Free Essay

Case Letter

In:

Submitted By chickadeeg
Words 285
Pages 2
Katrina’s Case Letter

Katrina,
I have recently viewed your essay and have noted signs of plagiarism. Although you were stating facts in the certain paragraph about Middle English, your paraphrasing was done poorly. By using explicit language and sentence structure taken from C. Hugh Holman’s A Handbook to Literature, the paragraph you constructed was comprised of another person’s words. However, this could have been avoided if you either cited or quoted C. Hugh Holman’s Handbook to Literature, or paraphrased using your own language. For future reference, if you like the way someone has written something and do not know how to properly paraphrase it, simply quote it word for word, giving credibility to the author. Another option is to write down your notes in your own language and sentence structure to ensure correct paraphrasing. In your case, when summarizing facts, such as dates, shorten your version from the original and pay close attention to the key ideas instead of how it was worded.
Granting all this, I do believe this was an act of unintentional plagiarism, as you did attempt to restructure the original paragraph and were merely not aware that by using another person’s ideas, you were committing this deed. However, this would have been much more serious if you had committed intentional plagiarism, meaning that you took word for word of someone else’s work and are aware of it. Both unintentional and intentional plagiarism is seen as threads of academic dishonesty and can result in automatic zeros and even expulsion. It is very important that you do not take credit for someone else’s work, as you will most likely become eligible for the following consequences I recently stated in the future.
-Ms. Smith

Similar Documents

Premium Essay

Case Study a Letter to the Manager

...Case Study (Chapter 1, page 17) Question 1 What are the real problems that the customer is highlighting? Firstly, the problem that customer highlighting is automatic debiting the customer account by way of penalty. This action cause the customer has to rethink his errant financial way. The bank should having a notice or inform to their customers before debiting any penalty. This may cause many of customers that face the financial problem to fall into difficulty. Besides, the customer notices he cannot contact to employee over the time. The customers are confronted by the impersonal ever-changing, pre-recorded, faceless entity which the bank has become. The customers want to deal with a flesh and blood person but not the automated voice phone system. This impersonal conversation will make customer loss of confident about what the customer inquire. Moreover, customer will get charge for the advertising material sent by bank. It charges for $2.00 per page customer read. For the bank nominated contact, that will be billed at $5 per minute. Bank should be let the customer know early for the reading fees or ask for customer permission whether having interest about the advertising material. If not, bank should not send to them. This may causes the customer read on it unconsciously. To helping the customer, customer service should not be charge. Lastly, the problem is the automated voice phone system of the bank. The customer contact to the bank need to go through very long...

Words: 501 - Pages: 3

Free Essay

What

...Capitalization Rules Capitalization is the writing of a word with its first letter in uppercase and the remaining letters in lowercase. Experienced writers are stingy with capitals. It is best not to use them if there is any doubt. Rule 1. Capitalize the first word of a document and the first word after a period. Rule 2. Capitalize proper nouns—and adjectives derived from proper nouns. Examples: the Golden Gate Bridge the Grand Canyon a Russian song a Shakespearean sonnet a Freudian slip With the passage of time, some words originally derived from proper nouns have taken on a life, and authority, of their own and no longer require capitalization. Examples: herculean (from the ancient-Greek hero Hercules) quixotic (from the hero of the classic novel Don Quixote) draconian (from ancient-Athenian lawgiver Draco) The main function of capitals is to focus attention on particular elements within any group of people, places, or things. We can speak of a lake in the middle of the country, or we can be more specific and say Lake Michigan, which distinguishes it from every other lake on earth. Capitalization Reference List * Brand names * Companies * Days of the week and months of the year * Governmental matters Congress (but congressional), the U.S. Constitution (but constitutional), the Electoral College, Department of Agriculture. Note: Many authorities do not capitalize federal orstate unless it is part of the official title: State Water Resources Control...

