Filipinos. Some companies in the food industry include Universal
Robina and Monde Nissin while those in the beverage industry include San Miguel Brewery and
Pepsi Philippines.
Two major trends are seen in this sector – automation and the application of Internet of
Things (IoT), hence the introduction of smart industries.
 Internet of Things (IoT)
The IoT is becoming an increasingly emergent topic of conversation of both in the
workplace and in the society at large. It has the potential to influence how we live and how we
work. For example, through the use of electronics, sensors and robotics, major organizations
have reported increase in productivity as well as accuracy of results in their production lines.
 IT Automation
Automating what used to be manual operations is the trend in companies and
industries. As with IoT, automation helps many organizations achieve greater productivity
among its employees by using computers and software programs to do the tasks. Such
automations include accounting systems, production systems, timekeeping systems and even
security systems.

©All Rights Reserved


Issue No. 1 Page 146 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Online Banking
Online banking also known as “internet banking” or “web banking” allows a user to
execute financial transactions via the internet. An online bank offers customers just about every
service traditionally available through a local branch, including deposits, money transfers, and bill
payments.
Education
Most colleges and universities in the Philippines use a learning management system (LMS)
to deliver, manage, and keep track of students’ progress. This LMS, which is delivered online,
relates to the e-learning system. E-learning is learning that utilizes electronic technologies to access
educational curriculum outside of a traditional classroom. In most cases, it refers to a course,
program, or degree delivered completely online. Some call this as distance learning.
Business
Electronic commerce or e-commerce is a term for any type of business, or commercial
transaction that involves the transfer of information across the internet. It covers a range of different
types of businesses, from consumer-based retail sites and auction or music sites, to business
exchanges trading goods and services between corporations. It is currently one of the most
important aspects of the internet to emerge.
Health
E-health (or eHealth) refers to the use of information and communications technology in
health care. It covers a lot of territory, which is why digital health industry experts often contest
exactly what the term means and to add to the confusion, it is also frequently used as a synonym for
Health IT.
Emerging Technologies
The Covid-19 pandemic accelerated digitization and automation, allowing organizations to
remain irrepressible even in adversity. Many businesses adopted disruptive technologies and
modified their business models.
The effect of this pandemic will be felt for a long time, and the digital transition will continue. It
will be challenging to overcome the error, if businesses do not keep up with technological trends.

©All Rights Reserved


Issue No. 1 Page 147 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Advanced technology will continue to change our lives and the way we work, opening up numerous
opportunities for businesses worldwide.
The following are some of the technology developments we need to be updated on so that
everyone knows what to look for, adopt, and take with them.
 Artificial Intelligence (AI)
Artificial Intelligence has made a lot of hype over the last decade. Still, it remains one of
the leading emerging technology developments because its significant impacts on how we
live, work, and play are still in their inception.
AI is now well-known for its presence in image and speech recognition, ride-sharing
apps, mobile personal assistants, navigation apps, and various other applications.
Besides that, Artificial Intelligence is to investigate interactions to discover previously
undetected connections and assess facility demand in real-time to allocate resources and
identify dynamic patterns among consumers.
Machine Learning, a subset of AI, is used in a wide range of industries, resulting in a
surge in the market for skilled workers.
 5G and enhanced connectivity
Faster and more stable internet means more than only loading webpages faster and
spending less time waiting for YouTube videos to load. From 3G onwards, each advancement
of mobile connectivity has opened up new internet use cases.
As bandwidths expanded, 3G enabled online access and data-driven services on
mobile devices; 4G enabled the increase of streaming video and music platforms; and 5G,
likewise, would expand what is possible.
5G refers to networks that use cutting-edge technology, including augmented reality
and virtual reality.
They also threaten to render cable and fiber-based networks obsolete by requiring us to
be tethered to a specific location.
In a nutshell, 5G and other advanced, high-speed networks allow all of the other trends
we've discussed to be accessed anywhere, at any time.

