nobela - aaronjohnalmeda

advertisement
NOBELA
By:
AARON JOHN C. ALMEDA
IT ETHICS
Bachelor of Science in Information System
Submitted to:
Sir Paul Pajo
Professor
AARON JOHN C. ALMEDA
NOBELA
IT ETHICS
BS-IS
SIR PAJO
IT ETHICS
Novel
Table of Contents
Chapter 1 - The Writer’s Point of View About The law
Chapter 2 - Sexual Desire
Chapter 3 - Bully
Chapter 4 - Real World
Chapter 5 - Plagiarism
Chapter 6 - The Day Without Cybercrime Law
Chapter 7 - Janina
Chapter 8 - Computer Stupidity
Chapter 9 – Thank you!
About the author
My name is Aaron John C. Almeda, a student of the De La Salle College of Saint
Benilde.
I will write a simple novel about how cyber crime law exists in this year
2012. Being an Information System student, I learned a lot of things through the
use of internet. Uhum, by the way let us skip on that coz I’m not on the part or in
the body of this novel. Anyway let’s go to my family background: My mother is a
businesswoman while my father is a retired policeman. I am the youngest in our
family, and I have one brother and one sister. I know for myself that I am writing
this novel because of them, my family, who are my inspiration. Well this is not for
the sake of passing IT Ethics, so let’s get started, enough for this.
CHAPTER 1 - The writer’s Point of View About The Law
What is cybercrime law? Well according to Wikipedia, Cybercrime Prevention Act
of 2012 - The Cybercrime Prevention Act of 2012, officially recorded as Republic Act
No. 10175, is a law in the Philippines approved on 12 September 2012. It aims to
address legal issues concerning online interactions and the Internet in the
Philippines. Among the cybercrime offenses included in the bill are cyber squatting,
cybersex, child pornography, identity theft, illegal access to data and libel. This the
meaning of cyber crime law - thanks for Wikipedia help. So, I guess the law is now
clear to you because as you can see, the meaning is very clear and obvious which you
can easily understand by looking on it. Now, let us start the real novel, as a writer of
this novel, I will tell you straight that there are two (2) kinds of people in the world
who think about cyber crime law? One is the pro-cybercrime and second is the
anti-cybercrime law. So, I will tell you now at this point that I am not in favour of
this law. You want to know why? Because it‘s simple, I will tell you the answer:
cybercrime is unhealthy because it rules what to do. By means of what to do here is
my simple explanation for that, uhm... we all know that some people are
pro-cybercrime; and we cannot judge them because that‘s what they think about
the law. Now, let‘s go to the other side; the anti-cybercrime law side uhm.. well
there‘s a lot of things we can do over the internet right? And we really all know
that internet is a very useful thing in our days because we can communicate, we
make exchange of ideas, or we can fight by using the internet. For me this
practicality of the cybercrime law is just a pain in the ass because many people suffer
hard time to this law. For example, I‘m using the internet now but I‘m not aware
of this law, therefore I don‘t have any idea that I already violated something and I
will get arrested and suffer 12 years in the jail? See! that one is pathetic but other
people think differently about this law: for them this law is good. Now let me go to
the good side of the law.
I think there are few things that the law has first no one
will get fight to the internet uhm second no one can be allowed to speak bad words
or harassing using networking and blogs, they will become more serious in using
internet and by means of that oh wait I forgot something to tell I think one of the
good reasons why cybercrime law was enacted as a law was because of the politics
sake. Imagine if I am one of the activists how can I fight against the government? I
will use gun or sword or anything if I want to fight them? I will rather use tank and
destroy them. Oh! I‘m just kidding... I‘m just relaxing myself while writing this
novel. Ok, back to serious mode so as a good thinker tell me how to fight with the
people in the government? Do you have an idea? Well, this days cybercrime is
really approved but what are the consequences? - that people need to suffer? Here‘s
one example: one senator did bad thing, how will you tell your feelings with that
senator if you know that cybercrime law is there? I think I will call you crazy if you go
to the Senate and will shout at there that you’re not in the right track Mr. Senator!
But if you do it online maybe you‘ll be in prison 12 years. So as a normal citizen you
just need to quiet and sit down and wait for them to do such thing that will destroy
the country. See... that one is really bad to think of, but here‘s one thing, by this time
maybe some people who can attack the government are the hackers but not all
people can hack a system. There are few of them who can do it. So at this point I‘m
really pieced off why did they enacted this kind of law? I really need a time now to
relax. I will end the first chapter here and while thinking for the next chapter I
want to thank the Wikipedia about the meaning of cybercrimeshit oh i mean law.
Chapter 2 - Sexual Desire
I don‘t know why I made this chapter, but one thing is for sure this is part of the law.
Because we all know with the use of internet we can have a sexual desire but I know
there is a different part of law that scope this one and it is called the cyber sex. I
choose this chapter because using cyber sex is also violating the cybercrime law. Oh..
wait let me elaborate what is cyber sex. I need to search on that for further
understanding. Let me use the internet for getting the source of cyber sex. Ok here
we go Cybersex, also called computer sex, Internet sex, netsex, mudsex, TinySex and,
colloquially, cybering or conversex is a virtual sex encounter in which two or more
persons connected remotely via computer network send each other sexually explicit
messages describing a sexual experience. In one form, this fantasy sex is
accomplished by the participants describing their actions and responding to their
chat partners in a mostly written form designed to stimulate their own sexual
feelings and fantasies.
[1] Cybersex sometimes includes real life masturbation.[2] The quality of a cybersex
encounter typically depends upon the participants' abilities to evoke a vivid, visceral
mental picture in the minds of their partners. Imagination and suspension of
disbelief are also critically important. Cybersex can occur either within the context of
existing or intimate relationships, e.g. among lovers who are geographically
separated, or among individuals who have no prior knowledge of one another and
meet in virtual spaces or cyberspaces and may even remain anonymous to one
another. In some contexts cybersex is enhanced by the use of a webcam to transmit
real-time video of the partners.
Channels used to initiate cybersex are not necessarily exclusively devoted to that
subject, and participants in any Internet chat may suddenly receive a message with
any possible variation of the text "Wanna cyber?", "Wanna cam?" or a request for
"C2C"/"C4C" ("cam to cam" and "cam for cam", respectively).
Cybersex is commonly performed in Internet chat rooms (such as IRC, talkers or web
chats) and on instant messaging systems. It can also be performed using webcams,
voice chat systems like Skype, or online games and/or virtual worlds like Second Life.
The exact definition of cybersex―specifically, whether real-life masturbation must
be taking place for the online sex act to count as cybersex―is up for debate.[3] It is
also fairly frequent in online role-playing games, such as MUDs and MMORPGs,
though approval of this activity varies greatly from game to game. Some online social
games like Red Light Center are dedicated to cybersex and other adult behaviours.
These online games are often called AMMORPGs. In other games of the wider
MMORPG genre, it ranges from widely accepted to the point of game
masters/moderators taking part, such as in Final Fantasy Online[citation needed], to
moderated based on player reports, as in World of Warcraft[citation needed], to
grounds for a suspension from play or a permanent banishment, as in EVE Online
and Anarchy Online[citation needed].
[4]Cybersex may also be accomplished through the use of avatars in a multiuser
software environment. It is often called mudsex or netsex in MUDs. In TinyMUD
variants, particularly MUCKs, the term TinySex (TS) is very common [5] Though
text-based cybersex has been in practice for decades,[6] the increased popularity of
webcams has raised the number of online partners using two-way video connections
to "expose" themselves to each other online―giving the act of cybersex a more
visual aspect. There are a number of popular, commercial webcam websites that
allow people to openly masturbate on camera while others watch them.[7] Using
similar sites, couples can also perform on camera for the enjoyment of others.
Cybersex differs from phone sex in that it offers a greater degree of anonymity and
allows participants to meet partners more easily. A good deal of cybersex takes place
between partners who have just met online.[citation needed] Unlike phone sex,
cybersex in chat rooms is rarely commercial. In online worlds like Second Life and via
webcam-focused chat services, however, Internet sex workers engage in cybersex in
exchange for both virtual and real-life currency.[8]
Now it‘s pretty clear you know now what is cyber sex. Let me thank again my
friendly internet for giving this answer, thanks again Wikipedia.
Let me make a story about these two laws. I will unite these two laws into one.
In this kind of scenario there are bad things and good things on it. You wanna
know why?
Ok, we will start with the scenario of the bad side. For example, we have three
characters, two girls and a guy ages 20 and above. Let me think what will I call
the game. I‘m talking with character names uhm ok I decided the guy‘s name is
Bong and he is a college student in one of the best universities in Manila. His
hobbies are to play basket ball and hang out with friends. I‘m ok with the guy
name Bong. Now let‘s go on to one of the girls. What is the best name that suits
for this girl? Let me think about it ahm.. I will make it the girl friend of Bong so
what name suits for her. Ok I decided already that I will call her Beng. Beng is one
of the best volleyball player and she loves basketball player boyfriend that‘s make
suit to each other, they are both same player in the university. Now I have one
more character left and still a girl and her job in the story is for the bad side. So let
us focus with these two, namely Bong and the unknown girl. I don‘t have a name
for her but mean while I will think about it so let‘s start the bad thing in this chapter.
Bong is a happy man and he wants to be friends with those people who have a night
life. In short, he wants to meet girls or friends in the club or party or anywhere. One
night Bong went to a party with his friends and all of the guys in the group have their
respective partner. I‘m not saying Bong is ugly on the story, but he is not
interested in just simple beauty, he likes a sure pretty girl who will suit his tastes.
Now while in the club their group is having fun with their respective partners, but
Bong seems out of place because he is alone. He doesn‘t have a partner. Some
of the girls in the group is interested in him, but Bong refuses them because he
respects friendship, he doesn‘t want to destroy the friendship by means of girls, so
the group continues in having fun. After an hour, someone noticed Bong drinking
alone in a round table, and he is so messed up with the girl to his place and told,
―hey you‘re not with somebody? Aren‘t you?‖ the girl ask. Bong is really surprised
with what he has seen on his two tipsy eyes, he got stunned for at least two seconds
and realizing that this one is the type of girl he wanted, to be with her all the night
Bong said to himself. Now the girl said, ―hey handsome with tipsy eyes can I sit
beside you? I want to accompany you.‖ Bong was really surprised hearing that chick
wants to stay in his side. Bong said, ―sure why not!‖, and he smiled. Bong threw
a joke, ―hey maybe your boyfriend will get angry, maybe he will shoot me when he
sees you sitting beside me.‖ And the girl laughed and said, ―you‘re so funny, I‘m
not supposed to be here if I have a boyfriend accompany me right? Bong smiled
and said, ―by the way who is with you tonight? are you with a group or are all alone
in this kind of place?‖ The girl answered, ―I‘m alone, just having fun in here. I
always do this, hoping to find someone like you.‖, and the girl smiled to Bong.
Bong replied to her, ― you‘re making me "bola" ah and laugh, so can I offer you a
drink? what do you want?‖ bong ask. The girl replied, ― what do you have there?‖
Bong answered, ―I have here 6 bottles of beer, do you drink beer?‖ he asked the
girl. ―Yes I drink beer,‖ said the girl with a smile. And that night they started talking
to each other for 3 hours, and Bong is enjoying the night with that girl. And before
they will leave the place she asked about the number. Bong said, ―wait before you
go, can I ask your name and can you please tell me your number.‖ The girl did not
hesitate and say ok sure I think you‘re trustworthy, and I‘m going to make you my
chatmate or textmate‖, said the girl. Bong replied, ―ok here is my cellphone,
save your name and your number and also your email address as in save everything
you have.‖ Girl said, ―ok ill do it.‖ After that when the two newly found friends
getting to know each other‘s contact number, the girl left the place immediately.
While Bong is checking to his cellphone to tex the girl. While texting he realized that
the name of the girl is very sweet, the name is Candy. Bong smiled and texted Candy
hey got your number and please save mine i want you to text me if you received this
message. And the two friends doing together text messages. After several weeks
they are still texting each other.
Still after one month of knowing each other texting and texting to one another. And
the points come that their not satisfied with the text of each other Candy asks Bong
to call her on skype so then can see each other while talking . Bong replied ok candy i
will call you when they got to speak to each other and also see each other faces bong
said hey you look cute with your pajamas and candy fire back and you look more a
man with that sando. That night their relationship to one another has been getting
stronger. But Candy told, ― hey Bong can we be just like this all the time, no
commitment and no love because I‘m afraid to loose you, so please grant my
request. Bong said ok Candy if that‘s what you want.
In that scenario of the story where now close to the bad thing of the cybercrime law
and also with cybersex so let me continue this story of Bong and Candy. But wait it‘s
already 2:00 AM, I feel sleepy to make the story and I want to still continue but
my mind don‘t response, so let me cut the story in here, maybe I will continue
tomorrow when I wake up. So you readers you need to sleep early, ok, goodnight.
Stop reading the next part just rest or sleep... lol....
The bad things about this chapter start here. Before you go here let me refresh my
memories about what I wrote last night. Well they promised each other by without
leaving anyone. And here the story goes... after a week, both of them still calling
each other and they didn‘t waste the time for talking and staring one another. Bong
notice that candy is more prettier, and he is so attracted to her. Bong admitted to
Candy that he maybe fall in love with her. Candy said, ‗‘hey you already forgot our
promised.‖ Bong said, ― no, I am just telling the truth Candy.‖ Candy asked Bong this
question and she said hey bong can ask you something and this is serious ahm Candy
said do you ever feel horny when we are speaking and staring to each other? And
Bong is shocked he felt shame on himself, but after a minute he decided to answer
Candy‘s question. Bong said to her, ―ok I admit it my answer is yes.‖ Bong
explained what he felt and said, ―hey Candy I‘m just a man and for me you are so
perfect, every time I look at you I felt something my body is getting hotter and I
really want to hug you and to kiss you. Candy smiled, so ―Bong you have a sexual
desire over me?‖ Bong answered ―yes I have but that is impossible to happen.
Candy laughed, that is what you think hahahah i think we can have pleasure of sex
tonight. Bong said how Candy how? Candy answered his question, ― it‘s simple,
let‘s do it over the internet.‖ ―Oh can we do it by that?‖asked Bonng. Candy
replied, ―yeah I usually do it with my ex boyfriend.‖ But Candy we are not in that
kind of relationship?‖, Bong replied. Candy smiled, it‘s ok to do with you because
I think I have a soft feelings to you. Bong said, ―Hey Candy I don‘t know how to do
this one can you teach me?‖ Oh its simple just take off our clothes and imagine each
other and let‘s play on our self, can you do that for me? said Candy. Bong replied,
I‘m ashamed but yes candy...
They do whatever it happened on that day. I think I will end the story with that
scenario because my novel is rated pg so I will not tackle sexual intercourse. Just let
me explain how this story become the bad side. For me as writer it‘s really obvious
the two characters of the story violated two rules of law, i.e. the cybersex and
cybercrime law. First is the cybersex because the two people doing this act without
relationship to one another has violated the law because Bong and Candy does not
have feeling of love to each other and they keep doing that action over the internet.
Now why the two violated the cybercrime? It‘s really obvious again because they
were doing a crime yeah that‘s a crime because it‘s wrong, it‘s like what I said in
the cybersex but here is much more exciting because here you can be arrested by
the police while doing the act its really violated the cybercrime law.
Now let me think about the second story and this one is the good side. I will make
a vice versa of the bad side of this chapter. Oh... I forgot the name of the first girl.
Ok upon reviewing my novel I remember the name of the girl is Beng. And still i will
be using the same guy for this story. Here the story goes... as I said earlier Bong is a
basketball player and he is so good in the game, he is so active with this sports.
While Beng is a volleyball player, she loves to play volleyball and she is pretty and
smart and always top of the class. One day in their college life, Bong and Beng
are already dating each other and they are good looking couple. Some of Bong‘s
friends are envy to him because he has a good girlfriend and it‘s really hot. Same
as scenario with Bong, Beng‘s friends are envious to her because Bong is a good
basketball player and handsome to. When the couple is walking in the campus lots of
people are staring at them because the two really suit to each other. So let me jump
the story hahaha as a writer no one can stop me what ever i will do to my story
that‘s one of the good points of being a writer. So after the couple graduated,
Beng is now going to Canada because of work while Bong will stay here in the
Philippines. Bong was very upset when she knows that Beng will leave her for 2
years. Bong confronted Beng about her job, and he tried to stop her, but Beng said
to Bong, ―hay honey this is not for me it‘s for us, for our future.‖ Bong is crying
while speaking to Beng and out of nowhere offered Beng something. ―Ok Beng
before you go to Canada next month can you please marry me?‖, Bong said, while
he holds a thing and that thing is a ring. Beng was shocked and cried and said to
Bong, ―that‘s what I am waiting for you to ask me honey so why can I reject that
offer which I know I will never regret it. Ok Bong let‘s get marry two weeks before I
go to canada.‖ Bong said ok but still you can see the sadness on his face for might
loosing a lover for two years. Writer side oh its me again the writer lol its such a
sweet thing happened to these two persons, it‘s really sweet i guess this two
characters will be having a good family someday. Ok enough for the writer side let
me go into the story so let‘s continue here at this point Bong and Beng are busy
preparing for their wedding because it‘s really out of nowhere when Bong proposed
to Beng. They decided to marry in the civil rite. Beng said ―after 2years when i get
back let‘s marry again in the church.‖ Bong replied, ― ok babe, i will wait for that
hope you still love me in that time‖, and Bong smiled. ―Oh sure hon my love for
you is endless, you will become the father of my children.‖ Beng said.
Now let‘s move on to the wedding - the start of a new chapter of life Bong and
Beng. After the wedding Beng still have two weeks for Bong before she will leave
for Canada. The couple spent time to each other. Oh I forgot to include the
honeymoon of the couple lol. As I said a while ago, this is rated pg no sexual abuse
or introduction hahaha. When the time goes by, Beng really needs to leave and
Bong cried and cried on Beng‘s shoulder hugging her tightly and kissing her sweetly
and lovingly. Bong said, ― take care darling I will surely miss you so much and
please don‘t look to those foreigners there ok honey just keep in touch i love you so
much Beng!‖ Beng laugh, ― hahah! Foreigner? I already have you, so all the boys
there are nothing compared to you honey. I love you more and i always will until i
breath! take care of yourself and don‘t look to other woman i have an eye on you
even i am not around ok,‖ She kissed Bong and hug him tightly while saying, ― i love
so until we met again honey i will call you always promise i love you.‖ After one
month Beng went to canada. Bong always speak to her and telling story about
each other. And now as a writer it‘s my turn to explain some things in here. I will
now enter the good side of this chapter so read carefully I will go straight to the
point. Bong and Beng doing sexual intercourse because when they horny to each
other they pleasure each other by doing in through internet they do this once a
month. I think nothing is bad with that as a married couple because being married
couple, sex is a must to express your feelings to your partner, but the problem is
here why if your partner is not around like Beng. How can Bong pleasure himself
in terms of sexual desire for his wife? If you are in Bong‘s shoe, are you going to
get a new girl just to satisfy your sexual urge to your wife? I think no because as a
married man you have promised that you will not hurt your wife, you only give her a
faithful and true love and pampered her. So I think the cybercrime law and the
cybersex law thing in the situation of a legally married couple is legal with this story
because as married couple they have the right to do it without hurting other feelings
because being couple is being one so I think I will end chapter two here because I
need to catch up things for another chapter of the story. Thanks reader! hope you
like this chapter!
Wow that‘s chapter is not bad, aren‘t it? So let me think now what story will be
next so here I am thinking again. What about if I will make about bullying. I will
name chapter 3 bully. Is that right with you? Oh i guess you cannot react with that ok
The thing is settled, let‘s make a chapter about bully.
Chapter 3- Bully
So what is bully? i think i need to ask my friendly neighborhood google for this
further information ok just wait a moment while searching on the internet just oh
wait before i start this chapter let me have a stick of cigarette ok thank you for
understanding my needs I know you think that I‘m a bad writer hahaha ok here we
go now.
What is bullying?
Four kinds of bullying
Who's bullying and who's being bullied?
Bullying is serious
Signs your child might be being bullied
Things you can do if your child is being bullied
Signs your child might be bullying others
Things you can do if your child is bullying others
Top tips for kids
Bullying is when someone or a group of people with more power repeatedly and
intentionally causes hurt or harm to another person or group of people who feel
helpless to respond. Bullying can continue over time, is often hidden from adults and
will probably continue if no action is taken.
Bullying isn't:
single episodes of social rejection or dislike
single episode acts of nastiness or spite
random acts of aggression or intimidation
mutual arguments, disagreements or fights.
These actions can cause great distress. However, they're not examples of bullying
unless someone is deliberately and repeatedly doing them to you.
Ok thanks ncab.org for making this explanation. It‘s really a big help to search for
the internet. I think if cybercrime law continue, searching in the net will be difficult.
Because it might be blocking the website for preventing plagiarism, but well let‘s
move on to the story about bullying. I will still use Bong for this story and don‘t
worry this will be a new story.
Story starts here, Bong is a college student and he is an industrious student. For me,
as a writer, Bong is a normal student and he did well in the school. So Bong was able
to get high grades for his every subject and he is one of the best students in their
classroom. I noticed that Bong is always alone. The reason is that he might has a
problem, he doesn‘t want to join any activities, and he doesn‘t have friends in
school, he is always alone and I‘m wondering that someone or something is
bothering Bong‘s mind. But here‘s one thing, Bong has a classmate that always
tease him and the name of his classmate is Jd. Jd is one of the bad example of
students, he used to smoke and he always copied the work of his other classmates.
Jd is always asking Bong to do his homework and even the projects in school. I was
wondering why Bong did not complain to Jd, it‘s been unthinkable for me. Well, I
want to focus on Jd because I really wanted to know him so that I can study and
explain to you what happened in this chapter. By the way, before I proceed to the
story I would like to tell I am having a hard time to write this chapter simply because
I‘m riding in a jeep hahaha... I just want to share it. It might be someone will snatch
my cellphone if I don‘t stop writing here. Well I better stop for now. I want to say
sorry if there is typographical error because I explained it earlier where‘s my
location and thanks for understanding.
Ok now let me continue the story. ok I said earlier that I will focus with Jd. Jd is
always doing these things before he always ask somebody to do the job for him I
mean the projects and assignments he doesn‘t show effort from his academic
studies, he wants to relax all the time chilling with friends. Jd is a kind of guy that
he thinks he is a boss, he can command someone to do the things for him. Well,
in that case Jd finds Bong to do his assignments and he threatened Bong that if Bong
will not do Jd‘s assignments or project Jd will punch or will shame Bong in front of
the class. Bong felt scared because he knows Jd is popular of being notorious in the
campus so he decided to get use to it. Whatever Jd told him he surely does it. Ok, as
a writer, bullying really need an attention because if you ignore this matter one of
the students willbe hurt and I know a case that due to bullying one of the students
get suicide, and I don‘t want it to happen again. So how can I continue my story
about this bullying?
Ok let‘s move on. Bong was so afraid of Jd, and he does all Jd's wants. Because
Bong does not have any friends in the class he is afraid that no one will help him
when Jd will try to shame him, and he knows that all his classmates are going to Jd‘s
side. That‘s why he is like a puppet for Jd. Oh I forgot to say about the background
of Bong‘s family in this story. His father is working in a government. Bong‘s dad
is pro-cybercrime law and he is one of the reasons why cybercrime law was enacted
in our country. Hey this line it‘s not true i just made this one to my mind. So as a
writer i have something to ask my mind what if Bong tell his problem to his dad?
Uhm ok lets continue the story I guess Bong doesn‘t want to bother his dad. And if
he tells it, maybe his dad will go to their school and make scandal on the school.
Bong is afraid if that will happen. So mean while Bong is currently using the internet
and he always log in to facebook because this is the source of entertainment for him.
He has so many friends in face book because i think you already know the reason.
Few minutes after, Bong noticed his chatbox, and he saw the message of Jd to his
chat box. Jd said, ―hey dickhead how is my homework going on?‖ Bong replied, ― i
have not started it yet.‖ Jd got angry on what he read and continue saying bad
words to Bong. And bong was so afraid to what he read and he said that he will be
doing his assignment later. And Jd said to him, ― that‘s what i wanna hear from you
faggot.‖ And Bong did and finished all the assignments of Jd. After a while Bong fell
asleep because of being tired of doing the home work of Jd. The following day Bong
is now preparing for school and he ate light breakfast. In the school, Jd is so
excited to get his home work from Bong, but Bong is vice versa since he is afraid to
see Jd but can‘t escape to Jd's presence because they are classmates so they will
surely meet and the bullying continue. One day Bong was really mad and he cannot
let the things happen all the time and he is decided to tell the truth to his professor
and he explain everything and all that Jd said from him. When Jd learned what Bong
did, Jd was messaging bad words on Bong‘s facebook and is really a very terrible and
bad words. At the house of Bong the only person left is his dad. Bong‘s dad wants to
use the computer and he opens the google chrome and type his own facebook the
page is already go straight to Bong‘s facebook this accident of seeing the facebook of
his son ends everything. His father sued Jd for violating the law. But Jd doesn‘t know
that he is already breaking a law. One day in the school Jd was arrested, and he is
afraid because he does not know what he did. The police said, ―boy you violated the
new law so let me invite you to the head quarters. If you don‘t come with us, i will
drag you with all my force‖, said the police officer. Jd responded, ―ok sir i‘ll go with
you.‖ And everything was done inside, they explained what is the reason of bringing
him there and the penalty about the crime that he did. Jd spent 12 years in prison.
That ends this story. Now, I want to explain something that is very meaningful.
Ok here‘s the lesson on this chapter, please respect people around you because you
don‘t really know what act did you do to others like Jd he doesn‘t know that he
already violated the law. I think in this chapter the law helps the lonely student
(Bong) which means the law is a good thing in this chapter. But the bad thing is
that Jd doesn‘t know that he already violated a law resulting toa warrant of arrest
and that‘s the bad side of the law. Well I am so thankful because the law saves
Bong out from bullying, and I hope Bong will become a normal student now. Also,
surely this scenario will serve as a lesson for those people like Jd. If I were you,
think first before you do something, you need to know first if what you will do is
good and right or is it bad.
Now as a writer again and again, I need to think another chapter for this. Well
maybe a few hours I can have a new one but I think I need to eat first before writing
the chapter 4 of my novel.
Chapter 4 - Real World
This chapter is about, in my own opinion, in the real world which means it really
happens, it is a fact and is realistic, so I decided to make this chapter to test myself if
I really understand the law of cybercrime. If I write many issues about it i think i am
ready to continue this novel.
In 2011, there is no rule about cybercrime, but I know there are some people who
knew that this law will be approved in this country. Those people who predicted that
cybercrime will be approved, I have a high salute to those people because it means
that they used their mind to think what happened in our country. So I am sure that
those people who know that this day is coming maybe they prepared for this tragedy
because at the first place even the cybercrime is not yet existed in our country, I
know that they made a solution how to prevent this law. And I think they are also in
no favor with this law because here is a one reason that the government will benefit
this one. For example the senator issue thing. I am sure you heard what Senator Tito
Sotto did? If you don‘t know, I will remind you what happened. Let me show
(below) to you the speech of Senator Sotto delivered... I mean plagiarize. Here is
the speech of Senator Sotto:
"Ilan ang magiging dakila sa pagbali ng kasaysayan, subalit bawat isa sa
atin ay maaaring kumilos, gaano man kaliit, para ibahin ang takbo ng mga
pangyayari. Kapag pinagsama-sama ang ating munting pagkilos,
makakalikha tayo ng totalidad na magmamarka sa kabuuan ng
kasaysayan ng henerasyong ito.
Ang mga hindi mabilang-bilang na iba't ibang galaw ng katapangan at
paninindigan ang humuhubog sa kasaysayan ng sangkatauhan.
Tuwing naninindigan tayo para sa isang paniniwala, tuwing kumikilos tayo
para mapabuti ang buhay ng iba, tuwing nilalabanan natin ang kawalan
ng katarungan, nakalilikha tayo ng maliliit na galaw. Kapag
nagkasama-sama ang mumunting galaw na mga ito, bubuo ito ng isang
malakas na puwersang kayang magpabagsak maging ng pinakamatatag
na dingding ng opresyon."
That was the speech he delivered and the original writer of this speech is
Mr. Kennedy.
So let me get the speech of Kennedy by this time, let‘s
compare it "Few will have the greatness to bend history; but each of us
can work to change a small portion of the events, and in the total of all
these acts will be written the history of his generation.
It is from the numberless diverse acts of courage such as these that the
belief that the human history is thus shaped.
Each time a man stands up for an ideal, or acts to improve the lot of others,
or strikes out against injustice, he sends forth a tiny ripple of hope, and
crossing each other from a million different centers of energy and daring
those ripples build a current which can sweep down the mightiest walls of
oppression and resistance."
Ok i already got the speeches of both senators. As you can see, Senator Sotto
translated the word of Sen. Kennedy. How can I call that plagiarism or translation?
The bad thing here - Senator Sotto didn‘t even said that he got his speech to
someone. He said that this one is original. So it‘s already clear to us it‘s
plagiarism. Sorry for that mr. Kennedy i think this one is really shame against our
country. Pano kaya tayo gagalangin ng ibang bansa kung ang mga namumuno sa
atin ay gumagawa ng kalokohan? Sorry for speaking Tagalog, I just want it to be
cleared to my fellow Filipinos coz I really wanted to help our country.
