This document provides information about the Freshmen Orientation for the Institute of Information and Computing Sciences (IICS) at the University of Santo Tomas (UST). It details the history and establishment of IICS and its departments of Computer Science, Information Technology, and Information Systems. It also outlines the mission, vision, and administration of IICS, as well as introducing the profiles and policies regarding students, including the retention policy and code of conduct.
This talks about the classes of IPv4 addresses, The Internet Etiquette, Computer Networks, Basic Communication Model, and Line Configuration in Computer Networks.
The Internet is a global system of interconnected computer networks that connects billions of devices worldwide. It is a network of networks comprised of private, public, academic and government networks linked together using various networking technologies. The Internet enables new forms of human interaction like social networking and allows people worldwide to access a vast amount of information and resources through services like the World Wide Web and email.
This document provides an overview of computer networking and internet tools. It defines computer networking as connecting computers together to share information. It then describes different types of networks including LAN, MAN, WAN, and peer-to-peer. Several internet tools are also outlined such as email, social media platforms, Google Drive, and video conferencing software. The document concludes with tips for evaluating internet resources for accuracy, authority, and relevance.
Computer Networking - Its Advantages & DisadvantagesRita Gokani
A computer network allows computers to communicate and share data and information. It connects two or more computers together, allowing them to share resources like printers and scanners, exchange data, and communicate with one another either via wires or wireless signals. While computer networks provide benefits like increased speed, reduced costs, and centralized management, they also have drawbacks such as high installation costs and potential server or cable failures.
This document provides an introduction to information and communication technology (ICT). It discusses the evolution of computers from first to fifth generation technologies and how ICT has changed lives and society. The document notes that ICT allows information processing and sharing from anywhere at any time using electronics, computers and communication devices. It also discusses how ICT has impacted the Philippines by highlighting statistics on cellphone and internet usage and employment in ICT sectors. Finally, it includes questions to interview a local business owner about their use of and perspectives on ICT.
The document discusses the evolution of the Internet from its origins as ARPANET in 1969 to the World Wide Web today. It describes how the Internet was developed to allow scientists to share information and work together. It outlines the key events that led to the Internet being opened up for commercial and public use in the 1990s. It also defines important Internet concepts like IP addresses, domain names, Internet service providers, and the purpose and components of the World Wide Web and web browsers.
An Internet service provider (ISP) offers customers access to the Internet for a monthly or yearly fee. ISPs are categorized as regional or national based on their geographic coverage area. Regional ISPs service a specific area with a smaller support team, while national ISPs have nationwide coverage and a larger support team. ISPs interconnect with upstream providers to exchange traffic and routes to provide full connectivity to destinations on the Internet for their customers.
This talks about the classes of IPv4 addresses, The Internet Etiquette, Computer Networks, Basic Communication Model, and Line Configuration in Computer Networks.
The Internet is a global system of interconnected computer networks that connects billions of devices worldwide. It is a network of networks comprised of private, public, academic and government networks linked together using various networking technologies. The Internet enables new forms of human interaction like social networking and allows people worldwide to access a vast amount of information and resources through services like the World Wide Web and email.
This document provides an overview of computer networking and internet tools. It defines computer networking as connecting computers together to share information. It then describes different types of networks including LAN, MAN, WAN, and peer-to-peer. Several internet tools are also outlined such as email, social media platforms, Google Drive, and video conferencing software. The document concludes with tips for evaluating internet resources for accuracy, authority, and relevance.
Computer Networking - Its Advantages & DisadvantagesRita Gokani
A computer network allows computers to communicate and share data and information. It connects two or more computers together, allowing them to share resources like printers and scanners, exchange data, and communicate with one another either via wires or wireless signals. While computer networks provide benefits like increased speed, reduced costs, and centralized management, they also have drawbacks such as high installation costs and potential server or cable failures.
This document provides an introduction to information and communication technology (ICT). It discusses the evolution of computers from first to fifth generation technologies and how ICT has changed lives and society. The document notes that ICT allows information processing and sharing from anywhere at any time using electronics, computers and communication devices. It also discusses how ICT has impacted the Philippines by highlighting statistics on cellphone and internet usage and employment in ICT sectors. Finally, it includes questions to interview a local business owner about their use of and perspectives on ICT.
The document discusses the evolution of the Internet from its origins as ARPANET in 1969 to the World Wide Web today. It describes how the Internet was developed to allow scientists to share information and work together. It outlines the key events that led to the Internet being opened up for commercial and public use in the 1990s. It also defines important Internet concepts like IP addresses, domain names, Internet service providers, and the purpose and components of the World Wide Web and web browsers.
An Internet service provider (ISP) offers customers access to the Internet for a monthly or yearly fee. ISPs are categorized as regional or national based on their geographic coverage area. Regional ISPs service a specific area with a smaller support team, while national ISPs have nationwide coverage and a larger support team. ISPs interconnect with upstream providers to exchange traffic and routes to provide full connectivity to destinations on the Internet for their customers.
This document provides an overview of the CSC103 - Introduction to Computing course at Jahan University. It discusses the topics that will be covered in the course, including an introduction to computers, their characteristics and evolution. It also outlines the class policies on attendance and grading. Key points about what constitutes a computer and its capabilities and limitations are also summarized. The document is presented as a slideshow with the lecturer's name and date included.
This document discusses information and communication technology (ICT) and its impact on society. ICT is defined as the use of electronic devices and software to store, process, transmit and retrieve information. The document then covers the evolution of computers through different generations. It discusses how ICT is used in education, banking, industry and e-commerce. It also compares computerized and non-computerized systems. The document outlines some impacts of ICT on society such as faster communication, social problems, lower costs and effective sharing of information. It discusses computer ethics, intellectual property, privacy and cyber law. Security threats to computers like malicious code and hacking are also mentioned.
This document discusses the positive and negative impacts of ICT (Information and Communication Technology). It defines ICT and explains that it includes any communication devices, applications, networks, hardware/software, and services. The document then lists several positive impacts of ICT on education, business, health sector, and online shopping. However, it also outlines some negative impacts such as pornography, plagiarism, hacking, health problems, unemployment, theft, spreading computer viruses, and software piracy. In conclusion, the document examines both the benefits and drawbacks of ICT in the current context.
This training report provides an introduction to servers. A server is a system that responds to requests across a network to provide network services. Servers have hardware requirements like fast network connections and high input/output throughput since they provide services to many users. Servers come in different sizes from rack, tower, and blade servers. The conclusion states that servers provide benefits like reduced paper usage, increased communication and data security, easier data management, and improved reliability.
Technology in schools should be used ethically according to guidelines. Students should protect passwords, respect others' property and privacy, and avoid plagiarism or software piracy. Examples of acceptable use include following network policies, deleting old files, and using antivirus software. Unacceptable uses involve identity theft, commercial activities, obscene material, private information theft, harassment, and vandalism. Schools have rules to promote responsible technology utilization.
Server computing involves physical computers that provide services to client computers connected to them, allowing clients to access information and resources. Servers can be hardware or software and manage network resources and service requests from clients. Common types of servers include web servers, application servers, real-time communication servers, FTP servers, name servers, database servers, game servers, media servers, and proxy servers. Servers are optimized for 24/7 operation, support multiple users and applications, and have features like multiple processors, RAM, storage, and network interfaces that make them more powerful than standard workstations.