©All Rights Reserved


Issue No. 1 Page 148 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Complex machine learning applications that require real-time access to Big Data
sources can be automated and run in the field.
 Edge computing
Edge computing is a new technology that ensures low latency and high-speed data
processing. It allows computations to be carried out closer to data storage systems, improving
application performance.
Cloud platforms' high bandwidth costs can act as a motivator for edge computing
adoption.
The technology aims to run fewer processes in the cloud and transfer them to places
like the user's computer or an edge server.
Bridging the gap between data and computation eliminates long-distance
communication between the server and the client, resulting in increased process speed.
Therefore, edge computing used to handle time-sensitive data stored in remote areas
with minimal access to the central location. Cloud computing and IoT applications would
benefit from the technology.
 Internet of behaviors (IoB)
If you've heard of the Internet of Things (IoT), you should know that the IoT extends to
the Internet of behavior as well.
The Internet of Things (IoT) is concerned with using data and insights to influence
behavior. IoT devices are possible as massive databases for Internet of behavior (IoB)
paradigms.
Businesses will be able to follow customer behavior and use IoB to benefit their
respective channels with the aid of IoB. For example, a health-tracking app may collect
information about your physical activity routine, diet, sleep, and other habits.
This information can be used to encourage more behavioral improvement, such as by
creating personalized health plans.

©All Rights Reserved


Issue No. 1 Page 149 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

 Quantum computing
Quantum computing, a form of computing that uses the power of quantum
phenomena such as superposition and quantum entanglement, is the next noteworthy
technology trend.
Because of its capability to instantly question, track, interpret, and act on data,
regardless of source, this incredible technology trend also includes preventing the spread of
the coronavirus and developing potential vaccines.
Quantum computing is now being used in banking and finance to monitor credit risk,
perform high-frequency trading, and detect fraud. Quantum computers are now several times
faster than traditional computers, including those from well-known companies
 Blockchain
Blockchain is another recent mainstream technology trend. Many people believe that
Blockchain is just about Cryptocurrency, which is not the case.
Bitcoin and other Cryptocurrencies are just a part of Blockchain technology as a whole.
Apart from Cryptocurrencies, it uses various other fields such as healthcare, supply chain and
logistics, advertising, etc.
It is a decentralized digital ledger that keeps track of any transaction through a global
network of computers.
Various businesses are searching for Blockchain platforms to build top-level business
strategies, driving up the market for blockchain technology.
Blockchain's amount of protection and transparency is the primary explanation for its
tremendous rise in popularity.
 Cybersecurity
Cybersecurity does not seem to be cutting-edge technology, but it progresses at the
same rate as other technologies. This is partly due to the constant emergence of new threats.
Malicious hackers attempting to gain unauthorized access to data would not give up
quickly, and they will continue to find ways to avoid even the most stringent protection
measures. It's partly due to the adoption of modern technologies to improve defense.

©All Rights Reserved


Issue No. 1 Page 150 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Since Cybersecurity will extend to guard against hackers as long as we have them,
Cybersecurity will remain a popular technology.
 Human augmentation
Human augmentation is a broad term that encompasses innovations that seek to
improve human abilities and productivity.
Physical augmentation, such as prosthetics, AR lenses, and RFID tags infused inside
humans, are all part of the field of human augmentation.
This can aid in the enhancement of human cognition, perception, and action abilities.
This is accomplished by sensing and actuation technology, information fusion and fission, and
artificial intelligence.
 Distributed cloud
The Distributed Cloud technology trend is poised to take Cloud Computing to new
heights. It is concerned with distributing public cloud resources to various geographical
locations, processes, updates, delivery, and other relevant activities being handled centrally
by the original public cloud provider.
Instead of offering a centralized solution, it would assist in meeting the service needs of
individual cloud locations separately.
Meanwhile, companies would undoubtedly benefit from this technological trend by
decreasing latency, reducing the risk of data loss, and lowering costs.
Technologies such as Artificial Intelligence (AI), the Internet of Things (IoT), and others
that involve processing large amounts of data in real-time will benefit from the introduction of
Distributed Cloud technology.
 Augmented reality and virtual reality
Augmented Reality and Virtual Reality are two popular tech trends that have exploded
in popularity in recent years and expected to continue to do so in the coming years.
When it comes to these two technologies, Virtual Reality (VR) is concerned with
creating a realistic environment of the physical world using computer technologies, while
Augmented Reality (AR) is concerned with enhancing the environment using computer-
generated elements.

