Presentation is loading. Please wait.

Presentation is loading. Please wait.

 Rescue for the  Technical Researcher & Writer  Part 2:  Formatting your Paper.

Similar presentations


Presentation on theme: " Rescue for the  Technical Researcher & Writer  Part 2:  Formatting your Paper."— Presentation transcript:

1  Rescue for the  Technical Researcher & Writer  Part 2:  Formatting your Paper

2 Taking Notes  Avoid plagiarism  Read the information, think, then put what you’ve read in your own words  Avoid cutting and pasting  Identify direct quotes  Document your sources as you take notes

3 Preparing to Write  The purpose of this document is _________________.  the problem this document addresses  the technical issues or major points to be made  what the document will do for readers

4 Creating an Outline  Show relationships between ideas  Identify main ideas & supporting ideas (use your concept map as a guide)  Establishes structure you hope to follow through start to finish

5 Sample Outline 1.0 Introduction  purpose: to discuss the best methods and procedures for computer data backup  background: History of backup hardware  scope: Backup procedures, types of backup hardware, data security  methodology: Online database research, internet, library resources 2.0 Body of Topic  Overview of backup procedures  Cloud Storage  Offsite Storage  Backup Servers  Backup hardware  External USB Hard drives  External Solid State Hard Drives  Blu-Ray DVD  Secure Backup  Data Encryption  Password Policies 3.0 Conclusion 4.0 Recommendations

6 The Technical Report  Executive Summary  Acknowledgements (optional)  Table of Contents  List of Illustrations  Introduction  Body of Topic  Conclusions  Recommendations  References  Image References

7 Executive Summary  Very important part of the Technical Report  Condensed overview of the project  Identifies purpose, scope, methodology, recommendations, conclusions  Created after the paper has been completed

8 Acknowledgements  Optional  Like a dedication  Thanks people or groups for support of and assistance with the project

9 Table of Contents LETTER OF TRANSMITTAL.....................................................ii EXECUTIVE SUMMARY........................................................iii ACKNOWLEDGEMENTS.......................................................iv LIST OF ILLUSTRATIONS.......................................................v 1.0 INTRODUCTION.......................................................... 1 1.1 Purpose.............................................................. 1 1.2 Background............................................................1 1.3 Scope.................................................................2 1.4 Methodology...........................................................2 2.0 BODY OF TOPIC 2.1 Backup Procedures ………………..........................................4 2.2 Types of Backup Hardware.............................................. 5 2.2.1 External Hard Drives.............................................. 6 2.2.2 Blu-Ray DVD................................................... 7 2.3 Data Security …….......................................................8 3.0 CONCLUSIONS.......................................................... 9 4.0 RECOMMENDATIONS.................................................... 10 REFERENCES............................................................. 11 APPENDIX: Comparison of Various Types of External Hard Drives..................... 12

10 List of Illustrations  Like a table of contents for graphics  Allows readers to access your graphics with ease Figure 1: Timeline: Data Backup Storage.. 5 Figure 2: Solid State Hard Drive....... 7 Chart 1: Methods of Data Encryption.... 10

11 Documenting Illustrations  Figure 1. Timeline: Data backup storage

12 1.0 Introduction 1.1 Purpose goal, problem 1.2 Background brief history of the purpose 1.3 Scope defines what is (and is not) part of the project 1.4 Methodology research methods used, how information was collected

13 2.0 Body of Report  The research results and findings  Facts and figures  Divided into second and third level headings

14 3.0 Conclusion  Solves the problem presented in the introduction by connecting to the data in the body  Suggested actions drawn from the conclusions  4.0 Recommendations

15 References  List of your sources  Printed  Electronic  Audiovisual  APA (American Psychological Association) format  Alphabetical order by author

16 Writing the Rough Draft  Use your outline  Follow the technical report format  Goal is to get ideas down, worry about mechanics later

17 Editing the Rough Draft  If time allows, set it aside for a day or so.  Editing tools  Dictionary / spell check  Thesaurus  Grammar & punctuation handbook / grammar check  Red pen  An editor

18 Writing the Final Draft  Pay attention to appearance  Read the paper out loud  Don’t forget to credit your sources  In text Citations, Reference page  Create a snappy title  Keep a backup copy

19 (Harris, 2001, p.96)

