SlideShare a Scribd company logo
1 of 12
PLAGIARISM, COPY
  WRITING, AND
  NETIQUETTE

     By: Patrick Hines
PICTURE OF PLAGIARISM
PLAGIARISM


Plagiarism is the misrepresentation of authorship. Really, words and ideas conceived by one person are attributed to another
                                                           person.
 Plagiarism is a form of intellectual theft or fraud and it undermines the intellectual economy that values ideas, words, and
understanding. Even when an act of plagiarism appears superficially a victimless crime, it nonetheless devalues the currency
                                      of human thought and thereby weakens society.
In the most common form of plagiarism, one author’s words are inserted verbatim in the work of a second author, without
 quotation, acknowledgement, or attribution. But there are many other forms of plagiarism, including some that are often
               accepted or even encouraged by society, notably ghostwriting, speech-writing, and paraphrasing.
CONSEQUENCES OF
   PLAGIARISM
    1.      Plagiarism can get you expelled from your course

     2.Plagiarism can result in your work being destroyed

         3.Plagiarism can result in expel from your school.

4.Plagiarism can result in legal action like lawsuit or jail time.
PICTURE OF NETIQUETTE
NETIQUETTE
Remember that you are human. When using netiquette, know where you are in the internet. Also have to respect other people time.
You should make yourself look good online. Share your knowledge with others. Respect others privacy. Make sure you do not abuse
                               your power. Last thing is to be forgiving of other peoples mistakes.
CONSEQUENCES OF
  NETIQUETTE
       Think about the consequences of things you write. Do not use

    a computer to send harmful messages to others. It is a federal offense.




         Always remember to proofread your e-mail before sending.

       E-mail is a digital letter and should be grammatically correct

           including spelling, punctuation and sentence structure.



                 Do not look around in other people’s files.

         Taking information, or pictures from the Internet without

              permission, and proper documentation is stealing.

               Copying software you did not pay for is illegal.

            Typing in all capital letters makes the person feel as

      if you are shouting at them. It is also more difficult to read text

                              typed in this way.

           Remember not all information online is true, and some

       people online pretend to be someone else. Always practice good

                               Internet Safety.
PICTURE OF COPY
    WRITING
COPY WRITING
Copywriting is changing every day. What started largely as a
specialized type of writing for display ads in newspapers and
magazines and direct mail has changed dramatically. Today's
marketing for copywriting involves online marketing, mobile
marketing, social media and video.
                                 ,
In a relatively short period of time the world of marketing
turned on its head. Today's copywriters need to be familiar
with various online platforms. A lot of copywriters who were
kings in the days of rolling out direct mail or buying
newspaper space are no longer able to compete in the age of
video and email marketing.
CONSEQUENCES OF COPY
        WRITING

 1. Don’t do bad things when copywriting or you will get major
consequences.

 2. It could mess up your educational planning.

 3. Government would make copywriting illegal.
REFERENCES

1    www.albion.com/netiquette/corerules.html

2   www.librarybcds.com/PDFs/Netiquette.pdf

3    www.copyright.gov

4   www.plagiarism.org

5   owl.english.purdue.edu › ... › Research and Citation › Using
    Research
The Dos and Don'ts of Plagiarism, Netiquette and Copywriting

More Related Content

What's hot

Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010Nancy Gross
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipjleverett
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquetterowenick
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kidskwazy
 
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy QuizDr. Joel Evans
 
Rights and responsibillities
Rights and responsibillitiesRights and responsibillities
Rights and responsibillities19nunezlair2
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of InternetAreeb Khan
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social mediaAM Oh
 
Disadvatages of internet
Disadvatages of internetDisadvatages of internet
Disadvatages of internetToseef Abbasi
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for ParentsKristi Richburg
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineIan Krieger
 
CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2Anchalanshri Dixit
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints HandoutOllie Bray
 
Bullying pp best
Bullying pp bestBullying pp best
Bullying pp besterinmacks
 

What's hot (19)

Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy Quiz
 
Rights and responsibillities
Rights and responsibillitiesRights and responsibillities
Rights and responsibillities
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Disadvatages of internet
Disadvatages of internetDisadvatages of internet
Disadvatages of internet
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
Internet safety
Internet safetyInternet safety
Internet safety
 
CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
 
Bullying pp best
Bullying pp bestBullying pp best
Bullying pp best
 
Fosi parent-tips
Fosi parent-tipsFosi parent-tips
Fosi parent-tips
 

Viewers also liked

Studio di Ingegneria Dott. Ing. Felicetto Massa
Studio di Ingegneria Dott. Ing. Felicetto MassaStudio di Ingegneria Dott. Ing. Felicetto Massa
Studio di Ingegneria Dott. Ing. Felicetto MassaFelicetto Massa
 
