Reviewer For Week PDF
Document Details
Uploaded by NeatestMagenta9743
null
Mary Angeline G. Gomez
Tags
Summary
This document is a reviewer for a computer science class, focusing on computer use, classification, functions, capabilities, limitations, web technology, its timeline, and web browsers.
Full Transcript
MARY ANGELINE G. GOMEZ (BSHM 4B) POINTERS TO REVIEW (GEC ELEC 1) 6. Disadvantages (-of using the computer) A. Computer (MODULE 1)...
MARY ANGELINE G. GOMEZ (BSHM 4B) POINTERS TO REVIEW (GEC ELEC 1) 6. Disadvantages (-of using the computer) A. Computer (MODULE 1) The use of computers also presents some danger for people and the environment: 1. Uses of computers 2. Computer classification 1. Safety 2. Health risks 3. Environment 4. Use of power 5. Privacy violations 7. Computer system Elements and components 2. Computer classification 3. Functions ▪ A computer is an electronic device, operating under the control of instructions (software) stored in its own memory unit, that can accept data (input), manipulate data (process), and produce information (output) from the processing. Generally, the term is used to describe a collection of devices that function together as a system. (What is a computer?) ▪ Computers can perform four general operations, which comprise the information processing cycle. (What Does A Computer Do?) FOUR FUNCTIONS OF COMPUTER: ▪ Input - Output ▪ Process - Storage B. Web (MODULE 2) 1. Internet timeline (Timeline of the Internet) 4. Capabilities (Computer Capabilities) 1965 - Lawrence Roberts and Thomas Merril communicate with one another using computers 1. Ability to perform certain logic operations connected via a low-speed dial-up telephone line in Massachusetts and California, creating the 2. Ability to provide new time dimensions first Wide Area Network and laying the groundwork for the internet. 3. Ability to store and retrieve information 1969 - ARPAnet, the first version of the internet, is created and used to link computers at UCLA 4. Ability to control errors and Stanford. 5. Ability to check itself 1974 - Robert Kahn and Vinto Cerf publish "A protocol for Packet Network Communication" laying the groundwork for TCP/IP and much larger, interconnected computer networks. The 5. Limitations (Computer Limitations) word "internet"is first used. 1. Dependence on prepared instructions 1986 - NSFNET is founded, creating the backbone and providing the investment needed to 2. Inability to derive meanings from objects create the internet as we know it today. 3. Inability to generate information 1989 - The first commercial ISP, the world launches. 4. It cannot correct wrong instructions 1989 - Tim Berners-Lee invents the world wide web, which opens the door for the internet to go mainstream. 1993 - The first web browser available to the public, Mosaic launches. 1 MARY ANGELINE G. GOMEZ (BSHM 4B) 1994 - Netscape navigator is released in stores. Dynamic page 2000 - Some 300 million people around the world are officially online. 2004 - Facebook launches and the Web 2.0 begins to grow rapidly. Refers to a webpage that are affected by the user input or preference. 2007 - The iPhone is released, giving rise to the mobile revolution. ▪ Web 2.0 – is focused on the ability for the people to collaborate and share information online via social 2010 - 1.966 billion people are online worldwide. media. Blogging and web based communities. 2022 - 5 billion people are online Example of Web 2.0 2. Web browser timeline 1990 – Start A. A Social Networking Websites 1992 - Lynx (Text-based; no graphic content) ▪ Is the use of internet based social media sites to stay connected with friends families, colleagues, 1993 - Mosaic (Images imbedded in text; "world's first popular browser") customers, clients. Social networking can have a social purpose, business purpose or both. 1994 - Netscape Navigator (Replaced Mosaic) Examples: Facebook, Twitter, Instagram, Skype. LinkedIn, SlideShare, Tumblr, YouTube. 1995 - Internet Explorer (Microsoft's first web browser) B. Blogs 1996 – Opera ▪ a discussion or informal website published on the world wide web consisting of discrete, often 2000 – Stop informal diary-style text entries (posts). Post are typically displayed in reverse chronological order so the most recent post appears first, at the top of the webpage 2003 - Safari (Apple's signature browser) C. Wikis 2004 - Mozilla Firefox ▪ a hypertext publication collaboratively edited and managed by its own audience directly using a web 2008 - Google Chrome (Took over the browser market) browser. A typical wiki contains multiple pages for the subjects or scope of the project and may be 2015 – Microsoft Edge either open to the public or limited to use within an organization for maintaining its internal NOW - Fulldive Browser (World's first social browser) knowledge base. Example: Wikipedia, WikiAnswers, Wiki Wiki, Wikispaces, MediaWiki 3. Web 1-3 D. Video Sharing WEB 1.0 ▪ is a website that lets people upload and share their video clips with the public at large or two invited An old internet that only allows people to read from the internet. First stage worldwide linking web guest. pages and hyperlink. Web is use as information portal. It uses table to positions and align elements on Example: YouTube, Vimeo, TikTok page. most read only web. It focused on company's homepages. Key features of WEB 2.0 Dividing the worldwide web into usable directories It means web is use as information portal - Folksonomy It started with the simple idea - Rich user interface - User participation Disadvantage of web 1.0 - Long tail WEB 3.0 (READ – WRITE INTELLIGENT WEB) 1. Read only web 2. Limited user interaction 3. Lack of standards ▪ suggested name by John Markoff of the New York times for the third generation of the web. ▪ in this generation all the applications on web or mobile will be upgraded with more features. It applies WEB 2.0 (READ WRITE INTERACTIVE WEB) same principles as web 2.0 two way interaction ▪ a term used to describe a new generations of web services and applications with an Increasing emphasis ▪ web 3.0 will be more connected, open and intelligent, with semantic web technologies , distributed on human collaboration databases, natural language processing, machine learning, machine reasoning, and autonomous agent. ▪ it is a platform that gives the users the possibility (liberty) to control their data. ▪ this is about the user-generated content and the read-write web ▪ people are consuming as well as contributing information through blogs or sites. ▪ allows the user to interact with the page known as DYNAMIC PAGE; instead of just reading A page, the user may be able to comment or create a user account. 