20 What is Plagiarism? Taking credit for work that isn’t your own! Simply stated, “It is cheating and dishonest”

21 Plagiarism is… A breach of the Holland College Code of Conduct for Learners!! Consequences may range from…  Formal warning  Probation  Suspension, or  Dismissal

22 Plagiarism includes…  Copying an entire paper and claiming it as your own  Copying part of a paper and claiming it as your own  Copying information from a source and passing it off as your own  Cutting and pasting from the web or any other electronic resource and passing it off as your own

23 Accident or Not It’s Still Plagiarism When…  Copying text word for word and failing to put quotation marks around it even if you cite it  Inaccurately quoting a source  Omitting in-text citations even though the source is cited on the works cited page  Failing to include the citation on the works cited page

24 Tools to Avoid Plagiarism Public domain image used with permission from karenswhimsy.com.

25 How do I Avoid It?  Use your own words and ideas  Give credit for direct quotes using quotation marks and citing the source  Give credit for websites, photos, diagrams, graphics, multimedia  Paraphrases, restating the author’s words or ideas in your own words, must be cited

26 To Cite or Not to Cite ? (Harris, 2001, p. 155)

27 Cite unless it’s….  Proverbs or sayings e.g., Beggars can’t be choosers  Common knowledge (can find a fact in several sources) e.g., Sir John A. Macdonald was the first prime minister of Canada. When in Doubt ….. CITE IT!!

28 Sources to cite  Books  Journal Articles  Web Sites  Government Documents  Statistics  Images/Charts/Tables  Video recordings  Interviews  Email

29 Question 1 a)Yes, it’s plagiarism b)No, it isn’t c)Don’t know It’s the night before your paper is due, and you haven’t done any work. You buy a paper from an online paper mill and hand it in as your own. Is this plagiarism?

30 Question 2 a)Yes, it’s plagiarism b)No, it isn’t c)Don’t know You use the saying What happens in Vegas stays in Vegas in an essay you’ve written about gambling. You do not put quotes around it, nor do you cite it. Is this plagiarism?

31 Question 3 a)Yes, it’s plagiarism b)No, it isn’t c)Don’t know You find a great idea in an article, so you use it in your paper. You don’t bother to cite the source of the idea because you’ve expressed it in your own words. Is this plagiarism?

32 Quotations  Double quotation marks around short quotations (<40 words).  Longer quotations (>40 words) block indent and omit quotation marks.

33 Short Quotation (<40 words) “An honor code usually consists of a signed statement in which students promise not to cheat and not to tolerate those who do” (Harris, 2001, p. 117).

34 Long Quotation (>40 words) Athletes are searching for anything that will make them more competitive including nutritional supplements, such as vitamins, energy bars and drinks that may compensate for dietary deficiencies, and over-the-counter products like shark cartilage and amino acids, which purport to increase muscle mass, boost energy and endurance, prompt weight gain (or loss), or reduce recovery time between workouts. (Jollimore, 2004, p. 54)

35 In-Text Citation (APA Style) It has been suggested that “For all the progress athletes are making in eating well, many continue to rely on risky dietary supplements, which are often tainted by banned substances such as nandrolone” (Jollimore, 2004, p. 54). OR

36 In-Text Citation (APA Style) Jollimore (2004) states that “For all the progress athletes are making in eating well, many continue to rely on risky dietary supplements, which are often tainted by banned substances such as nandrolone” (p. 54).

37 Paraphrasing  Restating the author’s ideas into your own words  Need to do more than just change a word or two

38 Paraphrasing Original text: “Admissions officers agree that whatever the topic, everything rests in the execution. They look for a thoughtful, revelatory essay that enhances the rest of a student’s application” (Flora, 2004, p.24). Sample Paraphrase: A students’ application for admission is based on many things, one being a creative and unique essay (Flora, 2004).