And now this day, Senator Sotto is cleared. I don‘t know why or how. I think
because he has the connection heah for sure because he is one of our leaders. And
this is the question to all of you - did you notice that all people in the government is
celebrity its fun right maybe he shoots a movie inside the government. And this is
the worst even Manny Pacquiao is a congressman. What the hell is happening on this
earth? Why do people vote those candidates? Because they know that celebrity
is great. Yes they are great when they act but to serve us uhm i dont think so. Ok i
think I am getting too far to the topic hahaha. Did you notice that all the issues of
Senator Sotto are gone? I think this law has been used to cover the mistake of our
founder. Now some people in the country is focusing to the law they already forgot
the other issues about Sotto case. I think they want to cover it by this law. And by
using this law no one can fight them because they will be protected by the law. Well
that is my simple explanation about this chapter anyway it‘s up to you if you have
your own but i just want to share my feelings about it. I am not forcing you to believe
me because i know you have your own way to investigate things haha.
Ok i think that‘s it for chapter 4.
It‘s time to go now to chapter 5, but still i do not know how to start the story in this
chapter. So can you give me some time think. Oh it‘s already 3am in the morning
maybe tomorrow i will think a good story about the law. Maybe in my dream you
cant tell what happened right so good night for now let‘s continue it later when i
wake up. Thanks for reading chapter 4, and i would take time to apologize to my
worst grammar just understand it and you can follow what i want to say.
Chapter 5 - Plagiarism
The next chapter is about plagiarism. I know I already said a lot of things about
plagiarism but in this chapter I will focus on this one. I will make a scenario about
plagiarism and I will connect it to cybercrime law. So I hope I can do it because my
mind is really blank at this time I don‘t know how to start the story. Oh I think I need
to ask the internet about what plagiarism is all about so that my reader will easily
understand my topic. Ok let‘s start the story now.
So what is plagiarism? Do you have an idea what is it? I guess you heard it a lot of
times and I know that you knew that plagiarism is bad and you can be sued by doing
it.
Plagiarism is the act of taking another person's writing, conversation, song, or even
idea and passing it off as your own. This includes information from web pages,
books, songs, television shows, email messages, interviews, articles, artworks or any
other medium. Whenever you paraphrase, summarize, or take words, phrases, or
sentences from another person's work, it is necessary to indicate the source of the
information within your paper using an internal citation. It is not enough to just list
the source in a bibliography at the end of your paper. Failing to properly quote, cite
or acknowledge someone else's words or ideas with an internal citation is plagiarism.
For this understandable meaning of plagiarism, I would like to say thanks to
www.lib.edu.phwww.lib.edu.ph
Ok since i got the meaning of plagiarism, I think the reader should
story by now and i want to create another story for this.
understand my
Let us start the story. In this story, i will still use Bong for this chapter. One day one
student uploaded his graduation speech in facebook and somebody noticed that
some words used in the speech came from the internet and the uploader did not
cited the source or the one who originally made it. And this one is example of
plagiarism. Even in the real life plagiarism is very known. In school plagiarism is
well known and I think even all around the world. So as a writer, I decided to make
a story about it. Well plagiarism is part of the law and some people used to violate
this law and i dont know if they intend to violate it or they are just getting lazy to
compose an original one.
For example, when cybercrime law is not approved, all people can download movies
and songs over the internet, without thanking the uploader. But now a days, when
cybercrime law was approved and enacted, I think if you downloaded something
over the internet, you are violating two laws. So what can we do about this?
How can we prevent this thing to happen? Well, for me, I guess you can prevent it
by simple citation so that the one that made the original version can get credits to
your work. And here’s one thing, if you try to copy other’s work, I think it is
allowed but don’t use copy and paste because if you continue doing that, you will
get used to it. So all you need to do is read the original copy of the sentence, then
make your opinion about what you read and for sure you will get your idea or
answer on your own without doing plagiarism.
And here’s one thing, if you based your answer to another answer, please don’t
forget to give credits from the original maker. By this, you will be safe against
anything. I think it’s just a simple thing that I need to say and impart to my readers
to prevent violating the law of Plagiarism.
At this point, let me show you how it’s done. So that you will learn from me here is
the right thing to do this. Go to the internet and I will ask the internet what is the
meaning of citation. Just only example for the story. And yes i will benefit this
example because it will be counted to my word count for this novel hahaha so i will
grab this opportunity.
What is citation? It is an internal, in-text, or parenthetical citation refers to the
practice of giving credit to an author, singer, or speaker by citing their words/ideas
within your paper. This internal citation is then referenced at the end of your paper
in your 'Works Cited' list (see below).
Internal citations are sometimes called parenthetical citations because they're
enclosed by parentheses. It's helpful to think of internal citations as a kind of "tag"
indicating what you've borrowed from an author. For every sentence, phrase or idea
you borrow you must "tag" it with an internal citation. Each internal citation is then
listed alphabetically in a 'Works Cited' page at the end of your paper.
Borrowing the work's structure, format or style without giving credit is also
considered plagiarism. It is important to remember that merely changing the
wording is not enough."http://www.lib.usm.edu/legacy/plag/whatisplag.php" Ok i
already copy from the internet. Just you need to do is to get the link where do you
get the copy and cited it. So that the original copy was given a credit and this one is a
sign of respect to the original writer because you give credit on his work and you
download or based his work. So i will cite it now and i will put my citation after the
original copy, ok? I‘m done - cited it and i guess that‘s for chapter five. Thanks for
reading this chapter.
Now let‘s go to chapter 6 and i want to make a new character for this. I will make a
women character at this point and i will call this chapter 6 uhm. Wait i can‘t think for
the title of this chapter. Would you mind if i will smoke first and think after it. Sorry i
really need it please understand.
Chapter 6 - The Day Without Cybercrime Law
The chapter is really obvious. Here I can explain the old days without cybercrime.
Back in those days that all people in this country have a free will in using the
internet, and they can do whatever they want and some of them use internet to
fight our government .
It‘s simple to live without thinking anything because life is happier if you are relax
and peacefully living. But if there‘s something that happen in a society it will surely
affect our day of living. For example, there are people who enjoy being single in
life but if they saw a happy family, things will be different from them and after that
scenario they try to change the life that he or she used to enjoy. Some of the
people in our country are like that because, I think, we are an open country and the
people here is easily adapted to what is happening in our country. Example,
without cybercrime law it‘s really normal to us, but today with this law it‘s hard to
move over the internet. It‘s not like the old days that we don‘t mind anything over
the internet it‘s really happy with that old days because we can search anything that
we love to do. But now in our time it‘s hard. So please give back the old Philippines,
we want it and we don‘t want to limit ourselves into that law, give us freedom by
using the internet freely. Not like this. But I‘m not saying that the law is really
sucks, I know some good effect on it and I already explained it in my previous
chapter. And I divided it into two good and bad things. I really wanted to have
freedom on this. Can you please stop cybercrime law for our privacy and please
respect it this is what we have so don‘t be so advantageous to us please be
cooperative. We already live without that law so we can still continue that proper
way of living.
Chapter 7 - Janina
It was 1989 when Janina was born in the Philippines around 11pm. She was a cute
baby and she is big and pretty. When Janina comes to the age of seven, you can
notice from her that she is a kind of kid that loves computer. She spent half day in
front of the computer by playing games or read something in front of it. I think
Janina was inspired by her parents. Janina’s father is a system analyst in Saudi
Arabia and her mother is a Computer Engineer in IBM. Her mother taught her to
use computer at the age of three and that’s the start of the story.
When Janina goes to elementary you can notice different things from her. She is
different from other children because when she was grade 1 student in Good
University (the name of the famous school in the Philippines) she has already a cell
phone and a tablet. Janina is a very techie girl. Her teacher, Ms. Sonia, noticed
the different behaviour that Janina has. By the way, Ms. Sonia is one of the best
teachers in Good University. She has graduated from De LaTeneo Universty with a
degree of Bachelor of Science in Information System. She took master’s degree on
Education in San Letran College.
When the first week of school comes, Janina is very excited because she wants to
meet new classmates and new friends.
1st day of elementary days
Janina enters to the classroom. She is the early bird among all of the students. Janina
seats beside the teacher‘s table and her Yaya (Maid, Katulong) is outside the door
watching her actions inside the room. Her Yaya noticed that Janina was very excited
to see her teacher and classmates. Afterwards Janina called her yaya. ―yaya‖ and
yaya replies yes whats wrong, janina ask why does everybody was not here where
are they? Are they not excited to go to school and learn from our new teacher?
Yaya said , ―you know baby there are something to explain this 1st they don‘t want
to come this early because they are not too excited like you. And her yaya laugh,
Janina smiles too and ask, ―do I really look that excited yaya?‖ Yaya answer yes you
are and laugh again. After 10 minutes Ms. Sonia enters the room and Janina greets
Ms. Sonia, ― good morning miss, my name is Janina, what‘s your name? ― Her
teacher smiled and said, ―ow you‘re the early bird uhhmm my name is teacher Sonia
or you can call me Ms. Sonia, I‘m 22 years old. I am your adviser for the whole
school year. Janina smiled and get her cell phone. ―Ms. Sonia can I use my cell
phone while waiting for others to come? Teacher replies oh sure! Wow you
already know how to use a cell phone by that age. Yes teacher my mommy and
daddy influenced me to use technologies because they said that in the near future
we are going to be surrounded by gadgets and other technologies. They want me to
get use to it when that day comes. That‘s good to hear from a grade one student like
you? I think your classmates are coming. ―Children arrives and murmuring to one
another‖ student sits to their respective places and greet the teacher in front.
Gooooood Mooooorniiiingggggg Teeeeeaaaachhhheeeeerrrr? Good morning
children Ms. Sonia said, are you excited to learn class? Yeeeeesssss
teeeeeaaaccchhheerrr. Ok the lessons start and Janina is so active in class activity.
Everytime Janina goes home she always has star from her teacher. When she goes
home she always email her mother and father and tell story about what happen in
the school.
After 6 years Janina was already a high school student. By that time Janina has
enhanced her knowledge about computers, and she joined the computer activity
club. On this club you can learn how to make software or to use different types of
operating systems. It helps to enhance your skills and knowledge about computers.
One day Janina attended the computer club and she met Megan and Knox. These
two are bestfriends, and they meet Janina and they noticed that Janina was alone
inside the room. Megan said hey why are you alone?
Janina response I‘m new here in this club. The best friends answer oh same here.
Can we become your friends since you don‘t have anyone to talk too? Janina replied,
―sure‖. They talk a lot and the best friends were surprised about the knowledge of
Janina regarding computers. Janina can explain what specs, ram and rom means.
Meg and Knox were surprised because they learned a lot of things from Janina on
their first day of friendships. When the three friends separate to one another and
go to their respective homes Janina went to her yaya‘s room and tell the stories
about her new friends. Janina was very happy while making a story to her yaya and
she said that Knox and Meg are very approachable and she said that she wants to be
part of the group. When the next day come, Janina is preparing her self to go to
school and you can see the excitement and happiness to her face, it‘s because Janina
wants to see her new friends. Several hours past the three friends went to their
classrooms and chat to each other. Suddenly while talking to one another, the
doors open and Janina was so shock when she see Ms. sonia. Janina went to her
former teacher and she asks‘ ―how are you ms. sonia it‘s been a while?‖ Ms. Sonia
was surprised when she saw Janina. Ms. Sonia said, ―oh it‘s you again where gonna
be together in one school year but now it‘s different. Janina you‘ve grown a lot
and i know you have now see your talents when it comes to computer do you?‖
Janina said, ―uhhmm i guess so you'll see one of these days ms. sonia.‖ After the
conversation Janina went to her friends and told them that Ms. sonia was her
teacher in grade 1 and she said that she is a very good teacher and we are going to
learn a lot of things from her? Dingdong oh the bell ring the class starts now. Good
morning ladies and gentlemen, I am Ms. Sonia and I‘m your adviser.... ms. sonia is
introducing her self to her students and tell stories about her experience in teaching.
After 6 months Janina, Knox and Meg decided to join the competition called
Compute System Marathon. In this competition you will make a system for the
government and explain all the functions and what the system does. Meg and Knox
are inspired to Janina that’s why they had interests and knowlege into computers.
When the two friends met Janina, they started to love and explore what computer
can do and after that, they make a team that will fight to the other campus for the
competition. The competitors are Rich university and Nice university. These are
two popular universities here in the country, and the students who are studying here
are very knowledgeable and good in computers because they have the best gadgets
and high techs facilities. Janina and her friends are excited to start the application
for Compute System Marathon, and they are planning to make a system that
computes grades, but not only grades, the system is convertible to compute salary
and some other things when regards to computing. Janina will use ASP.Net for
coding while Meg and Knox will focus to the database and design. These two people
learned these things because of Janina. Janina is trusting her two friends to make a
better Data base and Design. By the way Asp.net means a Web application
framework developed and marketed by Microsoft to allow programmers to build
dynamic Web sites, Web applications and Web services. It was first released in
January 2002 with version 1.0 of the .NET Framework, and is the successor to
Microsoft's Active Server Pages ASP technology. ASP.NET is built on the Common
Language Runtime CLR, allowing programmers to write ASP.NET code using any
supported .NET language. The ASP.NET SOAP extension framework allows ASP.NET
components
to
process
SOAP
messages
(sources
:
http://www.webopedia.com/TERM/A/ASP_NET.htmlhttp://www.webopedia.com/TE
RM/A/ASP_NET.html ).
Janina explained those to her friends and Meg and Knox study the asp.net to the
internet to understand what was Janina was trying to say. When the tournament
starts, Janina was ready to prepare their system and janina was happy to the result
of their hardwork. The first group to present is the rich university and the
application is simple calculator by using java or JSP. JSP means Short for Java Server
Pages. A server-side technology, Java Server Pages are an extension to the Java
servlet technology that was developed by Sun. JSPs have dynamic scripting capability
that works in tandem with HTML code, separating the page logic from the static
elements -- the actual design and display of the page to help make the HTML more
functional(sourcess
http://www.webopedia.com/TERM/B/JSP_NET.htmlhttp://www.webopedia.com/TE
RM/B/JSP_NET.html ). A JSP is translated into Java servlet before being run, and it
processes HTTP requests and generates responses like any servlet. However, JSP
technology provides a more convenient way to code a servlet. Translation occurs the
first time the application is run. A JSP translator is triggered by the .jsp file name
extension in a URL. JSPs are fully interoperable with servlets. You can include output
from a servlet or forward the output to a servlet, and a servlet can include output
from a JSP or forward output to a JSP. JSPs are not restricted to any specific platform
or server. It was orignially created as an alternative to Microsoft's ASPs Active Server
Pages. Recently, however, Microsoft has countered JSP technology with its own
ASP.NET, part of the .NET initiative.
Janina knows java, but she does not try to code using JSP, but when she saw the
codes she said to her self that she wanted to try to code in java as soon as possible.
Janina's group is the second presentor. When the system was presented to the
audience, the judges were amazed because of the design of the system is very
unique and they were so amazed because they don’t believe that a highschool
student can make a better application like that. Janina was so impressed because she
saw the reaction of the people. She said to herself that she is so proud by the work
of her groupmates. Now the judges checked the code and they said it to janina's
group how to run the application. Janina made the demo. She explained what the
application does and what is the use of it. One of the judges called the attention of
Miss Sonia. He said, “I want to talk to the group in person, can you schedule it for
me? Miss Sonia thinks that he is impressed to the work of her students and she was
really proud of them for their job well done. After the presentation of Janina's
group the last group to present is the Nice university and they are going to present
an application using PHP language. PHP means is a server-side scripting language,
especially suited for the creation of dynamic web pages. This programming language
offers web developers a large selection of instruments. PHP, which has become the
basis for many web applications, allows easy insertion in HTML code and connection
to
MySQL
and
PgSQL
Databases(sources:
http://www.ntchosting.com/php/http://www.ntchosting.com/php/).
The application is almost the same to application of the first group, is a simple
calculator. After the presentation the judges decide who is the winner and it is
very obvious Janina's group wins the battle because of their idea and concept and
also the design of the user interface. Janina and friends won the first place and the
faces of happiness is really seen in their faces. After the awarding Janina and Miss
Sonia talks, told what the judges said to her. Janina said that they will think of it and
that she wanted to ask permission from her friends.
Time goes by... Janina has a job now.
She is a system analyst and also a lawyer.
In these days, there's something happen about the society.. it's been terrible to use
internet because one of the problems is the government which passed a law
violating the use of internet will be arrested. Many people got angry with that law.
Janina side as a lawyer and being a system analyst she is in favor with this law
because her reason are some people fight with the internet without seeing their
faces and this the only battle that this person can do or fight to the highest people in
the politics. By this cyber crime law, they cannot fight anymore and they will
rather keep quiet and listen to the rule of the government. Janina wants to fight
the rights of these people and she made a study about the constitution, Law of the
Philippines and USA. Let me show you the Philippine Constitution. Here it is and
let’s study it. By the way, it’s the 1987 Constitution Law of the Republic of the
Philippines.
Chapter 8 – Computer Stupidity
Him: "I can download games like Quake and play them during lunch, you know."
Me: "We're only allowed 10 megs in our accounts, and the system administrators
would notice you downloading a large file."
Him: "Nah, I could hack it so he couldn't."
Me: "Ah, so you are into hacking. By the way do you know any programming
languages?"
Him: "Yeah, of course."
Me: "Which ones?"
Him: "I can't tell you or else you'll use them."
Me: "Just by mentioning C++ or Pascal or whatever will not instantly make me a
genius with those languages."
Him: "Oh sorry, I didn't understand you. Yeah, I know C++ and Pascal."
Me: "What compiler do you use?"
Him: "Well, QBasic is my favorite."
Me: "Nobody over the age of eight uses QBasic for serious purposes."
Him: "But they made Windows with QBasic."
I almost cried laughing.
One day I was in a public park, reading "C++ For Dummies" when someone came up
and asked me what I was reading. I told him I was reading a book about C++. He
responded, "Oh, HTML kicks C++'s @$$."
• Teacher: "You can't do spaces in HTML. If you see spaces on web pages, then
they must be using java to override basic HTML. Java saved the Internet,
because it removes limitations of HTML, but it's beyond the scope of this
course to show you how to do it."
• My Friend: "Yesterday, I reprogrammed my computer."
Me: "Okay...."
My Friend: "Not my Mac, but my PC. It has Windows Vista."
Me: "Yes, and what language did you use?"
My Friend: (pause) "English."
Me: "English?"
• My Friend: "Yeah, English."
I was the night-time operator for a university in the northern part of the state. We
ran our administrative jobs locally, and the students submitted their jobs to us. We
read their card decks into our IBM 370/115 which transmitted them to the IBM
370/165 at the capital which sent the results back to be printed. We then wrapped
the listing around the kiddies' card decks and put them out for them to pick up.
One evening a student was in the pickup area, looking at her listing, and crying. We
operators were not required to help students, but if we had some extra time, we
always did. I asked her what was wrong, and she said her program wasn't working
right. I took the listing and looked it over. It was the first exercise given to first
semester COBOL students. I saw nothing wrong with it. No compiler errors, no JCL
errors, and the printout from the run even looked correct. So I said, "I don't see any
errors."
At that point she let out a great wail and sob. "I know!" she cried. "That's the
problem!"
"Huh?" I said.
It turned out the instructor told the class what all instructors tell their classes for the
first computer program they ever write. "Don't worry about errors the first time you
submit your deck. People always get errors the first time."
Well, through some fluke of improbability, this girl managed to write a flawless
program and key it into the key punch flawlessly and got a flawless run the very first
time she tried it. The instructor told her to expect errors. She didn't get them, so she
thought she was doing something wrong.
I once worked for the IT department of a small manufacturing company. The new
Vice President of IT claimed that he had been a programmer for more than twenty
years prior. One time we were in a meeting with a software company we hired to
build our web site for us. As they explained that the web pages would be written in
HTML and Javascript, this VP stops them cold and says, "None of my guys here work
with any of that Javascript stuff! This is a SQL shop! I only want these web pages
written in SQL so we can support it ourselves!"
Rather than correct a man who'd been a programmer for twenty years, I sat there
with an amused look on my face for the remainder of the meeting. So did the people
from the software company.
Someone else's shell script I saw at work today was extensively commented,
including this gem of non-information.
export PATH # Export path
• User: "Hey, can you help me? My program doesn't work."
Consultant: "What is the problem? Are you using Turbo Pascal?"
User: "Yes, the program just blocks the machine."
Consultant: "Well, does it compile?"
User: "I don't know -- it just doesn't run. You see? There's the EXE file. If you run it, it
blocks the machine."
Consultant: "And where is your source, the PAS file??"
• User: "I wrote it and renamed it to EXE so it could run."
One thing that many will run into in the computer industry, is employers who are
rather clueless and yet don't necessarily realize this. In 1996, a friend told me about
a boss he had that needed a C program written for him. After a week, the boss
complained that the program wasn't done, and he asked my friend what was taking
so long.
• Friend: "The program is written, and I'm debugging it."
• Boss: "What's wrong with you people? You make programming more difficult
than it needs to be. I have Frontpage Express to write web pages with, and
when I write code with it, I never need to debug it. If you were as good of a
programmer as me, you'd never need to debug either."
I was making my way through MSDN, looking at Win32 API console functions to
make my own gotoxy() function in Visual C++ 6.0. My C++ programming teacher
looked at my screen and asked:
• Teacher: "What are you doing?"
Me: "I'm trying to find out how to make a gotoxy() in Visual C++. I'll have to use
Win32 API functions."
Teacher: "No you don't have to use API functions! Just take Borland C++ 3.1 headers
and put them in Visual C++ 6.0 include directory."
• Me: "Heuh......."
Unfortunately, Borland C++ 3.1 was designed for DOS and Win16. Visual C++ works
on Win32. Worse, headers only contain types and class declarations, defines, and
function prototypes. I don't know how my teacher thought this would work.
• Programmer: "What do you mean, I can't initialize things in an assert()?"
During a code review, when I asked why (besides the source control file headers)
there was not a comment in 240,000 lines of code which was getting handed over to
me for maintenance, the programmer replied, "I'm terse."
I found this comment in a program I was given to edit:
if x then
#if condition is true
[do something]
end if.
It literally said "if condition is true;" it wasn't an expansion on the significance of x.
I was helping a friend with some code. In the code, I found the line:
x = x;
and removed it. I made some further changes and send the code back to him. He
told me he still had errors. So he sent me his code again, and again I found the same
line. I asked him why he kept putting that in there, and he replied, "So x doesn't lose
its value."
One time a girl in my introduction to programming class told me that she hated
Microsoft and started using UNIX to compile her programs. Later on, she emailed me
and said she hated UNIX now, too, because it would compile her program but not
allow her to retrieve her data. So I asked her to send her code to me, and I would
take a look at it. I stumbled upon this:
int addandsubtract (int a, int b)
{
return (a + b);
return (b - a);
}
I asked her the purpose of this function, and she told me she wanted to first get the
sum of a and b and then get the difference. She didn't understand why this wouldn't
work, and it took me an hour or so to explain why.
I teach a C programming course. For one of the assignments, somebody once copied
a program verbatim from a fellow student who did the course two years before. He
did pay attention, though: following the updated course material, which said that
'main' should return an error code, he changed:
void main (...) { ... }
to:
int void main (...) { ... }
Needless to say, the program didn't even compile.
In college, I worked as a teaching assistant for an introductory programming
language. For most of the people in the class, this was probably their first and only
programming class.
One day, I was doing program code reviews with a handful of students. This one girl
gave me her code, and, after looking at it, I asked why she had repeated a certain
line twice:
let x = 7;
let x = 7;
She said, "Just in case it didn't get set right the first time."
When a computer professor asked his students to comment all their programs, he
got remarks like:
• "This program is very nice."
"This program is very difficult."
• "This program is very interesting."
I found this comment in some code I had to maintain:
/* This function is BOOL but actually returns TRUE,
FALSE and -2 because I've no time to change it
to int */
Didn't it take more time to write the comment?
When I was studying programming, one of my classmates was having serious
troubles with his program. When he asked me for help, I leaned over his screen and
saw all of his code in comments. The reason: "Well, it compiles much faster that
way."
In college I worked as a consultant. One day this grad student was having trouble
with his Fortran program and brought the printout to me. He said he kept changing
things but couldn't get it to run correctly. His analysis: "I get the feeling that the
computer just skips over all the comments."
I tutored college students who were taking a computer programming course. A few
of them didn't understand that computers are not sentient. More than one person
used comments in their Pascal programs to put detailed explanations such as, "Now I
need you to put these letters on the screen." I asked one of them what the deal was
with those comments. The reply: "How else is the computer going to understand
what I want it to do?" Apparently they would assume that since they couldn't make
sense of Pascal, neither could the computer.
I was taking an introductory programming course. One assignment was to do a little
payroll program, including some data validation. The program was supposed to
accept terminal input and send output back to either the console or a printer.
Suddenly the printer began spewing out paper like crazy. One of the students (a
particularly mouthy woman) had programmed a less-than-helpful error message
("YOU ARE WRONG") and then not provided any exit from the error-checking logic -the program just re-read the last (failing) input and re-tested it. All in all, it was a
very nice infinite loop.
After spitting through about fifty pages of "YOU ARE WRONG," somebody cut power
to the printer, and the instructor had to flush the print queue manually. He went
back to the student and asked if she had tested the program by sending the output
to the console before trying to print it, and she said, yes, she had tested it on the
console and ended up with a screen full of "YOU ARE WRONG" messages. Why, then,
had she sent her output to the printer? "I thought I would be daring!"
A colleague wrote the documentation for the return codes from a set of functions in
one of his DLLs. Among the documentation was this:
/* Return code=1: generic error condition
Return code=2: all other error conditions */
I was taking a C programming class once, and the class was divided up into two
programming teams. On my team we had a woman who was totally out of her
league. What earned her legendary status was doing a global search and replace,
swapping out asterisks for ampersands, because she felt the asterisks weren't
"working."
I was just teaching an optional class on C programming; in the first class meeting, I
asked, "Does anybody know anything about programming?"
To which one of my students gleefully replied, "I know how to use a chat program!"
I was asked to maintain a shell script that was taking too long to run and wasn't
reliable. Among other horrors, the one that gave me the best mix of laughter and
fear was a repeated construct like this:
display=`env | grep DISPLAY | sed 's/[^=]*=//g'`
DISPLAY=$display
export DISPLAY
This made me scratch my head for a moment, until I realized that this was a
complete no-op. It's equal to DISPLAY=$DISPLAY (except when thegrep command
pulls out the wrong thing). This was repeated for something like a dozen
environment variables. I still cannot fathom the logic of it. I ended up doing a
complete rewrite.
I was asked about taking on a contract to maintain a piece of software. Something
about the way it was presented made me wary. I asked to look over it first. What a
sight! I use it as an example of why not to use global variables. Among other things,
there were files with suites of functions on the following order:
adjust_alpha()
{
alpha = gamma + offset * 3;
}
adjust_beta()
{
beta = gamma + offset * 3;
}
Dozens of functions that differed only by the global variable they modified. Just
picture it: a multi-thousand line program with a graphical interface and a database
that never used function parameters.
The original programmer painted himself into a corner with his variable names.
Clearly if you need variables "up," "down," "left," and "right," you name them as
such. When he found himself needing those direction names in different parts of his
program but was stuck because global variable names had to be unique, his solution
was to use names like:
up, _up, up_, Up, uP, UP, _Up, _UP
down, _down, down_, Down, dOWN, DOWN, _Down, _DOWN
...and so on. Even the densest of my students comprehended immediately why that
was bad. Needless to say, I turned down the job.
While working on a programming project in highschool with a friend, I mentioned to
him that if he really wants to name his variables things like x, xx, andxx2, he should
at least put comments saying what they're used for.
The next time I looked over his shoulder, I saw this:
int x; // x is an int
Some years ago, a friend and I were jointly writing a game in C++. We were
repeatedly getting inexplicable access violation errors in a piece of code which
should have been rock solid. Eventually we found something like this, obviously left
over from a past debugging hack:
((class CNetwork *) 0x05af12b0)->Initialise();
It had gone unnoticed for a while because, out of sheer luck, all the builds we'd done
since that hack hadn't changed the address in memory of that particular instance of
CNetwork. Obviously we had eventually changed something which caused it to be
allocated elsewhere: cue major chaos. If anyone has heard of a dumber
programming practice than hardcoding a pointer, I'd like to see it!
This was found in code written by an ex-employee.
strcpy(vl_name,"00000000000000000");
strcpy(vl_volume,"000000");
strncpy(temp1,vl_lud,4);
temp1[4]='\0';
strncpy(temp2,vl_name+4,13);
temp2[13]='\0';
strcat(temp1,temp2);
strcpy(temp2,"");
sprintf(temp2,"%d",vl_serial_num);
temp1[7]='\0';
strcat(temp1,temp2);
strcat(temp1,"000000000");
temp1[8]='.';
strncpy(temp1,temp1,9);
temp1[9]='\0';
strcat(temp1,vl_data_set_name);
temp1[17]='\0';
strcpy(vl_name,temp1);
strcpy(vl_volume,"1");
My friend is a programming teacher at a local high school, where there are two
programming classes -- one taught by him and one by another teacher. Recently he
spent WEEKS preparing the major assessment that both classes would do, a large
assignment that the students would work on for the next few months.