Words: 1896 - Pages: 8

Free Essay

Bbb Fg Bhghh Hgggg

...             Dr. Sabah Mohammed, Department of Computer Science, ATAC 5013, Tel: 3438777 Email: sabah.mohammed@lakeheadu.ca    (1) You can install EMACS, XEMACS or AQAMACS Windows Example: Emacs-23-CvsP090226-EmacsW32-1.58.exe From: http://ourcomments.org/Emacs/EmacsW32.html#download Or http://www.gnu.org/software/emacs/ Mac Example: http://aquamacs.org/download.shtml (2) You need to change your Environment Variable: Example: In Windows XP, right-click on \My Computer", go to \Properties", \Advanced". Click on \Environment Variables". Click on \New" and add a variable with the name \OZEMACS" and the value \c:\Program Files\XEmacs\XEmacs-21.4.6\i586-pc-win32\xemacs.exe", both without the quotation marks. Then \OK" all those windows, and try \Start"!\All Programs"!\Mozart"!\Oz Programming Interface" again.    Declarative programming is a programming paradigm that expresses the logic of a computation without describing its control flow. Declarative programming is often defined as any style of programming that is not imperative A program that describes what computation should be performed and not how to compute it.      Any programming language that lacks side effects (or more specifically, is referentially transparent) A language with a clear correspondence to mathematical logic. Declarative programming is an umbrella term that includes a number of better-known programming paradigms (i.e. Functional + Logic Programming)...

Words: 2412 - Pages: 10

Free Essay

Asdf

...Computer Science Chapter 1: Introduction to Computer Hardware Different Categories of Computer and Computing Devices Tablets The lightest and most portable Touch interface, good for “light” work Laptops/Notebooks Larger display area; adds CD or DVD as well as physical keyboard They are portable; price for performance is not as good as desktop, choice of hardware is limited Specialized Variant Laptops Ultrabooks Thinner, and lighter than laptops Cost is higher than laptop (all hardware being equal) Netbooks Cheaper more portable laptop that is smaller and has a lower quality display and overall less powerful hardware Much less common than tablets today Desktop Computers Everything is separate (monitor, computer, keyboard, etc); this allows you to mix and match and customize your desktop computer, at the cost of increased complexity (some compatibility issues may arise – not everything works together) and decreased portability. Larger ‘footprint’ (More space is required, but this allows for increase expandability) ------------------------------------------------- Reduced costs/more options (compared to laptops) ------------------------------------------------- The purpose of an operating system is to run the computer. The operating system determines the interface of a computer, its configurability, and its security. In general, due to popularity and tweak-ability, the MS-WINDOWS (PC) OS has more viruses than the MAC OS. In general, the MAC OS...

Words: 3669 - Pages: 15

Free Essay

Help

...A naming convention is important when working with databases in order to provide a clear structure and format; especially in team environments. By using these conventions the database can be understood by anyone applying these conventions; thus increasing maintainability. These are not rules but guidelines that can be adapted to any working environment. All names should be in camelcase with the first letter in lower case. Separate name parts by using camel case and NOT underscores or spaces. This provides better readability and you will not have to use quotes when doing SQL statements. Prefixes or namespaces are the ONLY parts of names that should be separated by underscores. This defines a clear separation between names and areas. Do not use numbers in names. This is poor design, indicating divided table structures. Do not use dot (.) separator between names, remember use camel casing. This way you will avoid problems when doing SQL statements as fields are accessed using dot notation. It goes without saying, do not use reserved database words in any name. Always try to use names that make sense and are descriptive of their purpose. Avoid abbreviations whenever possible. ONLY use abbreviations that are well known and documented. Avoid acronyms whenever possible. Only use acronyms that are well known and documented. Also, they should all be in uppercase if used. Tables are usually entity you are modeling for persistence. So make sure the names are in proper English and carry natural...

Words: 271 - Pages: 2

Free Essay

Unit 3 Assignment 1

...Assignment Requirements 1. Look up other database-naming conventions. Is there one that makes the most sense to you? Explain why. 2. Look for Entity Relation Diagrams. What other ways of diagramming entities and relations did you find? Describe any similarities and differences between them. Solutions 1. A naming convention is important when working with databases in order to provide a clear structure and format; especially in team environments. By using these conventions the database can be understood by anyone applying these conventions; thus increasing maintainability. These are not rules but guidelines that can be adapted to any working environment. All names should be in camelcase with the first letter in lower case. Separate name parts by using camel case and NOT underscores or spaces. This provides better readability and you will not have to use quotes when doing SQL statements. Prefixes or namespaces are the ONLY parts of names that should be separated by underscores. This defines a clear separation between names and areas. Do not use numbers in names. This is poor design, indicating divided table structures. Do not use dot (.) separator between names, remember use camel casing. This way you will avoid problems when doing SQL statements as fields are accessed using dot notation. It goes without saying, do not use reserved database words in any name. Always try to use names that make sense and are descriptive of their purpose. Avoid abbreviations whenever possible...

