Final Exam Handouts (S.Y. 2024-2025) PDF
Document Details
Uploaded by UsefulNovaculite9007
2024
Tags
Summary
These handouts cover Final Exam topics for the school year 2024-2025 focused on Hygiene and Sanitation. It includes details on personal hygiene, water sources, waste disposal, and prevention.
Full Transcript
FINAL EXAM HANDOUTS (S.Y. 2024-2025) [HYGIENE AND SANITATION] **Hygiene** - are conditions or practices conducive to maintaining health and preventing disease, especially through cleanliness. **Sanitation** - the act or process of making sanitary WHAT IS PERSONAL HYGIENE? **Personal hygiene** -...
FINAL EXAM HANDOUTS (S.Y. 2024-2025) [HYGIENE AND SANITATION] **Hygiene** - are conditions or practices conducive to maintaining health and preventing disease, especially through cleanliness. **Sanitation** - the act or process of making sanitary WHAT IS PERSONAL HYGIENE? **Personal hygiene** - is all about managing your body hygiene, essentially caring for your well- being incorporating some physical hygiene habits. SCOPE OF PERSONAL HYGIENE Oral Hygiene Foot Hygiene Bathing rituals Toileting Hygiene Hair care Hand hygiene Cough and sneezing Home hygiene **Food hygiene** - is basically, the idea of better storage, handling, and preparation of food **Sanitation** - refers to the safe disposal of human waste and the provision of adequate services and facilities for that. **WATER** - It is an inorganic, transparent, tasteless, odorless, and nearly colorless chemical substance, which is the main constituent of Earth's hydrosphere and the fluids of all known living organisms. SOURCES OF WATER - Rainwater - Deep Well - Stream - River **WASTE DISPOSAL** is the collection, processing, and recycling or deposition of the waste materials of human society. **WASTE PREVENTION** is a basic goal of all the waste management strategies. **WASTE MINIMIZATION, OR SOURCE REDUCTION** refers to the collective strategies of design and fabrication of products or services that minimize the amount of generated waste and/or reduce the toxicity of the resultant waste. **RECYCLING** refers to recovery of useful materials such as glass, paper, plastics, wood, and metals from the waste stream so they may be incorporated into the fabrication of new products. TREATMENT OF WATER IMPURITIES - BOILING - WATER CHLORINATION - DESALINATION DISEASES THAT WILL OCCUR/CAN BE ACQUIRED: - Diarrhea - Cholera - Typhoid Fever - Body Lice - Skin Rashes CONTROL MEASURES AGAINST DISEASES - Avoid close physical contact to positive identified carrier of disease. - Healthy ventilation - Water Purification - Careful selection and preparation of food - Maintenance of Sanitation - Personal hygiene - Proper Waste Disposal [FOLLOWERSHIP 1 ] THE TEN RULES OF GOOD FOLLOWERSHIP 1. **DO NOT BLAME THE BOSS** Do not blame your boss for an unpopular decision or policy your Job is to support, not undermine. \- It is insidiously easy to blame an unpopular policy or decision on your superior. \- This may garner some affection from your, but it is certainly showing disloyalty to your superior. LEADERSHIP is not a commodity to be bought at the price of followership. \- If a subordinate asks you whether or not you agree with a particular decision, your response should be that the question is irrelevant. \- The boss has decided and we will carry out his orders. That is what good subordinates are expected to do \- Loyalty must travel both up and down the chain of command. 2. DO NOT FIGHT THE BOSS - Fight with your boss if necessary, but do it in private -Avoid embarrassing situations and never reveal to others what was discussed -Speak honestly and frankly - Do not be a yes man \- Resist the temptation to tell the boss what you think he or she wants to hear. \- If you have strong reservations about an issue under discussion, you have an obligation to express them \- Fight for your people and your organization, but do not roll over on principles or issues that you believe are detrimental to the unit's mission accomplishment. 3. USE INITIATIVE [PHILIPPINE MILITARY HISTORY] **History** is any integrated narrative description, or analysis of past events or facts written in a spirit of critical inquiry for the whole truth. **Military History** is officially defined as an objective, accurate, descriptive, and interpretive record of all activities of the Armed Forces in peace and war. Antoine-Henri Jomini recognized three kinds of military history: **Pure Version** where the minute details of a given battle are recounted. **Use of a campaign or battle** to examine the principles of waging war. **Politico-Military History** which examines war in its broadest spectrum through association of military with political, social, and economic factors. PRE COLONIAL PERIOD \- Filipinos have never been known as militaristic people yet they are known as warlike people. \- Non-conformist individuals who are likely to resist regimentation. \- Openly