HIT164 COMPUTING FUNDAMENTALS
Assignment 1: Research Essay
Due Date: Week 7, Friday 11: 59 pm
Length: 1500 words maximum (not including references)
Value: 20% of the total marks for the unit
TASKS
1. Research a few issues in use of IT in a discipline of current relevance. You may choose issues from any of the disciplines given in the following pages or a discipline of your choice.
2. Prepare an essay about your topic with no more than 1500 words (excluding reference list).
3. Your topic of choice must be posted to the Discussion Board titled “Post your essay topic here” by Week 3, Friday 5pm,
4. Note that if you have not posted a topic by this time, you may be assigned a topic by your lecturer.
REQUIREMENTS
· The assignment should be word-processed.
· It should include a reference list.
· Use Harvard referencing style.
· Do not include sources in the reference list that are not cited in the document.
· You need to use a minimum of 10 sources and there needs to be at least 3 different types (i.e., websites, book, journal article, etc.).
HIT164 Computing Fundamentals
TOPICS (CHOOSE ONE)
Option 1: Social Media
GeoCities is a web hosting service which employs the concept/metaphors of “cities” and “neighbourhood” in real-world. For example, computer-related sites are placed in “SiliconValley” and entertainment sites in “Hollywood”. GeoCities was the third-most visited website at its peak when it was acquired by Yahoo! in 1999.
10 years later as social media had taken over and become mainstream on the Internet, GeoCities was shutdown and
deleted. However, the Internet Archive team made a backup of the site just before it was shut down to preserve the effort put in by around 35 million people since it started. The resulting 650GB archive was published online as a remembrance of the glorious days of GeoCities.
Will current social media (i.e., Facebook) eventually face the same fate? Justify your arguments with robust supporting evidence.
Option 2: Li-Fi
Wi-Fi is a popular networking technology that allows electronic devices to connect to the Internet wirelessly using radio frequency. It can be commonly seen from mobile devices to government facility. However in recent years, researchers have found a way to utilise visible light from light-emitting diodes (LEDs) to transmit data: such technology is called Li-Fi (light fidelity).
Even though Li-Fi is still at its infancy, many universities and researchers are actively studying to reach its potential.
Compare Wi-Fi and Li-Fi critically and discuss the advantages and disadvantages of Li-Fi.
Option 3: Wearable Technology
Google Glass is one of the first and most talked about augmented reality wearable computers in 2013. Its usage varies from personal entertainment to surgical practise. Similar to other emerging technologies, Google Glass has also received quite a few negative critical receptions, such as privacy concern.
Critically discuss the pros and cons of ...
Presentation given at the Consorcio Madrono conference on Data Management Plans in Horizon 2020 http://www.consorciomadrono.es/info/web/blogs/formacion/217.php
Presentation given at the Consorcio Madrono conference on Data Management Plans in Horizon 2020 http://www.consorciomadrono.es/info/web/blogs/formacion/217.php
Scott Edmunds slides for class 8 from the HKU Data Curation (module MLIM7350 from the Faculty of Education) course covering open science and data publishing
· General Design Analysis - Information is collected from library.docxalinainglis
· General Design Analysis - Information is collected from library/internet sources on a design problem that is local, nationwide, or worldwide in scope. A number of journals available online are an excellent place to start
The effect of alternate fuels on vehicle performance
· It is important for your paper to be well structured. Although each paper will be different, most papers should have:
· A. Problem Statement, including the significance of the problem and who is likely to be interested in the solution.
· B. Evaluation of the important factors involved in solving the problem.
· C. Presentation of one or more proposed solutions.
· D. Conclusions
12/3/2018 Week 8 Assignment Paper D - IFSM 304 7982 Ethics in Information Technology (2188)
https://learn.umuc.edu/d2l/le/content/329020/viewContent/12976314/View 1/1
Week 8 Assignment Paper D
Instructions
Paper D: Reflective paper on class learning.
Consider this assignment as a reflective piece on class learning as it applies to
Ethics in Information Technology. It describes your Ah-haor Eureka moments.
It is hoped that this course made you think about the ethical issues that occur
in your personal and work lives and how to go about making ethical choices.
Please use the ideas you learned from this course; how you will synthesize what
you learned from your research about your topic including - over-arching
issues, readings, discussion from class, and conclusions from other
assignments that apply to your research.
Please address the following elements:
From a class learning perspective, what were some of your “take-aways?”
How has this impacted your understanding of the ethical issues?
What will you do differently?
How has what you have learned in this course influenced your career?
As we continue to move toward a global community, what new
challenges might we see relating to ethics in IT?
You are to prepare a reflective piece of not more than 2-3 pages, double-
spaced and submit it to your Assignment Folder as an attached Microsoft Word
file. This paper may be subjective in nature!
javascript:void(0);
https://learn.umuc.edu/d2l/le/content/329020/navigateContent/347/Previous?pId=12976197
https://learn.umuc.edu/d2l/le/content/329020/navigateContent/347/Next?pId=12976197
Faculty Contact
Linda Beach [email protected]
Course Description
Recommended: IFSM 201. A comprehensive study of ethics and of personal and organizational ethical decision making in the use of
information systems in a global environment. The aim is to identify ethical issues raised by existing and emerging technologies, apply a
structured framework to analyze risk and decision alternatives, and understand the impact of personal ethics and organizational values on an
ethical workplace.
Course Introduction
The word ethics has its root in the word ethos, which most often refers to character. The concepts of ethics, character, right and wrong, and
good and evil have captivated humankind ever since we beg.
Digital resources such as online syllabi and class notes are not just modern conveniences; they lead to enhanced learning opportunities. Many educators simply copy their offline material to the online
environment, not taking advantage of this unique format. The simple Information Architecture
concepts covered in this session will provide easily followed best practices and translate into an
improved e-learning experience for student and teacher.
