Podcast
Questions and Answers
What is the main purpose of personal hygiene?
What is the main purpose of personal hygiene?
Which of the following is NOT included in the scope of personal hygiene?
Which of the following is NOT included in the scope of personal hygiene?
Which method is commonly used for treating water impurities?
Which method is commonly used for treating water impurities?
What does waste minimization refer to?
What does waste minimization refer to?
Signup and view all the answers
Which of the following is a control measure against diseases?
Which of the following is a control measure against diseases?
Signup and view all the answers
Which source is NOT considered a source of water?
Which source is NOT considered a source of water?
Signup and view all the answers
What is the primary goal of waste prevention?
What is the primary goal of waste prevention?
Signup and view all the answers
Which of the following diseases is most likely related to poor sanitation?
Which of the following diseases is most likely related to poor sanitation?
Signup and view all the answers
What event triggered the Marawi siege in 2017?
What event triggered the Marawi siege in 2017?
Signup and view all the answers
How many deaths were reported among government soldiers during the Marawi siege?
How many deaths were reported among government soldiers during the Marawi siege?
Signup and view all the answers
Which of the following is NOT listed as a top cybercrime under the Cybercrime Prevention Act?
Which of the following is NOT listed as a top cybercrime under the Cybercrime Prevention Act?
Signup and view all the answers
What is a key aspect of cybersecurity?
What is a key aspect of cybersecurity?
Signup and view all the answers
What does the term 'cybercrime' refer to?
What does the term 'cybercrime' refer to?
Signup and view all the answers
What significant event occurred on March 22, 1897?
What significant event occurred on March 22, 1897?
Signup and view all the answers
Which policy reform aims to address alleged corruption?
Which policy reform aims to address alleged corruption?
Signup and view all the answers
What is one of the three categories of cybercrime offenses punishable under RA 10175?
What is one of the three categories of cybercrime offenses punishable under RA 10175?
Signup and view all the answers
Who founded the Katipunan in 1892?
Who founded the Katipunan in 1892?
Signup and view all the answers
Which military organization existed from 1901 until World War II?
Which military organization existed from 1901 until World War II?
Signup and view all the answers
Which of the following is NOT a role of the Philippine Army in nation building?
Which of the following is NOT a role of the Philippine Army in nation building?
Signup and view all the answers
What triggered the Philippine-American War?
What triggered the Philippine-American War?
Signup and view all the answers
Who was designated as the first Captain General of the Philippine Revolutionary Army?
Who was designated as the first Captain General of the Philippine Revolutionary Army?
Signup and view all the answers
What is a critical expectation of a subordinate in relation to their boss's decisions?
What is a critical expectation of a subordinate in relation to their boss's decisions?
Signup and view all the answers
Which event marks the pealing of church bells, signaling the first battle cry of the Katipunan?
Which event marks the pealing of church bells, signaling the first battle cry of the Katipunan?
Signup and view all the answers
What was the primary objective of the Katipunan upon its establishment?
What was the primary objective of the Katipunan upon its establishment?
Signup and view all the answers
What should a subordinate do if they have strong reservations about an issue being discussed?
What should a subordinate do if they have strong reservations about an issue being discussed?
Signup and view all the answers
Which country ceded the Philippines to the United States in 1898?
Which country ceded the Philippines to the United States in 1898?
Signup and view all the answers
What is considered disloyalty in the context of leadership?
What is considered disloyalty in the context of leadership?
Signup and view all the answers
What is the role of initiative within a subordinate's responsibilities?
What is the role of initiative within a subordinate's responsibilities?
Signup and view all the answers
How should a subordinate address conflicts with their boss?
How should a subordinate address conflicts with their boss?
Signup and view all the answers
What distinguishes the 'Pure Version' of military history from other types?
What distinguishes the 'Pure Version' of military history from other types?
Signup and view all the answers
Which factor is NOT associated with the concept of politico-military history?
Which factor is NOT associated with the concept of politico-military history?
Signup and view all the answers
Who was the local chieftain that killed Ferdinand Magellan in the Battle of Mactan?
Who was the local chieftain that killed Ferdinand Magellan in the Battle of Mactan?
Signup and view all the answers
What is the primary goal of hacktivists?
What is the primary goal of hacktivists?
Signup and view all the answers
Which type of malware demands payment to restore access to a victim's data?
Which type of malware demands payment to restore access to a victim's data?
Signup and view all the answers
What is a common characteristic of social engineering attacks?
What is a common characteristic of social engineering attacks?
Signup and view all the answers
Which of the following best describes a DDoS attack?
Which of the following best describes a DDoS attack?
Signup and view all the answers
What distinguishes insider threats from other cybersecurity threats?
What distinguishes insider threats from other cybersecurity threats?
Signup and view all the answers
In a Man-in-the-Middle attack, what is the attacker primarily aiming to do?
In a Man-in-the-Middle attack, what is the attacker primarily aiming to do?
Signup and view all the answers
Which of the following is a preventive measure against brute force attacks?
Which of the following is a preventive measure against brute force attacks?
Signup and view all the answers
What is a recommended practice for ensuring email security?
What is a recommended practice for ensuring email security?
Signup and view all the answers
What significant event ended on April 9, 1942, involving the surrender of American and Filipino forces?