Introduction to information technology lecture 1adpafit
The document provides an overview of computers and information technology. It discusses how IT uses computing and communication to spread information. It then defines computers and their basic components of hardware and software. The document outlines the different generations of computers and some early calculating devices. It also describes input/output devices, common computer components, and uses of computers in various fields.
A very important thing to know about internet is WWW. We all see this 1 word but most of us are not aware of it. So in this slide you will find everything about World Wide Web.
This document provides an overview of communication and computer networks. It begins with a brief history of communication methods such as smoke signals and drums. It then introduces computer networks, distinguishing between wide area networks that connect multiple locations over long distances, and local/metropolitan area networks that operate within a limited geographical scope. The document discusses how networks allocate and share resources among users. It also outlines some of the challenges in integrating different network services and maintaining security.
The document discusses the history and uses of the internet. It notes that the internet started in the 1960s during the Cold War as a network called ARPANET connecting computers in the US and Russia. The internet allows computers around the world to connect through various communication resources like phone lines, fiber optics, and satellites. Some key uses of the internet include accessing information, conducting business, online gaming, communication through chatrooms and messaging, and social networking. Services provided over the internet include the World Wide Web, email, and social media platforms.
Case study on Pamplona National High School Local Area NetworkJude Rainer
The document proposes a centralized local area network for Pamplona National High School to address issues with their current computer network. It would include installing a server with services like DHCP, DNS, FTP, proxy, and web server to provide shared resources and improve security and management. A budget of 300,000 pesos is proposed to cover equipment, installation, and salaries for a system administrator and assistant to manage the new network over five years.
The document discusses communication technology and the AIDA model of communication. It begins by defining communication and describing different types of communication technology, including graphic, wave, and electronic technology. It then explains the AIDA model, which states that effective communication moves individuals through the stages of attention, interest, desire, and action. The document provides examples of how to apply the AIDA model in marketing communications to attract attention, build interest, create desire, and encourage action.
This document discusses various social and professional issues in information technology, including ethics, vulnerability disclosure, spam, email scams, hacking, viruses, and conflicts of interest. It addresses how organizations can evaluate their ethics and culture and examines approaches to vulnerability disclosure like non-disclosure, full disclosure, and responsible disclosure. It also outlines common email scams and discusses hacking activities and the development of viruses and worms.
The document provides an overview of network fundamentals including:
- The structure of a network including devices, media, and protocols.
- Layered models like TCP/IP and OSI describe the functions of network communication.
- Protocols define rules for message formatting, sharing path information between devices, and error handling.
- A layered model assists in protocol design and prevents changes in one layer from affecting others.
This document provides information about peer-to-peer and client/server networks. A peer-to-peer network connects devices directly without additional networking devices between them. The devices have equivalent capabilities and responsibilities, and there is no central control. This allows users to share files with others on the network. A client/server network has a server that provides information and services to client machines. All data is stored centrally on a file server, and access is controlled by usernames and passwords. The document instructs students to research and present on the advantages and disadvantages of each type of network. It provides rubrics to evaluate their research and oral presentation skills.
A network operating system (NOS) is software that enhances a basic operating system with networking features to support workstations and PCs on a local area network. Examples include Novell Netware, Microsoft Windows Server, and Linux servers. A NOS provides features for security, file/print sharing, directories, and remote access. Common tasks involve user administration, backups, and security monitoring. A client accesses services from a server. Windows Server is designed for enterprise management while Linux servers offer flexibility and cost advantages. Peer-to-peer networks allow direct sharing while client/server uses centralized file servers.
Information technology and its impact on societyArijeet Dutta
1) Information technology refers to the use of computers and telecommunications to store, retrieve, transmit and manipulate data.
2) IT and society are rapidly co-evolving in surprising ways, with each changing the other. Increased digitization of social interactions allows new ways of gathering and synthesizing previously disconnected information.
3) IT impacts many aspects of daily life including education, healthcare, business, governance, and transportation. It has created new jobs but also contributed to job losses through outsourcing. While enhancing communication, it also enables privacy and security concerns if not managed carefully.
La dictadura militar en Argentina duró de 1976 a 1983. El golpe militar derrocó a Isabel Perón e impuso un gobierno autoritario que cometió graves violaciones a los derechos humanos como la tortura y desaparición de miles de personas. El gobierno también implementó un plan económico neoliberal que resultó en una gran crisis con altos niveles de deuda, inflación y quiebra de industrias. Grupos como las Madres y Abuelas de Plaza de Mayo surgieron para exigir justicia por los desaparecidos.
This document provides an overview of the CSC103 - Introduction to Computing course at Jahan University. It discusses the topics that will be covered in the course, including an introduction to computers, their characteristics and evolution. It also outlines the class policies on attendance and grading. Key points about what constitutes a computer and its capabilities and limitations are also summarized. The document is presented as a slideshow with the lecturer's name and date included.
This document discusses information and communication technology (ICT) and its impact on society. ICT is defined as the use of electronic devices and software to store, process, transmit and retrieve information. The document then covers the evolution of computers through different generations. It discusses how ICT is used in education, banking, industry and e-commerce. It also compares computerized and non-computerized systems. The document outlines some impacts of ICT on society such as faster communication, social problems, lower costs and effective sharing of information. It discusses computer ethics, intellectual property, privacy and cyber law. Security threats to computers like malicious code and hacking are also mentioned.
This document discusses the positive and negative impacts of ICT (Information and Communication Technology). It defines ICT and explains that it includes any communication devices, applications, networks, hardware/software, and services. The document then lists several positive impacts of ICT on education, business, health sector, and online shopping. However, it also outlines some negative impacts such as pornography, plagiarism, hacking, health problems, unemployment, theft, spreading computer viruses, and software piracy. In conclusion, the document examines both the benefits and drawbacks of ICT in the current context.
This training report provides an introduction to servers. A server is a system that responds to requests across a network to provide network services. Servers have hardware requirements like fast network connections and high input/output throughput since they provide services to many users. Servers come in different sizes from rack, tower, and blade servers. The conclusion states that servers provide benefits like reduced paper usage, increased communication and data security, easier data management, and improved reliability.
Technology in schools should be used ethically according to guidelines. Students should protect passwords, respect others' property and privacy, and avoid plagiarism or software piracy. Examples of acceptable use include following network policies, deleting old files, and using antivirus software. Unacceptable uses involve identity theft, commercial activities, obscene material, private information theft, harassment, and vandalism. Schools have rules to promote responsible technology utilization.
Server computing involves physical computers that provide services to client computers connected to them, allowing clients to access information and resources. Servers can be hardware or software and manage network resources and service requests from clients. Common types of servers include web servers, application servers, real-time communication servers, FTP servers, name servers, database servers, game servers, media servers, and proxy servers. Servers are optimized for 24/7 operation, support multiple users and applications, and have features like multiple processors, RAM, storage, and network interfaces that make them more powerful than standard workstations.
Introduction to information technology lecture 1adpafit
The document provides an overview of computers and information technology. It discusses how IT uses computing and communication to spread information. It then defines computers and their basic components of hardware and software. The document outlines the different generations of computers and some early calculating devices. It also describes input/output devices, common computer components, and uses of computers in various fields.
A very important thing to know about internet is WWW. We all see this 1 word but most of us are not aware of it. So in this slide you will find everything about World Wide Web.
This document provides an overview of communication and computer networks. It begins with a brief history of communication methods such as smoke signals and drums. It then introduces computer networks, distinguishing between wide area networks that connect multiple locations over long distances, and local/metropolitan area networks that operate within a limited geographical scope. The document discusses how networks allocate and share resources among users. It also outlines some of the challenges in integrating different network services and maintaining security.