The slides that will accompany my live webcast for OpenCon 2014 attendees, all about open data in research. The benefits, the how to (both legally & technically), examples, pitfalls, and the future of open research data.
This assignment has two goals 1) have students increase their unde.docxdunningblair
This assignment has two goals: 1) have students increase their understanding of ethical issues related to the use of information technology through research, and 2) learn to correctly use the tools and techniques within Word to format a research paper, including use of available References and citation tools. These skills will be valuable throughout a student’s academic career. The paper will require a title page, NO abstract, three to five full pages of content with incorporation of a minimum of 3 external resources from credible sources and a Works Cited/References page. Wikipedia and similar general information sites, blogs or discussion groups are not considered creditable sources for a research project. No more than 10% of the paper may be in the form of a direct citation from an external source.
A list of topics from which students can choose is provided below.
Topics for Research Paper The focus of the paper should be on the following:
1. how information technology supports or makes possible biometrics and its various implementations, and potential ethical and privacy issues related to the use of biometrics. 2. how information technology supports or makes possible the development of artificial intelligence (AI) and intelligent agents (such as Siri, Cortana, etc.) and potential ethical and privacy issues related to AI. 3. how information technology supports or makes possible the development of robots as intelligent as humans, smart machines and the IoT, What potential benefits and risks can/will robots introduce? 4. how information technology supports or makes possible genome-based treatments for curing diseases, and potential ethical and privacy issues that might result from use of such treatments. 5. how information technology impacts family, eldercare, and parenting issues, and potential ethical and privacy issues introduced by the use of information technology and information systems in this area 6. how information technology has enhanced the use of computer-assisted education in the elementary school classroom, and the possible positive and negative impacts this enhancement provides. 7. issues facing the IT Manager or Security professional (e.g., privacy, ownership, control, accuracy, and security) in an environment where information technology is constantly expanding and changing. 8. how information technology plays a role in the era of Edward Snowden, Chelsea Manning, WikiLeaks, et and the impact on defense information systems 9. how information technology plays a role in the rise (and fall) of cryptocurrency and the positive and negatives of switching to the bitcoin environment.
...
one of the best reasons of studying Computer Science updated 2023 DOC 14.docxintel-writers.com
Studying computer science
offers numerous reasons and advantages that make it an attractive field of study for many individuals. Here are some key reasons to consider:
Career Opportunities: Computer science graduates are in high demand across various industries. The field provides diverse career paths, including software development, data science, artificial intelligence, cybersecurity, and more. With the increasing reliance on technology in today’s world, there is a constant need for skilled computer science professionals.
Innovation and Creativity: Computer science fosters innovation and enables individuals to create and develop new technologies, software applications, and systems. It provides a platform to transform ideas into reality and contribute to technological advancements that can have a significant impact on society.
Problem-Solving Skills: Computer science emphasizes logical and analytical thinking, as well as problem-solving skills. Through programming and algorithmic thinking, students learn how to break down complex problems into smaller, more manageable components and develop systematic solutions. These problem-solving skills are valuable across various domains and can be applied beyond computer science itself.
Versatility and Interdisciplinary Applications: Computer science is not limited to a specific industry or domain. Its principles and techniques can be applied to solve problems in fields such as healthcare, finance, transportation, entertainment, and many more. This versatility allows computer scientists to work on a wide range of projects and collaborate with professionals from different backgrounds.
Adaptability to Technological Advancements: Technology is rapidly evolving, and computer science equips individuals with the skills to adapt to these changes. By studying computer science, students develop a strong foundation that enables them to stay up-to-date with emerging technologies and embrace new advancements in the field.
Analyzing Big Data: With the increasing amount of data being generated, there is a growing need for professionals who can analyze and derive meaningful insights from large datasets. Computer science equips individuals with the skills to handle and process big data, leading to improved decision-making, predictive analytics, and advancements in fields like machine learning and artificial intelligence.
Critical thinking in english. how to evaluate webpagesMariangel Carreño
Proyecto realizado en el año 2012 con alumnos de 6° año del Liceo N°1 Florida en la asignatura inglés como lengua extranjera sobre la Unidad Temática: Media, en particular sobre internet y cómo evaluar páginas webs.
This is a North Central University PowerPoint presentation (EDR 8204-3). It is written in APA format, has been graded by an instructor(A), and includes references. Most education communities submit assignments to turnitin, so remember to paraphrase.
What the mass media offers is not popular art, but entertainment wh.docxsorayan5ywschuit
“What the mass media offers is not popular art, but entertainment which is intended to be consumed like food, forgotten, and replaced by a new dish.” - W. H. Auden. Do agree with this idea, or do you give more credence to what you experience through mass media? Use personal examples as necessary.
.
What role does discrimination play in perpetuating the assessment of.docxsorayan5ywschuit
What role does discrimination play in perpetuating the assessment of AOD problems among diverse populations? 300 words
How does the issue of social justice influence the treatment of diverse groups with AOD abuse problems? 300 words
Given the view that Native Americans are engaged in the longest ongoing protest by drinking, what are your thoughts regarding the issue of responsibility? 300 words
.
More Related Content
Similar to HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
Scott Edmunds slides for class 8 from the HKU Data Curation (module MLIM7350 from the Faculty of Education) course covering open science and data publishing
· General Design Analysis - Information is collected from library.docxalinainglis
· General Design Analysis - Information is collected from library/internet sources on a design problem that is local, nationwide, or worldwide in scope. A number of journals available online are an excellent place to start
The effect of alternate fuels on vehicle performance
· It is important for your paper to be well structured. Although each paper will be different, most papers should have:
· A. Problem Statement, including the significance of the problem and who is likely to be interested in the solution.
· B. Evaluation of the important factors involved in solving the problem.
· C. Presentation of one or more proposed solutions.
· D. Conclusions
12/3/2018 Week 8 Assignment Paper D - IFSM 304 7982 Ethics in Information Technology (2188)
https://learn.umuc.edu/d2l/le/content/329020/viewContent/12976314/View 1/1
Week 8 Assignment Paper D
Instructions
Paper D: Reflective paper on class learning.
