Professional Documents
Culture Documents
Mil Reviewer
Mil Reviewer
Mil Reviewer
Violation of such right is called INFRINGEMENT. *SOURCES CITED* (BUT STILL PLAGIARIZED)
COPYRIGHT LAW gives creators of original material the 1. The Forgotten Footnote - The writer mentions an
exclusive right to further use and duplicate that material for a author’s name for a source, but neglects to include
given amount of time, at which point the copyrighted item specific information on the location of the material
becomes public domain. (KENTON, 2020). referenced.
2. The Misinformer - The writer provides inaccurate
information regarding the sources, making it
PLAGIARISM is an instance of using or closely imitating
impossible to find them.
the language and thoughts of another author without
3. The Too-Perfect Paraphrase - The writer properly
authorization; the representation of that author's work as
cites a source, but neglects to put quotation marks
one's own, as by not crediting the original.
on the text that has been copied word-for-word, or
close to it.
PHISHING is a cybercrime in which a target or targets are
4. The Resourceful Citer - The writer properly cites
contacted by email, telephone, or text message by someone
all sources, paraphrasing and using quotations
posing as a legitimate institution to lure individuals into
appropriately. The catch? The paper contains almost
providing sensitive data such as personally identifiable
no original work!
information, banking and credit card details, and passwords.
5. The Perfect Crime - The writer properly quotes
The information is then used to access important accounts
and cites sources in some places, but goes on to
and can result in identity theft and financial loss.
paraphrase other arguments from those sources
without citation.
The FAIR USE of a copyrighted work for criticism,
comment, news, reporting, and teaching including multiple
copies for classroom use, scholarship, research, and similar NETIQUETTE
purposes is not an infringement of copyright.
Netiquette, or network etiquette, is a set of socially
DECOMPILATION which is the reproduction of the code constructed rules and norms for behaving and
and translation of the forms of the computer programs to communicating responsibly in an online environment.
achieve the inter-operability of an independently created Simply stated, it is the etiquette of cyberspace.
computer program with other programs may also constitute
fair use. While not all of these rules hold legal power nor are
strictly enforced, it is important that you, as a media
✓ Copyright is a legal device authorizing the creator of a consumer, have a well-defined set of guidelines that helps
literary piece, artistic work, musical, or other creative keep you or the people you know in check in terms of your
compositions the sole right to publish and sell such work. online activity and presence.
✓ Plagiarism is an instance of using or closely imitating the Consider the following "rules," adapted from Virginia
language and thoughts of another author without Shea's The Core Rules of Netiquette, whenever you
authorization. communicate in the virtual world.
✓ Cyberbullying is bullying that takes place online. Rule 1: Remember the human
Remember that the receiver on the other side of your
✓ Computer addiction is the excessive use of computers to computer or phone is another human person capable of
the extent that it interferes with daily life. understanding, feeling, and getting hurt.
Putting yourself in others’ place can put everything in the right
✓ Phishing is a cybercrime in which a target or targets are perspective. Before you send that message, upload that photo,
contacted by email, telephone, or text message by someone or send that tweet, ask yourself:
posing as a legitimate institution to lure individuals into
How would the other person or people at the end of the line
providing sensitive data.
feel if I do or say this? Always put in mind that empathy is
Digital divide is an economic inequality between groups in one of the most powerful motivations for some basic decency
terms of access to, use of, or knowledge of ICT. online.
Rule 6: Share expert knowledge The digital divide may further be grouped into three
The strength of the Internet is the extent of the information it divisions, as relayed by The Manila Times writer Noemi
offers and the various sources this information comes from. Lardizabal-Dado (2019):
While credibility issues are a concern, the Internet, as an
overall knowledge bank, continues to grow and expand. ✓ The digital native and the digital immigrants.
✓ The digital rich and the digital poor.
As experts contribute facts that people constantly consume. ✓ The digital skills and the digital unskilled.
Although netiquette lists several red flags, sharing your
knowledge on something doesn’t count as one. So do your
part – share what you know! When you post a question and TEXT AND INFORMATION MEDIA
receive intelligent answers, share the results with others. Informative texts or media provide information about a topic
or situation and can include newspaper articles, manuals and
If you are one of these people or if you are someone with handbooks, textbooks, brochures and menus or recipes.
knowledge powerful enough to expertly navigate through
cyberspace, remember The internet with websites presents a wide range of examples
of informative texts which give the reader information about
that knowing more than others does not give you the right
particular subjects. Informative writing which provides facts
to take advantage of them.
is often quite formal and will often use the passive voice.
Rule 7: Help keep flame wars under control
"Flaming is what people do when they express a strongly TEXT
held opinion without holding back any emotion." (Shea,
A simple and flexible format of presenting information or
1994). Flamers, from the name itself, add fuel to the flame –
conveying ideas whether hand written, printed or displayed on
they provoke people whose opinions are different from
screen.
theirs, these are the people who express their opinion in an
aggressive or offensive manner usually resulting in “flame-
wars” where two or three people exchange angry posts a. Text is very powerful as well as disseminating
between one another. information, providing and giving suggestions.
- Informal text - based materials, on the other hand, 2. Appropriateness - refers to how fitting or suitable
come from personal the text is used for a specific audience, purpose or
event. In the creation of text-based content, make
c. Text can be as short such as a single sentence or phrase, or sure that the selection criteria (tone, style, purpose,
they can be as lengthy as news articles or investigative clarity) is followed. As for the choice of typefaces
reporting. No matter how brief or lengthy, however, a text is to be used, refer to the discussion of the
always carefully written with the intent of sending a very characteristics of the fonts. When it comes to large
specific message to the target audience. body text, the font should be clear enough to read
d. In our exposure to text media and information, we can 3. Proximity - refers to how near or how far are the
either be a consumer or a producer of content. As a text elements from each other. When two things are
consumer, these are the questions that you need to ask with closely related, we bring them close together.
regards to the content of text media and information. e. As a Otherwise, we put text elements far from each
producer of text media and information, we need to review other. For example, the main title and subtitle are
the mediaandinformationdesign usually placed close to each other.
4. Script - draws much attention to itself because AUDIO MEDIA AND INFORMATION DESIGN
of its brush-like strokes. This must be used PRINCIPLES AND ELEMENTS
sparingly and not to be used in large body text.
This font is usually used in wedding invitation Characteristic and Purposes of Sound
cards or other formal events.
1. Volume - intensity of a sound
Examples: Edwardian, Vladimir, Kunstler 2. Tone - the audible characteristic of a sound
3. Pitch - is how high or low a sound is
5. Decorative - caters to a wide variety of emotions
(such as celebration, fear, horror, etc.) or themes 4. Loudness - refers to the magnitude of the sound
(such as cowboys, circus, holidays, summer, heard
kiddie, etc.)
GIFs also have an extremely limited color range Design Principles and Elements
suitable for the web but not for printing. This The elements and principles of design are the building blocks
format is never used for photography, because of used to create a work of art. The elements of design can be
the limited number of colors. GIFs can also be used thought of as the things that make up a painting, drawing,
design etc. Good or bad - all paintings will contain most of if
not all, the seven elements of design.