SlideShare a Scribd company logo
1 of 8
Download to read offline
Item 1
In the case below, the original source material is given along with a sample of student work.
Determine the type of plagiarism by clicking the appropriate radio button.
Original Source Material
Student Version
While solitary negative reactions or unjustified suggestions for change have the potential to
dissipate discourse rather than build it, the pattern analysis shows that the anonymous condition
seemed to provide a safe explorative space for learners to try out more reasons for their multiple
solutions. Teachers will rarely give anonymous feedback, but the experience of giving
anonymous feedback may open a social space where learners can try out the reasons for their
suggestions.
References:
Howard, C. D., Barrett, A. F., & Frick, T. W. (2010). Anonymity to promote peer feedback: Pre-
service teachers' comments in asynchronous computer-mediated communication. Journal of
Educational Computing Research, 43(1), 89-112.
Teachers don't often provide feedback anonymously, but the ability to provide feedback
anonymously may create a context where the rationale associated with specific suggestions can
be more safely explored (Howard, Barrett, & Frick, 2010). However, we cannot assume that all
anonymous online spaces will serve as safe social spaces.
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 2
In the case below, the original source material is given along with a sample of student work.
Determine the type of plagiarism by clicking the appropriate radio button.
Original Source Material
Student Version
But what are reasonable outcomes of the influence of global processes on education? While the
question of how global processes influence all aspects of education (and who controls these
forces) is multidimensional and not completely testable, there appear to be some theories of
globalization as it relates to education that can be empirically examined.
References:
Rutkowski, L., & Rutkowski, D. (2009). Trends in TIMSS responses over time: Evidence of
global forces in education? Educational Research and Evaluation, 15(2), 137-152.
The authors are not alone in asking “what are reasonable outcomes of the influence of global
processes on education?” (p. 138). In fact, this same question provides the basis for the
discussion that follows.
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 3
In the case below, the original source material is given along with a sample of student work.
Determine the type of plagiarism by clicking the appropriate radio button.
Original Source Material
Student Version
Merck, in fact, epitomizes the ideological nature--the pragmatic idealism--of highly visionary
companies. Our research showed that a fundamental element in the "ticking clock" of a
visionary company is a core ideology--core values and a sense of purpose beyond just making
money--that guides and inspires people throughout the organization and remains relatively fixed
for long periods of time.
References:
Collins, J. C., & Porras, J. I. (2002). Built to last: Successful habits of visionary companies. New
York, NY: Harper Paperbacks.
Research conducted by Collins and Porras (2002) highlights the importance of establishing and
committing to an ideology comprised of two parts: (1) core values; (2) a core purpose. In my
personal experience it seems easier to define a core ideology than to live it consistently.
References:
Collins, J. C., & Porras, J. I. (2002). Built to last: Successful habits of visionary companies. New
York, NY: Harper Paperbacks.
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 4
In the case below, the original source material is given along with a sample of student work.
Determine the type of plagiarism by clicking the appropriate radio button.
Original Source Material
Student Version
The concept of systems is really quite simple. The basic idea is that a system has parts that fit
together to make a whole; but where it gets complicated - and interesting - is how those parts are
connected or related to each other.There are many kinds of systems: government systems, health
systems, military systems, business systems, and educational systems, to name a few.
References:
Frick, T. (1991). Restructuring education through technology.Bloomington, IN: Phi Delta Kappa
Educational Foundation.
The fundamental idea of systems, such as corporations and schools, is actually very simple. Each
system has components which interact. What is important is how those components are
connected together.
References:
Frick, T. (1991). Restructuring education through technology.Bloomington, IN: Phi Delta Kappa
Educational Foundation.
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 5
In the case below, the original source material is given along with a sample of student work.
Determine the type of plagiarism by clicking the appropriate radio button.
Original Source Material
Student Version
Other major issues involve the accepted methods by which fidelity is measured. There are two
major methods described in the literature for fidelity measurement. The first is through
mathematical measurement that calculates the number of identical elements shared between the
real world and the simulation; the greater the number of shared identical elements, the higher the
simulation fidelity. A second method to measure fidelity is through a trainees' performance
matrix.
References:
Liu, D., Blickensderfer, E. L., Macchiarella, N. D., & Vincenzi, D. A. (2009). Simulation
fidelity. In D. A. Vincenzi, J. A. Wise, M. Mouloua & P. A. Hancock (Eds.), Humanfactors in
simulation and training (pp. 61-73). Boca Raton, FL: CRC Press.
Liu et al. (2009) identified two major methods for measuring fidelity. The first is a mathematical
(objective) method that requires counting "the number of identical elements shared between the
real world and the simulation; the greater the number of shared identical elements, the higher the
simulation fidelity" (p. 62). The second method involves a performance matrix that compares a
human's performance in the simulation with that person's real-world performance, producing an
indirect measure of fidelity.
References:
Liu, D., Blickensderfer, E. L., Macchiarella, N. D., & Vincenzi, D. A. (2009). Simulation
fidelity. In D. A. Vincenzi, J. A. Wise, M. Mouloua & P. A. Hancock (Eds.), Humanfactors in
simulation and training (pp. 61-73). Boca Raton, FL: CRC Press.
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 6
In the case below, the original source material is given along with a sample of student work.
Determine the type of plagiarism by clicking the appropriate radio button.
Original Source Material
Student Version
I accept the point that whenever learning occurs, some medium or mix of media must be present
to deliver instruction. However, if learning occurs as a result of exposure to any media, the
learning is caused by the instructional method embedded in the media presentation. Method is
the inclusion of one of a number of possible representations of a cognitive process or strategy
that is necessary for learning but which students cannot or will not provide for themselves.
References:
Clark, R. E. (1994). Media will never influence learning. Educational technology research and
development, 42(2), 21-29.
Media do not influence learning. Learning takes place because of the instructional methods
represented in the medium which are used, rather than medium itself. It is the instructional
methods which influence learning.
References:
Clark, R. E. (1994). Media will never influence learning. Educational technology research and
development, 42(2), 21-29.
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 7