39 Reference List  Acknowledges all the sources you have cited in your project  Organized in alphabetical order  Strictly follows citation style format (APA, MLA... )

40 References Anderson, D. (2001, August 3). Statement by Environment Minister David Anderson on Arctic National Wildlife Refuge. Retrieved July 24, 2004, from http://www.ec.gc.ca/Press/2001/010803_s_e.htm http://www.ec.gc.ca/Press/2001/010803_s_e.htm Blicq, R. (2001). Guidelines for report writing. Toronto: Pearson Education Canada. Booth, W. C., Colomb, G. G., & Williams, J. M. (1995). The craft of research. Chicago: University of Chicago Press. Harris, R. (2001). The plagiarism handbook. Los Angeles: Pyrczak. Health Canada. (2004). West Nile virus. Retrieved July 19, 2004, from http://www.hc-sc.gc.ca/english/westnile/index.html http://www.hc-sc.gc.ca/english/westnile/index.html Jollimore, M. (2004, June 21). Fuel’s gold: Why Canada’s athletes pay so much attention to what they eat. Time, 163(25), 52-61. Reitman, J. (2004). The Baghdad follies. Rolling Stone, 952/953, 110- 117.

41 Capitalization Rules  Title of a journal article, books, videos and web documents – capitalize the first letter only of the title. Example: The dangers of the work place. Remember to capitalize proper nouns: example: The education system in Canada.  Titles of newspapers, journals and magazines – Capitalize all major words in the title. Example: The Globe and Mail  Always capitalize the word following a colon [ : ]. Example from a book title: The sweat off our brows: Working the field  Don’t capitalize minor words like: and, or, the, is except when?

42 Rules of Italics  Italicize the titles of journals, magazines, newspapers, books, videos and web documents: Some examples:  Book: The sound and the fury  Video: Saving Private Ryan  Magazine: Time  Italicize the volume number of a journal but not the issue number: Example: Canadian Art, 24(3)  Do not italicize article titles from journals and magazines:  Example from an article from Time: The wayward winds of change [Not italicized]

43 References (APA Style) Website Lastname, A. A. (Year, Month DD if applicable). Title of page. Retrieved date, from URL Health Canada. (2004, May 25). West Nile virus. Retrieved July 19, 2004, from http://www.hc- sc.gc.ca/english/westnile/index.html ** The retrieval date is not required unless the web page is likely to change (such as wikis)

44 RMIT (2001) views “information literacy as a basis for lifelong learning” [in-text quoting] Information literacy is relevant for lifelong learning (RMIT, 2001). [paraphrasing] RMIT University Library. (2001). Information literacy @ RMIT. Retrieved from http://www.lib.rmit.edu.au/infolit/index.html [reference list] Web Resource Example Author(s) Date Created use (n.d.) if no date Website Title Website address

45 “Responsible for one out of four help desk calls and half of the PC crashes reported to Microsoft, spyware is draining IT resources and business productivity” (Phifer, 2006, p.46). [in text quoting] Malicious spyware is documented as a common problem behind many help desk calls and other computer problems (Phifer, 2006). [paraphrasing] Phifer, L. (2006, August). Dealing with adware and spyware. Business Communications Review, 36(8), 44-48,51. Retrieved from Ebscohost. [reference list] Article from Online Journal Database Author(s) Date Created ArticleTitle Journal Title Publication details and pages Database

46 Figure Example Figure 1: Certificate installation (Curran & Canning, 2007, p. 141)

47 Chart Example Chart 1: Logic and arithmetic microprocessor operations (Rodríguez, Zúñiga, Calvo, & Tepichín, 2008, p. 1101)

48 List of Illustrations Figure 1: Certificate installation ………………………………………2 Chart 1: Logic and arithmetic microprocessor operations …………7

49 Image References Curran, K., & Canning, P. (2007). Certificate installation [Diagram]. Information Systems Security, 16(3), 141. doi:10.1080/10658980701401686. Rodríguez, E., Zúñiga, H., Calvo, M., & Tepichín, E. (2008). Logic and arithmetic microprocessor operations [Chart]. AIP Conference Proceedings, 992(1), 1101. doi:10.1063/1.2926799.

50 Image References Curran, K., & Canning, P. (2007). Certificate installation [Diagram]. Information Systems Security, 16(3), 141. doi:10.1080/10658980701401686. Rodríguez, E., Zúñiga, H., Calvo, M., & Tepichín, E. (2008). Logic and arithmetic microprocessor operations [Chart]. AIP Conference Proceedings, 992(1), 1101. doi:10.1063/1.2926799.

51 Image References Curran, K., & Canning, P. (2007). Certificate installation [Diagram]. Information Systems Security, 16(3), 141. doi:10.1080/10658980701401686. Rodríguez, E., Zúñiga, H., Calvo, M., & Tepichín, E. (2008). Logic and arithmetic microprocessor operations [Chart]. AIP Conference Proceedings, 992(1), 1101. doi:10.1063/1.2926799.