©All Rights Reserved


Issue No. 1 Page 151 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

They operate in various fields, including gaming, transportation, education, healthcare,


and many others. For example, Ed-Tech platforms are increasingly favoring Augmented
Reality and Virtual Reality to improve students' learning experiences.

References

T1 – Caoili – Tayuan, R.R., Eleazar, M.V. (2019). Living in the information technology era.
Quezon City: C & E Publishing, Inc.
R8 – Iberdrola, S.A. (2021). Innovation trends in 2020: ready for the 'great technological
leap'? . Iberdrola. https://www.iberdrola.com/innovation/technology-trends
R28 – Smith, E. (2021, May 17). Top 10 latest technology trends you must follow in 2021.
Retrieved from https://www.itproportal.com/features/top-10-latest-technology-trends-
you-must-follow-in-2021/

©All Rights Reserved


Issue No. 1 Page 152 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Checkpoint It is now time to use


those skills you have
learned so far. Goodluck!
Activity 27
Multiple Choice
Direction: Select the best answer by encircling the letter of your answer.
1. Which of the following is the practice of defending computers, servers, mobile devices,
electronic systems, networks, and data from malicious attacks?
a. Blockchain c. Cybersecurity
b. Artificial intelligence d. Internet of behavior
2. Which of the following refers to the behavioral data analysis gathered from the Internet of Things
and other sources and then attempts to make effective use of?
a. Blockchain c. Cybersecurity
b. Artificial intelligence d. Internet of behavior
3. Which of the following refers to the deployment of computing and storage resources at the
location where data is produced?
a. Edge computing c. Quantum computing
b. Cloud computing d. Blockchain
4. Which of the following is now being used in banking and finance to monitor credit risk, perform
high-frequency trading, and detect fraud?
a. Edge computing c. Quantum computing
b. Cloud computing d. Blockchain
5. Which of the following IT trend refers to the delivery of learning and training through digital
resources?
a. Learning management system c. Flexible learning
b. eLearning d. Traditional learning

©All Rights Reserved


Issue No. 1 Page 153 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Do this

Activity 28
True or False
Directions: Write O if the statement is true; if it is false, write X. Write your answer on the
space provided before each number.
______1. The two major industry trends are automation and the application of Internet of things.
______2. AI is well-known for its presence in image and speech recognition, ride-sharing apps,
mobile personal assistants, navigation apps, and various other applications.
______3. 4G technology refers to networks that use cutting-edge technology, including augmented
reality and virtual reality.
______4. Augmented reality is concerned with creating a realistic environment of the physical world
using computer technologies.
______5. A distributed cloud is a type of cloud where the infrastructure is geographically dispersed
and services primarily run at the network edge.
______6. Virtual reality is concerned with enhancing the environment using computer-generated
elements.
______7. Prosthetics, AR lenses, and RFID tags infused inside humans are all part of the field of
human augmentation.
______8. Cybersecurity is a digital, public ledger that records online transactions – the core
technology for cryptocurrencies like bitcoin.
______9. Quantum computing is an area of study focused on the development of computer based
technologies centered around the principles of quantum theory.
______10. E-health refers to the use of information and communications technology in health care.

©All Rights Reserved


Issue No. 1 Page 154 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Assessment

Activity 14
Essay
Directions: Briefly explain the following statement/questions. You may submit your answers
personally or through email or messenger.
1. Differentiate virtual reality from augmented reality and give examples for each type of
technology.
2. Describe the importance of information technology trends in the health sector.

