<< Chapter < Page Chapter >> Page >

Students have said that they worked as a team or group and that all participated and all learned the materials. Don’t try this excuse because professors don’t buy it. Here is the problem: Part of the learning process is in you doing it yourself. Example: I ask two students to make me some pancakes for breakfast; I expect two individually prepared plates of pancakes (one from each of them) for my breakfast. The professor really does not want to eat two plates of pancakes (or 50 to 100 plates of pancakes, depending on how many students they are teaching), but part of your directed learning activity for the course is to demonstrate that you can make pancakes (not watch someone else make pancakes or participate as a group to make pancakes).

Control access to your files

Controlling the files you create (or are directed to modify) means that others will not have access to copy your work. In other words, don’t share your files.

Students have said that they shared the file so they the other student could see how the completed assignment should look. Don’t try this excuse because professors don’t buy it. Here is the problem: When you share the file you share your typing efforts (or your original work and your efforts to create that original work). Back to our pancake example: “I only gave the other student a plate of completed pancakes, so he could see what the end product should be.” All the other student does is add some blue berries and whip cream. If a student makes minor modifications to your work (changes the spots where his name is at) and turns it in as his work – you will be included in the charge of academic dishonesty. Unless specifically authorized by your professor, don’t share any files that you create or modify with another student – ever, not now and not in the future.

Here are two suggestions for controlling access to your files:

When using a course delivery software product or learning system, such as BlackBorad Vista, don’t give another person your password . With the password, they will have access to your submitted assignments including the files that you created.

Don’t leave your files on a machine where others may have access to them. If multiple students are using or have access to the same machine (often happens with students living in the same household – husband/wife, siblings or roommates) or in an on-campus course where many students will have access to the machine – store your files on a flash drive . Physically control who gets access to your flash drive.

Ask for a clarification of the collaboration

If you have any question about an activity that might be construed as unauthorized collaboration, ask your professor. They will provide clarification and direction to you about the activity.

Students have said that they did not understand or think that it was unauthorized collaboration. Don’t try this excuse because professors don’t buy it . Here is the problem: We can’t, and won’t list every minor way in which students can collude. The burden is for you to ask for any clarification for the specific course from your professor. Don’t assume that what another instructor allowed in another course will be allowed by this professor in this course.

Detecting academic dishonesty

Professors weren’t born yesterday. The faculty members of most institutions have individually years and collectively thousands of years at understanding academic dishonesty. Cheating on tests, plagiarism and collusion are not new to us. We share our expertise with each other at detecting academic dishonesty. Additionally, the years of technical computer experience of professors who teach using computers in lab settings is often astounding.

Students have said that they did not think they could be detected or that academic dishonesty could not be proved. Don’t try this approach because professors believe that they are slightly smarter. Actually, we know that we are a lot smarter. It amazes us that student don’t realize that professors are a formidable force. Don’t gamble that you can beat us at the “Academic Dishonesty Game”. Please don’t take this as a challenge and use it as an excuse to see if you can be academically dishonest and not get caught. We are warning you, not challenging you.

Serious consequences

The consequences will vary from instructor to instructor and from institution to institution. They range from a simple slap on the hand (don’t do it again) to complete explusion from the institution (expelled from all of your courses). Because the bond of trust is broken, many instructors will simply expel you from the course you are taking. As an example: Within the BCIS1405 course at Houston Community College, we expelled 8 students (along with giving them the grade of “F”) from Distance Educations sections during the Spring 2008 term for Academic Dishonesty.

Be ready for what ever the consequences your instructor will deliver if you are dishonest.

Summary

  • The ethics of academic honesty; there is a bond of trust that whatever the student does in relationship to the evaluation process are their own work and efforts.
  • Collusion is the unauthorized collaboration of students on work submitted for evaluation.
  • First directive: Type if yourself
  • Second directive: Don’t share your files
  • Seek clarification from your professor if you have any doubt that the collaborative activity might be considered collusion.
  • Professors are very capable at detecting academic dishonesty.
  • There are usually consequences to your dishonest behavior.

