SlideShare a Scribd company logo
1 of 12
PLAGIARISM, COPY
  WRITING, AND
  NETIQUETTE

     By: Patrick Hines
PICTURE OF PLAGIARISM
PLAGIARISM


Plagiarism is the misrepresentation of authorship. Really, words and ideas conceived by one person are attributed to another
                                                           person.
 Plagiarism is a form of intellectual theft or fraud and it undermines the intellectual economy that values ideas, words, and
understanding. Even when an act of plagiarism appears superficially a victimless crime, it nonetheless devalues the currency
                                      of human thought and thereby weakens society.
In the most common form of plagiarism, one author’s words are inserted verbatim in the work of a second author, without
 quotation, acknowledgement, or attribution. But there are many other forms of plagiarism, including some that are often
               accepted or even encouraged by society, notably ghostwriting, speech-writing, and paraphrasing.
CONSEQUENCES OF
   PLAGIARISM
    1.      Plagiarism can get you expelled from your course

     2.Plagiarism can result in your work being destroyed

         3.Plagiarism can result in expel from your school.

4.Plagiarism can result in legal action like lawsuit or jail time.
PICTURE OF NETIQUETTE
NETIQUETTE
Remember that you are human. When using netiquette, know where you are in the internet. Also have to respect other people time.
You should make yourself look good online. Share your knowledge with others. Respect others privacy. Make sure you do not abuse
                               your power. Last thing is to be forgiving of other peoples mistakes.
CONSEQUENCES OF
  NETIQUETTE
       Think about the consequences of things you write. Do not use

    a computer to send harmful messages to others. It is a federal offense.




         Always remember to proofread your e-mail before sending.

       E-mail is a digital letter and should be grammatically correct

           including spelling, punctuation and sentence structure.



                 Do not look around in other people’s files.

         Taking information, or pictures from the Internet without

              permission, and proper documentation is stealing.

               Copying software you did not pay for is illegal.

            Typing in all capital letters makes the person feel as

      if you are shouting at them. It is also more difficult to read text

                              typed in this way.

           Remember not all information online is true, and some

       people online pretend to be someone else. Always practice good

                               Internet Safety.
PICTURE OF COPY
    WRITING
COPY WRITING
Copywriting is changing every day. What started largely as a
specialized type of writing for display ads in newspapers and
magazines and direct mail has changed dramatically. Today's
marketing for copywriting involves online marketing, mobile
marketing, social media and video.
                                 ,
In a relatively short period of time the world of marketing
turned on its head. Today's copywriters need to be familiar
with various online platforms. A lot of copywriters who were
kings in the days of rolling out direct mail or buying
newspaper space are no longer able to compete in the age of
video and email marketing.
CONSEQUENCES OF COPY
        WRITING

 1. Don’t do bad things when copywriting or you will get major
consequences.

 2. It could mess up your educational planning.

 3. Government would make copywriting illegal.
REFERENCES

1    www.albion.com/netiquette/corerules.html

2   www.librarybcds.com/PDFs/Netiquette.pdf

3    www.copyright.gov

4   www.plagiarism.org

5   owl.english.purdue.edu › ... › Research and Citation › Using
    Research
The Dos and Don'ts of Plagiarism, Netiquette and Copywriting

More Related Content

What's hot

Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010Nancy Gross
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kidskwazy
 
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy QuizDr. Joel Evans
 
Rights and responsibillities
Rights and responsibillitiesRights and responsibillities
Rights and responsibillities19nunezlair2
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of InternetAreeb Khan
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social mediaAM Oh
 
Disadvatages of internet
Disadvatages of internetDisadvatages of internet
Disadvatages of internetToseef Abbasi
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for ParentsKristi Richburg
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineIan Krieger
 
CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2Anchalanshri Dixit
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints HandoutOllie Bray
 
Bullying pp best
Bullying pp bestBullying pp best
Bullying pp besterinmacks
 

What's hot (19)

Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy Quiz
 
Rights and responsibillities
Rights and responsibillitiesRights and responsibillities
Rights and responsibillities
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Disadvatages of internet
Disadvatages of internetDisadvatages of internet
Disadvatages of internet
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
Internet safety
Internet safetyInternet safety
Internet safety
 
CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
 
Bullying pp best
Bullying pp bestBullying pp best
Bullying pp best
 
Fosi parent-tips
Fosi parent-tipsFosi parent-tips
Fosi parent-tips
 

Viewers also liked

Studio di Ingegneria Dott. Ing. Felicetto Massa
Studio di Ingegneria Dott. Ing. Felicetto MassaStudio di Ingegneria Dott. Ing. Felicetto Massa
Studio di Ingegneria Dott. Ing. Felicetto MassaFelicetto Massa
 