In the case below, the original source material is given along with a sample of student work.
Determine the type of plagiarism by clicking the appropriate radio button.
Original Source Material
Student Version
Learning is a complex set of processes that may vary according to the developmental level of the
learner, the nature of the task, and the context in which the learning is to occur. As already
indicated, no one theory can capture all the variables involved in learning.
References:
Gredler, M. E. (2001). Learning and instruction: Theory into practice (4th Ed.). Upper Saddle,
NJ: Prentice-Hall.
A learning theory, there, comprises a set of constructs linking observed changes in performance
with what is thought to bring about those changes.
References:
Driscoll, M. P. (2000). Psychology of learning for instruction (2nd Ed.). Needham Heights, MA:
Allyn & Bacon.
A learning theory is made up of "a set of constructs linking observed changes in performance
with whatever is thought to bring about those changes" (Driscoll, 2000). Therefore, since
"learning is a complex set of processes that may vary according to the developmental level of
the learner, the nature of the task, and the context in which the learning is to occur, it is apparent
that no one theory can capture all the variables involved in learning" (Gredler, 2001).
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 8
In the case below, the original source material is given along with a sample of student work.
Determine the type of plagiarism by clicking the appropriate radio button.
Original Source Material
Student Version
The concept of systems is really quite simple. The basic idea is that a system has parts that fit
together to make a whole; but where it gets complicated - and interesting - is how those parts are
connected or related to each other. There are many kinds of systems: government systems, health
systems, military systems, business systems, and educational systems, to name a few.
References:
Frick, T. (1991). Restructuring education through technology.Bloomington, IN: Phi Delta Kappa
Educational Foundation.
Systems, including both business systems, and educational systems, are actually very simple.
The main idea is that systems have parts that fit together to make a whole. What is interesting is
how those parts are connected together.
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 9
In the case below, the original source material is given along with a sample of student work.
Determine the type of plagiarism by clicking the appropriate radio button.
Original Source Material
Student Version
In examining the history of the visionary companies, we were struck by how often they made
some of their best moves not by detailed strategic planning, but rather by experimentation, trial
and error, opportunism, and--quite literally--accident. What looks in hindsight like a brilliant
strategy was often the residual result of opportunistic experimentation and "purposeful
accidents."
References:
Collins, J. C., & Porras, J. I. (2002). Built to last: Successful habits of visionary companies. New
York, NY: Harper Paperbacks.
When I look back on the decisions I've made, it's clear that I made some of my best choices not
through a thorough analytical investigation of my options, but instead by trial and error and,
often, simply by accident. The somewhat random aspect of my success or failure is, at the same
time, both encouraging and scary.
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Hints
Item 10
In the case below, the original source material is given along with a sample of student work.
Determine the type of plagiarism by clicking the appropriate radio button.
Original Source Material
The technological tools available today for creating computer-based learning materials are
incredibly more powerful than those introduced just a few years ago. We can make our own
movies with camcorders in our homes; we can publish our own books. Soon teachers and
students will be able to use computer-video technology to produce their own learning materials.
All it takes is time, know-how, and some funds.
References:
Frick, T. (1991). Restructuring education through technology.Bloomington, IN: Phi Delta Kappa
Educational Foundation.
Frick (1991) claimed that computers would become so powerful that K-12 educators and
students would be able to produce their own multimedia and Web-based learning materials. He
predicted that teachers and students would soon be able to use computer-video technology to
produce their own learning materials. All it would require is time, know-how, and some funds.
References:
Frick, T. (1991). Restructuring education through technology.Bloomington, IN: Phi Delta Kappa
Educational Foundation.
Which of the following is true for the Student Version above?
Word-for-Word plagiarism
Paraphrasing plagiarism
This is not plagiarism
Original Source Material
Student Version
While solitary negative reactions or unjustified suggestions for change have the potential to
dissipate discourse rather than build it, the pattern analysis shows that the anonymous condition
seemed to provide a safe explorative space for learners to try out more reasons for their multiple
solutions. Teachers will rarely give anonymous feedback, but the experience of giving
anonymous feedback may open a social space where learners can try out the reasons for their
suggestions.
References:
Howard, C. D., Barrett, A. F., & Frick, T. W. (2010). Anonymity to promote peer feedback:
Pre-service teachers' comments in asynchronous computer-mediated communication. Journal of
Educational Computing Research, 43(1), 89-112.
Teachers don't often provide feedback anonymously, but the ability to provide feedback
anonymously may create a context where the rationale associated with specific suggestions can
be more safely explored (Howard, Barrett, & Frick, 2010). However, we cannot assume that all
anonymous online spaces will serve as safe social spaces.
Solution
It is not Plagiarism because the student writer has cited the reference of source which denotes it
is not a paraphrasing plagiarism and he has not made word to word plagiarism because he has
not directly cited the text by removing annotations and attributions. It can be said as paraphrasing
plagiarism, as the student writer has not cited the attribution and author’s contribution. This is
not plagiarism, as the student writer has cited the authors’ work and has not directly cited the
text. This version is word-for-word plagiarism. The student included a portion of the original
author's work in a sentence without using quotation marks.No citation points to author or to the
reference provided. No credit was given to the original author in the text. This is not plagiarism,
as the student writer has cited the authors’ work and has not directly cited the text. This version
is word-for-word plagiarism. The student included a portion of the original author's work in a
sentence without using quotation marks.No citation points to author or to the reference provided.
No credit was given to the original author in the text. This is not plagiarism, as the student writer
has cited the authors’ work and has not directly cited the text. It can be said as paraphrasing
plagiarism, as the student writer has not cited the attribution and author’s contribution. It can be
said as paraphrasing plagiarism, as the student writer has not cited the attribution and author’s
contribution. This version is word-for-word plagiarism. The student included a portion of the
original author's work in a sentence without using quotation marks. No citation points to author
or to the reference provided. No credit was given to the original author in the text.

