Modern Communication Technology: An Escape from reality and a tool for higher level of Mendaciousness











Introduction:

One of the most unsolved problem in the modern technology era is not the technology itself.
We, the user, the abuser is the problem.
The disadvantages of technology leads us to become deceitful.
The technology controls us instead of us controlling the technology.
Modern communication technology these days such as TV, mobile phones and computer are somehow people called as an escape from reality.
In this generation, millennial or teenagers uses the communication technology as a mechanism in order for them to abscond the reality which they can turn their living in no stress, happy and lively kind of dwelling.


Why do people lie? The reasons are as varied as human life itself.
Deception has been used in various contexts throughout human history (such as in World War II and the
Trojan War) to enhance attackers' tactics. Social media provide new environments and technologies for
potential deceivers. There are many examples of people being deceived through social media, with some
suffering devastating consequences to their personal lives.
The danger, says one sociologist, is that we start losing touch with the people in our lives - even if it's just
the cashier - because we won't get off the phone or take off headphones to exchange pleasantries.
Studies show that these mini-conversations - with the same woman at the coffee shop each morning or the
regular banter with the guy who owns the gas station - are important to our psychological well-being.
Since lies are useful for accomplishing goals in the world, why not simply lie all the time? A whole host of
factors constrain the use of deception. Some of these constraints are external, such as the social stigma
associated with being caught lying. Because humans are social animals, it is important to have the trust of
other humans but the idea of a life lived online, or outside of regular society is largely seen as dangerous and
unhealthy.

FACTORS AFFECTING MODERN
COMMUNICATION TECHNOLOGY USERS

Hacking
Phishing
Identity Theft
Plagiarism

Hacking
Generally refers to unauthorized intrusion into a computer or network.
The person engaged in hacking activities is known as a hacker.
This hacker may alter system or security features to accomplish a goal that differs from the original purpose of the system.

But currently, hacking has a more negative implication and so is the term hacker. Hacking which is done on request and involves a contract of terms and conditions allows authorized access to the target and hence referred to as ethical hacking.
Computer and network security come under the foray when the information about possible attacks is tried to be evaluated to determine the weaknesses and loopholes in the system. Poor web-configurations, old or loosely bind software, inactive or disabled security controls and weak or low-strength passwords are some examples of areas that make computer networks and systems vulnerable to attacks. Ethical hacking involves identification of all or any such possible areas based on the suggested terms in the contract and the level of access given.


8 ways to Prevent Hacking

  1. 1
    Create complex passwords. Your passwords to access your accounts on apps or websites should consist of a combination of numbers, upper- and lower-case letters, and special characters that is difficult to guess.
    • Don't use the same password for more than one website or account. This limits the damage to you if a hacker happens to crack one of your passwords.
  2. 2
    Use a password manager. Password managers store and auto-fill your credentials for different sites, allowing you to create a complex and unique password for each site without having to worry about entering the password itself more than once. While you should absolutely keep track of your passwords on your own as well, a password manager will help make your device much more secure.
    • Highly praised third-party password managers include "Dashlane 4", "LastPass 4.0 Premium", "Sticky Password Premium", and "LogMeOnce Ultimate".
    • Most browsers have a built-in password manager that stores and encrypts your passwords.
  3. 3
    Don't give out your password. This is an obvious piece of advice, but one that bears revisiting: with the exception of some school services, you shouldn't ever have to provide a site administrator with your password for them to access your account.
    • This logic applies to IT workers and Microsoft or Apple representatives.
    • Similarly, don't tell people your phone or tablet's PIN or passcode combination. Even your friends might accidentally tell someone your passcode.
    • If you do have to give someone your password for some reason, change it as soon as they are done with whatever they needed to do on your account.
  4. 4
    Change your passwords often. In addition to keeping your password a secret, you should change the passwords on your various accounts and devices at least once every six months.
    • Be sure not to use the same password twice (e.g., your Facebook password should be different than your bank password, etc.).
    • When you do change your password, you should change it substantially. Don't simply replace one letter with a number.
  5. 5
    Use two-factor authentication. Two-factor identification requires you to enter a code sent to you in a text message or another service to access your account after you enter your user name and password. This makes it more difficult for a hacker to access your information, even if they are able to crack your password.
    • Most major websites, including popular social media networks, have some form of two-factor authentication available. Check your account settings to learn how to enable this feature.
    • You can set up two-step verification for your Google account.
    • Popular app alternatives to receiving a text message include Google Authenticator and Microsoft Authenticator.
  6. 6
    Read privacy polices carefully. Any company that has information from you must have a privacy policy that details how they use that information and the extent to which they share it with others.
    • Most people simply click through the privacy policy without reading it. Although the reading can be cumbersome, it's worth at least skimming it so you know how your data is being used.
    • If you see something in the privacy policy that you disagree with, or that makes you uncomfortable, you may want to reconsider sharing information with that company.
  7. 7
    Log out of accounts when you're done with them. Simply closing the browser window isn't always enough, so make sure you click (or tap) on your account name and select Log Out (or Sign Out in some cases) to manually sign out of your account and remove your login credentials from the site.
  8. 8
    Make sure you're on an official website when entering passwords. Phishing scams – instances in which a malicious page pretends to be a login page for a social media or bank account – are one of the easiest ways for you to get hacked. One way to spot phishing scams is to look at the site's URL: if it closely resembles (but doesn't exactly match) a reputable site's URL (e.g., "Facebook" instead of "Facebook"), it's a fake site. [4]
    • For example, enter your Twitter login information on Twitter's official page only. Avoid doing so on a page that asks for the login information in order to share an article or something similar.
    • An exception to this rule is when a university uses an existing service (e.g., Gmail) through their home page.
Phishing
Pronounced like fishing.
Is a term used to describe a malicious individual or group of individuals who scam users.