2 MARY ANGELINE G. GOMEZ (BSHM 4B) Examples of web 3.0 (OPEN, TRUSTLESS, PERMISSIONLESS) Types of e-commerce There are 6 basic types of e-commerce: 1. Business-to-Business (B2B) - Business-to-Business (B2B) e-commerce encompasses all electronic transactions of goods or services conducted between companies. Producers and traditional commerce wholesalers typically operate with this type of electronic commerce. 2. Business-to-Consumer (B2C) - The Business-to-Consumer type of e-commerce is distinguished by the establishment of electronic business relationships between businesses and final consumers. It corresponds to the retail section of e- commerce, where traditional retail trade normally operates. 3. Consumer-to-Consumer (C2C) - Consumer-to-Consumer (C2C) type e-commerce encompasses all electronic transactions of goods or services conducted between consumers. Generally, these transactions are conducted through a third party, which provides the online platform where the transactions are actually carried out. 4. Consumer-to-Business (C2B) - In C2B there is a complete reversal of the traditional sense of exchanging goods. This type of e-commerce 4. E-commerce is very common in crowdsourcing based projects. A large number of individuals make their services or 1. E- COMMERCE WEBSITE products available for purchase for companies seeking precisely these types of services or products. ▪ It is a website people can directly buy products from you’ve probably used a number of e commerce websites before, most big brands and plenty of smaller ones 5. Business-to-Administration (B2A) ▪ A customer finds the website, then buys goods and services. When they’ve decided they’re done online - This part of e-commerce encompasses all transactions conducted online between companies and public shopping, they move to the checkout phase. administration. This is an area that involves a large amount and a variety of services, particularly in areas ▪ Following the website’s checkout process, the buyer provides the necessary payment and shipping such as fiscal, social security, employment, legal documents and registers, etc. These types of services information have increased considerably in recent years with investments made in e-government. How e Commerce works? 6. Consumer-to-Administration (C2A) - The Consumer-to-Administration model encompasses all electronic transactions conducted between individuals and public administration. Examples of applications include: Education – disseminating information, distance learning, etc. Social Security – through the distribution of information, making payments, etc. Taxes – filing tax returns, payments, etc. Health – appointments, information about illnesses, payment of health services, etc. 3 MARY ANGELINE G. GOMEZ (BSHM 4B) Advantages of Ecommerce C. Computer Crimes (MODULE 3) 1. The main advantage of e-commerce is its ability to reach a global market, without necessarily implying a CYBER CRIME large financial investment. 2. By allowing direct interaction with the final consumer, e-commerce shortens the product distribution Defined as unlawful acts committed by using the computer as a tool or as a target or as both. Cyber crimes chain, sometimes even eliminating it completely. can involve criminal activities that are traditional in nature, such as theft, fraud, forgery, defamation and 3. E-commerce allows suppliers to be closer to their customers. mischief. 4. Cost reduction is another very important advantage normally associated with electronic commerce. 1. Cybercrimes Categories Disadvantages of e-commerce CYBERCRIME CAN BE CATEGORIZED Strong dependence on information and communication technologies (ICT); Lack of legislation that adequately regulates the new e-commerce activities, both nationally and 1. Unauthorized Access: Access means gaining entry into, instructing or communicating with the logical, internationally; Market culture is averse to electronic commerce (customers cannot touch or try the arithmetical, or memory function resources of a computer, computer system or computer network. products); 2. Hacking & Cracking: Every act committed towards breaking into a computer and/or network is hacking. The users’ loss of privacy, the loss of regions’ and countries’ cultural and economic identity; Hackers write or use ready-made computer programs to attack the target computer. Insecurity in the conduct of online business transactions. 2. Types of hackers There are generally 10-types of Hackers 2. BUSINESS WEBSITE 1. White Hat Hackers: White hat hackers are the one who is authorized or the certified hackers who Is a website that’s devoted to representing a specific business. It should be branded like the business (same logo and work for the government and organizations by performing penetration testing and identifying positioning) and communicate types of products and / or services offers. loopholes in their cybersecurity. 2. Black Hat Hackers: They are often called Crackers. Black Hat Hackers can gain the unauthorized 3. ENTERTAINMENT WEBSITE access of your system and destroy your vital data. 3. Gray Hat Hackers: Gray hat hackers fall somewhere in the category between white hat and black Primarily, the entertainment website is intended to entertain its visitors, so it is based on providing entertainment hat hackers. They are not legally authorized hackers information, pictures, and interactive online services. 4. Script Kiddies: They are the most dangerous people in terms of hackers. 5. Green Hat Hackers: They are also amateurs in the world of hacking but they are bit different from 4. PORTFOLIO WEBSITE script kiddies 6. Blue Hat Hackers: They are much like the white hat hackers Sites devoted to shown examples of past work. Service providers who want to show potential clients the quality of 7. Red Hat Hackers: They are also known as the eagle-eyed hackers the work they provide can use a portfolio. 8. State/Nation Sponsored Hackers: State or Nation sponsored hackers are those who are appointed by the government 5. MEDIA WEBSITE 9. Hacktivist: These are also called the online versions of the activists 10. Malicious Insider or Whistleblower: A malicious insider or a whistleblower could be an employee Collect news or stories or other reporting. There are some overlap here with entertainment website, but media of a company or a government agency with a grudge or a strategic employee websites are more likely to include reporting pieces in addition to or instead of content meant purely for entertainment. 