Words: 625 - Pages: 3

Premium Essay

Assignment 2 Technical Writing

...statements 1–5 are TRUE or FALSE by writing T or F in the blank. 1. _______ Most workplace documents are created by individuals working alone. 2. _______ Technical documents are almost always designed for expert readers. 3. _______ Effective communicators “let the data speak for themselves.” 4. _______ The more you advance in your profession the more your ability to communicate is likely to become essential. 5. _______ Direct, straightforward communication is valued by all cultures. 6. _______ Electronic communication is replacing paper documents in the workplace. Complete the following statement. 7. A computer can transmit data, but it cannot give ___________________ to the information. In items 8–10, choose the letter of the expression that best completes each statement. 8. _______ A technical document focuses on (a) the needs of the audience, (b) the writer’s feelings, (c) both the needs of the audience and the writer’s feelings, (d) marketing, or (e) none of these. 9. _______ An effective technical document is based on (a) intuition, (b) usable information, (c) the writer’s deepest impressions, (d) inspiration, or (e) none of these. 10. _______ The information in a technical document must be (a) entertaining, (b) accessible, (c) confidently judgmental, (d) prosaic, or (e) none of these. Chapter 2 Quiz Indicate whether statements 1–7 are TRUE or FALSE by writing T or F in the blank. 1. _______ Primary and secondary audiences read...

Words: 909 - Pages: 4

Premium Essay

Cosmo The Cougar Research Paper

...Cosmo the Cougar is not a normal mascot. Cosmo is best known for his insane dance moves. Cosmo went viral after his dance to the song “Rolex by Ayo and Teo” with the “cougarettes” (Birgham cheerleaders) by his side. The dance has over 1 million views on facebook and he is now known across the internet for his dance moves (Larimer). He is so popular many people believe he could be in the Mascots Hall of Fame. The Mascot Hall of Fame is an organisation, they nominate mascots that do good deeds and have amazing performances. The building is opening later this year and will be a big tourist spot and a place for children to have fun. In order for a mascot to get in the hall of fame it has to be voted on by the leaders. People are able to submit ideas to the leaders for them to vote on (“Mascot Hall of Fame”). Not only is Cosmo the Cougar an amazing dancer, but he can do amazing tricks too. Cosmo would be great for the mascot hall of fame. He is spectacular with kids and he loves to entertain people. This cougar does many things and he amazes the audience every time. Although some might argue that Cosmo has a “freakishly large head”, Cosmo the Cougar should probably be in the Mascots Hall of Fame because he has outstanding performances, an amazing ability to interact with the community, a huge impact on sports, a super fun and unique costume, and a kid-friendly manner. Cosmo the Cougar, the mascot for Brigham Young University (BYU), has had many breathtaking performances. As a general...

Words: 1270 - Pages: 6

Free Essay

Business Management Guide

...These fonts to be same as title fonts from: www.striiiipes.com – Colour to match the logo/map These fonts to be same as title fonts from: www.striiiipes.com – Colour to match the logo/map White background with logo in retro style White background with logo in retro style LOGO SHOP ABOUT CONTACT This Map image needs to be transparent background and keep same (sepia) colour or black and white of the countries. Each country listed below needs to link through to products from that country This Map image needs to be transparent background and keep same (sepia) colour or black and white of the countries. Each country listed below needs to link through to products from that country UNIQUE PRODUCTS FROM AROUND THE GLOBE These maps to be transparent and same colour (either sepia or B/W) as map above Each country listed below needs to link through to products from that country These maps to be transparent and same colour (either sepia or B/W) as map above Each country listed below needs to link through to products from that country LOCALES: NZ NZ CA CA AU AU JP JP GB GB US US General Instructions: 1. Simple webstore with white back ground and not too many colours – retro feel (either black and white and or a bit of sepia) 2. Logo for to have a retro feel and match main map 3. The products for this store are actually for sale on Amazon.com and will not sell though this store so no need for a cart or payment functions. There...