They do so by sending e-mails or creating web pages that are designed to collect an individual’s online bank, credit card, or other login information.



       The act of tricking individuals into divulging their sensitive information and using it for malicious purposes is not new. Social engineering attacks have occurred on the internet throughout its existence. Before widespread use of the internet, criminals used the telephone to pose as a trusted agent to acquire information. The term "phishing" has origins in the mid-1990s, when it was used to describe the acquisition of internet service provider (ISP) account information. However, today the term has evolved to encompass a variety of attacks that target personal information. 
       The word "phishing" originally came from the analogy of early Internet criminals using email lures to "fish" for passwords and financial data from a large sea of unsuspecting Internet users. The use of the "ph" in this terminology has been forgotten about over time. It was most likely linked to hacker naming conventions such as "Phreaks".

10 ways to Prevent Phishing
       1. Keep Informed About Phishing Techniques – New phishing scams are being developed all the time. Without staying on top of these new phishing techniques, you could inadvertently fall prey to one. Keep your eyes peeled for news about new phishing scams. By finding out about them as early as possible, you will be at much lower risk of getting snared by one. For IT administrators, ongoing security awareness training and simulated phishing for all users is highly recommended in keeping security top of mind throughout the organization. 

2. Think Before You Click! – It’s fine to click on links when you’re on trusted sites. Clicking on links that appear in random emails and instant messages, however, isn’t such a smart move. Hover over links that you are unsure of before clicking on them. Do they lead where they are supposed to lead? A phishing email may claim to be from a legitimate company and when you click the link to the website, it may look exactly like the real website. The email may ask you to fill in the information but the email may not contain your name. Most phishing emails will start with “Dear Customer” so you should be alert when you come across these emails. When in doubt, go directly to the source rather than clicking a potentially dangerous link. 

3. Install an Anti-Phishing Toolbar – Most popular Internet browsers can be customized with anti-phishing toolbars. Such toolbars run quick checks on the sites that you are visiting and compare them to lists of known phishing sites. If you stumble upon a malicious site, the toolbar will alert you about it. This is just one more layer of protection against phishing scams, and it is completely free. 

