Free Essay

Keyboard

In:

Submitted By nacy
Words 797
Pages 4
Question:
1. What was the case all about?
Filipino hacker JJ Maria Giner, a graduate of B.S. in Marine Fisheries pleaded guilty on Wednesday to hacking the government portal “gov.ph” and other government websites, making this the first Philippine hacking case to have ended in a conviction, the Department of Justice (DoJ) said. According to Criminal Case No. 419672-CR filed at Branch 14 of the Metropolitan Trial Court of Manila under Judge Rosalyn Mislos-Loja, a copy which was shown to INQ7.net, Giner was sentenced to one to two years of imprisonment and will pay a fine of 100,000 pesos. However, Giner immediately applied for probation, which was eventually granted by the court during Wednesday’s arraignment, the DoJ said.

2. Did ant prosecution results?
Yes, because JJ Maria Giner pleaded guilty on Wednesday to hacking the government portal "gov.ph" and other government websites, making this the first Philippine hacking case to have ended in a conviction, the Department of Justice (DoJ) said.
The granting of the probation will allow Giner to skip jail time but he will still be required to report to a probationary officer on a regular basis. Giner's lawyer Rodolfo Viajar, Jr. agreed with the court's ruling, according to the copy shown to INQ7.net. Giner's arraignment started at 8:30 am Wednesday at branch 14 of the Metropolitan Trial Court in Manila. The conviction of Giner is now considered a landmark case, as he is the first local hacker to be convicted under section 33a of the E-Commerce Law or Republic Act 8792, according to DoJ Secretary Raul Gonzalez and Chief State Prosecutor Jovencito Zuño who have provided support to the prosecution of the case. In a separate interview, Geronimo Sy, the state prosecutor handling the case, revealed that Giner's lawyer had agreed to a plea bargain before Wednesday's arraignment, wherein the local hacker was advised to plead guilty in exchange for a lighter sentence.

3. if so, what were their outcomes?
According to Criminal Case No. 419672-CR filed at Branch 14 of the Metropolitan Trial Court of Manila under Judge Rosalyn Mislos-Loja, a copy which was shown to INQ7.net, Giner was sentenced to one to two years of imprisonment and will pay a fine of 100,000 pesos. "Giner's lawyer saw the merits of the case and saw that a crime was indeed committed in terms of causing the site to crash and denying access to a website, which is called denial of service. So this morning at the Metropolitan Trial Court in Manila, Giner was convicted and sentenced to one to two years of imprisonment and to pay a fine of 100,000 pesos. But he also immediately applied for probation, which the State did not interpose [an objection]," Sy said, a few hours after Wednesday's arraignment. Sy stressed that the court recognized that the remorseful Giner was "a promising man" who even wanted to go to law school in the future. Thus, he was granted probation. A probation officer will make sure that Giner will not repeat his activities, and violate the conditions of his probation, the government prosecutor said. Sy said that the court's decision to grant Giner probation is meant to promote "reformative aspect of the justice system of the Philippines" and spare Giner the experience of being imprisoned with hardened criminals. "He won't be sent to jail," Sy said. In a separate interview, Police Superintendent Gilbert Sosa, head of the Anti-Transnational Crime Division of the Criminal Investigation and Detection Group of the Philippine National Police (PNP-CIDG), was ecstatic about the news. Sosa's division was involved in the gathering of electronic evidence and the tracking down of the Filipino hacker with help from local Internet service provider Bitstop Inc., which was the host the gov.ph portal when it was attacked by Giner. "This will set a precedent. Finally the E-commerce law has been tested. So this news will now serve as a lesson to local hackers," he said in telephone interview. "Regardless of the [light sentence], I'm happy that he was convicted," Sosa added.

5. What ethical issues are raised by this case?
I believe that this case have different ethical problems. We all know that hacking the website of the government is against the law. It means the he break the law. He promised the he will not do it again. It stated that the Philippines are seriously to uphold the law. In this case he was the first hacker who has been sentenced by the court. It means that the campaign on the computer crimes here in the Philippines have greatly effect for the hackers to not do the crime because the Philippines is particularly strengthening the laws for computer crimes.