3. Cyber Fraud/Online Fraud: 6. BROCHURE WEBSITE Internet fraud involves using online services and software with access to the internet to defraud or take advantage A simplified form of business websites. For businesses that know they need an online presence, but don’t want to of victims. The term "internet fraud" generally covers cybercrime activity that takes place over the internet or on invest a lot into it (maybe you are confident youll continue to get most of your business from other sources) email, including crimes like identity theft, phishing, and other hacking activities designed to scam people out of money. 4 MARY ANGELINE G. GOMEZ (BSHM 4B) Cyber fraud is an increasingly prevalent issue in the digital age. In the Philippines, this form of deception is COMPUTER VIRUSES: criminalized under various statutes, notably the Cybercrime Prevention Act of 2012 (Republic Act No. 10175), and the Electronic Commerce Act of 2000 (Republic Act No. 8792). TROJANS: The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans. A Trojan Horse Virus is a type of malware that downloads The net is a boon for people to conduct business effectively, very quickly. Net is also an open invitation to fraudsters onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use and online frauds are becoming increasingly out of control. social engineering to hide malicious code within legitimate software to try and gain users' system access with their software. Types of attack: HISTORY OF THE TROJAN HORSE 1. Spoofing of phishing websites and email security alerts - Fraudsters create authentic looking websites that are actually nothing but a spoof. The purpose of these websites is to make the user enter personal information. The original story of the Trojan horse can be found in the Aeneid by Virgil and the Odyssey by Homer. In 2. Virus hoax emails - It is a sad fact of life that there are those who enjoy exploiting the concerns of others. the story, the enemies of the city of Troy were able to get inside the city gates using a horse they pretended Many emailed warnings about viruses are hoaxes, designed purely to cause con-cern and disrupt businesses. was a gift. The soldiers hid inside the huge wooden horse and once inside, they climbed out and let the 3. Lottery Frauds - These are letters or emails, which inform the recipient that he/ she has won a prize in a lottery. other soldiers in. 4. Credit Card Fraud - Online Transaction has become a normal thing in day to-day life. Knowingly or unknowingly passing credit card information over internet can land you in trouble. There are a few elements of the story that make the term “Trojan horse” an appropriate name for these types of cyber-attacks: 4. Cyber Theft: The Trojan horse was a unique solution to the target’s defenses. Stealing of financial and/or personal information through the use of computers for making its fraudulent or other illegal use. The Trojan horse appeared to be a legitimate gift Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and The soldiers in the Trojan horse controlled the city’s defense system. other benefits. WORMS: Programs that multiply like viruses but spread from computer to computer. Identity Theft: Identity theft occurs when someone appropriates another’s personal information without their knowledge to commit theft or fraud. Identity theft is a vehicle for perpetrating other types of fraud To keep it brief, a Trojan uses trickery and social engineering to deceive people into running it. For example, a schemes. Trojan may pretend to be legitimate software. A worm is a type of Trojan because it normally relies on social engineering to attack systems. Theft of Internet Hours Once a computer worm has breached your computer’s defenses it can perform several malicious actions: Theft of computer system (Hardware) Drop other malware like spyware or ransomware 5. Cyber Terrorism Consume bandwidth Cyber terrorism is an attractive option for modern terrorists for several reasons. Delete files Overload networks 1. It is cheaper than traditional terrorist methods. Steal data 2. Cyberterrorism is more anonymous than traditional terrorist methods. Open a backdoor 3. The variety and number of targets are enormous. Deplete hard drive space 4. Cyberterrorism can be conducted remotely, a feature that is especially appealing to terrorists. 5. Cyber terrorism has the potential to affect directly a larger number of people. Logical bombs are event dependent programs. This implies that these programs are created to do 6. Flowing of Virus, Trojan horse, Worm & Logical Bombs. something only when a certain event (known as a trigger event) occurs. A logic bomb is a set of instructions in a program carrying a malicious payload that can attack an operating system, program, or network. It only goes off after certain conditions are met. A simple example of these conditions is a specific date or time. A more complex example is when an organization fires an employee and logs their dismissal in their system. 5 MARY ANGELINE G. GOMEZ (BSHM 4B) 7. Cyber Pornography 11. Spamming ‘Pornography’ is “describing or showing sexual acts in order to cause sexual excitement through books, films, etc.” Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people This includes pornographic websites; pornographic material produced using computers and use of internet to who would not otherwise choose to receive it. Most spam is commercial advertising. For ex. get-rich-quick schemes. download and transmit pornographic videos, pictures, photos, writings etc. There are more than 420 million individual pornographic webpages today. Child pornog-raphy is a very unfortunate reality of the Internet. The Stealth Polymorphic Armored Multi- Partite Virus Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. HOW DOES A MULTIPARTITE VIRUS INFECT A DEVICE? 8. Defamation Two different kinds of infectors are used in the attack Defamation can be understood as the intentional in-fringement of another person’s right to his good name. Defamation can be understood as tarnishing the image, respect or dignity of any person in front of right thinking members of the society. Two types of defamation: 1. Libel 2. Slander 9. Cyber Stalking Cyber Stalking can be defined as the repeated acts harassment or threatening behavior of the cyber criminal towards the victim by using Internet services. (OR Cyber stalking involves following a person’s movements across the Internet by posting messages (sometimes threatening) on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim, constantly bombarding the victim with emails etc.) Stalking in General terms 1. Following the victim 2. Making harassing phone calls 3. Killing the victims pet 12. Denial of service attacks 4. Vandalizing victims property 5. Leaving written messages or objects Flooding a computer resource with more requests than it can handle. This causes the resource to crash thereby denying access of service to authorized users. 