As well as making the question sheet for the students, he also made an answer sheet
for the other teacher, so that she could familiarize herself with the assignment
before giving it to her class.
But this other teacher knows NOTHING about programming and wasn't able to tell
the difference between the question sheet and answer sheet, and so she wound up
photocopying the answer sheet and handing it out to every student in her class.
She no longer teaches programming.
This little bit of Java was written as part of a group project at university. The friend
who passed it to me has been bouncing off the walls about the quality of the guilty
party's code (silly things like defining error and success codes with the same value so
you don't know what the return code means and stuff like that), but this is the most
obviously stupid bit.
public int convertItoi(Integer v)
{
if (v.intValue()==1) return 1;
if (v.intValue()==2) return 2;
if (v.intValue()==3) return 3;
if (v.intValue()==4) return 4;
if (v.intValue()==5) return 5;
if (v.intValue()==6) return 6;
if (v.intValue()==7) return 7;
return 0;
}
Days ago I had to fix a bug into our software. The person that originally wrote the
module quit, so I had total control of the source code. I totally rewrote half of the
code when I found things like:
int i;
memset(&i, 0, sizeof(int));
And:
switch (k) {
case 9: printf("9\n");
case 8: if (k==8) printf("8\n");
case 7: if (k==7) printf("7\n");
// and so on...
}
I wondered why he put the "if" clauses, but then I noticed that none of the cases has
its "break" statement, so if he found that if k was 9, the program printed 9, 8, 7, etc.
So I think he added the "if" clauses to fix that behavior.
The masterpiece, however, was the following, where two consecutive errors actually
caused the program to work fine:
char msg[40];
unsigned char k,j;
memset(msg, 0, 41); /* to set the terminator */
j = k;
...
Of course the "memset" was supposed to reset the msg variable, but it actually also
reset k, for which no initialization was provided; could be a deliberate if hackish and
unreliable solution, but that "set the terminator" comment gives it away. In fact, all
over his code he managed to add one for the "terminator," one byte past the end of
the character array he was working on.
About four years ago, I was working on a project that, among other things, involved
porting several million lines of code. While not technically real-time, the code
needed to be reasonably fast. At one point, I found the following gem:
unsigned long reverse(unsigned long theWord)
{
unsigned long result = 0;
int i;
for (i = 0; i < 32; ++i) {
if (theWord & (unsigned long) pow(2.0, (double) i))
result += (unsigned long) pow(2.0, (double) (31 - i));
}
return result;
}
Obviously, the purpose was to reverse the bits in a word. Naturally, I called all of my
colleagues over to see this, and we all marvelled at how someone would think that a
conversion to floating-point, a function call, and a conversion to integer could be
faster than one shift operation. To say nothing of the possibility of rounding errors
completely screwing up the, um, algorithm.
Not wanting to leave an exercise for the reader, here's the replacement:
unsigned long reverse(unsigned long theWord)
{
unsigned long result = 0;
int i;
for (i = 0; i < 32; ++i) {
if (theWord & (1 << i))
result += 1 << (31 - i);
}
return result;
}
An introductory programming student once asked me to look at his program and
figure out why it was always churning out zeroes as the result of a simple
computation. I looked at the program, and it was pretty obvious:
begin
readln("Number of Apples", apples);
readln("Number of Carrots", carrots);
readln("Price for 1 Apple", a_price);
readln("Price for 1 Carrot", c_price);
writeln("Total for Apples", a_total);
writeln("Total for Carrots", c_total);
writeln("Total", total);
total := a_total + c_total;
a_total := apples * a_price;
c_total := carrots + c_price;
end;
• Me: "Well, your program can't print correct results before they're
computed."
• Him: "Huh? It's logical what the right solution is, and the computer should
reorder the instructions the right way."
At my previous job, we were porting a UNIX system to Windows NT using Microsoft
VC++. A colleague of mine, that was in the process of porting his portion of the code,
came to me, looking really upset.
• Colleague: "Hey! I hate these Microsoft guys! What a rotten compiler! It only
accepts 16,384 local variables in a function!"
I ran across this gem while debugging someone else's old code once:
if (value == 0)
return value;
else
return 0;
I found this buried in our code somewhere:
if (a)
{
/* do something */
return x;
}
else if (!a)
{
/* do something else */
return y;
}
else
{
/* do something entirely different */
return z;
}
I had a probationary programmer working for me. Needless to say, he never got to
be permanent. One day I was inspecting his C code and found this:
if ( a = 1 ) {
...some code...
} else {
...some other code...
}
I told him the "else" clause will never get executed because of his "if" statement. I
asked him to figure out why. He said he'd "investigate" it first. I allowed him to
"investigate," since it had not been a critical task.
A day later, he told me he figured out the problem. He said he used an incorrect
operand in the "if" statement -- it should have been == instead of =, which was
absolutely correct. But then he emailed me his revised code.
a = 1;
if ( a == 1 ) {
...some code...
} else {
...some other code...
}
What the...?
I asked him if the "a = 1" part was necessary and not just a fragment of debug code
he forgot to remove. He said it was necessary. So I asked him if the "else" statement
would ever be executed. He said yes. I asked him to give me a situation when such
would occur. He said he'd get back to me with the explanation.
I kicked him out of the project that same afternoon.
Once I ran across code that did this to test the i-th bit in a byte-wide value:
if (value && (int)pow(2,i))
{
...
}
Digging in the code a colleague wrote years ago, I found the following:
EndWhile = 0;
while (EndWhile == 0)
{
...
if (index < MAX)
EndWhile = 0;
else
EndWhile = 1;
index = index + 1;
}
Years ago, I put a simple, fortune cookie style program out on an FTP site. It was too
simplistic to look at environment variables or configuration files to look for the
location of the fortune cookie database file; the path was compiled into the
executable. I provided the source, so if you wanted to change the path it was
installed in, you had to change it in the source file and recompile.
Since I put it out, every so often I'll get an email message commenting on it.
Recently, I received a message asking for help trying to get the thing to work. He
couldn't get the executable to find the database file properly. I answered him, and
he mailed back saying nothing helped. I mailed him again, saying that the readme file
which was included in the archive should have very detailed instructions. He mailed
me back saying the readme file didn't help him. So he mailed me the source code
file, asked me to change it to the way it should be, then mail it back to him. I told
him, but as I was typing in my final reply, a horrific thought occurred to me. So I
asked:
• Me: "I assume you have a C compiler, right?"
• User: "What's a C compiler??????/ I've been editing it using the DOS editor."
I was working for a consulting firm that was called in to help another firm that was
doing some fairly important UNIX work for a large Wall Street firm. They were all
Mac programmers that had taken a week long course in UNIX, C programming, and
UI programming for this particular workstation. I took a look at their C code and it
was littered with the following code statement:
strcat(string,"\0");
I asked why they were doing this. The reply was, in a "don't you know?" tone of
voice: "All strings in C must end in a null zero!"
Trying to explain that strcat wouldn't work unless the null terminator was there
already just got me blank stares.
I've seen this code excerpt in a lot of freeware gaming programs for UNIX:
/*
* Bit values.
*/
#define BIT_0 1
#define BIT_1 2
#define BIT_2 4
#define BIT_3 8
#define BIT_4 16
#define BIT_5 32
#define BIT_6 64
#define BIT_7 128
#define BIT_8 256
#define BIT_9 512
#define BIT_10 1024
#define BIT_11 2048
#define BIT_12 4096
#define BIT_13 8192
#define BIT_14 16384
#define BIT_15 32768
#define BIT_16 65536
#define BIT_17 131072
#define BIT_18 262144
#define BIT_19 524288
#define BIT_20 1048576
#define BIT_21 2097152
#define BIT_22 4194304
#define BIT_23 8388608
#define BIT_24 16777216
#define BIT_25 33554432
#define BIT_26 67108864
#define BIT_27 134217728
#define BIT_28 268435456
#define BIT_29 536870912
#define BIT_30 1073741824
#define BIT_31 2147483648
A much easier way of achieving this is:
#define BIT_0 0x00000001
#define BIT_1 0x00000002
#define BIT_2 0x00000004
#define BIT_3 0x00000008
#define BIT_4 0x00000010
...
#define BIT_28 0x10000000
#define BIT_29 0x20000000
#define BIT_30 0x40000000
#define BIT_31 0x80000000
An easier way still is to let the compiler do the calculations:
#define BIT_0 (1)
#define BIT_1 (1 << 1)
#define BIT_2 (1 << 2)
#define BIT_3 (1 << 3)
#define BIT_4 (1 << 4)
...
#define BIT_28 (1 << 28)
#define BIT_29 (1 << 29)
#define BIT_30 (1 << 30)
#define BIT_31 (1 << 31)
But why go to all the trouble of defining 32 constants? The C language also has
parameterized macros. All you really need is:
#define BIT(x) (1 << (x))
Anyway, I wonder if guy who wrote the original code used a calculator or just
computed it all out on paper.
When I was still a student, I worked as an admin for the university CS dept. Part of
this job involved time in the student labs. Our network was a conglomeration of Suns
and SGIs and was generally confusing for novice users who don't understand the
concept of multiuser, multitasking, networked computers.
Around the room are large signs explaining how to log in, along with big warnings
about not removing power unless you like the idea of having a grad student running
a several million variable modeling project he's been working on for several years
show up and beat you death with research papers.
You would be amazed how many people try to type in a program at the "Login:"
prompt, and then turn the machine off when they are done. The worst of the bunch
then complain about not being able to find the program they just typed in at the
login prompt.
I was looking through a shell script I had written recently, and I almost died when I
saw some of the code. I'm embarrassed to admit it, but here's one thing I had done:
if ($var = value) then
# do something
else
# do the exact same thing as in the other code
endif
While in college, I used to tutor in the school's math lab. A student came in because
his BASIC program would not run. He was taking a beginner course, and his
assignment was to write a program that would calculate the recipe for oatmeal
cookies, depending upon the number of people you're baking for. I looked at his
program, and it went something like this:
10 Preheat oven to 350
20 Combine all ingredients in a large mixing bowl
30 Mix until smooth
.
.
.
A "software engineer" I used to work with once had a problem with his code that
looked something like this:
a_pointer->fn();
It caused a General Protection error. He knew C, but not C++ -- I did, so he asked me
for help. I told him to check to see if the pointer was NULL before making the call. A
couple of hours later he came back; the problem was still happening.
if (a_pointer == NULL)
{
LogError();
}
a_pointer->fn();
I said, "You need a return statement after the LogError call."
He said, thoughtfully, "Where does it return to?"
A friend of mine wanted to keep track of the other users on the UNIX systems of our
university. There is a nice command "last" on UNIX which will list the last users to
have logged in. So he wrote a script that'd log in to all workstations of the
department by remote shell and run the "last" command, with the results sent back
to the originating host, to be collected in aggregate form.
He called this little script "last" -- same name as the UNIX system command -- and
put it in his home directory. His path was set up so his home directory had a higher
precedence than the UNIX bin directories. So when he ran the "last" command, it
would use his own script instead of the system command.
So he ran the script. It logged in to all the other workstations just fine. Then it ran the
"last" command -- the one in his home directory, of course, not the system
command. You can guess what happened. It got in an infinite loop that tried to log
into every workstation an infinite number of times. This very effectively nuked off
the whole department, and all workstations had to be shut down for it to stop.
One of our customers, a major non-US defense contractor, complained that their
code ran too slowly. It was a comedy of errors.
Act I
• Contractor: "Can you make our code run faster?"
Tech Support: "Yes, but we have to take a look at it."
Contractor: "We can't, the code is classified."
Tech Support: "Can you explain to me what your code is doing?"
Contractor: "No, that's classified."
Tech Support: "Can you tell us what functions you use?"
• Contractor: "No that's classified."
Act II
So, on a hunch, we sent them the latest version of our software for Windows NT.
• Contractor: "Why is this running faster on our 800MHz Pentium than on our
VAX?"
Tech Support: "When did you buy that VAX?"
• Contractor: "Some time in the late 1980s."
Chapter 9 - Thank You
I would like to say thank you to all my readers.
better and fully express my feelings.
Let me speak in Tagalog so that I can
Salamat sa lahat ng bumasa ng simpleng nobela na ito. Pasensya na rin sa mga
maling grammar sa ingles pero ginawa ko na ang lahat ng makakaya ko para isulat yun
wikang ingles. Nagpapasalamat din ako sa internet dahil binigyan nya ako ng sapat na
impormasyon para makompleto ang nobelang ito. At syempre sa aking profesor na si Sir
Paul Pajo dahil sa ginawa nyang pag tulis sa aking kaalaman tungkol sa etika at marami
pang iba sa mga bagay na napaintindi nya sa aming mga estudyante. Ginagalang ko sya
dahil maraming estudyante ang natuto sa kanya hindi naman sa pag sip sip sa prof ko.
Para sakin pag dating sa mga aral sa gobyerno sa loob ng silid aralan ang masasabi ko
lang ay talagang napakahusay nya... maraming salamat Sir Paul.
Syempre para din sa mga tao sa paligid ko at sa mga kaklase ko na nag bigay ng ideya
kung pano ko uumpisahan ang nobelang ito salamat sa mga brainstorming nyo dahil
naging mabuting simula un nang pag gawa ng isang nobela. Sa girlfriend ko salamat
sa lahat ng tulong at sa pag iintindi sa akin. Marami kang bagay na nagawa para
matapos ang nobelang ito. Sa totoo lang sumuko na talaga ko sa pag gawa ng librong
ito pero nan dahil sa kanya ginanahan ako at sya ay isa sa aking inspirasyon.
Maraming salamat mahal kong Janina.
Sa mga magulang ko salamat din po dahil kayo ang nag hubog sa akin at salamat din sa
pagpapaaral sa akin sa magandang eskuwelahan. At sorry kung minsan
nagkakabagsak ako na grado. Hindi naman ako nag kukulang, sadyang ganun lang
talaga siguro kaya ng utak ko. Salamat din po sa pagbigay ng pang print sa nobelang
ito. Naging malaking tulong po iyon hahaha.
Syempre gusto ko din pasalamatan sarili ko. Salamat Aaron, sa effort at isang
malaking karangalan ang binigay mo sa pag susulat ng nobelang ito.
Nais ko din magpasalamat sayo cybercrime law dahil kung hindi dahil sa batas na ito
hindi ako magiging interesadong magsulat ang “Nobelang” ito. Salamat po. Pero
anti cybercrime po ako ah. Hahaha...
At higit sa lahat nais kong pasalamatan si God dahil si God ang dahilan kaya ako
nabubuhay sa mundong ito, pero God alam mo namang madasalin ako sa Inyo, hindi
ako nagkukulang na bumulong sa Inyo, actually nga po gabi gabi ako tumatawag eh.
Maraming salamat po.
Thanks for reading my story.
TO GOD BE THE GLORY!
MABUHAY PO TAYONG PILIPINO!
TAGALOG
VERSION
Tunkol sa Author
Ang pangalan ko ay Aaron John C. Almeda, ang isang mag-aaral ng De La Salle College
of Saint Benilde. Ako ay sumulat ng isang simpleng nobelang tungkol sa kung paano
cyber krimen batas ay umiiral sa ito taon 2012. Pagiging isang mag-aaral ng
Impormasyon ng System, natutunan ko ng maraming mga bagay sa pamamagitan ng
paggamit ng internet. Uhum, sa pamamagitan ng ang paraan ipaalam sa amin laktawan
sa na pinsan Hindi ako sa bahagi o sa katawan ng nobelang ito. Pa Rin sabihin pumunta
sa aking pamilya background: aking ina ay isang negosyante habang ang aking ama ay
isang retiradong pulis. Ako ang bunso sa aming pamilya, at mayroon akong isang
kapatid na lalaki at isang kapatid na babae. Alam ko para sa aking sarili na ako
sumusulat ang nobelang ito dahil sa kanila, ang aking pamilya, na aking inspirasyon.
Well, ito ay hindi para sa kapakanan ng pagpasa IT Etika, kaya sabihin makapagsimula,
sapat na para sa.
Tagalized Version
Chapter 1
Ano ang cybercrime batas? Well ayon sa Wikipedia, Cybercrime Prevention Act ng 2012
- Ang Cybercrime Prevention Act ng 2012, opisyal na naitala bilang Republic Act No.
10,175, ay isang batas sa Pilipinas naaprubahan sa 12 Setyembre 2012. Naglalayong
matugunan ang mga legal na isyu tungkol sa mga online na pakikipag-ugnayan at ang
Internet sa Pilipinas. Kabilang sa mga pagkakasala ng cybercrime kasama sa kuwenta
cyber pag-squat, cybersex, child pornography, pagnanakaw ng pagkakakilanlan, ilegal
na pag-access sa data at libelo. Ito ang kahulugan ng cyber krimen batas - salamat para
sa tulong ng Wikipedia. Kaya, hulaan ko ang batas ay malinaw na ngayon sa iyo dahil
bilang maaari mong makita, ang kahulugan ay lubos na malinaw at kitang-kita na
maaari mong madaling maunawaan sa pamamagitan ng pagtingin dito. Ngayon, ipaalam
sa amin simulan ang tunay na nobelang, bilang isang manunulat ng nobelang ito, ako
sabihin sa iyo tuwid na may dalawang (2) uri ng mga tao sa mundo na nag-iisip tungkol
sa cyber krimen batas? Ay isa sa pro-cybercrime at pangalawang ang anti-cybercrime
batas. Kaya, ako sabihin sa iyo ngayon sa puntong ito na hindi ako sa pabor ng batas na
ito. Gusto mong malaman kung bakit? Dahil ito ay simple, ako sabihin sa iyo ang
kasagutan: cybercrime ay masama sa katawan dahil ito ay mga panuntunan kung ano
ang gagawin. Sa pamamagitan ng kung ano ang gagawin dito ay aking simpleng
paliwanag para sa na, uhm ... namin ang lahat ng malaman na ang ilang mga tao ay
pro-cybercrime, at hindi namin maaaring hatulan sa kanila dahil na kung ano ang sa
tingin nila tungkol sa batas. Ngayon, sabihin pumunta sa iba pang mga bahagi, ang
anti-cybercrime uhm sa gilid ng batas .. na rin doon ng maraming mga bagay na maaari
naming gawin sa internet sa? At talaga namin lahat alam na internet ay isang
napaka-kapaki-pakinabang na bagay sa aming mga araw dahil maaari naming
makipag-usap, ginawa namin exchange ng mga ideya, o maaari naming labanan sa
pamamagitan ng paggamit ng internet. Para sa akin ang pagiging praktiko ng batas ng
cybercrime ay lamang ng isang sakit sa asno dahil maraming mga tao ang magdusa
mahirap na oras sa batas na ito. Halimbawa, ako gamit sa internet ngayon ngunit Hindi
ako malaman ng batas na ito, samakatuwid hindi ko anumang mga ideya na lumabag ko
na isang bagay at ako naaresto at magdusa ng 12 taon sa bilangguan? Tingnan! na ang
isa ay kalunus-lunos ngunit ang iba pang mga tao sa tingin naiiba tungkol sa batas: para
sa kanila ang batas na ito ay mabuti. Ngayon hayaan mo akong pumunta sa mahusay na
bahagi ng batas. Tingin ko may mga ilang mga bagay na ang batas ay unang walang
makakakuha ng paglaban sa uhm internet pangalawang walang pinapayagang magsalita
ng masamang salita o panliligalig gamit ang networking at blog, sila ay maging mas
malubhang in gamit ang internet at sa pamamagitan ng na oh maghintay Nakalimutan ko
ang isang bagay na upang sabihin sa tingin ko isa ng magandang dahilan kung bakit
cybercrime na batas ay pagsasabatas bilang isang batas ay dahil sa kapakanan pulitika.
Isipin kung ako ay isa ng ang mga aktibista paano ko labanan laban sa pamahalaan? Ay
ko bang gamitin ang baril o tabak o anumang kung gusto ko upang labanan ang mga ito?
Ko sa halip gamitin ang tangke at sirain ang mga ito. Oh! Ako kidding ... Lang ako sa
mga nakakarelaks aking sarili habang pagsulat ito nobelang. Ok, bumalik sa malubhang
mode ito bilang isang mahusay na palaisip sabihin sa akin kung paano upang labanan sa
mga tao sa gobyerno? Mayroon ba kayong ng ideya? Well, ito araw cybercrime ay
talagang naaprubahan ngunit ano ang mga kahihinatnan? - Na ang mga tao ay
kailangang magdusa? Narito ang isang halimbawa: isang senador ay masamang bagay,
kung paano sabihin mo sa iyong mga damdamin sa senador na kung alam mo na ang
cybercrime batas ay doon? Tingin ko ako ay tumawag sa iyo ng mabaliw sa kung kang
pumunta sa Senado at sigawan doon na hindi ka sa tamang track Mr Senator! Ngunit
kung gagawin mo ito online siguro makikita mo sa bilangguan 12 taon. Kaya bilang
isang normal na mamamayan kailangan mo lamang sa tahimik at umupo at maghintay
para sa kanila na gawin ang naturang bagay na sirain ang bansa. Tingnan ang ... na ang
isa ay talagang masamang mag-isip ng, ngunit narito ang isang bagay, sa pamamagitan
ng oras na ito marahil ilang mga tao na maaaring pag-atake sa pamahalaan ang mga
hacker ngunit hindi lahat ng mga tao ay maaaring Hack isang sistema. May ilan sa mga
ito na maaaring gawin ito. Kaya sa puntong ito talagang ako pieced off bakit
pagsasabatas nila ito uri ng batas? Kailangan ko talagang isang pagkakataon ngayon
upang makapagpahinga. Ako tapusin ang unang kabanata dito at habang nag-iisip para
sa susunod na kabanata Gusto kong pasalamatan ang Wikipedia tungkol sa kahulugan
ng cybercrimeshit oh ibig sabihin ng i batas.
Tagalized version
Chapter 2
Hindi ko alam kung bakit ko ginawa ito kabanata, ngunit ang isang bagay ay para
siguraduhin na ito ay bahagi ng batas. Dahil alam namin ang lahat ng na ang paggamit
ng internet, maaari kaming magkaroon ng sekswal na pagnanais ngunit alam ko may
ibang bahagi ng batas na saklaw ang isang ito at ito ay tinatawag na cyber sex. Pinili ko
ang kabanata na ito dahil gamit ang cyber sex din ang lumalabag sa batas ng
cybercrime. Oh ... maghintay hayaan mo akong magdagdag ng mga paliwanag ano ang
cyber sex. Kailangan ko upang maghanap sa na para sa higit pang-unawa. Hayaan
akong gamitin ang internet para sa pagkuha ng pinagmulan ng cyber sex. Ok dito kami
Cybersex, tinatawag din na computer na kasarian, kasarian ng Internet, netsex, mudsex,
TinySex at, colloquially, cybering o conversex ay isang virtual na makaharap ng sex
kung saan ang dalawa o higit pang mga tao na nakakonekta sa malayuan sa
pamamagitan ng computer na network magpadala ng bawat iba pang tahasang sekswal
na mensahe na naglalarawan ng sekswal na karanasan. Sa isang paraan, ito pantasiya
sex ay nagagawa sa pamamagitan ng mga kalahok na naglalarawan ng kanilang mga
pagkilos at pagtugon sa kanilang mga chat kasosyo sa karamihan nakasulat sa form na
dinisenyo upang pasiglahin ang kanilang sariling mga sekswal na mga damdamin at
fantasies.
[1] Cybersex minsan may kasamang tunay na buhay masturbesyon. [2] Ang kalidad ng
isang makaharap ng cybersex karaniwang depende kapag mga kalahok 'kakayahan
upang pukawin ang isang matingkad, visceral larawang-diwa sa isip ng kanilang mga
kasosyo. Din critically mahalaga ang imahinasyon at suspensyon ng kawalang-paniwala.
Cybersex maaaring maganap sa loob ng konteksto ng mga umiiral na o kilalang-kilala
na relasyon, halimbawa kabilang sa mga mahilig na heograpiya ng kuwit, o kabilang sa
mga indibidwal na walang paunang kaalaman ng isa't isa at matugunan sa virtual na
espasyo o cyberspaces at maaaring kahit na mananatiling anonymous na sa isa't isa. Sa
ilang cybersex konteksto ay pinahusay sa pamamagitan ng paggamit ng isang webcam
upang magpadala ng real-time na video ng kasosyo.
Mga Channel na ginagamit upang pasimulan cybersex hindi kinakailangang
eksklusibong nakatuon sa paksa na, at kalahok sa anumang Internet chat ay maaaring
biglang makatanggap ng mensahe sa anumang posibleng variation ng teksto "Gusto
cyber?", "Gusto cam?" o ng isang kahilingan para sa "C2C" / "C4C" ("cam sa cam" at
"cam para sa cam", ayon sa pagkakasunud-sunod).
Cybersex ay karaniwang gumanap sa mga kuwarto ng chat sa Internet (tulad ng IRC,
talkers o web chat) at sa instant messaging system. Maaari rin itong maisagawa gamit
ang webcam, voice chat system tulad ng Skype, o online na laro at / o virtual mundo
tulad ng Second Life. Ang eksaktong kahulugan ng cybersex-partikular, kung ang
real-buhay masturbesyon ay dapat na nagaganap para sa online sex gawa upang
mabilang bilang cybersex-up para sa debate. [3] Ito rin ay medyo madalas sa mga online
na papel-paglalaro ng mga laro, tulad ng MUDs at MMORPGs, bagaman sa pag-apruba
ng aktibidad na ito ay nag-iiba-iba lubos na mula sa laro sa laro. Ilan sa mga online na
panlipunan mga laro tulad ng Red Banayad Center ay nakatuon sa cybersex at iba pang
mga pag-uugali ng pang-adulto. Mga online na laro ay madalas na tinatawag na
AMMORPGs. Sa iba pang mga laro ng mas malawak na MMORPG genre, ng Sanayan
sa mula sa malawak na tinanggap sa punto ng mga Masters ng laro / moderator pagkuha
bahagi, tulad ng sa Final Fantasy Online [pagsipi kailangan], moderated batay sa mga
ulat ng manlalaro, bilang sa World ng Warcraft [pagsipi kinakailangan], sa kapaligiran
para sa isang suspensyon mula sa pag-play o isang permanenteng pagkakatapon, sa Eba
Online at anarkya Online [pagsipi kailangan].
[4] Cybersex ay maaari ring nagagawa sa pamamagitan ng paggamit ng mga avatar sa
isang kapaligiran ng multiuser software. Madalas Ito ay tinatawag na mudsex o netsex sa
MUDs. Sa TinyMUD variant, lalo MUCKs, ang salitang TinySex (TS) ay
napaka-karaniwang [5] Kahit na ang text-based cybersex sa kasanayan para sa mga
dekada, [6] ang mas mataas na popularidad ng mga webcam ay itinaas ang bilang ng
mga kasosyo sa online gamit ang two-way koneksyon video sa "ilantad" ang kanilang
mga sarili sa bawat isa online-pagbibigay gawa ng cybersex ng isang mas visual na
aspeto. Mayroong isang bilang ng mga tanyag, komersyal na mga website sa webcam na
nagbibigay-daan sa mga tao sa lantaran magsalsal sa camera habang ang iba ay
panoorin ang mga ito. [7] Paggamit ng mga katulad na site, mag-asawa ay maaari ring
isagawa sa camera para sa kasiyahan ng iba.
Cybersex naiiba mula sa kasarian ng telepono na ito ay nag-aalok ng isang mas mataas
na antas ng pagkawala ng lagda at nagbibigay-daan mga kalahok upang matugunan ang
mga kasosyo mas madali. Isang magandang deal ng cybersex maganap sa pagitan ng
mga kasosyo na lamang matugunan online. [Pagsipi kailangan] Hindi tulad ng telepono
sex, cybersex sa chat room bihira komersyal. Sa online na mundo tulad ng Second Life at
sa pamamagitan ng webcam-nakatuon serbisyo chat, gayunpaman, Internet sex
manggagawa-ugnayan sa cybersex sa exchange para sa parehong virtual at real-buhay
pera. [8]
Ngayon medyo malinaw alam mo na ngayon kung ano ang cyber sex. Ipaalam sa akin
salamat muli ang aking friendly na internet para sa pagbibigay ng sagot na ito, Salamat
muli Wikipedia.
Hayaan akong gumawa ng isang kuwento tungkol sa dalawang mga batas. Ako ay
magkaisa ang dalawang mga batas sa isa. Sa ganitong uri ng mga sitwasyon may
masamang bagay at mahusay na mga bagay na ito. Mong Gusto mo bang malaman kung
bakit?