Similar Documents

Free Essay

Keyboards

...Describe the different types of input and output devices. * Input devices include, keyboards and/or mouses. Keyboards contain 101-104 keys. You have to press the correct combination of keys to input data. Mouses are used with your personal computer. It rolls on a small ball or red scanner. When you roll the mouse across a flat surface to censor the mouse to move. * Output devices include, plotters and/or speakers. Plotters is a device similar to a printer, but usually allows you to print larger images that regular printers can’t. This is commonly used by designers and research sectors. Speakers can be sold separately from computers. Some monitors may have speakers built directly into the unit. Speakers enhance the value of educational and presentation products. 2. Discuss the difference between different types of input and output devices. * Input devices are any hardware that inputs data into your computer like keyboards, or webcams. Output devices are any hardware that displays output information like printers, or speakers. 3. Discuss the factors that affect the quality of various input and output devices. * Factors that affect the quality of input devices and output devices include the speed of the device. If you put a slow device into a more faster system, it will decrease the overall system speed. Detailed Description: Keyboards I. Introduction to Keyboards * They are computer hardware input devices. * Used for controlling characters...

Words: 389 - Pages: 2

Free Essay

Mac Keyboard Shortcuts

...By pressing a combination of keys, you can do things that normally need a mouse, trackpad, or other input device. To use a keyboard shortcut, hold down one or more modifier keys while pressing the last key of the shortcut. For example, to use the shortcut Command-C (copy), hold down Command, press C, then release both keys. Mac menus and keyboards often use symbols for certain keys, including the modifier keys: Command ⌘ Shift ⇧ Option ⌥ Control ⌃ Caps Lock ⇪ Fn If you're using a keyboard made for Windows PCs, use the Alt key instead of Option, and the Windows logo key instead of Command. Some Mac keyboards and shortcuts use special keys in the top row, which include icons for volume, display brightness, and other functions. Press the icon key to perform that function, or combine it with the Fn key to use it as an F1, F2, F3, or other standard function key. To learn more shortcuts, check the menus of the app you're using. Every app can have its own shortcuts, and shortcuts that work in one app may not work in another. Cut, copy, paste, and other common shortcuts Shortcut Description Command-X Cut: Remove the selected item and copy it to the Clipboard. Command-C Copy the selected item to the Clipboard. This also works for files in the Finder. Command-V Paste the contents of the Clipboard into the current document or app. This also works for files in the Finder. Command-Z Undo the previous command. You can then press Command-Shift-Z to...

Words: 2262 - Pages: 10

Premium Essay

Keyboard

...CRANEFIELD COLLEGE OF PROJECT AND PROGRAMME MANAGEMENT M2 PROGRAM MANAGING ORGANISATIONAL PERFORMANCE AND INNOVATIVE IMPROVEMENT MODULE WESTRAND GROUP ASSIGNMENT The Trophy Project “Case Study” “We hereby declare that this assignment is entirely our own work, and that it has not previously been submitted to any other Higher Education Institution. We also declare that all published and unpublished sources have been fully acknowledged and properly referenced. This includes figures, tables and exhibits. Where modified by us, this has also been indicated.” Compiled by: Name | Signature | ID Number | Nomsa Thobane | | | Lucille Olivier | | | Misokuhle Thusi | | | Vuyani Mawetu Matoti | | | Brenda Neshishivhe | | | ------------------------------------------------- ------------------------------------------------- Table of Contents 1. Executive Summary 3 2. Problem Identification 4 2.1 Structural Strategic Variables 4 2.1.1 Organisational structure 4 2.1.2 Other Structural Strategic Variables 5 2.2 Behavioural Strategy Variable 7 2.2.1 Management 7 2.2.2 Management Leadership 9 2.2.3 Functional Management Leadership 11 2.2.4 Project Management 12 2.2.5 Project Management Leadership 15 2.3 Operational Strategic Variables 16 3. Recommended Approach 16 3.1 Structural Strategic 16 3.1.1 Matrix Organisational Structure 16 3.2 Behavioural Strategic 18 3.2.1 Balance scorecard 18 3...

Words: 6304 - Pages: 26

Free Essay

Keyboarding Arts Learning Theory

...to be learned. TPR has been used to teach students learning second languages. Pre-Keys uses TPR to guide students as they explore letter patterns on the QWERTY computer keyboard. Dr. Morgan, the developer of Pre-Keys, invites children to sing and dance and play a form of the popular Twister game as they use their hands and feet to select letters on the oversized vinyl QWERTY keyboard. Observers then try to guess the word (taken from the weekly word list for each grade level). Another variation is displaying a list of words (such as a Spelling list) using PowerPoint with the participants (students) poking or slapping or stepping on the letters. Beginning students (learning English as a Second Language) start with simple letter recognition, saying the names as they hop on letters in rows, in columns, and in alphabetical order. Pre-Keys was so named to describe a series of activities that early childhood teachers might use to teach children as early as preschool age, best taught in small groups. The name soon evolved to include anyone who had not been formally trained to use all of their fingers to “type” or “key” their own name, teaching good posture before students develop bad habits (hunting and pecking). Basically, the author encourages students to explore and discover the patterns on the computer keyboard, using mnemonics to develop visual memory before...