The document discusses the history and uses of the internet. It notes that the internet started in the 1960s during the Cold War as a network called ARPANET connecting computers in the US and Russia. The internet allows computers around the world to connect through various communication resources like phone lines, fiber optics, and satellites. Some key uses of the internet include accessing information, conducting business, online gaming, communication through chatrooms and messaging, and social networking. Services provided over the internet include the World Wide Web, email, and social media platforms.
Case study on Pamplona National High School Local Area NetworkJude Rainer
The document proposes a centralized local area network for Pamplona National High School to address issues with their current computer network. It would include installing a server with services like DHCP, DNS, FTP, proxy, and web server to provide shared resources and improve security and management. A budget of 300,000 pesos is proposed to cover equipment, installation, and salaries for a system administrator and assistant to manage the new network over five years.
The document discusses communication technology and the AIDA model of communication. It begins by defining communication and describing different types of communication technology, including graphic, wave, and electronic technology. It then explains the AIDA model, which states that effective communication moves individuals through the stages of attention, interest, desire, and action. The document provides examples of how to apply the AIDA model in marketing communications to attract attention, build interest, create desire, and encourage action.
This document discusses various social and professional issues in information technology, including ethics, vulnerability disclosure, spam, email scams, hacking, viruses, and conflicts of interest. It addresses how organizations can evaluate their ethics and culture and examines approaches to vulnerability disclosure like non-disclosure, full disclosure, and responsible disclosure. It also outlines common email scams and discusses hacking activities and the development of viruses and worms.
The document provides an overview of network fundamentals including:
- The structure of a network including devices, media, and protocols.
- Layered models like TCP/IP and OSI describe the functions of network communication.
- Protocols define rules for message formatting, sharing path information between devices, and error handling.
- A layered model assists in protocol design and prevents changes in one layer from affecting others.
This document provides information about peer-to-peer and client/server networks. A peer-to-peer network connects devices directly without additional networking devices between them. The devices have equivalent capabilities and responsibilities, and there is no central control. This allows users to share files with others on the network. A client/server network has a server that provides information and services to client machines. All data is stored centrally on a file server, and access is controlled by usernames and passwords. The document instructs students to research and present on the advantages and disadvantages of each type of network. It provides rubrics to evaluate their research and oral presentation skills.
A network operating system (NOS) is software that enhances a basic operating system with networking features to support workstations and PCs on a local area network. Examples include Novell Netware, Microsoft Windows Server, and Linux servers. A NOS provides features for security, file/print sharing, directories, and remote access. Common tasks involve user administration, backups, and security monitoring. A client accesses services from a server. Windows Server is designed for enterprise management while Linux servers offer flexibility and cost advantages. Peer-to-peer networks allow direct sharing while client/server uses centralized file servers.
Information technology and its impact on societyArijeet Dutta
1) Information technology refers to the use of computers and telecommunications to store, retrieve, transmit and manipulate data.
2) IT and society are rapidly co-evolving in surprising ways, with each changing the other. Increased digitization of social interactions allows new ways of gathering and synthesizing previously disconnected information.
3) IT impacts many aspects of daily life including education, healthcare, business, governance, and transportation. It has created new jobs but also contributed to job losses through outsourcing. While enhancing communication, it also enables privacy and security concerns if not managed carefully.
La dictadura militar en Argentina duró de 1976 a 1983. El golpe militar derrocó a Isabel Perón e impuso un gobierno autoritario que cometió graves violaciones a los derechos humanos como la tortura y desaparición de miles de personas. El gobierno también implementó un plan económico neoliberal que resultó en una gran crisis con altos niveles de deuda, inflación y quiebra de industrias. Grupos como las Madres y Abuelas de Plaza de Mayo surgieron para exigir justicia por los desaparecidos.
El documento proporciona una lista de funcionarios del gobierno argentino actual y sus presuntos vínculos con grupos guerrilleros de izquierda como Montoneros en los años 1970, acusándolos de haber participado en atentados, secuestros y asesinatos durante la dictadura militar.
This document discusses cyberbullying and the evolving laws around it. It defines cyberbullying and outlines some landmark cases that helped shape policies. One case involved a teen girl who committed suicide after being cyberbullied. While this highlighted the issue, existing laws did not clearly address it. Since then, most states and some localities have passed laws against cyberbullying and harassment. However, the laws still vary and issues remain around factors like jurisdiction and schools' responsibilities. The challenges include addressing online abuse while protecting free speech rights.
La dictadura y la historieta argentina.pptx. horacio german garciaRobertoOtazu
El documento describe cómo la historieta argentina fue censurada y reprimida durante la dictadura militar entre 1976 y 1983. Varias revistas como Humo fueron censuradas y amenazadas por desafiar a la dictadura. El guionista Héctor Oesterheld, conocido por su trabajo en El Eternauta, fue una de las 30.000 víctimas de la dictadura. Recientemente, varios artistas han utilizado la historieta para reflejar y criticar los crímenes de la dictadura a través de obras como "Espírit
Literatura infantil prohibida por la dictadura militarShukDelMadrij
El documento habla sobre tres libros infantiles que fueron prohibidos por la dictadura militar en Argentina durante los años 1970. La Torre de Cubos de Laura Devetach fue prohibido en 1979 por supuestamente criticar la organización del trabajo y la propiedad privada. Un elefante ocupa mucho espacio de Elsa Bornemann fue prohibido en 1977 por contener una historia sobre una huelga de animales. El pueblo que no quería ser gris de Beatriz Doumerc e ilustrado por Ayax Barnes fue prohibido en 1976 por oponerse a una orden del rey de pint
Social Networks and Cyberbullying: Implications for Students and TeachersMemorial University
A look at updated legislation and recent court cases dealing with social networking, cyberbullying and freedom of speech. Will also look at what this might imply for students and teachers.
This document discusses teacher liability and legal issues related to teaching. It provides examples of court cases where teachers or schools were found negligent or not negligent for student injuries. It also addresses students' rights to free speech and issues around religion and curriculum in schools. The document advises teachers to cover themselves by documenting incidents, communicating with administrators, and avoiding risky behaviors both in and out of the classroom.
Juan Perón fue presidente de Argentina en tres ocasiones y tuvo dos esposas influyentes, Eva Perón y luego Isabel Perón, quien brevemente asumió la presidencia tras la muerte de Juan Perón en 1974 antes de ser derrocada por un golpe militar en 1976 que dio inicio a una dictadura militar represiva en Argentina y otros países latinoamericanos.
This document outlines the legal and ethical responsibilities of educators. It begins by stating the learning outcome of the presentation is for teachers to articulate two legal responsibilities and two ethical responsibilities. It then provides an introduction and overview of the topics to be covered, which include legal responsibilities, case law on legal issues, ethical responsibilities, case law on ethical issues, grounds for termination, due process, and conclusions. Specific legal responsibilities discussed include confidentiality of student information, prohibitions on abuse and inappropriate touching of students. Ethical responsibilities discussed include treating students, practices, colleagues, parents, and the community ethically. The document also summarizes two court cases related to legal responsibilities and two related to ethical responsibilities.