Consider this assignment as a reflective piece on class learning as it applies to
Ethics in Information Technology. It describes your Ah-haor Eureka moments.
It is hoped that this course made you think about the ethical issues that occur
in your personal and work lives and how to go about making ethical choices.
Please use the ideas you learned from this course; how you will synthesize what
you learned from your research about your topic including - over-arching
issues, readings, discussion from class, and conclusions from other
assignments that apply to your research.
Please address the following elements:
From a class learning perspective, what were some of your “take-aways?”
How has this impacted your understanding of the ethical issues?
What will you do differently?
How has what you have learned in this course influenced your career?
As we continue to move toward a global community, what new
challenges might we see relating to ethics in IT?
You are to prepare a reflective piece of not more than 2-3 pages, double-
spaced and submit it to your Assignment Folder as an attached Microsoft Word
file. This paper may be subjective in nature!
javascript:void(0);
https://learn.umuc.edu/d2l/le/content/329020/navigateContent/347/Previous?pId=12976197
https://learn.umuc.edu/d2l/le/content/329020/navigateContent/347/Next?pId=12976197
Faculty Contact
Linda Beach [email protected]
Course Description
Recommended: IFSM 201. A comprehensive study of ethics and of personal and organizational ethical decision making in the use of
information systems in a global environment. The aim is to identify ethical issues raised by existing and emerging technologies, apply a
structured framework to analyze risk and decision alternatives, and understand the impact of personal ethics and organizational values on an
ethical workplace.
Course Introduction
The word ethics has its root in the word ethos, which most often refers to character. The concepts of ethics, character, right and wrong, and
good and evil have captivated humankind ever since we beg.
Digital resources such as online syllabi and class notes are not just modern conveniences; they lead to enhanced learning opportunities. Many educators simply copy their offline material to the online
environment, not taking advantage of this unique format. The simple Information Architecture
concepts covered in this session will provide easily followed best practices and translate into an
improved e-learning experience for student and teacher.
The slides that will accompany my live webcast for OpenCon 2014 attendees, all about open data in research. The benefits, the how to (both legally & technically), examples, pitfalls, and the future of open research data.
This assignment has two goals 1) have students increase their unde.docxdunningblair
This assignment has two goals: 1) have students increase their understanding of ethical issues related to the use of information technology through research, and 2) learn to correctly use the tools and techniques within Word to format a research paper, including use of available References and citation tools. These skills will be valuable throughout a student’s academic career. The paper will require a title page, NO abstract, three to five full pages of content with incorporation of a minimum of 3 external resources from credible sources and a Works Cited/References page. Wikipedia and similar general information sites, blogs or discussion groups are not considered creditable sources for a research project. No more than 10% of the paper may be in the form of a direct citation from an external source.
A list of topics from which students can choose is provided below.
Topics for Research Paper The focus of the paper should be on the following:
1. how information technology supports or makes possible biometrics and its various implementations, and potential ethical and privacy issues related to the use of biometrics. 2. how information technology supports or makes possible the development of artificial intelligence (AI) and intelligent agents (such as Siri, Cortana, etc.) and potential ethical and privacy issues related to AI. 3. how information technology supports or makes possible the development of robots as intelligent as humans, smart machines and the IoT, What potential benefits and risks can/will robots introduce? 4. how information technology supports or makes possible genome-based treatments for curing diseases, and potential ethical and privacy issues that might result from use of such treatments. 5. how information technology impacts family, eldercare, and parenting issues, and potential ethical and privacy issues introduced by the use of information technology and information systems in this area 6. how information technology has enhanced the use of computer-assisted education in the elementary school classroom, and the possible positive and negative impacts this enhancement provides. 7. issues facing the IT Manager or Security professional (e.g., privacy, ownership, control, accuracy, and security) in an environment where information technology is constantly expanding and changing. 8. how information technology plays a role in the era of Edward Snowden, Chelsea Manning, WikiLeaks, et and the impact on defense information systems 9. how information technology plays a role in the rise (and fall) of cryptocurrency and the positive and negatives of switching to the bitcoin environment.
...
one of the best reasons of studying Computer Science updated 2023 DOC 14.docxintel-writers.com
Studying computer science
offers numerous reasons and advantages that make it an attractive field of study for many individuals. Here are some key reasons to consider:
Career Opportunities: Computer science graduates are in high demand across various industries. The field provides diverse career paths, including software development, data science, artificial intelligence, cybersecurity, and more. With the increasing reliance on technology in today’s world, there is a constant need for skilled computer science professionals.
Innovation and Creativity: Computer science fosters innovation and enables individuals to create and develop new technologies, software applications, and systems. It provides a platform to transform ideas into reality and contribute to technological advancements that can have a significant impact on society.
Problem-Solving Skills: Computer science emphasizes logical and analytical thinking, as well as problem-solving skills. Through programming and algorithmic thinking, students learn how to break down complex problems into smaller, more manageable components and develop systematic solutions. These problem-solving skills are valuable across various domains and can be applied beyond computer science itself.
Versatility and Interdisciplinary Applications: Computer science is not limited to a specific industry or domain. Its principles and techniques can be applied to solve problems in fields such as healthcare, finance, transportation, entertainment, and many more. This versatility allows computer scientists to work on a wide range of projects and collaborate with professionals from different backgrounds.
Adaptability to Technological Advancements: Technology is rapidly evolving, and computer science equips individuals with the skills to adapt to these changes. By studying computer science, students develop a strong foundation that enables them to stay up-to-date with emerging technologies and embrace new advancements in the field.
Analyzing Big Data: With the increasing amount of data being generated, there is a growing need for professionals who can analyze and derive meaningful insights from large datasets. Computer science equips individuals with the skills to handle and process big data, leading to improved decision-making, predictive analytics, and advancements in fields like machine learning and artificial intelligence.