4. Verify a Site’s Security – It’s natural to be a little wary about supplying sensitive financial information online. As long as you are on a secure website, however, you shouldn’t run into any trouble. Before submitting any information, make sure the site’s URL begins with “https” and there should be a closed lock icon near the address bar. Check for the site’s security certificate as well. If you get a message stating a certain website may contain malicious files, do not open the website. Never download files from suspicious emails or websites. Even search engines may show certain links which may lead users to a phishing webpage which offers low cost products. If the user makes purchases at such a website, the credit card details will be accessed by cybercriminals. 
      5. Check Your Online Accounts Regularly – If you don’t visit an online account for a while, someone could be having a field day with it. Even if you don’t technically need to, check in with each of your online accounts on a regular basis. Get into the habit of changing your passwords regularly too. To prevent bank phishing and credit card phishing scams, you should personally check your statements regularly. Get monthly statements for your financial accounts and check each and every entry carefully to ensure no fraudulent transactions have been made without your knowledge. 

6. Keep Your Browser Up to Date – Security patches are released for popular browsers all the time. They are released in response to the security loopholes that phishers and other hackers inevitably discover and exploit. If you typically ignore messages about updating your browsers, stop. The minute an update is available, download and install it. 

7. Use Firewalls – High-quality firewalls act as buffers between you, your computer and outside intruders. You should use two different kinds: a desktop firewall and a network firewall. The first option is a type of software, and the second option is a type of hardware. When used together, they drastically reduce the odds of hackers and phishers infiltrating your computer or your network. 

8. Be Wary of Pop-Ups – Pop-up windows often masquerade as legitimate components of a website. All too often, though, they are phishing attempts. Many popular browsers allow you to block pop-ups; you can allow them on a case-by-case basis. If one manages to slip through the cracks, don’t click on the “cancel” button; such buttons often lead to phishing sites. Instead, click the small “x” in the upper corner of the window. 

9. Never Give Out Personal Information – As a general rule, you should never share personal or financially sensitive information over the Internet. This rule spans all the way back to the days of America Online, when users had to be warned constantly due to the success of early phishing scams. When in doubt, go visit the main website of the company in question, get their number and give them a call. Most of the phishing emails will direct you to pages where entries for financial or personal information are required. An Internet user should never make confidential entries through the links provided in the emails. Never send an email with sensitive information to anyone. Make it a habit to check the address of the website. A secure website always starts with “https”. 

10. Use Antivirus Software – There are plenty of reasons to use antivirus software. Special signatures that are included with antivirus software guard against known technology workarounds and loopholes. Just be sure to keep your software up to date. New definitions are added all the time because new scams are also being dreamed up all the time. Anti-spyware and firewall settings should be used to prevent phishing attacks and users should update the programs regularly. 
Identity theft
Is the deliberate use of someone else’s identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person’s name;

And perhaps to the other person’s disadvantage or loss.




       Cyber-crime is any illegal activity committed on the internet that uses a computer as its primary means of theft. Through identity theft, a predator without someone's knowledge acquires a piece of their personal information such as their social security number, or even their bank account data and uses it to commit fraud. It is often difficult to catch cyber criminals because the internet makes it easier for people to do things anonymously and from any location on the globe. Predators use methods such as spam advertisements and even phony programs that have viruses. Many computers used in cyber attacks have actually been hacked and are being controlled by someone far away.

8 ways to avoid Identity Theft
1) Check your URL security

If you are making online transactions – whether bank transfers or shopping online, ensure the URL starts with https://. The ‘s’ stands for secure, so if you are about to enter bank account or credit card details, make sure it’s ‘s’ for secure.
2) Go through your bank statements

You don’t have to cross check all receipts with your payment history, but it pays to keep an eye on your transactions and check your bank statement every couple of days. Get in touch with your bank immediately if you spot any unfamiliar transactions.  Also keep an eye on your credit rating as you would your bank statements.  If somebody is going around pretending to be you, running up services and not paying this will appear on your credit rating.   
3) Keep your personal information to a bare minimum on social media

Personal information such as phone numbers, addresses, birthdates, your children’s age or even the school they attend, can be used by hackers to assemble more information about you.  The more information you put on social media, the more information hackers can gather and use against you.
4) Check your social media security settings

When it comes to social media – we recommend you change your settings to private or ‘friends only’. This ensures anything you post, is only seen by a pre-approved audience i.e your trusted friends and family.
5) Use multiple passwords