called as boor and bare. \- By such, attitude erodes discipline which is a vital pre-requisite for the evolution of brotherhood. **SPANISH COLINIZATION** \- The rule was first introduced to the rest when [Ferdinand Magellan] rediscovered the island on 16 Mar 1521. He befriended Rajahs Kulambu, Siagu and Humabon. \- Magellan's effort to firmly establish Spanish rule over the islands were put in vain when he was killed by a local chieftain named [Lapu-Lapu] in the Battle of Mactan on April 27,1521. \- Feb 1565, another expedition headed by Miguel Lopez de Legaspi succeeded where Magellan's had failed. \- The Philippines was named after Prince Philip (later King Philip II) of Spain by the Spanish explorer Ruy Lopez de Villalobos during his 1542-1546 expedition to the islands. [PHILIPPINE REVOLUTIONARY ARMY ] [- ANDRES BONIFACIO] Founded the Kataastaasan, Kagalanggalangang Katipunan ng mga Anak ng Bayan (KKK) on 07 Jul 1892. \- Katipunan's objective is to prepare freedom loving Filipinos for armed revolt. Philippine Revolutionary Army \- The first battle cry of the Katipunan coincided with the pealing of San Juan del Monte's church bells at nine o\'clock on the night of August 29, 1896. \- A year after the outbreak of hostilities between the Katipuneros and the Spanish troops, PRG and its Army were born on March 22, 1897 at Tejeros in Cavite. \- General Artemio Ricarte was designated as its first Captain General during the Tejeros Convention. \- March 22, 1897 marks the founding day of the modern day Philippine Army. [FIRST PHILIPPINE REPUBLIC] Gen Emilio Aguinaldo declared Philippine Independence from Spain on June 12, 1898. [TREATY OF PARIS] \- Spain co-signed with America on 10 December 1898. \- The treaty ceded the Philippines to the United States. [PHILIPPINE-AMERICAN WAR] \- The Philippine-American War erupted on February 4, 1899 - San Juan Bridge incident. \- Due to the superiority of American arms and trainings, the Filipinos lost the war. \- The Americans have established government in 1901 but the Filipino revolutionaries continued their struggle for freedom. [NATIONAL DEFENSE ACT] \- Paved the way to the birth of the new Philippine Army under the coat of the US Army \- It trained new Filipino members in defending the nation and protecting its people. \- The Philippine Scouts was a military organization of the United States Army from 1901 to WW II. \- Native Filipinos assigned to the US Army\'s Philippine Department. \- Philippine Scout units were given a suffix of (PS), to distinguish them from other US Army units. \- A handful of Filipinos received commissions from the United States Military Academy. [PHILIPPINES IN WORLD WAR 2] \- After the Pearl Harbor incident, Japan focused on taking the Philippine Islands, which were under American rule. -Two regular and 10 reserve divisions of the Philippine Army were mobilized and undertook the defense of the Philippines incorporated into the United States Army Force in the Far East (USAFFE) under the command of Gen. Douglas MacArthur \- The Battle of Bataan ended on April 9, 1942, when Army Major General Edward P. King, who assumed command of the defense after MacArthur\'s retreat, surrendered to Japanese General Masaharu Homma. \- About 12,000 Americans and 63,000 Filipinos became prisoners of war (POW) and participated of the brutal Death March killing around 30% of the POWs. \- When Bataan fell, the last remaining American-Filipino forces held on to the island of Corregidor, where they experienced continuous bombing and artillery shelling by the Japanese and where they were subsequently defeated. \- Remaining forces in the Philippines resorted to guerrilla tactics until liberation. The gallant stand slowed Japan\'s otherwise unhindered invasion of other countries. \- The "Hukbong Bayan Laban sa mga Hapon" or shortly known as Hukbalahap was part of a broad united front resistance to the Japanese occupation. Its movement has deep roots in the Spanish encomienda. \- Only after the coming of the Americans were reforms initiated to lessen tensions between tenants and landlords but the reforms did not solve the problems. \- American landings were initially set on November 15, 1944 at Sarangani Bay but due to the rapid success of the American Halsey, the date was advanced to October 20, 1944 and the place of landing was relocated to Leyte. \- The Battle of Manila Bay was considered to be the most intense and bloody naval battle in history of humankind. [POST WW2 ERA] \- Executive Order No. 389 led to the creation of the Armed Forces of the Philippines (AFP) dated 23 December 1950. Major Commands were also created. \- Headquarters National Defense Forces was renamed General Headquarters of the Armed Forces of the Philippines (GHQ-AFP). \- Philippine Army, Philippine Constabulary (now Philippine National Police), Philippine Air Force, and the Philippine Navy, were subsequently created. [PHILIPPINE