More Related Content

Similar to Item 1In the case below, the original source material is given alo.pdf

Synthesis
SynthesisSynthesis
SynthesisLinda
 
Perfectionism As A Multidimensional Personality...
Perfectionism As A Multidimensional Personality...Perfectionism As A Multidimensional Personality...
Perfectionism As A Multidimensional Personality...Camella Taylor
 
What forty years_of_research_says_about__the_impact_of_technology_on_learning...
What forty years_of_research_says_about__the_impact_of_technology_on_learning...What forty years_of_research_says_about__the_impact_of_technology_on_learning...
What forty years_of_research_says_about__the_impact_of_technology_on_learning...Cathy Cavanaugh
 
Running head STUDENT TRANSFER .docx
Running head STUDENT TRANSFER                                  .docxRunning head STUDENT TRANSFER                                  .docx
Running head STUDENT TRANSFER .docxtoltonkendal
 
Item 1In the case below, the original source material is given.docx
Item 1In the case below, the original source material is given.docxItem 1In the case below, the original source material is given.docx
Item 1In the case below, the original source material is given.docxcareyshaunda
 
1. Need all 3 article read and compared answering the questions I .docx
1. Need all 3 article read and compared answering the questions I .docx1. Need all 3 article read and compared answering the questions I .docx
1. Need all 3 article read and compared answering the questions I .docxjackiewalcutt
 
Myths And Misperceptions About Online Learning2
Myths And Misperceptions About Online Learning2Myths And Misperceptions About Online Learning2
Myths And Misperceptions About Online Learning2P Shea
 
Statistics in Art Education
Statistics in Art EducationStatistics in Art Education
Statistics in Art EducationKyle Guzik
 
The Relationship Between Organizational Theory & Behavior Theory
The Relationship Between Organizational Theory & Behavior TheoryThe Relationship Between Organizational Theory & Behavior Theory
The Relationship Between Organizational Theory & Behavior TheoryMaurice Dawson
 
Relation between Learners' Critical Thinking and Their Learning Styles.pptx
Relation between Learners' Critical Thinking and Their Learning Styles.pptxRelation between Learners' Critical Thinking and Their Learning Styles.pptx
Relation between Learners' Critical Thinking and Their Learning Styles.pptxNimaaNaami
 
Running head TECHNOLOGY IN HUMAN EDUCATION 1 Te.docx
Running head TECHNOLOGY IN HUMAN EDUCATION 1 Te.docxRunning head TECHNOLOGY IN HUMAN EDUCATION 1 Te.docx
Running head TECHNOLOGY IN HUMAN EDUCATION 1 Te.docxagnesdcarey33086
 
A Study On Academic Dishonesty And Moral Reasoning
A Study On Academic Dishonesty And Moral ReasoningA Study On Academic Dishonesty And Moral Reasoning
A Study On Academic Dishonesty And Moral ReasoningWhitney Anderson
 
Stewart, benjamin english language educators and technology ije v5 n1 20...
Stewart, benjamin english language educators and technology ije v5 n1 20...Stewart, benjamin english language educators and technology ije v5 n1 20...
Stewart, benjamin english language educators and technology ije v5 n1 20...William Kritsonis
 

Similar to Item 1In the case below, the original source material is given alo.pdf (17)

Synthesis
SynthesisSynthesis
Synthesis
 
Perfectionism As A Multidimensional Personality...
Perfectionism As A Multidimensional Personality...Perfectionism As A Multidimensional Personality...
Perfectionism As A Multidimensional Personality...
 
What forty years_of_research_says_about__the_impact_of_technology_on_learning...
What forty years_of_research_says_about__the_impact_of_technology_on_learning...What forty years_of_research_says_about__the_impact_of_technology_on_learning...
What forty years_of_research_says_about__the_impact_of_technology_on_learning...
 