It’s tempting to use one password for all your accounts, after all it’s easier to remember one password opposed to one for each online account you have. However, if this one password is cracked, hackers can gain access to all your private data at once. You can check the strength of your passwords here.
6) Report and delete all spam

Phishing emails are becoming more and more sophisticated, personalising their emails by using information you have publicly posted online against you. Never respond to any emails that ask you for account information, passwords or to make a money transaction. A bank will never ask you for this information via online, if in doubt, contact your bank. Always ‘report spam’ so the sender is blocked from sending further emails. Delete the email after reporting and clear out your trash folder to remove all traces from your email account.
7) Don’t save your credit card information online

It might be tempting to save your credit card or bank account details on an ecommerce site that you frequent often to save time entering them each site you shop. However, storing this information can make you financially vulnerable if someone hacks into your account.
8) Put passwords on all your devices

If all your devices are password protected and automatically lock after a specified amount of time, you can rest easy when you leave your work computer for lunch break or accidently leave your phone at the café.

Plagiarism
To steal and pass off (the ideas or words of another) as one’s own use (another production) without crediting the source to commit literary theft to present as new and original an idea or product derived from an existing source.

Plagiarism is an act of fraud. It involves both stealing someone else’s work and lying about it afterward.






Plagiarism is presenting someone else’s work or ideas as your own,with
or without their consent, by incorporating it into your work without full acknowledgement. All published and unpublished material, whether in manuscript, printed or electronic form, is covered under this definition. Plagiarism may be intentional or reckless, or unintentional. 

  1. 6 ways to avoid Plagiarism
1.   Paraphrase - So you have found information that is perfect for your research paper. Read it and put it into your own words. Make sure that you do not copy verbatim more than two words in a row from the text you have found. If you do use more than two words together, you will have to use quotation marks. We will get into quoting properly soon.
2. Cite - Citing is one of the effective ways to avoid plagiarism. Follow the document formatting guidelines (i.e. APA, MLA, Chicago, etc.) used by your educational institution or the institution that issued the research request. This usually entails the addition of the author(s) and the date of the publication or similar information. Citing is really that simple. Not citing properly can constitute plagiarism.

 3. Quoting - When quoting a source, use the quote exactly the way it appears. No one wants to be misquoted. Most institutions of higher learning frown on “block quotes” or quotes of 40 words or more. A scholar should be able to effectively paraphrase most material. This process takes time, but the effort pays off! Quoting must be done correctly to avoid plagiarism allegations.
   4. Citing Quotes - Citing a quote can be different than citing paraphrased material. This practice usually involves the addition of a page number, or a paragraph number in the case of web content.
   5. Citing Your Own Material - If some of the material you are using for your research paper was used by you in your current class, a previous one, or anywhere else you must cite yourself. Treat the text the same as you would if someone else wrote it. It may sound odd, but using material you have used before is called self-plagiarism, and it is not acceptable.

   6. Referencing - One of the most important ways to avoid plagiarism is including a reference page or page of works cited at the end of your research paper. Again, this page must meet the document formatting guidelines used by your educational institution. This information is very specific and includes the author(s), date of publication, title, and source. Follow the directions for this page carefully. You will want to get the references right.

  • Deception is one of the most significant and pervasive social phenomena of our age. At the same time, technologies have pervaded almost all aspects of human communication. The intersection between deception and information technology gives rise to questions about deception in the digital age. How does communication technology change the way we deceive others? Why and how do people lie in online dating? Can people detect if they are being lied to in an email? Can computer programs identify word patterns that reveal whether someone is lying or not?

Deception picks up where most security technologies leave off, adding a complementary layer of protection that enables you to go on the offensive and lure attackers out of hiding

Deception can be more art than science - it’s a game of evasion and counter-evasion. The key is to ensure the bait blend into your environment, so attackers will interact with them and reveal themselves.


Comments

  1. (student no. 7) the title was too subtle as well as the article itself. And the whole content was too long.

    ReplyDelete
    Replies
    1. the whole content was meant to be long to explain everything we needed to explain, and about the title, it was explained from the introduction why modern communication is being used to escape from reality. If you wish I'll send you some examples.

      Delete
    2. This comment has been removed by the author.