Critical thinking in english. how to evaluate webpagesMariangel Carreño
Proyecto realizado en el año 2012 con alumnos de 6° año del Liceo N°1 Florida en la asignatura inglés como lengua extranjera sobre la Unidad Temática: Media, en particular sobre internet y cómo evaluar páginas webs.
This is a North Central University PowerPoint presentation (EDR 8204-3). It is written in APA format, has been graded by an instructor(A), and includes references. Most education communities submit assignments to turnitin, so remember to paraphrase.
What the mass media offers is not popular art, but entertainment wh.docxsorayan5ywschuit
“What the mass media offers is not popular art, but entertainment which is intended to be consumed like food, forgotten, and replaced by a new dish.” - W. H. Auden. Do agree with this idea, or do you give more credence to what you experience through mass media? Use personal examples as necessary.
.
What role does discrimination play in perpetuating the assessment of.docxsorayan5ywschuit
What role does discrimination play in perpetuating the assessment of AOD problems among diverse populations? 300 words
How does the issue of social justice influence the treatment of diverse groups with AOD abuse problems? 300 words
Given the view that Native Americans are engaged in the longest ongoing protest by drinking, what are your thoughts regarding the issue of responsibility? 300 words
.
What sorts of external trends should iRobot pay attention to Why .docxsorayan5ywschuit
What sorts of external trends should iRobot pay attention to? Why? Also, would they have been better off working with an established vacuum cleaner manufacturer? Why or why not? Support your opinions.
example:
iRobot and its product, Roomba, is an interesting case study. A few trends from the article resonate with me as important to iRobot to pay attention to. The article mentions the tolerance for consumer learning curve as needing to be low, or none. As a consumer product that is entirely new, Roomba had a high barrier to enter the market as it had to overcome consumer reaction to first purchasing a robot and also a device that would clean the home. The decision to make the device extremely simple was smart and it allowed people to become familiar to both elements. Thinking back 10 years, this product was initially purchased by baby-boomers and Gen-X who I would not consider technology-natives. Roomba now has a consumer recognition amongst millennials who just “get it” and as iRobot unveils new technology, the learning curve for the millennial consumer will continue to be low, despite it being much more complex than the first product. Another trend that is important to this product is integration with both mobile control and interaction with other home technologies. There are an increasing number of products that can be controlled by mobile phone such as thermostat, security systems, cable TV, etc., and this trend would be important for iRobot to capture in order to stay relevant. Additionally, iRobot and Roomba in specific would also be a stronger product if it interacted with other home technologies (both created by iRobot and otherwise). The article mentioned iRobot releasing home robots of varying kinds but no interaction between them as one portfolio.
As for the decision not work with existing vacuum cleaner manufactures, I agree with iRobot’s decision. The paragraph that mentions iRobot’s desire for consumers to know that a robot company made their vacuum rather than a company like Hoover making their vacuum, seems very important for long-term growth. iRobot would have a hard time attempting to enter the market with subsequent products (especially after Roomba’s success) if Roomba was called Hoover Robot, etc. The classification as a robot is important and this could not have been achieved by selling the patent to Electrolux or Hoover. The only disadvantage I could see is that a partnership with one of these companies would have accelerated their distribution incredibly. While they were able to secure floor demos at Sharper Image and Brookstone, a multi-billion-dollar company like Hoover might have been able to pressure companies like Target to follow suit. This would be much harder to accomplish as iRobot alone. In retrospect, I do not think they made a mistake by manufacturing, marketing, and distributing the product on their own.
.
What makes us unique as a speciesWhat hominid characteristic(s) a.docxsorayan5ywschuit
What makes us unique as a species?
What hominid characteristic(s) are discussed in the film?
According to the film, what is the benefit of bipedalism?
According to the film, how is hominid success explained?
What is the molecular clock?
What is the significance of running?
How is age determined on hominids?
According to the film, how/when did our hominid ancestors lose body hair? How do we know?
Part 1
http://www.pbs.org/wgbh/nova/evolution/becoming-human.html#becoming-human-part-1
Part 2
http://www.pbs.org/wgbh/nova/evolution/becoming-human.html#becoming-human-part-2
.
What role, if any, do you think juveniles play in the current negati.docxsorayan5ywschuit
What role, if any, do you think juveniles play in the current negative attitude towards law enforcement? i.e. Are our children being taught respect for authority? Does our culture promote violence towards authority and are our children adopting that attitude? Etc…
I dont think this needs a title page or anything like that basically like a discussion just maybe a little longer
.
What led to the creation of the Sarbanes-Oxley Act and when was it.docxsorayan5ywschuit
What led to the creation of the Sarbanes-Oxley Act and when was it passed?
2.
There are 11 separate titles. List them and briefly describe each.
3.
What is the Act's primary purpose?
4.
List a few things in the Act that are considered problematic and state what the problem is.
5.
Provide a list of at least three countries that have similar laws and note what their names are.
6.
Do you think the Act is meeting the goals established, e.g., will it be effective in avoiding future fraudulent actions? Provide an explanation for your decision.
.
What role do audiences play in creating popular culture Explain how.docxsorayan5ywschuit
What role do audiences play in creating popular culture? Explain how Hollywood both manipulated and reflected the popular culture of the 1950's and 60's. Analyze a popular film of the time. This paper should be 2-3 pages, in APA style, utilizing the college's library resources. One scholarly article as a minimum should be included in your essay.
due tomorrow at 8pm pacific standard time
.
What role do the gods play in the Illiad First, use passages from t.docxsorayan5ywschuit
What role do the gods play in the Illiad? First, use passages from the text to compare the character of different gods and illustrate their different actions in the story. Then use passages from the text to support answers to the following questions: Do the gods know ahead of time what will happen to the human characters in the story? Can they intervene to change what they have foreseen or what fate has determined will happen? How powerful are the gods? To what extent are the gods responsible for what happens to the human characters?