Words: 486 - Pages: 2

Premium Essay

Norms

...Lakisha Wilson OP-276 Chapter 1-PG.3 (English & Word Usage) 1. Dr. Cindy Boswick will be presenting the program on ethics at our April meeting of IAAP. Rule: Use standard abbreviations for titles immediately before proper names. Use periods in abbreviations before the name. 2. Rev. Jacob Mathias spoke at the evening service of Forest Hills Presbyterian Church. Rule: Use standard abbreviations for titles immediately before proper names.Use periods in abbreviations before the name. 3. The concert will be at 3 p.m. Rule: Use only one period when an abbreviation containing a period falls at the end of the sentence. 4. The company is located at West Apple Lane. Rule: Avoid abbreviating the following categories of words unless these words appear in tabulations or enumerations. Compass directions when they are part of an address. 5. The Hon. Eleanor Isenberg will speak at the commencement. Rule: Use standard abbreviations for titles immediately before proper names. Spell out titles such as Reverend and Honorable when preceded by the. 6. AT&T has expanded its operations. Rule: When an abbreviation includes an ampersand, generally, do not space before or after the ampersand. 7. We are scheduled to take an IQ test tomorrow. Rule: Use the article a before an abbreviation beginning with a consonant sound. Use the article an before an abbreviation beginning with a vowel sound. 8. The game is scheduled to take place March 15. ...

Words: 726 - Pages: 3

Free Essay

How Technology Has Changed Our Language

...ago, the word “tweet” referred simply to something that birds do. Now it is also used to represent the process of posting a 140 character message on the social network Twitter.  Social media’s been responsible for a lot of new words, for example tweeps, twitterverse and retweet. The word “friend” has become a verb, as in “she friended me on Facebook”. The term “check-in” no longer applies just to hotels and airports; these days it’s just as commonly used when someone reports where they are via a social network. Technology has also changed the way we write. Mobile phones have been responsible for a lot of the change, as users have moved towards texting as an everyday form of communication. For a start, WRITING IN UPPER CASE MEANS YOU’RE SHOUTING, while lower case writing is now the accepted form. Meanwhile, text language is full of abbreviations, missing vowels and acronyms. For example, the abbreviations LOL, OMG and gr8 are all widely used today but hadn’t been invented a few years ago. One of the drivers in this is that screen sizes and character limits are low, meaning that users need to abbreviate to fit their messages in. My Knowledge: ‘Emojis’ which are small digital images and ‘emoticons’ which are representation of a facial expression such as a smile or frown, formed by various combinations of keyboard characters are also now used because of technology. Their main purpose is to show how someone is feeling and their emotions rather than a person typing out how they are...

Words: 324 - Pages: 2

Free Essay

Graphology

...businessballs handwriting quick self-test graphology explanation Graphology is the study of handwriting, which for hundreds of years has been recognized as being unique to each individual. Through the centuries, starting with Suetonius, the Roman historian, scholars like Shakespeare and Walter Scott believed that personality is reflected in the style of writing. The scientific establishment began to compile evidence and theories proving this as early as the 17th century. Early work in Italy and France was taken forward in Germany, and the basis of today’s methods were set down during the 19th and early 20th centuries. This makes graphology a relatively new science, which perhaps explains why many remain sceptical. The term ’graphology’ was first used by the Frenchman Michon in 1875, from the Greek ‘grapho’ meaning I write, and ‘logos’ meaning theory. Graphology is now widely used in fields ranging from education, recruitment and human resources, to criminal psychology and illness diagnosis. Further reading on the subject is available in many books including: What your handwriting reveals Manual of Graphology Character indicated by handwriting The psychology of handwriting P’s and Q’s Self-knowledge through handwriting M Gullan Whur E Singer R Baughan R Saudek J Meyer H Jacoby Aquarian Press Treasure Press Upcott Gill Allen & Unwin Geoffrey Bles Dent & Sons At its most complex, graphology is a large and dynamic subject. At its basic level however, it is relatively easy to understand...