      Delete
    3. Nah. I won't wish for more examples. Because as you said, you meant this article long to explain everything so why do I need for more examples, right? Or maybe your end statement is a proof that your article was long but not informative. And also, I suggest that if you will make another article, it should be brief but possess comprehensive ideas. Try to summarize and squeeze it into a concise but meaningful article. Because not all the readers are not incapable of finishing on what they started.

      Delete
    4. How did you say that our article was not informative? What are your basis for an informative article? You might help us by suggesting :) But as you request we'll make the article shorter and directed to the point maybe you just don't like reading too long or perhaps you did not even read the article from the beginning to the end. But you know, we can always adjust for our readers thankyou for your concern! 🙂

      Delete
    5. (Student #12) It's not that we don't want to read such long articles. It's just that if you are going to write an article, think of your readers right away if they will like and enjoy your article.

      Delete
    6. Do you understand what you are saying? Do you mean that readers are lazy readers? How did they become readers if they would not want to read long articles? And why should be the problem is the article being too long? Rizal (our national hero) used to composed his literary pieces and i'll tell you they were all loooooooong ones. So I suggest if you are lazy to read our article then goosh goosh! Babye! Don't even comment something like you did understand the article.

      Delete
  2. (student no. 4) I'd also like to add that some parts are redundant and I do not think WikiAnswers or any Wiki sites are reliable.

    Another thing is you give tips about securing privacy by changing passwords or using different passwords for different accounts, isn't changing your passwords often too hectic and confusing? what if the user is, say, an old lady or someone who has trouble remembering things? yes, they can type down their passwords but isn't that just going against the purpose of changing the passwords.

    ReplyDelete
    Replies
    1. Sorry if we put some wikianswers articles from there we just thought it would explain some things more directly and practically. But we'll make sure we'll replace those words the most reliable statements only for you :) those tips that were given were only help tips for you to have a good privacy setting but the real deal is still up to you on how you will make sure that your account is safe from the invaders. Changing password may help you secure your account from the hackers but that doesn't mean that they will stop trying to hack your acct so I suggest you try other tips that were given from the article above. Thankyou!

      Delete
    2. Please take note that wikipedia is not realible source of information because it can be edited by the public. Even us students, are not allowed to use wikipedia as long as possible. Also, there are more sources, credible sources rather than wikipedia. Try to research.

      Delete
    3. We already know that. As what we said we used some wikianswers articles to explain it more practically especially for students like us. We know what is the difference between reliable and unreliable statements, so yah we'll replace those as promised. Thankyou for your concern!

      Delete
  3. D lang naman changing of password ang tips dba kaya nga may mga example at 8 tips na binigay para dun sa sinasabi mo matanda at Hindi mag create ng confuse dun sa may are ng account wag mag stick sa isang tips kung ikaw yung matanda at may nakita kang mga tips alam mo na sa sarili mo na d mo kaya yung iba ibang passwords dba pwede mo naman I try yung iba pang tips Gaya nung pag ka gamit mo sa account mo log out your account
    D ako ipinanganak kahapon alam ko nang dko kaya yung ganung tips bakit ko pa Gagawin dba

    ReplyDelete
    Replies
    1. You suggest of logging out every time after using an account. if it was computer shops or in pop up shops, yes that can be used. but if you will be doing that in your own personal computer, do you actually think general people will do that? I myself admit that I never log out my accounts in my personal devices, so does the majority of people. It's still a tedious chore

      Also if it is the protection of your account and one's self, why not just use incognito? incognito tabs are now provided in almost all servers like google chrome and safari. Incognito doesn't leave any log in history or any history at all that is opened in that tab. Incognito will not save your passwords or any of your information. Won't that make it easier to avoid all of those that are stated above?

      Delete
  4. That content mahaba man siguradong makakatulong sau d yan naka lagay dyan para lang sawala those informations helps people

    ReplyDelete
    Replies
    1. Next time in making an article, try to consider the partial reader.

      Delete
    2. The title of your article was too long same goes with the content, thats why I got bored and stop reading it. Maybe if other people will read it, they will do the same as what I did.
      - Student #6

      Delete
  5. This comment has been removed by the author.