For handwritten output:


a. Write your output in an A4 size bond paper
b. Write legibly

For computerized output (online/physical submission)


a. Use A4 size bond paper
b. Font style/size: Arial Narrow 12
c. Spacing: 1.5
d. Alignment: Justified
e. Margin: 1 inch in all sides

©All Rights Reserved


Issue No. 1 Page 155 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

6.2 Issues and Challenges


Industry
With the introduction of computer systems at work, one main issue raise is maintaining the
computer system’s security and integrity. Malicious software, or malware, is a general term used
to describe any type of software that can cause harm to a computer system. Examples of malware
include the following:
1. Virus – it is a computer program usually hidden within another program that inserts itself
into other programs or files.
2. Worm – is a stand–alone malware that replicates itself in order to spread to other
computers.
3. Trojan – it refers to a malicious program which initially appears to be useful, routine, or
interesting in order to persuade a victim to install it.
4. Spyware – is a software that aims to gather information about an organization or a person
without his or her knowledge.
5. Ransomware – it is type of malware that can block access to a victim’s data. The hacker
uses his or her technical knowledge or skills to gain unauthorized access to data or
systems. Some simple ransomware is not that difficult to reverse. However, there are some
more advanced ransomware that uses a technique called cryptoviral extortion. This type
of ransomware encrypts the victim’s file and the hacker would demand a ransom for the file
to be decrypted.
Banking
While online banking may be convenient, there are still skeptics to this given the sensitive
data being transacted online: money.
With a series of high-profile breaches over the past few years, security is one of the leading
banking industry challenges, as well as a major concern for bank and credit union customers.
Financial institutions must invest in the latest technology-driven security measures to keep sensitive
customer safe, such as:

©All Rights Reserved


Issue No. 1 Page 156 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

1. Address Verification Service (AVS) – checks the billing address submitted by the card
user with the cardholder’s billing address on record at the issuing bank in order to identify
suspicious transactions and prevent fraudulent activity.
2. End-to-End Encryption (E2EE) – it is a method of secure communication that prevents
third-parties from accessing data while it’s transferred from one end system or device to
another. E2EE uses cryptographic keys, which are stored at each endpoint, to encrypt and
decrypt private messages.
Banks and credit unions can use E2EE to secure mobile transactions and other
online payments, so that funds are securely transferred from one account to another, or
from a customer to a retailer.
3. Authentication – it is a security process that relies on the unique biological characteristics
of an individual to verify that he is who he says he is. Biometric authentication systems
compare a biometric data capture to stored, confirmed authentic data in a database.
Common forms of biometric authentication include voice and facial recognition and iris and
fingerprint scans. Banks and credit unions can use biometric authentication in place of PINs,
as it’s more difficult to replicate and, therefore, more secure.
 Location-based authentication (sometimes referred to as geolocation identification)
“is a special procedure to prove an individual’s identity and authenticity on appearance
simply by detecting its presence at a distinct location.” Banks can use location-based
authentication in conjunction with mobile banking to prevent fraud by either sending out
a push notification to a customer’s mobile device authorizing a transaction, or by
triangulating the customer’s location to determine whether they’re in the same location
in which the transaction is taking place.
 Out-of-band authentication (OOBA) refers to “a process where authentication
requires two different signals from two different networks or channels… [By] using two
different channels, authentication systems can guard against fraudulent users that may
only have access to one of these channels.” Banks can use OOBA to generate a one-
time security code, which the customer receives via automated voice call, SMS text