Habitat school logo2
Habitat school logo2Habitat school logo2
Habitat school logo2Hari Prasad
 
Gaming technight #1 Milkcocoaやろうぜ!
Gaming technight #1 Milkcocoaやろうぜ!Gaming technight #1 Milkcocoaやろうぜ!
Gaming technight #1 Milkcocoaやろうぜ!Masaki Yamamoto
 
How To Get More Website Traffic
How To Get More Website Traffic How To Get More Website Traffic
How To Get More Website Traffic Rodney Brooks Jr
 
jTthree V3 technical preview
jTthree V3 technical previewjTthree V3 technical preview
jTthree V3 technical previewMasaki Yamamoto
 
批判性思維在農業科技資源運籌管理之應用
批判性思維在農業科技資源運籌管理之應用批判性思維在農業科技資源運籌管理之應用
批判性思維在農業科技資源運籌管理之應用tarm-tw
 
La sensibilizzazione professionale sul risparmio energetico
La sensibilizzazione professionale sul risparmio energetico La sensibilizzazione professionale sul risparmio energetico
La sensibilizzazione professionale sul risparmio energetico Felicetto Massa
 
visual CV, Ilya Talovskiy
visual CV, Ilya Talovskiyvisual CV, Ilya Talovskiy
visual CV, Ilya TalovskiyIlya Talovskiy
 
Feria con padres para nivel 3 años
Feria con padres para nivel 3 añosFeria con padres para nivel 3 años
Feria con padres para nivel 3 añosinicials
 
introducing myself in "I am Ground" event, Open Factory
introducing myself in "I am Ground" event, Open Factoryintroducing myself in "I am Ground" event, Open Factory
introducing myself in "I am Ground" event, Open FactoryWondae Ryu
 

Viewers also liked (20)

Data Quality
Data QualityData Quality
Data Quality
 
Studio di Ingegneria Dott. Ing. Felicetto Massa
Studio di Ingegneria Dott. Ing. Felicetto MassaStudio di Ingegneria Dott. Ing. Felicetto Massa
Studio di Ingegneria Dott. Ing. Felicetto Massa
 
Wintech Group Brochure
Wintech Group BrochureWintech Group Brochure
Wintech Group Brochure
 
Habitat school logo2
Habitat school logo2Habitat school logo2
Habitat school logo2
 
Informe comparativo 2008 2012
Informe comparativo 2008 2012Informe comparativo 2008 2012
Informe comparativo 2008 2012
 
01 lab1
01 lab101 lab1
01 lab1
 
Gaming technight #1 Milkcocoaやろうぜ!
Gaming technight #1 Milkcocoaやろうぜ!Gaming technight #1 Milkcocoaやろうぜ!
Gaming technight #1 Milkcocoaやろうぜ!
 
How To Get More Website Traffic
How To Get More Website Traffic How To Get More Website Traffic
How To Get More Website Traffic
 
jTthree V3 technical preview
jTthree V3 technical previewjTthree V3 technical preview
jTthree V3 technical preview
 
Rendicion de cuentas educacion yondó 2012
Rendicion de cuentas educacion yondó 2012Rendicion de cuentas educacion yondó 2012
Rendicion de cuentas educacion yondó 2012
 
批判性思維在農業科技資源運籌管理之應用
批判性思維在農業科技資源運籌管理之應用批判性思維在農業科技資源運籌管理之應用
批判性思維在農業科技資源運籌管理之應用
 
Informe Administrativo Yondó somos todos
Informe Administrativo Yondó somos todosInforme Administrativo Yondó somos todos
Informe Administrativo Yondó somos todos
 
Travels to cau
Travels to cauTravels to cau
Travels to cau
 
La sensibilizzazione professionale sul risparmio energetico
La sensibilizzazione professionale sul risparmio energetico La sensibilizzazione professionale sul risparmio energetico
La sensibilizzazione professionale sul risparmio energetico
 
Informe ejecutivo pto 2012
Informe ejecutivo pto 2012Informe ejecutivo pto 2012
Informe ejecutivo pto 2012
 
visual CV, Ilya Talovskiy
visual CV, Ilya Talovskiyvisual CV, Ilya Talovskiy
visual CV, Ilya Talovskiy
 
Internet di tutti bibliografia
Internet di tutti bibliografiaInternet di tutti bibliografia
Internet di tutti bibliografia
 