DÍA NACIONAL DE LA MEMORIA POR LA VERDAD Y LA JUSTICIA
30.000 detenidos, desaparecidos y asesinados
por la dictadura militar argentina
entre 1976 y 1983
El documento describe el 24 de marzo como el día en que se inició la última dictadura militar en Argentina en 1976. La junta militar derrocó a las autoridades electas y comenzó una política de terrorismo de Estado que incluyó la desaparición forzada de 30.000 personas. El documento también propone formas de conmemorar esta fecha en las escuelas a través de actividades que promuevan la reflexión sobre la democracia y los derechos humanos.
El documento describe el Proceso de Reorganización Nacional, la dictadura militar que gobernó Argentina entre 1976-1983. Se caracterizó por el terrorismo de estado, violaciones a los derechos humanos y desaparición de miles de personas. La junta militar implementó un plan económico neoliberal y censuró la cultura para imponer orden a través de la disciplina autoritaria.
1) La dictadura militar argentina de 1976-1983 causó la desaparición forzada de miles de personas que fueron consideradas "enemigos de la nación".
2) Estos detenidos eran torturados en centros clandestinos operados por las Fuerzas Armadas.
3) El grupo de Madres de Plaza de Mayo se formó en 1977 para exigir información sobre sus hijos desaparecidos y se convirtió en un activo sector de oposición al gobierno militar.
24 de marzo, Argentina
Por la Memoria, la Verdad y la Justicia.
Por el Juicio y Castigo a los responsables de delitos de lesa humanidad en la Argentina
The code of ethics for professional teachersJenny Aque
This document outlines the Code of Ethics for Professional Teachers in the Philippines. It establishes ethical standards for teachers in their relationships with the state, community, profession, teaching community, higher authorities, school officials, learners, parents, and their duties as individuals. The code is established under existing laws and aims to ensure teachers uphold the dignity and reputation of the teaching profession. Non-compliance with the code can result in disciplinary actions against teachers.
Problems and Issues in the Philippine Educational SystemJames Paglinawan
The document discusses several key problems with the Philippine educational system:
1) Declining quality of education as seen in poor test scores and a high percentage of students and teachers failing certification exams.
2) Large disparities in educational achievement based on socioeconomic status, with disadvantaged students having high dropout rates.
3) Underfunding of education relative to other ASEAN countries and low spending per student that has declined in real terms.
4) A mismatch between the skills taught and actual job requirements that leads to educated unemployment.
Information Education in Thailand
Assoc.Prof.Dr. Kulthida Tuamsuk
Information & Communication Management Program
Khon Kaen University, Thailand
Presented at Sukhothai Thammatirat Open University
21 September 2009
This document provides an overview of the course offerings and structure of a distance learning school called ACS. It lists over 70 areas of study across various disciplines like agriculture, horticulture, business, health and fitness. It also outlines the staff qualifications, noting that tutors have relevant industry experience and tertiary degrees. The principal has over 30 years of experience in fields like horticulture, recreation and education. Distance education through ACS offers interactive online courses with tutor support and assessments.
This document outlines the services provided by the College of Graduate Studies of DMMMSU-South La Union Campus. It offers advisory and consultancy services to individuals, groups, and institutions on topics such as pedagogy, curriculum development, counseling, career training, research, and community development. The services are provided through various programs and projects implemented in partnership with other colleges and external organizations, with the goal of informing, reforming, and transforming clients.
Preparing the Information Professionals of Tomorrow / Barbara B. MoranInfodays
This document discusses the changing nature of library and information science (LIS) education. It notes that LIS skills needed today differ from the past as organizations employing LIS professionals have transformed. As a result, LIS schools have transitioned from library schools to information schools to prepare students for diverse information environments. The document outlines the curriculum at the University of North Carolina's LIS program as an example and discusses challenges facing LIS education, such as keeping up with rapid changes in libraries and information technologies to ensure graduates are prepared to work in emerging roles and environments.
1. The Laguna State Polytechnic University was established in 1952 and has since expanded with additional campuses and programs.
2. The university aims to provide advanced education, professional training, and research services in fields like agriculture, fisheries, and industrial technologies.
3. It has several undergraduate and graduate programs across various colleges including agriculture, education, arts and sciences, and hospitality management.
The Nueva Ecija University of Science and Technology (NEUST) aims to provide quality education through undergraduate and graduate programs, research, and community outreach. Its mission is to offer advanced instruction, professional training, and leadership in various fields including arts, science, technology, and education. The College of Education seeks to produce competent teachers through quality instruction, research with real-world applications, and community extension programs. It aims to develop values and skills in students to serve as educators, entrepreneurs, and community leaders. The administration is led by the University President and Vice Presidents, along with Deans, Directors and Coordinators who oversee different campuses, departments, and student services.
Jesus Geeks: Equipping Technology Ministers to Serve Digital Natives (AccessE...City Vision University
The document discusses how to prepare future "technology ministers" to serve "digital natives." It begins by drawing lessons from previous mass migrations like urbanization. It notes that digital-immigrant parents and teachers are not fluent in parenting/teaching digital native children. The document then outlines opportunities and threats from technology for digital natives. It proposes a Masters in Science, Technology, Society and Ministry program to equip future Chief Digital Officers and technology staff. The program would take an incarnational approach and balance technical training with practical ministry skills. It concludes by asking how the proposed program could partner with other institutions.
This document outlines the syllabus for a Science, Technology, and Society course taught by Professor Lady Emeterio at City College of San Jose Del Monte. The course will examine how science and technology impact society through 5 units over 18 weeks. Students will develop knowledge and skills to understand these impacts and articulate philosophical perspectives. Requirements include assignments, debates, exams, and a final project. Policies cover attendance, late work, and contacting the professor. The course aims to help students reflect on science and technology's role in society.
The document is the notes from a September 1, 2017 division meeting presented by Dr. Dennis Pruitt, Vice President for Student Affairs at the University. The summary includes:
1) An overview of the historical role of student affairs and how it has changed from an "in loco parentis" model to focusing on meaningful services, experiences and support to empower student success.
2) A discussion of the current state of the University's student body including enrollment numbers, demographics, academic profiles and graduation/retention rates which are increasing but still lag behind peer institutions.
3) Notes on national trends in higher education including increasing enrollment of women and students of color while white student numbers are projected to decline
This document provides an overview of the Don Mariano Marcos Memorial State University College of Graduate Studies. It outlines the university's philosophy, vision, mission, and goals. It then discusses the college's goal and objectives for its graduate programs. The document provides specific objectives for the doctorate and master's programs in various fields like science education, mathematics education, and educational management. It aims to develop leaders, professionals, and community contributors through advanced training and research opportunities in its graduate studies.
The document provides an overview of Denmark Technical College's new president's bold vision to transform the college into a premier institution recognized around the world for excellence. The president aims to strengthen academic programs, expand online offerings, improve career preparation, foster partnerships, and grow enrollment and funding. Recent initiatives include a summer high school program and robotics camp engaging local students in STEM fields. The president invites alumni and supporters to help achieve the goals of preparing every student for success.
Murdoch University - IDP Virtual Education Fair 2010IDP India
Murdoch University is located in Perth, Western Australia. Perth has a population of around 2 million people and is ranked as one of the most liveable cities in the world. Murdoch University has around 18,400 students across its three campuses in Western Australia and five international centers. It has a strong focus on practical experience and industry-standard facilities across its faculties and schools.
Murdoch University - IDP Virtual Education Fair 2010IDP India
Murdoch University is located in Perth, Western Australia. Perth has a population of around 2 million people and is ranked as one of the most liveable cities in the world. Murdoch University has around 18,400 students across its three campuses in Western Australia and five international centers. It has a strong focus on practical experience and industry-standard facilities across its faculties.