Words: 576 - Pages: 3

Premium Essay

How Can Electrolux Use Teamwork and Groups to Succeed?

...Third Assignment is 3 point and you got Name ID Section IIT201 Computer and Information Technology Lab Assignment 3 1. In Microsoft Excel, do the following: a. Save the Word file as Excel homework on your disk b. Insert a worksheet, by clicking at [pic] c. Rename sheet4 to be January, sheet1 to be February, sheet2 to be March, and sheet3 to be April (Right click at the sheet tab -> Rename) [pic] d. At February worksheet, type the following information (to switch from January worksheet to February worksheet, use your mouse and click at the February worksheet tap at the bottom of your screen) [pic] e. Calculate the missing values for each column using the following functions: (Always start typing your functions or formula with an Equal sign) Instruction for each cell |In each cell |Functions/Formula | |Total (for each row, |Use the Mouse to click at the empty cell below the “Total” | |such as food, shopping,|Type = | |and etc.) |Use the Mouse to click the first number in the cell in each row. For Food total, Excel will automatically present| | |you = B2 ...

Words: 740 - Pages: 3

Free Essay

Hcp 220 Week 2 Assignment Ratios and Percents

...Showall your calculations in a Microsoft® Word document 1. Test Your Knowledge, p. 24: Problems 2, 4, 6, 8, 10, 12, 14, 16, 18 2. Test Your Knowledge, p.25: Problems 21, 22, 23, 24, 25, 27, 28, 29, 38, & 40 3. You are asked to prepare a 5% solution of dextrose in a container of 500 mL. You are given the following equation to help you solve the answer. What is the answer in grams? 5 g/100 mL = X g/500 mL 4. Accessthe Pharmacy-Terminology Crossword Puzzle, located on the student website. Completethe puzzle using the clues provided. Senda screenshot of the completed puzzle to your instructor. To create a screenshot: • Press Alt + Print Screenon your computer keyboard to create a screenshot. • Open a blank Microsoft® Word document. • Press Ctrl + Von your computer keyboard to paste the screenshot into the blank Word document. Postyour answers and crossword puzzle document under the Assignment Link along with a signed copy of the Certificate of Originality as an attachment. HCP 220 Week 2 Assignment Ratios and Percents https://hwguiders.com/downloads/hcp-220-week-2-assignment-ratios-percents/ HCP 220 Week 2 Assignment Ratios and Percents Resource: Ch. 3 of Pharmaceutical Calculations for Pharmacy Technicians: A Worktext Complete the following exercises: Showall your calculations in a Microsoft® Word document 1. Test Your Knowledge, p. 24: Problems 2, 4, 6, 8, 10, 12, 14, 16, 18 2. Test Your Knowledge, p.25: Problems 21, 22, 23...

Words: 5909 - Pages: 24

Premium Essay

Netw 240

...instructions (Sample Solutions). 3. After successfully completing the lab(s), capture a screenshot of your Transcript that shows both the labs completed and your name. Paste this into the bottom of your lab report. Your transcript can be found by going to the Home/Account Information/Transcript page. An example transcript is shown below. 4. Submit the completed Lab Report to the appropriate weekly Dropbox. Taking Screenshots The instructions below provide basic guidance on taking screenshots of your labs 1. Complete the lab step that you would like to capture in a screenshot. 2. Click on the server’s desktop that contains the window you want to capture. 3. Press the Print Screen key on your keyboard to copy it to your clipboard. On some keyboards, it is written as Print Scrn or PrtSc. 4. Click on your Lab Report (this document). 5. Scroll to the point in the Lab Report where you what the screenshot to appear. 6. Right click on your mouse and click paste, or press Ctrl + V 7. Once your screenshot appears in your Lab Report, click on your lab and continue to the next step. Important Note:  If you are using Windows 7 (any version), you can use the Snipping Tool to very easily create screenshots for your lab reports.  If you’ve never used it, perform a search on (how to use Snipping Tool) for some quick tips and videos on its use. Create your lab report using this template starting on page 2. It is not necessary to include this page in your...

