Sunday, December 6, 2009

UAAP Season 72 Women’s Volleyball Schedule (1st Round)

December 8 (Tuesday) – The Arena
09:00 AM – ADMU vs UP
11:00 AM – UE vs NU
02:00 PM – AdU vs FEU
04:00 PM – UST vs DLSU

December 11 (Friday) – The Arena
09:00 AM – NU vs AdU
11:00 AM – UP vs UST
02:00 PM – FEU vs UE
04:00 PM – DLSU vs ADMU

December 13 (Sunday) – The Arena
09:00 AM – UE vs UP
11:00 AM – ADMU vs NU
02:00 PM – UST vs FEU
04:00 PM – AdU vs DLSU

December 15 (Tuesday) – The Arena
02:00 PM – UST vs NU
04:00 PM – UP vs FEU

December 16 (Wednesday) – The Arena
02:00 PM – UE vs DLSU
04:00 PM – AdU vs ADMU

December 19 (Saturday) – The Arena
02:00 PM – DLSU vs UP
04:00 PM – ADMU vs UST

December 20 (Sunday) – The Arena
02:00 PM – FEU vs NU
04:00 PM – AdU vs UE

January 9 (Saturday) – The Arena
02:00 PM – NU vs DLSU
04:00 PM – UE vs UST

January 10 (Sunday) – The Arena
02:00 PM – UP vs AdU
04:00 PM – ADMU vs FEU

January 12 (Tuesday) – The Arena
02:00 PM – UP vs NU
04:00 PM – UE vs ADMU

January 13 (Wednesday) – The Arena
02:00 PM – UST vs AdU
04:00 PM – DLSU vs FEU



Monday, May 12, 2008

Assumption College of Davao - Cabaguio Ave., Davao City

BSHRM Facilities


Mini Hotel/ Mini Bar and Restaurant Function Hall



























BSIT Facilities

Computer laboratories














Course offered:
BS in Information Technology
BS in Hotel and Restaurant Management
BS in Elementary Education
BS in Secondary Education

2-year course (TESDA Accredited course)

2yr HRM
2yr Computer Technology
2yr Computer Secretarial
2yr Computer Programmer

* 2 year cours are offer in sunday college program

for more information call :2250722

Saturday, May 10, 2008

Why are ethical guidelines needed?

The education and training of IT professionals, including security specialists, usually focuses on technical knowledge and skills. You learn how to perform tasks, but with little consideration of how those abilities can be misused. In fact, many IT professionals approach their work with a hacker’s perspective: whatever you can do, you’re entitled to do.
Note:Note that in this article, we’re using the word “hacker” in the current common meaning, pertaining to “black hat” hackers who use their skills to break into systems and access data and programs without the permission of the owners. We’re well aware that the term originally referred to anyone with advanced programming skills, and that there are “white hat hackers” who use their skills to help companies and individuals protect against the black hats.
In fact, many IT pros don’t even realize that their jobs involve ethical issues. Yet we make decisions on a daily basis that raise ethical questions.

Followers

Visitor

free counters

FEEDJIT Live Traffic Feed