SlideShare a Scribd company logo
1 of 12
PLAGIARISM, COPY
  WRITING, AND
  NETIQUETTE

     By: Patrick Hines
PICTURE OF PLAGIARISM
PLAGIARISM


Plagiarism is the misrepresentation of authorship. Really, words and ideas conceived by one person are attributed to another
                                                           person.
 Plagiarism is a form of intellectual theft or fraud and it undermines the intellectual economy that values ideas, words, and
understanding. Even when an act of plagiarism appears superficially a victimless crime, it nonetheless devalues the currency
                                      of human thought and thereby weakens society.
In the most common form of plagiarism, one author’s words are inserted verbatim in the work of a second author, without
 quotation, acknowledgement, or attribution. But there are many other forms of plagiarism, including some that are often
               accepted or even encouraged by society, notably ghostwriting, speech-writing, and paraphrasing.
CONSEQUENCES OF
   PLAGIARISM
    1.      Plagiarism can get you expelled from your course

     2.Plagiarism can result in your work being destroyed

         3.Plagiarism can result in expel from your school.

4.Plagiarism can result in legal action like lawsuit or jail time.
PICTURE OF NETIQUETTE
NETIQUETTE
Remember that you are human. When using netiquette, know where you are in the internet. Also have to respect other people time.
You should make yourself look good online. Share your knowledge with others. Respect others privacy. Make sure you do not abuse
                               your power. Last thing is to be forgiving of other peoples mistakes.
CONSEQUENCES OF
  NETIQUETTE
       Think about the consequences of things you write. Do not use

    a computer to send harmful messages to others. It is a federal offense.




         Always remember to proofread your e-mail before sending.

       E-mail is a digital letter and should be grammatically correct

           including spelling, punctuation and sentence structure.



                 Do not look around in other people’s files.

         Taking information, or pictures from the Internet without

              permission, and proper documentation is stealing.

               Copying software you did not pay for is illegal.

            Typing in all capital letters makes the person feel as

      if you are shouting at them. It is also more difficult to read text

                              typed in this way.

           Remember not all information online is true, and some

       people online pretend to be someone else. Always practice good

                               Internet Safety.
PICTURE OF COPY
    WRITING
COPY WRITING
Copywriting is changing every day. What started largely as a
specialized type of writing for display ads in newspapers and
magazines and direct mail has changed dramatically. Today's
marketing for copywriting involves online marketing, mobile
marketing, social media and video.
                                 ,
In a relatively short period of time the world of marketing
turned on its head. Today's copywriters need to be familiar
with various online platforms. A lot of copywriters who were
kings in the days of rolling out direct mail or buying
newspaper space are no longer able to compete in the age of
video and email marketing.
CONSEQUENCES OF COPY
        WRITING

 1. Don’t do bad things when copywriting or you will get major
consequences.

 2. It could mess up your educational planning.

 3. Government would make copywriting illegal.
REFERENCES

1    www.albion.com/netiquette/corerules.html

2   www.librarybcds.com/PDFs/Netiquette.pdf

3    www.copyright.gov

4   www.plagiarism.org

5   owl.english.purdue.edu › ... › Research and Citation › Using
    Research
Patrick's Powerpoint

More Related Content

What's hot

Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
jleverett
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
rowenick
 
Rights and responsibillities
Rights and responsibillitiesRights and responsibillities
Rights and responsibillities
19nunezlair2
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
Areeb Khan
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 
CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2
Anchalanshri Dixit
 
Bullying pp best
Bullying pp bestBullying pp best
Bullying pp best
erinmacks
 

What's hot (19)

Dangers on the Internet
Dangers on the InternetDangers on the Internet
Dangers on the Internet
 
Internet safety 2010
Internet safety 2010Internet safety 2010
Internet safety 2010
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Ctss Safe Internet For Kids
Ctss Safe Internet For KidsCtss Safe Internet For Kids
Ctss Safe Internet For Kids
 
Evans Online Privacy Quiz
Evans Online Privacy QuizEvans Online Privacy Quiz
Evans Online Privacy Quiz
 
Rights and responsibillities
Rights and responsibillitiesRights and responsibillities
Rights and responsibillities
 
Internet / Cyber Security
Internet / Cyber SecurityInternet / Cyber Security
Internet / Cyber Security
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Disadvatages of internet
Disadvatages of internetDisadvatages of internet
Disadvatages of internet
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Online Safety Tips for Parents
Online Safety Tips for ParentsOnline Safety Tips for Parents
Online Safety Tips for Parents
 
