Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Data Commentary What is a Data Commentary? Data commentary is data-focused writing for data displayed in a table, graph, figure or some other kinds of

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed
image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed
Data Commentary What is a Data Commentary? Data commentary is data-focused writing for data displayed in a table, graph, figure or some other kinds of non-verbal illustration, which could vary considerably depending on the type of text written (genre). Strength of Claim Data commentaries are exercises in positioning yourself. a DO NOT simply repeat in words what the data has expressed in non-verbal form or to offer description rather than actual commentary or interpretation. 0 DO NOT read too much into the data and draw conclusions that are not well supported. 0 Find the right strength of claim in discussing the data and then order your statements in some appropriate way (perhaps in order of interest or relevance). Purposes of Data Commentary - highlight the results of the research 0 use the data to support a point or make an argument in your paper 0 assess theory, common beliefs, or general practice in light of the given data 0 compare and contrast different data sets I discuss theimplications ofthe data a make recommendations Structure of a Data Commentary 1. Location elements and/or summary statements 2. Highlighting statements 3. Discussions of implications, problems, exceptions, recommendations, or other interesting aspects of the data Table 4 University Students Respondents' Self-Reported Instances of Online Misbehavior during the Previous 12 Months Once o A Few More Than Online Misbehavior Overall Twice Times a Few Times Percentage A. Misrepresentation of Self I. Given false information about yourself to another person on 34.0 12.0 5.0 51.0 the internet 2. Provided false information about your personal details on an 33.0 13.0 5.0 51.0 online form B. Unauthorized use of another's account I. Accessed someone else's email account without his or her 18.0 6.0 2.0 26.0 knowledge 2. Used someone's credit details online without his or her 4.0 1.0 6.0 knowledge C. Plagiarism of an essay or assignment I. Copied a few sentences from a website into an essay or 39.0 16.0 5.0 60.0 assignment without citing the source 2. Copied a few paragraphs from a website into an essay or 21.0 7.0 2.0 20.0 assignment without citing the source 3. Copied a few pages from a website into an essay or 8. 3.0 1.0 1 1.0 assignment without citing the source 4. Copied a whole essay or assignment from a website without 2.0 1.0 0.6 4.0 citing the source 5. Paid for an essay or assignment from a website 2.0 0.7 0.7 3.0 D. Unauthorized downloading of music or film 1. Unauthorized downloading of music from the internet 18.0 22.0 36.0 76.0 2. Unauthorized downloading of film or video from the 18.0 16.0 19.0 53.0 internet E. Pornography use I. Viewed online pornography or pornographic pictures or 17.0 12.0 1 1.0 40.0 films 2. Paid for online pornography or pornographic pictures or 3.0 1.0 1.0 5.0 films Location + Table 4 shows survey respondents' Indicative self-reported involvement in online misbehavior during the previous 12 Summary months. According to the table, the most common online misbehavior is unauthorized downloading of film or music. As can be Linking as- seen, just over three out of four students in the study have downloaded music or film clause and more than once a year. This very high highlight percentage of misbehavior is especially alarming, since protection of intellectual property is a basic element for enriching the film and music industries. Another notable result is that viewing pornographic materials on the internet was reported by 40% of the respondents, although purchasing pornography was reported by only a small minority of these respondents. The least frequently reported misbehaviors were illegally using another person's email account or credit information, along with either completely copying homework from a website or buying an assignment from a source on the internet. It is worthwhile to note that these different forms of online Implications misbehavior seem to be patterned according to the degree of the perceived seriousness of the bad behavior. Activities that are generally believed to be criminal (e.g., using someone's credit information) were less frequent than activities that, although unlawful, many do not view as criminal, such as downloading movies and music. Illegal downloading may have an economic cause, but other reasons might be important, as well. This problem will likely continue until reasons that students engage in this behavior are clearly identified.Table 5 Source of Computer Wrus Infections Location + Table 5 shows the most common Indicative sources of infection for U5. businesses. As can Summary be seen. in a great majority of cases, the entry point of the virus infection can be detected.with e-mail attachments being responsible for nearly 9 out of IO viruses. This very high percentage is increasingly alarming. especially since with a certain amount of caution such infection are largely preventable. In consequence. e-mail users should be wary of all attachments. even those from a trusted colleague or a known sender. In addition. all computers used for e-mail need to have a current version of a good antivirus program whose virus denitions are updated regularly. While it may be possible to lessen the likelihood of downloading an infected le. businesses are still vulnerable to computer virus problems because of human error and the threat of new. quickly spreading viruses that cannot be Source ofVirus Percentage E-mail attachments 87% Disks from home 4% Disks (other) 2% Unknown 2% Download (from internal or external sources) 2% Distribution CD |% Disk (sales demo)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Legal And Regulatory Environment Of Business

Authors: Marisa Anne Pagnattaro, Daniel R. Cahoy, Julie Manning Magid, O. Lee Reed, Peter J. Shedd

18th Edition

1259917126, 1259917127, 978-1259917127

More Books

Students also viewed these Law questions

Question

How can software be used to prepare audit working papers?

Answered: 1 week ago

Question

What is the meaning and definition of E-Business?

Answered: 1 week ago