Habitat school logo2
Habitat school logo2Habitat school logo2
Habitat school logo2Hari Prasad
 
Gaming technight #1 Milkcocoaやろうぜ!
Gaming technight #1 Milkcocoaやろうぜ!Gaming technight #1 Milkcocoaやろうぜ!
Gaming technight #1 Milkcocoaやろうぜ!Masaki Yamamoto
 
How To Get More Website Traffic
How To Get More Website Traffic How To Get More Website Traffic
How To Get More Website Traffic Rodney Brooks Jr
 
jTthree V3 technical preview
jTthree V3 technical previewjTthree V3 technical preview
jTthree V3 technical previewMasaki Yamamoto
 
批判性思維在農業科技資源運籌管理之應用
批判性思維在農業科技資源運籌管理之應用批判性思維在農業科技資源運籌管理之應用
批判性思維在農業科技資源運籌管理之應用tarm-tw
 
La sensibilizzazione professionale sul risparmio energetico
La sensibilizzazione professionale sul risparmio energetico La sensibilizzazione professionale sul risparmio energetico
La sensibilizzazione professionale sul risparmio energetico Felicetto Massa
 
visual CV, Ilya Talovskiy
visual CV, Ilya Talovskiyvisual CV, Ilya Talovskiy
visual CV, Ilya TalovskiyIlya Talovskiy
 
Feria con padres para nivel 3 años
Feria con padres para nivel 3 añosFeria con padres para nivel 3 años
Feria con padres para nivel 3 añosinicials
 
introducing myself in "I am Ground" event, Open Factory
introducing myself in "I am Ground" event, Open Factoryintroducing myself in "I am Ground" event, Open Factory
introducing myself in "I am Ground" event, Open FactoryWondae Ryu
 

Viewers also liked (20)

Data Quality
Data QualityData Quality
Data Quality
 
Studio di Ingegneria Dott. Ing. Felicetto Massa
Studio di Ingegneria Dott. Ing. Felicetto MassaStudio di Ingegneria Dott. Ing. Felicetto Massa
Studio di Ingegneria Dott. Ing. Felicetto Massa
 
Wintech Group Brochure
Wintech Group BrochureWintech Group Brochure
Wintech Group Brochure
 
Habitat school logo2
Habitat school logo2Habitat school logo2
Habitat school logo2
 
Informe comparativo 2008 2012
Informe comparativo 2008 2012Informe comparativo 2008 2012
Informe comparativo 2008 2012
 
01 lab1
01 lab101 lab1
01 lab1
 
Gaming technight #1 Milkcocoaやろうぜ!
Gaming technight #1 Milkcocoaやろうぜ!Gaming technight #1 Milkcocoaやろうぜ!
Gaming technight #1 Milkcocoaやろうぜ!
 
How To Get More Website Traffic
How To Get More Website Traffic How To Get More Website Traffic
How To Get More Website Traffic
 
jTthree V3 technical preview
jTthree V3 technical previewjTthree V3 technical preview
jTthree V3 technical preview
 
Rendicion de cuentas educacion yondó 2012
Rendicion de cuentas educacion yondó 2012Rendicion de cuentas educacion yondó 2012
Rendicion de cuentas educacion yondó 2012
 
批判性思維在農業科技資源運籌管理之應用
批判性思維在農業科技資源運籌管理之應用批判性思維在農業科技資源運籌管理之應用
批判性思維在農業科技資源運籌管理之應用
 
Informe Administrativo Yondó somos todos
Informe Administrativo Yondó somos todosInforme Administrativo Yondó somos todos
Informe Administrativo Yondó somos todos
 
Travels to cau
Travels to cauTravels to cau
Travels to cau
 
La sensibilizzazione professionale sul risparmio energetico
La sensibilizzazione professionale sul risparmio energetico La sensibilizzazione professionale sul risparmio energetico
La sensibilizzazione professionale sul risparmio energetico
 
Informe ejecutivo pto 2012
Informe ejecutivo pto 2012Informe ejecutivo pto 2012
Informe ejecutivo pto 2012
 
visual CV, Ilya Talovskiy
visual CV, Ilya Talovskiyvisual CV, Ilya Talovskiy
visual CV, Ilya Talovskiy
 
Internet di tutti bibliografia
Internet di tutti bibliografiaInternet di tutti bibliografia
Internet di tutti bibliografia
 