Coffey_3300_L8-RP
Coffey_3300_L8-RPCoffey_3300_L8-RP
Coffey_3300_L8-RP
 
Running head STUDENT TRANSFER .docx
Running head STUDENT TRANSFER                                  .docxRunning head STUDENT TRANSFER                                  .docx
Running head STUDENT TRANSFER .docx
 
Item 1In the case below, the original source material is given.docx
Item 1In the case below, the original source material is given.docxItem 1In the case below, the original source material is given.docx
Item 1In the case below, the original source material is given.docx
 
1. Need all 3 article read and compared answering the questions I .docx
1. Need all 3 article read and compared answering the questions I .docx1. Need all 3 article read and compared answering the questions I .docx
1. Need all 3 article read and compared answering the questions I .docx
 
Mygg
MyggMygg
Mygg
 
Myths And Misperceptions About Online Learning2
Myths And Misperceptions About Online Learning2Myths And Misperceptions About Online Learning2
Myths And Misperceptions About Online Learning2
 
Statistics in Art Education
Statistics in Art EducationStatistics in Art Education
Statistics in Art Education
 
Research Essay Structure
Research Essay StructureResearch Essay Structure
Research Essay Structure
 
The Relationship Between Organizational Theory & Behavior Theory
The Relationship Between Organizational Theory & Behavior TheoryThe Relationship Between Organizational Theory & Behavior Theory
The Relationship Between Organizational Theory & Behavior Theory
 
Relation between Learners' Critical Thinking and Their Learning Styles.pptx
Relation between Learners' Critical Thinking and Their Learning Styles.pptxRelation between Learners' Critical Thinking and Their Learning Styles.pptx
Relation between Learners' Critical Thinking and Their Learning Styles.pptx
 
Running head TECHNOLOGY IN HUMAN EDUCATION 1 Te.docx
Running head TECHNOLOGY IN HUMAN EDUCATION 1 Te.docxRunning head TECHNOLOGY IN HUMAN EDUCATION 1 Te.docx
Running head TECHNOLOGY IN HUMAN EDUCATION 1 Te.docx
 
A Study On Academic Dishonesty And Moral Reasoning
A Study On Academic Dishonesty And Moral ReasoningA Study On Academic Dishonesty And Moral Reasoning
A Study On Academic Dishonesty And Moral Reasoning
 
754 c2d01
754 c2d01754 c2d01
754 c2d01
 
Stewart, benjamin english language educators and technology ije v5 n1 20...
Stewart, benjamin english language educators and technology ije v5 n1 20...Stewart, benjamin english language educators and technology ije v5 n1 20...
Stewart, benjamin english language educators and technology ije v5 n1 20...
 

More from jaronkyleigh59760

Determine whether the following scenarios is a permutation or a comb.pdf
Determine whether the following scenarios is a permutation or a comb.pdfDetermine whether the following scenarios is a permutation or a comb.pdf
Determine whether the following scenarios is a permutation or a comb.pdfjaronkyleigh59760
 
Define the Replacement Model (complete and partial)Define the Mul.pdf
Define the Replacement Model (complete and partial)Define the Mul.pdfDefine the Replacement Model (complete and partial)Define the Mul.pdf
Define the Replacement Model (complete and partial)Define the Mul.pdfjaronkyleigh59760
 
Create the Java function to receive an ArrayList object. The functio.pdf
Create the Java function to receive an ArrayList object. The functio.pdfCreate the Java function to receive an ArrayList object. The functio.pdf
Create the Java function to receive an ArrayList object. The functio.pdfjaronkyleigh59760
 
ancestral gene Map speciation 1 Similarly colored genes designate gen.pdf
ancestral gene Map speciation 1 Similarly colored genes designate gen.pdfancestral gene Map speciation 1 Similarly colored genes designate gen.pdf
ancestral gene Map speciation 1 Similarly colored genes designate gen.pdfjaronkyleigh59760
 
A red blood cell enters the right common iliac artery. In order, list.pdf
A red blood cell enters the right common iliac artery. In order, list.pdfA red blood cell enters the right common iliac artery. In order, list.pdf
A red blood cell enters the right common iliac artery. In order, list.pdfjaronkyleigh59760
 
Contrast the following types of remote attacks virus, worm, phishin.pdf
Contrast the following types of remote attacks virus, worm, phishin.pdfContrast the following types of remote attacks virus, worm, phishin.pdf
Contrast the following types of remote attacks virus, worm, phishin.pdfjaronkyleigh59760
 
17. Unnithan, Houser, and Fernhall (2006) were interested in whether.pdf
17. Unnithan, Houser, and Fernhall (2006) were interested in whether.pdf17. Unnithan, Houser, and Fernhall (2006) were interested in whether.pdf
17. Unnithan, Houser, and Fernhall (2006) were interested in whether.pdfjaronkyleigh59760
 