.
What is your relationship to writing Discuss something about writin.docxsorayan5ywschuit
What is your relationship to writing? Discuss something about writing that has you confused or that you don't like. It can be how to get started, using commas, complete sentences, spelling...anything that contributes to your struggle or anxiety about writing. What do you hope to achieve in this class?
(one paragraph)
.
What reasons are given for the enduring popularity of Edward Hopper.docxsorayan5ywschuit
What reasons are given for the enduring popularity of Edward Hopper? Do you think that the themes of loneliness, separation and the disillusionment with materialism continue to be prevailing characteristics of modern American life?
How would you describe the relationship between architecture, industry, and technology? How do you think this relationship makes architecture different from other arts, such as painting or sculpture?
.
What methods, specifically, have citizens utilized to influenc.docxsorayan5ywschuit
What methods, specifically, have citizens utilized to influence and become involved in the budgeting and financial management arenas in the public sphere? Which movements or strategies have been most successful from a citizen perspective? To what degree do budgeting professionals and public administrators seek and consider this citizen involvement? What will be the trend for the future with regard to citizen participation in the process?
250 word response. APA format, 2 references
.
What is your position on the debate about national ID cards Autho.docxsorayan5ywschuit
What is your position on the debate about national ID cards? Authors Ehrenhalt and Dority both make compelling cases for and against the use of such cards, and for the most part, their debates are grounded in questions of privacy for American citizens. What is privacy? What does it mean to have privacy? Ehrenhalt writes in 1999, and Dority writes in 2002. How might these two author’s change their arguments based on the kinds of technology that we have today—smart phones, GPS trackers, spyware, and more. Is privacy achievable in our advanced state of technological development? Would national ID cards really make a difference in privacy one way or another? (125 Words)
.
What problems arise when a species is introduced from a foreign ecos.docxsorayan5ywschuit
What problems arise when a species is introduced from a foreign ecosystem and why do these problems occur? If a species is introduced to new environment, what factors determine whether the species will adapt to its new environment? Once introduced to a new environment, can a species undergo changes that eventually create a new species (speciation)?
.
What is your favorite ad that you have ever seen Please describe.docxsorayan5ywschuit
What is your favorite ad that you have ever seen? Please describe
1. what product was it for?
2. what was the storyline of the ad (provide a youtube link if one is available)?
3. where was the ad shown (typical TV show or magazine)?
4. give 5 reasons why you felt the ad was effective (or entertaining).
.
What methodologies have been used for data breachesDifferent type.docxsorayan5ywschuit
What methodologies have been used for data breaches?
Different types of attacks ? comparision on attacks how did they happen and how did attackers entered into the system? what are the different companies that have been attacked by these attacks?
how much did they gain or company lost? how did they found out attacks are done?
.
What kinds of cultural changes will hospitals have to make in order .docxsorayan5ywschuit
What kinds of cultural changes will hospitals have to make in order to adapt to the changing health care environment? How can these changes be achieved most efficiently?
What steps are required to change a dysfunctional culture?
Your paper should be in APA format and cite all references used. Submit to the Seminar Dropbox
.
What kind of research might have helped MySpace continue to compete .docxsorayan5ywschuit
What kind of research might have helped MySpace continue to compete after Facebook started taking over? What sorts of external factors might they have looked at? Support your response and be sure to discuss with others.
As a second question to discuss, should DeWolfe and Anderson have given up so much equity (66%) in the beginning to eUniverse? What were the pros and cons of this? Was there an alternative strategy available? If so, what was it? Support your response.
.
What is validating form data and explain the issue with the isset fu.docxsorayan5ywschuit
What is validating form data and explain the issue with the isset function (Chapter 2)?
Give the syntax for: (a) inserting a record in a table (b) updating a record in a table (Chapter 5).
Explain the use of hidden form inputs (Chapter 10).
What information is stored on the user's machine using cookies and how they are set (Chapter 12)?
.
What is your definition of Social JusticeAfter reviewing another .docxsorayan5ywschuit
What is your definition of Social Justice?
After reviewing another discussion/definition of social justice, up to this point, in your collegiate sojourn at Roosevelt, is your point of view regarding Social Justice clearer or more obfuscated?
What does Social Justice mean to you?
In your opinion, can or does any institution of higher learning (university or college) give a (or any) Social Justice paradigm consistent with your definition of social justice?
give a title to your thread
One to two pages
.
What is the watering hole techniqueThe term watering hole” refer.docxsorayan5ywschuit
What is the watering hole technique?
The term “watering hole” refers to initiating an attack against targeted businesses and organizations. In a watering hole attack scenario, threat actors compromise a carefully selected website by inserting an exploit resulting in malware infection.
How does a watering hole technique work?
A watering hole attack typically works this way:
Attackers gather strategic information that they can use to gain entry into their targeted organization. This step can be compared to a military reconnaissance mission. The information gathered may include insights on trusted websites often visited by the employees or members of their targeted entity. The process of selecting websites to compromise was initially dubbed “strategic web compromises.”
Attackers insert an exploit into the selected sites.
Once targeted victims visit the compromised site, the exploit takes advantage of software vulnerabilities, either old or new, to drop malware. The dropped malware may be in the form of a remote access Trojan (RAT), which allows attackers to access sensitive data and take control of the vulnerable system.
Where is this attack technique used?
Watering hole attacks were previously documented in several high-profile cases which include:
VOHO. In mid-2012 RSA identified a campaign known as VOHO, which was aimed at a particular group of organizations, specifically those involved with business and local government agencies in certain geographic areas. The attackers compromised carefully selected sites by inserting malicious JavaScript to deliver a Gh0st RAT variant. Gh0st RATs were previously seen in other attacks that targeted civic organizations and diplomatic entities worldwide.
Attack on high-profile groups. Just before the end of 2012, the Council on Foreign Relations (CFR) website was compromised to host a zero-day exploit in Internet Explorer. Those who visited the site were served with a backdoor malware. Microsoft addressed this vulnerability though the Microsoft Security Bulletin MS13-008.