Ok, magsisimula kami na ang sitwasyon ng masamang bahagi. Halimbawa, mayroon
kaming tatlong character, dalawang batang babae at lalaki edad 20 at sa itaas. Hayaan
ang tingin sa akin kung ano ang kong tumawag sa laro. Ako pakikipag-usap na may mga
pangalan nang karakter uhm ok nagpasya kong ang pangalan ng tao ay Bong at siya ay
isang mag-aaral sa kolehiyo sa isa ng ang pinakamahusay na mga unibersidad sa
Maynila. Kanyang libangan ay maglaro ng basket ball at mag-hang out kasama ang mga
kaibigan. Ako ok na ang pangalan ng tao Bong. Ngayon sabihin pumunta sa isa ng ang
mga batang babae. Ano ang pinakamahusay na pangalan na demanda para sa batang
babae? Hayaan ang tingin sa akin tungkol dito ahm .. Ko ito batang babae kaibigan ng
Bong kaya kung ano pangalan demanda para sa kanya. Ok ako nagpasya na na ako ay
tumawag ang kanyang Beng. Beng ay isa ng ang pinakamahusay na player ng volleyball
at nagmamahal siya basketball player na kasintahan na suit sa bawat isa, ang mga ito ay
parehong parehong player sa unibersidad. Ngayon ay mayroon akong isa pang karakter
kaliwa at pa rin ang isang batang babae at ang kanyang trabaho sa kuwento para sa
masamang bahagi. Kaya ipaalam sa amin tumutok sa mga dalawang, lalo Bong at ang
hindi kilalang babae. Hindi ko magkaroon ng isang pangalan para sa kanyang ngunit
ibig sabihin habang ako ay isipin ang tungkol dito kaya sabihin simulan ang masamang
bagay sa kabanata na ito.
Bong ay isang masaya tao at nais niya na ang mga kaibigan sa mga tao na may night
life. Sa maikli, siya gustong upang matugunan ang mga batang babae o mga kaibigan sa
club o party o kahit saan. Isang gabi Bong napunta sa isang partido sa kanyang mga
kaibigan at lahat ng guys sa grupo kani-kanilang mga kasosyo. Hindi ako sinasabi Bong
pangit sa kuwento, ngunit siya ay hindi interesado sa lamang simpleng kagandahan, siya
ang may gusto bang medyo batang babae na ay angkop sa kanyang panlasa. Ngayon
habang nasa club ang kanilang grupo pagkakaroon ng masaya sa kani-kanilang mga
kasosyo, ngunit Bong tila wala sa lugar dahil siya ay nag-iisa. Hindi siya kasosyo. Ang
ilan ng mga batang babae sa grupo ay interesado sa kanya, ngunit Bong tumangging sa
kanila dahil siya nirerespeto ng pagkakaibigan, hindi siya ay nais upang sirain ang
pagkakaibigan sa pamamagitan ng mga batang babae, kaya ang grupo ay patuloy sa
pagkakaroon ng masaya. Pagkatapos ng isang oras, may napansin Bong pag-inom
mag-isa sa isang ikot talahanayan, at siya ay kaya messed sa mga batang babae sa
kanyang lugar at sinabi, "hey ikaw ay hindi sa isang tao? Ay hindi mo? "Batang babae
ang magtanong. Bong ay talagang magulat sa kung ano siya ay nakikita sa kanyang
dalawang lasing nang bahagya mata, siya Nakakuha masindak para sa hindi bababa sa
dalawang segundo at napagtatanto na ito ay ang uri ng batang babae na gusto niya, na
sa kanya ang lahat ng gabi Bong sinabi sa kanyang sarili. Ngayon babae sinabi, "hey
guwapo may lasing nang bahagya mata ang maaari kong umupo sa tabi mo? Gusto kong
samahan ka. "Bong ay talagang magulat pagdinig na sisiw nais upang manatili sa
kanyang tagiliran. Bong sinabi, "sigurado kung bakit hindi!", At siya smiled. Bong threw
isang magsisti, "hey marahil ang iyong kasintahan ay makakakuha ng galit, siguro siya
kukunan ako kapag siya nakikita mo sitting sa tabi akin." At ang babae ang laughed at
sinabi, "hindi mo ito nakakatawa, hindi ako dapat na dito kung mayroon akong
kasintahan ng samahan sa akin kanan? Bong smiled at sinabi, "sa pamamagitan ng ang
paraan na sa iyo ngayong gabi? ikaw ay may isang pangkat o lahat ng nag-iisa sa
ganitong uri ng lugar? "babae Ang sumagot," ako nag-iisa, lamang pagkakaroon ng
masaya in dito. Palagi kong gawin ito, umaasa upang mahanap ang isang tao na tulad
mo. ", At babae ang smiled Bong. Bong tumugon sa kanya, "nagsasagawa ka sa akin"
bola "ah at maririnig na tumawa, upang maaari kong mag-alok sa iyo ng isang inumin?
kung ano ang gusto mo? "Bong magtanong. Batang babae ang tumugon, "kung ano ang
mayroon ka doon?" Bong sumagot, "Mayroon akong dito 6 na bote ng beer, huwag ka
uminom ng beer?" Tinanong siya sa batang babae. "Oo uminom ako ng beer," sinabi ang
mga batang babae na may isang ngiti. At sa gabing iyon na sinimulan nila ang
pakikipag-usap sa bawat isa para sa 3 oras, at Bong ay tinatangkilik ang gabi na may na
batang babae. At bago sila umalis sa lugar nagtanong siya tungkol sa bilang. Bong
sinabi, "maghintay bago pumunta ka, maaari kong tanungin ang iyong pangalan at
maaari mong sabihin sa akin ang iyong numero." Batang babae ay hindi mag-atubiling
at sabihin ok bang tingin ko hindi mo mapagkakatiwalaan, at ako pagpunta upang
gumawa ka ng aking chatmate o textmate ", sinabi babae. Bong tumugon, "ok dito ang
aking cellphone, i-save ang iyong pangalan at ang iyong numero at din ang iyong email
address sa i-save ang lahat ng mayroon ka." Pambabae sinabi, "ok masamang gawin
ito." Pagkatapos nito kapag ang dalawang bagong nahanap na mga kaibigan sa pagkuha
ng malaman ng bawat isa na numero ng contact, batang babae ay umalis agad sa lugar.
Habang Bong ay check sa kanyang cellphone sa Tex sa batang babae. Habang texting
maisasakatuparan niya na ang pangalan ng babae ay napaka matamis, ang pangalan ay
Candy. Bong smiled at texted Candy hey nakuha ang iyong numero at paki-save ang
minahan gusto mo i teksto akin kung natanggap mo ang mensaheng ito. At ang dalawang
kaibigan paggawa ng sama-sama ng mga text na mensahe. Pagkatapos ng ilang linggo
pa sila ay texting bawat isa.
Pa rin pagkatapos ng isang buwan ng pag-alam sa bawat iba pang mga texting at texting
sa isa't isa. At ang mga puntos ay dumating na ang kanilang hindi nasiyahan sa teksto ng
bawat isa Candy Humihingi Bong na tumawag sa kanya sa Skype kaya pagkatapos
makita ang bawat isa habang pakikipag-usap. Bong tumugon ok kendi ay i tawagan ka
kapag nakakuha sila upang makipag-usap sa bawat isa at ring makita ang bawat iba
pang mga mukha Bong sinabi hey tiningnan mo maganda sa iyong mga pajama at kendi
sunog bumalik at tumingin ka ng higit pa sa isang tao na sando. Sa gabing iyon ang
kanilang kaugnayan sa isa't-isa ay nakakakuha ng mas malakas. Ngunit Candy sinabi,
"hey Bong maaari naming tulad ng ito sa lahat ng oras, walang commitment at walang
pag-ibig dahil ako matakot na hindi kabit-kabit sa iyo, kaya mangyaring bigyan ang
aking kahilingan. Bong sinabi ok Candy kung ano ang gusto mong.
Sa na sitwasyon ng kuwento kung saan na magsara ngayon sa masamang bagay ng
kautusan ng cybercrime at may cybersex din upang ipaalam sa akin na ipagpatuloy ang
kwentong ito ng Bong at Candy. Ngunit maghintay nang 02:00, pakiramdam ko inaantok
ang kuwento at gusto ko pa rin patuloy ngunit ang aking isip ay hindi pagtugon, kaya
hayaan mo akong kunin ang mga kuwento in dito, siguro ay ako patuloy bukas kapag
gisingin ko up. Kaya mga mambabasa na kailangan mong matulog ng maaga, ok,
goodnight. Ihinto ang pagbabasa sa susunod na bahagi lang pahinga o pagtulog ... lol ....
Ang masamang bagay tungkol sa kabanata simulan dito. Bago pumunta ka dito
ipagbigay-refresh sa akin ang aking mga alaala tungkol sa kung ano ang ko sinulat ni
kagabi. Na rin sila ipinangako sa bawat isa sa pamamagitan nang hindi umaalis sa
sinuman. At dito ang kuwento naging ... pagkatapos ng isang linggo, parehong sa kanila
pa rin ang pagtawag sa bawat isa at hindi sila nag-aaksaya ng oras para sa
pakikipag-usap at nakapako isa't isa. Bong mapansin kendi na mas prettier, at kaya siya
ay naaakit sa kanya. Bong pinapapasok sa Candy na siya maaaring mahulog sa pag-ibig
sa kanya. Kendi sinabi,'' hey mayroon ka nang nakalimutan aming ipinangakong. "Bong
sinabing," hindi, ako na nagsasabi sa katotohanan Candy. "Candy nagtanong Bong ang
tanong na ito at sinabi niya hey Bong Maaaring hilingin sa iyo ng isang bagay at ito ay
malubhang ahm Candy sinabi gawin ka kailanman pakiramdam makalyo kapag kami ay
nagsasalita at nakapako sa bawat isa? At Bong ay shocked Nadama niya ang kahihiyan
sa kanyang sarili, ngunit pagkatapos ng isang minuto siya ay nagpasyang sagutin ang
tanong Candy. Bong sinabi sa kanya, "ok aminin ko ang aking sagot ay oo." Bong
ipinaliwanag kung ano ang kanyang nadama at sinabing, "hey Candy ako lamang ng
isang tao at para sa akin mo ito perpekto, bawat oras na tumingin ako sa iyo nadama ko
ng isang bagay aking katawan ay nakakakuha ng mas mainit at gusto ko talagang
yakapin mo at halik mo. Candy smiled, kaya "Bong mayroon kang isang sekswal na
pagnanais sa paglipas ng sa akin?" Bong sumagot ng "oo Mayroon akong ngunit na
imposibleng mangyari. Candy laughed, na kung ano ang sa tingin mo hahahah sa tingin i
maaari kaming magkaroon ng kasiyahan ng kasarian ngayong gabi. Bong sinabi kung
paano Candy kung paano? Candy ang kanyang tanong, "ito ay simple, sabihin gawin ito
sa internet." "Oh ang maaari naming gawin ito sa pamamagitan ng na?" Tinanong
Bonng. Candy tumugon, "oo ko karaniwang gawin ito sa aking dating kasintahan."
Ngunit Candy wala kami sa na uri ng relasyon? ", Bong tumugon. Candy smiled, ok na
gawin sa iyo dahil sa tingin ko ay mayroon akong isang malambot na damdamin sa iyo.
Bong sinabing, "Uy Candy hindi ko alam kung paano gawin ito maaari mong magturo sa
akin?" Oh simpleng nito lang ang dadalhin off ang aming mga damit at isipin ang bawat
isa at sabihin-play sa aming sarili, maaari mong gawin iyon para sa akin? sinabi Candy.
Bong tumugon, ako nahihiya ngunit oo kendi ...
Gawin nila anumang nangyari ito sa araw na iyon. Tingin ko ko tapusin ang kuwento na
may na sitwasyon dahil ang aking nobelang ay na-rate PG kaya hindi ko na matugunan
ang pakikipagtalik. Lamang na ipaalam sa akin kung paano ang kuwento na ito maging
ang masamang bahagi. Para sa akin bilang manunulat talaga halata sa dalawang mga
character ng kuwento ay lumabag sa dalawang panuntunan ng batas, ie ang cybersex at
batas ng cybercrime. Una ay ang cybersex dahil ang dalawang tao ginagawa ito gawa
na walang kaugnayan sa isa't isa ay lumabag sa batas dahil Bong at Candy ay hindi
pakiramdam ng pag-ibig sa bawat isa at panatilihin ang mga ito ang paggawa ng
pagkilos na iyon sa internet. Ngayon kung bakit ang dalawang lumabag sa cybercrime?
Ito ang talagang halata muli dahil sila ay paggawa ng krimen oo na ang isang krimen
dahil ito ang mali, ito ang tulad ng kung ano ang ko sinabi sa ang cybersex ngunit dito
ay magkano ang mas kapana-panabik dahil dito ka na naaresto ng pulisya habang
ginagawa ang gawa nito talagang lumabag ang cybercrime batas.
Ngayon ipaalam sa akin na sa tingin tungkol sa ikalawang kuwento at ito ay ang
mabuting bahagi. Ako gumawa ng isang vice versa ng masamang bahagi ng kabanata na
ito. Oh ... Nakalimutan ko ang pangalan ng unang babae. Ok kapag sinusuri ang aking
nobelang natatandaan ko ang pangalan ng babae ay Beng. At pa rin ay i gamit ang
parehong tao para sa kuwentong ito. Narito kuwento naging ... tulad ng sinabi ko mas
maaga Bong ay isang basketball player at siya ay kaya magandang sa laro, siya ay
aktibo sa mga ito sports. Habang Beng ng volleyball player, siya nagnanais upang
maglaro ng volleyball at siya ay medyo at smart at laging tuktok ng klase. Isang araw sa
kanilang buhay sa kolehiyo, Bong at Beng ay nakikipag-date sa bawat isa at ang mga ito
ay mahusay na naghahanap ng ilang. Ilan sa Bong sa mga kaibigan inggit sa kanya dahil
siya ay may magandang girlfriend at talagang mainit. Parehong bilang sitwasyong may
Bong, Beng sa mga kaibigan mainggitin sa kanya dahil Bong ay isang mahusay na
manlalaro ng basketball at guwapo sa. Kapag ang ilang sa paglalakad sa maraming ng
campus ng mga tao ay nakapako sa mga ito sapagkat ang dalawa ay talagang angkop sa
sa bawat isa. Kaya hayaan mo akong tumalon sa kuwento hahaha bilang isang
manunulat walang maaaring itigil sa akin kung ano man ay i gawin sa aking kuwento na
ang isa sa mga mahusay na punto ng pagiging isang manunulat. Kaya matapos ang ilang
nagtapos, Beng ngayon ng pagpunta sa Canada dahil sa trabaho habang Bong rito sa
Pilipinas. Bong ay napaka taob kapag alam niya na Beng mag-iiwan sa kanya para sa 2
taon. Bong confronted Beng tungkol sa kanyang trabaho, at siya sinubukan upang ihinto
ang kanyang, ngunit Beng sinabi sa Bong, "hay honey ito ay hindi para sa akin ito ang
para sa atin, para sa aming hinaharap." Bong ay umiiyak habang nagsasalita sa Beng at
ang ng wala saanman Inaalok Beng isang bagay. "Ok Beng bago ka pumunta sa Canada
susunod na buwan maaari mong mangyaring magpakasal sa akin?", Bong sinabi,
habang siya ay hold isang bagay at bagay na isang ring. Beng ay shocked at sumigaw at
sinabi sa Bong, "na kung ano ako naghihintay para sa iyo upang hilingin sa akin honey
kaya bakit ko tanggihan na alok na alam kong hindi ko ikinalulungkot ito. Ok Bong
sabihin makapag-asawa ng dalawang linggo bago pumunta ko sa Canada. "Bong sinabi
ok ngunit pa rin maaari mong makita ang kalungkutan sa kanyang mukha para sa
maaaring loosing ng kalaguyo para sa dalawang taon. Manunulat gilid oh nito sa akin
muli ang manunulat lol nito tulad ng matamis na bagay na nangyari sa mga dalawang
tao, talagang matamis i hulaan ang mga ito ng dalawang character ay pagkakaroon ng
mabuting pamilya sa ibang araw. Ok sapat na para sa gilid ng manunulat hayaan mo
akong pumunta sa ang kuwento kaya sabihin magpatuloy dito sa puntong ito Bong at
Beng ay abala paghahanda para sa kanilang kasal dahil ito ay talagang out ng wala
kahit saan kapag Bong iminungkahi sa Beng. Nagpasya sila mag-asawa sa sibil
seremonya. Beng sinabi "pagkatapos 2years kapag nakakuha i bumalik sabihin asawa
muli sa simbahan." Bong tumugon, "ok Babe, i maghintay para sa na umaasa
gustung-gusto mo pa rin sa akin sa oras na iyon", at Bong smiled. "Oh sigurado hon ang
aking pag-ibig para sa iyo ay walang hanggang, ikaw ay magiging ama ng aking mga
anak." Beng sinabi.
Ngayon sabihin magpatuloy sa kasal - ang simula ng isang bagong kabanata ng buhay
Bong at Beng. Pagkatapos ng kasal Beng pa rin ay may dalawang linggo para Bong
bago siya umalis para sa Canada. Ilang ang ginugol ng oras sa bawat isa. Oh
Nakalimutan ko ang upang isama ang hanimun ng ang ilang lol. Tulad ng sinabi ko
kani-kanina, na ito ay na-rate ng PG hindi sekswal na pang-aabuso o pagpapakilala
hahaha. Kapag ang oras ang napupunta sa pamamagitan ng, Beng talagang kailangang
umalis at Bong sumigaw at sumigaw sa Beng sa balikat hugging kanyang mahigpit at
halik kanyang matamis at buong pagmamahal. Bong sinabing, "alagaan sinta ko tiyak
miss ka kaya magkano at mangyaring huwag tumingin sa mga dayuhan OK honey lang
panatilihing-ugnay Mahal kita kaya magkano Beng!" Beng maririnig na tumawa,
"hahah! Dayuhan? Ko na mayroon kang, kaya ang lahat ng mga lalaki may mga walang
kumpara sa iyo honey. Mahal kita higit pa at i palaging ay hanggang sa i hininga!
-aalaga ng iyong sarili at hindi tumingin sa ibang babae mayroon i isang mata sa iyo
kahit i am hindi sa paligid ok, "Siya kissed Bong at yakapin siya nang mahigpit habang
sinasabi," ibigin i kaya hanggang nakilala namin muli honey ay i tumawag palagi kang
nangangako Mahal kita. "Pagkatapos ng isang buwan Beng nagpunta sa Canada. Bong
palaging makipag-usap sa kanya at nagsasabi sa kuwento tungkol sa bawat isa. At
ngayon bilang isang manunulat na ito ang aking pagliko upang ipaliwanag ang ilang
mga bagay in dito. Ako ngayon ipasok ang magandang bahagi ng kabanata na ito kaya
basahin nang maingat ako dumiretso sa punto. Bong at Beng ginagawa pakikipagtalik
dahil kapag sila makalyo sa bawat isa sila kasiyahan sa bawat isa sa pamamagitan ng
paggawa sa pamamagitan ng internet na gawin nila ito nang isang beses sa isang
buwan. Tingin ko walang masama sa bilang isang kasal ilang dahil na asawa ilang, sex
ay isang ay dapat upang ipahayag ang iyong mga damdamin sa iyong partner, ngunit
ang problema dito ay kung bakit kung ang iyong mga kasosyo ay hindi sa paligid tulad
ng Beng. Paano Bong kasiyahan ang kanyang sarili sa mga tuntunin ng sekswal na
pagnanais para sa kanyang asawa? Kung ikaw ay nasa Bong ng sapatos, ang iyong
pagpunta upang makakuha ng isang bagong babae lamang upang masiyahan ang iyong
sekswal gumiit sa iyong asawa? Tingin ko hindi dahil bilang isang kasal tao na iyong
ipinangako na hindi mo saktan ang iyong asawa, magbibigay lamang sa kanya ng tapat
at tunay na pag-ibig at layaw sa kanya. Kaya sa tingin ko ang cybercrime batas at
cybersex bagay batas sa sitwasyon ng isang legal na may-asawa ilang ay legal sa
kuwentong ito dahil bilang asawa ilang mayroon silang karapatan na gawin ito nang
walang pagyurak ng iba pang mga damdamin dahil ang pagiging ilang pagiging isa kaya
sa tingin ko ay ko magtapos ang kabanata dalawang dito dahil kailangan ko upang
abutin ang mga bagay para sa ibang kabanata ng kuwento. Salamat reader! umaasa na
gusto mo ito kabanata!
Wow na kabanata ay hindi masama, ay hindi ito? Kaya ipaalam sa tingin sa akin ngayon
kung ano ang kuwento ay susunod kaya dito ako nag-iisip muli. Paano kung ako tungkol
sa pananakot. Ako pangalanan ang mga maton sa kabanata 3. Ay na karapatan sa iyo?
Oh hulaan i hindi mo maaaring tumauli na ok Ang bagay ay binayaran, sabihin gumawa
ng isang kabanata tungkol sa mapang-api.
Tagalized version
Chapter - 3
Kaya kung ano ay mapang-api? tingin i kailangan i upang hilingin ang aking mga
friendly na kapitbahayan ng google para sa karagdagang impormasyon ok lang
maghintay ng ilang sandali habang naghahanap sa internet oh maghintay bago simulan i
kabanata na ito sabihin ako ng isang stick ng sigarilyo ok salamat sa iyo para sa
pag-unawa ng aking mga pangangailangan Alam ko sa tingin mo na ako ng masamang
manunulat hahaha ok dito kami ngayon.
Ano ang pananakot?
Apat na uri ng pananakot
Sino ang pananakot at kung sino ang bullied?
Pananakot ay malala
Mga Palatandaan ang inyong anak ay maaaring na bullied
Mga bagay na maaari mong gawin kung ang inyong anak ay bullied
Mga Palatandaan ang inyong anak ay maaaring pananakot iba
Mga bagay na maaari mong gawin kung ang iyong anak ay pananakot ng mga iba
Nangungunang mga tip para sa mga bata
Pananakot ay kapag ang isang tao o isang grupo ng mga tao na may higit pang lakas
paulit-ulit at nagiging sanhi sinasadya saktan o makapinsala sa isa pang tao o pangkat
ng mga tao na sa tingin mahina upang tumugon. Pananakot ay maaaring magpatuloy sa
paglipas ng panahon, ay madalas na maitago mula sa matanda at marahil patuloy kung
walang ginawang pagkilos.
Pananakot ay hindi:
single episode ng panlipunan pagtanggi o hindi gusto
single episode kilos ng nastiness o kulob
random na gawa ng pagsalakay o pananakot
mutual argumento, disagreements o fights.
Ang mga pagkilos na ito ay maaaring maging sanhi ng mahusay na pagkabalisa.
Gayunpaman, hindi sila mga halimbawa ng pananakot maliban kung ang isang tao ay
sadya at paulit-ulit na paggawa ng mga ito sa iyo.
Ok mga salamat ncab.org para sa paggawa ng paliwanag na ito. Ito ay talagang isang
malaking tulong upang maghanap para sa internet. Tingin ko kung cybercrime batas
Magpatuloy, naghahanap sa net ay mahirap. Dahil maaaring bina-block ang website
para sa pagpigil sa panunulad, ngunit mahusay na sabihin ilipat sa sa kuwento tungkol
sa pananakot. Ko pa ring gamitin ang Bong para sa kuwentong ito at huwag mag-alala
na ito ay isang bagong kuwento.
Kuwento nagsisimula dito, Bong ay isang mag-aaral sa kolehiyo at siya ay isang
masipag na mag-aaral. Para sa akin, bilang isang manunulat, Bong ay isang normal na
mag-aaral at ginawa niya rin sa paaralan. Kaya Bong ay upang makakuha ng mga
mataas na marka para sa kanyang bawat paksa at siya ay isa sa mga pinakamahusay na
mga mag-aaral sa kanilang silid-aralan. Napansin ko na Bong ay laging nag-iisa. Ang
dahilan dito ay na maaaring siya ay may problema, hindi siya ay nais na sumali sa
anumang mga gawain, at hindi siya magkaroon ng mga kaibigan sa paaralan, siya ay
laging nag-iisa at ako nagtataka na ang isang tao o isang bagay ay Iniistorbo Bong ng
isip. Ngunit narito ang isang bagay, Bong ay may kaklase na laging manunudyo kanya at
ang pangalan ng kanyang mga kaklase ay JD. JD ay isa ng masamang halimbawa ng
mga mag-aaral, siya ay ginagamit upang manigarilyo at laging siya kinopya ang gawain
ng kanyang iba pang mga kaklase. JD ay palaging humihiling sa Bong upang gawin ang
kanyang homework at kahit na ang mga proyekto sa paaralan. Ako ay nagtataka kung
bakit Bong ay hindi magreklamo sa JD, ito ay hindi maiisip para sa akin. Well, gusto
kong mag-focus sa JD dahil gusto ko talagang malaman sa kanya sa gayon na maaari
kong pag-aralan at ipaliwanag sa iyo kung ano ang nangyari sa kabanata. Sa
pamamagitan ng paraan, bago ako magpatuloy sa kuwento Gusto kong sabihin sa
nagkakaroon ako ng isang hard oras na magsulat lamang ang kabanata na ito dahil ako
riding sa isang jeep hahaha ... Gusto ko lang upang ibahagi ang mga ito. Maaari itong
maging isang tao ay kapitang na bigla ang aking cellphone kung hindi ko ihinto ang
pagsusulat dito. Na rin ang mas mahusay na ako huminto sa ngayon. Gusto ko na sabihin
ng paumanhin kung may typographical error dahil ipinaliwanag ko ito nang mas maaga
kung saan ang aking lokasyon at salamat sa pang-unawa.
Ok ngayon hayaan mo akong ipagpatuloy ang kuwento. ok sinabi ko mas maaga na ko
tumuon may JD. JD ay palaging ginagawa ang mga bagay bago siya palaging hilingin
ang isang tao na gawin ang trabaho para sa kanya ibig sabihin ko ang mga proyekto at
asignatura na hindi siya magpakita pagsusumikap mula sa kanyang mga akademikong
pag-aaral, siya gustong mamahinga ang mga bisita sa lahat ng oras Chilling sa mga
kaibigan. JD ay isang uri ng tao na siya palagay ni siya ay isang boss, maaari siya
Command ng isang tao upang gawin ang mga bagay para sa kanya. Well, sa kasong iyon
JD hinahanap Bong upang gawin ang kanyang mga asignatura at siya threatened Bong
na kung Bong ay hindi gawin JD ng asignatura o proyekto JD Punch o kahihiyan Bong
sa harap ng klase. Bong nadama natatakot dahil alam niya JD tanyag ng pagiging kilala
sa ang campus kaya nagpasya siya upang makakuha ng paggamit nito. Anuman JD
sinabi sa kanya siya tiyak ito. Ok, bilang isang manunulat, pananakot talagang
kailangan ng pansin dahil kung balewalain mo ang bagay na ito isa sa mga mag-aaral
willbe nasaktan at alam ko ang isang kaso na dahil sa pananakot isa sa mga mag-aaral
makakuha ng pagpapakamatay, at hindi ko nais na ito mangyari muli. Kaya kung paano
ang maaari kong ipagpatuloy ang aking kuwento tungkol sa pananakot?
Ok sabihin lumipat sa. Bong ay takot sa JD, at ginagawa niya lahat ng JD ng nais. Dahil
Bong ay hindi magkakaroon ng anumang mga kaibigan sa klase siya ay takot na walang
ay makakatulong sa kanya kapag JD ay subukang kahihiyan sa kanya, at alam niya na
ang lahat ng kanyang mga kaklase ay pagpunta sa JD sa gilid. Iyon ay kung bakit siya ay
tulad ng isang manika para sa JD. Oh Nakalimutan ko ang upang sabihin tungkol sa
background ng Bong pamilya sa kuwentong ito. Ang kanyang ama ay nagtatrabaho sa
isang gobyerno. Bong sa ama pro-cybercrime batas at siya ay isa sa mga dahilan kung
bakit ang cybercrime batas ay pagsasabatas sa ating bansa. Uy ang line na ito ay hindi
totoo lang i ginawa ang isang ito sa aking isip. Kaya bilang isang manunulat mayroon i
isang bagay na hilingin sa aking isip paano kung Bong sabihin ang kanyang problema sa
kanyang ama? Uhm ok ay nagbibigay-daan sa ipagpatuloy ang kuwento hulaan ko Bong
ay hindi nais na abala ang kanyang ama. At kung siya ay nagsasabi sa ito, marahil ang
kanyang ama ay pumunta sa kanilang paaralan at gumawa ng iskandalo sa paaralan.
Bong ay takot kung iyon ang mangyayari. Kaya ibig sabihin habang Bong ay
kasalukuyang gumagamit ng internet at siya palaging mag-log in sa facebook dahil ito ay
ang source ng entertainment para sa kanya. Siya ay may maraming mga kaibigan sa
mukha aklat dahil sa tingin i alam mo na ang dahilan. Ilang minuto pagkatapos, Bong
napansin kanyang chatbox, at nakita niya ang mensahe ng JD sa kanyang chat box.