Review Questions 5.1 5.2 5.3 5.4 5.5 5.6 What is transmission Distin.pdf
Review Questions 5.1 5.2 5.3 5.4 5.5 5.6 What is transmission Distin.pdfReview Questions 5.1 5.2 5.3 5.4 5.5 5.6 What is transmission Distin.pdf
Review Questions 5.1 5.2 5.3 5.4 5.5 5.6 What is transmission Distin.pdfjaronkyleigh59760
 
write a java program related to Huffman coding.SolutionThe Jav.pdf
write a java program related to Huffman coding.SolutionThe Jav.pdfwrite a java program related to Huffman coding.SolutionThe Jav.pdf
write a java program related to Huffman coding.SolutionThe Jav.pdfjaronkyleigh59760
 
Why do ion channels not function like open poresWhat is membrane .pdf
Why do ion channels not function like open poresWhat is membrane .pdfWhy do ion channels not function like open poresWhat is membrane .pdf
Why do ion channels not function like open poresWhat is membrane .pdfjaronkyleigh59760
 
Which of the following is not an organic molecule C_12 H_9 SO_3.pdf
Which of the following is not an organic molecule  C_12 H_9 SO_3.pdfWhich of the following is not an organic molecule  C_12 H_9 SO_3.pdf
Which of the following is not an organic molecule C_12 H_9 SO_3.pdfjaronkyleigh59760
 
1. The process of an internal employee or outside consultant reviewi.pdf
1. The process of an internal employee or outside consultant reviewi.pdf1. The process of an internal employee or outside consultant reviewi.pdf
1. The process of an internal employee or outside consultant reviewi.pdfjaronkyleigh59760
 
what does the pi signify in statistics I have a Ho and Ha. pi(i.pdf
what does the pi signify in statistics I have a Ho and Ha. pi(i.pdfwhat does the pi signify in statistics I have a Ho and Ha. pi(i.pdf
what does the pi signify in statistics I have a Ho and Ha. pi(i.pdfjaronkyleigh59760
 
what are the changes to IMC strategy a company faces in light of the.pdf
what are the changes to IMC strategy a company faces in light of the.pdfwhat are the changes to IMC strategy a company faces in light of the.pdf
what are the changes to IMC strategy a company faces in light of the.pdfjaronkyleigh59760
 
What factors did the researchers determine prevented the Soay sheep i.pdf
What factors did the researchers determine prevented the Soay sheep i.pdfWhat factors did the researchers determine prevented the Soay sheep i.pdf
What factors did the researchers determine prevented the Soay sheep i.pdfjaronkyleigh59760
 
What are homologous traits Similar traits in different organisms bas.pdf
What are homologous traits Similar traits in different organisms bas.pdfWhat are homologous traits Similar traits in different organisms bas.pdf
What are homologous traits Similar traits in different organisms bas.pdfjaronkyleigh59760
 
There are 102 people consisting of 51 married couples in a room. Ass.pdf
There are 102 people consisting of 51 married couples in a room. Ass.pdfThere are 102 people consisting of 51 married couples in a room. Ass.pdf
There are 102 people consisting of 51 married couples in a room. Ass.pdfjaronkyleigh59760
 
List the necessary steps for the Abiotic origin of life theoryS.pdf
List the necessary steps for the Abiotic origin of life theoryS.pdfList the necessary steps for the Abiotic origin of life theoryS.pdf
List the necessary steps for the Abiotic origin of life theoryS.pdfjaronkyleigh59760
 
ldentify the correct statement(s) regarding threats to independence .pdf
ldentify the correct statement(s) regarding threats to independence .pdfldentify the correct statement(s) regarding threats to independence .pdf
ldentify the correct statement(s) regarding threats to independence .pdfjaronkyleigh59760
 
In your opinion, what is the purpose of a funeral What function doe.pdf
In your opinion, what is the purpose of a funeral What function doe.pdfIn your opinion, what is the purpose of a funeral What function doe.pdf
In your opinion, what is the purpose of a funeral What function doe.pdfjaronkyleigh59760
 

More from jaronkyleigh59760 (20)

Determine whether the following scenarios is a permutation or a comb.pdf
Determine whether the following scenarios is a permutation or a comb.pdfDetermine whether the following scenarios is a permutation or a comb.pdf
Determine whether the following scenarios is a permutation or a comb.pdf
 
Define the Replacement Model (complete and partial)Define the Mul.pdf
Define the Replacement Model (complete and partial)Define the Mul.pdfDefine the Replacement Model (complete and partial)Define the Mul.pdf
Define the Replacement Model (complete and partial)Define the Mul.pdf
 
Create the Java function to receive an ArrayList object. The functio.pdf
Create the Java function to receive an ArrayList object. The functio.pdfCreate the Java function to receive an ArrayList object. The functio.pdf
Create the Java function to receive an ArrayList object. The functio.pdf
 
ancestral gene Map speciation 1 Similarly colored genes designate gen.pdf
ancestral gene Map speciation 1 Similarly colored genes designate gen.pdfancestral gene Map speciation 1 Similarly colored genes designate gen.pdf
ancestral gene Map speciation 1 Similarly colored genes designate gen.pdf
 
A red blood cell enters the right common iliac artery. In order, list.pdf
A red blood cell enters the right common iliac artery. In order, list.pdfA red blood cell enters the right common iliac artery. In order, list.pdf
A red blood cell enters the right common iliac artery. In order, list.pdf
 
