CLICK HERE FOR BLOGGER TEMPLATES AND MYSPACE LAYOUTS

Sunday, March 29, 2009

"_" why I choose Academia de Davao College as my school? "_"

I choose Academia de Davao as my school it is because, I know that they can help me to improve my knowledge. aside from TESDA credited, also their instructor's are friendly.

" why I choose IT as my course? "

I was tasked to have a minute of course orientation in our school for the Freshmen who took up BS Information and BS Computer Science and majority of them are BS IT. I asked them why IT, I called a girl and she said, “Wala pong mapiling course eh.”

Computers and technology are very in demand nowadays, you can easily find opportunity not just in other country, but also here in Philippines and say, “My interest is here and to become a professional Programmer.”

Information Technology - Related Careers

System Administrator
Database Administrator
Project Manager

Information Technology - Also of Interest

Oracle Certifications
Microsoft Certifications
Cisco Certifications


Information Technology Course is also responsible to the following careers:

Website Developer
Website Designer
Multimedia
Game Developer
Software Developer

So what are the responsilibilities of being an IT graduate?
System administration, database administration and other
are examples of responsilibilities.
♥"_"♥

Saturday, March 28, 2009

"_" E - Commerce Law "_"

eCommerce Law (RA No. 8792)
Republic Act No. 8792


AN ACT PROVIDING FOR THE RECOGNITION AND USE OF ELECTRONIC COMMERCIAL AND NON-COMMERCIAL TRANSACTIONS AND DOCUMENTS, PENALTIES FOR UNLAWFUL USE THEREOF AND FOR OTHER PURPOSES
Be it enacted by the Senate and House of Representatives of the Republic of the Philippines in Congress assembled:


PART I
SHORT TITLE AND DECLARATION OF POLICY


Section 1. Short Title. - This Act shall be known as the
“Electronic Commerce Act of 2000″.


Sec. 2. Declaration of Policy. - The State recognizes the vital role
of information and communications technology (ICT) in nation-
building; the need to create an information-friendly environment which supports and ensures the availability, diversity and affordability of ICT products and services; the primary responsibility of the private sector in contributing investments and services in telecommunications and information technology; the need to develop, with appropriate training programs and institutional policy changes, human resources for the information technology age, a labor force skilled in the use of ICT and a population capable of operating and utilizing electronic appliances and computers; its obligation to facilitate the transfer and promotion of adaptation technology, to ensure network security, connectivity and neutrality of technology for the national benefit; and the need to marshal, organize and deploy national information infrastructures, comprising in both telecommunications network and strategic information services, including their interconnection to the global information networks, with the necessary and appropriate legal, financial, diplomatic and technical framework, systems and facilities
.


PART II
ELECTRONIC COMMERCE IN GENERAL


Sec. 3. Objective. - This Act aims to facilitate domestic and international dealings, transactions, arrangements, agreements, contracts and exchanges and storage of information through the utilization of electronic, optical and similar medium, mode, instrumentality and technology to recognize the authenticity and reliability of electronic documents related to such activities and
to promote the universal use of electronic transaction in the government and general public.


Sec. 4. Sphere of Application. - This Act shall apply to any kind
of data message and electronic document used in the context of commercial and non-commercial activities to include domestic and international dealings, transactions, arrangements, agreements, contracts and exchanges and storage of information.


Sec. 5. Definition of Terms. - For the purposes of this Act, the following terms are defined, as follows:

a. “Addressee” refers to a person who is intended by the originator to receive the electronic data message or electronic document. The term does not include a person acting as an intermediary with respect to that electronic data message or electronic document.

b. “Computer” refers to any device or apparatus which, by electronic,electro-mechanical or magnetic impulse, or by other means, is capable of receiving, recording, transmitting, storing, processing, retrieving, or producing information, data, figures, symbols or other modes of written expression according to mathematical and logical rules or of performing any one or more of those functions.

c. “Electronic Data Message” refers to information generated, sent, received or stored by electronic, optical or similar means.

d. “Information and Communication System” refers to a system intended for and capable of generating, sending, receiving, storing or otherwise processing electronic data messages or electronic documents and includes the computer system or other similar device by or in which data is recorded or stored and any procedures related to the recording or storage of electronic data message or electronic document.

e. “Electronic Signature” refers to any distinctive mark, characteristic and/or sound in electronic form, representing the identity of a person and attached to or logically associated with the electronic data message or electronic document or any methodology or procedures employed or adopted by a person and executed or adopted by such person with the intention of authenticating or approving an electronic data message or electronic document.

f. “Electronic Document” refers to information or the representation of information, data, figures, symbols or other modes of written expression, described or however represented, by which a right is established or an obligation extinguished, or by which a fact may be proved and affirmed, which is received, recorded, transmitted, stored, processed, retrieved or produced electronically.

g. “Electronic Key” refers to a secret code which secures and defendssensitive information that crosses over public channels into a form decipherable only with a matching electronic key.

h. “Intermediary” refers to a person who in behalf of another person and with respect to a particular electronic document sends, receives and/or stores or provides other services in respect of that electronic document.

i. “Originator” refers to a person by whom, or on whose behalf, the electronic document purports to have been created, generated and/or sent . The term does not include
a person acting as an intermediary with respect to that electronic document.


j. “Service Provider” refers to a provider of -

(i) On-line services or network access, or the operator of facilities therefor, including entities offering the transmission, routing, or providing of connections for online communications, digital or otherwise, between or among points specified by a user, of electronic documents of the user’s choosing; or

(ii) The necessary technical means by which electronic documents of an originator may be stored and made accessible to a designated or undesignated third party;

Such service providers shall have no authority to modify or alter the content of the electronic data message or electronic document received or to make any entry therein on behalf of the originator, addressee or any third party unless specifically authorized to do so, and who shall retain the electronic document

in accordance with the specific request or as necessary for the purpose of performing the services it was engaged to perform.