Why is it effective?
Attackers incorporate strategies to circumvent the targeted organizations’ defenses in order for watering hole attacks to be effective. These may come in the form of outdated systems or simply human error.
In watering hole attacks, the goal is not to serve malware to as many systems possible. Instead, the attackers run exploits on well-known and trusted sites likely to be visited by their targeted victims. This makes the watering hole technique effective in delivering its intended payload.
Aside from carefully choosing sites to compromise, watering hole attacks are known to incorporate zero-day exploits that target unpatched vulnerabilities. Thus, the targeted entities are left with little or no defense against these exploits.
This doesn’t mean that attackers don’t target patched system vulnerabilities. Because of patch management difficulties in an enterprise setting, IT administrators may delay deploying critical upda.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
2024.06.01 Introducing a competency framework for languag learning materials ...
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
1. HIT164 COMPUTING FUNDAMENTALS
Assignment 1: Research Essay
Due Date: Week 7, Friday 11: 59 pm
Length: 1500 words maximum (not including references)
Value: 20% of the total marks for the unit
TASKS
1. Research a few issues in use of IT in a discipline of current
relevance. You may choose issues from any of the disciplines
given in the following pages or a discipline of your choice.
2. Prepare an essay about your topic with no more than 1500
words (excluding reference list).
3. Your topic of choice must be posted to the Discussion Board
titled “Post your essay topic here” by Week 3, Friday 5pm,
4. Note that if you have not posted a topic by this time, you may
be assigned a topic by your lecturer.
REQUIREMENTS
· The assignment should be word-processed.
2. · It should include a reference list.
· Use Harvard referencing style.
· Do not include sources in the reference list that are not cited
in the document.
· You need to use a minimum of 10 sources and there needs to
be at least 3 diff erent types (i.e., websites, book, journal article,
etc.).
HIT164 Computing Fundamentals
TOPICS (CHOOSE ONE)
Option 1: Social Media
GeoCities is a web hosting service which employs the
concept/metaphors of “cities” and “neighbourhood” in real-
world. For example, computer-related sites are placed in
“SiliconValley” and entertainment sites in “Hollywood”.
GeoCities was the third-most visited website at its peak when it
was acquired by Yahoo! in 1999.
10 years later as social media had taken over and become
mainstream on the Internet, GeoCities was shutdown and
deleted. However, the Internet Archive team made a backup of
the site just before it was shut down to preserve the eff ort put in
by around 35 million people since it started. The resulting
650GB archive was published online as a remembrance of the
glorious days of GeoCities.
Will current social media (i.e., Facebook) eventually face the
same fate? Justify your arguments with robust supporting
3. evidence.
Option 2: Li-Fi
Wi-Fi is a popular networking technology that allows electronic
devices to connect to the Internet wirelessly using radio
frequency. It can be commonly seen from mobile devices to
government facility. However in recent years, researchers have
found a way to utilise visible light from light-emitting diodes
(LEDs) to transmit data: such technology is called Li-Fi (light
fidelity).
Even though Li-Fi is still at its infancy, many universities and
researchers are actively studying to reach its potential.
Compare Wi-Fi and Li-Fi critically and discuss the advantages
and disadvantages of Li-Fi.
Option 3: Wearable Technology
Google Glass is one of the first and most talked about
augmented reality wearable computers in 2013. Its usage varies
from personal entertainment to surgical practise. Similar to
other emerging technologies, Google Glass has also received
quite a few negative critical receptions, such as privacy
concern.
Critically discuss the pros and cons of ubiquitous wearable
computing like Google Glass. Note how you would use a
ubiquitous device like Google Glass.
4. Option 4: Science & Technology
Children with Asperger’s syndrome (or high functioning autism)
often exhibit excellent language, memory and technical skills.
However, their lack of good social skills and understanding of
social interaction often hinder their ability to function in
elementary and middle school settings. Research regarding the
use of technology to help children with Asperger’s syndrome or
autism have just started to emerge as technology is maturing at
a rapid pace.
Research what technology options are available to aid children
with Asperger’s syndrome or autism? Support your discussion
with robust supporting evidence.
Option 5: Internet Privacy
We share information on the Internet everyday, through social
media, blog posts, or even apps on your phone. Technology has
become so ubiquitous today that we are not as concern about
privacy as we used to be. A recent attack on Snapchat revealed
almost all (approx. 4.6 millions) usernames and phone numbers
on the Internet for anyone to download. However, the majority
of Snapchat users were not worried about how such information
could be used.
Popular companies such as Apple, Microsoft, Google,
Target (United States) and Sony have been hacked at least once
in the past decade. In the most extreme case hackers obtained
and sold users’ credit card details. This proves that nothing is
safe on the Internet. Who can we trust our information with and
5. how much information can we share?
Critically discuss the assertion.
Option 6: Artificial Intelligence
The movie “Her” demonstrated the possibility of a complex
Artificial Intelligence (A.I.) interface with human emotion. In
the not too distant future our computer systems will be able to
display all the characteristics of intelligence we recognise in
humans.
Identify existing technologies that can be used to construct
“Samantha” and critically discuss if the benefits of such
computer intelligence would outweigh the disadvantages.
Option 7: Privilege Escalation
Mobile operating systems nowadays are mostly locked-down
platforms with digital rights management (DRM) where users
cannot directly interact with the file system and the device’s
functionalities are provided by the manufacturer in a sand-
boxed environment.
Privilege escalation, or more commonly known as jailbreaking,
is the act of removing limitations imposed by the manufacturer,
thus enabling the device to gain access to resources that are
normally protected from an application or user.
6. Critically discuss why an operating system should and
should not be locked-down in the above context, considering the
legal context.
