Free Essay

Paper Information

In:

Submitted By aldzelbandie
Words 1171
Pages 5
UNIVERSITY OF THE EAST
Recto, Manila

NATIONAL SERVICE TRAINING PROGRAM
NARRATIVE REPORT

BANDOY, Mary Aldzel B. September 19, 2015
Prof. MIRANDA, Perla F. STC 112 – 11M

NARRATION OF NSTP CLASSROOM AND BARANGAY OUTREACH ACTIVITIES
June 13 (NSTP classroom)
The class was held in room EN 500 and was headed by professor Ma’am Perla F. Miranda.
New faces, new friends, new environment. At first, I was hesitant to be in this class because I thought that I won’t feel the belongingness I yearn for in a group. But it turns out that I have enjoyed the company of my professor and some of my block mates. We were instructed to make ourselves known in front of the class and were tasked to memorize at least 20 names of our block mates. It was very exciting for me because I were able to know the names of these people in my class and they were able to know my name. It was a great day because I get to bond with some of them even if it’s just for a little time.
June 20 (NSTP classroom)
NSTP Core Values: Maka-Diyos, Makakalikasan, Makabayan, Makatao. These core values taught in STC 111 were reviewed and role played by us. The class was divided into four groups and each group was assigned to present their understandings on the assigned core value by role playing which was graded by the other group. We were third to present and impart our own ideas in front of the class about makabayan. Somehow the performance was not quite good enough for the other group so we were graded 8/10. Although we were also given the lowest grade, I’m glad that my group was very cooperative in a way that we all enjoyed doing it. Ma’am Miranda then explained, gave examples to each of the core values, and summarized all of the discussion.
Set of officers were also elected this day for formality.
June 27 (NSTP classroom)
Gifted Hands. All we did this day was to watch a film. A must watch and recommended movie for those who haven’t viewed it. And after that we were told to make a reflection/reaction paper to be passed on July 4, then we were dismissed. I was inspired and I couldn’t remove the smile plastered on my face after watching it. It was so spectacular.
July 4 (NSTP classroom)
D.I.N.A. Ma’am have shown us videos about “Project Disaster Information for National Awareness” for the first part of the class. All types of natural disaster and tips before, during, and after a disaster were tackled. Ma’am has ordered us to role play the things that we understand for the second part of the class (after break) about the videos with a maximum of 5-10 minutes. We were grouped again for this and my group was assigned to role play about flood and fire. The performance this time was graded by Ma’am and all of us got a perfect 10 which is better than before. I liked the result of this role playing. I have acquired many things about the tips before, during, and after a natural disaster which I think that I could use in the future.
July 11 (Suspended Class)
July 18 (NSTP classroom)
First Aid Tips. We were told to research beforehand all those instances or condition or situations that our professor gave and their first aid treatment. My group was assigned to role play about the first aid treatment for child birth, cramps, drowning, dysmenorrhea, testicular torsion, and dizziness or fainting. We did explain and shared our knowledge about it well.
July 25 (Barangay Outreach Activities)
Ocular visit. Our first barangay visit was just our class examining the whole school grounds including its garden. Below are some of the pictures taken by my co-member. I noticed that the garden hasn’t been cared of and also their trash hasn’t been carefully thrown into their garbage bin.