" About Ethics of Information Technology "

Every advancement in information technology is accompanied by at least one ethical quandary. From Facebook to email updates, computer users are unaware of the fine balance between ethics and profit struck by providers. Software developers, businesses and individuals must think about the rights and wrongs of using information technology every day. The fundamental issues underlying the world of information technology are the end user's expectation of privacy and the provider's ethical duty to use applications or email responsibly.
Data Mining
Data mining covers a wide range of activities that turn numbers, words and other data into distinguishable patterns. In the hands of a responsible agency or business, data mining can determine a probable next step for a terrorist cell or determine buying patterns within demographic groups. This practice has been assailed in the post 9/11 world as part of a widespread pattern of invasions of privacy carried out by America's intelligence experts. The practices of the Total Information Awareness Progress in particular were thought to pry into the day-to-day lives of innocent people by IT ethics experts and civil libertarians.
Social Networking
The social networking craze may allow people around the world to speak with each other but it has also brought up several IT ethics issues. Facebook initiated a program called Beacon in 2007 to turn each user's personal information into an advertisement, allowing a greater amount of connectivity between the website's members. Facebook's developers failed to create an opt-in system that gave willing users the chance to participate of their own accord. Beacon came under fire for pulling information from Facebook profiles and breaking down privacy boundaries common in the real world. Another ethical issue for social networking websites is the amount of security they should use when registering members. Several abductions in recent years have been connected to MySpace, bringing up concerns that social networking sites aren't doing enough to protect young users.
E-Mail Spam
Spam is defined broadly as emails with commercial or profane messages that are sent blindly to hundreds and thousands of users. Aside from the content of spam email, the major ethical issues for service providers and individuals alike involve identifying spammers. Email programs through AOL and Yahoo! may identify some spammers who are brazen enough to send out millions of emails but their spam programs rely largely on user feedback. While some users will identify legitimate spammers carrying viruses and pornographic messages, there is the potential for users to identify legitimate companies as spammers.
Intellectual Property and Information Technology
The merger of intellectual property rights and
information technology has been rough going since the 1990s. The advent of Napster, Limewire and other peer-to-peer downloading networks brought the issue of infringing on artistic property to the fore. NBC's exclusive rights to the 2008 Olympic Games were challenged by bloggers and online pirates who placed footage on YouTube. The ethical issue that arises when dealing with intellectual property in the virtual world is the length to which content producers should pursue permission to reprint images and articles. While lifting entire articles for a term paper is clearly unacceptable, there are questions from ethicists about the practicality of seeking out unknown artists and writers for something as minor as a blog.
Filtering Online Content
Comcast has come under fire in the past two years for blocking downloads from Bit Torrent. The
Internet service provider (ISP) has claimed that "throttling down" downloads via Bit Torrent is a reasonable element of maintaining high-speed service. Religious groups, adult websites and others have banned together in an unusual alliance to fight Comcast's effort to filter content. The major ethical debate raged between ISP, the Federal Communications Commission (FCC) and end users is whether Internet service should be content-neutral.

Sunday, March 15, 2009

♥♥ PUWEDE MAULAW ♥♥

Ang abilidad sa estudyante karon.
Labi ra gyud sa unang panahon.
Moadto sa eskuwelahan charr kayo
Iyahay rag pagwapa ug paguwapo
Daghan libro pirteng baga-a,
Diay to ni isa way nabasa.
Exam si Inday busy sa textmate niya
Si Dodong pud concentrate sab sa DOTA.
Unsaon na lang inig abot sa exam?
Don't worry daw kay bright man.
Exam ni sir ug ni ma'am sisiw lang,
Naa pa gyuy kodigo nga giandam.
Apan pag-abot sa exam nakakaon ug tagam,
Utok daw gipuga ug taman-taman.
Apan ni diyutay way nahimo
Maong ulo nagsige na lag panlingo
may na lang kay si mata abtik ming resce,
Tan-aw sa kilid, atubangan ug luyo.
Pasiplat-siplat sa answer sa classmate
Anwer na walay klaro kay utrong biningwit
Ining kopya sa sinundog nga answer,
Smile-smile dayon aron di mahalata ni sir.
Mali nga answer iapud-apud pa gyud
Text brigade tirade bisag inutang ra na load.
Pag-check sa blue book mingboy ang tanan,
Kay sa exam sila bagsak man.
Pagsanginlan dayon si sir ug ma'am
Kay lisud kuno ang gihatag na exam.
Kanus-a pa man kaba mausab?
Kining makauulaw nga mga abilidad
Unta moabot na ang adlaw
Nga kita makapangutana sa atong kaugalingon
"_" puwede maulaw "_"

Sunday, March 8, 2009

_emo_

Emo Myspace Comments
MyNiceSpace.com

"-" a to z '-"

Friends Myspace Comments
MyNiceSpace.com

Monday, March 2, 2009

"-" EMO "-"

Emo Myspace Comments
MyNiceSpace.com

-"i nEvEr told you baby "-

Love Myspace Comments
MyNiceSpace.com

"-" haLf crAzy "-"



Oka Kingston - Half Lazy Half Crazy
More at MP3-Codes.com