Contrast the following types of remote attacks virus, worm, phishin.pdf
Contrast the following types of remote attacks virus, worm, phishin.pdfContrast the following types of remote attacks virus, worm, phishin.pdf
Contrast the following types of remote attacks virus, worm, phishin.pdf
 
17. Unnithan, Houser, and Fernhall (2006) were interested in whether.pdf
17. Unnithan, Houser, and Fernhall (2006) were interested in whether.pdf17. Unnithan, Houser, and Fernhall (2006) were interested in whether.pdf
17. Unnithan, Houser, and Fernhall (2006) were interested in whether.pdf
 
Review Questions 5.1 5.2 5.3 5.4 5.5 5.6 What is transmission Distin.pdf
Review Questions 5.1 5.2 5.3 5.4 5.5 5.6 What is transmission Distin.pdfReview Questions 5.1 5.2 5.3 5.4 5.5 5.6 What is transmission Distin.pdf
Review Questions 5.1 5.2 5.3 5.4 5.5 5.6 What is transmission Distin.pdf
 
write a java program related to Huffman coding.SolutionThe Jav.pdf
write a java program related to Huffman coding.SolutionThe Jav.pdfwrite a java program related to Huffman coding.SolutionThe Jav.pdf
write a java program related to Huffman coding.SolutionThe Jav.pdf
 
Why do ion channels not function like open poresWhat is membrane .pdf
Why do ion channels not function like open poresWhat is membrane .pdfWhy do ion channels not function like open poresWhat is membrane .pdf
Why do ion channels not function like open poresWhat is membrane .pdf
 
Which of the following is not an organic molecule C_12 H_9 SO_3.pdf
Which of the following is not an organic molecule  C_12 H_9 SO_3.pdfWhich of the following is not an organic molecule  C_12 H_9 SO_3.pdf
Which of the following is not an organic molecule C_12 H_9 SO_3.pdf
 
1. The process of an internal employee or outside consultant reviewi.pdf
1. The process of an internal employee or outside consultant reviewi.pdf1. The process of an internal employee or outside consultant reviewi.pdf
1. The process of an internal employee or outside consultant reviewi.pdf
 
what does the pi signify in statistics I have a Ho and Ha. pi(i.pdf
what does the pi signify in statistics I have a Ho and Ha. pi(i.pdfwhat does the pi signify in statistics I have a Ho and Ha. pi(i.pdf
what does the pi signify in statistics I have a Ho and Ha. pi(i.pdf
 
what are the changes to IMC strategy a company faces in light of the.pdf
what are the changes to IMC strategy a company faces in light of the.pdfwhat are the changes to IMC strategy a company faces in light of the.pdf
what are the changes to IMC strategy a company faces in light of the.pdf
 
What factors did the researchers determine prevented the Soay sheep i.pdf
What factors did the researchers determine prevented the Soay sheep i.pdfWhat factors did the researchers determine prevented the Soay sheep i.pdf
What factors did the researchers determine prevented the Soay sheep i.pdf
 
What are homologous traits Similar traits in different organisms bas.pdf
What are homologous traits Similar traits in different organisms bas.pdfWhat are homologous traits Similar traits in different organisms bas.pdf
What are homologous traits Similar traits in different organisms bas.pdf
 
There are 102 people consisting of 51 married couples in a room. Ass.pdf
There are 102 people consisting of 51 married couples in a room. Ass.pdfThere are 102 people consisting of 51 married couples in a room. Ass.pdf
There are 102 people consisting of 51 married couples in a room. Ass.pdf
 
List the necessary steps for the Abiotic origin of life theoryS.pdf
List the necessary steps for the Abiotic origin of life theoryS.pdfList the necessary steps for the Abiotic origin of life theoryS.pdf
List the necessary steps for the Abiotic origin of life theoryS.pdf
 
ldentify the correct statement(s) regarding threats to independence .pdf
ldentify the correct statement(s) regarding threats to independence .pdfldentify the correct statement(s) regarding threats to independence .pdf
ldentify the correct statement(s) regarding threats to independence .pdf
 
In your opinion, what is the purpose of a funeral What function doe.pdf
In your opinion, what is the purpose of a funeral What function doe.pdfIn your opinion, what is the purpose of a funeral What function doe.pdf
In your opinion, what is the purpose of a funeral What function doe.pdf
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Item 1In the case below, the original source material is given alo.pdf