Questions & Answers

how does Neisseria cause meningitis
Nyibol Reply
what is microbiologist
Muhammad Reply
what is errata
Muhammad
is the branch of biology that deals with the study of microorganisms.
Ntefuni Reply
What is microbiology
Mercy Reply
studies of microbes
Louisiaste
when we takee the specimen which lumbar,spin,
Ziyad Reply
How bacteria create energy to survive?
Muhamad Reply
Bacteria doesn't produce energy they are dependent upon their substrate in case of lack of nutrients they are able to make spores which helps them to sustain in harsh environments
_Adnan
But not all bacteria make spores, l mean Eukaryotic cells have Mitochondria which acts as powerhouse for them, since bacteria don't have it, what is the substitution for it?
Muhamad
they make spores
Louisiaste
what is sporadic nd endemic, epidemic
Aminu Reply
the significance of food webs for disease transmission
Abreham
food webs brings about an infection as an individual depends on number of diseased foods or carriers dully.
Mark
explain assimilatory nitrate reduction
Esinniobiwa Reply
Assimilatory nitrate reduction is a process that occurs in some microorganisms, such as bacteria and archaea, in which nitrate (NO3-) is reduced to nitrite (NO2-), and then further reduced to ammonia (NH3).
Elkana
This process is called assimilatory nitrate reduction because the nitrogen that is produced is incorporated in the cells of microorganisms where it can be used in the synthesis of amino acids and other nitrogen products
Elkana
Examples of thermophilic organisms
Shu Reply
Give Examples of thermophilic organisms
Shu
advantages of normal Flora to the host
Micheal Reply
Prevent foreign microbes to the host
Abubakar
they provide healthier benefits to their hosts
ayesha
They are friends to host only when Host immune system is strong and become enemies when the host immune system is weakened . very bad relationship!
Mark
what is cell
faisal Reply
cell is the smallest unit of life
Fauziya
cell is the smallest unit of life
Akanni
ok
Innocent
cell is the structural and functional unit of life
Hasan
is the fundamental units of Life
Musa
what are emergency diseases
Micheal Reply
There are nothing like emergency disease but there are some common medical emergency which can occur simultaneously like Bleeding,heart attack,Breathing difficulties,severe pain heart stock.Hope you will get my point .Have a nice day ❣️
_Adnan
define infection ,prevention and control
Innocent
I think infection prevention and control is the avoidance of all things we do that gives out break of infections and promotion of health practices that promote life
Lubega
Heyy Lubega hussein where are u from?
_Adnan
en français
Adama
which site have a normal flora
ESTHER Reply
Many sites of the body have it Skin Nasal cavity Oral cavity Gastro intestinal tract
Safaa
skin
Asiina
skin,Oral,Nasal,GIt
Sadik
How can Commensal can Bacteria change into pathogen?
Sadik
How can Commensal Bacteria change into pathogen?
Sadik
all
Tesfaye
by fussion
Asiina
what are the advantages of normal Flora to the host
Micheal
what are the ways of control and prevention of nosocomial infection in the hospital
Micheal
what is inflammation
Shelly Reply
part of a tissue or an organ being wounded or bruised.
Wilfred
what term is used to name and classify microorganisms?
Micheal Reply
Binomial nomenclature
adeolu
Got questions? Join the online conversation and get instant answers!
Jobilize.com Reply

Get Jobilize Job Search Mobile App in your pocket Now!

Get it on Google Play Download on the App Store Now




Source:  OpenStax, Programming fundamentals - a modular structured approach using c++. OpenStax CNX. Jan 10, 2013 Download for free at http://cnx.org/content/col10621/1.22
Google Play and the Google Play logo are trademarks of Google Inc.

Notification Switch

Would you like to follow the 'Programming fundamentals - a modular structured approach using c++' conversation and receive update notifications?

Ask