10. E-mail & IRC related crimes: Examples include attempts to “flood” a network, thereby preventing legiti-mate network traffic attempts to 1. Email spoofing disrupt connections between two machines, thereby preventing access to a service attempts to prevent a particular 2. Email Spamming: individual from access-ing a service attempts to disrupt service to a specific system or per-son. 3. Email bombing 4. Sending threatening emails 13. Forgery 5. Defamatory emails 6. Email fraudsEmail Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using sophisticated 7. IRC relatedInternet Relay Chat computers, printers and scanners.Also impersonate an-other person is considered forgery Forgery is a criminal act that takes place when a person falsifies something with the intent to deceive another person or entity. 6 MARY ANGELINE G. GOMEZ (BSHM 4B) 14. Piracy IPR Violations: These include software piracy, copyright infringement, trademarks violations, theft of computer source code, patent violations. etc. Cyber Squatting- Domain names are also trademarks and protected by ICANN’s domain dispute resolution policy and also under trademark laws.Cyber Squatters registers domain name identical to pop-ular service provider’s domain so as to attract their users and get benefit from it 15. E-commerce/Investment Frauds Sales and Investment frauds. An offering that uses false or fraudulent claims to solicit investments or loans, or that provides for the purchase, use, or trade of forged or counterfeit securities. Merchandise or services that were purchased or contracted by individuals online are never delivered. The fraud attributable to the mis-representation of a product advertised for sale through an internet auction site or the non-delivery of products purchased through an Internet auction site. Investors are enticed to invest in this fraudulent scheme by the prom-ises of abnormally high profits. 16. Sale of illegal articles This would include trade of narcotics, weapons and wild-life etc., by posting information on websites, auction websites, and bulletin boards or simply by using email communication.Research shows that number of people employed in this criminal area. Daily peoples receiving so many emails with offer of banned or illegal products for sale. 17. Online gambling There are millions of websites hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering. 18. Physically damaging a computer system Physically damaging a computer system: Physically damaging a computer or its peripherals either by shock, fire or excess electric Supply etc. 19. Breach of privacy and confidentiality Privacy refers to the right of an individual/s to determine when, how and to what extent his or her personal data will be shared with others. Breach of privacy means unauthorized use or distribution or disclosure of personal information like medical records, sexu-al preferences, financial status etc. Confidentiality means non disclosure of information to unauthorized or unwanted persons. In addition to Personal information some other type of information which useful for business and leakage of such information to other persons may cause damage to business or person, such information should be protected 7 MARY ANGELINE G. GOMEZ (BSHM 4B) POINTERS FOR REVIEW (P.I. 100) A part of Senator Claro M. Recto’s speech: Module 1: “…Rizal did not pretend to teach religion or theology when he wrote those books. He aimed at inculcating civic consciousness in the Filipinos, national dignity, personal pride, and patriotism...but while he criticized and Chapter 1: The Rizal Law & 19th Century Philippines as Rizal’s Context ridiculed the unworthy behavior of certain ministers of the church, he made exceptions in favor of the worthy ones, like the Dominican friar, Padre Hernandez, and the virtuous native priest, Padre Florentino, and the WHAT DOES P.I. 100 MEAN? Jesuits in general (Laurel, Jr., 132-133)…” Philippine Institution 100 is “A critical study of the life, works, and writings of Jose Rizal”. Senator Laurel proposed a substitute bill. The inclusion of all works and writings of Jose Rizal, not just the two novels, was the main feature of this bill. He then stressed the removal of the term "compulsion" The course is in accordance with the provisions of Republic Act 1425 (Rizal Law, 1956) which seeks to reinforce to appease the opposition. nationalism among Filipinos of the present generation. Senator Laurel asserted the importance of reading the original and unexpurgated edition of Rizal's novels because the true purpose of studying these will be defeated ✓ Lesson 1: The Birth of Rizal Law May 12, 1956, Senate Bill No. 438 was unanimously approved on second reading. During World War II, people saw the need to rebuild the Filipino identity which was equally affected by The Lower House imitated the fate and on May 14, 1956, the bill was approved unanimously in the the war. House of Representatives. Education became the primary weapon of reorientation while prioritizing the youth as the bearers of our The trial of the Rizal Law in Congress (Senate and House of Representatives) is clearly a triumph of country's future. democracy. Nationalist policymakers did not waste any time and painstakingly redirected the nation to the essence of History as a foundation of national hope and pride. OPPONENTS On April 3, 1956, Senate Bill No. 438 (AN ACT TO MAKE NOLI ME TANGERE AND EL FILIBUSTERISMO COMPULSORY should not be overlooked because their dissenting opinions broadened the scope of democratic processes READING MATTER IN ALL PUBLIC AND PRIVATE COLLEGES AND UNIVERSITIES AND FOR OTHER PURPOSES) PROPONENTS Was submitted to the Senate Committee on Education by Senator Jose P. Laurel. The main purpose of the bill according to Senator Laurel was to disseminate the ideas and ideals of Jose perfected their bill because of the criticism they received. Rizal through the reading of his works, notably his novels Noli Me Tangere and El Filibusterismo. On June 12, 1956, President Ramon Magsaysay signed the bill to make it a law, thus giving birth to Opposition insisted that the proposed bill was too