    ReplyDelete
  6. I just wanted to know what is your main point to discuss this article? Anyway, the article must be catch some attention if the content are not to long and boring to read this... Also too much information you get some of them are copy and paste only. I'm sorry just being honest here.

    ReplyDelete
    Replies
    1. Hi! The main topic was already discussed at the article itself I don't know how you did not understand the main point :) and about the article being too long and boring to read? I suggest you then do not read it because articles are made to be long if you don't mind, we gave priority not only to our main topic but more of also to the sub topics that's why the article was made that long. If you have read the part where the factors of deceiving people like hacking, phishig and so on, we discussed all that one by one and also gave you some tips that's why it was long. I don't really understand why you have problem about our article being too long. You complain so much the question is have you really read the article and understand the message of it? If not then please take time to read and understand it. Thank you!!! Opsss if you still have problem about the source, we're currently working on it. 😉

      Delete
    2. How can you say that articles were made to be long? As far as I know, article is a short piece of writing typically expressing a point of view. And about reading the content, yes, I've read it though it takes a lot of time for me to finish the whole article. Also, I wanna ask from one of your subtopics—the identity theft, you mentioned in your introduction that we live in a modern generation. And these days, majority of teenagers are using the social media as their platform for expressing their feelings, emotions, experiences and etc. And I know that you often see your social media friends posting their self details and information because they seem treat the social media as their diary. So I think you not totally pointed out the ways of avoiding identity theft. Because you're tips are too common.

      Delete
    3. Really? Is that all your problem? That you are too lazy to read our article? Well this article is not for lazy readers, this is for those who wants to learn and who wants to be informed. I don't care if you think our article was too long, as long as I know we gave it all nothing really ever matters.

      Delete
  7. The information must be have credits or source where they come from? This article can be Label not originality of in your own words and thoughts

    ReplyDelete
    Replies
    1. Hi!! Thank you for your comment. Regarding the source and references we are curreuntly working on that and everything in the article did not came from the internet. We also made some statements coming from us.

      Delete
    2. Student 08 Really? all the information what you said? even It is easily to find it to the google. Your just copying only, make it your own statement you can;t get some information not all of it.. Thank you for the response...

      Delete
    3. Don't you understand? I told you there are some statements coming from the google and yes we did copy and pasted it, but not everything. We also put our own words from there to discuss you the main topic. I don't even think you did understand the issue, so yah. Baboosh!

      Delete
  8. Student 5. (Baling ganda)Are you sure that your article were based on your understandings on your research? Or you just copy paste it? Sorry coz' I notice that you have 3 sources, and some of them were too long and I think instead of getting some ideas you just copy paste it.

    ReplyDelete
  9. This comment has been removed by the author.

    ReplyDelete
  10. Student 5. (Baling ganda)Are you sure that your article were based on your understandings on your research? Or you just copy and paste it? Sorry coz' I noticed that you have 3 sources, and some of them were too long and I think instead of getting some ideas you just copied and pasted it.

    ReplyDelete
    Replies
    1. Hello?? We are just going here again and again. Haven't you read that yes we put some copy and pasted statements in our article but not everything came from the internet. Those tips were just the one that came from different sources and we did put some credits from there. Was that enough? Are you already satisfied? Because you keep repeating the same comments all over again. You're just making it obvious that you are... i won't continue u knew it! 😘

      Delete
  11. Okay guys lets chill it out..! Lets say this article was not copy paste and some of the informations and examples are enough for the readers for them to understand in relate in our subject ICT we all know that WRITING is one of them one of the important? Am i right? And if im wrong k.fine.

    My question is ( guys wag kayo galit ha? Peace tayo magtatanong lang naman ako)

    if i were a writer and i am reading this article right now.

    Would you give me the 'MOST CATCHY WORD para magustuhan kong basahin ang article nyo? (eye catch (sige na mali na spelling pero nakukuha nyo naman point ko diba,? )

    Vovo pa naman ako sa english how would you consider us as your reader? Not all readers would understand those very malalim na word.
    Dont just focus on us beybe as your target readers. Kunwari maraming nakakabasa niyan. Diba laging sinasabi MAKE OUT OF FUN IN WRITING EVEN IT IS THR MOST SERIOUS ONE.

