SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
By : Alexius Hedgepeth
Today in class you will be learning about
Plagiarism, Copyrighting, and Netiquette
Pay ATTENTION !!!!!!!!!
At the end of this power point you will have to take a pop
quiz based on what you’ve seen or learned about
Plagiarism, Copywriting, and Netiquette.
What is Plagiarism ?
Plagiarism is when
you are presenting
other’s work or ideas
claimed as your own.
Plagiarism is very
obvious .
How to avoid Plagiarism ?
• You must identify the author of the information and ideas .
• Use quotation marks to directly state the authors ideas.
• Accurate notes could be taken on where you found the specific
  information .
• Make it CLEAR on WHO said WHAT .
• Cite your sources .
• Know how to paraphrase . A paraphrase is a restatement in your
  own words while using someone else's ideas.
• Make sure you evaluate your sources.
• If you get caught plagiarizing you might have to pay a
fine.
Citing
Citing is noting the paraphrase or note as
the proof .There’s a rule you could use
which is : “If you knew a piece of
information before you started doing
research, generally you do not need to
credit it.” You also do not need to cite
well-known facts, such as dates. All
other information such as quotations,
statistics, and ideas should always be
cited in your papers.
What is Copywriting ?
• Copywriting is when a person is employed to
  write advertising .
• Copywriting is the use of words to promote
  someone’s business or idea.
• It can include plain text messages, and a
  variety of other online media.
The MAIN purpose
of Copyrighting
The main purpose of
copywriting is to persuade
the reader somehow,
whether if its to click on a
link, or buying a product.
Netiquette


  “A philosophy of effective
internet communication that
utilizes common conventions
   and forms as a guide for
     rules and standards.”
Basic Rules of Netiquette
                       Be abrupt.




                                      Be common with
 Relate to yourself.
                                     the things you say.




        When you want to
        prominence a word     Don’t say anything
         , do not use ALL      inappropriate.
              CAPS.
Importance of
Netiquette
P-R-O-O-F-R-E-A-D.
At ALL times be careful what
  you say.
Pay attention to formatting.
Use your judgments with
  attachments.
Types of Netiquette

                           These are the types of
                                Netiquette




                 “Netiquette of
                   sending.”




                                  “Netiquette of    “Netiquette of
“Netiquette basics.”
                                    replying.”      confidentially.”
Closing
Just by viewing this slide you may have learned new
things about Plagiarism, Copyrighting, and Netiquette.
Now you will have a short quiz .
Ready???? Hope you were paying
attention.
Time to Test
Your
Knowledge!!
1. What is one type of Plagiarism?
      (a) word-for-word (b)copyright (c) thief


2. How could you prevent Plagiarism?
     (a)identify yourself (b)identify the author (c) cite where it was created

3. Why do you think people copyright?
    (a)To earn money (b)They can (c)To get credit

4. Why is Netiquette important?
   (a)To keep peace on the internet (b) To search across the world (c)To
communicate with others
The importance of Plagiarism , copyrighting , and Netiquette.
References
Faculty Guide to Plagiarism : Background , Policy , Detection , Prevention (2010).
http://library.austincc.edu/gen-info/facplagiarism.htm
Plagiarism: How can you avoid plagiarism ?(n.d.)
http://tilt.library.skagit.edu/module4/plagiarism.htm
Preventing Plagiarism: Student Resources (n.d.)
http:// www.plagiarism.org
Internet Marking Definitions: Copywriting (n.d.)
http://www.internetmarketingdefinitions.com/Copywriting
The Copywriter Crucible: Clear persuasive Copywriting (n.d.)
http://copywriterscrucible.com/
Energise2-0: Sharing is “Cool” : Plagiarism is Not (2011).
http://energise2-0.com/2011/06/16/sharing-is-%E2%80%98cool%E2%80%99-plagiarism-is-not/
ASD-News-Other Views : ASD Class Views(2010)
http://hercasd.blogspot.com/2010/04/asd-class-sizes.html
TOW5-:Avoiding Plagiarism(2010)
http://bp00034.wordpress.com/2010/10/26/tow5-avoiding-plagiarism/

Más contenido relacionado

Similar a The importance of Plagiarism , copyrighting , and Netiquette.

PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTSPLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTSBeschara Karam
 
Netiquette, Copyright, Plagiarism
Netiquette, Copyright, PlagiarismNetiquette, Copyright, Plagiarism
Netiquette, Copyright, PlagiarismKamarziTillery
 
How to Behave on the Web
How to Behave on the WebHow to Behave on the Web
How to Behave on the Webdpittmangravity
 
Educational Technology 1
Educational Technology 1Educational Technology 1
Educational Technology 1Angelica Vargas
 
How to avoid plagiarism on your blog {Research Paper}
How to avoid plagiarism on your blog {Research Paper}How to avoid plagiarism on your blog {Research Paper}
How to avoid plagiarism on your blog {Research Paper}JigneshPanchasara
 
4. referencing not plagiarising presentation (1)
4. referencing not plagiarising presentation (1)4. referencing not plagiarising presentation (1)
4. referencing not plagiarising presentation (1)Khendle Christie
 
Know it: Plagiarism,Netiquette.and Copyrighting
Know it: Plagiarism,Netiquette.and CopyrightingKnow it: Plagiarism,Netiquette.and Copyrighting
Know it: Plagiarism,Netiquette.and CopyrightingAmena99
 
Copyright, netiquette, and plagiarism
Copyright, netiquette, and plagiarismCopyright, netiquette, and plagiarism
Copyright, netiquette, and plagiarismJoshua197
 
Plagiarism, Types & Consequences by Dr. Sarita Anand
Plagiarism, Types & Consequences by Dr. Sarita AnandPlagiarism, Types & Consequences by Dr. Sarita Anand
Plagiarism, Types & Consequences by Dr. Sarita AnandDr. Sarita Anand
 
Dpp404plagiarism
Dpp404plagiarismDpp404plagiarism
Dpp404plagiarismMuhd Sayuty
 
Plagarismbykamlesh.pptx
Plagarismbykamlesh.pptxPlagarismbykamlesh.pptx
Plagarismbykamlesh.pptxKamlesh Singh
 
The Power of Originality: Navigating the Ethics of Plagiarism
The Power of Originality: Navigating  the Ethics of PlagiarismThe Power of Originality: Navigating  the Ethics of Plagiarism
The Power of Originality: Navigating the Ethics of PlagiarismDhruvita1
 
Arc Ready Q2 Blended Deck
Arc Ready Q2   Blended DeckArc Ready Q2   Blended Deck
Arc Ready Q2 Blended DeckPhilip Wheat
 
Plagiarism
Plagiarism Plagiarism
Plagiarism fscjopen
 
Design for presentations
Design for presentationsDesign for presentations
Design for presentationsEileen Walsh
 

Similar a The importance of Plagiarism , copyrighting , and Netiquette. (20)

PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTSPLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
 
Public Speaking Ethics
Public Speaking EthicsPublic Speaking Ethics
Public Speaking Ethics
 
Netiquette, Copyright, Plagiarism
Netiquette, Copyright, PlagiarismNetiquette, Copyright, Plagiarism
Netiquette, Copyright, Plagiarism
 
How to Behave on the Web
How to Behave on the WebHow to Behave on the Web
How to Behave on the Web
 
Educational Technology 1
Educational Technology 1Educational Technology 1
Educational Technology 1
 
How to avoid plagiarism on your blog {Research Paper}
How to avoid plagiarism on your blog {Research Paper}How to avoid plagiarism on your blog {Research Paper}
How to avoid plagiarism on your blog {Research Paper}
 
4. referencing not plagiarising presentation (1)
4. referencing not plagiarising presentation (1)4. referencing not plagiarising presentation (1)
4. referencing not plagiarising presentation (1)
 
Know it: Plagiarism,Netiquette.and Copyrighting
Know it: Plagiarism,Netiquette.and CopyrightingKnow it: Plagiarism,Netiquette.and Copyrighting
Know it: Plagiarism,Netiquette.and Copyrighting
 
Copyright, netiquette, and plagiarism
Copyright, netiquette, and plagiarismCopyright, netiquette, and plagiarism
Copyright, netiquette, and plagiarism
 
Plagiarism, Types & Consequences by Dr. Sarita Anand
Plagiarism, Types & Consequences by Dr. Sarita AnandPlagiarism, Types & Consequences by Dr. Sarita Anand
Plagiarism, Types & Consequences by Dr. Sarita Anand
 
Case 2.01 Citing Textual Evidence
Case 2.01 Citing Textual EvidenceCase 2.01 Citing Textual Evidence
Case 2.01 Citing Textual Evidence
 
Dpp404plagiarism
Dpp404plagiarismDpp404plagiarism
Dpp404plagiarism
 
Plagarismbykamlesh.pptx
Plagarismbykamlesh.pptxPlagarismbykamlesh.pptx
Plagarismbykamlesh.pptx
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
The Power of Originality: Navigating the Ethics of Plagiarism
The Power of Originality: Navigating  the Ethics of PlagiarismThe Power of Originality: Navigating  the Ethics of Plagiarism
The Power of Originality: Navigating the Ethics of Plagiarism
 