controversial. Here were their arguments: Republic Act 1425 also known as the Rizal Law. 1. The bill was an attempt to discredit the Catholic religion. REPUBLIC ACT NO. 1425 2. Inimical to the tenets of the faith to which 170 lines in Noli Me Tangere and 50 lines in El Filibusterismo were offensive to the Church doctrine. AN ACT TO INCLUDE IN THE CURRICULA OF ALL PUBLIC AND PRIVATE SCHOOLS, COLLEGES 3. The bill might divide the nation. AND UNIVERSITIES COURSES ON THE LIFE, WORKS AND WRITINGS OF JOSE RIZAL 4. Compulsion to read something against one's faith impaired freedom of speech and religious freedom. PARTICULARLY HIS NOVELS NOLI ME TANGERE AND EL FILIBUSTERISMO, AUTHORIZING THE PRINTING AND DISTRIBUTION THEREOF, AND FOR OTHER PURPOSES A part of Senator Francisco "Soc" Rodrigo’s speech: WHEREAS, today, more than any other period of our history, there is a need for a re- dedication to the “…A vast majority of our people are at the same time Catholics and Filipino citizens. As such, they have two great ideals of freedom and nationalism for which our heroes lived and died; loves: their country and their faith. These two loves are no conflicting loves. They are harmonious affections, Section 1. Courses on the life, works and writings of lose Rizal, particularly his novel Noli Me Tangere like the love of a child for his father and for his mother. This is the basis of my stand. Let us not create a conflict and El Filibusterismo, shall be included in the curricula of all schools, colleges and universities, public or between nationalism and religion; the government and the church…” (Laurel, Jr., 132). private: Provided, that in the collegiate courses, the original or unexpurgated editions of the Noli Me Tangere and El Filibusterismo or the English translation shall be used as basic texts. Section 2. It shall be obligatory on all schools, colleges and universities to keep in their libraries an adequate number of copies of the original and unexpurgated editions of the Noli Me Tangere and El Filibusterismo, as well as of Rizal's other works and biography. 8 MARY ANGELINE G. GOMEZ (BSHM 4B) The said unexpurgated editions of the Noli Me Tangere and El Filibusterismo or their translations in Here's the world in the 19th century at a glance (McNamara, 2017): English as well as other writings of Rizal shall be included in the list of approved books for required reading in all public or private schools, colleges and universities The Board of National Education shall 1830-1840 determine the adequacy of the number of books, depending upon the enrollment of the school, college or university. A steam locomotive raced a horse, Andrew Jackson beat up the man who tried to assassinate him, Charles Section 3. The Board of National Education shall cause the translation of the Noli Me Tangere and El Darwin visited the Galapagos Islands, a siege at the Alamo became legendary, and Queen Victoria began Filibusterismo, as well as other writings of Jose Rizal into English, Tagalog and the principal Philippine her lengthy reign. dialects; cause them to be printed in cheap, popular editions, and cause them to be distributed, free of 1840-185 charge, to persons desiring to read them, through the Purok organizations and Barrio Councils throughout the country. Queen Victoria married the love of her life. "Tippecanoe and Tyler Too" won an American election, the British suffered a disaster in Afghanistan, Ireland was ravaged by the Great Famine, and Gold Fever struck ✓ Lesson 2: The World in the 19th Century: The Big Picture California. (California Gold Rush 1849) 19th Century Philippines as Rizal’s Context: 1860-1870 The World in the 19th Century: The Big Picture The United States was torn by the Civil War, President Lincoln was assassinated, novelist Benjamin Disraeli became Britain's prime minister, John Muir arrived in Yosemite Valley, and hero of the Civil War Technically, the 19th century refers to the period Ulysses S. Grant became president of the United States. between December 31, 1900 and January 1, 1901 The 19th century was a period of social change. The 1880-1890 significant social changes that were seen during this period were the beginning of abolition of slavery and The Great Game was played out in the Second Anglo-Afghan War, Gladstone became prime minister, the the massive urbanization brought about by the Brooklyn Bridge opened with a huge celebration (and a disaster soon after), Krakatoa erupted, the Statue Second Industrial Revolution. of Liberty arrived in New York Harbor, and the Johnstown Flood shocked the nation. (1885 The Statue Around the world, the 19th century is marked by the of Liberty Arrives in New York Harbor) collapse of what used to be strong and huge empires such as the Spanish, Napoleonic, Holy Roman and 1890-1900 Mughal empires. Their collapse ushered the birth and growth of new empires particularly the British Empire, the Lizzie Borden was charged with an ax murder, Yosemite became a National Park the Panic of 1893 Russian Empire, the United States, the German Empire, the French colonial empire and Meiji devastated the economy, the first modern Olympics were held in Greece and Teddy Roosevelt shook up Japan, with the British boasting unchallenged dominance after 1815. (Meiji Era) New York City before charging up San Juan Hill, (McNamara, 2008) When the French Empire and its allies in the Napoleonic Wars were defeated, the British and Russian empires expanded greatly, becoming the world's leading powers. The Russian Empire expanded in central and far eastern Asia. On the other hand, the British Empire grew ✓ Lesson 3: The Philippines in the 19th Century: The Small Picture rapidly in the first half of the century, especially with the expansion in Canada, Australia, South Africa, The Philippines in the 19th Century as: The Small Picture India and Africa. (One King One Flag One Fleet One Empire) By the end of the century, the British Empire controlled a fifth of the world's land and one quarter of the At the start of the 19th century, the political and economic changes in Europe and the Americas were finally world's population. beginning to affect Spain and therefore, the Philippines. The British Empire enforced what became known as the Pax Britannica, which had ushered in unprecedented globalization and economic integration on a massive scale. 19th Century Economic Environment The last galleon arrived in Manila in 1815, and by the mid-1830s Manila was open to foreign merchants almost without restriction. (The Galleon Trade 1565-1815) Demand for Philippine sugar and abaca (hemp) grew rapidly The volume of exports to Europe expanded even further after the completion of the Suez Canal in 1869. 