Words: 392 - Pages: 2

Free Essay

Com 150 Week 8 Exercise Formatting Academic Papers Crossword Puzzle

...or http://www.dianahacker.com/resdoc/p04_c09_s2.html at the Axia College Writing Resources Web site. · Access the Formatting Academic Papers Crossword Puzzle at http://corptrain.phoenix.edu/AXIA/com150/multimedia/apa_crossword.html · Complete the puzzle using the clues provided. · Send a screenshot of the completed puzzle to your instructor. o Taking a screenshot on a computer using Windows · Press Alt + Print Screen on your computer keyboard to create a screenshot. o Some laptops may require Alt + Fn + Print Screen, as space is limited and multiple functions may be assigned to each key (key location varies based upon the manufacturer and model). · Open a blank Microsoft® Word document. · Press Ctrl + V on your computer keyboard to paste the screenshot into the Word document. · Save the Word document. o Taking a screenshot on a Macintosh-based computer · Press Command + Control + Shift + 3 on your computer keyboard to create a screenshot. · Open a blank Microsoft® Word document. · Press Command + V on your computer keyboard to paste the screenshot into the Word document. · Save the Word document. · Post the Word document to your Individual forum as an attachment. For more Assignments visit:...

Words: 267 - Pages: 2

Free Essay

World Is Smaller from Technology

...created by many people to help these disabilities people thru their everyday struggle. I chose four devices that show how they help these individuals. The first software I have chosen is the Co:Writer 4000. This software is used in sync with software like word processor or story-writing program. It is a type-and-speak writing assistant, created to aid users to write complete and correct sentences with little keystrokes. This software was produced by Don, Johnston, Inc. Reference: http://www.indiana.edu/~iuadapts/technology/software/cowriter/index.html Next is hardware called the Maltron Mouth / Head Stick Keyboard. This keyboard is designed for people who cannot use their hands. They simply push the keyboard that is in front of their face with an object, such as a pencil, to hit the keys. This keyboard is produced by Maltron. Reference : http://www.maltron.com/keyboard-info/maltron-mouth--head-stick-keyboard.html The Braille Edge 40 is a hardware I chose next. It is made for the blind mainly and helps them to be able to read, take notes, have scheduled reminders, calculate, etc. This hardware is produced and sold by HIMS. Reference: http://www.hims-inc.com/products/braille-edge-40/ Finally, The Zygo Head Pointer is a hardware used to aid people that cannot more their body. The Pointer is worn around the head and can come in a rear or standard strap. A person’s chin is the main area the pointer follows to point. Reference:...

Words: 293 - Pages: 2

Free Essay

Customer Loyalty

...php and click “Create New Account” STEP 2 Create a new account a) b) c) d) When asked to enter Company, enter: Pinnacle When asked to enter contact number, enter: 8624 1744 When asked to select Type, enter: Agency Staff Click: Create my New Account STEP 3 You will receive an email. Click on the link to activate your account Click on Agency Induction and complete both the:   Occupational Health & Safety – Agency 2011 and; Food Handler and Food Safety – Agency 2011 Save and Exit, Exit Activity, Click on Home, Agency Induction, Complete 2 induction Save and Exit, Click Home, Click Training History nd STEP 4 Press the Print Screen button on your keyboard: Open a new email,: a) c) To: melb@pinnaclepeople.com.au b) Subject: MCEC Induction Message: Press “Ctrl” and “V” on your keyboard at the same time and it will paste the screen shot d) Send STEP 5 - Brookfield Multiplex MCEC Serviced Area Site Induction Brookfield Multiplex has prepared an on-line MCEC Serviced Area Site Induction. This induction provides an overview of the MCEC Serviced Area along with some of the measures in place to ensure you understand your role in providing a safe and secure environment. Click the following link to complete the online induction - www.elearn.com.au/brookfieldmultiplex_mcec Log in details are: username: mcec password: mcec Click on Training Modules – MCEC Serviced Area Site Induction. Once you have completed the induction you...