  • 1. Item 1 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version While solitary negative reactions or unjustified suggestions for change have the potential to dissipate discourse rather than build it, the pattern analysis shows that the anonymous condition seemed to provide a safe explorative space for learners to try out more reasons for their multiple solutions. Teachers will rarely give anonymous feedback, but the experience of giving anonymous feedback may open a social space where learners can try out the reasons for their suggestions. References: Howard, C. D., Barrett, A. F., & Frick, T. W. (2010). Anonymity to promote peer feedback: Pre- service teachers' comments in asynchronous computer-mediated communication. Journal of Educational Computing Research, 43(1), 89-112. Teachers don't often provide feedback anonymously, but the ability to provide feedback anonymously may create a context where the rationale associated with specific suggestions can be more safely explored (Howard, Barrett, & Frick, 2010). However, we cannot assume that all anonymous online spaces will serve as safe social spaces. Which of the following is true for the Student Version above? Word-for-Word plagiarism Paraphrasing plagiarism This is not plagiarism Hints Item 2 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version But what are reasonable outcomes of the influence of global processes on education? While the question of how global processes influence all aspects of education (and who controls these forces) is multidimensional and not completely testable, there appear to be some theories of globalization as it relates to education that can be empirically examined. References: Rutkowski, L., & Rutkowski, D. (2009). Trends in TIMSS responses over time: Evidence of
  • 2. global forces in education? Educational Research and Evaluation, 15(2), 137-152. The authors are not alone in asking “what are reasonable outcomes of the influence of global processes on education?” (p. 138). In fact, this same question provides the basis for the discussion that follows. Which of the following is true for the Student Version above? Word-for-Word plagiarism Paraphrasing plagiarism This is not plagiarism Hints Item 3 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version Merck, in fact, epitomizes the ideological nature--the pragmatic idealism--of highly visionary companies. Our research showed that a fundamental element in the "ticking clock" of a visionary company is a core ideology--core values and a sense of purpose beyond just making money--that guides and inspires people throughout the organization and remains relatively fixed for long periods of time. References: Collins, J. C., & Porras, J. I. (2002). Built to last: Successful habits of visionary companies. New York, NY: Harper Paperbacks. Research conducted by Collins and Porras (2002) highlights the importance of establishing and committing to an ideology comprised of two parts: (1) core values; (2) a core purpose. In my personal experience it seems easier to define a core ideology than to live it consistently. References: Collins, J. C., & Porras, J. I. (2002). Built to last: Successful habits of visionary companies. New York, NY: Harper Paperbacks. Which of the following is true for the Student Version above? Word-for-Word plagiarism Paraphrasing plagiarism This is not plagiarism Hints Item 4
  • 3. In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version The concept of systems is really quite simple. The basic idea is that a system has parts that fit together to make a whole; but where it gets complicated - and interesting - is how those parts are connected or related to each other.There are many kinds of systems: government systems, health systems, military systems, business systems, and educational systems, to name a few. References: Frick, T. (1991). Restructuring education through technology.Bloomington, IN: Phi Delta Kappa Educational Foundation. The fundamental idea of systems, such as corporations and schools, is actually very simple. Each system has components which interact. What is important is how those components are connected together. References: Frick, T. (1991). Restructuring education through technology.Bloomington, IN: Phi Delta Kappa Educational Foundation. Which of the following is true for the Student Version above? Word-for-Word plagiarism Paraphrasing plagiarism This is not plagiarism Hints Item 5 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version Other major issues involve the accepted methods by which fidelity is measured. There are two major methods described in the literature for fidelity measurement. The first is through mathematical measurement that calculates the number of identical elements shared between the real world and the simulation; the greater the number of shared identical elements, the higher the simulation fidelity. A second method to measure fidelity is through a trainees' performance matrix. References: Liu, D., Blickensderfer, E. L., Macchiarella, N. D., & Vincenzi, D. A. (2009). Simulation fidelity. In D. A. Vincenzi, J. A. Wise, M. Mouloua & P. A. Hancock (Eds.), Humanfactors in
  • 4. simulation and training (pp. 61-73). Boca Raton, FL: CRC Press. Liu et al. (2009) identified two major methods for measuring fidelity. The first is a mathematical (objective) method that requires counting "the number of identical elements shared between the real world and the simulation; the greater the number of shared identical elements, the higher the simulation fidelity" (p. 62). The second method involves a performance matrix that compares a human's performance in the simulation with that person's real-world performance, producing an indirect measure of fidelity. References: Liu, D., Blickensderfer, E. L., Macchiarella, N. D., & Vincenzi, D. A. (2009). Simulation fidelity. In D. A. Vincenzi, J. A. Wise, M. Mouloua & P. A. Hancock (Eds.), Humanfactors in simulation and training (pp. 61-73). Boca Raton, FL: CRC Press. Which of the following is true for the Student Version above? Word-for-Word plagiarism Paraphrasing plagiarism This is not plagiarism Hints Item 6 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version I accept the point that whenever learning occurs, some medium or mix of media must be present to deliver instruction. However, if learning occurs as a result of exposure to any media, the learning is caused by the instructional method embedded in the media presentation. Method is the inclusion of one of a number of possible representations of a cognitive process or strategy that is necessary for learning but which students cannot or will not provide for themselves. References: Clark, R. E. (1994). Media will never influence learning. Educational technology research and development, 42(2), 21-29. Media do not influence learning. Learning takes place because of the instructional methods represented in the medium which are used, rather than medium itself. It is the instructional methods which influence learning. References: Clark, R. E. (1994). Media will never influence learning. Educational technology research and development, 42(2), 21-29. Which of the following is true for the Student Version above?