This document provides an overview of William V.S. Tubman University. It discusses the university's history, colleges and courses offered, tuition rates, mission, vision, strategic goals, and principles of operation. Specifically:
- William V.S. Tubman University was originally established in 1978 as William V.S. Tubman College of Technology and was transformed into a university in 2009. It has six colleges and offers courses in various subjects.
- Tuition per credit hour is $5 for Liberian students and $25 for international students, payable in US dollars or Liberian dollars.
- The university's mission is to provide quality educational experiences to transform lives. Its
A presentation describing the Lyceum-Northwestern University Federation of Alumni Associations Foundation, Inc, including its establishment, its vision and mission and many other aspects of the group represented by the committed alumni from all the colleges of the university.
This document provides an overview of topics in college algebra including:
- Types of real numbers and their properties
- Algebraic expressions including terms, factors, and polynomials
- Operations on algebraic expressions such as addition, subtraction, multiplication, and division
- Special products involving binomials and factoring algebraic expressions
The document is a review for a preliminary examination on Module 1 of a college algebra course covering real numbers, algebraic expressions, and basic operations. It is authored by J.G.M. Manuel of the University of Santo Tomas.
A Beginner’s Guide to Programming Logic, Introductory
Chapter 3
Understanding Structure
Objectives
In this chapter, you will learn about:
- The features of unstructured spaghetti code
- The three basic structures—sequence, selection, and loop
- Using a priming input to structure a program
- The need for structure
- Recognizing structure
- Structuring and modularizing unstructured logic
COURSE TECHNOLOGY
CENGAGE Learning
A Beginner’s Guide to Programming Logic, Introductory
Chapter 2
Working with Data, Creating Modules, and Designing High-Quality Programs
Objectives
In this chapter, you will learn about:
- Declaring and using variables and constants
- Assigning values to variables
- The advantages of modularization
- Modularizing a program
- The most common configuration for mainline logic
COURSE TECHNOLOGY
CENGAGE Learning
A Beginner’s Guide to Programming Logic, Introductory
Chapter 1
An Overview of Computers and
Programming
Objectives
In this chapter, you will learn about:
- Computer systems
- Simple program logic
- The steps involved in the program development cycle
- Pseudocode statements and flowchart symbols
- Using a sentinel value to end a program
- Programming and user environments
- The evolution of programming models
COURSE TECHNOLOGY
CENGAGE Learning
This document is a lecture on real numbers presented by Ms. Cherry Rose R. Estabillo. It introduces the different subsets of real numbers from natural numbers to irrational numbers. Diagrams are shown to illustrate the relationships between these number sets. Examples are provided to demonstrate classifying numbers within these sets. Properties of real numbers like closure, commutativity, associativity and distributivity are discussed. The order of operations and examples applying it are also covered.
The document discusses the major theories that have been proposed regarding the nature of light over the past 3,000 years. It outlines six theories: 1) The tactile theory 2) The emission theory 3) The corpuscular theory 4) The wave theory 5) The electromagnetic theory 6) The quantum theory. For each theory, it discusses the key scientists who proposed them and the major ideas, including Descartes, Huygens, Newton, Maxwell, Planck, Einstein, and others. It also defines what a scientific theory and law are, and how theories of light have evolved as more evidence accumulated over centuries of study and experimentation.
1) Depreciation is the systematic allocation of the cost of a fixed asset over its useful life to match the cost with the economic benefits generated by the asset.
2) Without depreciation accounting, the entire cost of a fixed asset would be recognized in the year of purchase, providing a misleading view of an entity's profitability.
3) The straight-line method is the simplest way to calculate depreciation by subtracting salvage value from original cost and dividing by estimated useful life in years.
This document discusses acid-base titration and provides examples. It explains that acid-base titration is used to calculate the concentration of an acid or base of a known volume. It describes the setup and process for titrating an acid with a base, including using an indicator that changes color at the endpoint. Sample problems are worked through to calculate the concentration of an unknown acid or base by determining the moles of titrant used and applying stoichiometry to the balanced reaction.
This document provides instructions for several microbiology techniques, including how to hold an inoculating loop, streak plating bacteria to isolate colonies, transferring bacteria between culture tubes or broths, and measuring zones of inhibition. Streak plating involves spreading bacteria in a sparse pattern on an agar plate to isolate individual colonies after incubation. Transferring involves flaming loops or needles used to move bacteria between tubes. Measuring zones of inhibition analyzes the effect of antibiotics on bacterial growth.
Streaking is a technique used to isolate a pure strain of microorganisms, often bacteria, from a sample containing multiple strains. A wire loop is dipped into the sample and used to streak bacteria in successive passes on an agar plate, diluting the concentration with each pass so that isolated colonies can grow from single bacteria. The plate is then incubated, allowing each colony to multiply from a single parent bacterium. This process isolates pure strains that can be identified, studied, or tested.
The document provides instructions for windowing chicken eggs in order to access the developing embryo for experimental studies. The key steps are:
1. Candling the egg to locate the embryo.
2. Scrapping a small window in the eggshell directly above the embryo using sandpaper.
3. Carefully cutting a 1cm x 1cm window and removing the shell without disturbing the membrane below.
4. The window allows observation and manipulation of the embryo, such as adding test reagents. The window is then sealed with parafilm and the egg returned to incubation. Windowing provides non-invasive access to the embryo for developmental studies using the chicken egg model.
This document provides instructions for injecting chicken eggs at stage 12-14 using windowing and injection techniques. Key steps include:
1) Windowing the eggs using tape and scissors to create a small opening without disturbing the embryo.
2) Injecting India ink under the embryo to aid visualization.
3) Lowering dye-filled pipettes using a micromanipulator to inject the embryo in specific rhombomeres.
4) Sealing the window and incubating the eggs until sacrifice and analysis. Proper injection placement can be ensured by early dissection and sectioning.
The document discusses colony counters, which are instruments used to count bacterial colonies growing on agar plates. Early colony counters involved manually marking colonies on plates placed on a lighted surface and counting by hand. More recent automatic colony counters can electronically identify and count colonies by detecting contrasting light and dark spots, and are connected to computers to further analyze and magnify individual colonies. The recent colony counters provide faster, easier, and more efficient counting and observation compared to older manual methods.
This document describes the process of isolating and preparing chromosomes from white mice for analysis. Key steps included treating mice with colchicine to arrest cells in mitosis, sacrificing the mice and extracting bone marrow cells and testes tissue, suspending the cells in a hypotonic solution to spread the chromosomes, fixing and staining slides with the cell suspensions, and observing the chromosomes under a microscope. The white mice were used as model organisms because they are readily available, low-cost, easy to handle, and their chromosomes correlate well with other test organisms.
1. An autoclave is a device that sterilizes equipment and supplies by subjecting them to high pressure steam at 121°C for 15-20 minutes.
2. When autoclaving glassware, cap Pyrex bottles loosely and cover non-safety glass bottles with aluminum foil to prevent explosions.
3. Proper autoclave use involves following safety procedures like wearing protective equipment, waiting for full pressure release before opening, and allowing time for contents to cool before removal.
Aseptic Technique
The media on which you culture desirable microorganisms will readily grow undesirable contaminants, especially molds and other types of fungus, and bacteria from your skin and hair. It is therefore essential that you protect your cultures from contamination from airborne spores and living microorganisms, surface contaminants that may be on your instruments, and from skin contact.