Kids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe onlineKids cyber safety-talk - Being Safe online
Kids cyber safety-talk - Being Safe online
 
Internet safety
Internet safetyInternet safety
Internet safety
 
CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2CYBER CRIME AGAINST CHILDREN_2
CYBER CRIME AGAINST CHILDREN_2
 
Internet Safety Keypoints Handout
Internet Safety Keypoints HandoutInternet Safety Keypoints Handout
Internet Safety Keypoints Handout
 
Bullying pp best
Bullying pp bestBullying pp best
Bullying pp best
 
Fosi parent-tips
Fosi parent-tipsFosi parent-tips
Fosi parent-tips
 

Viewers also liked

Habitat school logo2
Habitat school logo2Habitat school logo2
Habitat school logo2
Hari Prasad
 
Feria con padres para nivel 3 años
Feria con padres para nivel 3 añosFeria con padres para nivel 3 años
Feria con padres para nivel 3 años
inicials
 

Viewers also liked (20)

Data Quality
Data QualityData Quality
Data Quality
 
Studio di Ingegneria Dott. Ing. Felicetto Massa
Studio di Ingegneria Dott. Ing. Felicetto MassaStudio di Ingegneria Dott. Ing. Felicetto Massa
Studio di Ingegneria Dott. Ing. Felicetto Massa
 
Wintech Group Brochure
Wintech Group BrochureWintech Group Brochure
Wintech Group Brochure
 
Habitat school logo2
Habitat school logo2Habitat school logo2
Habitat school logo2
 
Informe comparativo 2008 2012
Informe comparativo 2008 2012Informe comparativo 2008 2012
Informe comparativo 2008 2012
 
01 lab1
01 lab101 lab1
01 lab1
 
Gaming technight #1 Milkcocoaやろうぜ!
Gaming technight #1 Milkcocoaやろうぜ!Gaming technight #1 Milkcocoaやろうぜ!
Gaming technight #1 Milkcocoaやろうぜ!
 
How To Get More Website Traffic
How To Get More Website Traffic How To Get More Website Traffic
How To Get More Website Traffic
 
jTthree V3 technical preview
jTthree V3 technical previewjTthree V3 technical preview
jTthree V3 technical preview
 
Rendicion de cuentas educacion yondó 2012
Rendicion de cuentas educacion yondó 2012Rendicion de cuentas educacion yondó 2012
Rendicion de cuentas educacion yondó 2012
 
批判性思維在農業科技資源運籌管理之應用
批判性思維在農業科技資源運籌管理之應用批判性思維在農業科技資源運籌管理之應用
批判性思維在農業科技資源運籌管理之應用
 
Informe Administrativo Yondó somos todos
Informe Administrativo Yondó somos todosInforme Administrativo Yondó somos todos
Informe Administrativo Yondó somos todos
 
Travels to cau
Travels to cauTravels to cau
Travels to cau
 
La sensibilizzazione professionale sul risparmio energetico
La sensibilizzazione professionale sul risparmio energetico La sensibilizzazione professionale sul risparmio energetico
La sensibilizzazione professionale sul risparmio energetico
 
Informe ejecutivo pto 2012
Informe ejecutivo pto 2012Informe ejecutivo pto 2012
Informe ejecutivo pto 2012
 
visual CV, Ilya Talovskiy
visual CV, Ilya Talovskiyvisual CV, Ilya Talovskiy
visual CV, Ilya Talovskiy
 
Internet di tutti bibliografia
Internet di tutti bibliografiaInternet di tutti bibliografia
Internet di tutti bibliografia
 
Event planning
Event planningEvent planning
Event planning
 
Feria con padres para nivel 3 años
Feria con padres para nivel 3 añosFeria con padres para nivel 3 años
Feria con padres para nivel 3 años
 
introducing myself in "I am Ground" event, Open Factory
introducing myself in "I am Ground" event, Open Factoryintroducing myself in "I am Ground" event, Open Factory
introducing myself in "I am Ground" event, Open Factory
 

Similar to Patrick's Powerpoint

Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
MdRuga
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
ExtremelyDarkness2
 
How good are your internet manners proj.
How good are your internet manners proj.How good are your internet manners proj.
How good are your internet manners proj.
XxxCelesteTxxX
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
DominicCaling
 

Similar to Patrick's Powerpoint (20)

Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Living in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptxLiving in the IT Era - Lesson 4.pptx
Living in the IT Era - Lesson 4.pptx
 
Legal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdfLegal, Ethical, and Societal Issues in Media and Information.pdf
Legal, Ethical, and Societal Issues in Media and Information.pdf
 
Digital Etiquette
Digital Etiquette Digital Etiquette
Digital Etiquette
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdfW3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
W3_ONLINE-SAFETY-SECURITY-NETTIQUETTE-AND-RESEARCH.pdf
 
Media and Information Literacy 104
Media and Information Literacy 104Media and Information Literacy 104
Media and Information Literacy 104
 
MIL lesson 6.pptx
MIL lesson 6.pptxMIL lesson 6.pptx
MIL lesson 6.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
The-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdfThe-Netiquette-and-the-Computer-Ethics.pdf
The-Netiquette-and-the-Computer-Ethics.pdf
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
ETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptxETECH Q1 Wk2.pptx
ETECH Q1 Wk2.pptx
 
Ten commandments of computing
Ten commandments of computingTen commandments of computing
Ten commandments of computing
 
Internet manners
Internet mannersInternet manners
Internet manners
 
How good are your internet manners proj.
How good are your internet manners proj.How good are your internet manners proj.
How good are your internet manners proj.
 
10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptx10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptx
 
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptxTEN COMMANDMENTS OF COMPUTER ETHICS.pptx
TEN COMMANDMENTS OF COMPUTER ETHICS.pptx
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Stalking2
Stalking2Stalking2
Stalking2
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Patrick's Powerpoint

  • 1. PLAGIARISM, COPY WRITING, AND NETIQUETTE By: Patrick Hines
  • 3. PLAGIARISM Plagiarism is the misrepresentation of authorship. Really, words and ideas conceived by one person are attributed to another person. Plagiarism is a form of intellectual theft or fraud and it undermines the intellectual economy that values ideas, words, and understanding. Even when an act of plagiarism appears superficially a victimless crime, it nonetheless devalues the currency of human thought and thereby weakens society. In the most common form of plagiarism, one author’s words are inserted verbatim in the work of a second author, without quotation, acknowledgement, or attribution. But there are many other forms of plagiarism, including some that are often accepted or even encouraged by society, notably ghostwriting, speech-writing, and paraphrasing.
  • 4. CONSEQUENCES OF PLAGIARISM 1. Plagiarism can get you expelled from your course 2.Plagiarism can result in your work being destroyed 3.Plagiarism can result in expel from your school. 4.Plagiarism can result in legal action like lawsuit or jail time.
  • 6. NETIQUETTE Remember that you are human. When using netiquette, know where you are in the internet. Also have to respect other people time. You should make yourself look good online. Share your knowledge with others. Respect others privacy. Make sure you do not abuse your power. Last thing is to be forgiving of other peoples mistakes.
  • 7. CONSEQUENCES OF NETIQUETTE Think about the consequences of things you write. Do not use a computer to send harmful messages to others. It is a federal offense. Always remember to proofread your e-mail before sending. E-mail is a digital letter and should be grammatically correct including spelling, punctuation and sentence structure. Do not look around in other people’s files. Taking information, or pictures from the Internet without permission, and proper documentation is stealing. Copying software you did not pay for is illegal. Typing in all capital letters makes the person feel as if you are shouting at them. It is also more difficult to read text typed in this way. Remember not all information online is true, and some people online pretend to be someone else. Always practice good Internet Safety.
  • 8. PICTURE OF COPY WRITING
  • 9. COPY WRITING Copywriting is changing every day. What started largely as a specialized type of writing for display ads in newspapers and magazines and direct mail has changed dramatically. Today's marketing for copywriting involves online marketing, mobile marketing, social media and video. , In a relatively short period of time the world of marketing turned on its head. Today's copywriters need to be familiar with various online platforms. A lot of copywriters who were kings in the days of rolling out direct mail or buying newspaper space are no longer able to compete in the age of video and email marketing.
  • 10. CONSEQUENCES OF COPY WRITING  1. Don’t do bad things when copywriting or you will get major consequences.  2. It could mess up your educational planning.  3. Government would make copywriting illegal.
  • 11. REFERENCES 1 www.albion.com/netiquette/corerules.html 2 www.librarybcds.com/PDFs/Netiquette.pdf 3 www.copyright.gov 4 www.plagiarism.org 5 owl.english.purdue.edu › ... › Research and Citation › Using Research