9 MARY ANGELINE G. GOMEZ (BSHM 4B) The growth of commercial agriculture resulted in the appearance of a new class. Spanish Colonial Educational System The land of the church and the rice estates of the pre-Spanish nobility arose haciendas of coffee, hemp, sugar, and tobacco often the property of enterprising Chinese Filipino mestizos. Curriculum was Formal Organized, and Religion-oriented Spanish missionaries were the teachers or tutors "The Economic Background of Rizal's Time“ Taught Christian doctrines, prayers and sacred songs Teach catechism to the natives Benito J. Legarda Jr. (2011) Study of the Spanish language was compulsory Education was considered a privilege not a right Benito J. Legarda Jr. (2011), "The Economic Background of Rizal's Time" published in The Philippine Education for the elite was controlled by the friars Review of Economics, “At the end of the 19th century, Philippine real wage rates were the highest in east and south Asia, higher even than industrial Japan Williamson (2000) presents wage rates relative to Britain Educational Decree of 1863 for 1899-1903. Access to education by the Filipinos was later liberalized through the enactment of the Educational Decree Legarda (2011) further asserted that, of 1863. It provided for the establishment of at least one primary school for boys and girls in each town under the "Economically the Philippines had risen in a globalized world without the compulsion and plantations of responsibility of the municipal government. other colonies… It provided for the establishment of a normal school for male teachers under the supervision of the Jesuits. Some have said that Filipinos of that time were inarticulate…They certainly expressed themselves loud and clear by their actions in raising economic output so substantially.This achievement was hardly a mark The Spanish schools started accepting Filipino students. of indolence." It was during this time when the intellectual Filipinos emerged. Legarda (2011) summarized his article, "The economic background of Rizal's time with the following: The Basic Education Spanish Colonial Curriculum “... at the world level Rizal's life fell within the first age of globalization, with a growing integration of The Spanish curriculum consisted of 3R's - reading, writing and religion the world economy across national lines, characterized at the time by the trade in bulk commodities and The schools were parochial or convent schools by the reduced importance of silver currency." The main reading materials were the cartilla, the caton, and the catecismo. "At the national level, the Philippines greatly expanded its volume of foreign trade… and diversified its The method of teaching-learning was predominantly individual memorization, economic structure, with new money flows circulating far into the countryside and giving an impulsive to There were three grade levels: Entrada, Acenso, Termino the formation of a native middle class.” The curriculum required the study of: 19th Century Educational Environment Christian Doctrine Not until 1863 was there public education in the Philippines, and even then the church controlled the Values curriculum. History Less than one-fifth of those who went to school could read and write Spanish, and far fewer could speak Reading and Writing in Spanish (steno) it properly. Mathematics Limited higher education in the colony was entirely under clerical direction, by the 1880s sons of the Agriculture wealthy were sent to Europe to study Etiquette Nationalism and passion for reform blossomed the liberal atmosphere Singing Talented group of overseas Filipino students arose, came to be known as the Propaganda Movement World Geography Spanish History Spanish Colonial Educational Aims in the 19th Century Existing Higher Education Schools in the 19th Century Promotion of Christianity Promotion of Spanish language The oldest universities, colleges, vocational schools and the first modern public education system in Imposition of Spanish culture Asia were created during the Spanish colonial period. 10 MARY ANGELINE G. GOMEZ (BSHM 4B) The earliest schools were founded by Spanish Catholic missionaries. By the time Spain was replaced by Criticisms on the State of Education the United States as the colonial power, the Filipinos were among the most educated subjects in all of Asia. On November 30, 1900, the Philippine Commission reported to the US War Department about the state of education throughout the archipelago 1. Under Spanish rule there was a system of primary schools. The Spanish regulations provided that there should be one male and one female primary school teacher for each 5,000 inhabitants. We find that there is but one teacher to each 4,179 inhabitants. 2. There were no schoolhouses, no modern furniture, and there were no good text- books. The schools were held in the residences of the teachers, or in buildings hired by the municipalities and used by the principals as dwellings. In some of the schools there werewooden benches and tables, but it was not at all unusual to find a school without any seats for the pupils. 3. In these primary schools, reading, writing, sacred history, and the catechism were taught. Except in a very few towns, the four elementary arithmetical processes were attempted, and in a few towns a book on geography was used as a reading book. Girls were taught embroidery and needlework. 4. From the beginning the schools were entirely under the supervision of the religious orders, who were disposed to emphasize secondary and higher education for a few pupils rather than to further and promote the primary education of the masses. 5. The result of this policy is that a few persons have stood out prominently as educated Filipinos, while the great mass of people have either not been educated at all or furnished only the rudiments of knowledge, acquiring merely the mechanical processes of reading and writing. 6. It is stated that when the Spaniards came here several of the tribes of the Philippine Islands could read and write their own language. At the present time, after three hundred years of Spanish domination, the bulk of the people cannot do this. 7. The Spanish minister for the colonies, in a report made December 5, 1870, points out that, by the process of absorption, matters of education had become concentrated in the hands of the religious orders. 