Sinabi JD, "hey tanga paano aking homework pagpunta sa?" Bong tumugon, "hindi ako
makapagsimula pa ito." JD Nakakuha galit sa kung ano siya basahin at ipagpatuloy ang
sinasabi ng mga masamang salita sa Bong. At Bong kaya takot sa kung ano siya basahin
at sinabi niya na siya ay ang paggawa ng kanyang pagtatalaga sa ibang pagkakataon. At
JD sinabi sa kanya, "na ang i Gusto mo bang makarinig mula sa iyo bading." At Bong
ginawa at natapos ang lahat ng mga asignatura ng JD. Pagkatapos ng isang habang
Bong nahulog tulog dahil sa na pagod ng paggawa ng home gawain ng JD. Ang mga
sumusunod na araw Bong ngayon paghahanda para sa paaralan at siya kumain liwanag
almusal. Sa paaralan, ay ang JD kaya nasasabik upang makakuha ng kanyang tahanan
mula Bong, ngunit Bong kabaligtaran dahil siya ay takot upang makita JD ngunit hindi
maaaring makatakas sa JD presensya dahil ang mga ito ng mga kaklase upang sila ay
tiyak matugunan at ang pananakot Magpatuloy. Isang araw Bong ay talagang baliw at
hindi siya maaaring hayaan ang mga bagay na mangyayari sa lahat ng oras at siya ay
nagpasya upang sabihin ang katotohanan sa kanyang propesor at ipaliwanag niya ang
lahat at sinabi ang lahat ng JD mula sa kanya. Kapag natutunan JD kung ano Bong
ginawa, JD ay messaging masamang salita sa Bong sa facebook at ay talagang isang
napaka kahila-hilakbot at masamang salita. Sa bahay ng Bong ang tanging tao sa kaliwa
ay ang kanyang ama. Bong ng ama ay gustong gamitin ang computer at siya ay bubukas
ang google chrome at i-type ang kanyang sariling facebook pahina na dumiretso sa Bong
sa facebook sa aksidente ng nakikita ang facebook ng kanyang anak na nagtatapos ang
lahat. Kanyang ama mademanda JD para sa paglabag ng batas. Ngunit JD ay hindi
alam na siya ay paglabag ng batas. Isang araw sa paaralan JD ay naaresto, at siya ay
natatakot dahil hindi siya alam kung ano ang ginawa niya. Ang mga pulis sinabi,
"batang lalaki lumabag ka sa bagong batas upang ipaalam sa akin mag-anyaya sa iyo
upang ang quarters ng ulo. Kung hindi mo darating sa amin, ay i-drag sa lahat ng
puwersa ang aking ", sinabi ng pulis. Tumugon JD, "ok ginoo makikita ako sa iyo." At
lahat ay tapos na sa loob, ipinaliwanag nila kung ano ang dahilan ng nagdadala sa
kanya doon at ang parusa tungkol sa mga krimen na ginawa niya. JD na ginugol ng 12
taon sa bilangguan. Na nagtatapos sa kuwentong ito. Ngayon, nais kong ipaliwanag ang
isang bagay na napaka makahulugang.
Ok narito ang aralin sa kabanata na ito, mangyaring paggalang tao sa paligid mo dahil
hindi mo talaga alam kung ano ang gawa ginawa gagawin mo sa mga iba tulad ng JD
hindi siya alam na siya ay lumabag sa batas. Tingin ko sa kabanata ng batas ay
tumutulong sa malungkot na mag-aaral (Bong) na nangangahulugan ng batas ay isang
magandang bagay sa kabanata na ito. Ngunit ang masamang bagay ay na ang JD ay
hindi alam na siya ay lumabag sa isang batas na nagreresulta toa mandamyento de
aresto at na ang masamang bahagi ng batas. Well Ako kaya nagpapasalamat dahil ang
sine-save ng batas Bong out mula sa pananakot, at inaasahan kong Bong ay maging
isang normal na mag-aaral ngayon. Gayundin, tiyak ang sitwasyong ito ay magsilbi
bilang isang aralin para sa mga taong tulad ng JD. Kung ako ay mo, mag-isip muna
bago ka ng isang bagay, kailangan mong malaman muna kung ano ang mong gawin ay
mabuti at kanang o masamang.
Ngayon bilang isang manunulat muli at muli, kailangan kong mag-isip ng isa pang
kabanata para sa. Na rin siguro ng ilang oras ba akong magkaroon ng isang bagong
ngunit sa tingin ko na kailangan kong kumain muna bago magsulat ang kabanata 4 ng
aking mga nobelang.
Tagalized version
Chapter - 4
Kabanata na ito ay tungkol sa, sa aking sariling opinyon, sa tunay na mundo na
nangangahulugang ito talaga ang mangyayari, ay isang katotohanan at
makatotohanang, kaya nagpasya kong kabanata na ito upang subukan ang aking sarili
kung ko talagang maunawaan ang batas ng cybercrime. Kung isulat ko ang maraming
mga isyu tungkol dito tingin i am i handa upang magpatuloy ito nobelang.
Noong 2011, walang patakaran tungkol sa cybercrime, ngunit alam ko may mga ilang
mga tao na alam na ang batas na ito ay maaprubahan sa bansang ito. Mga taong iyon na
hinulaang cybercrime na maaprubahan, Mayroon akong mataas na saludo sa mga tao
dahil nangangahulugan ito na ginamit nila ang kanilang mga isip mag-isip kung ano ang
nangyari sa ating bansa. Kaya Ako ba na ang mga taong may alam na ang araw na ito
ay darating na siguro sila handa para sa trahedya na ito dahil sa unang lugar kahit
cybercrime ay hindi pa umiiral sa ating bansa, alam ko na sila ay gumawa ng solusyon
kung paano upang maiwasan ito batas. At sa tingin ko din sila sa hindi pabor sa batas na
ito dahil dito ay isang kadahilanan na pamahalaan ay makikinabang ang isang ito. Para
sa halimbawa ng senador isyu bagay. Ako ba narinig mo kung ano Senator Tito Sotto
ginawa? Kung hindi mo alam, ako ipaalala sa iyo kung ano ang nangyari. Hayaan ang
ipakita sa akin (sa ibaba) mo ang pagsasalita ng Senator Sotto naihatid ... Ibig kong
sabihin mamlahiyo. Narito ang pagsasalita ng Senator Sotto:
"Ilan ang magiging dakila Sa pagbali Ng kasaysayan, subalit bawat Isa Sa atin ay
maaaring kumilos, gaano tao kaliit, Para ibahin ang takbo Ng mga pangyayari Kapag
pinagsama-sama ang ating munting pagkilos, makakalikha tayo Ng totalidad na
magmamarka Sa kabuuan Ng kasaysayan Ng henerasyong Ito.
Ang mga Hindi mabilang-bilang na iba't ibang galaw Ng katapangan sa paninindigan
ang humuhubog Sa kasaysayan Ng sangkatauhan.
Tuwing naninindigan tayo Para Sa isang paniniwala, tuwing kumikilos tayo Para
mapabuti ang buhay Ng IBA, tuwing nilalabanan natin ang kawalan Ng katarungan,
nakalilikha tayo Ng maliliit na galaw. Kapag nagkasama-sama ang mumunting galaw na
mga Ito, bubuo Ito Ng isang malakas na puwersang kayang magpabagsak maging Ng
pinakamatatag na dingding Ng opresyon. "
Na ang pagsasalita na siya ang naghatid at ang orihinal na manunulat ng speech na ito
ay Mr Kennedy. Kaya ipaalam sa akin makakuha ang pagsasalita ng Kennedy ng oras na
ito, ipaalam sa ihambing ito "Ilang ay may ang kadakilaan sa yumuko kasaysayan;
ngunit sa bawat isa sa atin ay maaaring gumana baguhin ang isang maliit na bahagi ng
mga kaganapan, at sa ang kabuuang ng lahat ng mga kilos ay hindi nakasulat ang
kasaysayan ng kanyang henerasyon.
Ito ay mula sa napakakapal magkakaibang kilos ng tapang tulad ng mga ito na ang
paniniwala na ang tao kasaysayan ay sa gayon hugis.
Sa bawat oras na ang isang tao ay nakatayo up para sa isang perpektong, o gumaganap
upang mapabuti ang maraming ng iba, o naaabot laban sa kawalan ng katarungan, siya
nagpapadala balik isang maliit na malit na alon ng pag-asa, at tumatawid bawat isa
mula sa isang milyong iba't ibang mga sentro ng enerhiya at walang takot mga Ripples
bumuo isang kasalukuyang na maaaring walisin ang mightiest pader ng pang-aapi at
paglaban. "
Ok na i nakuha ang mga speeches ng parehong senators. Tulad ng iyong nakikita,
Senator Sotto isinalin ang salita ng Sen. Kennedy. Paano ko tumawag na plahiyo o
translation? Ang masamang bagay dito - Senator Sotto ay hindi kahit sinabi na nakuha
niya ang kanyang pananalita sa isang tao. Sinabi niya na ito ay orihinal. Kaya na ito
i-clear sa amin ito ay panunulad. Paumanhin para sa mr. Kennedy tingin i isa na ito ay
talagang kahihiyan laban sa ating bansa. Pano Kaya tayo gagalangin Ng ibang bansa
kung ang mga namumuno Sa atin ay gumagawa Ng kalokohan? Paumanhin para sa
pagsasalita Tagalog, gusto ko lang ito sa-clear sa aking kapwa Pilipino pinsan ko
talagang gusto upang makatulong sa ating bansa.
At ngayon araw na ito, Senator Sotto clear. Hindi ko alam kung bakit o kung paano.
Tingin ko dahil siya ay may koneksyon heah para bang dahil siya ay isa ng aming mga
lider. At ito ay ang tanong sa lahat ng iyong - mo mapansin na ang lahat ng mga tao sa
gobyerno ay celebrity nito kasiyahan siguro siya shoots ng pelikula sa loob ng gobyerno.
At ito ay ang pinakamasamang kahit Manny Pacquiao ay isang diputado. Ano ang
nangyayari sa impiyerno sa lupa? Bakit mga tao na bumoto sa mga kandidato? Dahil sa
alam nila na celebrity ay mahusay. Oo ang mga ito ay mahusay na kapag sila ay kumilos
ngunit upang maghatid sa amin uhm wala i tingin kaya. Ok tingin i nakakakuha ako ng
masyadong malayo sa hahaha paksa. Ibig mong mapansin na ang lahat ng mga isyu ng
Senator Sotto ay nawala? Tingin ko ang batas na ito ay ginagamit upang masaklawan
ang mga pagkakamali ng aming mga founder. Ngayon ang ilang mga tao sa bansa ay
nakatuon sa batas nakalimutan nila na ang iba pang mga isyu tungkol Sotto kaso. Tingin
ko gusto nila upang masaklawan ang mga ito sa pamamagitan ng batas na ito. At sa
pamamagitan ng paggamit ng batas na ito ay hindi isang labanan ang mga ito dahil ang
mga ito ay protektado ng batas. Na rin na ang aking simpleng paliwanag tungkol sa
kabanata pa rin ito sa iyo kung mayroon kang ang iyong sariling ngunit lamang i nais
upang ibahagi ang aking mga damdamin tungkol dito. Hindi ako pagpilit mong
naniniwala sa akin dahil alam i mayroon kang iyong sariling paraan upang siyasatin ang
mga bagay haha.
Ok tingin i na para sa kabanata 4.
Ito ay oras upang pumunta ngayon sa kabanata 5, ngunit pa rin hindi ko alam kung
paano simulan ang kuwento sa kabanata na ito. Kaya maaari mong ibigay sa akin ang
ilang oras sa tingin. Oh nang 3am sa umaga bukas siguro ay i tingin ng isang mahusay
na kuwento tungkol sa batas. Siguro sa aking panaginip CANT mong sabihin sa kung ano
ang nangyari sa kanan kaya magandang gabi para sa ngayon sabihin patuloy ito sa
ibang pagkakataon kapag gisingin i up. Salamat para sa pagbabasa ng kabanata 4, at i
tumagal ng oras upang humihingi ng paumanhin sa aking pinakamasama grammar
unawain na lang ang mga ito at maaari mong sundin kung ano ang nais i upang sabihin.
Tagalized version
Chapter 5
Ang susunod na kabanata ay tungkol sa panunulad. Alam ko sinabi ko na ng maraming
bagay tungkol sa panunulad ngunit sa kabanata na ito ay kong tumuon sa isang ito. Ako
gumawa ng isang sitwasyon tungkol sa panunulad at ako kumonekta ito sa cybercrime
batas. Kaya Umaasa ako na maaari kong gawin ito dahil ang aking isip ay talagang
blangko sa oras na ito hindi ko alam kung paano simulan ang kuwento. Oh tingin ko
kailangan ko upang hilingin sa internet tungkol sa kung ano panunulad ay lahat tungkol
sa gayon na ang aking reader ay madaling maunawaan ang aking paksa. Ok sabihin
simulan ang kuwento ngayon.
Kaya kung ano ay plahiyo? Mayroon ba kayong ng ideya kung ano ito? Hulaan ko
narinig mo ito ng maraming beses at alam ko na alam mo ang panunulad na ay
masamang at maaari kang mademanda sa pamamagitan ng paggawa nito.
Panunulad ay gawa ng paglalaan pagsulat ibang tao, pag-uusap, kanta, o kahit ideya at
pagpasa ito bilang iyong sariling. Kabilang dito ang impormasyon mula sa mga web
page, mga libro, mga kanta, palabas sa telebisyon, mga mensaheng email, panayam,
artikulo, likhang sining o anumang iba pang mga medium. Tuwing pagpapakahulugan sa
ibang pangungusap mo, ibuod, o ng mga salita, parirala, o mga pangungusap mula sa
gawa ng ibang tao, ito ay kinakailangan upang ipahiwatig ang pinagmulan ng
impormasyon sa loob ng iyong papel gamit ang isang panloob na pagsipi. Ito ay hindi
sapat upang ilista ang source ng bibliograpiya sa dulo ng iyong papel. Bagsak maayos
quote, sipiin o kilalanin ang mga salita o mga ideya ng ibang tao na may isang panloob
na pagsipi ay plahiyo. Para sa nauunawaan ang kahulugan ng panunulad, Gusto kong
sabihin salamat sa www.lib.edu.phwww.lib.edu.ph
Ok dahil i nakuha ang kahulugan ng panunulad, tingin ko reader dapat maunawaan ang
aking kuwento sa ngayon at nais i upang lumikha ng isa pang kuwento para sa.
Ipaalam sa amin simulan ang kuwento. Sa kuwentong ito, i pa ring gamitin ang Bong
para sa kabanata. Isang araw ang isang mag-aaral na-upload sa pagsasalita ng kanyang
pagtatapos sa facebook at may napansin na ang ilang mga salita na ginamit sa
pagsasalita ay dumating mula sa internet at uploader ay hindi binanggit ang source o
ang isa na orihinal na ginawa ito. At ito ay halimbawa ng panunulad. Kahit sa tunay na
buhay panunulad ay lubos na kilala. Sa paaralan panunulad ay kilala at tingin ko kahit
sa buong mundo. Kaya bilang isang manunulat, nagpasya kong gumawa ng isang
kuwento tungkol dito. Well plahiyo ay bahagi ng batas at ang ilang mga tao na ginamit
upang labagin ang batas na ito at wala i malaman kung nilalayon nilang lumalabag ang
mga ito o lamang sila ay nakakakuha ng mga tamad upang bumuo ng isang orihinal na.
Halimbawa, kapag hindi naaprubahan ang cybercrime batas, lahat ng tao ay
maaaring-download ng mga pelikula at kanta sa internet, walang thanking ang uploader.
Ngunit ngayon isang araw, kapag ang cybercrime batas ay naaprubahan at
pagsasabatas, tingin ko kung nag-download ka ng isang bagay sa internet, ikaw ay
lumalabag sa dalawang batas. Kaya kung ano ang maaari naming gawin tungkol dito?
Paano maaari naming mapigilan ang bagay na ito mangyari? Well, para sa akin, hulaan
ko maaari mong maiwasan ang mga ito sa pamamagitan ng simpleng pagsipi sa gayon
na ang isa na ginawa sa orihinal na bersyon ay maaaring makakuha ng mga kredito sa
iyong trabaho. At narito ang isang bagay, kung susubukan mo upang kopyahin ang iba
pang mga gawa ni, tingin ko ito ay pinapayagan ngunit hindi gumagamit ng kopyahin at
i-paste ang dahil kung patuloy kang ginagawa na, ikaw ay masanay dito. Kaya lahat ng
kailangan mong gawin ay basahin ang orihinal na kopya ng pangungusap, pagkatapos
ay gawin ang iyong opinyon tungkol sa kung ano ang iyong basahin at para bang ikaw
ay makakuha ng iyong ideya o sagot sa iyong sariling nang hindi ginagawa panunulad.
At narito ang isang bagay, kung sa iyo batay sa iyong sagot sa isa pang sagot,
mangyaring huwag kalimutan upang bigyan ng mga kredito mula sa orihinal na maker.
Sa pamamagitan ng ito, ikaw ay maging ligtas laban sa anumang. Tingin ko ito ay isang
simpleng bagay na kailangan kong sabihin at magbigay sa aking mga mambabasa upang
maiwasan ang paglabag sa batas ng panunulad.
Sa puntong ito, hayaan mo akong ipakita sa iyo kung paano ito gawin. Kaya na ikaw ay
matuto mula sa akin dito ay ang tamang bagay na gawin ito. Pumunta sa internet at ko
bang hilingin sa internet kung ano ang kahulugan ng pagsipi. Lamang lamang
halimbawa para sa kuwento. At oo ay i makinabang halimbawang ito dahil ito ay
mabibilang sa aking bilang ng salita para sa nobelang hahaha kaya ay i-grab ang
pagkakataong ito.
Ano ang pagsipi? Ito ay isang panloob na, sa teksto, o parenthetical pagsipi ay
tumutukoy sa pagsasanay ng pagbibigay ng credit sa may-akda, mang-aawit, o speaker
sa pamamagitan ng sumisipi sa kanilang mga salita / ideya sa loob ng iyong papel.
Panloob pagsipi na ito ay pagkatapos reference sa dulo ng iyong papel sa iyong
'gumagana Binanggit' listahan (tingnan sa ibaba).
Panloob na pagsipi minsan ay tinatawag na mga mga parenthetical pagsipi dahil sila ay
nakapaloob sa mga panaklong. Kapaki-pakinabang na mag-isip ng mga panloob na
pagsipi bilang isang uri ng "tag" na nagsasaad kung ano ang iyong hiniram mula sa
isang may-akda. Para sa bawat pangungusap ng parirala, o ideya humiram mong dapat
kang "tag ang" ito na may panloob na pagsipi. Bawat panloob pagsipi ay nakalista ayon
sa alpabeto sa isang 'Works Binanggit' sa dulo ng iyong papel.
Paghiram istraktura sa trabaho, format o style na walang ibinigay na credit
isinasaalang-alang din panunulad. Ito ay mahalaga na tandaan na ang lamang na
pagbabago sa paggamit ng mga salita ay hindi sapat.
"Http://www.lib.usm.edu/legacy/plag/whatisplag.php" Ok na i kopyahin mula sa internet.
Lang kailangan mong gawin ay upang makuha ang link kung saan mo makuha ang kopya
at binanggit ito. Kaya na ang mga orihinal na kopya ay ibinigay na credit at ang isang
ito ay tanda ng paggalang sa orihinal na manunulat dahil magbibigay sa iyo ng kredito
sa kanyang trabaho at nai-download mo o batay sa kanyang trabaho. Kaya ay i
banggitin ito ngayon at i ilagay ang aking mga pagsipi pagkatapos ng orihinal na kopya,
ok? Tapos ako na - Nabanggit ito at hulaan i na para sa kabanata limang. Salamat para
sa pagbabasa na ito kabanata.
Ngayon sabihin pumunta sa kabanata 6 at nais i upang gumawa ng bagong character
para sa. Ako gumawa ng isang babae na character sa puntong ito at i call na ito
kabanata 6 uhm. Maghintay hindi i-isip para sa pamagat ng kabanata na ito. Gusto mo
isipan kung i manigarilyo unang at sa tingin ito pagkatapos na ito. Paumanhin i talagang
kailangan ito mangyaring maunawaan.
Tagalized version
Chapter 6
Kabanata ay talagang halata. Narito ang maaari kong ipaliwanag ang lumang araw
nang walang cybercrime. Bumalik sa mga araw na iyon na ang lahat ng mga tao sa
bansang ito ay may libreng kalooban sa paggamit ng internet, at maaari nilang gawin
ang anumang gusto nila at ang ilan sa mga ito ang gumagamit ng internet upang
labanan ang aming pamahalaan.
Ito ay simpleng upang mabuhay nang hindi iniisip anumang dahil ang buhay ay mas
masaya kung ikaw ay mamahinga ang mga bisita at patiwasay nakatira. Ngunit kung
may isang bagay na mangyayari sa isang lipunan ay tiyak na ito nakakaapekto sa aming
araw ng pamumuhay. Halimbawa, may mga tao na mga bisita single sa buhay ngunit
kung sila ay nakakita ng isang masaya pamilya, ang mga bagay ay naiiba mula sa kanila
at pagkatapos na sitwasyon subukan nilang baguhin ang buhay na siya ginamit upang
ma-enjoy. Ang ilan ng mga tao sa ating bansa ay tulad na dahil, sa tingin ko, kami ay
isang bukas na bansa at ang mga tao dito ay madaling inangkop sa kung ano ang
nangyayari sa ating bansa. Halimbawa, walang cybercrime batas talaga normal sa amin,
ngunit ngayon na may ganitong batas mahirap upang ilipat sa internet. Hindi ito tulad
ng sa lumang mga araw na hindi kami tututol kahit ano sa internet ito ay talagang
masaya sa na lumang araw dahil maaari naming hanapin ang anumang bagay na gusto
naming gawin. Ngunit ngayon sa aming oras mahirap. Kaya mangyaring bigyan pabalik
sa lumang Pilipinas, gusto naming ito at hindi namin nais upang limitahan ang ating
sarili sa batas na, bigyan kami ng kalayaan sa pamamagitan ng paggamit ng internet
malayang. Hindi tulad nito. Ngunit hindi ako nagsasabi na ang kautusan ay talagang
sucks, alam ko ang ilang mga mahusay na epekto dito at ipinaliwanag ko na ito sa aking
nakaraang kabanata. At hinati ko ito sa dalawang mabuti at masamang bagay. Ko
talagang nais na magkaroon ng kalayaan sa. Maaari mong mangyaring itigil ang
cybercrime batas para sa aming privacy at mangyaring igalang ito ito ay kung ano ang
kaya namin ay hindi kaya makabubuti sa amin mangyaring kooperatiba. Namin na
mabuhay nang hindi na batas upang maaari naming pa ring patuloy na tamang paraan
ng pamumuhay.
Tagalized version
Chapter 7
Translate
Ito ay 1989 kapag Janina ay ipinanganak sa Pilipinas sa paligid 23:00. Siya ay isang
maganda sanggol at siya ay malaki at medyo. Kapag Janina pagdating sa edad ng
pitong, maaari mong mapansin mula sa kanya na siya ay isang uri ng kid na nagnanais
ng computer na. Ginugol niya kalahati araw sa harap ng computer sa pamamagitan ng
paglalaro ng mga laro o magbasa ng isang bagay sa harap nito. Tingin ko Janina ay
inspirasyon sa pamamagitan ng kanyang mga magulang. Janina ng ama ay isang system
analyst sa Saudi Arabia at ang kanyang ina ay isang Computer Engineer sa IBM. Itinuro
sa kanya ng kanyang ina upang gamitin ang computer sa edad na tatlong at na ang
simula ng kuwento.
Kapag Janina napupunta sa elementarya maaari mong mapansin ng iba't ibang mga
bagay mula sa kanyang. Siya ay naiiba mula sa ibang mga bata dahil kapag siya ay
grade 1 mag-aaral sa Magandang University (ang pangalan ng sikat na paaralan sa
Pilipinas) na siya ay may isang cell phone at isang tablet. Janina techie babae. Kanyang
guro, Ms Sonia, napansin ang iba't ibang pag-uugali na Janina May. Sa pamamagitan ng
ang paraan, Ms Sonia ay isa ng ang pinakamahusay na guro sa Magandang University.
Siya ay nagtapos mula sa De LaTeneo Universty na may isang antas ng Bachelor of
Science sa Impormasyon System. Kinuha niya ang master degree sa Edukasyon sa San
Letran College.
Kapag ang unang linggo ng paaralan ay, Janina napaka nabigla dahil siya gustong
upang matugunan ang mga bagong kaklase at bagong kaibigan.
Ika-1 araw ng elementarya araw
Janina nagpasok sa silid-aralan. Siya ang ang maagang ibon sa lahat ng mga
mag-aaral. Janina upuan sa tabi ng talahanayan ng guro at ang kanyang Yaya
(Katulong, Katulong) sa labas ng pinto sa panonood ng kanyang mga pagkilos sa loob
ng room. Kanyang Yaya napansin na Janina ay napaka nabigla upang makita ang
kanyang guro at mga kaklase. Pagkatapos tinatawag Janina ang kanyang Yaya. "Yaya"
at Yaya tugon oo kung ano ang mali, janina magtanong kung bakit ang lahat ay hindi
dito kung saan ang mga ito? Ay hindi nagaganyak upang pumunta sa paaralan at matuto
mula sa aming bagong guro? Yaya sinabing, "alam mo sanggol mayroong isang bagay
upang ipaliwanag ito 1st ayaw nila sa darating na ito maagang dahil hindi ito
masyadong nasasabik na tulad mo. At ang kanyang Yaya maririnig na tumawa, Janina
smiles masyadong at tanungin, "ko ba talagang magmukhang na nabigla Yaya?" Sa Yaya
sagot oo ikaw ay at tumawa muli. Pagkatapos ng 10 minuto Ms Sonia pumasok sa room
at Janina sa greets Ms Sonia, "magandang umaga Miss, ang aking pangalan Janina,
kung ano ang iyong pangalan? "Ang kanyang guro smiled at sinabi," kita ikaw ang
maagang ibon uhhmm ang aking pangalan ay guro Sonia o maaari kang tumawag sa
akin Ms Sonia, ako 22 taong gulang. Ako iyong tagapayo para sa buong taon ng
paaralan. Janina smiled at kumuha ng kanyang cell phone. "Ms Sonia ang maaari kong
gamitin ang aking cell phone habang naghihintay para sa iba sa darating? Guro tugon
oh bang! Wow alam mo na kung paano gamitin ang isang cell phone sa pamamagitan ng
edad na. Oo guro ng aking mommy at tatay ay naiimpluwensyahan sa akin upang
gamitin ang mga teknolohiya dahil sinabi nila na sa malapit na hinaharap namin na
napapalibutan ng mga gadget at iba pang mga teknolohiya. Gusto nila sa akin upang
makakuha ng paggamit dito kapag na nauuna ang araw. Iyon ay mabuti upang marinig
mula sa isang grado isang mag-aaral na tulad mo? Tingin ko ang iyong mga kaklase ay
darating. "Bata dumating at murmuring sa isa't isa" mag-aaral ay makikita sa
kani-kanilang mga lugar at batiin ang guro sa harap. Gooooood Mooooorniiiingggggg
Teeeeeaaaachhhheeeeerrrr? Magandang umaga mga bata sinabi Ms Sonia, ikaw ay
tuwang-tuwa upang matuto nang klase? Yeeeeesssss teeeeeaaaccchhheerrr. Ok
magsimula ng aralin at Janina ay aktibo sa klase aktibidad. Tuwina Janina pupunta
bahay niya laging may star mula sa kanyang guro. Kapag pupunta siya bahay siya
laging email ng kanyang ina at ama at sabihin ang kuwento tungkol sa kung ano ang
mangyayari sa paaralan.
Matapos ang 6 na taon Janina ay isang mataas na paaralan ng mag-aaral. Sa
pamamagitan ng oras na iyon Janina ay pinahusay kanyang kaalaman tungkol sa mga
computer, at sumali siya sa computer na aktibidad club. Sa club na ito maaari mong
malaman kung paano gumawa ng software o upang gamitin ang mga iba't ibang mga uri
ng mga operating system. Tumutulong upang mapahusay ang iyong mga kasanayan at
kaalaman tungkol sa mga computer. Isang araw Janina pumasok sa computer club at
siya nakilala Megan at Knox. Ang dalawang ay bestfriends, at matugunan nila Janina at
nila napansin na Janina ay mag-isa sa loob ng kuwarto. Megan sinabi hey kung bakit
ikaw ay nag-iisa?
Janina tugon ako ng mga bagong dito sa club na ito. Ang pinakamahusay na sagutin ang
mga kaibigan sa oh parehong dito. Maaari naming maging sa iyong mga kaibigan dahil
wala kang sinuman na makipag-usap masyadong? Tumugon Janina, "bang".
Makipag-usap sila ng maraming at ang pinakamahusay na mga kaibigan ay nagulat
tungkol sa kaalaman ng Janina tungkol sa computer. Janina maaaring ipaliwanag kung
ano ang mga paraan specs, ram at ROM. Meg at Knox ay magulat dahil natutunan nila
ng maraming ng mga bagay mula sa Janina sa kanilang unang araw ng pagkakaibigan.
