SlideShare a Scribd company logo
1 of 14
• By: Kaitlin Warren
     • 5th Period
• Copying what someone else has already
  came up with.
• Taking the information from another
  source without citing it.
• To take someone else's information and
  call it yours.
• To copy someone else's words and turn
  them around to make them yours.
• Not putting quotation marks where you
  should.
• Always cite your source.
• Use quotation marks when taking an
  author's words directly from context.
• Obey copyright rules.
• When using quotation marks make
  sure to cite your source at the end of
  the page.
• Avoid paraphrasing incorrectly.
• Not putting quotations marks where
  you should.
• Not citing your source.
• Paraphrasing the authors words.
• Not citing your source when you have
  quoted someone else's words.
• A computer term meaning etiquette for the
  internet.
• Using proper words (not harsh) when using the
  internet.
• Not using word that may offend people who
  have not used the internet a lot.
• Don’t use all capital letters when posting
  something on the internet.
• Don’t use harsh words.
• Don’t say anything you wouldn't want other
  people to know about.
• If you are new to a website don’t go posting
  things right away.
• Don’t put anything on the internet you wouldn’t
  say in person.
• Copyright is used to protect someone else
  from stealing your information.
• It is used by many people, on many
  websites.
• You are disobeying the law if you do copy
  information with copyright.
• It keeps people from stealing
  information.
• If someone does steal your
  information you can prove it is
  yours.
The End
Thanks for Viewing!!!


   Continue for Quiz…
1. Is it alright to copy someone else's
   information without citing?
2. Can I copy information word-for-
   word if I use quotation marks and I
   cite my source?
3. Should you use harsh words on the
   internet?
1.No, this is considered stealing.
2.Yes, as long as your cite and
  quote.
3.No, this can be offensive.
• What is Plagiarism? (2012).
  http://www.plagiarism.org/plag_article_what_is_plagiaris
  m.html
• How to avoid plagiarism (2009).
  http://writing.wisc.edu/Handbook/QPA_plagiarism.html
• How Not to Plagiarize (n.d).
  http://www.writing.utoronto.ca/advice/using-sources/how-
  not-to-plagiarize
• What is ‘Netiquette’? (2012).
  http://www.wisegeek.com/contest/what-is-netiquette.htm
• The Core Rules of Netiquette – Summary (2004).
  http://www.albion.com/bookNetiquette/0963702513p32.html
• TOW5: Avoiding Plagiarism (n.d).
  http://bp00034.wordpress.com/2010/10/26/tow5-avoiding-
  plagiarism/
• Mono-Live: Free Plagiarism Scan (n.d.). http://www.mono-
  live.com/2012/02/free-plagiarism-scan.html
• Tecnologia: Netiquette (n.d)
  http://apariciogue.blogspot.com/2011/04/netiquette.html
• Wikipedia: Copyright (n.d).
  http://en.wikipedia.org/wiki/Copyright
• The Music Coaches: 5 Simple Tips for Copyrighting your
  music (n.d.)
  http://www.themusiccoaches.com/tag/copyright/
• Alicetravelogue: CREATE! DON’T STEAL! CAMPAIGN
  (n.d.) http://alicetravelstory.blogspot.com/2009/03/create-
  dont-steal-campaign.html
• Moodle News: Module: Combat Plagiarism on your
  Moodle with CROT (n.d.)
  http://www.moodlenews.com/tag/plagiarism/
• Bonnie’s Books: Remember (n.d.)
  http://bonniesbooks.blogspot.com/2012/08/remember.ht
  ml

More Related Content

Similar to Plagiarism, netiquette, and copyright info

Nakyra hill proper netiquette 9 18-12
Nakyra hill proper netiquette 9 18-12Nakyra hill proper netiquette 9 18-12
Nakyra hill proper netiquette 9 18-12nakyrahill915
 
Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4cedric1977
 
Cedric dixon powerpoint 4 ms.whitaker 3 (1)
Cedric dixon powerpoint 4 ms.whitaker 3 (1)Cedric dixon powerpoint 4 ms.whitaker 3 (1)
Cedric dixon powerpoint 4 ms.whitaker 3 (1)cedric1977
 
Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4cedric1977
 
Ahmad stallings plagiarism, copyrighting and netiquette
Ahmad stallings plagiarism, copyrighting and netiquetteAhmad stallings plagiarism, copyrighting and netiquette
Ahmad stallings plagiarism, copyrighting and netiquetteAhmadLT
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentationmhporter1
 
Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4cedric1977
 
Plagiarism, Copyright, and Netiquette
Plagiarism, Copyright, and NetiquettePlagiarism, Copyright, and Netiquette
Plagiarism, Copyright, and NetiquetteMya0726
 
Lesson 2: Using Information Ethically I
Lesson 2: Using Information Ethically ILesson 2: Using Information Ethically I
Lesson 2: Using Information Ethically ILeslie Lewis
 
Netiquette, Copyright, Plagiarism
Netiquette, Copyright, PlagiarismNetiquette, Copyright, Plagiarism
Netiquette, Copyright, PlagiarismKamarziTillery
 
How to Behave on the Web
How to Behave on the WebHow to Behave on the Web
How to Behave on the Webdpittmangravity
 
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTSPLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTSBeschara Karam
 
Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th gradeBelinda Larson
 
How people should act on the social media
How people should act on the social mediaHow people should act on the social media
How people should act on the social mediastacieisman
 
Netiquette, Copyright and Plagiarism!
Netiquette, Copyright and Plagiarism!Netiquette, Copyright and Plagiarism!
Netiquette, Copyright and Plagiarism!LiviJayy
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentationhjhteach
 
Safe and ethical use of technology
Safe and ethical use of technologySafe and ethical use of technology
Safe and ethical use of technologyAllison Loyd
 

Similar to Plagiarism, netiquette, and copyright info (20)

Nakyra hill proper netiquette 9 18-12
Nakyra hill proper netiquette 9 18-12Nakyra hill proper netiquette 9 18-12
Nakyra hill proper netiquette 9 18-12
 
Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4
 
Cedric dixon powerpoint 4 ms.whitaker 3 (1)
Cedric dixon powerpoint 4 ms.whitaker 3 (1)Cedric dixon powerpoint 4 ms.whitaker 3 (1)
Cedric dixon powerpoint 4 ms.whitaker 3 (1)
 
Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4
 
Ahmad stallings plagiarism, copyrighting and netiquette
Ahmad stallings plagiarism, copyrighting and netiquetteAhmad stallings plagiarism, copyrighting and netiquette
Ahmad stallings plagiarism, copyrighting and netiquette
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
 
Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4Cedric dixon powerpoint 4 ms.whitaker 4
Cedric dixon powerpoint 4 ms.whitaker 4
 
Plagiarism, Copyright, and Netiquette
Plagiarism, Copyright, and NetiquettePlagiarism, Copyright, and Netiquette
Plagiarism, Copyright, and Netiquette
 
Lesson 2: Using Information Ethically I
Lesson 2: Using Information Ethically ILesson 2: Using Information Ethically I
Lesson 2: Using Information Ethically I
 
howtoresearch colai
howtoresearch colaihowtoresearch colai
howtoresearch colai
 
Netiquette, Copyright, Plagiarism
Netiquette, Copyright, PlagiarismNetiquette, Copyright, Plagiarism
Netiquette, Copyright, Plagiarism
 
How to Behave on the Web
How to Behave on the WebHow to Behave on the Web
How to Behave on the Web
 
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTSPLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
PLAGIARISM_THE BASICS FOR UNDERGRAD STUDENTS
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Online Safety Lesson 5th grade
Online Safety Lesson 5th gradeOnline Safety Lesson 5th grade
Online Safety Lesson 5th grade
 
How people should act on the social media
How people should act on the social mediaHow people should act on the social media
How people should act on the social media
 
Netiquette, Copyright and Plagiarism!
Netiquette, Copyright and Plagiarism!Netiquette, Copyright and Plagiarism!
Netiquette, Copyright and Plagiarism!
 