8. It has been stated that in 1897 there were in these islands 2,167 public schools. The ineffectiveness of these schools will be seen when it is remembered that a school under the Spanish regime was strictly sectarian… Counter-Criticisms on the State of Education 1. There was a mistake in the computation made by the Philippine Commission in the report, as it took into account all of the population, including babies and old people. What should have been counted only are children in Elementary School age (ages 5 through 13) and teenagers in High School age (ages 14 through 17). 2. Based on the official figures there couldn't be a school in every village in the Islands. 11 MARY ANGELINE G. GOMEZ (BSHM 4B) 3. The Philippine Commission who made the report did not take into account that the schools maintained by The Spaniards collected all forms of taxes and tributes from the Filipinos and even required the natives to Spain were closed and, in many cases, looted and badly damaged during the Spanish-American War and render polo y servicio or forced labor to the government and to the Catholic church. the Philippine Revolution. This forced labor was also linked to the Spanish doctrine of "Limpieza de Sangre" or cleansing of blood, 4. Philippine Commission made no reference to the fact that the pioneering public school education cleanliness of blood or blood purity. introduced by Spain in the Philippines was the first of its kind in all of Asia, and the first to be established It created social tensions between and among classes. in any European colony in the world. As a result, the average American at the time was less educated than A system of racial discrimination came to be institutionalized. High positions in government were opened the average Filipino… only to the pure-blooded Spaniard Members of the middle class and the Indios were considered inferior by the upper classes and unworthy of education. Benito J. Legarda Jr. (2011) in his article, “The economic background of Rizal's time" published in The Philippine Review of Economics made some comment on the status of education in the Philippines during the The following social structure can be clearly seen in the 19th century Philippines 19th century, saying that, 1. Highest Class (Spanish Officials, Peninsulares, Insulares, Friars) "There were also advances in education. From the earliest days of Spanish rule, the Church had given 2. Middle Class (Spanish Mestizos, Chinese Meztizos, Criollos and Principalia) education to both boys and girls. Public education was initiated in Spain in 1857 and was extended to the 3. Lowest Class (Indios or native or the masses) Philippines in 1863. Unlike the Americans, the Spanish did not send boatloads of teachers over but trained teachers locally." 1. Highest class - the people that belong in this class include the Spanish officials, Peninsulares, Insulares and "For higher education, unlike many other European colonies in Asia, it was possible in the Philippines to the friars. get an education in subjects like medicine, pharmacy, law, pedagogy, theology, and fine arts.” Spanish Officials - Peninsulares and Insulares who have official government designations starting "Rizal in the Fili has a satirical chapter on a class in physics, but at least it was being offered. Access was from the Governor-General not limited to the well-to-do but was enjoyed through scholarships by those of peasant stock like Mabini.” Peninsulares - are Spaniards who were born in Spain. They held the most important government "Gregorio Sancianco y Goson published the first Filipino book in Madrid in 1881, an economic treatise jobs and made up the smallest number of the population in a part of which he brings up the subject of the indolence of the Filipino, later discussed by Rizal Insulares - are Spaniards born in the Philippines. They are considered inferior Spaniards compared (Sancianco, 1881)." to those who were born in Spain Friars - are members of any of certain religious orders of men, especially the four religious orders The Ilustrados (Augustinians, Carmelites, Dominicans, and Franciscans). As a result of increasing the number of educated Filipinos a new social class raised and came to be known 2. Middle Class - the people that belongs in this class includes the Spanish Mestizos, Chinese Meztizos, Criollos, as the Ilustrados. and Principalia Furthermore, with the opening of Suez Canal in 1869, travel to Spain became quicker, easier and more affordable, and many Filipinos took advantage of it to continue higher education in Spain and Europe, Spanish Mestizos - are of mixed Spanish and indigenous Filipino ancestry mostly in Madrid and Barcelona. Chinese Mestizos - are a mixed Chinese and indigenous Filipino ancestry The most prominent of the Ilustrados was Jose Rizal. Criollos - a person of mixed European and black descent, especially in the Caribbean. It meant then, Other Filipino intellectuals, such as Graciano Lopez Jaena, Marcelo H. del Pilar, Mariano Ponce or a white man of European descent, born and raised in a tropical or semi-tropical colony. Antonio Luna, who had also studied in Spain, began contributing to the cause for Filipino self-government Principalia (ruling class of native elites: gobernadorcillo, cabeza de barangay. Land owners, and independence. merchants, wealthy native families) 19th Century Social Structure 3. Lowest class - poor Filipinos The 19th Century Philippines was a feudalistic society as a consequence of the encomienda system The Indios are the poor natives or poor people having pure Filipino blood. imposed by the colonizers. Since Spain was very far from the Philippines, the King of Spain ruled the Islands through the Viceroy As legally defined in 1503, an encomienda (from the word encomendar, "to entrust") consisted of a grant of Mexico, which was then another Spanish colony. by the crown to a conquistador, soldier, or official living in a particular area. The receiver of the grant the encomendero, could extract tribute from the people in gold, in kind, or in labor and was required to protect them and instruct them in the Christian faith. 