Kapag ang tatlong mga kaibigan hiwalay na sa isa't isa at pumunta sa kani-kanilang
mga tahanan Janina nagpunta sa room ng kanyang Yaya at sabihin sa mga kuwento
tungkol sa kanyang mga bagong kaibigan. Janina ay napaka-masaya habang paggawa
ng isang kuwento sa kanyang Yaya at kanyang sinabi na Knox at Meg ay napaka
mararating at sinabi niya na siya nais na maging bahagi ng pangkat. Kapag ang susunod
na araw ay, Janina ay naghahanda ang kanyang sarili upang pumunta sa paaralan at
maaari mong makita ang mga kaguluhan at kaligayahan sa kanyang mukha, dahil Janina
nais upang makita ang kanyang mga bagong kaibigan. Ilang oras nakaraan ang tatlong
mga kaibigan nagpunta sa kanilang silid-aralan at makipag-chat sa bawat isa. Biglang
habang pakikipag-usap sa isa't-isa, ang mga pintuan bukas at Janina kaya shock kapag
nakikita niya ang Ms Sonia. Janina nagpunta sa kanyang dating guro at siya
nagtatanong '"kung paano ikaw ay ms. Sonia ito habang ang isang? "Ms Sonia ay
magulat kapag nakita niya Janina. Ms Sonia sinabing, "oh ito muli sa iyo kung saan
gonna maging sama-sama sa isang paaralan taon ngunit ngayon iba. Janina mo na
lumaki maraming at alam i ngayon mo na makita ang iyong mga talento pagdating sa
computer mo? "Janina sinabi," uhhmm hulaan i kaya makikita mo ang isa sa mga araw
na ito ms. Sonia. "Pagkatapos ng pag-uusap Janina napunta sa kanyang mga kaibigan at
sinabi sa kanila na Ms Sonia ang kanyang guro sa grade 1 at sinabi niya na siya ay isang
mabuting guro at kami ay pagpunta sa malaman ng maraming bagay mula sa kanyang?
Dingdong oh ang bell ring klase magsimula ngayon. Magandang umaga mga
kababaihan at kaginoohan, Ako Ms Sonia at ako ang iyong tagapayo .... ms. Sonia ay
nagpapakilala ang kanyang sarili sa kanyang mga mag-aaral at sabihin sa mga kuwento
tungkol sa kanyang karanasan sa pagtuturo.
Matapos ang 6 na buwan Janina, Knox at Meg nagpasya upang sumali sa kumpetisyon
na tinatawag na Compute System Marathon. Sa sa kumpetisyon na ito ay gumawa ng
isang sistema para sa pamahalaan at ipaliwanag ang lahat ng mga function at kung ano
ang sistema ang ginagawa. Meg at Knox ay inspirasyon sa Janina na ang dahilan kung
bakit sila ay nagkaroon ng interes at knowlege sa mga computer. Kapag ang dalawang
mga kaibigan nakilala Janina, sinimulan nila upang ibigin at tuklasin kung ano ang
computer ay maaaring gawin at pagkatapos na, gumawa sila ng isang koponan na
labanan sa iba pang mga campus para sa kumpetisyon. Ang mga kakumpitensya ay Rich
unibersidad at Nice unibersidad. Ito ang dalawang sikat na unibersidad dito sa bansa, at
ang mga mag-aaral na pag-aaral dito ay napaka-kaalaman at mahusay na sa computer
dahil mayroon silang ang pinakamahusay na gadget at high techs facility. Janina at ang
kanyang mga kaibigan ay nasasabik upang simulan ang application para sa Compute
System Marathon, at sila ay pagpaplano upang gumawa ng isang system na computes
mga grado, ngunit hindi lamang grado, ang sistema ay magagawa upang makalkula ang
suweldo at ilang iba pang mga bagay kapag sa computing. Janina ay gamitin ASP.Net
para sa coding habang Meg at Knox ay tumutok sa database at disenyo. Ang dalawang
tao ay natutunan ng mga bagay na ito dahil sa Janina. Janina ay nagtitiwala sa kanyang
dalawang kaibigan upang gumawa ng isang mas mahusay na base Data at Disenyo. Sa
pamamagitan ng paraan Asp.net ay nangangahulugan na ang Web application
framework na binuo at marketed sa pamamagitan ng Microsoft upang payagan ang mga
programmer upang bumuo ng mga dynamic na mga Web site, Web application at mga
serbisyo ng Web. Ito ay unang inilabas noong Enero 2002 na may bersyon 1.0 ng NET
Framework, at ang kahalili sa Active Server ng Microsoft ASP Mga Pahina teknolohiya.
ASP.NET ay binuo sa Karaniwang Wika Runtime CLR, na nagbibigay-daan sa mga
programmer na magsulat ng ASP.NET code gamit ang anumang suportadong. NET wika.
Ang balangkas ng extension ng ASP.NET SOAP ay nagbibigay-daan sa ASP.NET bahagi
upang iproseso ang mga mensahe ng SOAP (Mga pinagmumulan:
http://www.webopedia.com/TERM/A/ASP_NET.htmlhttp://www.webopedia.com/TERM/A
/ASP_NET . html).
Janina ay ipinaliwanag ng mga sa kanyang mga kaibigan at Meg at Knox pag-aaral sa
asp.net sa internet upang maunawaan kung ano ang Janina ay sinusubukan upang
sabihin. Kapag magsimula ang paligsahan, Janina ay handa upang maghanda ng
kanilang system at janina ay masaya sa resulta ng kanilang hardwork. Ang unang
pangkat ipakita ang mayaman na unibersidad at ang application ay simple calculator sa
pamamagitan ng paggamit ng java o JSP. JSP ay nangangahulugan Maikling para sa
Java Server Pages na. Ang isang server-side na teknolohiya, Java Server Pages ay isang
extension sa ang teknolohiya ng Java servlet na binuo ng mga sun. Mga JSPs dynamic
scripting kakayahan na gumagana sa magkasunod sa HTML code, na naghihiwalay sa
pahina ng logic mula sa mga static na elemento - ang aktwal na disenyo at pagpapakita
ng pahina upang matulungan ang HTML na mas functional (sourcess
http://www.webopedia.com/ TERM / B / JSP_NET.htmlhttp :/ / www.webopedia.com /
TERM / B / JSP_NET.html). Ang isang JSP isinalin sa Java servlet bago patakbuhin ang,
at maproseso HTTP kahilingan at bumubuo ng mga tugon tulad ng anumang servlet.
Gayunpaman, JSP teknolohiya ay nagbibigay ng isang mas maginhawang paraan upang
code ng servlet. Translation nangyayari ang unang pagkakataon na application
patakbuhin ang. Ang isang JSP tagasalin na ito ay nag-trigger sa pamamagitan ng ang
extension na. Jsp pangalan ng file sa isang URL. Interoperable JSPs ay ganap na may
servlets. Maaari mong isama ang output mula sa isang servlet o ipasa ang output sa
isang servlet, at servlet maaaring isama ang output mula sa isang JSP output o forward
sa isang JSP. JSPs ay hindi pinaghigpitan sa anumang partikular na platform o server.
Orignially ito ay nilikha bilang isang kahalili sa Microsoft ASPs Active Server Pages na.
Kamakailan, gayunman, Microsoft ay countered JSP teknolohiya may sariling ASP.NET,
bahagi ng. NET hakbangin.
Janina alam java, ngunit hindi niya subukang code gamit JSP, ngunit kapag nakita niya
ang mga code na sinabi niya sa kanyang sarili na siya nais upang subukang code sa java
sa lalong madaling panahon. Janina group ay ang pangalawang presentor. Kapag ang
system ang ay ipinakita sa madla, ang mga hukom ay namangha dahil sa disenyo ng
system ay napaka-natatanging at kaya sila ay namangha dahil hindi sila naniniwala na
ang isang mag-aaral ng highschool ay maaaring gumawa ng isang mas mahusay na
application tulad na. Janina ay kaya impressed dahil nakita niya ang reaksyon ng mga
tao. Sinabi niya sa kanyang sarili na siya ay mapagmataas sa pamamagitan ng ang
gawain ng kanyang mga groupmates. Ngayon ang mga hukom ay naka-check ang code at
sinabi nila ito sa group ng janina kung paano patakbuhin ang application. Janina
ginawa ang demo. Niya ipinaliwanag kung ano ang ginagawa ng application at kung ano
ang paggamit nito. Isa ng ang hukom na tinatawag na ang pansin ng Miss Sonia. Sinabi
niya, "gusto kong makipag-usap sa pangkat sa tao, maaari mong i-iskedyul ang mga ito
para sa akin? Miss Sonia sa palagay na siya ay impressed sa gawain ng kanyang mga
mag-aaral at siya ay talagang maipagmamalaki ng mga ito para sa kanilang mga
trabaho na magaling. Matapos ang pagtatanghal ng group Janina ang huling group
upang ipakita ang Nice unibersidad at sila ay pagpunta upang magpakita ng isang
application gamit ang PHP wika. PHP ay nangangahulugan ay isang server-side na
wika scripting, lalo na angkop para sa paglikha ng mga dynamic na pahina ng web.
Programming language na ito ay nag-aalok ng mga web developer ng malaking
seleksyon ng mga instrumento. PHP, na kung saan ay naging ang batayan para sa
maraming mga application sa web, ay nagbibigay-daan sa madaling pagpapasok ng sa
HTML code at koneksyon sa MySQL at PgSQL Database (Mga pinagmumulan:
http://www.ntchosting.com/php/http://www.ntchosting.com/ php /).
Application ay halos ang parehong sa application ng unang pangkat, ay isang simpleng
calculator. Pagkatapos ng pagtatanghal ang mga hukom ay nagpasya na ang nagwagi at
ito ay lubos na halata Janina group na panalo ang labanan dahil sa ang kanilang mga
ideya at konsepto at din ang disenyo ng interface ng user. Janina at mga kaibigan won
unang lugar at ang mga mukha ng kaligayahan sa inyo ay talagang nakikita sa kanilang
mga mukha. Matapos ang awarding Janina at Miss Sonia-uusap, sinabi sa kung ano ang
mga hukom ay sinabi sa kanya. Janina sinabi na sila isipin ng ito at na gusto niya upang
humingi ng pahintulot mula sa kanyang mga kaibigan.
Time napupunta sa pamamagitan ng ... Janina ng trabaho ngayon. Siya ay isang system
analyst at ding isang abogado.
Sa mga araw na ito, mayroong isang bagay na mangyayari tungkol sa lipunan .. ito
kahila-hilakbot na gamitin ang internet dahil ang isa sa mga problema ng pamahalaan
kung saan ang pumasa sa isang batas na lumalabag sa ang paggamit ng internet ay
naaresto. Maraming tao ang nakakuha galit na may batas na. Janina bahagi bilang
isang abogado at isang system analyst siya ay sa pabor sa batas na ito dahil ang
kanyang dahilan ang ilang mga tao na paglaban sa internet nang hindi nakikita ang
kanilang mga mukha at ito lamang ang labanan na ang taong ito ay maaaring gawin o
labanan sa ang pinakamataas na tao sa pulitika . Sa pamamagitan ng sa cyber krimen
batas na ito, hindi sila maaaring labanan ito at sila ay sa halip panatilihing tahimik at
makinig sa panuntunan ng pamahalaan. Janina nais upang labanan ang mga karapatan
ng mga taong ito at ginawa niya ang isang pag-aaral tungkol sa saligang batas ng Batas,
ng Pilipinas at USA. Hayaan akong ipakita sa iyo ang Philippine Konstitusyon. Narito
ito ay at sabihin pag-aralan ito. Sa pamamagitan ng ang paraan, ang 1987 Batas ng
Konstitusyon ng Republika ng Pilipinas.
Tagalized version
Chapter 8
Sa kanya: "ang maaari kong i-download ang mga laro tulad ng lumindol at i-play ang
mga ito sa panahon ng tanghalian, alam mo."
Akin: "lamang kami pinapayagan 10 megs sa aming mga account, at ang mga
administrator ng system ay maaaring napansin mo-download ng isang malaking file."
Kanya: "Nah, maaari ko Hack ito kaya hindi niya magagawa."
Akin: "Ah, kaya ikaw ay sa pag-hack Sa pamamagitan ng ang paraan kilala mo ang
anumang mga wika programming.?"
Sa kanya: ". Oo, siyempre"
Sa akin: "Aling mga?"
Sa kanya: "Hindi ko masasabi sa iyo o sa ibang tao mong gamitin ang mga ito."
Sa akin: "lamang sa pamamagitan ng pagbanggit C + + o Pascal o anumang ay hindi
agad gumawa ako ng henyo sa mga wikang iyon."
Sa kanya: "Oh Paumanhin, hindi ko nauunawaan mo Oo, alam ko C + + at Pascal."
Sa akin: "Anong tagatala mong gamitin?"
Sa kanya: "Well, QBasic aking paboritong."
Sa akin: "Walang sinuman sa ibabaw ng edad ng walong paggamit QBasic para sa
malubhang mga layunin"
Sa kanya: "Pero ginawa nila ang Windows sa QBasic."
Ko halos sumigaw tumatawa.
Isang araw na ako ay sa isang pampublikong parke, pagbabasa ng "C + + Para sa
Dummies" kapag may isang taong dumating at nagtanong sa akin kung ano ang ako
pagbabasa. Ko sinabi sa kanya ako ay nagbabasa ng isang libro tungkol sa C + +.
Tumugon siya, "Oh, HTML kicks C + + 's @ $ $."
• Guro:. "Hindi mo maaaring gawin ang mga puwang sa HTML Kung makita mo ang
mga puwang sa mga pahina ng web, pagkatapos ay dapat silang gumagamit java upang
i-override ang basic HTML Java save ang Internet, dahil ito ay aalis ng mga limitasyon
ng HTML, ngunit ito ay hindi na saklaw ng. ang kursong ito upang ipakita sa iyo kung
paano gawin ito. "
• Aking Friend: "Kahapon, reprogrammed ko ang aking computer."
Sa akin: "Okay ...."
Aking Kaibigan: "Hindi aking Mac, ngunit ang aking PC ay may Windows Vista."
Sa akin: "Oo, at kung ano ang wika mo gamitin?"
Aking Friend: (i-pause) "Ingles."
Sa akin: "Ingles?"
• Aking Friend: "Oo, Ingles."
Ako ay ang gabi-time na operator para sa isang unibersidad sa hilagang bahagi ng
estado. Tumakbo namin ang aming-administratibo trabaho sa lokal, at ang mga
mag-aaral isinumite ang kanilang mga trabaho sa amin. Namin basahin ang kanilang
mga deck ng card sa aming IBM 370/115 na ipinadala sa kanila sa IBM 370/165 sa
kabisera na nagpadala ng mga resulta pabalik sa ipi-print. Balot pagkatapos namin ang
listahan sa paligid ng mga kiddies 'card deck at ilagay ang mga ito para sa kanila upang
kunin ang.
Isa gabi mag-aaral ay sa lugar ng pickup, pagtingin sa kanyang listahan, at umiiyak.
Kami operator ay hindi kinakailangan upang matulungan ang mga mag-aaral, ngunit
kung nagkaroon kami ng ilang labis na oras, palagi naming ginawa. Tinanong ko sa
kanya kung ano ang mali, at sinabi niya ang kanyang programa ay hindi gumagana nang
tama. Kinuha ko ang listahan at tumingin ito sa. Ito ay ang unang ehersisyo na ibinigay
sa unang semestre COBOL mga mag-aaral. Nakita ko walang mali dito. Walang mga
error sa tagatala, walang JCL error, at ang printout mula sa run kahit mukhang tama.
Kaya ko sinabi, "hindi ko makita ang anumang mga error."
Sa puntong iyon siya ipaalam ang isang mahusay na managhoy at hikbi. "Alam ko!" siya
sumigaw. "Iyon ang problema!"
"Huh?" Ko sinabi.
Ito naka magtuturo sa sinabi ng klase kung ano ang lahat ng mga instructor sabihin ang
kanilang mga klase para sa unang computer program sila kailanman isulat ang. "Huwag
mag-alala tungkol sa mga error sa unang pagkakataon mong isumite ang iyong deck.
Tao palaging makakuha ng mga error sa unang pagkakataon."
Well, sa pamamagitan ng ilang mga parasitiko ng improbabilidad, ang batang babae na
ito ng mga pinamamahalaang upang magsulat ng isang walang kamali-mali programa at
key na ito sa pangunahing manuntok walang aberya at Mayroon walang kamali-mali run
ang unang pagkakataon na siya sinubukan ito. Tagapagturo ang sinabi sa kanya sa
inaasahan error. Hindi niya ang mga ito, kaya inisip niya siya ay paggawa ng isang
bagay mali.
Isang beses ko nagtrabaho para sa IT department ng isang maliit na kumpanya ng
pagmamanupaktura. Ang bagong Vice President ng IT ay inaangkin na siya ay naging
isang programmer para sa higit sa dalawampung taon bago. Isang beses kami sa isang
pulong na may isang kumpanya ng software na tinanggap namin upang bumuo ng aming
web site para sa atin. Tulad ng ipinaliwanag nila na ang mga web page ay nakasulat sa
HTML at Javascript, VP na ito hinto ang mga ito malamig at nagsasabing, "Wala sa
aking mga guys dito gumana sa anumang ng Javascript na mga bagay-bagay! Ito ay
isang SQL shop! Gusto ko lang ang mga web page na nakasulat sa SQL upang maaari
naming sinusuportahan ito ating sarili! "
Sa halip na itama ang isang tao na gusto ng programmer para sa dalawampung taon,
ako nakaupo doon na may isang nilibang hitsura sa aking mukha para sa natitira ng
pulong. Kaya ginawa ang mga tao mula sa kumpanya ng software.
Ng iba shell script na nakita ko sa trabaho ngayon ay malawakan Nagkomento, kabilang
ang ang pinakahiyas ito ng hindi-impormasyon.
i-export PATH # I-export ang landas
• User: "Hey, maaari mo ng tulong sa akin aking programa ay hindi gumagana."
Consultant: "Ano ang problema ka ba gumagamit ng Turbo Pascal?"
User: "Oo, ang programa Haharangan ang machine."
Consultant: "Well, makatipon ito?"
User: "Hindi ko alam - ito lamang ay hindi tumatakbo mong makita ang EXE file Kung
nagpapatakbo ka, Haharangan ang machine.?."
Consultant: "At kung saan ay ang iyong mapagkukunan, ang pas file??"
• User: "ko sinulat ni ito at Pinalitan ang pangalan ito sa EXE sa gayon ay maaari itong
tumakbo."
Isang bagay na maraming tatakbo sa sa computer industriya, mga employer na sa halip
clueless at pa ay hindi kinakailangang Napagtanto ito. Noong 1996, ang isang kaibigan
sinabi sa akin tungkol sa isang boss niya na kinakailangan ng isang C programa na
nakasulat para sa kanya. Pagkatapos ng isang linggo, ang boss inireklamo na programa
ay hindi nagawa, at tinanong siya ang aking kaibigan kung ano ang pagkuha kaya
mahaba.
• Friend: "Ang programa ay nakasulat, at ako pag-debug ito."
• Boss:?.. "Ano ang mali sa mo tao mong ginagawa programa mas mahirap kaysa ito ay
kailangang maging ko may frontpage Express sa sumulat sa mga web page na may, at
kapag sumulat ako code dito, ako ay hindi kailanman kailangan upang i-debug ito Kung
ka ay bilang mabuti ng isang programmer bilang sa akin, hindi mo gusto kailangan
upang i-debug ang alinman. "
Ako ay paggawa ng aking paraan sa pamamagitan ng MSDN, pagtingin sa Win32 API
console function upang gumawa ng aking sariling gotoxy () function na sa Visual C + +
6.0. Aking C + + programming guro ay tumingin sa aking screen at tinanong:
• Guro: "Ano ang iyong ginagawa?"
Sa akin: "ako sinusubukan upang malaman kung paano gumawa ng gotoxy () sa Visual C
+ + kong gamitin Win32 API function."
Guro: "!. Walang hindi mo kailangang upang gamitin ang API function lamang tumagal
ng Borland C + + 3.1 header at ilagay ang mga ito sa Visual C + + 6.0 isama
direktoryo"
• Me: "Heuh ......."
Sa kasamaang palad, ang Borland C + + 3.1 ay dinisenyo para sa DOS at Win16. Visual
C + + ay gumagana sa Win32. Mas masahol pa, header lamang maglaman ng uri at
klase pagdeklara, tumutukoy, at mga function na modelo. Hindi ko alam kung paano
gumaganap ang aking mga guro naisip na gagana.
• programmer: "Ano ang ibig mong sabihin, Hindi ko ma-initialize bagay sa isang igiit
()"
Sa panahon ng pagsusuri ng code, kapag Tinanong ko kung bakit (bukod sa header ng
file ng kontrol ang pinagmulan) nagkaroon hindi isang komento sa 240.000 linya ng code
na nagsisimula ipinasa sa akin para sa maintenance, ang programmer ang tumugon,
"ako malaman."
Nakita ko ang komentong ito sa isang programa ay ibinigay ko i-edit:
kung x pagkatapos
# Kung ang kondisyon ay totoo
[Gawin ang isang bagay]
magtapos kung.
Ito literal sinabi "kung kondisyon ay totoo;" ito ay hindi isang Pagpapalawak sa
kabuluhan ng x.
Ako ay pagtulong sa isang kaibigan na may ilang mga code. Sa code, nakita ko ang
linya:
x = x;
at inalis ito. Ginawa ko ilang karagdagang mga pagbabago at ipadala ang code sa
kanya. Sinabi niya sa akin siya pa rin ay may mga error. Kaya't siya ay nagpadala sa
akin ang kanyang code muli, at muli kong natagpuan ang parehong linya. Tinanong ko
siya kung bakit siya iningatan ng paglalagay na sa doon, at siya ay tumugon, "Kaya x ay
hindi mawalan ng halaga nito."
Isang beses sa isang batang babae sa aking panimula sa programming klase Sinabi sa
akin na kinasusuklaman niya ang Microsoft at nagsimulang paggamit ng UNIX upang
ipunin ang kanyang mga programa. Sa paglaon, siya ay nag-email sa akin at sinabi siya
kinasusuklaman UNIX ngayon, masyadong, dahil ito ay magdudulot makatipon ang
kanyang programa ngunit hindi pinapayagan sa kanya upang makuha ang kanyang data.
Kaya't tinanong ko sa kanya upang ipadala ang kanyang code sa akin, at Gusto ko
tingnan ito. Ko stumbled kapag ito:
int addandsubtract (int a, int b)
{
return (a + b);
bumalik (b - a);
}
Tinanong ko sa kanya ang layunin ng function na ito, at sinabi niya sa akin gusto niya
munang makuha ang kabuuan ng isang at b at pagkatapos ay kunin ang pagkakaiba.
Hindi niya naintindihan kung bakit ito hindi gagana, at kinuha ito sa akin ng isang oras
o higit pa upang ipaliwanag kung bakit.
Turuan ko ng C programming kurso. Para sa isa ng ang asignatura, may isang beses
kinopya sa isang programa na eksaktong kopya mula sa isang kapwa mag-aaral na
ginawa ang kurso sa dalawang taon bago. Niya bigyang-pansin, bagaman: ng pagsunod
sa mga na-update na materyal Siyempre, kung saan sinabi na 'pangunahing' ay dapat
magbalik ng isang error code, siya ay nagbago:
walang bisa pangunahing (...) {... }
sa:
int walang bisa pangunahing (...) {... }
Hindi na kailangang sabihin, ang programa ay hindi kahit makatipon.
Sa kolehiyo, nagtrabaho ako bilang isang katulong sa pagtuturo para sa isang
panimulang wika ng programming. Para sa karamihan ng mga tao sa klase, ito ay
marahil kanilang unang at lamang na klase ng programming.
Isang araw, ako ay paggawa ng mga review ng programa code na may maliit na bilang
ng mga mag-aaral. Ito isang babae ang ibinigay sa akin ang kanyang code, at,
pagkatapos ng pagtingin sa ito, Tinanong ko kung bakit siya ay paulit-ulit sa isang tiyak
na linya nang dalawang beses:
ipaalam x = 7;
ipaalam x = 7;
Sinabi niya, "lamang sa kaso hindi ito ay makapag-set karapatan sa unang
pagkakataon."
Kapag ang isang propesor ng computer na nagtanong ang kanyang mga mag-aaral
magkomento ang lahat ng kanilang mga programa, nakuha niya ang mga remarks tulad
ng:
• "Ang program na ito ay napakabuti."
"Ang program na ito ay mahirap."
• "Ang program na ito ay lubhang kawili-wili."
Nakita ko ang komentong ito sa ilang mga code Mayroon akong upang mapanatili:
/ * Function na ito ay BOOL pero sa totoo ay nagbalik TRUE,
FALSE at -2 dahil nag ko walang oras upang baguhin ito
int * /
Hindi tumagal ng mas maraming oras upang isulat ang komento?
Kapag ako ay pag-aaral ng programming, isa sa aking mga kaklase ay pagkakaroon ng
malubhang problema kasama ng kanyang mga programa. Kapag nagtanong siya sa akin
para sa tulong, ako leaned sa kanyang screen at nakita ang lahat ng kanyang code sa
mga komento. Ang dahilan: "Well, ito compiles mas mabilis na paraan."
Sa kolehiyo ko nagtrabaho bilang isang consultant. Isang araw Grad mag-aaral na ito ay
nagkakaroon ng problema sa kanyang Fortran program at nagdala sa printout sa akin.
Sinabi niya siya iningatan pagbabago bagay ngunit hindi maaaring makakuha ng ito
upang patakbuhin ang tama. Kanyang pagtatasa: "nakukuha ko ang pakiramdam na ang
computer skips sa lahat ng mga komento."
Ko tutored mga mag-aaral sa kolehiyo na paglalaan isang computer course
programming. Ang ilan sa mga ito ay hindi maunawaan na ang mga computer ay hindi
nararamdaman. Higit sa isang tao ay ginamit ng mga komento sa kanilang mga
programa sa Pascal upang ilagay ang mga detalyadong paliwanag tulad ng, "Ngayon ay
kailangan ko mong ilagay ang mga titik sa screen." Tinanong ko ang isa sa mga ito kung
ano ang deal na may mga komento. Ang tugon: "Paano ibang computer upang
maunawaan kung ano ang gusto kong gawin ito sa?" Tila sila ay ipinapalagay na dahil
hindi nila kabuluhan ng Pascal, ni maaari computer.
Ako ay pagkuha ng isang panimulang kurso ng programming. Isa pagtatalaga ay upang
gawin ang isang maliit na programa ng Payroll, kabilang ang ilang data sa
pagpapatunay. Ang programa ay dapat tanggapin terminal input at ipadala ang output
sa alinman sa console o isang printer.
Biglang printer nagsimulang spewing ang papel tulad ng mabaliw. Isa ng mga
mag-aaral (isang partikular na mouthy babae) ay program ng mas
mababa-kaysa-kapaki-pakinabang na mensahe ng error ("Kayo ay mali") at hindi
nagbigay ng anumang lumabas mula sa error checking logic - sa programa muling
i-basahin ang huling ( bagsak) input at muling nasubok ito. Lahat sa lahat, ito ay
napakabuti walang-katapusang loop.
Pagkatapos pagsigam sa pamamagitan ng tungkol sa limampung pahina ng "Kayo ay
mali," may cut kapangyarihan sa printer, at tagapagturo ay manu-manong mapera
naka-print queue. Pumunta siya pabalik sa ang mag-aaral at tinanong kung siya ay
nasubok ang programa sa pamamagitan ng pagpapadala ng output sa console bago
sinusubukan upang i-print ito, at sinabi niya, oo, siya ay nasubok ito sa console at
natapos na may isang screen na puno ng "MO mali ang "mensahe. Bakit, pagkatapos, ay
siya ay nagpadala ng kanyang output sa printer? "Akala ko Gusto ko matapang!"
Kasamahan Isang sinulat ni ang dokumentasyon para sa mga code ng return mula sa
isang hanay ng mga function sa isa ng kanyang mga DLLs. Kabilang sa mga
dokumentasyon ay ito:
/ * Return code = 1: generic na kundisyon ng error
Bumalik ang code = 2: lahat ng iba pang mga kondisyon ng error * /
Ako ay pagkuha ng isang klase ng C programming sabay-sabay, at ang klase ay hinati sa
dalawang koponan ng programming. Sa aking koponan namin ay isang babae na
talagang out ng kanyang liga. Ano kinita ang kanyang maalamat na katayuan ang
paggawa ng isang pandaigdigang paghahanap at palitan, pagpapalit ng mga asterisk
para sa mga ampersand, dahil siya nadama ang mga asterisk ay hindi "nagtatrabaho."
Lang ako nagtuturo ng opsyonal na klase sa C programming, sa unang pulong ng klase,
Tinanong ko, "ba ang sinuman malaman kahit ano tungkol sa programming?"
Na kung saan ang isa sa aking mga mag-aaral tuwang-tuwa tumugon, "Alam ko kung
paano gumamit ng isang programa ng chat!"
Ako ay hilingin sa iyo na mapanatili ang isang shell script na pagkuha masyadong
mahaba upang tumakbo at hindi maaasahan. Bukod sa iba pang mga horrors, na
ibinigay sa akin ang pinakamahusay na halo ng tawa at takot ay isang paulit-ulit na
bumuo ng tulad nito:
display = `env | grep DISPLAY | ni / [^ =] * = / / g 'SED`
DISPLAY = $ display
i-export DISPLAY
Ito ginawa scratch sa akin ang aking ulo para sa isang sandali, hanggang ko natanto na
ito ay isang kumpletong walang-op. Katumbas ng DISPLAY = $ DISPLAY (maliban
kapag ang thegrep utos pulls maling bagay). Ito ay paulit-ulit na para sa isang bagay
tulad ng isang dosenang kapaligiran variable. Hindi ko pa rin umarok ng lalim ang logic
nito. Napunta ako paggawa ng isang kumpletong muling pagsulat.