Event planning
Event planningEvent planning
Event planning
 
Feria con padres para nivel 3 años
Feria con padres para nivel 3 añosFeria con padres para nivel 3 años
Feria con padres para nivel 3 años
 
introducing myself in "I am Ground" event, Open Factory
introducing myself in "I am Ground" event, Open Factoryintroducing myself in "I am Ground" event, Open Factory
introducing myself in "I am Ground" event, Open Factory
 

Similar to The Dos and Don'ts of Plagiarism, Netiquette and Copywriting

Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxFroilan Cantillo
 
Legal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfLegal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfkenneth218994
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette EMCox02
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfExtremelyDarkness2
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computingMichael Jarata
 
How good are your internet manners proj.
How good are your internet manners proj.How good are your internet manners proj.
How good are your internet manners proj.XxxCelesteTxxX
 
10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptx10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptxDaveCalapis3
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxhenrysales6
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 

Similar to The Dos and Don'ts of Plagiarism, Netiquette and Copywriting (20)

Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptx
 
Legal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfLegal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdf
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
MIL lesson 6.pptx
MIL lesson 6.pptxMIL lesson 6.pptx
MIL lesson 6.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
ETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptxETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptx
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computing
 
Internet manners
Internet mannersInternet manners
Internet manners
 
How good are your internet manners proj.
How good are your internet manners proj.How good are your internet manners proj.
How good are your internet manners proj.
 
10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptx10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptx
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Stalking2
Stalking2Stalking2
Stalking2
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

The Dos and Don'ts of Plagiarism, Netiquette and Copywriting

  • 1. PLAGIARISM, COPY WRITING, AND NETIQUETTE By: Patrick Hines
  • 3. PLAGIARISM Plagiarism is the misrepresentation of authorship. Really, words and ideas conceived by one person are attributed to another person. Plagiarism is a form of intellectual theft or fraud and it undermines the intellectual economy that values ideas, words, and understanding. Even when an act of plagiarism appears superficially a victimless crime, it nonetheless devalues the currency of human thought and thereby weakens society. In the most common form of plagiarism, one author’s words are inserted verbatim in the work of a second author, without quotation, acknowledgement, or attribution. But there are many other forms of plagiarism, including some that are often accepted or even encouraged by society, notably ghostwriting, speech-writing, and paraphrasing.
  • 4. CONSEQUENCES OF PLAGIARISM 1. Plagiarism can get you expelled from your course 2.Plagiarism can result in your work being destroyed 3.Plagiarism can result in expel from your school. 4.Plagiarism can result in legal action like lawsuit or jail time.
  • 6. NETIQUETTE Remember that you are human. When using netiquette, know where you are in the internet. Also have to respect other people time. You should make yourself look good online. Share your knowledge with others. Respect others privacy. Make sure you do not abuse your power. Last thing is to be forgiving of other peoples mistakes.
  • 7. CONSEQUENCES OF NETIQUETTE Think about the consequences of things you write. Do not use a computer to send harmful messages to others. It is a federal offense. Always remember to proofread your e-mail before sending. E-mail is a digital letter and should be grammatically correct including spelling, punctuation and sentence structure. Do not look around in other people’s files. Taking information, or pictures from the Internet without permission, and proper documentation is stealing. Copying software you did not pay for is illegal. Typing in all capital letters makes the person feel as if you are shouting at them. It is also more difficult to read text typed in this way. Remember not all information online is true, and some people online pretend to be someone else. Always practice good Internet Safety.
  • 8. PICTURE OF COPY WRITING
  • 9. COPY WRITING Copywriting is changing every day. What started largely as a specialized type of writing for display ads in newspapers and magazines and direct mail has changed dramatically. Today's marketing for copywriting involves online marketing, mobile marketing, social media and video. , In a relatively short period of time the world of marketing turned on its head. Today's copywriters need to be familiar with various online platforms. A lot of copywriters who were kings in the days of rolling out direct mail or buying newspaper space are no longer able to compete in the age of video and email marketing.
  • 10. CONSEQUENCES OF COPY WRITING  1. Don’t do bad things when copywriting or you will get major consequences.  2. It could mess up your educational planning.  3. Government would make copywriting illegal.
  • 11. REFERENCES 1 www.albion.com/netiquette/corerules.html 2 www.librarybcds.com/PDFs/Netiquette.pdf 3 www.copyright.gov 4 www.plagiarism.org 5 owl.english.purdue.edu › ... › Research and Citation › Using Research