Bacteria and other contaminants cannot fly. Nearly all forms of contamination are carried on microscopic dust particles that make their way onto sterile surfaces when they are carelessly handled. One exception is insect contamination, such as by ants for fruit flies. Fruit flies are a particular nuisance because they can crawl under the lids of agar plates and lay eggs. You would think that people doing genetics research would have developed a model by now that can't fly into other peoples' experiments!
A contaminated culture can often be rescued, however there is always the risk that you will re-isolate the wrong microorganism. Besides, you don't have that kind of time to waste. Exercise extreme care to keep your cultures pure.
To prepare an agar culture medium, one must first sterilize empty petri dishes by boiling them and allowing them to dry upside down. Agar powder is then prepared by mixing it with water in a microwave according to standard directions. Bottled agar formula is also warmed in the microwave with the cap loosened but not removed. Once the agar is liquid, petri dish lids are cracked open and the agar is carefully poured into the dishes under the lid to prevent contamination, setting to a thickness of 1/8 inch before storing upside down once solidified.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.pptHenry Hollis
The History of NZ 1870-1900.
Making of a Nation.
From the NZ Wars to Liberals,
Richard Seddon, George Grey,
Social Laboratory, New Zealand,
Confiscations, Kotahitanga, Kingitanga, Parliament, Suffrage, Repudiation, Economic Change, Agriculture, Gold Mining, Timber, Flax, Sheep, Dairying,
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Pengantar Penggunaan Flutter - Dart programming language1.pptx
UST ICS Freshmen Orientation
1. Freshmen Orientation
INSTITUTE OF INFORMATION
AND COMPUTING SCIENCES
Est. 2014
Your Name
Class Adviser, Section
Engr. Ricardo S. Balog
SWDB Coordinator for Engineering
2. UST Mission
• The University of Santo Tomas, the Pontifical
and Catholic University of the Philippines,
inspired by the ideals of St. Dominic de
Guzman and guided by the teachings of St.
Thomas Aquinas, dedicates herself to the
pursuit of Truth through the production,
advancement and transmission of knowledge
for the formation of competent and
compassionate professionals, committed to
the service of the church, the nation and the
global community
3. UST Vision
• Faithful to her centuries-old tradition
of excellence, the University of Santo
Tomas, envisions herself as a
globally recognized institution of
higher learning, actualizing the
professional and moral formation of
her students and effecting social
transformation.
4. HISTORY OF IICS
• In 1984, the College of Science introduced the
BS Mathematics major in Computer Science
program.
• In 1999, the BS Mathematics major in
Computer Science was converted to BS
Computer Science. Similarly, the program BS
Commerce major in Information System
Management was converted to BS Information
Management. Eventually, the Department of
Information and Computer Studies was born
and placed under the College of Science. Three
programs namely, BS Computer Science, BS
Information Management, BS information
Technology where offered on that year.
5. HISTORY OF IICS
• In 2003, the ICS Department transferred to the
Roque Ruaño Building but still under the
administration of the College of Science.
• In 2004, the ICS Department was officially
transferred under the administration of the
Faculty of Engineering.
• In 2006, the BS Information Management
program was discontinued and the BS
Information Systems was born. During the
same year, a new set of curricula for the BSCS,
BSIT and BSIS programs were offered to
freshmen students.
• In 2013, another new set of curricula
containing various specialization tracks for the
BSCS, BSIT and BSIS programs were offered to
freshmen students.
6. HISTORY OF IICS
• Still in 2013, the Department of Information
and Computer Studies was abolished and
replaced by three new departments namely:
Department of Computer Science, Department
of Information Technology and Department of
Information Systems.
• In 2014, the Institute of Information and
Computing Sciences (IICS) was born and the
Department of Computer Science, Department
of Information Technology and Department of
Information Systems were all placed under the
administration of the Institute.
7. MISSION OF IICS
As an academic arm of the Royal and
Pontifical University of Santo Tomas, the
Catholic University of the Philippines,
the Institute of Information and
Computing Sciences (IICS) is committed
in producing competent, compassionate
and committed Thomasian graduates
who are strongly founded with the
existing theories and principles
surrounding their field of interest and is
capable in the efficient application of
computing solutions which adheres to
high ethical and moral standards.
8. VISION OF IICS
The UST – Institute of Information and
Computing Sciences (IICS) envisions
itself to be a Center of Excellence in
Information Technology Education.
With the fast changing innovation in
the IT industry, we foresee our
students as globally competitive
graduates who specialize in the areas
of Computer Science, Information
Technology and Information Systems.
This can only be achieved however
with faculty members and staff who
are professional, ethical and morally
upright who respond to the needs and
challenges of our constantly changing
society.
9.
10. IICS ADMIN. OFFICIALS
Prof. Philipina A. Marcelo,
Ph.D.
Dean, Faculty of Engineering
Engr. Alex A. Santos
Director
Rev. Fr. Hermel O. Pama, O.P.
Regent
Mrs. Jerralyn Padua
Institute Secretary
11. IICS ACADEMIC OFFICIALS
Assoc. Prof. Perla P. Cosme
Chair, Department of Computer
Science
Engr. Mia V. Eleazar
Chair, Department of
Information Technology
Mrs. Mylene J. Domingo
Chair, Department of
Information Systems
12. DEPT. OF COMPUTER SCIENCE
CHAIR: PERLA P. COSME
1. ACULA, DONATA
2. AGBAYANI, JESUS
3. AMBROCIO, MAYRA CHRISTINA
4. BAHINTING, JUSTINE
5. BARTOLOME, ELLISON
6. ESTABILLO, CHERRY ROSE
7. CABERO, JONATHAN
8. COSME, PERLA
9. DELFINADO, CECIL
10.GONZALES, FRANCIS GERARD
11.JUGUETA, ELEANOR ALMA
12.LACHICA, LORRAINE LARA
13.SAGUM, RIA
14.SEÑO, JOSE
15.SIDEÑO, JANET
14. DEPT. OF COMPUTER SCIENCE
MATH / PHYSICS
1. AGUILAR, EZRA
2. BALMEO, KRISNAMONTE
3. JUGUETA, ELEANOR ALMA
4. LEDESMA, PETE VINCENT
5. LUCHICO, LYZA MARIE
15. DEPT. OF INFORMATION TECH.
CHAIR: ENGR. MIA ELEAZAR
1. AÑONUEVO, PAUL BENEDICT
2. BALAIS, MARICEL
3. BARIBAR, AARON
4. CARAMANCION, KEVIN MATTHE
5. DAEN, DARWIN
6. LACSAMANA, MA. BEATRIZ
7. LLAMAS, JAIRUS
8. ELEAZAR, MIA (CHAIR)
9. LOPEZ, ROCHELLE
10.PADUA, JERRALYN (FACULTY SECRETARY)
11.SANCHEZ, SHANICE
12.SANTOS, ANNE MICHELLE
13.TAAG, KARL ALEX
14.TAN, DEXTER
15. RAMIREZ, EUGENIA
16.VICTORIO, MIKE
17.ZALAMEDA, CHRISTIAN RAYMOND
16.