©All Rights Reserved


Issue No. 1 Page 157 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

message, or email; the customer then enters that security code to access their account,
thereby verifying their identity.
 Risk-based authentication (RBA) — also known as adaptive authentication or
step-up authentication — “is a method of applying varying levels of stringency to
authentication processes based on the likelihood that access to a given system
could result in its being compromised.” RBA enables banks and credit unions to
tailor their security measures to the risk level of each customer transaction.
Education
With online learning being accepted into schools as part of the teaching and learning
methodology, one of the things that schools need to consider is monitoring and management.
eLearning, being the latest wave of education, is already having a fair show despite posing
challenges for both instructors and students. While instructors need to put in intensive work and time
to design the instruction, students need to equip themselves with technical proficiency to decode the
course material. There are 5 common problems faced by students in eLearning classes and which
they need to be solved through proper initiatives for the students’ future benefits:
1. Adaptability Struggle.
Switching from traditional classroom and face to face instructor training to
computer-based training in a virtual classroom makes the learning experience entirely
different for students. Their resistance to change doesn’t allow them to adapt to the online
learning environment, whereas it takes time for them to get accustomed to Course
Management Systems (CMS) and the methods of computer-based education. While passive
listening and notes taking are expected in a traditional classroom, online discussions or
creating a web page demand springing into action. Students with a “traditional” mindset find
it difficult to adapt; however, they need to accept the new learning circumstances with an
open mind and heart. Understanding the benefits of eLearning and even discussing them
with their peers may change this mindset and better prepare students for online classes.
2. Technical Issues.
Many students are not provided with the high bandwidth or the strong internet
connection that online courses require, and thus fail to catch up with their virtual classmates:

©All Rights Reserved


Issue No. 1 Page 158 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Their weak monitors make it hard to follow the Course Management System and their learning
experience becomes problematic. Moreover, most of them live off campus and find it difficult
to keep in tune with the technical requirements of the chosen course. Some of them don’t
even own computers and seek help in Learning Resource Centers for technical assistance.
The only solution to this problem is knowing exactly what kind of technological support they
will need for a certain course before enrolling in it, as well as properly equipping themselves
for the course’s successful completion.
3. Computer Literacy.
Although students are generally tech savvy, and thus able to manage computers well,
lack of computer literacy is a major issue among students today. Many of them cannot
operate basic programs such as Microsoft Word and PowerPoint and therefore are not able to
handle their files. Furthermore, many students find fixing basic computer problems
troublesome, as they have no knowledge in this area. However, technological proficiency is a
must for following online courses, as it enables students to manage their assignments and
courseware in an organized manner without struggling. Basic courses in computer literacy
enhance students’ knowledge in the field; having a fundamental knowledge of computer
hardware would help them participate in online classes without interruptions and hindrances.
4. Time Management.
Time management is a difficult task for eLearners, as online courses require a lot of
time and intensive work. Furthermore, whereas it is mostly adults who prefer web-based
learning programs for their place and time flexibility, they rarely have the time to take the
courses due to their various everyday commitments. A regular schedule planner would be a
significant help to these learners, as they could even set reminders for their courses and
assignments.
5. Self-Motivation.
Self-motivation is an eLearning essential requirement; however, many online learners
lack it, much to their surprise. After enrolling in distance learning courses, many learners fall
behind and nurture the idea of giving up, as difficulties in handling a technological medium
also seem insurmountable. Students need to find the motivation to follow the new educational

©All Rights Reserved


Issue No. 1 Page 159 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

trends and also properly equip themselves for future challenges in their education and
careers. Only a positive attitude will help them overcome the challenges in eLearning; though
this is hard to practice, students need to understand that it is necessary in order to reap the
eLearning’s benefits in the future.

Business
The following are the most important challenges regarding the application of information
technology in business and industry:
 Safety
One of the main challenges that IT has to face today is the safety or cybersecurity. The
amount of data, identities and personal information that we share and with which we interact
daily is so high that making it safe has become a challenge, given the very high value of said
assets for any organization.
 Accessibility
Data accessibility and availability is crucial, especially for those profiles with higher
responsibilities in an organization. Making data accessible for all the parties would be very
easy with interoperability. However, although the benefits that it can bring are well-known,
there are still many tasks that IT services have to solve to be able to be spread out among
more industries and companies.
 Strong networks
Secure strong internal networks that are resistant and scalable is an essential aspect
and a great challenge as well. Not only solutions to satisfy current necessities must be
planned, but they also must be focused on the future and the future technological
advancements, in such a way that there is no obsolescence in the organization.
 System integration
Making sure that the different services, written in different technologies or languages,
integrate correctly is an implementation IT challenge in many organizations. Although the
advantages of system and service integration are many more.

