logo

Information Technology docx.

   

Added on  2022-08-13

7 Pages1219 Words17 Views
 | 
 | 
 | 
Running head: COMMUNICATION AND INFORMATION TECHNOLOGY
Communication and Information Technology
Name of the Student
Name of the University
Author note
Information Technology docx._1

COMMUNICATION AND INFORMATION TECHNOLOGY1
Table of Contents
Section 1..........................................................................................................................................2
Question 1....................................................................................................................................2
Question 2....................................................................................................................................2
Question 3....................................................................................................................................3
Question 4....................................................................................................................................3
Section 2..........................................................................................................................................5
Question 1....................................................................................................................................5
Question 2....................................................................................................................................5
References........................................................................................................................................6
Information Technology docx._2

COMMUNICATION AND INFORMATION TECHNOLOGY2
Section 1
Question 1
(a) The term ‘plagiarism’ is defined as the process of copying the ideas of other people
and incorporating them into an individual’s writing. It can also be defined as an deliberate act of
deceiving the academic tutor based on submission of plagiarized content, which could not be
claimed as the original work (Helgesson and Eriksson 2015). During such works, the person who
is directly copying the ideas of others does not give credit to the original works.
(b) An example showing the ways in which the incorporation of material from other
sources could be made and avoided from an accusation of plagiarism is:
The Original Content – Joe served cake and tea because they are delicious and her
guests loved them.
The New Content – In order to impress her guests, Joe had served tea and cake as she
considered them to be delicious.
Question 2
The two exemplar ways in which the digital technologies have eroded the values of
personal privacy are:
1. There has been a significant impact made by the use of digital technologies in the form
of swipe cards, surveillance cameras and internet searches. With this, users often leave a trail of
data for others to gather, merge, arrange, analyze and further sell without the consent or
knowledge of the user.
Information Technology docx._3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computing Technologies in Society
|74
|14469
|330

Computer Security Question Answer 2022
|9
|1512
|12

Understanding Security and Cybersecurity: Threats, Breaches, and Protection Measures
|5
|1404
|493

Cervical Cancer: Risk Factors, Aetiology, and Clinical Manifestations
|6
|1995
|115

Reflection on Privacy and Cyber Risks in the Digital Age
|4
|623
|94

MacDonald 2010 Guide for Analyzing Moral Decision Making
|6
|815
|9