17. DEPT. OF INFORMATION SYSTEMS
CHAIR: MRS. MYLENE DOMINGO
1. BARCELO, ARNE
2. BULURAN, JOSEPH RANNIE
3. CORTEZ, WILLIAM
4. DECAMORA, LAWRENCE
5. DIAZ, SALVE
6. DOMINGO, MYLENE
7. DURAN, MILDRED
8. GARCIA, JANE STEPHANIE
9. GUEVARA, STEVEN KRISTIAN
10. JAVELLANA, ZAELA SARAH
11. LADAO, CHRISTOPHER (CHAIR)
12. MARIANO, DIVINAGRACIA –
13. MENDOZA, RENZI
14. MENOR, LUKE
15. OLAN, MERCEDITA
16. ORTIGAS, ANITA
17. OSAKO, NOBUMASA –
18. PERALTA, EDITHA
19. REYES, VERGIL
20. SANTOS, ALEX
21. SOTTO, CAMILLE
22. VALMADRID, MARIKIT
23. YABUT, GEMINIANO
20. True Education
• “The function of education is to
teach one to think intensively
and to think critically...
Intelligence plus character – that
is the goal of true education.”
(Martin Luther King Jr., Nobel Prize-winning 20th-century
American civil rights leader)
21. Real Character
“The measure of a man's real
character is what he would
do if he knew he would never
be found out.”
(Baron Thomas Babington Macauley, early 19th-century
English historian)
22. True Education
"To educate a person in
mind and not in morals
is to educate a menace
to society.“
(Theodore Roosevelt, 19th/20th century American
adventurer and politician, Nobel Prize-winning
U.S. president)
23. Profile of a Thomasian
1. Competent
Exudes a high degree of competence in
pioneering human endeavors:
Constant pursuit of truth
Determined efforts to become signs of
intellectual creativity
Effort to become men and women of
science and letters
Quest for excellence
24. Profile of a Thomasian
2. Compassionate
Reaches out to with Christian
compassion in:
Service particularly to the poor
and marginalized member of
the society
Ardent advocacy for life,
upholding freedom, justice,
peace and solidarity
25. Profile of a Thomasian
3. Committed
Exercise profession with deep
commitment in:
Performance of duties as members of
the church, as citizens of the country
Upholding with fidelity professional,
ethical, and moral standards
Striving to be a genuine leader
Being a courageous Christian witness
26. Retention Policy
REGULAR STUDENTS (R)
Those who have carried and passed the
regular load in all their past semesters.
IRREGULAR STUDENTS (IR)
Those who have back or advanced
subjects but are not under the Debarred
or Conditional Status
27. Retention Policy
CONDITIONAL STATUS (C)
C1 – students who have accumulated
failures in three courses (subjects) or
eight (8) to ten (10) failed units as of the
last semester/summer
C2 – students carrying a load less than
the regular load and fails 50% of said
carried load.
28. Retention Policy
DEBARRED STUDENTS (D)
D1 – students who failed in more than three (3) courses
(subjects) or have accumulated more than 10 units of
failure as of the last semester/summer
D2 – students who failed to satisfy the probationary terms
in their conditional admission.
D3 – those with failures of more than 50% of their carried
load if not carrying the full load.
D4 – those who are dropped from the roll of students due
to disciplinary action.
29. Retention Policy
Note:
In the counting of accumulated units,
any re-enrolled failed course (subject)
should be counted as separate course
(subject). For example, a 3-unit
course (subject) failed twice means 6
units of accumulated failed units or
two accumulated failed courses
(subjects).
31. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Honesty
The Thomasian puts high premium on the
practice of honesty - the act of truth-telling, truth
seeking, truth-doing.
You are dishonest if you commit the following:
Forge, alter or misuse University documents,
records, credentials or effects
Print, disseminate false information to or about
the university
Cheat in examinations and other school works
Plagiarize
Theft or stealing of school or students’ properties
Engage in other acts similar to the above
32. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Honesty
Honesty requires that one looks at all the
facts.
Communication & Conduct are the two
keystones of honesty. Communication
requires that one does not stay willingly
blind. Candor, openness, and truthfulness
lead to understanding.
Understanding leads to conduct that is
becoming of an honest person.
33. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Honesty
Cheating, stealing, sneaky behavior,
deceitfulness are acts that demean one
character.
An honest person will not keep silent
when silence is intended to cause another
person to believe something that is not
true.
34. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Courtesy
an act of respect towards another
a sign of maturity
observance creates a climate of goodwill and
fellowship
Thus Thomasian students must, at all times:
Be courteous and respectful of others
Refrain from obstructing, preventing or
defeating the right and obligation of others to
attend to their classes or any official activity
35. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Courtesy
Comply with lawful orders of University
authorities and or their agents
In the use of electronic media, e.g.
Facebook, Twitter, Instagram, Blogs,
etc. the student shall avoid doing acts
of indecency, through the use of
indecent words, uploading indecent
picture/s , image/s, video/s reflecting
un-Christian behavior of himself or of
any person
36. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Respect
• The essence of respect is to show solemn
regard for the worth of people, including
oneself.
• The ethical duty is to treat everyone with
respect – not to respect everyone in the
sense that we admire them.
37. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
RULE of RESPECT
All individuals are important and the
well-being of each is a moral end in
itself; never treat others as simply the
means for your own gain or
gratification.
38. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Application
“I will treat you like a
gentleman, not because
you are one, but
because I am one”
39. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Diligence
A Thomasian student should have a
natural thirst for knowledge and view
his/her attendance to academic
functions as an opportunity to learn and
improve him/herself
Thus, a student must always be:
Punctual
Present in his/her classes and participate in
school-sanctioned activities
Prepared for his/her lessons, homeworks,
examinations, etc.
40. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Good Grooming
Requires the wearing of the prescribed
uniform which are designed in
accordance with the standard of
modesty commonly upheld in a
Catholic institution
Uniforms must be worn with neatness
and cleanliness
Deviation from the official design of the
uniform is not allowed
41. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
The Engineering/IICS Uniform
For Male Students:
• Plain white polo shirts (barong style) with
charcoal gray piping on the pocket. If
undershirts are worn, they should be plain
white and tucked;
• Black pants. Denim pants, baggy, hiphop, tight-fitting
or other stylish cuts are not allowed.
• Black leather shoes with socks.
42. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
The Engineering Uniform
For Female Students:
• Plain white blouse of linen fabric with sports
collar and embroidered UST ENGG nameplate.
• No deviation from the original design is allowed
– hanging blouses are not allowed;
• Charcoal gray (striaght-cut) pants. Denim
pants, baggy, hiphop, tight-fitting, boot-leg or
other stylish cuts are not allowed.
• Black closed leather shoes with socks.