ARMY EXPANSION] \- The onset of the 60s ushered an expansion of the army\'s roles. \- 1969 -- NPA was organized \- Military operations supported by civic action blocked the escalation of insurgency. \- Include participation in the socio-economic programs of the country. [MARTIAL LAW ERA] \- The birth of the New People's Army in 1969 caused chaotic environment. \- Declaration of Martial Law on 21 September 1972 \- Military operations supported by civic action blocked the escalation of insurgency. [SPECIAL OPERATIONS TEAM] \- The onset of the eighties saw the birth of the Special Operations Team (SOT) strategy. \- It aims to isolate and neutralize insurgents from the civilian population. \- Dismantle communist political organizations and deny them control of barangays. **PEACEKEEPING AND HUMANITARIAN MISSIONS** 5- The Philippines sent five Battalion Combat Teams (BCTs) or better know as Philippine Expeditionary Forces to Korea (PEFTOK) with a total number of 7,420 personnel as part of its commitment as member of the United Nations. \- The forced provide military assistance and humanitarian mission for the Republic of Korea (South Korea) against the communist North. \- PEFTOK took part in decisive battles such as the Battle of Yultong Bridge and the Battle of Hill Eerie [Vietnam War] \- The Philippines was involved in the Vietnam War, supporting civil and medical operations. Initial deployment in 1964 amounted to 28 military personnel, including nurses, and 6 civilians. \- Some 10,450 Philippine Armed Forces troops were dispatched to South Vietnam and primarily supported medical and other civilian pacification projects. \- Nine Filipinos were killed in the conflict. Filipino troops withdrew from Vietnam on December 12th, 1969. [Persian Gulf War] \- The Philippines sent 200 medical personnel to assist coalition forces in the liberation of Kuwait from the stranglehold of Iraq. [Iraq War] \- The Philippines sent 60 medics, engineers and other troops to assist in the invasion of Iraq until its withdrawal on the 14th of July 2004. **Coup Attempts** 1986-1987\ - (\"God Save the Queen Plot\" ) \- Coup attempts against Pres. Corazon Aquino 1989 \- Oakwood Mutiny 2003\ - time of Pres. Gloria M. Arroyo 2007 \- Manila Peninsula Mutiny **[Zamboanga Siege]** \- On September 9, 2013, close to 500 members of the Moro National Liberation Front (MNLF) attacked the city to protest what they considered was government\'s failure to fulfill the provisions of the peace agreement that the MNLF signed with the Ramos administration in 1996. \- What followed was a fierce battle that stretched for 3 weeks, killed 19 government forces and 208 rebels, and dislocated 24,000 families. **[Marawi Siege]** \- On May 23, 2017, government forces clashed with armed fighters from two ISIL-affiliated groups -- Abu Sayyaf and the Maute. The siege was triggered when the military tried to arrest top ISIL leader Isnilon Hapilon. \- This prompted attackers to fight back, declaring the city a new caliphate of ISIL, or the Islamic State of Iraq and the Levant group, also known as ISIS. \- On October 23, five months to the day from the start of the siege, Defense Secretary Delfin Lorenzana declared there were no more "militants" in Marawi after troops overpowered the remaining fighters. \- The battle resulted in the deaths of 920 fighters, 165 government soldiers and at least 45 civilians. **[PA REFORMS AND PROGRAMS]** \- Policy reforms to address alleged corruption \- AFP modernization: personnel & equipment \- Adherence to International Humanitarian Law(IHL) and Rule of Law **[ARMY IN NATION BUILDING]** \- PA plays an important role in nation building \- Helps provide assistance in areas that lack needed vital facilities and service like roads, bridges, schools, health and sanitation [CICC Information and Awareness Campaign towards building Cyber Crime Resilient Communities] Republic Act No. 10175 "Cybercrime Prevention Act of 2012" Top 6 Cybercrimes ✓ Illegal access (hacking)\ ✓ Online libel\ ✓ Online scam\ ✓ Online threat/online lending apps\ ✓ Identity theft\ ✓ Online sexual abuse and exploitation Policy declaration: The State - Recognizes the importance of ICT in national social and economic development - Recognizes the importance of providing a safe and secured environment - Shall adopt powers to effectively prevent and combat such offenses - Detection - Investigation - Prosecution - Local and domestic cooperation What is Computer? - Device/s - Data Processing - Communication - Digital Storage What is Cybersecurity? Collection of: - Tools - Policies - Risk management approaches - Actions - Training - Best practices - Assurances - Technologies To protect the cyber environment, organization and user's assets What is a crime? \- An act or omission which is made punishable by law What is Cybercrime? \- Any criminal activity that involves a computer, networked device or a network 3 Categories of