Ako tanungin tungkol sa pagkuha sa isang kontrata upang mapanatili ang isang piraso
ng software. Isang bagay tungkol sa mga paraan na ito ay ipinakita sa akin ingat.
Tinanong ko tingnan muna ito. Ano ng paningin! Gamitin ko ito bilang isang halimbawa
ng kung bakit hindi gamitin ang global variable. Sa iba pang mga bagay, may mga file
na may mga suite ng mga function sa sumusunod na pagkakasunod-sunod:
adjust_alpha ()
{
alpha = gamma + offset * 3;
}
adjust_beta ()
{
beta = gamma + offset * 3;
}
Dose-dosenang ng mga function na differed lamang ng global variable na sila binagong.
Lamang ang larawan ito: multi-thousand programa sa linya na may graphical interface
at isang database na hindi kailanman gumamit ng mga parameter ng function na.
Ang orihinal na programmer pininturahan ang kanyang sarili sa isang sulok sa kanyang
variable pangalan. Malinaw kung kailangan mo ng mga variable na "up," "down," "sa
kaliwa," at "karapatan," ikaw pangalanan sila bilang tulad. Kapag nahanap na niya ang
kanyang sarili nangangailangan ng mga pangalan ng direksyon sa iba't ibang bahagi ng
kanyang programa ngunit ay natigil dahil sa global variable pangalan ay maging
natatangi, ang kanyang solusyon ay upang gamitin ang mga pangalan tulad ng:
up, _up, up_, Up, up, UP, _Up, _UP
pababa, _down, down_, Down, Down, DOWN, _Down, _DOWN
... At iba pa. Kahit ang pinakasiksik ng aking mga mag-aaral comprehended agad kung
bakit ay hindi maganda. Hindi na kailangang sabihin, naka ko sa trabaho.
Habang nagtatrabaho sa isang proyekto ng programming sa highschool kasama ang
isang kaibigan, nabanggit ko sa kanya na kung siya ay talagang gustong pangalanan ang
kanyang mga bagay ng mga variable tulad ng x, xx, andxx2, dapat siya ng hindi bababa
sa ilagay ang mga komento na nagsasabi kung ano ang kanilang ginagamit para sa.
Ang susunod na oras na ako ay tumingin higit sa kanyang balikat, Nakita ko na ito:
int x; / / x ay isang int
Ilang taon na ang nakalipas, ang isang kaibigan at ako ay sama-sama pagsusulat ng
isang laro sa C + +. Paulit-ulit namin ay nakakakuha ng error sa paglabag sa mahiwaga
access sa isang piraso ng code na dapat rock solid. Kalaunan nakita namin ang isang
bagay tulad nito, malinaw naman natira mula sa isang nakaraang pag-debug paupahang
karomata:
((Klase CNetwork *) 0x05af12b0) -> Initialise ();
Ito ay nawala hindi napapansin para sa isang habang dahil, sa labas ng nanganganinag
swerte, ang lahat ng mga bumubuo naming nais gawin dahil na paupahang karomata ay
hindi nagbago address sa memorya ng na partikular na halimbawa ng CNetwork.
Malinaw kalaunan namin nagbago ng isang bagay na nagdulot nito ay inilalaan sa ibang
lugar: cue pangunahing kaguluhan. Kung ang sinuman ay narinig ng dumber kasanayan
sa programming kaysa hardcoding ng pointer, Gusto ko upang makita ito!
Ito ay matatagpuan sa code na nakasulat sa pamamagitan ng isang dating empleyado.
strcpy (vl_name, "00000000000000000");
strcpy (vl_volume, "000000");
strncpy (temp1, vl_lud, 4);
temp1 [4] = '\ 0';
strncpy (temp2, vl_name +4,13);
temp2 [13] = '\ 0';
strcat (temp1, temp2);
strcpy (temp2, "");
sprintf (temp2, "% d", vl_serial_num);
temp1 [7] = '\ 0';
strcat (temp1, temp2);
strcat (temp1, "000,000,000");
temp1 [8] = '.';
strncpy (temp1, temp1, 9);
temp1 [9] = '\ 0';
strcat (temp1, vl_data_set_name);
temp1 [17] = '\ 0';
strcpy (vl_name, temp1);
strcpy (vl_volume, "1");
Ang aking kaibigan ay isang programa na guro sa isang lokal na mataas na paaralan,
kung saan may dalawang klase ng programming - itinuro niya at isa sa pamamagitan ng
isa pang guro. Kamakailang ginugol niya WEEKS paghahanda ang pangunahing
pagtatasa ang parehong mga klase ay gawin, isang malaking pagtatalaga na ang mga
mag-aaral ay gumana sa para sa susunod na ilang buwan.
Pati na rin ang tanong sheet para sa mga mag-aaral, siya din ginawa ng isang sagot
sheet para sa iba pang mga guro, sa gayon na maaaring maging pamilyar siya sa
kanyang sarili ang pagtatalaga bago ng pagbibigay ito sa kanyang klase.
Subalit ang iba pang mga guro na ito alam WALA tungkol sa programming at ay hindi
magagawang upang sabihin ang pagkakaiba sa pagitan ng mga tanong sheet at sagot
sheet, at kaya siya sugat photocopying ang sagot sheet at handing ito sa bawat
mag-aaral sa kanyang klase.
Siya hindi na nagtuturo sa programming.
Ito kaunti ng Java ay isinulat bilang bahagi ng isang proyekto ng grupo sa unibersidad.
Ang kaibigan na nakapasa ito sa akin ay nagba-bounce off ang mga pader tungkol sa
kalidad ng code ng nagkasala party (ulok mga bagay tulad ng pagtukoy ng error at
tagumpay code na may parehong halaga kaya hindi mo alam kung ano ang return ay
nangangahulugan code at mga bagay tulad na) , ngunit ito ay ang pinaka-malinaw
naman bobo bit.
pampublikong int convertItoi (Integer v)
{
kung (v.intValue () == 1) return 1;
kung (v.intValue () == 2) return 2;
kung (v.intValue () == 3) return 3;
kung (v.intValue () == 4) return 4;
kung (v.intValue () == 5) return 5;
kung (v.intValue () == 6) return 6;
kung (v.intValue () == 7) return 7;
bumalik 0;
}
Araw na nakalipas ako ay upang ayusin ang isang bug sa aming software. Ang tao na
orihinal na sinulat ni sa module ng mag-quit, kaya ako ay may kabuuang control ng
source code. Rewrote ko lubos kalahati ng code kapag nakita ko ang mga bagay tulad
ng:
int i;
memset (& i, 0, sizeof (int));
At:
switch (k) {
kaso 9: printf ("9 \ n");
kaso 8: kung (k == 8) printf ("8 \ n");
kaso 7: kung (k == 7) printf ("7 \ n");
/ / At iba pa ...
}
Nagtaka ko kung bakit siya ilagay ang "kung" clause, ngunit pagkatapos Napansin ko na
wala ng mga kaso ay ang mga pahayag na "break", kaya kung siya ay natagpuan na
kung k ay 9, ang programa naka-print 9, 8, 7, atbp. Kaya ko tingin idinagdag niya ang
"kung" clause sa maayos na pag-uugali.
Obra maestra ang, gayunpaman, ay ang mga sumusunod, kung saan ang dalawang
magkakasunod na error sa aktwal na sanhi ng programa upang gumana pinong:
magpasinda msg [40];
unsigned magpasinda k, j;
memset (msg, 0, 41); / * upang itakda ang Terminator * /
j = k;
...
Siyempre ang "memset" ay dapat i-reset ang msg variable, ngunit ito aktwal na din
i-reset ang k, kung saan walang ay ibinigay ang Pinasimulan; maaaring maging isang
sinadya kung solusyon hackish at maaasahan, ngunit na "itakda ang Terminator"
komento nagbibigay ito ang layo. Sa katunayan, sa buong kanyang code pinamahalaan
niya upang magdagdag ng isa para sa "Terminator," isang byte nakaraan ang
pagtatapos ng character array na siya ay nagtatrabaho sa.
Tungkol sa apat na taon na ang nakakaraan, ako ay nagtatrabaho sa isang proyekto na,
bukod sa iba pang mga bagay, kasangkot port ang ilang milyong mga linya ng code.
Habang hindi technically real-time, ang code na kinakailangan upang makatwirang
mabilis. Sa isang punto, nakita ko ang mga sumusunod na pinakahiyas:
unsigned mahaba reverse (unsigned mahaba theWord)
{
unsigned mahabang resulta = 0;
int i;
para sa (i = 0; i <32; + + i) {
kung (theWord & (unsigned mahaba) yukod (2.0, (double) i))
resulta + = (unsigned mahaba) yukod (2.0, (double) (31 - i));
}
bumalik resulta;
}
Malinaw, ang layunin ay upang baliktarin ang mga piraso sa isang salita. Natural,
tinatawag ko ang lahat ng aking mga kasamahan upang makita ito, at marveled namin
ang lahat ng sa kung paano ang isang tao ay iniisip na ang isang conversion sa
lumulutang-point, isang function na tawag, at isang conversion sa integer ay maaaring
maging mas mabilis kaysa sa isang operasyon ng shift. Upang sabihin wala ng
posibilidad ng mga rounding error sa ganap screwing, Um, algorithm.
Hindi nagkukulang upang mag-iwan ng isang ehersisyo para sa reader, narito ang
kapalit:
unsigned mahaba reverse (unsigned mahaba theWord)
{
unsigned mahabang resulta = 0;
int i;
para sa (i = 0; i <32; + + i) {
kung (theWord & (1 << i))
resulta + = 1 << (31 - i);
}
bumalik resulta;
}
Isang panimulang mag-aaral ng programming nang isang beses nagtanong sa akin
upang tumingin sa kanyang programa at malaman kung bakit palagi itong ay churning
out zeroes bilang resulta ng isang simpleng compute. Tiningnan ko sa programa, at ito
ay medyo halata:
simulan
readln ("Bilang ng mga mansanas", mansanas);
readln ("Bilang ng mga karot", karot);
readln ("Presyo para sa 1 Apple", a_price);
readln ("Presyo para sa 1 karot", c_price);
writeln ("Kabuuan para sa apples", a_total);
writeln ("Kabuuan para sa karot", c_total);
writeln ("Kabuuan", kabuuan);
kabuuan: = a_total + c_total;
a_total: = mansanas * a_price;
c_total: = karot + c_price;
pagtatapos;
• Me: "Well, ang iyong programa ay hindi maaaring i-print ang mga tamang resulta
bago sila ay nakalkula."
• Siya: ". Huh Ito ay lohikal na kung ano ang tamang solusyon, at ang computer ay dapat
baguhin ang pagkakaayos ng mga tagubilin ang tamang paraan"
Sa aking nakaraang trabaho, tayo ay port ng UNIX sistema sa Windows NT gamit ang
Microsoft VC + +. Ang isang kasamahan ng minahan, na sa proseso ng port ng kanyang
bahagi ng code, ay dumating sa akin, hinahanap talagang taob.
• kasamahan: "!! Hey mapoot ko mga guys Microsoft Ano ang isang bulok na tagatala ay
tumatanggap lamang ng 16,384 lokal na mga variable sa isang function!!"
Ko tumakbo sa buong ang pinakahiyas na ito habang ang pag-debug ng ibang tao ng
lumang code nang isang beses:
kung (halaga == 0)
bumalik halaga;
iba
bumalik 0;
Nakita ko ito buried sa aming code sa isang lugar:
kung (a)
{
/ * Gawin ang isang bagay * /
bumalik x;
}
iba pa kung (! isang)
{
/ * Gawin ibang bagay * /
bumalik y;
}
iba
{
/ * Gawin ng isang bagay na ganap na magkaibang * /
bumalik z;
}
Ako ay isang nasa pagsubok programmer na nagtatrabaho para sa akin. Hindi na
kailangang sabihin, hindi siya nakuha na permanenteng. Isang araw na ako ay
inspecting ang kanyang C code at natagpuan na ito:
kung (a = 1) {
... Ilang code ...
} Iba pa {
... Ilang iba pang mga code ...
}
Ko sinabi sa kanya ang sugnay na "pang tao" ay hindi kailanman ay makapag-pinaandar
dahil sa kanyang "kung" na statement. Tinanong ko sa kanya upang malaman kung bakit.
Sinabi niya na gusto niya "siyasatin" muna ito. Pinapayagan ko siya sa "siyasatin," dahil
hindi ito ay isang kritikal na gawain.
Isang araw mamaya, sinabi niya sa akin niya naisip ang problema. Sinabi niya ginamit
niya ang isang maling operand sa "kung" pahayag - dapat ito == sa halip na =, na kung
saan ay ganap na tamang. Ngunit pagkatapos siya ay nag-email sa akin ang kanyang
binagong code.
ng = 1;
kung (a == 1) {
... Ilang code ...
} Iba pa {
... Ilang iba pang mga code ...
}
Ano ang ...?
Tinanong ko siya kung ang "isang = 1" ay kailangan at hindi lamang ng isang fragment
ng debug code siya nakalimutan upang alisin ang bahagi ng. Sinabi niya ito ay
kinakailangan. Kaya tinanong ko siya kung ang "pang tao" na statement kailanman ay
pinaandar. Sinabi niya yes. Tinanong ko sa kanya upang ibigay sa akin ang sitwasyon
kapag tulad magaganap. Sinabi niya gusto niya makakuha ng bumalik sa akin na may
paliwanag.
Kicked ako sa kanya ng proyekto na parehong hapon.
Kapag ako tumakbo sa buong code na ginawa ito upang subukan ang i-ika-bit sa isang
byte malawak na halaga:
kung (halaga && (int) yukod (2, i))
{
...
}
Paglalagay sa lupa ang code na kasamahan ng sinulat ni taon na ang nakakaraan,
nakita ko ang mga sumusunod:
EndWhile = 0;
habang (EndWhile == 0)
{
...
kung (index <MAX)
EndWhile = 0;
iba
EndWhile = 1;
index = index + 1;
}
Taon na ang nakakaraan, ko bang ilagay ang isang simple, kapalaran cookie style
programa sa isang FTP site. Ito ay masyadong simplistic upang tumingin sa mga
variable sa kapaligiran o mga file ng configuration upang tumingin para sa mga
lokasyon ng kapalaran cookie database file; landas ay pinagsama-sama sa executable.
Ibinigay ko ang pinagmulan, kaya kung gusto mong baguhin ang landas na ito ay
naka-install sa, mayroon kang upang baguhin ang mga ito sa source file at
mag-recompile.
Dahil ko bang ilagay ito, ang bawat kaya madalas ako makakakuha ng isang email na
mensahe sa pagkomento sa dito. Kamakailan, Nakatanggap ako ng isang mensahe na
humihingi ng tulong sa pagsubok upang makuha ang mga bagay sa trabaho. Hindi siya
maaaring makuha ang executable upang mahanap ang file ng database maayos. Sumagot
ako sa kanya, at siya mailed pabalik nagsasabing walang nakatulong. Mailed ko sa
kanya muli, na nagsasabi na ang Readme file na kasama sa archive ay dapat magkaroon
ng napaka detalyadong mga tagubilin. Mailed niya sa akin pabalik sinasabi na ang
Readme file ay hindi makakatulong sa kanya. Kaya siya mailed sa akin ang source file
code, nagtanong sa akin upang baguhin ito sa paraan na ito ay dapat, pagkatapos ay
ipadala sa koreo pabalik sa kanya. Ko sinabi sa kanya, ngunit ako mag-type sa aking
huling tugon, isang kasuklam-suklam na pag-iisip na naganap sa akin. Kaya Tinanong
ko:
• Me: "ipinapalagay ko na mayroon ka ng isang C tagatala, tama?"
• User: "???? Ano ang isang C tagatala / ko ang Ini-edit ito gamit ang DOS editor"
Ako ay nagtatrabaho para sa isang pagkonsulta firm na tinatawag na upang matulungan
ang iba pang kompanya na paggawa ng ilang medyo mahalaga UNIX trabaho para sa
isang malaking kompanya sa Wall Street. Sila ay ang lahat ng mga Mac programmer na
ay kinuha sa isang linggo mahabang kurso sa UNIX, C programming, at UI
programming para sa partikular na workstation. Kinuha ko ang isang pagtingin sa
kanilang C code at ito ay littered na may mga sumusunod na pahayag ng code:
strcat (string, "\ 0");
Tinanong ko kung bakit sila ay ginagawa ito. Tugon ay, sa isang "hindi mo alam?" tono
ng boses: "Ang lahat ng mga string sa C ay dapat magtapos sa isang null zero!"
Sinusubukang upang ipaliwanag na strcat hindi gagana maliban kung ang null
Terminator ay doon na Nakakuha ako ng mga blangko stares.
Nakita ko na ang code na ito sipi sa isang maraming mga Freeware programa ng
paglalaro para sa UNIX:
/*
* Bit halaga.
*/
# Tukuyin ang BIT_0 1
# Tukuyin ang BIT_1 2
# Tukuyin ang BIT_2 4
# Tukuyin ang BIT_3 8
# Tukuyin ang BIT_4 16
# Tukuyin ang BIT_5 32
# Tukuyin ang BIT_6 64
# Tukuyin ang BIT_7 128
# Tukuyin ang BIT_8 256
# Tukuyin ang BIT_9 512
# Tukuyin ang BIT_10 1024
# Tukuyin ang BIT_11 2048
# Tukuyin ang BIT_12 4096
# Tukuyin ang BIT_13 8192
# Tukuyin ang BIT_14 16,384
# Tukuyin ang BIT_15 32,768
# Tukuyin ang BIT_16 65536
# Tukuyin ang BIT_17 131,072
# Tukuyin ang BIT_18 262,144
# Tukuyin ang BIT_19 524,288
# Tukuyin ang BIT_20 1,048,576
# Tukuyin ang BIT_21 2,097,152
# Tukuyin ang BIT_22 4,194,304
# Tukuyin ang BIT_23 8,388,608
# Tukuyin ang BIT_24 16,777,216
# Tukuyin ang BIT_25 33,554,432
# Tukuyin ang BIT_26 67,108,864
# Tukuyin ang BIT_27 134,217,728
# Tukuyin ang BIT_28 268,435,456
# Tukuyin ang BIT_29 536,870,912
# Tukuyin ang BIT_30 1073741824
# Tukuyin ang BIT_31 2147483648
Ang isang mas mas madaling paraan ng pagkamit na ito ay:
# Tukuyin ang BIT_0 0x00000001
# Tukuyin ang BIT_1 0x00000002
# Tukuyin ang BIT_2 0x00000004
# Tukuyin ang BIT_3 0x00000008
# Tukuyin ang BIT_4 0x00000010
...
# Tukuyin ang BIT_28 0x10000000
# Tukuyin ang BIT_29 0x20000000
# Tukuyin ang BIT_30 0x40000000
# Tukuyin ang BIT_31 0x80000000
Ay pa rin ang isang mas madaling paraan upang ipaalam sa tagatala gawin ang mga
kalkulasyon:
# Tukuyin ang BIT_0 (1)
# Tukuyin ang BIT_1 (1 << 1)
# Tukuyin ang BIT_2 (1 << 2)
# Tukuyin ang BIT_3 (1 << 3)
# Tukuyin ang BIT_4 (1 << 4)
...
# Tukuyin ang BIT_28 (1 << 28)
# Tukuyin ang BIT_29 (1 << 29)
# Tukuyin ang BIT_30 (1 << 30)
# Tukuyin ang BIT_31 (1 << 31)
Ngunit bakit pumunta sa lahat ng mga problema ng pagtukoy ng 32 constants? Ang C
wika din parameterized macros. Ang mo ba talagang kailangan ay:
# Tukuyin ang bit (x) (1 << (x))
Pa Rin, Siguro kung ang taong sinulat ni ang orihinal na code ginamit ng calculator o
compute ang lahat ng ito sa papel.
Kapag ako ay pa rin ng isang mag-aaral, nagtrabaho ako bilang isang admin para sa
unibersidad CS Dept. Bahagi ng trabaho na ito kasangkot oras sa labs ng mag-aaral.
Aming network ay isang koleksyon ng iba at ibang bagay ng Suns at SGIs at
pangkalahatang nakakalito para sa mga baguhan mga gumagamit na hindi maintindihan
ang konsepto ng multiuser, multitasking, network computer.
Sa paligid kuwarto ay malaking palatandaan na nagpapaliwanag kung paano mag-log
in, kasama na may malaking babala tungkol sa hindi pag-alis ng kapangyarihan maliban
kung gusto mo ang ideya ng pagkakaroon ng Grad mag-aaral pagpapatakbo ng ilang
milyong variable modeling proyekto siya ang ay nagtatrabaho sa para sa ilang taon
magpapakita at matalo ka kamatayan sa pananaliksik mga papeles.
Ka namangha kung gaano karaming mga tao ang subukan i-type sa isang programa sa
"Pag-login:" prompt, at pagkatapos ay i-on ang machine kapag ito ay tapos na. Ang
pinakamasama ng bungkos pagkatapos ay magreklamo tungkol sa hindi upang mahanap
ang programa lang nila na nai-type sa sa login prompt.
Ako ay naghahanap sa pamamagitan ng isang shell script ko ay nakasulat kamakailan, at
halos ko namatay kapag Nakita ko ang ilan ng code. Ako napahiya sa aminin ito, ngunit
narito ang isang bagay na ako ay tapos na:
kung ($ var = halaga) pagkatapos
# Gawin ang isang bagay
iba
# Gawin ang eksaktong parehong bagay tulad ng sa iba pang mga code
endif
Habang sa kolehiyo, na ginamit ko upang turuan nang sarilinan sa matematika lab ng
paaralan. Mag-aaral Ang isang dumating sa dahil sa kanyang BATAYANG programa
hindi tatakbo. Siya ay pagkuha ng isang baguhan kurso, at ang kanyang pagtatalaga ay
magsulat ng isang programa na kalkulahin ang recipe para sa oatmeal cookies, depende
sa bilang ng mga tao na ka sa pagbe-bake. Ako ay tumingin sa kanyang programa, at ito
nagpunta ang isang bagay tulad nito:
10 painitin muna oven sa 350
20 Pagsamahin ang lahat ng sangkap sa isang malaking paghahalo mangkok
30 Mix hanggang makinis
.
.
.
Isang "software engineer" na ginamit ko upang gumana sa isang beses ay nagkaroon ng
isang problema sa kanyang code na tumingin ng isang bagay tulad nito:
a_pointer-> fn ();
Sanhi ng Pangkalahatang Proteksyon ng error. Alam niya C, ngunit hindi C + + ginawa ko, kaya nagtanong siya sa akin para sa tulong. Ko sinabi sa kanya upang suriin
upang makita kung ang pointer ang null bago magsagawa ng tawag. Ang ilang mga oras
sa ibang pagkakataon dumating siya pabalik, ang problema ay pa rin nangyayari.
kung (a_pointer == null)
{
LogError ();
}
a_pointer-> fn ();
Sinabi ko, "Kailangan mong return pahayag pagkatapos ng LogError na tawag."
Sinabi niya, thoughtfully, "Saan ang bumalik sa?"
Isang kaibigan ng minahan nais upang subaybayan ng iba pang mga gumagamit sa
UNIX system ng aming unibersidad. May ay isang magaling na utos "huling" sa UNIX na
ilista ang huling user na naka-log in Kaya siya nagsulat ng script na nais mag-log in sa
lahat ng workstation ng kagawaran ng remote shell at patakbuhin ang "huling" utos, na
may resulta ibabalik sa nagmumula host, na nakolekta sa pinagsama-samang anyo.
Tinatawag siya ng maliit na script na ito "huling" - parehong pangalan bilang UNIX
command na sistema - at ilagay ang mga ito sa kanyang home directory. Kanyang landas
ay set up upang ang kanyang home directory ay may isang mas mataas na
mangingibabaw kaysa sa bin direktoryo ng UNIX. Kaya kapag tumakbo siya sa "huling"
utos, gamitin ang kanyang sariling script sa halip ng utos ng sistema.
Kaya siya tumakbo ang script. Log in sa lahat ng iba pang mga workstation lamang fine.
Pagkatapos tumakbo ang utos na "huling" - ang isa sa kanyang home directory,
siyempre, hindi ang utos ng sistema. Maaari mong hulaan kung ano ang nangyari.
Nakuha sa isang walang-katapusang loop na sinubukan na mag-log in sa bawat
workstation sa isang walang-katapusang bilang ng beses. Napaka-epektibo nuked off ang
buong kagawaran, at ang lahat ng mga workstation ay na-shut down ito upang tumigil.
Isa ng aming mga customer, ang isang pangunahing non-US pagtatanggol kontratista,
nagreklamo na ang kanilang code tumakbo masyadong mabagal. Ito ay isang komedya
ng mga error.
Kumilos ko
• Kontratista: "Maaari kang gumawa ng aming code patakbuhin nang mas mabilis?"
Suporta sa tech: "Oo, ngunit mayroon kaming upang tingnan ito."
Kontratista: "Hindi namin maaaring, ang code ay nauuri."
Suporta sa tech: "Maaari mo bang ipaliwanag sa akin kung ano ang iyong code ay
ginagawa?"
Kontratista: "Hindi, na naiuri"
Suporta sa tech: "Maaari mo bang sabihin sa amin kung anong mga function mong
gamitin?"
• Kontratista: "Hindi na naiuri."
Act II
Kaya, sa isang kutob ng loob, na ipinadala namin sa kanila ang pinakabagong bersyon
ng aming software para sa Windows NT.
• Kontratista: "Bakit ito tumatakbo nang mas mabilis sa aming 800MHz Pentium kaysa
sa aming VAX?"
Tech Support: "Kailan mo bumili na VAX?"
• Kontratista: "Ang ilang mga oras sa huli 1980s."
THIS CONTENT IS NOT MY TYPE WRITTEN I GET THIS TO THE INTERNET
AND I ALREDY SITED IT!!!!
Republic Act No. 10175
S. No. 2796
H. No. 5808
Republic of the Philippines
Congress of the Philippines
Metro Manila
Fifteenth Congress
Second Regular Session
Begun and held in Metro Manila, on Monday the Twenty-fifth day of July two thousand
eleven.
[ Republic Act No. 10175 ]
AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION,
INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES
THEREFOR AND FOR OTHER PURPOSES
Be it enacted by the Senate and House of Representatives of the Philippines in Congress
assembled:
CHAPTER I
PRELIMINARY PROVISIONS
SECTION 1. Title. — This Act shall be known as the ―Cybercrime Prevention Act of
2012″.
SEC. 2. Declaration of Policy. — The State recognizes the vital role of information and
communications industries such as content production, telecommunications, broadcasting
electronic commerce, and data processing, in the nation‘s overall social and economic
development. The State also recognizes the importance of providing an environment
conducive to the development, acceleration, and rational application and exploitation of
information and communications technology (ICT) to attain free, easy, and intelligible
access to exchange and/or delivery of information; and the need to protect and safeguard
the integrity of computer, computer and communications systems, networks, and
databases, and the confidentiality, integrity, and availability of information and data
stored therein, from all forms of misuse, abuse, and illegal access by making punishable
under the law such conduct or conducts. In this light, the State shall adopt sufficient
powers to effectively prevent and combat such offenses by facilitating their detection,
investigation, and prosecution at both the domestic and international levels, and by
providing arrangements for fast and reliable international cooperation.
SEC. 3. Definition of Terms. — For purposes of this Act, the following terms are hereby
defined as follows:
(a) Access refers to the instruction, communication with, storing data in, retrieving data
from, or otherwise making use of any resources of a computer system or communication
network.
(b) Alteration refers to the modification or change, in form or substance, of an existing
computer data or program.
(c) Communication refers to the transmission of information through ICT media,
including voice, video and other forms of data.
(d) Computer refers to an electronic, magnetic, optical, electrochemical, or other data
processing or communications device, or grouping of such devices, capable of
performing logical, arithmetic, routing, or storage functions and which includes any
storage facility or equipment or communications facility or equipment directly related to
or operating in conjunction with such device. It covers any type of computer device
including devices with data processing capabilities like mobile phones, smart phones,
computer networks and other devices connected to the internet.
(e) Computer data refers to any representation of facts, information, or concepts in a form
suitable for processing in a computer system including a program suitable to cause a
computer system to perform a function and includes electronic documents and/or
electronic data messages whether stored in local computer systems or online.
(f) Computer program refers to a set of instructions executed by the computer to achieve
intended results.
(g) Computer system refers to any device or group of interconnected or related devices,
one or more of which, pursuant to a program, performs automated processing of data. It
covers any type of device with data processing capabilities including, but not limited to,
computers and mobile phones. The device consisting of hardware and software may
include input, output and storage components which may stand alone or be connected in a
network or other similar devices. It also includes computer data storage devices or media.
(h) Without right refers to either: (i) conduct undertaken without or in excess of authority;
or (ii) conduct not covered by established legal defenses, excuses, court orders,
justifications, or relevant principles under the law.
(i) Cyber refers to a computer or a computer network, the electronic medium in which
online communication takes place.
(j) Critical infrastructure refers to the computer systems, and/or networks, whether
physical or virtual, and/or the computer programs, computer data and/or traffic data so
vital to this country that the incapacity or destruction of or interference with such system
and assets would have a debilitating impact on security, national or economic security,
national public health and safety, or any combination of those matters.