What significant event ended on April 9, 1942, involving the surrender of American and Filipino forces?
Signup and view all the answers
What was the name of the resistance movement against the Japanese occupation in the Philippines?
What was the name of the resistance movement against the Japanese occupation in the Philippines?
Signup and view all the answers
Which event led to the creation of the Armed Forces of the Philippines?
Which event led to the creation of the Armed Forces of the Philippines?
Signup and view all the answers
How did the fall of Bataan affect the remaining American-Filipino forces?
How did the fall of Bataan affect the remaining American-Filipino forces?
Signup and view all the answers
What major military action did the American forces take on October 20, 1944?
What major military action did the American forces take on October 20, 1944?
Signup and view all the answers
What percentage of the POWs are estimated to have died during the Death March?
What percentage of the POWs are estimated to have died during the Death March?
Signup and view all the answers
What historic naval battle is described as the most intense and bloody in history?
What historic naval battle is described as the most intense and bloody in history?
Signup and view all the answers
Which of the following was NOT created as part of the Armed Forces of the Philippines?
Which of the following was NOT created as part of the Armed Forces of the Philippines?
Signup and view all the answers
Study Notes
Hygiene and Sanitation
- Hygiene are conditions or practices that maintain health and prevent disease through cleanliness.
- Sanitation is the act of making sanitary, involving safe disposal of human waste and providing adequate facilities.
- Personal hygiene involves managing body hygiene, caring for well-being with physical hygiene habits.
- Scope of personal hygiene includes oral hygiene, foot hygiene, bathing rituals, toileting hygiene, hair care, hand hygiene, cough and sneeze etiquette, and home hygiene.
- Food hygiene involves better food storage, handling, and preparation.
- Water is an inorganic, transparent, tasteless, odorless and nearly colorless chemical substance, and the main constituent of Earth's hydrosphere and fluids of all known living organisms.
- Sources of water include rainwater, deep well water, streams and rivers.
- Waste disposal is the collection, processing, and recycling or disposal of human waste.
- Waste prevention is a key goal of all waste management strategies.
- Waste minimization aims at reducing the amount and toxicity of waste.
Water Impurities Treatment
- Recycling involves recovering useful items (glass, paper, plastics, wood, and metals) from waste for reuse in new products.
- Water impurities treatment includes boiling, water chlorination, and desalination.
- Diseases that can be acquired through waterborne diseases include diarrhea and cholera, typhoid fever, body lice and skin rashes.
- Control measures for diseases include avoiding physical contact with those identified with diseases, healthy ventilation, water purification, careful food selection and preparation, sanitation, and personal hygiene, proper waste disposal.
Followership
- Do not blame your superior for unpopular decisions or policies.
- Loyalty travels both upwards and downwards in the command chain.
- Do not fight the boss in public, but rather do so in private.
- Speak honestly and frankly.
- Avoid embarrassing situations and never reveal discussions about the boss to other people.
Philippine Military History
- Military history is an objective, accurate, descriptive, and interpretive record of all activities of armed forces in peace and wartime
- Three kinds of military history
- The Pure Version: details of a given battle are recounted.
- Use of a campaign or battle to examine the principles of war.
- Politico-Military History, which examines war in its broadest spectrum by associating military matters with political, social and economic factors
Pre-Colonial Period
- Filipinos are not militaristic, but warlike and non-conformist.
- Discipline, brotherhood and attitude were required for their evolution.
- Spanish colonization started with Magellan's arrival in 1521.
- Magellan's efforts were hampered, as he was killed by a local chieftain in 1521.
- Feb 1565, another expedition succeeded where Magellan's did not.
- Philippines was named after Prince Philip (later King Philip II) of Spain.
Philippine-American War
- The Philippine-American War erupted in 1899.
- The Americans had superior arms and training, resulting in Filipino loss.
- The Americans established a government in 1901.
- Filipinos continued their struggle for freedom.
Post WW II Era
- The Philippine army expanded its roles in the 1960s.
- The army participated in civic action programs.
- The birth of the New People's Army (NPA) created chaotic conditions in 1969.
- Martial law was declared in 1972.
- Military operations supported by civic action and blocked insurgency.
- Special Operations Team (SOT) strategy emerged in the 1980s.
Peacekeeping and Humanitarian Missions
- The Philippines sent troops (BCTs) to support the Republic of Korea during the Vietnam War.
- The Philippines deployed troops to assist humanitarian operations during the Persian Gulf War and the Iraq War.
Cybercrime
- Cybercrime is any criminal activity involving a computer, networked device, or network
- Policy declaration recognizes the importance of ICT in national social and economic development and the adoption of powers to prevent and combat cybercrime
- Types of cyber security threats include malware, ransomware, social engineering, phishing, insider threats, and DDoS attacks.
- Specific cybercrime categories include illegal access, online libel, online scams, online threats, identity theft, and online sexual abuse.
- Cybersecurity techniques, including device protection, strong passwords, multi-factor authentication, and social media best practices, are identified to protect individuals and the national digital ecosystem.
- Cybercrimes involve different kinds of attacks; including Man-in-the-Middle (MitM) and Brute Force Attacks.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers essential topics related to personal hygiene, waste management, and cybersecurity, including significant historical events and policies. Test your knowledge on the interplay between public health and modern cyber threats.