Tuesday, January 31, 2012

Module 10: Social Justice Issues


Question:
          Is social justice evident in the impeachment trial of Chief Justice Corona? Discuss.

Answer:
            Based on my observation as the impeachment trail of Chief Justice Corona is not evident and it has no promotion of the welfare of others that happens as the trail going on. Thus, we can’t have a benefit as it continues; as a result the government costs a lot of money. And this money can help to those who are less fortunate people, it maybe help also to open a lot of jobs for the benefit of the jobless people. Moreover, this trial was made because of the politics purposes, though Corona did wrong, but then there are those people cooked this issue because they want the position. And they want Corona to be impeached, because he was then appointed by the ex-president Gloria Macapagal Arroyo, whom a popular on corruption, as a history recalled her administration was the most corrupt of all times. And that’s the reason why Corona should be impeached.
            However, if this trial would end and it has already a result that Chief Justice Corona is guilty. I can say that there is a social justice that may be happened, thus he must pay for the damages that he has done, and he must return the money which he stole. By that many people will be happy.

Module 9: Private Issues


Question:
            Talking about privacy, how far would you go for the sake of social justice? Justify.

Answer:
            It is said that privacy is the right to be let alone to do what you want in secret. But then it is one of the biggest problems on promoting social justice to anybody. In general definition of social justice, it is hard to arrive at and even harder to implement. In essence, social justice is concerned with equal justice, not just in the courts, but in all aspects of society.
            However, for the sake of social justice I would do anything which is for me the right thing to do with regards to privacy. In which I can say that this could help to anybody, and can’t harm to anyone else. Just for an example on having a case, I’d rather to show private evidence than to hide it in order to reach fairness to anybody.

Tuesday, January 24, 2012

MODULE 8: Computer Abuses


Question:
        What computer abuse would you like to eradicate? How would you do it?

Answer:
      For me the computer abuses which I’d like to eradicate is hacking and spamming. However it is not easy to eliminate but then we can prevent if  we follow the following instructions from the website http://www.ehow.com/how_4967690_prevent-cyber-crime.html:
  • Turn on your spam blocker. Most Internet providers provide a spam blocking feature to prevent unwanted messages, such as fraudulent emails and phasing emails, from getting to your inbox.
  • Make sure you have adequate anti-virus software for your computer, such as McAfee, Norton Anti-Virus, Stopzilla or other similar programs. You also need to make sure you regularly update your anti-virus software and that you do a once-a-week scan to locate and eliminate any malware, spyware, viruses and other problems. If you don't want to purchase security software, then there are programs, such as AVG, that offer free versions. 
  • Use your computer's firewall protection feature, which is a digitally created barrier that prevents hackers from getting into your computer system. Always keep it turned on.  
  • Encrypt important data you don't want compromised. Utilize encryption software, which "garbles" your data to make it unintelligible to anyone who tries to hack into your computer system.
  • Be wary of providing personal information via a website you know nothing about, especially those that ask for your name, mailing address, bank account number or social security number.  
  • Make sure that you do online shopping on a secure website, like those with a url that starts with "https" and/or have a TRUSTe or VeriSign seal. If you don't see these anywhere on the site, you run the risk of submitting credit card information and other personal information to a site that may be a fraud. 
  • Avoid getting taken in by common scams, such as foreign lotteries, phony sweepstakes and similar methods used by cyber criminals to get your personal information and money. If it sounds too good to be true, it probably is. 
  • Monitor the online activities of your children. They should only have access to a computer located in a central area of your home and you should regularly check all browser and email activity. A wise thing to do is to use parental control software that limits the types of sites the user can gain access to.
But then if we badly wanted to eradicate this following computer abuses we must create law for that and must follow or else must face the given consequences. Moreover, we have an option not to use a computer, thus it the most effective way to eradicate the said computer abuses.

MODULE 7: Computer Hoax Categories

Question:
      There are still enormous sources of misinformation on the World Wide Web, so how can you determine what is good information and what is bad information?
Answer:
To determine what is good information and what is bad information about the enormous sources of misinformation on the World Wide Web are the following:
Good Information:
  • The information must be from reliable sources such as .edu, .gov and maybe from a forums thus flood of ideas are there.
  • The information given is from the known author, and has a good background.
  • In a given website it allows comments and suggestions so that readers can also give idea about the given information, thus it gives hint to the other readers that the information posted is reliable.
  • The information given is based on the original author or researcher and it must be acknowledged.
  • The write-ups of the information given are precise and must don’t have any errors such wrong spelling, and wrong grammar.
  • The website of a given information must virus free, thus we can conclude that it was not destructed by the virus.
Bad Information:
  • It gives hint to the reader that the information posted is bad in which the website is not well constructed.
  • It gives information but never acknowledge the real author and it didn’t cite where the information come from.    
  • It doesn’t allow readers suggestions, and comments.
  • Information from the given website is out of date.
  • It has a lot of errors such as wrong spelling and grammars.
  • The website of source of information have viruses, thus we can verify that the information given is not reliable.
However, it is said that “Good information can be hard to find…” so we as a reader and a researcher must be careful on taking information from the web. 

MODULE 5: Moral Problems

QUESTION:
Today, it is a fact that a lot of Filipino women are into online GOLD digging. You know what it means, right? Suppose one of them is your sister who happens to be your family's breadwinner. What would you do on this matter?

ANSWER:
Suppose my sister who happens to be my family's breadwinner and a Gold Digger. The things that I must do are the following, talk to her and tell her that what she did is not good, and telling her that doing such things is not the right option to overcome from the poverty, and there are lots of jobs which are more descent.
Even if we are less fortunate (not rich), we still have mind to think, and to analyze on what is good and what is bad, and we have also heart to feel on what other people may feel if he might know on what  we did. Moreover, God give us five senses, and these five senses could help us to touch, to taste, to hear, to smell, and to see. Thus, we can use it to find a good job and work decently.