August 1 (NSTP classroom)
Documentary Films. We were shown different documentary films from I WiTNESS, a television program. I could say that these films are heart-touching ones. These films also presented some issues of the country like malnutrition. And by that, we were tasked to make a reflection paper to be passed on August 8.
August 8 (Conference Hall) Values Formation. The seminar started at 8:30 in the morning, and ended up at 4 in the afternoon. The seminar talks about and revolve around the word love. The YL MANILA SC were invited to speak in front of us about the things that we should know and we should do and we shouldn’t do. Different topics were covered. One of this is love, sex, virginity, diseases that you may get when you do premarital sex, tips to avoid temptations, and such. To summarize, the statement “True love waits” is the highlight of the talk.
August 15 (Barangay Outreach Activities)
Gardening. Green, green, green all the way. Gardening was assigned to our group. Our group needs to remove all the weeds and grass and some unnecessary things like litters. Because of that I experienced to hold the soil in my own bare hands, cultivate the soil with a shovel, and most of all I have experienced to be under the heat of the sun while gardening. But I admit that it was much more fun doing this with company and friends. This activity would help the school’s garden to look more presentable than last time. The garden was much more beautiful to look at after the gardening activity.
August 22 (CLASS SUSPENDED)
August 29 (NSTP classroom)
Midterm Exam. The day when our knowledge about this subject or the things we learned from this subject was tested. We have answered the essay questions in a yellow piece of paper and the exam only lasted for (estimated) 1 hour. But it took me maybe more than 1 hour. I don’t know if my block mates have taken this exam seriously or not. I wish they did.
September 5 (Barangay Outreach Activities)
Plants in a bottle. This day was the last barangay visit in our designated area. We were given plastic bottles to make it as pots for the plants. Some plastic bottles were already been made and some are not. I think three section helped to attain one goal. It is to finish the work and finish the things that was started. Planting these plants in the pot surely mean something. I think they benefitted from our barangay outreach activities and visits because the work that should only be done by the school lessened because we have helped them in a way where they’ll only have little concern about their environment.
September 12 (NSTP classroom)
Recalling of activities. The class was instructed to make a draft for the narrative report that would be pass on Sept. 19.Ma’am explained to us the schedule of the remaining activities these next Saturdays. And that was all this Saturday is about.

Similar Documents

Free Essay

Computer Information Paper

...Computer Information Paper Computer information can be input in several different manners. Data may be input through a keyboard which is a device that allows the user to type the information directly into the computer. The keyboard is the most common and most utilized input device. An example of when the keyboard would be the best input device is printed questionnaires. Answering a questionnaire or conducting a telephone survey could be accomplished quickly and easily by simply typing the necessary information into the computer. Bank Checks are best entered by utilizing scanning technology similar to barcode scanners which are used on retail tags. A scanner reads the bar code and enters the information which the bar code represents. This method eliminates human error and insures the information is entered correctly. If it is necessary to input a long document, an optical scanner is the best choice. The optical scanner scans the entire document, page by page, and sends the document to a file folder for storage on a computer or storage device or to a printer if a printed copy is necessary. This method is fast so it only takes a few seconds to scan a long document into a computer file. Convenience and ease of use is important in for output devices. Hand held computers output information through visual output to video monitor or screen. Photographs are best input utilizing files such as JPEG and a scanner. Resumes and memorandums may best be output to a printer of email...

Words: 320 - Pages: 2

Premium Essay

Information Use Paper

...University of Phoenix INFORMATION USE PAPER IT/205 Ivy Chiangwa Matthew Juliana April 24, 2015 This paper will discuss various aspects related to how information is used and how it flows in an organization. I will try to gain further insight by identifying the information flow in my current place of employment. Other than discussing the use of information, this paper will also discuss the various challenges in controlling the information flow and how can organization keep it safe from unauthorized use. Information flow and use in an organization It is important to first discuss information before describing its uses and how it flows. Information refers to data that has been organized in a way to give meaning and value to the recipient (Rainer & Cegielski, 2011). In an organization, the information can refer to various events, activities in a workplace or various transactions that are recorded and organized to convey a meaning. Information can also be contained in facts, ideas, imagination, opinions which can be present in various media such as print, audio and video (Olowu, 2004). Data is gathered using information systems which further process this data to convert it into useful information. Information is a necessity in every part of the organization such as finance, human resource, management, sales etc. Without information, the organization would collapse since information is the life blood of modern organizations (Opara, 2003). Usually information flows in two ways...

Words: 878 - Pages: 4

Free Essay

Information Use Paper

...Information Use Paper Anthony Michelli IT/205 May 12, 2014 Michael Peterson Information Use Paper Information runs in a circular pattern. Much like how water cycles through a water plant, into a plumbing system, which can then go into different buildings and those buildings pass the water down back into the plumbing system. Organizations use information in a similar fashion where a customer will give information of a purchase, that purchase information is then stored into a database. From the database, the credit card information or other needed information when regarding purchases goes to the appropriate destinations such as banks, warehouses, distribution centers, etc. From those destinations, the information is passed back into a database. These patterns are referred to as information flows. The information flows allow an organization to carry out their services or distribute products. The more effective an information flow, the more effective an organization operates, flourishes, and expands and a business or non profit organization. Due to what information can do for an organization, information is kept closely guarded and is treated as a valuable piece of any organization and is considered a material resource. The information flow patterns are heavily secured as one organization would not want their information, nor their consumer’s sensitive information, to be compromised by an outside entity. Information, when treated as a material resource, helps managers...