  • 5. Word-for-Word plagiarism Paraphrasing plagiarism This is not plagiarism Hints Item 7 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version Learning is a complex set of processes that may vary according to the developmental level of the learner, the nature of the task, and the context in which the learning is to occur. As already indicated, no one theory can capture all the variables involved in learning. References: Gredler, M. E. (2001). Learning and instruction: Theory into practice (4th Ed.). Upper Saddle, NJ: Prentice-Hall. A learning theory, there, comprises a set of constructs linking observed changes in performance with what is thought to bring about those changes. References: Driscoll, M. P. (2000). Psychology of learning for instruction (2nd Ed.). Needham Heights, MA: Allyn & Bacon. A learning theory is made up of "a set of constructs linking observed changes in performance with whatever is thought to bring about those changes" (Driscoll, 2000). Therefore, since "learning is a complex set of processes that may vary according to the developmental level of the learner, the nature of the task, and the context in which the learning is to occur, it is apparent that no one theory can capture all the variables involved in learning" (Gredler, 2001). Which of the following is true for the Student Version above? Word-for-Word plagiarism Paraphrasing plagiarism This is not plagiarism Hints Item 8 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version The concept of systems is really quite simple. The basic idea is that a system has parts that fit
  • 6. together to make a whole; but where it gets complicated - and interesting - is how those parts are connected or related to each other. There are many kinds of systems: government systems, health systems, military systems, business systems, and educational systems, to name a few. References: Frick, T. (1991). Restructuring education through technology.Bloomington, IN: Phi Delta Kappa Educational Foundation. Systems, including both business systems, and educational systems, are actually very simple. The main idea is that systems have parts that fit together to make a whole. What is interesting is how those parts are connected together. Which of the following is true for the Student Version above? Word-for-Word plagiarism Paraphrasing plagiarism This is not plagiarism Hints Item 9 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material Student Version In examining the history of the visionary companies, we were struck by how often they made some of their best moves not by detailed strategic planning, but rather by experimentation, trial and error, opportunism, and--quite literally--accident. What looks in hindsight like a brilliant strategy was often the residual result of opportunistic experimentation and "purposeful accidents." References: Collins, J. C., & Porras, J. I. (2002). Built to last: Successful habits of visionary companies. New York, NY: Harper Paperbacks. When I look back on the decisions I've made, it's clear that I made some of my best choices not through a thorough analytical investigation of my options, but instead by trial and error and, often, simply by accident. The somewhat random aspect of my success or failure is, at the same time, both encouraging and scary. Which of the following is true for the Student Version above? Word-for-Word plagiarism Paraphrasing plagiarism This is not plagiarism Hints
  • 7. Item 10 In the case below, the original source material is given along with a sample of student work. Determine the type of plagiarism by clicking the appropriate radio button. Original Source Material The technological tools available today for creating computer-based learning materials are incredibly more powerful than those introduced just a few years ago. We can make our own movies with camcorders in our homes; we can publish our own books. Soon teachers and students will be able to use computer-video technology to produce their own learning materials. All it takes is time, know-how, and some funds. References: Frick, T. (1991). Restructuring education through technology.Bloomington, IN: Phi Delta Kappa Educational Foundation. Frick (1991) claimed that computers would become so powerful that K-12 educators and students would be able to produce their own multimedia and Web-based learning materials. He predicted that teachers and students would soon be able to use computer-video technology to produce their own learning materials. All it would require is time, know-how, and some funds. References: Frick, T. (1991). Restructuring education through technology.Bloomington, IN: Phi Delta Kappa Educational Foundation. Which of the following is true for the Student Version above? Word-for-Word plagiarism Paraphrasing plagiarism This is not plagiarism Original Source Material Student Version While solitary negative reactions or unjustified suggestions for change have the potential to dissipate discourse rather than build it, the pattern analysis shows that the anonymous condition seemed to provide a safe explorative space for learners to try out more reasons for their multiple solutions. Teachers will rarely give anonymous feedback, but the experience of giving anonymous feedback may open a social space where learners can try out the reasons for their suggestions. References: Howard, C. D., Barrett, A. F., & Frick, T. W. (2010). Anonymity to promote peer feedback: Pre-service teachers' comments in asynchronous computer-mediated communication. Journal of Educational Computing Research, 43(1), 89-112.
  • 8. Teachers don't often provide feedback anonymously, but the ability to provide feedback anonymously may create a context where the rationale associated with specific suggestions can be more safely explored (Howard, Barrett, & Frick, 2010). However, we cannot assume that all anonymous online spaces will serve as safe social spaces. Solution It is not Plagiarism because the student writer has cited the reference of source which denotes it is not a paraphrasing plagiarism and he has not made word to word plagiarism because he has not directly cited the text by removing annotations and attributions. It can be said as paraphrasing plagiarism, as the student writer has not cited the attribution and author’s contribution. This is not plagiarism, as the student writer has cited the authors’ work and has not directly cited the text. This version is word-for-word plagiarism. The student included a portion of the original author's work in a sentence without using quotation marks.No citation points to author or to the reference provided. No credit was given to the original author in the text. This is not plagiarism, as the student writer has cited the authors’ work and has not directly cited the text. This version is word-for-word plagiarism. The student included a portion of the original author's work in a sentence without using quotation marks.No citation points to author or to the reference provided. No credit was given to the original author in the text. This is not plagiarism, as the student writer has cited the authors’ work and has not directly cited the text. It can be said as paraphrasing plagiarism, as the student writer has not cited the attribution and author’s contribution. It can be said as paraphrasing plagiarism, as the student writer has not cited the attribution and author’s contribution. This version is word-for-word plagiarism. The student included a portion of the original author's work in a sentence without using quotation marks. No citation points to author or to the reference provided. No credit was given to the original author in the text.