Intro to Computing
Data Interference
Unauthorized tampering with, destroying, deleting, or deteriorating computer data, electronic documents, or electronic data messages, as well as the introduction or transmission of viruses.
Misuse of devices
Unauthorized use, possession, production, sale, procurement, importation, distribution, or otherwise making available of gadgets, computer programmes, or other materials developed or adapted for committing any of the acts listed in Republic Act 10175. Unauthorized use of a computer password, access code, or similar data that allows the entire or a portion of a computer system to be accessed with the intent of using it
Child Pornography
Unlawful or banned activities conducted through a computer system, as defined and punished by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009.
First Gen Computers (1946-1957)
Used vacuum tubes, too bulky, first device to hold memory
Corporate Liability
When any of the punishable acts herein defined are knowingly committed on behalf of or for the benefit of a juridical person
Octal Number System
a base-8 system, consisting of the symbols 0 through 7.
Libel
committed using a computer system or any other similar means that may be created in the future. Penal Code Revision According to Article 355 Libel is defined as defamation of character by writings or other means. Libel committed by writing, printing, lithography, engraving, radio, phonograph, painting, theatrical exhibition, cinematographic exhibition, or any other similar
Cybercrime
computer crime is the use of a computer as an instrument to further illegal ends such as committing fraud trafficking child pornography, intellectual property violations, stealing identities or violation of privacy.
ASCII CODE
each key on the keyboard is given a binary value, 8 bits sytem
Fifth Gen Computers (Now and Future)
employ AI (artificial Intelligence) More advanced
Binary to Octal
groups of 3
Binary Coded Decimal (BCD)
number system that uses 4 bits to represent each denary digit
Integrated Circuit (IC)
semiconductor material, that contains thousands of transistors miniaturized
Fourth Gen Computers (1971-present)
took advantage of the invention of the microprocessor, more commonly known as a CPU. Microprocessors, with integrated circuits, helped make it possible for computers to fit easily on a desk and for the introduction of the laptop.
Third Gen Computers (1964-1970)
using integrated circuits instead of transistors.
Cybersquatting
Acquisition of a domain name in bad faith on the internet to profit, deceive, harm reputation, and prevent others from registering it. This includes trademarks that were already registered at the time of registration, names of people other than the registrant, and trademarks that were purchased with intellectual property interests in them. Those who get domain names of prominent brands and individuals who in turn are used to damage their reputation can be sued under this provision
The first computer programmer
Ada Byron or Ada Lovelace
Who is known as father of modern computer?
Alan Turing
Bug
An error in a program.
Attempt in the commission of cybercrime
Any person who willfully attempts to commit any of the offences enumerated in this Act shall be held liable.
Aiding or Abetting in the commission of cybercrime
Anyone who knowingly assists or abets the conduct of any of the offences listed in this Act will be held accountable.
Based Two digits
Binary
French mathematician and philosopher who invented a calculating device that would come to be called adding machine (Pascaline)
Blaise pascal (1623-1662)
Invented the analytical engine on 1833, Father of Computer
Charles babbage (1791-1871)
Advantages of Cybercrime Prevention Act of 2012
Cybersex, Cyberbullying, Child pornography are now offences and such offenders can be punished. The children's rights are protected by this Act
Based ten digits
Decimal
First electronic computer
ENIAC 1946
Debugging
Finding and fixing problems in code
Cybersex
For favour or consideration, willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious presentation of sexual organs or sexual activity via a computer system.
Inventor of tabulating machine
Herman Hollerith
Inventor of Mark I
Howard Aiken (1900-1973)
Illegal Interception
Interception of any non-public communication of computer data to, from, or within a computer system by an unauthorized person.
IBM
International Business Machines
French weaver who used 10,000 punch cards to programmed a loom to weave a portrait of himself in black and white silk
Joseph jacquard
Binary (1,0)
Machine Language
Tabulating Machine
Made for the US Census using electricity and punch cards to store info.
First bug in computer
Moth
Who signed the Republic Act no. 10175 or Cyber Prevention Act of 2012
Mr. Benigno Aquino
When was Republic Act no. 10175 signed?
September 12th of 2012
Disadvantages of Cybercrime Prevention Act of 2012
The implementation and execution of this Act yearly cost a huge cost to the government.
Abacus
This device allows users to make computations using system of sliding beads arranged on a rack, Considered the first computer
Second Gen Computers (1958-1963)
Transistors replaced vacuum tubes, size reduced
Computer-related Fraud
Unauthorized access to, alteration of, or deletion of computer data or programmes, or interference with the operation of a computer system, with the purpose to cause damage.
Computer-related Identity Theft
Unauthorized acquisition, use, abuse, transfer, possession, change, or deletion of an individual's identifying information, whether natural or legal.
Computer related Forgery
Unauthorized input, alteration, or deletion of computer data that results in inauthentic data with the intent that it be considered or acted on for legal purposes as if it were authentic, regardless of whether the data is directly readable and intelligible; or the act of knowingly using computer data that is the product of computer-related forgery as defined here to perpetuate .
System Interference
Unauthorized interference with the operation of a computer or computer network, including the introduction or transmission of viruses, by inputting, transmitting, damaging, deleting, deteriorating, altering, or suppressing computer data or programmes, electronic data messages, or by deleting, deteriorating, altering, or suppressing them.
Illegal Access
Access to a computer or any application without permission.
binary number of 1
0001
8 bits is equal to
1 byte
binary number of 15
1111
Census
A complete enumeration of a population.
Hexadecimal Number System
A number system consisting of 16 distinct symbols — 0-9 and A-F — which can occur in each place value.