Essay About What Is Plagiarism
Essay About What Is PlagiarismEssay About What Is Plagiarism
Essay About What Is Plagiarism
 
Arc Ready Q2 Blended Deck
Arc Ready Q2   Blended DeckArc Ready Q2   Blended Deck
Arc Ready Q2 Blended Deck
 
Plagiarism
Plagiarism Plagiarism
Plagiarism
 
Design for presentations
Design for presentationsDesign for presentations
Design for presentations
 
Online Branding
Online BrandingOnline Branding
Online Branding
 

Último

Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 

Último (20)

Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 

The importance of Plagiarism , copyrighting , and Netiquette.

  • 1. By : Alexius Hedgepeth
  • 2. Today in class you will be learning about Plagiarism, Copyrighting, and Netiquette Pay ATTENTION !!!!!!!!! At the end of this power point you will have to take a pop quiz based on what you’ve seen or learned about Plagiarism, Copywriting, and Netiquette.
  • 3. What is Plagiarism ? Plagiarism is when you are presenting other’s work or ideas claimed as your own. Plagiarism is very obvious .
  • 4. How to avoid Plagiarism ? • You must identify the author of the information and ideas . • Use quotation marks to directly state the authors ideas. • Accurate notes could be taken on where you found the specific information . • Make it CLEAR on WHO said WHAT . • Cite your sources . • Know how to paraphrase . A paraphrase is a restatement in your own words while using someone else's ideas. • Make sure you evaluate your sources. • If you get caught plagiarizing you might have to pay a fine.
  • 5. Citing Citing is noting the paraphrase or note as the proof .There’s a rule you could use which is : “If you knew a piece of information before you started doing research, generally you do not need to credit it.” You also do not need to cite well-known facts, such as dates. All other information such as quotations, statistics, and ideas should always be cited in your papers.
  • 6. What is Copywriting ? • Copywriting is when a person is employed to write advertising . • Copywriting is the use of words to promote someone’s business or idea. • It can include plain text messages, and a variety of other online media.
  • 7. The MAIN purpose of Copyrighting The main purpose of copywriting is to persuade the reader somehow, whether if its to click on a link, or buying a product.
  • 8. Netiquette “A philosophy of effective internet communication that utilizes common conventions and forms as a guide for rules and standards.”
  • 9. Basic Rules of Netiquette Be abrupt. Be common with Relate to yourself. the things you say. When you want to prominence a word Don’t say anything , do not use ALL inappropriate. CAPS.
  • 10. Importance of Netiquette P-R-O-O-F-R-E-A-D. At ALL times be careful what you say. Pay attention to formatting. Use your judgments with attachments.
  • 11. Types of Netiquette These are the types of Netiquette “Netiquette of sending.” “Netiquette of “Netiquette of “Netiquette basics.” replying.” confidentially.”
  • 12. Closing Just by viewing this slide you may have learned new things about Plagiarism, Copyrighting, and Netiquette. Now you will have a short quiz . Ready???? Hope you were paying attention. Time to Test Your Knowledge!!
  • 13. 1. What is one type of Plagiarism? (a) word-for-word (b)copyright (c) thief 2. How could you prevent Plagiarism? (a)identify yourself (b)identify the author (c) cite where it was created 3. Why do you think people copyright? (a)To earn money (b)They can (c)To get credit 4. Why is Netiquette important? (a)To keep peace on the internet (b) To search across the world (c)To communicate with others
  • 15. References Faculty Guide to Plagiarism : Background , Policy , Detection , Prevention (2010). http://library.austincc.edu/gen-info/facplagiarism.htm Plagiarism: How can you avoid plagiarism ?(n.d.) http://tilt.library.skagit.edu/module4/plagiarism.htm Preventing Plagiarism: Student Resources (n.d.) http:// www.plagiarism.org Internet Marking Definitions: Copywriting (n.d.) http://www.internetmarketingdefinitions.com/Copywriting The Copywriter Crucible: Clear persuasive Copywriting (n.d.) http://copywriterscrucible.com/ Energise2-0: Sharing is “Cool” : Plagiarism is Not (2011). http://energise2-0.com/2011/06/16/sharing-is-%E2%80%98cool%E2%80%99-plagiarism-is-not/ ASD-News-Other Views : ASD Class Views(2010) http://hercasd.blogspot.com/2010/04/asd-class-sizes.html TOW5-:Avoiding Plagiarism(2010) http://bp00034.wordpress.com/2010/10/26/tow5-avoiding-plagiarism/