Words: 1644 - Pages: 7

Free Essay

Experimental Study

...Word Formulation 1 Effects of the Presence of Flashcards with Jumbled Letters to the Word Formulation of Grade 3 Pupils in Sta. Cruz Elementary School, Sto. Tomas, Batangas Joyce Trissia B. Mendoza Aliza Joana D. Cuenca PSY 106, BS Psychology 321 Mrs. Marjorie S. Villa Word Formulation 2 Abstract This experiment looked at the Effects of the Presence of Flashcards with Jumbled Letters to the Word Formulation. The participants has a total population of 48 Grade 3 pupils at Sta. Cruz Elementary School in Sto. Tomas, Batangas. The population is divided into two groups by randomization: 24 pupils in the control group and 24 pupils in the experimental group since the researchers used the between subjects design. The control group received the normal way of giving spelling activity, the oral dictation of words. The experimental group received also the oral dictation of words but they are also shown flashcards with jumbled letters of the words that are being spelled. The computed value of t was – 1.7 and is less than the tabular value, 2.021 with df of 46 and the α of .05. This means that the presence of flashcards with jumbled letters has no significant effect on the word formulation of Grade 3 pupils. Word Formulation 3 Methodology This experiment was conducted at Sta. Cruz Elementary School in Sta. Cruz, Sto. Tomas, Batangas. The subjects of the experiment were taken from the total population of 48 pupils of Grade 3. They were randomly divided into two...

Words: 3022 - Pages: 13

Premium Essay

Miss

...Unit 2 Research Assignment 1 The variable naming rules for VB are: o Must be one word, no spaces o Punctuation characters are avoided o The character cannot be a number o Name a variable something that indicates what may be stored in it o camelCase can be used Python Variable Naming Rules: o Must begin with a letter (a - z, A - B) or underscore (_). o Other characters can be letters, numbers or _ only. o Variable names are Case Sensitive. o There are some reserved words which we cannot use as a variable name because Python uses them for other things. These are :and,del,from,not,while,as,elif,global,or,with,assert,else,if,pass,yield,break,except,import,print,break,except,import, print,class,exec,in,raise,class,exec,in,raise,continue,finally,is,return,continue,finally,is,return,def,for,lambda . http://www.programmr.com/index.php?q=python-variable-naming-rules o Variable names are case-sensitive. A variable's name can be any legal identifier — an unlimited-length sequence of Unicode letters and digits, beginning with a letter, the dollar sign "$", or the underscore character "_". The convention, however, is to always begin your variable names with a letter, not "$" or "_". Additionally, the dollar sign character, by convention, is never used at all. You may find some situations where auto-generated names will contain the dollar sign, but your variable names should always avoid using it. A similar convention exists for the underscore character;...

Words: 564 - Pages: 3

Free Essay

Tft2 Task1

...Security Policy Cyberlaw, Regulations, and Compliance – TFT2 Task 1   Introduction: Heart-Healthy Insurance is currently evaluating their current security policy and have requested some changes to the policy concerning adding new users and the password requirements for the users. The end goal of the requested changes is to satisfy several compliance regulations that are required by law for their business. The regulations that need to be considered are: 1. PCI-DSS (Payment Card Industry Data Security Standard) 2. HIPAA (Health Insurance Privacy and Portability Act) 3. GLBA (Gramm-Leach-Bliley Act) 4. HITECH (Health Information Technology for Economic and Clinical Health Act) 5. HHS (US. Department of Health and Human Services) New Users: The current directive for new users from the standing security policy states: “New users are assigned access based on the content of an access request. The submitter must sign the request and indicate which systems the new user will need access to and what level of access will be needed. A manager’s approval is required to grant administrator level access.” In evaluating the current policy this standard creates a lot of overhead and administration works for the users and the admins. The new users who are not already familiar with the systems must provide a list of machines that they require access too. Being so new they may not know all of the systems they would need on a day to day basis. This also rolls over...

Words: 1129 - Pages: 5