Words: 708 - Pages: 3

Free Essay

Information Systems Paper

...Information Systems Gerardo Montano CIS 205 10-11-10 Steven Rubin Information Systems Information systems support the business processes in an organization in many ways. First of all, business today need to have information systems to survive in today’s Internet worked global environment. It has become a major fundamental area of business administration. These systems are useful for managers, business professionals, and all other specialized personnel. By saving time, money, and manpower, information systems handle a big task and are a perfect solution for any business. Whether it is a small business or a big enterprise, this will greatly improve any company. An information system uses the resources of people, hardware, software, data, and networks to perform several tasks. The responsibilities for the information systems are to perform input, to process, execute output, serve as storage, and control activities in the structure. Also, there are information systems’ resources and products, including instructions for people, programs, and procedures. They can create several forms of information with using these tools, such as paper reports, visual displays, multimedia documents, electronic messages, audio responses, and graphic images. The business development at a local corporation, named GPSIT, goes through several procedures before being completely processed. Information systems take a major part of this practice by sending out e-mails to hot...

Words: 764 - Pages: 4

Premium Essay

Information Use Paper

...Information Use Paper Tyler Claire CIS/319 University of Phoenix Facilitator John Ziah October 19, 2012 Information Use Paper The executive summary has critical information Technology. The bullets the author will discuss are as followed. Identifying and describing ways information technology is used in organization today and techniques on organization flow. The organization the author chose is BILO supermarket. The author will describe the software’s organization uses to be safe. Information technology has become a vital and integral part of organization today. Multinational Corporation maintains mainstream mainframe systems to small businesses that hold single computer in role play ("Information Technology & Its Role of Modern Organization", 2012).  Information system managements empower organization to perpetually store and receive data. The system is use to for storing product and customer information for businesses. System varies by the size of the organization. These systems make life easier, organization moves at a faster pace, and makes business are more structured. Types of systems are customer information system, product information system, and employee information system. Customer information system is imperative to organization keeping track of customer is vital to organization success. Company stores customer information for marketing purposes email addresses, mailing addresses, and phone...

Words: 812 - Pages: 4

Free Essay

Assignment Information Use Paper

...How information is used and how it flows in an organization is as follows: Information in an organization is used for a myriad of different processes throughout an organization. Information flow through an organization is a duplicate image of an organizations activities. Making a model of an organizations activities goes a long way in helping to build an effective strategy for competing in today’s business world. The three things that are generally looked at in the process of information flow is cost, time, and the information path. A break down of these three components is as follows: Cost will show how much the present implemented information processes cost. Time would show us the current speed of information being transferred to the user of said information. IE: how much time it would take for management to receive the right information from say a warehouse, etc. The third component is the path. The path gives information about the size of information flow net elements that information goes through to make it to the information user. These three components are closely relative to each other and therefore make any analysis difficult. Essentially, information runs in a circular pattern. It is very similar to how water flows down a drain in a circular pattern. Once the water is in the drainage line, it goes through a series of pipes, of different sizes and direction. Organizations utilize information in a very...

Words: 709 - Pages: 3

Premium Essay

Application and Information Paper

...InFoRmAtIoN aNd SoFtWaRe aPpLiCaTiOnS Danielle Lange BIS/219 Ross Sines 07/11/2011 Today there are many software applications and information systems that are available to the organizational departments within a company. This paper will give an overview of what software applications and information systems for the accounting, human resources, and marketing departments. It will describe their use and how they relate to the departments mentioned. Software and applications are developed and specialized for each department to help the organization as much as possible. Accounting department has to have an information system that measures, processes, and communicates financial information. They need this so they can keep track of the money the organization makes, spends, and has in the bank. In the human resources department their primary job is to recruit, train, and retain the employees of the organization. Then the marketing department’s job is to research the competitors, research the products, promotion, pricing, and selling of the product. All the departments in an organization play important roles that keep the organization running efficient. The software for the accounting department has functions that manage accounts receivable and payable, ledger, inventory, billing, purchasing, and sales. The software called Intuit Quickbooks, which helping the accounting department do the things they need to do. Human resources have software that keeps track of hours...