Event planning
Event planningEvent planning
Event planning
 
Feria con padres para nivel 3 años
Feria con padres para nivel 3 añosFeria con padres para nivel 3 años
Feria con padres para nivel 3 años
 
introducing myself in "I am Ground" event, Open Factory
introducing myself in "I am Ground" event, Open Factoryintroducing myself in "I am Ground" event, Open Factory
introducing myself in "I am Ground" event, Open Factory
 

Similar to The Dos and Don'ts of Plagiarism, Netiquette and Copywriting

Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxFroilan Cantillo
 
Legal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfLegal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfkenneth218994
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette EMCox02
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfExtremelyDarkness2
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104Marvin Broñoso
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfMelchorTolentino2
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptxglorysunny
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computingMichael Jarata
 
How good are your internet manners proj.
How good are your internet manners proj.How good are your internet manners proj.
How good are your internet manners proj.XxxCelesteTxxX
 
10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptx10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptxDaveCalapis3
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxhenrysales6
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 

Similar to The Dos and Don'ts of Plagiarism, Netiquette and Copywriting (20)

Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptx
 
Legal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfLegal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdf
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
MIL lesson 6.pptx
MIL lesson 6.pptxMIL lesson 6.pptx
MIL lesson 6.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
ETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptxETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptx
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computing
 
Internet manners
Internet mannersInternet manners
Internet manners
 
How good are your internet manners proj.
How good are your internet manners proj.How good are your internet manners proj.
How good are your internet manners proj.
 
10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptx10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptx
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Stalking2
Stalking2Stalking2
Stalking2
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

The Dos and Don'ts of Plagiarism, Netiquette and Copywriting

  • 1. PLAGIARISM, COPY WRITING, AND NETIQUETTE By: Patrick Hines
  • 3. PLAGIARISM Plagiarism is the misrepresentation of authorship. Really, words and ideas conceived by one person are attributed to another person. Plagiarism is a form of intellectual theft or fraud and it undermines the intellectual economy that values ideas, words, and understanding. Even when an act of plagiarism appears superficially a victimless crime, it nonetheless devalues the currency of human thought and thereby weakens society. In the most common form of plagiarism, one author’s words are inserted verbatim in the work of a second author, without quotation, acknowledgement, or attribution. But there are many other forms of plagiarism, including some that are often accepted or even encouraged by society, notably ghostwriting, speech-writing, and paraphrasing.
  • 4. CONSEQUENCES OF PLAGIARISM 1. Plagiarism can get you expelled from your course 2.Plagiarism can result in your work being destroyed 3.Plagiarism can result in expel from your school. 4.Plagiarism can result in legal action like lawsuit or jail time.
  • 6. NETIQUETTE Remember that you are human. When using netiquette, know where you are in the internet. Also have to respect other people time. You should make yourself look good online. Share your knowledge with others. Respect others privacy. Make sure you do not abuse your power. Last thing is to be forgiving of other peoples mistakes.
  • 7. CONSEQUENCES OF NETIQUETTE Think about the consequences of things you write. Do not use a computer to send harmful messages to others. It is a federal offense. Always remember to proofread your e-mail before sending. E-mail is a digital letter and should be grammatically correct including spelling, punctuation and sentence structure. Do not look around in other people’s files. Taking information, or pictures from the Internet without permission, and proper documentation is stealing. Copying software you did not pay for is illegal. Typing in all capital letters makes the person feel as if you are shouting at them. It is also more difficult to read text typed in this way. Remember not all information online is true, and some people online pretend to be someone else. Always practice good Internet Safety.
  • 8. PICTURE OF COPY WRITING
  • 9. COPY WRITING Copywriting is changing every day. What started largely as a specialized type of writing for display ads in newspapers and magazines and direct mail has changed dramatically. Today's marketing for copywriting involves online marketing, mobile marketing, social media and video. , In a relatively short period of time the world of marketing turned on its head. Today's copywriters need to be familiar with various online platforms. A lot of copywriters who were kings in the days of rolling out direct mail or buying newspaper space are no longer able to compete in the age of video and email marketing.
  • 10. CONSEQUENCES OF COPY WRITING  1. Don’t do bad things when copywriting or you will get major consequences.  2. It could mess up your educational planning.  3. Government would make copywriting illegal.
  • 11. REFERENCES 1 www.albion.com/netiquette/corerules.html 2 www.librarybcds.com/PDFs/Netiquette.pdf 3 www.copyright.gov 4 www.plagiarism.org 5 owl.english.purdue.edu › ... › Research and Citation › Using Research