52 Image References Curran, K., & Canning, P. (2007). Certificate installation [Diagram]. Information Systems Security, 16(3), 141. doi:10.1080/10658980701401686. Rodríguez, E., Zúñiga, H., Calvo, M., & Tepichín, E. (2008). Logic and arithmetic microprocessor operations [Chart]. AIP Conference Proceedings, 992(1), 1101. doi:10.1063/1.2926799.

53 References Curran, K., & Canning, P. (2007). Wireless handheld devices become trusted network devices. Information Systems Security, 16(3), 134-146. doi:10.1080/10658980701401686. Rodríguez, E., Zúñiga, H., Calvo, M., & Tepichín, E. (2008). Opto- electronic emulation of a programmable digital circuit. AIP Conference Proceedings, 992(1), 1100-1105. doi:10.1063/1.2926799.

54 What’s Wrong? Hint: 3 Things Karraker, Nancy E. (2001). String Theory: Reducing Mortality of Mammals in Pitfall Traps. Wildlife Society Bulletin, 29(4), 1158-1162.

55 Correct Version Hint: 3 Things Karraker, N. E. (2001). String theory: Reducing mortality of mammals in pitfall traps. Wildlife Society Bulletin, 29(4), 1158-1162.

56 What’s Wrong? Hint: 4 Things Loomans, D., and Kolberg, K. (1993) The laughing classroom: Everyone’s guide to teaching with humor and play. Tiburon, CA: H J Kramer Inc.

57 Correct Version Hint: 4 Things Loomans, D., & Kolberg, K. (1993). The laughing classroom: Everyone’s guide to teaching with humor and play. Tiburon, CA: H J Kramer Inc.

58 Automated Ebsco Citations Hatch, J. (2010). Rethinking the Relationship Between Learning and Development: Teaching for Learning in Early Childhood Classrooms. Educational Forum, 74(3), 258-268. doi:10.1080/00131725.2010.483911.

59 Automated Ebsco Citations

60 Automated Ebsco Citations for Full Article Hatch, J. (2010). Rethinking the Relationship Between Learning and Development: Teaching for Learning in Early Childhood Classrooms. Educational Forum, 74(3), 258-268. Retrieved from EbscoHost.

61 Automated Ebsco Citations for Image/Chart

62

63

64

65

66

67 Image References Curran, K., & Canning, P. (2007). Certificate Installation [Diagram]. Information Systems Security, 16(3), 141. doi:10.1080/10658980701401686. Rodríguez, E., Zúñiga, H., Calvo, M., & Tepichín, E. (2008). Logic and arithmetic microprocessor operations [Chart]. AIP Conference Proceedings, 992(1), 1101. doi:10.1063/1.2926799.

68 Image References Curran, K., & Canning, P. (2007). Certificate installation [Diagram]. Information Systems Security, 16(3), 141. doi:10.1080/10658980701401686. Rodríguez, E., Zúñiga, H., Calvo, M., & Tepichín, E. (2008). Logic and arithmetic microprocessor operations [Chart]. AIP Conference Proceedings, 992(1), 1101. doi:10.1063/1.2926799.

69 Image References Curran, K., & Canning, P. (2007). Certificate installation [Diagram]. Information Systems Security, 16(3), 141. doi:10.1080/10658980701401686. Rodríguez, E., Zúñiga, H., Calvo, M., & Tepichín, E. (2008). Logic and arithmetic microprocessor operations [Chart]. AIP Conference Proceedings, 992(1), 1101. doi:10.1063/1.2926799.

70 Image References Curran, K., & Canning, P. (2007). Certificate installation [Diagram]. Information Systems Security, 16(3), 141. doi:10.1080/10658980701401686. Rodríguez, E., Zúñiga, H., Calvo, M., & Tepichín, E. (2008). Logic and arithmetic microprocessor operations [Chart]. AIP Conference Proceedings, 992(1), 1101. doi:10.1063/1.2926799.

71 Helpful Websites Holland College Library Citation FAQ: http://www.hollandcollege.com/library/ Click on Citing and Plagiarism link on the left The Owl at Purdue http://owl.english.purdue.edu/owl/resource/560/01/


Download ppt " Rescue for the  Technical Researcher & Writer  Part 2:  Formatting your Paper."

Similar presentations


Ads by Google