Words: 525 - Pages: 3

Free Essay

Student

...Keylogger A keylogger, also known as keystroke logging or keylogging, is a method of tracking the strokes on a keyboard without the knowledge of the user. This information is then collected and used to access private accounts or collect personal information. Types of keyloggers   Keyloggers can be one of three types:   Hardware Keyloggers: small inline devices placed between the keyboard and the computer. Because of their size they can often go undetected for a long time, but they do require physical access to the machine. These hardware devices have the power to capture hundreds of keystrokes including banking and email username and passwords.   Software using a hooking mechanism: a type of logging that uses the Windows function SetWindowsHookEx() that monitors all keystrokes and can even capture autocomplete passwords. The spyware will typically come packaged as an executable file that initiates the hook function, plus a DLL file to handle the logging functions.   Kernel/driver keyloggers: a this type of keylogger that is at the kernel level and receives data directly from the input device (typically, a keyboard). It replaces the core software for interpreting keystrokes. It can be programmed to be undetectable by taking advantage of the fact that it is executed on boot, before any user-level applications start. However, since it runs at the kernel level, it cannot record autocomplete passwords, as this information is passed in the application layer. How keyloggers...

Words: 623 - Pages: 3

Premium Essay

System Review

...ALIENWARE® M17x MOBILE MANUAL Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. This item incorporates copy protection technology that is protected by U.S. patents and other intellectual property rights of Rovi Corporation. Reverse engineering and disassembly are prohibited. __________________ The contents herein are subject to change without notice. © 2010 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without the prior written permission of Dell Inc. is strictly prohibited. Trademarks used in this manual: Alienware®, AlienFX®, and the AlienHead logo are trademarks or registered trademarks of Alienware Corporation; Dell™ is a trademark of Dell Inc.; Microsoft®, Windows®, and the Windows start button logo are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries; Intel® and SpeedStep® are registered trademarks and Core™ is a trademark of Intel Corporation in the U.S. and other countries; Blu‑ray Disc™ is a trademark of the Blu‑ray Disc Association; Bluetooth® is a registered trademark owned by Bluetooth SIG, Inc. Other trademarks and trade names may be used in this manual to refer to either the...

Words: 12563 - Pages: 51

Premium Essay

Class

...| [ |Course Syllabus | | |College of Humanities | | |Foundations for General Education and | | |Professional Success | | | | | . All rights reserved. Course Description This general education course is designed to introduce the intentional learner to communication, collaboration, information utilization, critical thinking, problem solving, and professional competence and values. The course uses an interdisciplinary approach for the learner to develop personal academic strategies in order to reach desired goals and achieve academic success. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: University...

Words: 2881 - Pages: 12

Premium Essay

Networking310

...instructions (Sample Solutions). 3. After successfully completing the lab(s), capture a screenshot of your Transcript that shows both the labs completed and your name. Paste this into the bottom of your lab report. Your transcript can be found by going to the Home/Account Information/Transcript page. An example transcript is shown below. 4. Submit the completed Lab Report to the appropriate weekly Dropbox. Taking Screenshots The instructions below provide basic guidance on taking screenshots of your labs 1. Complete the lab step that you would like to capture in a screenshot. 2. Click on the server’s desktop that contains the window you want to capture. 3. Press the Print Screen key on your keyboard to copy it to your clipboard. On some keyboards, it is written as Print Scrn or PrtSc. 4. Click on your Lab Report (this document). 5. Scroll to the point in the Lab Report where you what the screenshot to appear. 6. Right click on your mouse and click paste, or press Ctrl + V 7. Once your screenshot appears in your Lab Report, click on your lab and continue to the next step. Important Note:  If you are using Windows 7 (any version), you can use the Snipping Tool to very easily create screenshots for your lab reports.  If you’ve never used it, perform a search on (how to use Snipping Tool) for some quick tips and videos on its use. Create your lab report using this template starting on page 2. It is not necessary to include this page in your...

Words: 584 - Pages: 3

Free Essay

Party Plates

...This research is intended to identify at least two wireless technologies that would be beneficial to implement in the Party Plates organization. Party Plates would like to introduce the iPad and iPhone into our business infrastructure. These wireless technologies will be used as a marketing tool and will advance business objectives. This research will also include a justification for the decision to implement the iPad and iPhone wireless technologies, as well as define the risks of using wireless technologies in the Party Plates work environment. In today’s technological world Party Plates needs to establish a competitive approach in the marketplace with an innovative approach to the technology trends that exist while utilizing marketing tools to advance sales, goals and objectives. The iPad can give us the competitive edge in providing our customers with on site visualization of custom ordered plates and napkins. The iPad gives us the ability to upload all of our plate and napkin designs on one device and share it between departments and with the customers. We can also incorporate personal photos designs into themed party supplies using iPad. We can utilize Apple’s Cloud application to transfer photos of customized orders from one iPad or iPhone to our design department. This can speed up the order processing time. Party Plates has a proven financial sales track record that leverages the company’s strategic mission to provide integrated products based on consumer demands...

Words: 652 - Pages: 3