Cybercrime offenses punishable under RA10175 1. Computer as target of attack 2. Computer as a tool to further a crime 3. Computer as storage for illegal content All crimes defined and penalized by the Revised Penal Code, as amended and special laws, if committed by the use of Information, Communication Technologies - RA 8293 -- Intellectual Property Code of 1997 - RA 8792 -- Electronic Commerce Act of 2000 - RA 8484 -- Access Devices Regulation Act - RA 10173 Data Privacy Act of 2012 - RA 9775 -- Anti Child Pornography Act 0f 2009 - RA 9995 Anti Photo and Video Voyeurism of 2009 - RA 11862 Anti Trafficking in Persons Act of 2021 - RA 11313 Safe Spaces Act (Anti Bastos Law) - RA 11648 An Act Providing for Stronger Protection Against Rape and Sexual Exploitation and Abuse, Increasing the Age for Statutory Rape (from 12 to 16 YO) - RA 11930 Anti OSAEC and Anti CSAEM 2022 The online libel is committed through text messages, emails, post on social media accounts, blogs websites, or online news COMMON ONLINE SCAMS - Love scam/Romance Scam - Fake e travel scam - Job offer scam - Tasking scam - Text scam - Fake account scam/identity scam - Phishing scam - Deep fake/impersonator scam A hacker is an individual skilled in technology who uses their expertise to solve problems, manipulate systems, or access information, often bypassing security measures. How does hacking works? Exploitation of weaknesses in network security, taking advantage of the same. These weaknesses can be technical or social in nature. **Technical weaknesses:** Hackers are extremely talented in exploiting software vulnerabilities or weak security practices to gain access **Social weaknesses: **This kind of social engineering is done to convince those with privileged access to click on malicious links, open infected files, or reveal personal information. This allows them access to otherwise hardened infrastructures. Types of Hackers **White Hat Hackers (Ethical Hackers)** Professionals who use their skills legally to identify and fix vulnerabilities in systems. **Black Hat Hackers (Malicious Hackers)** Individuals who exploit vulnerabilities to steal data, cause damage, or gain unauthorized access for personal or financial gain. **Gray Hat Hackers** Operate between ethical and malicious hacking. They often access systems without permission but may report **Script Kiddies** Inexperienced hackers who use pre-made tools or scripts to attack systems without deep technical knowledge. **Hacktivists** Use hacking to promote political or social causes, often targeting organizations or governments. **State-Sponsored Hackers** Employed by governments to conduct cyber-espionage, sabotage, or warfare against other nations or entities. TYPES OF CYBER SECURITY THREATS **Malware** Malicious software designed to infiltrate, damage, or disrupt systems without the user's consent. Examples include viruses, worms, Trojans, and spyware. It often spreads via email attachments, malicious websites, or infected software. **Ransomware** A type of malware that encrypts a victim\'s data and demands payment (usually in cryptocurrency) to restore access. Ransomware can severely disrupt individuals and organizations, sometimes causing data loss even after payment. **Social Engineering** Manipulative tactics used to trick individuals into divulging sensitive information or granting unauthorized access. This often exploits trust or ignorance and is carried out via phone calls, emails, or in-person deception. **Phishing** A type of social engineering where attackers send fraudulent emails or messages pretending to be legitimate entities to trick victims into revealing personal information, such as passwords or financial details. **Insider Threats** Security risks originating from employees, contractors, or associates who have authorized access to systems but misuse it for malicious purposes or by accident (e.g., leaking sensitive data). **Distributed Denial-of-Service (DDoS) Attacks** Overloading a system, server, or network with excessive traffic from multiple sources, rendering it inaccessible to legitimate users. These attacks disrupt services and cause financial or reputational damage. **Man-in-the-Middle (MitM) Attacks** An attacker intercepts and manipulates communication between two parties, often stealing sensitive information such as login credentials or financial data. This can occur on unsecured networks or through compromised devices. **Brute Force Attack** A method of guessing passwords or encryption keys by systematically trying all possible combinations until the correct one is found. Automated tools are often used to carry out these attacks, targeting weak or simple passwords. **CYBERSECURITY TIPS** Keep your devices clean and protected\ secure your home/office network Use/enable multi factor authentication Create/use strong password E commerce best practices Email best practices Social media practices Hotline; 1326