Words: 322 - Pages: 2

Premium Essay

Information Systems Paper

...“Information Systems Proposal” July 9, 2012 Axia University BIS 220 – “Introduction to Computer Applications and Systems” Alicia Snedeker A&R Records Inc. Table of Contents 1. Introduction 2. Table 3. Benefits of Information Systems 4. Drawbacks of Information Systems 5. Conclusion Operating a business is hard and what makes it harder is not being familiar with the information systems being used. A business owner should have the understanding of which information systems work best for the business. I am writing this proposal to better inform you of how the knowledge of these information systems most benefits A&R Records Inc. Times have changed and we need to meet the times head on and maximize our value. The systems I am proposing we use are Transaction processing system, Functional Area IS, Management Information Systems, E-commerce systems, Office Automation Systems and Expert Systems. Different types of Information Systems | Benefits | Drawbacks | Transaction Processing Systems | Will allow us to ring up customers through check, credit, debit or even cash in an automated fashion. | If the system goes down it takes us longer to ring up the customers and only cash will have to be the choice of payment. | Functional Area Information System | Will allow us to make sure employees clock in to make sure payroll is being tracked. | System Crashing would not allow our employees to clock in and ensure the right amount of hours is...

Words: 1259 - Pages: 6

Premium Essay

Information Systems Paper

...Martin E-Mail: Kirndeep.sangha@gmail.com | | Table of Contents There are many Information Systems that could be beneficial to our company but I have narrowed the list to the 5 most valuable to use. They are listed below in the order that they will be discussed from most advantageous to least. * Office Automation System- This system would help us because it supports the clerical staff, lower and middle managers, and knowledege workers. Our employees would develop word processing and desktop publishing software which could help us from scheduling customers to checking our email. * Transaction Processing System- The TPS is very helpful in that it would allow us to monitor, collect, store, and process data from our basic business transactions. * Management Information System- This would help us produce reports that are summarized from transaction data from the sales we record to customers. * Supply Chain Management System- This system will help us record how the flow of our materials are transported from suppliers to factories to the customer. * Funtional Area IS- This supports the activities within a specific functional area and could be used as setting up a process for payroll. Information System | Cons | Office Automation System | Does not support Executives | Transaction Processing System | Mostly done online now, need computer knowledge necessary | Management Information System | Can be expensive to install and requires maintenance | Supply Chain Management...

Words: 255 - Pages: 2

Premium Essay

Southwest General Hospital Information System Paper

...The purpose of this paper is to discuss the process used by a local health care facility, Southwest General Hospital, to acquire a new information system. System acquisition is the process that occurs from the time the decision is made to select a new system (or replace an existing system) until the time a contract has been negotiated and signed (Wagner, Glass, & Lee, 2013). Implementing and acquiring an information systems in a health care organization is a complicated investment. This entire process plays a vital role to the success of the organization, therefore careful planning and monitoring of all stages is needed to accomplish the anticipated goals. In order to continue promoting optimal patient care and safety, Southwest General Hospital embarked on an innovative technological journey over five years ago. Debbie Mora, Director of Information Systems states, “The Electronic Medical...

Words: 638 - Pages: 3

Premium Essay

Information Technology White Paper

...Tan Pham CSIA 303 Information Security White Paper Professor Gupta Information Security White Paper The internet and its technology have brought many advantages and disadvantages for information system of businesses, whether public or private. There is no denying that the business world will move further and further into the cyber world, where information are available just by a click of a finger. No matter how large of a scale a business is, private restaurant or large Banking Corporation, the truth is every single one of these business is at risk. Risk of losing trade secret and risk of losing employee’s confidential data are some of a few risks that a business must address. These risks originally come from sources calls vulnerabilities and threats. Vulnerabilities in plain definition are weaknesses of an information system. These weaknesses later can be translated and exploited by attackers, insider or outsider. These attackers are generally can be seen as threats. Businesses must find solutions to mitigate these threats by eliminating vulnerabilities of their system in order to reduce risk of their information and information system. Information security addresses the three following components: confidentiality, integrity and availability, which are the main goal for business toward protecting their information and information system. Confidentiality is basically to ensure no confidential data...