    LOVEYOUUUUU guys walang hate ha? Love lang 😆✌

    ReplyDelete
    Replies
    1. Yikes! Seriously? Are you serious with your comment? Because all I can say is HAHAHAHAHAHAHAHAHAHHAAHAHA. YOU ARE MAKING FUN OF YOURSELF. 🙈

      Delete
  12. (student 2) About it's technicalities, it was too long for the readers to read. The readers may not understand all the details stated because of it's length and it seems that it was just copied then pasted. About the article itself, some details were not justified and explained well especially the introduction. How can you make the readers believe that all the information stated are authenticated when the introduction itself is loose.

    ReplyDelete
  13. Student no. 7
    Next time you should make an article as short as possible but the important content was there because seriously as a reader, It was too tiring to read because it's too long.

    ReplyDelete
  14. The article is too boring to read because its too long. Maybe nextime you should make it short as long as the article is easy to understand. (FANTASTIC BABY)

    ReplyDelete
    Replies
    1. Too boring to read? Oh I see. Then I suggest you don't read it bc the article was not made for the lazy readers. Thank you!

      Delete
  15. Student no.14 nakakatamad talagang basahin hays, kahit sinong makakakita nito tatamarin talaga. Title pa lang di na catchy, tinry ko naman basahin kaso nakakatamad talaga hahahah just being honest 😘

    ReplyDelete
    Replies
    1. Masyadong mahaba. Kahit siguro classmates niyo tinamad ng basahin yan

      Delete
    2. (Madam Beybe no.1) maganda sana yung article niyo kaso mahana at masakit sa mata sa susunod dapat bulleted para mabilis maintindihan ng readers at sana wa malalim ang mga words kasi as a millennial marami akong words na malalim na hindi ko masyadong maintindihan sana makuha niyo point kasi para sa inyo rin to. Salamat parang pag ibig lang yan. :)

      Delete
    3. (Madam palaban)
      Hindi nyo kasi kaya intindihin at ang problema sa inyo tamad kayo magbasa ok naman yung nilalaman eh nandon na lahat pati paulit ulit na ang inyong mga comment kesyo mahaba eme kasi nga Nandon na lahat wala na kasi kayo maitanong haha

      Delete
  16. Wag Kayo puro haba ng nilalaman natural lang yun kasi madami kami nalalaman at naiisip kasi yung sa inyo maiiksi lang wala kayo gaanong mailaman sa inyong Blog kaya puro comment nyo ay Kesyo mahaba wala na bang ibang comment yung about naman sa blog plsss :* love Madam Palaban

    ReplyDelete
  17. if ur really interested on the topic u won't mind it if it's too long or not. siguro wala lang kayong ibang mapuna sa article na to kaya yung pagiging mahaba ang issue. and another thing so what kung some of the details are copied and pasted to this article? naglagay naman sila ng credits so walang problema don and besides hindi naman kasi lahat dapat alam eh syempre u need to research some of the details para tama yung mailagay mo sa article mo. that would be all, thank you. god bless us all.

    ReplyDelete
  18. This comment has been removed by the author.

    ReplyDelete
  19. hi! please be professional in your criticisms. as broadcasters, you should take comments as a way to improve yourself. :) do not take everything too personally and seriously. focus more on how it can improve your article and not how you can defend it.

    love,
    sir Berald and mam Yana <3

    ReplyDelete
  20. (Faminety)
    Whoever you are ms, love lang bawal hate, why don’t you tell your classmates that be nice in commenting? And that would be great i think. Okay if i were you would you focus on the technicalities rather than the content? Coz when i reading comments it was really funny to read the same comments from different students like “hey u must to it shorter so that partial readers would read” and as far as i know making an article must be informative rather than sensationalism to make it short if you want a catchy article maybe you go to candymag.com and u will see a lot.
    well im just stating my pov why dont you analyze the article and comment to such content and that would be great i think. Thank you! Godbless y’all

    ReplyDelete

Post a Comment

Popular posts from this blog

MEDIA TO THE YOUTH TODAY

Health Issues Caused by Overusing of Social Media Application

IMPACT OF TECHNOLOGY ON SOCIETY