Option 8: Big Data
Dr. Eric Horvitz, a computer scientist and co-director of
Microsoft Research, who worked with a large urban hospital in
Washington was able to use a concentration of anonymous
Internet searches in the neighbourhoods in close proximity of
the hospital to calculate the probabilities of cardio cases which
showed up soon after.
Through the use of Internet searches, Twitter feeds, or in
general “Internet as a sensor”, Dr. Horvitz was also able to
identify previously unpublished side eff ect of medicines and
track the onset of postpartum depression among new mothers.
Through the use of online information, can we better understand
our behaviours, or more importantly overcome various
challenges in health and diagnosis?
This is one implementation of the principles of Big Data.
Research how principles of Big Data are currently appl ied in
one of the following fields:
· Medicine
· Education
· Astronomy
7. GETTING HELP
1. Doing Your Assignment
You may find the following link useful in preparing for your
assignment. See “Doing the Assignments” at
http://learnline.cdu.edu.au/units/itonline/assignments.html.
2. About Essay Writing
CDU Study Guide (http://learnline.cdu.edu.au/studyskills/) has
a comprehensive range of study skills information.
You may find the following resources useful in writing
academic assignments:
· Introduction to Academic Assignments
8. http://learnline.cdu.edu.au/studyskills/studyskills/introacademic
assignments.html
· Introduction to Academic Writing
http://learnline.cdu.edu.au/studyskills/studyskills/introacademic
writing.html
· What to Avoid in Formal Writing
http://learnline.cdu.edu.au/studyskills/studyskills/aswhattoavoid
.html
· Strunk’s “The Elements of Style” is an old book (1918), but a
good one, to check for suggestions and conventions on writing
style. Some things have changed since 1918, but many of his
suggestions are largely intact today.
· You can find the book at
http://www.crockford.com/wrrrld/style.html. Thanks to Douglas
Crockford for making this available.
3. Researching
The CDU Library’s Summon search
(http://www.cdu.edu.au/library/) is a good way to start
gathering research about your chosen topic. If you have not
used Summon before please watch the video on the Summon
Guide webpage (http://libguides.cdu.edu.au/summon).
Alternatively, visit the CDU Library’s help on Summon:
· Referencing 101 (http://libguides.cdu.edu.au/cdureferencing)
· Referencing Style Guide
(http://libguides.cdu.edu.au/content.php?pid=100403&sid=7537
9. 58). We use CDU Harvard style for HIT164.
· iResearch
(http://www.library.usyd.edu.au/elearning/learn/referencing/acti
vities/index.php). This is an interactive learning tool, courtesy
of University of Sydney.
· CDU’s Information Technology Guide
(http://libguides.cdu.edu.au/IT) is very useful for finding
academic quality sources via the Library.
4. Plagiarism - you will be penalised if you plagiarise your
work
If you have any doubt about what constitutes plagiarism, then
please talk to your lecturer.
You can also find more information about plagiarism at CDU
Library Service
(http://libguides.cdu.edu.au/content.php?pid=100403&sid=2587
885).
PRESENTATION
Essay should be word processed and include page numbers and
student name and number in the footer. It is recommended that
you check for plagiarism in your work before you submit.
10. SUBMISSION GUIDELINES
All students should submit via Learnline:
· Word processed document only, PDF files are not accepted.
· Include an assignment cover sheet with the plagiarism section
signed.
· Ensure that your file is labelled in the format of
firstnameLastnameAssign1.doc (e.g.,
johnAppleseedAssign1.doc).
- Note that there are no spaces or symbols in the file name.
11. HIT164 COMPUTING FUNDAMENTALS
Assignment 1: Research Essay
Due Date: Week 7, Friday 11: 59 pm
Length: 1500 words maximum (not including references)
Value: 20% of the total marks for the unit
TASKS
1. Research a few issues in use of IT in a discipline of current
relevance. You may choose issues from any of the disciplines
given in the following pages or a discipline of your choice.
2. Prepare an essay about your topic with no more than 1500
12. words (excluding reference list).
3. Your topic of choice must be posted to the Discussion Board
titled “Post your essay topic here” by Week 3, Friday 5pm,
4. Note that if you have not posted a topic by this time, you may
be assigned a topic by your lecturer.
REQUIREMENTS
· The assignment should be word-processed.
· It should include a reference list.
· Use Harvard referencing style.
· Do not include sources in the reference list that are not cited
in the document.
· You need to use a minimum of 10 sources and there needs to
be at least 3 diff erent types (i.e., websites, book, journal article,
etc.).
HIT164 Computing Fundamentals
TOPICS (CHOOSE ONE)
Option 1: Social Media
GeoCities is a web hosting service which employs the
concept/metaphors of “cities” and “neighbourhood” in real -
world. For example, computer-related sites are placed in
“SiliconValley” and entertainment sites in “Hollywood”.
GeoCities was the third-most visited website at its peak when it
13. was acquired by Yahoo! in 1999.
10 years later as social media had taken over and become
mainstream on the Internet, GeoCities was shutdown and
deleted. However, the Internet Archive team made a backup of
the site just before it was shut down to preserve the eff ort put in
by around 35 million people since it started. The resulting
650GB archive was published online as a remembrance of the
glorious days of GeoCities.
Will current social media (i.e., Facebook) eventually face the
same fate? Justify your arguments with robust supporting
evidence.
Option 2: Li-Fi
Wi-Fi is a popular networking technology that allows electronic
devices to connect to the Internet wirelessly using radio
frequency. It can be commonly seen from mobile devices to
government facility. However in recent years, researchers have
found a way to utilise visible light from light-emitting diodes
(LEDs) to transmit data: such technology is called Li-Fi (light
fidelity).
Even though Li-Fi is still at its infancy, many universities and
researchers are actively studying to reach its potential.
Compare Wi-Fi and Li-Fi critically and discuss the advantages
and disadvantages of Li-Fi.