©All Rights Reserved


Issue No. 1 Page 160 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

 Cost reduction
Cost reduction is a fundamental aspect in the extrapolation of the continuous
technological advancements of society, companies, and industries. With this in mind, IT
engineers must continue analyzing and developing new technological solutions in record time
Moreover, some companies use adware to track information about their customers for
marketing purposes. An adware is a program designed to display advertisements on your computer,
redirect your search requests to advertising websites, and collect marketing-type data about yourself
– for example, the types of websites that you visit – so that customized advertisement can be
displayed.

Health
Patient records are always kept confidential. However, with the introduction of technology,
and with hospitals and clinics learning towards automation, patient records have shifted from paper
to digital. With this, concerns regarding data security and data confidentiality of patients have
increased.
The following are the challenges brought about by information technology in the health sector:
1. Increased storage
There is an explosion of storage and processing needs due to:
 Imaging, especially 2D and 3D images as images grow more precise for better care
 Artificial Intelligence used to streamline diagnosis and treatment
 Data from medical devices to speed diagnosis and treatment through AI
 Big data collection to improve patient care and population health
The first sub-challenge is the ability to ramp up quickly to meet the demand. The
abrupt increase in capital budget requirements are not achievable given healthcare
enterprises’ vast need for resources.
The second sub-challenge is to provide the right speed of access required for patient
care, but at a cost that does not break the budget. This means constantly moving data to
lower cost platforms in an automated fashion. This takes knowledgeable, experienced staff to
set up, along with the right tools.

©All Rights Reserved


Issue No. 1 Page 161 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

2. Increased Cyberattacks
The second major challenge is the increased targeting of healthcare, especially for
ransom.
The criminal does not steal the data–just locks it up and holds it for ransom, since
patient care cannot be delivered appropriately without it. This makes it both easy and lucrative
and the easiest way to do this is still spear phishing, just as in other industries.
At the same time, the exposure grows due to the increased amount of data from
medical devices becoming integral to patient care. It has long been known that medical
devices are vulnerable due to manufacturer negligence in providing adequate security
protections and the use of legacy equipment by healthcare providers. Good progress is
however, being made in both areas.
3. Non-Traditional Healthcare Delivery
The third major challenge is the continued growth of the non-traditional delivery of
healthcare especially the expansion of telehealth.
The first sub-challenge in this area is creating a high-speed network between facilities,
such as remote offices or even patient homes to provide excellent video and diagnostic data
transmission between patients and physicians or other healthcare providers. The second
sub-challenge is to do this securely, while keeping costs affordable.
4. Application Management
The fourth major challenge for healthcare IT leadership is managing dozens of both
clinical (e.g., Epic) and non-clinical of applications, such as the ERP system (e.g., Oracle®
Peoplesoft) and many more with limited staff. Experienced knowledgeable staff are attracted
to industries that pay higher salaries, so hiring and retaining staff becomes a critical barrier to
achieving enterprise IT goals. As the overall economy continues to grow and thrive, this
challenge increases.
5. Digital Learning, Cloud Opportunities, and Artificial Learning.
Finally, the fifth major challenge I have found for 2020 is the need to implement digital
learning, cloud deployment and artificial intelligence to reduce IT and enterprise operational
costs.

©All Rights Reserved


Issue No. 1 Page 162 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Besides the need for data storage and processing capabilities to accomplish the above,
there is the problem of the newness of these technologies. This means that there are very
few knowledgeable and experienced staff to accomplish these ends well and without
expensive missteps. Getting these resources is very expensive and may be cost prohibitive
for most healthcare providers especially those not part of large systems that have deep
pockets.