12 MARY ANGELINE G. GOMEZ (BSHM 4B) Represented the crown in all governmental matters Had the power to appoint and dismiss public officials, except those personally chosen by the King He was Commander-in-chief of the colonial army He Supervised all government offices and collection of taxes He was also the president of the Real Audiencia. (Like the Chief Justice of the Supreme Court today) He had legislative powers, he can legislate laws for the colony. Laws enacted by the governor-general are called Actos Acordados Qualification: Must be a Peninsulares or a Spaniard born in Spain There were 115 Spanish Governor-Generals in our country. The first one was Miguel Lopez de Legazpi (1565-1572) and the last was Diego de los Rios (1898). Owing to the distance of the Philippines from Spain, the governor-general exercised absolute powers. There was widespread selling of lower positions to the highest bidders. And because many of those in government were unqualified and unfit for government service, the Spanish colonial administration became so corrupt and inefficient. The Governor General and other government officials had so much power that it was commonly abused. To investigate the abuses, there were bodies created: 1. The Residencia 2. The Visita 3. The Real Audiencia The Residencia This was a special judicial court that investigates the performance of a Governor-General who was about to be replaced. The Political Structure The incoming Governor-General was usually a member and submits a report of findings to the King Spain established a centralized colonial government in the Philippines that was composed of a The Visita NATIONAL GOVERNMENT and the LOCAL GOVERNMENTS that administered provinces, cities, towns, and barrios. The Council of Indies in Spain sends a Spanish official called the Visitador-General to observe conditions in the colony The National Government: The Visitador-General reported his findings directly to the king maintained peace and order Real Audiencia collected taxes built schools and other public works The highest court in the land during the Spanish times Served as an advisory body to the Governor-General and checks and reports his abuses But at the same time, the Governor General is the president/ head of this body The Governor-General Audits the expenditures of the colonial government Sends a yearly report to Spain Salary: 40,000 pesos The King's representative and the highest-ranking official in the Philippines. Head of the Spanish colonial government Appointed by the Spanish monarch 13 MARY ANGELINE G. GOMEZ (BSHM 4B) The Local Government The Municipal Government The Spaniards created Local Government Units for the provinces. There were two types of local government units: Instead of antagonizing the former leaders/ or chieftains among the Filipinos, the Spaniards utilized their services instead. 1. Alcaldia The Filipino officials were used as liaisons (middlemen) with the people and to keep the lower class from 2. Corregimiento revolting against the Spaniards. Provinces or Alcaldias were divided into several towns or pueblos headed by Gobernadorcillos or Little The Provincial Government Governors. Alcaldia Towns or pueblos were divided into several barangays or cabeceiras. The Alcaldia, led by the Alcalde Mayor governed the peaceful provinces Pueblos (Towns) Replaced the encomendero and ruled over the provincial government Head: Gobernadorcillo (Little Governor) Performed judicial functions in his capacity as the highest judicial official in the province A position given to Filipinos This position remained appointive and open only to Spaniards - Peninsulares or Insulares Occupied by former datus Salary: 300-2000 pesos before 1847 and 1500-1600 pesos after 1847 At first, the position was filled by hereditary succession, then the Gobernadorcillo was elected by all Duties of the Alcalde Mayor married males. In the 19th century, it became an elective position voted by the Gunta) or "electoral board" made up of 13 Represented the Spanish king and the Governor-General members: the Gobernadorcillo and twelve (12) members of the principalia or body of prominent citizens. Exercised executive andjudicial functions The principalia was composed of present and former cabezas de barangay and gobernadorcillos. Managed the day-to-day operations of the provincial government It was later expanded to include payers of land taxes and property owners. The right to hold all local Implemented laws and supervised the collection of taxes offices was reserved to the members of the principalia. This was the only form of participation of the Filipinos in the government This was considered as the most corrupt unit in local government due to Indulto de Commercio or the right to Salary: 24 pesos (exempted from taxation) participate in the Galleon Trade. This made them rich and powerful. And in effect made them abuse their powers. Main Duties: Efficient governance and tax collection Other Duties Corregimiento o preparation the tribute list (padron) o recruitment and distribution of men for draft labor, communal public A province where conditions of peace and order were less stable o work and military conscription (quinto) opostal clerk Under the rule of a military officer called Corregidor o judge in minor civil suits Duties: Governed the provinces that were not yet entirely under Spanish control Intervened in all administrative cases pertaining to his town: lands, justice, finance and the municipal police Qualifications The City Government o Any native/ Chinese mestizo o At least 25 years old Larger towns became cities called Ayuntamiento o Literate in oral or written Spanish It became the center of trade and industry o A Cabeza de Barangay of 4 years City Head: Alcalde en ordinario (City Mayor) Example: Emilio Aguinaldo was a Chinese Mestizo and was the Gobernadorcillo of Cavite El Viejo (now The Ayuntamiento had a city council called the Cabildo Kawit). The Cabildo is composed of: The officials of the pueblo were taken from the Principalia, the noble class of pre-colonial origin. Their − Alcalde (City Mayor) names are survived by prominent families in contemporary Philippine society such as Duremdes, Lindo, − Regidores (Councilors) Tupas, Gatmaitan, Liwanag, Pangilinan, Panganiban, Balderas, Agbayani, Apalisok, and Aguinaldo − Alguacil Mayor (Police Chief) to name a few. − Escribano (Clerk of court and official notary) Four Lieutenants aided the Gobernadorcillo in his duties 14 MARY ANGELINE G. GOMEZ (BSHM 4B) 1. Teniente Mayor (chief lieutenant), The primary role of these missionaries was to propagate Christianity among the natives of these 2. Teniente de Policia (police lieutenant), new conquered islands. 3. Teniente de Sementeras (lieutenant of the fields) Because the King of Spain has the power of patronato real – which was given by the Pope - the State 4. Teniente de Ganados (lieutenant of the livestock) and the Church in the Philippines was unified. In addition, the friars were granted land estates known as 'friar lands in order for these missionaries to Barrios (Barangays or Cabece