Option 3: Wearable Technology
14. Google Glass is one of the first and most talked about
augmented reality wearable computers in 2013. Its usage varies
from personal entertainment to surgical practise. Similar to
other emerging technologies, Google Glass has also received
quite a few negative critical receptions, such as privacy
concern.
Critically discuss the pros and cons of ubiquitous wearable
computing like Google Glass. Note how you would use a
ubiquitous device like Google Glass.
Option 4: Science & Technology
Children with Asperger’s syndrome (or high functioning autism)
often exhibit excellent language, memory and technical skills.
However, their lack of good social skills and understanding of
social interaction often hinder their ability to function in
elementary and middle school settings. Research regarding the
use of technology to help children with Asperger’s syndrome or
autism have just started to emerge as technology is maturing at
a rapid pace.
Research what technology options are available to aid children
with Asperger’s syndrome or autism? Support your discussion
with robust supporting evidence.
Option 5: Internet Privacy
We share information on the Internet everyday, through social
media, blog posts, or even apps on your phone. Technology has
become so ubiquitous today that we are not as concern about
15. privacy as we used to be. A recent attack on Snapchat revealed
almost all (approx. 4.6 millions) usernames and phone numbers
on the Internet for anyone to download. However, the majority
of Snapchat users were not worried about how such information
could be used.
Popular companies such as Apple, Microsoft, Google,
Target (United States) and Sony have been hacked at least once
in the past decade. In the most extreme case hackers obtained
and sold users’ credit card details. This proves that nothing is
safe on the Internet. Who can we trust our information with and
how much information can we share?
Critically discuss the assertion.
Option 6: Artificial Intelligence
The movie “Her” demonstrated the possibility of a complex
Artificial Intelligence (A.I.) interface with human emotion. In
the not too distant future our computer systems will be able to
display all the characteristics of intelligence we recognise in
humans.
Identify existing technologies that can be used to construct
“Samantha” and critically discuss if the benefits of such
computer intelligence would outweigh the disadvantages.
16. Option 7: Privilege Escalation
Mobile operating systems nowadays are mostly locked-down
platforms with digital rights management (DRM) where users
cannot directly interact with the file system and the device’s
functionalities are provided by the manufacturer in a sand-
boxed environment.
Privilege escalation, or more commonly known as jailbreaking,
is the act of removing limitations imposed by the manufacturer,
thus enabling the device to gain access to resources that are
normally protected from an application or user.
Critically discuss why an operating system should and
should not be locked-down in the above context, considering the
legal context.
Option 8: Big Data
Dr. Eric Horvitz, a computer scientist and co-director of
Microsoft Research, who worked with a large urban hospital in
Washington was able to use a concentration of anonymous
Internet searches in the neighbourhoods in close proximity of
the hospital to calculate the probabilities of cardio cases which
showed up soon after.
Through the use of Internet searches, Twitter feeds, or in
general “Internet as a sensor”, Dr. Horvitz was also able to
identify previously unpublished side eff ect of medicines and
track the onset of postpartum depression among new mothers.
Through the use of online information, can we better understand
our behaviours, or more importantly overcome various
17. challenges in health and diagnosis?
This is one implementation of the principles of Big Data.
Research how principles of Big Data are currently applied in
one of the following fields:
· Medicine
· Education
· Astronomy
GETTING HELP
1. Doing Your Assignment
You may find the following link useful in preparing for your
assignment. See “Doing the Assignments” at
http://learnline.cdu.edu.au/units/itonline/assignments.html.
18. 2. About Essay Writing
CDU Study Guide (http://learnline.cdu.edu.au/studyskills/) has
a comprehensive range of study skills information.
You may find the following resources useful in writing
academic assignments:
· Introduction to Academic Assignments
http://learnline.cdu.edu.au/studyskills/studyskills/introacademic
assignments.html
· Introduction to Academic Writing
http://learnline.cdu.edu.au/studyskills/studyskills/introacademic
writing.html
· What to Avoid in Formal Writing
http://learnline.cdu.edu.au/studyskills/studyskills/aswhattoavoid
.html
· Strunk’s “The Elements of Style” is an old book (1918), but a
good one, to check for suggestions and conventions on writing
style. Some things have changed since 1918, but many of his
suggestions are largely intact today.
· You can find the book at
http://www.crockford.com/wrrrld/style.html. Thanks to Douglas
Crockford for making this available.
3. Researching
19. The CDU Library’s Summon search
(http://www.cdu.edu.au/library/) is a good way to start
gathering research about your chosen topic. If you have not
used Summon before please watch the video on the Summon
Guide webpage (http://libguides.cdu.edu.au/summon).
Alternatively, visit the CDU Library’s help on Summon:
· Referencing 101 (http://libguides.cdu.edu.au/cdureferencing)
· Referencing Style Guide
(http://libguides.cdu.edu.au/content.php?pid=100403&sid=7537
58). We use CDU Harvard style for HIT164.
· iResearch
(http://www.library.usyd.edu.au/elearning/learn/referencing/acti
vities/index.php). This is an interactive learning tool, courtesy
of University of Sydney.
· CDU’s Information Technology Guide
(http://libguides.cdu.edu.au/IT) is very useful for finding
academic quality sources via the Library.
4. Plagiarism - you will be penalised if you plagiarise your
work
If you have any doubt about what constitutes plagiarism, then
please talk to your lecturer.
You can also find more information about plagiarism at CDU
Library Service
(http://libguides.cdu.edu.au/content.php?pid=100403&sid=2587
20. 885).
PRESENTATION
Essay should be word processed and include page numbers and
student name and number in the footer. It is recommended that
you check for plagiarism in your work before you submit.
SUBMISSION GUIDELINES
All students should submit via Learnline:
· Word processed document only, PDF files are not accepted.
· Include an assignment cover sheet with the plagiarism section
signed.
· Ensure that your file is labelled in the format of
firstnameLastnameAssign1.doc (e.g.,
johnAppleseedAssign1.doc).
- Note that there are no spaces or symbols in the file name.