(k) Cybersecurity refers to the collection of tools, policies, risk management approaches,
actions, training, best practices, assurance and technologies that can be used to protect the
cyber environment and organization and user‘s assets.
(l) Database refers to a representation of information, knowledge, facts, concepts, or
instructions which are being prepared, processed or stored or have been prepared,
processed or stored in a formalized manner and which are intended for use in a computer
system.
(m) Interception refers to listening to, recording, monitoring or surveillance of the
content of communications, including procuring of the content of data, either directly,
through access and use of a computer system or indirectly, through the use of electronic
eavesdropping or tapping devices, at the same time that the communication is occurring.
(n) Service provider refers to:
(1) Any public or private entity that provides to users of its service the ability to
communicate by means of a computer system; and
(2) Any other entity that processes or stores computer data on behalf of such
communication service or users of such service.
(o) Subscriber’s information refers to any information contained in the form of computer
data or any other form that is held by a service provider, relating to subscribers of its
services other than traffic or content data and by which identity can be established:
(1) The type of communication service used, the technical provisions taken thereto and
the period of service;
(2) The subscriber‘s identity, postal or geographic address, telephone and other access
numbers, any assigned network address, billing and payment information, available on
the basis of the service agreement or arrangement; and
(3) Any other available information on the site of the installation of communication
equipment, available on the basis of the service agreement or arrangement.
(p) Traffic data or non-content data refers to any computer data other than the content of
the communication including, but not limited to, the communication‘s origin, destination,
route, time, date, size, duration, or type of underlying service.
CHAPTER II
PUNISHABLE ACTS
SEC. 4. Cybercrime Offenses. — The following acts constitute the offense of cybercrime
punishable under this Act:
(a) Offenses against the confidentiality, integrity and availability of computer data and
systems:
(1) Illegal Access. – The access to the whole or any part of a computer system without
right.
(2) Illegal Interception. – The interception made by technical means without right of any
non-public transmission of computer data to, from, or within a computer system
including electromagnetic emissions from a computer system carrying such computer
data.
(3) Data Interference. — The intentional or reckless alteration, damaging, deletion or
deterioration of computer data, electronic document, or electronic data message, without
right, including the introduction or transmission of viruses.
(4) System Interference. — The intentional alteration or reckless hindering or
interference with the functioning of a computer or computer network by inputting,
transmitting, damaging, deleting, deteriorating, altering or suppressing computer data or
program, electronic document, or electronic data message, without right or authority,
including the introduction or transmission of viruses.
(5) Misuse of Devices.
(i) The use, production, sale, procurement, importation, distribution, or otherwise making
available, without right, of:
(aa) A device, including a computer program, designed or adapted primarily for the
purpose of committing any of the offenses under this Act; or
(bb) A computer password, access code, or similar data by which the whole or any part of
a computer system is capable of being accessed with intent that it be used for the purpose
of committing any of the offenses under this Act.
(ii) The possession of an item referred to in paragraphs 5(i)(aa) or (bb) above with intent
to use said devices for the purpose of committing any of the offenses under this section.
(6) Cyber-squatting. – The acquisition of a domain name over the internet in bad faith to
profit, mislead, destroy reputation, and deprive others from registering the same, if such a
domain name is:
(i) Similar, identical, or confusingly similar to an existing trademark registered with the
appropriate government agency at the time of the domain name registration:
(ii) Identical or in any way similar with the name of a person other than the registrant, in
case of a personal name; and
(iii) Acquired without right or with intellectual property interests in it.
(b) Computer-related Offenses:
(1) Computer-related Forgery. —
(i) The input, alteration, or deletion of any computer data without right resulting in
inauthentic data with the intent that it be considered or acted upon for legal purposes as if
it were authentic, regardless whether or not the data is directly readable and intelligible;
or
(ii) The act of knowingly using computer data which is the product of computer-related
forgery as defined herein, for the purpose of perpetuating a fraudulent or dishonest
design.
(2) Computer-related Fraud. — The unauthorized input, alteration, or deletion of
computer data or program or interference in the functioning of a computer system,
causing damage thereby with fraudulent intent: Provided, That if no
damage has yet been caused, the penalty imposable shall be one (1) degree lower.
(3) Computer-related Identity Theft. – The intentional acquisition, use, misuse, transfer,
possession, alteration or deletion of identifying information belonging to another,
whether natural or juridical, without right: Provided, That if no damage has yet been
caused, the penalty imposable shall be one (1) degree lower.
(c) Content-related Offenses:
(1) Cybersex. — The willful engagement, maintenance, control, or operation, directly or
indirectly, of any lascivious exhibition of sexual organs or sexual activity, with the aid of
a computer system, for favor or consideration.
(2) Child Pornography. — The unlawful or prohibited acts defined and punishable by
Republic Act No. 9775 or the Anti-Child Pornography Act of 2009, committed through a
computer system: Provided, That the penalty to be imposed shall be (1) one degree
higher than that provided for in Republic Act No. 9775.
(3) Unsolicited Commercial Communications. — The transmission of commercial
electronic communication with the use of computer system which seek to advertise, sell,
or offer for sale products and services are prohibited unless:
(i) There is prior affirmative consent from the recipient; or
(ii) The primary intent of the communication is for service and/or administrative
announcements from the sender to its existing users, subscribers or customers; or
(iii) The following conditions are present:
(aa) The commercial electronic communication contains a simple, valid, and reliable way
for the recipient to reject. receipt of further commercial electronic messages (opt-out)
from the same source;
(bb) The commercial electronic communication does not purposely disguise the source of
the electronic message; and
(cc) The commercial electronic communication does not purposely include misleading
information in any part of the message in order to induce the recipients to read the
message.
(4) Libel. — The unlawful or prohibited acts of libel as defined in Article 355 of the
Revised Penal Code, as amended, committed through a computer system or any other
similar means which may be devised in the future.
SEC. 5. Other Offenses. — The following acts shall also constitute an offense:
(a) Aiding or Abetting in the Commission of Cybercrime. – Any person who willfully
abets or aids in the commission of any of the offenses enumerated in this Act shall be
held liable.
(b) Attempt in the Commission of Cybercrime. — Any person who willfully attempts to
commit any of the offenses enumerated in this Act shall be held liable.
SEC. 6. All crimes defined and penalized by the Revised Penal Code, as amended, and
special laws, if committed by, through and with the use of information and
communications technologies shall be covered by the relevant provisions of this Act:
Provided, That the penalty to be imposed shall be one (1) degree higher than that
provided for by the Revised Penal Code, as amended, and special laws, as the case may
be.
SEC. 7. Liability under Other Laws. — A prosecution under this Act shall be without
prejudice to any liability for violation of any provision of the Revised Penal Code, as
amended, or special laws.
CHAPTER III
PENALTIES
SEC. 8. Penalties. — Any person found guilty of any of the punishable acts enumerated
in Sections 4(a) and 4(b) of this Act shall be punished with imprisonment of prision
mayor or a fine of at least Two hundred thousand pesos (PhP200,000.00) up to a
maximum amount commensurate to the damage incurred or both.
Any person found guilty of the punishable act under Section 4(a)(5) shall be punished
with imprisonment of prision mayor or a fine of not more than Five hundred thousand
pesos (PhP500,000.00) or both.
If punishable acts in Section 4(a) are committed against critical infrastructure, the penalty
of reclusion temporal or a fine of at least Five hundred thousand pesos (PhP500,000.00)
up to maximum amount commensurate to the damage incurred or both, shall be imposed.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)(1) of
this Act shall be punished with imprisonment of prision mayor or a fine of at least Two
hundred thousand pesos (PhP200,000.00) but not exceeding One million pesos
(PhP1,000,000.00) or both.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)(2) of
this Act shall be punished with the penalties as enumerated in Republic Act No. 9775 or
the ―Anti-Child Pornography Act of 2009″: Provided, That the penalty to be imposed
shall be one (1) degree higher than that provided for in Republic Act No. 9775, if
committed through a computer system.
Any person found guilty of any of the punishable acts enumerated in Section 4(c)(3) shall
be punished with imprisonment of arresto mayor or a fine of at least Fifty thousand pesos
(PhP50,000.00) but not exceeding Two hundred fifty thousand pesos (PhP250,000.00) or
both.
Any person found guilty of any of the punishable acts enumerated in Section 5 shall be
punished with imprisonment one (1) degree lower than that of the prescribed penalty for
the offense or a fine of at least One hundred thousand pesos (PhP100,000.00) but not
exceeding Five hundred thousand pesos (PhP500,000.00) or both.
SEC. 9. Corporate Liability. — When any of the punishable acts herein defined are
knowingly committed on behalf of or for the benefit of a juridical person, by a natural
person acting either individually or as part of an organ of the juridical person, who has a
leading position within, based on: (a) a power of representation of the juridical person
provided the act committed falls within the scope of such authority; (b) an authority to
take decisions on behalf of the juridical person: Provided, That the act committed falls
within the scope of such authority; or (c) an authority to exercise control within the
juridical person, the juridical person shall be held liable for a fine equivalent to at least
double the fines imposable in Section 7 up to a maximum of Ten million pesos
(PhP10,000,000.00).
If the commission of any of the punishable acts herein defined was made possible due to
the lack of supervision or control by a natural person referred to and described in the
preceding paragraph, for the benefit of that juridical person by a natural person acting
under its authority, the juridical person shall be held liable for a fine equivalent to at least
double the fines imposable in Section 7 up to a maximum of Five million pesos
(PhP5,000,000.00).
The liability imposed on the juridical person shall be without prejudice to the criminal
liability of the natural person who has committed the offense.
CHAPTER IV
ENFORCEMENT AND IMPLEMENTATION
SEC. 10. Law Enforcement Authorities. — The National Bureau of Investigation (NBI)
and the Philippine National Police (PNP) shall be responsible for the efficient and
effective law enforcement of the provisions of this Act. The NBI and the PNP shall
organize a cybercrime unit or center manned by special investigators to exclusively
handle cases involving violations of this Act.
SEC. 11. Duties of Law Enforcement Authorities. — To ensure that the technical nature
of cybercrime and its prevention is given focus and considering the procedures involved
for international cooperation, law enforcement authorities specifically the computer or
technology crime divisions or units responsible for the investigation of cybercrimes are
required to submit timely and regular reports including pre-operation, post-operation and
investigation results and such other documents as may be required to the Department of
Justice (DOJ) for review and monitoring.
SEC. 12. Real-Time Collection of Traffic Data. — Law enforcement authorities, with due
cause, shall be authorized to collect or record by technical or electronic means traffic data
in real-time associated with specified communications transmitted by means of a
computer system.
Traffic data refer only to the communication‘s origin, destination, route, time, date, size,
duration, or type of underlying service, but not content, nor identities.
All other data to be collected or seized or disclosed will require a court warrant.
Service providers are required to cooperate and assist law enforcement authorities in the
collection or recording of the above-stated information.
The court warrant required under this section shall only be issued or granted upon written
application and the examination under oath or affirmation of the applicant and the
witnesses he may produce and the showing: (1) that there are reasonable grounds to
believe that any of the crimes enumerated hereinabove has been committed, or is being
committed, or is about to be committed: (2) that there are reasonable grounds to believe
that evidence that will be obtained is essential to the conviction of any person for, or to
the solution of, or to the prevention of, any such crimes; and (3) that there are no other
means readily available for obtaining such evidence.
SEC. 13. Preservation of Computer Data. — The integrity of traffic data and subscriber
information relating to communication services provided by a service provider shall be
preserved for a minimum period of six (6) months from the date of the transaction.
Content data shall be similarly preserved for six (6) months from the date of receipt of the
order from law enforcement authorities requiring its preservation.
Law enforcement authorities may order a one-time extension for another six (6) months:
Provided, That once computer data preserved, transmitted or stored by a service provider
is used as evidence in a case, the mere furnishing to such service provider of the
transmittal document to the Office of the Prosecutor shall be deemed a notification to
preserve the computer data until the termination of the case.
The service provider ordered to preserve computer data shall keep confidential the order
and its compliance.
SEC. 14. Disclosure of Computer Data. — Law enforcement authorities, upon securing a
court warrant, shall issue an order requiring any person or service provider to disclose or
submit subscriber‘s information, traffic data or relevant data in his/its possession or
control within seventy-two (72) hours from receipt of the order in relation to a valid
complaint officially docketed and assigned for investigation and the disclosure is
necessary and relevant for the purpose of investigation.
SEC. 15. Search, Seizure and Examination of Computer Data. — Where a search and
seizure warrant is properly issued, the law enforcement authorities shall likewise have the
following powers and duties.
Within the time period specified in the warrant, to conduct interception, as defined in this
Act, and:
(a) To secure a computer system or a computer data storage medium;
(b) To make and retain a copy of those computer data secured;
(c) To maintain the integrity of the relevant stored computer data;
(d) To conduct forensic analysis or examination of the computer data storage medium;
and
(e) To render inaccessible or remove those computer data in the accessed computer or
computer and communications network.
Pursuant thereof, the law enforcement authorities may order any person who has
knowledge about the functioning of the computer system and the measures to protect and
preserve the computer data therein to provide, as is reasonable, the necessary
information, to enable the undertaking of the search, seizure and examination.
Law enforcement authorities may request for an extension of time to complete the
examination of the computer data storage medium and to make a return thereon but in no
case for a period longer than thirty (30) days from date of approval by the court.
SEC. 16. Custody of Computer Data. — All computer data, including content and traffic
data, examined under a proper warrant shall, within forty-eight (48) hours after the
expiration of the period fixed therein, be deposited with the court in a sealed package,
and shall be accompanied by an affidavit of the law enforcement authority executing it
stating the dates and times covered by the examination, and the law enforcement
authority who may access the deposit, among other relevant data. The law enforcement
authority shall also certify that no duplicates or copies of the whole or any part thereof
have been made, or if made, that all such duplicates or copies are included in the package
deposited with the court. The package so deposited shall not be opened, or the recordings
replayed, or used in evidence, or then contents revealed, except upon order of the court,
which shall not be granted except upon motion, with due notice and opportunity to be
heard to the person or persons whose conversation or communications have been
recorded.
SEC. 17. Destruction of Computer Data. — Upon expiration of the periods as provided
in Sections 13 and 15, service providers and law enforcement authorities, as the case may
be, shall immediately and completely destroy the computer data subject of a preservation
and examination.
SEC. 18. Exclusionary Rule. — Any evidence procured without a valid warrant or beyond
the authority of the same shall be inadmissible for any proceeding before any court or
tribunal.
SEC. 19. Restricting or Blocking Access to Computer Data. — When a computer data is
prima facie found to be in violation of the provisions of this Act, the DOJ shall issue an
order to restrict or block access to such computer data.
SEC. 20. Noncompliance. — Failure to comply with the provisions of Chapter IV hereof
specifically the orders from law enforcement authorities shall be punished as a violation
of Presidential Decree No. 1829 with imprisonment of prision correctional in its
maximum period or a fine of One hundred thousand pesos (Php100,000.00) or both, for
each and every noncompliance with an order issued by law enforcement authorities.
CHAPTER V
JURISDICTION
SEC. 21. Jurisdiction. — The Regional Trial Court shall have jurisdiction over any
violation of the provisions of this Act. including any violation committed by a Filipino
national regardless of the place of commission. Jurisdiction shall lie if any of the
elements was committed within the Philippines or committed with the use of any
computer system wholly or partly situated in the country, or when by such commission
any damage is caused to a natural or juridical person who, at the time the offense was
committed, was in the Philippines.
There shall be designated special cybercrime courts manned by specially trained judges
to handle cybercrime cases.
CHAPTER VI
INTERNATIONAL COOPERATION
Sec. 22. General Principles Relating to International Cooperation — All relevant
international instruments on international cooperation in criminal matters, arrangements
agreed on the basis of uniform or reciprocal legislation, and domestic laws, to the widest
extent possible for the purposes of investigations or proceedings concerning criminal
offenses related to computer systems and data, or for the collection of evidence in
electronic form of a criminal, offense shall be given full force and effect.
CHAPTER VII
COMPETENT AUTHORITIES
SEC 23. Department of Justice (DOJ). — There is hereby created an Office of
Cybercrime within the DOJ designated as the central authority in all matters related to
international mutual assistance and extradition.
SEC. 24. Cybercrime Investigation and Coordinating Center. — There is hereby created,
within thirty (30) days from the effectivity of this Act, an inter-agency body to be known
as the Cybercrime Investigation and Coordinating Center (CICC), under the
administrative supervision of the Office of the President, for policy coordination among
concerned agencies and for the formulation and enforcement of the national cybersecurity
plan.
SEC. 25. Composition. — The CICC shall be headed by the Executive Director of the
Information and Communications Technology Office under the Department of Science
and Technology (ICTO-DOST) as Chairperson with the Director of the NBI as Vice
Chairperson; the Chief of the PNP; Head of the DOJ Office of Cybercrime; and one (1)
representative from the private sector and academe, as members. The CICC shall be
manned by a secretariat of selected existing personnel and representatives from the
different participating agencies.
SEC. 26. Powers and Functions. — The CICC shall have the following powers and
functions:
(a) To formulate a national cybersecurity plan and extend immediate assistance for the
suppression of real-time commission of cybercrime offenses through a computer
emergency response team (CERT);
(b) To coordinate the preparation of appropriate and effective measures to prevent and
suppress cybercrime activities as provided for in this Act;
(c) To monitor cybercrime cases being bandied by participating law enforcement and
prosecution agencies;
(d) To facilitate international cooperation on intelligence, investigations, training and
capacity building related to cybercrime prevention, suppression and prosecution;
(e) To coordinate the support and participation of the business sector, local government
units and nongovernment organizations in cybercrime prevention programs and other
related projects;
(f) To recommend the enactment of appropriate laws, issuances, measures and policies;
(g) To call upon any government agency to render assistance in the accomplishment of
the CICC‘s mandated tasks and functions; and
(h) To perform all other matters related to cybercrime prevention and suppression,
including capacity building and such other functions and duties as may be necessary for
the proper implementation of this Act.
CHAPTER VIII
FINAL PROVISIONS
SEC. 27. Appropriations. — The amount of Fifty million pesos (PhP50,000,000.00) shall
be appropriated annually for the implementation of this Act.
SEC. 28. Implementing Rules and Regulations. — The ICTO-DOST, the DOJ and the
Department of the Interior and Local Government (DILG) shall jointly formulate the
necessary rules and regulations within ninety (90) days from approval of this Act, for its
effective implementation.
SEC. 29. Separability Clause — If any provision of this Act is held invalid, the other
provisions not affected shall remain in full force and effect.
SEC. 30. Repealing Clause. — All laws, decrees or rules inconsistent with this Act are
hereby repealed or modified accordingly. Section 33(a) of Republic Act No. 8792 or the
―Electronic Commerce Act‖ is hereby modified accordingly.
SEC. 31. Effectivity. — This Act shall take effect fifteen (15) days after the completion of
its publication in the Official Gazette or in at least two (2) newspapers of general
circulation.
Approved,
(Sgd.) FELICIANO BELMONTE JR.
Speaker of the House
of Representatives
(Sgd.) JUAN PONCE ENRILE
President of the Senate
This Act which is a consolidation of Senate Bill No. 2796 and House Bill No. 5808 was
finally passed by the Senate and the House of Representatives on June 5, 2012 and June
4, 2012, respectively.
(Sgd.) MARILYN B. BARUA-YAP
Secretary General
House of Representatives
(Sgd.) EMMA LIRIO-REYES
Secretary of the Senate
Approved: SEP 12 2012
(Sgd.) BENIGNO S. AQUINO III
President of the Philippines
Cybercrime Prevention Act of 2012
From Wikipedia, the free encyclopedia
Jump to: navigation, search
The Cybercrime Prevention Act of 2012, officially recorded as Republic Act No.
10175, is a in the approved on 12 September 2012. It aims to address legal issues
concerning online interactions and the . Among the cybercrime offenses included in the
bill are , , , , illegal access to data and .[1]
Screenshot of the social networking site , as the Filipinos changed their profile pictures
into black in protest against the Cybercrime Prevention Law of 2012
While hailed for penalizing illegal acts done via the internet that were not covered by old
laws, the act has been criticized for its provision on criminalizing libel, which is
perceived to be a curtailment in freedom of expression.
Contents
[]
• 1 History
2 Provisions
3 Reactions
4 Petitions to the Supreme Court
5 See also
6 References
• 7 External links
[] History
The Cybercrime Prevention Act of 2012 is the first law in the Philippines which
specifically criminalizes , which prior to the passage of the law had no strong legal
precedent in Philippine jurisprudence. While laws such as the (Republic Act No.
8792[2] ) regulated certain computer-related activities, these laws did not provide a legal
basis for criminalizing crimes committed on a computer in general: for example, Onel de
Guzman, the computer programmer charged with purportedly writing the computer
worm, was ultimately not prosecuted by Philippine authorities due to a lack of legal basis
for him to be charged under existing Philippine laws at the time of his arrest.[3]
Although several cybercrime-related bills were filed in the and , the Cybercrime
Prevention Act in its current form is the product of House Bill No. 5808, authored by
Representative of the and 36 other co-authors, and Senate Bill No. 2976, proposed by
Senator . Both bills were passed by their respective chambers within one day of each
other on June 5 and 4, 2012, respectively, shortly after the , and the final version of the
Act was later signed into law by President on September 12, 2012.
[] Provisions
The Act, divided into 31 sections split across eight chapters, criminalizes several types of
offenses, including (hacking), , device misuse, , computer-related offenses such as ,
content-related offenses such as and , and other offenses. The law also reaffirms
existing laws against , an offense under Republic Act No. 9779 (the Anti-Child
Pornography Act of 2009), and , an offense under Section 355 of the , also criminalizing
them when committed using a computer system. Finally, the Act provides for a
"catch-all" clause, wherein all offenses currently punishable under the Revised Penal
Code are likewise punishable under the Act when committed using a computer, with
corresponding stricter penalties than if the crimes were punishable under the Revised
Penal Code alone.
The Act has : its provisions apply to all Filipino nationals regardless of the place of
commission. Jurisdiction also lies when a punishable act is either committed within the
Philippines, whether the erring device is wholly or partly situated in the Philippines, or
whether damage was done to any natural or juridical person who at the time of
commission was within the Philippines. shall have jurisdiction over cases involving
violations of the Act.
A takedown clause is included in the Act, empowering the to restrict and/or demand the
removal of content found to be contrary to the provisions of the Act, without the need for
a court order. This provision, originally not included in earlier iterations of the Act as it
was being deliberated through Congress, was inserted during deliberations on May 31,
2012.[4] Complementary to the takedown clause is a clause mandating the retention of
data on computer servers for six months after the date of transaction, which may be
extended for another six months should law enforcement authorities request it.
The Act also mandates the and the to organize a cybercrime unit, staffed by special
investigators whose responsibility will be to exclusively handle cases pertaining to
violations of the Act, under the supervision of the Department of Justice. The unit is
empowered to, among others, collect real-time traffic data from Internet service providers
with due cause, require the disclosure of computer data within 72 hours after receipt of a
court warrant from a service provider, and conduct searches and seizures of computer
data and equipment. It also mandates the establishment of special "cybercrime courts"
which will handle cases involving cybercrime offenses (offenses enumerated in Section
4(a) of the Act).
[] Reactions
The new Act received mixed reactions from several sectors upon its enactment,
particularly with how its provisions could potentially affect freedom of expression, and
in the Philippines.
The has received the new law well, citing an increase in the confidence of investors due
to measures for the protection of electronic devices and online data.[5] Media
organizations and legal institutions though have criticized the Act for extending the
definition of libel as defined in the , which has been criticized by international
organizations as being outdated:[6] the United Nations for one has remarked that the
current definition of libel as defined in the Revised Penal Code is inconsistent with the ,
and therefore violates the respect of freedom of expression.[7]
Senator , the main proponent of the Act, defended the law by saying that it is a legal
framework to protect freedoms such as the freedom of expression. He asked the Act's
critics to wait for the bill's implementing rules and regulations to see if the issues were
addressed.[8] He also added that the new law is unlike the controversial and .[9]
However, Senator criticized the bill, calling it a prior restraint to the freedom of speech
and freedom of expression.[10]
The has also expressed concern about the Act,[11] supporting local media and
journalist groups which are opposed to it.
[] Petitions to the Supreme Court
Several petitions have been submitted to the questioning the constitutionality of the
Act.[12] However, on October 2, the Supreme Court deferred on acting on the petitions,
citing the absence of justices which prevented the Court from sitting en banc.[13] The
lack of a temporary restraining order meant that the law went into effect as scheduled on
October 3. In protest, Filipino netizens reacted by blacking out their profile pictures and
trending the hashtag #notocybercrimelaw on . also defaced government websites,
including those of the , the and the .
On October 9, 2012, the issued a , stopping implementation of the Act for 120 days.[14]
Petitioner
Date of Filling
1 Sen. Teofisto Guingona III
2 Group of lawyers from the Ateneo School of Law
3 Journalists led by Alab ng Mamahayag (ALAM)
September 24,
2012
4 Kabataan party-list Rep. Raymond Palatino
5 National Artist Bienvenido Lumbera et al.
6 Technology law experts led by UP Law professor JJ Disini
7 Louis Biraogo
8
9
10
11
12
13
14
15
September 25,
2012
National Union of Journalists of the Philippines and the Center for
Media Freedom and Responsibility
Bloggers and Netizens for Democracy (BAND) led by Tonyo Cruz,
October 4, 2012
"The Professional Heckler‖ and 18 more bloggers
Philippine Bar Association
Paul Cornelius Castillo and Ryan Andres
October 3, 2012
Bayan Muna. Rep. Neri Colmenares
National Press Club
Philippine Internet Freedom Alliance
Harry Roque et al.
See also
•
•
References
1. ^ Gonzales, JR Lopez (1 October 2012). "Cybercrime Prevention Act of
2012: A Cyber 'Martial Law'?" . PoliTikalon: The Official Weblog of JR Lopez
Gonzales.
http://politikalon.blogspot.com/2012/10/cybercrime-prevention-act-of-2012.html .
^
Retrieved 2 October 2012.
Electronic Commerce Act of 2000 (Republic Act No. 8792)
^ Arnold, Wayne (22 August 2000). "Technology; Philippines to Drop Charges on
E-Mail Virus" . .
http://www.nytimes.com/2000/08/22/business/technology-philippines-to-drop-charges-on
-e-mail-virus.html . Retrieved 3 October 2012.
^ Reyes, Karl John C. (2 October 2012). "Senate inserted Section 19: How the
'take-down' clause emerged in Cybercrime Law" . .
http://www.interaksyon.com/article/44588/senate-inserted-section-19-how-the-takedown-clause-emerged-in-cybercrime-law . Retrieved 3 October 2012.
^ Agcaoili, Lawrence (20 September 2012). "IT-BPO industry welcomes passage
of Cybercrime Prevention Act" . .
http://www.philstar.com/Article.aspx?publicationSubCategoryId=66&articleId=850688 .
Retrieved 24 September 2012.
^ Panela, Shaira (19 September 2012). "Cybercrime Act extends reach of
'draconian', outdated libel laws" . .
http://www.gmanetwork.com/news/story/274755/scitech/technology/cybercrime-actextends-reach-of-draconian-outdated-libel-laws . Retrieved 24 September 2012.
^ Tiongson, Frank Lloyd (30 January 2012). "Libel law violates freedom of
expression – UN rights panel" . .
http://www.manilatimes.net/index.php/news/top-stories/16100-libel-law-violates-freedom
-of-expression--un-rights-panel . Retrieved 24 September 2012.
^ Sy, Marvin (23 September 2012). "'Give Cybercrime Prevention Act a chance'"
. .
http://www.philstar.com/Article.aspx?articleId=851856&publicationSubCategoryId=63 .
Retrieved 24 September 2012.
^ Angara, Edgardo. "Protecting our Cyberspace - The Cybercrime Prevention
Act of 2012" . EdAngara.com.
http://www.edangara.com/protecting-our-cyberspace-the-cybercrime-prevention-ac
t-of-2012-angara . Retrieved 24 September 2012.
^ Mendes, Christina (22 September 2012). "Guingona criticizes Cybercrime
Prevention Act" . .
http://www.philstar.com/Article.aspx?articleId=851537&publicationSubCategoryId=63 .
Retrieved 25 September 2012.
^ "Philippines' New Cybercrime Prevention Act Troubling for Free Expression" .
.
https://www.eff.org/deeplinks/2012/09/philippines-new-cybercrime-prevention-act-troubl
ing-free-expression . Retrieved 1 October 2012.
^ Canlas, Jonas (27 September 2012). "Suits pile up assailing anti-cybercrime
law" . .
http://www.manilatimes.net/index.php/news/nation/31925-suits-pile-up-assailing-anti-cy
bercrime-law . Retrieved 27 September 2012.
^ Torres, Tetch (2 October 2012). "SC defers action on petitions vs cybercrime
law" . .
http://newsinfo.inquirer.net/281390/sc-defers-action-on-petitions-vs-cybercrime-law .
Retrieved 2 October 2012.
2. ^ Torres, Tetch (9 October 2012). "SC issues TRO vs cyber law" .
(Philippine Daily Inquirer, Inc.).
http://newsinfo.inquirer.net/285848/sc-stops-cyber-law . Retrieved 9 October
2012.
Download