Words: 1157 - Pages: 5

Premium Essay

It 205 Information Use Paper

...Assignment: Information Use Paper Student: Josey Wayne Hudson Class: IT/205 Professor: Li Lo The way the system is installed where I work is Internet is set with a LAN to WAN. I have a space where I utilize email trade, server controls enact registry. Now with the LAN server with a activate directory set permission control for user and the system administrator is responsible for the performance and operation. Are Administrator sign me to a computer this is one form of security here. Another way to prevent people from coming to the server or network, For example if we have important information it will go through a router then you will have a firewall this will prevent people from interring are network. Also every employee in the company as a CAT card, A CAT card as a pin number associate with every employee. This pin number allow you access the computer and also getting in the building but the mean point with the CAT card allow you to access computer and emails. By this will let the company know whom using the computer and access the web and emails. It prevents dishonesty with the company. Now getting that out the way I will explain what I do for work. I work for the government in IT, as a Part Timer. Every morning getting in my building I use My CAT card to enter the building, then I start my day. My occupation is information system, I will begin off with information system, and my obligations are figure out what the association needs in a system and PC framework before...

Words: 647 - Pages: 3

Premium Essay

Information Security White Paper

...Information Security White Paper UMUC In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical and information technology assets, and to ensure that all information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as: Threats |Confidentiality |Integrity |Availability | |Denial of Service Attack |Low |Medium |High | |Power Supply Failure |Low |Low |High | |Malicious Code Infection |High |High |High | |Theft and Fraud |High |Medium |High | |Website Intrusion |High |High |High | |Unauthorized...

Words: 697 - Pages: 3

Premium Essay

Information Intelligence Act Paper

...Federal Information Security Management Act, 2002 (FISMA) and Electronic Communications Privacy Act, 1986 (ECPA) had advances in information technology that resulted in new ethical issues necessitating the creation of the acts. FISMA was created to protect government information, and assets against natural or man-made threats, while the EPCA was created to revise federal wiretapping and electronic eavesdropping. FISMA is responsible for making sure different agencies are working to ensure the security of data in the federal government. The jobs of these agencies varies from keeping risk at or below specified acceptable levels in a low costing timely manner, and they must also review their information technology security programs yearly. These programs must include provisions for identification and resolution of current IT security weaknesses and risks, as well as protection against future vulnerabilities and threats (gtsi.com). In previous years the federal government received poor marks, and poor cyber security grades that were publicized, there is still improvements in security of information systems. EPCA is composed of three other acts, known as the Wiretap Act, the Stored Communications Act, and the Pen-Register Act. Together these acts contain protections that are useful and important. The Wiretap act deals with the stopping of communication before it goes too far, while the Stored Communication act deals with stored communications not being used, and finally...

Words: 407 - Pages: 2

Premium Essay

Internet and Information Paper

...Internet and Information Paper Melinda Whitfield HUM/176 07/04/2014 Janet Swiggart University of Phoenix Hello friend I am writing this letter to you to explain the ease of finding information on the Internet. I will also identify ways you can check the reliability of the information found. Not leaving out the part, you asked about the term digital divide. This letter will end with me telling you ways to bridge the digital divide gap and I hope you will have everything you need to know on Internet and Information. According to (computer hope.com), “Most information is found on the Internet by utilizing search engines. A search engine is a web service that uses web robots to query millions of pages on the Internet and creates an index of those web pages. Internet users can then use these services to find information on the Internet”. (www. Computer Hope.com) As researched by (Robert Harris) “Information is everywhere on the Internet existing in large quantities and continuously being created and revised. This information exists in a large variety of kinds (facts, opinions, stories, interpretations, and statistics) and is created for many purposes (to inform, to persuade, to sell, to present a viewpoint, and to create or change an attitude or belief). For each of these various kinds and purposes, information exists on many levels of quality and reliability. It ranges from very good to very bad and includes every shade in...

Words: 773 - Pages: 4