Sandals, step-ins, slippers, flip-flops are not
allowed
43. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Good Grooming
The validated UST ID card forms part of
the complete uniform of the student. It
must be worn at all times when in the
University premises
Wearing of non-conventional accessories
and sporting non-conventional hair-styles
are not allowed
On occasions where students are allowed
to wear civilian attire, it is expected that
they conform to the standards of propriety
and decency
44. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
45. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Decency and Modesty in Action
Requires all Thomasian students to act at all
times with proper decorum and etiquette and
refrain from engaging in indecent or lewd
conduct contrary to Catholic behavior and
morality, such as:
Inappropriate public display of affection
Preparing, bringing into the campus
obscene, or pornographic letters,
pictures, magazines and the like
Participating in or joining indecent
shows, films, contests and the like
46. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Decency and Modesty in Action
Uttering vulgar or bad words, proclaiming
doctrines contrary to the morals and the
mission of the University
Attempting to convert another person to one’s
faith or religion
Cohabitating without the benefit of marriage,
or engaging in relationships contrary to the
principles adhered to by the University
Any act of prostitution or employment in
immoral establishment
Similar situations deemed contrary to Catholic
morals and sensibilities
47. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Maintenance of Peace and
Order
For the maintenance of peace and order
in the University, Thomasian students
are enjoined to:
Behave well at all times, refrain from
making unnecessary noise and avoid
littering along the corridors especially
when classes are going on
Observe University traffic rules
48. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Maintenance of Peace and Order
Wear the prescribed uniform with the
validated ID card properly displayed at
the upper front side of the uniform
Refrain from using electronic and
communication devices such as
cellphones, PSPs and the like during
class hours, and most especially during
examinations
Submit to RDT requirement, in
compliance with RA 9165
49. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Maintenance of Peace and Order
Also, the University considers certain acts to be
detrimental to peace and order in the
Thomasian community, hence students are
prohibited from:
Bringing/possessing inside campus deadly
weapons
Engaging or getting involved in hazing or
brawls whether inside or outside the campus
Bringing in, possession of, or drinking
alcoholic beverages, as well as possession of,
or taking regulated drugs in the University
premises, or entering the premises under the
influence of the foregoing
50. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Maintenance of Peace and Order
Stealing, vandalizing or destroying the
University property or that of others
Gambling/ bringing in gambling paraphernalia
inside the campus
Threatening or inflicting injuries, physical or
otherwise to another person, whether it be
inside or outside the campus
Organizing or joining assemblies, gatherings
that tend to create unnecessary noise and/ or
disturbance
Creating commotions or serious disturbance
inside the building
51. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Maintenance of Peace and Order
Formation of/or membership in illegal
organizations or those not recognized by the
University
Falsely accusing another student
Malicious destruction of University property
Blackmail or other forms of extortion, including
acts of coercion, such as preventing other
students from attending to their academic-related
functions
Giving or offering anything to induce a person
to do something illegal or wrong
Other offenses analogous to the foregoing
52. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Camaraderie
Formation of organizations that
advocate positive values and self-improvement
Membership in recognized (by OSA)
student organizations
No to fraternities and similar
underground organizations
Exercise of diligence in organizing,
engaging in any group activity
53. Code of Conduct and Discipline
(PPS 1027 UST Student Handbook)
Care of the Environment
No smoking
No littering and improper garbage
disposal
No entry for smoke-belching vehicles
or don’t leave car engine on while
parked inside the campus
No playing of car stereo at high volume
while in the campus
55. PENALTIES
(PPS 1028 UST Student Handbook)
Penalty
A disciplinary measure imposed for
violations of the Code of Conduct
purposedly to:
Inculcate in the students the ideals
of justice and have a healthy
respect for rules of law and
authority
Rectify students’ unacceptable
behavior
56. PENALTIES
(PPS 1028 UST Student Handbook)
Penalty
Help strengthen the
character of students
Protect the good name
and reputation of both
students and of the
university
57. PENALTIES
(PPS 1028 UST Student Handbook)
After the observance of the rules on due
process, and depending upon the gravity
of the offense committed, penalties are
imposed and range from, but not limited
to, any of the following:
Warning
Admonition
Suspension
Probation
Exclusion
Expulsion
58. Other PENALTIES
(PPS 1028 UST Student Handbook)
Depending upon the gravity of the offense,
other penalties may be imposed, alone or
in addition to the foregoing penalties:
Payment of fine/civil liabilities
Revocation of degree
Non-issuance of CGMC
Withholding/non-issuance of diploma
Disqualification from further enrollment
Annotation of the offense in the
transcript of records of the student
60. UST Scholarship Program
(PPS 1026 UST Student Handbook)
1. Santo Tomas de Aquino
for excellent academic performance
2. Santo Domingo de Guzman
for excellence in performing arts and
sports
61. UST Scholarship Program
(PPS 1026 UST Student Handbook)
3. San Martin de Porres
extended to financially challenged but
deserving students
4. San Lorenzo Ruiz Scholarship
for students who are in need of
financial assistance and who are willing
to render working hours to the
University
63. Student Awards
(PPS 1025 UST Student Handbook)
1. Rector’s Award
for consistent academic excellence
2. Pope Leo XIII Award
conferred on a student or group of students
for outstanding involvement in community
development activities
3. Manuel L. Quezon Award
for singular ability to lead and organize
activities of meaningful significance to the
Thomasian community
64. Student Awards
(PPS 1025 UST Student Handbook)
4. Archbishop Miguel de Benavides
for outstanding performance in regional,
national, or international competitions
5. St. Dominic de Guzman Award
given to organizations for activities that are of
significance to the Thomasian community
during each current school year
6. St. Thomas Aquinas Award
conferred only upon students who received
the Rector’s Award and any two other
personal awards, either during the same
school year or within the duration of the
course
65. ACADEMIC HONORS
(PPS 1024 UST Student Handbook)
Honors: GWA
Cum Laude 1.46 – 1.75
Magna Cum Laude 1.21 – 1.45
Suma Cum Laude 1.00 – 1.20
Other Conditions:
- must have a residence of at least six consecutive semesters
immediately preceding date of graduation
- no failing grade in any subject including PE and NSTP
- must have completed in the University at least 76% of the
total no of academic units for graduation
- must have taken not less than 75% of the regular load per
semester of study
- must have never committed major or grave offenses and
infractions of the UST Student Handbook, nor have been
convicted by final judgment of crimes involving moral turpitude
67. UST Facilities and Services
Office for Student Affairs (OSA) for the
following services:
Program for off-classroom activities
Scholarship and financial assistance
program
Program for student discipline
Program for multi-cultural students
National Service Training Program
(NSTP)
Research program
68. UST Facilities and Services
Guidance Counseling Services
Orientation and information-giving
services
Appraisal service
Counseling service
Follow-up service
Placement service
69. UST Facilities and Services
Student Health Services
Consultation and dispensary treatment
for:
Medicine and its allied specialties
• Cardiology
• Dermatology
• Internal Medicine
• Neurology and Psychiatry
Surgery and its allied specialties
General surgery
EENT
Obstetrics and Gynecology
70. UST Facilities and Services
Student Health Services
Consultation and dispensary treatment
for:
Dental Services
• General dental consultation and treatment
• Routine dental examination
• Filling of cavities and dental extraction
Radiology Services
Routine chest and bone x-ray
Laboratory Services
50% discount for routing examination of
urine, stool, blood
71. UST Facilities and Services
Hospitalization Privileges
Php 400 daily rate for room and board
allowance for hospitalized patients
50% discount of doctor’s fee if admitted
under a UST Health Service physician
Admission to the UST Hospital in
emergency cases
Emergency and life-saving treatments
free of charge in case of accidents
occurring within the University
premises and related to their
attendance in school…
72. UST Facilities and Services
Important Note:
To avail of the hospitalization benefits at
the UST Hospital, all patients for
admission must carry with them
admission orders from any UST Health
Service physician!
77. Safety & Survival Tips
Refrain from using your
cellphones when outside the
campus
Refrain from wearing expensive
jewelries and similar accessories
Be prudent in entertaining
strangers
If possible, when outside the
campus go in groups (buddy
system).
78. Safety & Survival Tips
Always keep yourself awake
when on board public utility
vehicles
Refrain from entering dimly
lighted streets, alleys
Always keep yourself properly
informed. Make it a habit of
reading announcements
posted at the lobby classroom
and organization bulletin
boards