Digital Citizenship Presentation
Digital Citizenship PresentationDigital Citizenship Presentation
Digital Citizenship Presentation
 
Safe and ethical use of technology
Safe and ethical use of technologySafe and ethical use of technology
Safe and ethical use of technology
 
Searching the Internet
Searching the InternetSearching the Internet
Searching the Internet
 

Recently uploaded

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Plagiarism, netiquette, and copyright info

  • 1. • By: Kaitlin Warren • 5th Period
  • 2. • Copying what someone else has already came up with. • Taking the information from another source without citing it. • To take someone else's information and call it yours. • To copy someone else's words and turn them around to make them yours. • Not putting quotation marks where you should.
  • 3. • Always cite your source. • Use quotation marks when taking an author's words directly from context. • Obey copyright rules. • When using quotation marks make sure to cite your source at the end of the page. • Avoid paraphrasing incorrectly.
  • 4. • Not putting quotations marks where you should. • Not citing your source. • Paraphrasing the authors words. • Not citing your source when you have quoted someone else's words.
  • 5. • A computer term meaning etiquette for the internet. • Using proper words (not harsh) when using the internet. • Not using word that may offend people who have not used the internet a lot.
  • 6. • Don’t use all capital letters when posting something on the internet. • Don’t use harsh words. • Don’t say anything you wouldn't want other people to know about. • If you are new to a website don’t go posting things right away. • Don’t put anything on the internet you wouldn’t say in person.
  • 7. • Copyright is used to protect someone else from stealing your information. • It is used by many people, on many websites. • You are disobeying the law if you do copy information with copyright.
  • 8. • It keeps people from stealing information. • If someone does steal your information you can prove it is yours.
  • 9. The End Thanks for Viewing!!! Continue for Quiz…
  • 10. 1. Is it alright to copy someone else's information without citing? 2. Can I copy information word-for- word if I use quotation marks and I cite my source? 3. Should you use harsh words on the internet?
  • 11. 1.No, this is considered stealing. 2.Yes, as long as your cite and quote. 3.No, this can be offensive.
  • 12. • What is Plagiarism? (2012). http://www.plagiarism.org/plag_article_what_is_plagiaris m.html • How to avoid plagiarism (2009). http://writing.wisc.edu/Handbook/QPA_plagiarism.html • How Not to Plagiarize (n.d). http://www.writing.utoronto.ca/advice/using-sources/how- not-to-plagiarize • What is ‘Netiquette’? (2012). http://www.wisegeek.com/contest/what-is-netiquette.htm
  • 13. • The Core Rules of Netiquette – Summary (2004). http://www.albion.com/bookNetiquette/0963702513p32.html • TOW5: Avoiding Plagiarism (n.d). http://bp00034.wordpress.com/2010/10/26/tow5-avoiding- plagiarism/ • Mono-Live: Free Plagiarism Scan (n.d.). http://www.mono- live.com/2012/02/free-plagiarism-scan.html • Tecnologia: Netiquette (n.d) http://apariciogue.blogspot.com/2011/04/netiquette.html • Wikipedia: Copyright (n.d). http://en.wikipedia.org/wiki/Copyright
  • 14. • The Music Coaches: 5 Simple Tips for Copyrighting your music (n.d.) http://www.themusiccoaches.com/tag/copyright/ • Alicetravelogue: CREATE! DON’T STEAL! CAMPAIGN (n.d.) http://alicetravelstory.blogspot.com/2009/03/create- dont-steal-campaign.html • Moodle News: Module: Combat Plagiarism on your Moodle with CROT (n.d.) http://www.moodlenews.com/tag/plagiarism/ • Bonnie’s Books: Remember (n.d.) http://bonniesbooks.blogspot.com/2012/08/remember.ht ml