References

T1 – Caoili – Tayuan, R.R., Eleazar, M.V. (2019). Living in the information technology era.
Quezon City: C & E Publishing, Inc.
R24 – Wingard, L. (2021). Top 10 banking industry challenges — and how you can overcome
them. Retrieved from https://global.hitachi-solutions.com/blog/top-10-challenges-
banking-financial-organizations-can-overcome
R25 – Kumar, S. (2015, July 10). 5 common problems faced by students in elearning and
how to overcome them. Retrieved from https://elearningindustry.com/5-common-
problems-faced-by-students-in-elearning-overcome
R26 – Brady, J. (2020, January 13). Five healthcare information technology challenges in
2020. Retrieved from https://www.secure-24.com/blog/healthcare-information-
technology-challenges-in-2020/
R27 – Chakray. (2021). 5 challenges regarding the application of information technology in
business and industry. Retrieved from https://www.chakray.com/5-challenges-
regarding-the-application-of-information-technology-in-business-and-industry/

©All Rights Reserved


Issue No. 1 Page 163 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

It is now time to use those


Checkpoint skills you have learned so
far. Goodluck!

Activity 29
True or False
Directions: Write O if the statement is true; if it is false, write X. Write your answer on the
space provided before each number.
______1. A computer worm is a type of computer program that, when executed, replicates itself by
modifying other computer programs and inserting its own code.
______2. A computer virus is self-replicating malware that duplicates itself to spread to uninfected
computers.
______3. E2EE uses cryptographic keys, which are stored at each endpoint, to encrypt and decrypt
private messages.
______4. Out-of-band authentication is also known as adaptive authentication or step-up
authentication.
______5. An adware is a program designed to display advertisements on your computer, redirect
your search requests to advertising websites, and collect marketing-type data about
yourself.

©All Rights Reserved


Issue No. 1 Page 164 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Do this

Activity 30
Enumeration
Direction: Give what is asked and place your answers on the space provided.

1–3 Types of Authentication Systems used in the Banking Sector


4–7 At Least Four (4) Challenges faced by the Students in the eLearning Classes
8 – 10 At Least Three (3) IT Challenges faced by the Health Sector

1. ________________________________________________

2. ________________________________________________

3. ________________________________________________

4. ________________________________________________

5. ________________________________________________

6. ________________________________________________

7. ________________________________________________

8. ________________________________________________

9. ________________________________________________

10. ________________________________________________

©All Rights Reserved


Issue No. 1 Page 165 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Assessment

Activity 15
Essay
Directions: Briefly explain the following statement/question. You may submit your answers
personally or through email or messenger.
1. Describe the issues and challenges brought about by information technology in
businesses such as retails stores.
2. What are the challenges posed by information technology in the health sector?

For handwritten output:


a. Write your output in an A4 size bond paper
b. Write legibly

For computerized output (online/physical submission)


a. Use A4 size bond paper
b. Font style/size: Arial Narrow 12
c. Spacing: 1.5
d. Alignment: Justified
e. Margin: 1 inch in all sides

©All Rights Reserved


Issue No. 1 Page 166 of 166
ST. THERESE- MTC COLLEGES GE ELEC
Iloilo, Philippines
MT
S E

LIVING IN THE INFORMATION


E C

C
E

OL
. T H
TECHNOLOGY ERA

LEGES
Revision No. 1 Effectivity Date:
ST

STUDENT LEARNING MODULE


Reviewed by: Approved by:
01 September 2021
QMR President

Required Output

Activity 6
Narrative Report
Research further on the influence of IT in the Philippines on any of the following sectors:
 Banking
 Education
 Health
 Business
You may submit your answers personally or through email or messenger, follow the
guidelines of Assessment activity in writing and formatting your output.

Rubric for Grading Narrative Report


Criteria Score
Focus (35%)
Writing is strongly and consistently focused on addressing the essential
question. Writing conveys a compelling real experience that creatively addresses
the essential question throughout an engaging narrative.
Support/Elaboration (35%)
The degree to which the main point or event is elaborated and explained by
specific details, descriptions, and reactions.
Organization (30%)
The clarity of the logical flow of ideas (coherence and cohesion).
Conventions (35%)
Uses consistent agreement between parts of speech. No errors in
mechanics. Creative and effective use of spelling strategies.

©All Rights Reserved

You might also like