Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Final Project in IT 101

No description

simon bautista

on 14 October 2012

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Final Project in IT 101

Introduction to Computer Systems
and Applications Final Project in IT 101 Introduction Technology Trailblazers Company on the Cutting Edge Problem Solving at Home Web Research Time ticks the fastest in the field of technology. Just one click, you can send a message to anywhere and anytime. Your new smartphone might become an old model after a few years, or even years. Your gaming rig with high end specs that you’ve save for years might not run the latest game that everybody’s been talking about. This report aims to give information about the people that struggled and is struggling for the pursuit of knowledge in the IT field, Companies that strives to make profit will giving their consumers the best quality of products, and latest products. It also aims to give simple solutions to simple problems that anyone can solve in their homes. Bill Gates

Bill Gates is one of the most influential people in the world. He is cofounder of one of the most recognized brands in the computer industry with nearly every desk top computer using at least one software program from Microsoft. Bill Gates started studying at Harvard University in 1973 where he spent time with Paul Allen. Gates and Allen worked on a version of the programming language BASIC, that was the basis for the MITS Altair (the first microcomputer available).
After dropping out of Harvard Bill Gates and his partner Paul Allen set about revolutionizing the computer industry. Gates believed there should be a computer on every office desk and in every home.
In 1975 the company Micro-soft was formed, which was an abbreviation of microcomputer software. It soon became simply "Microsoft"® and went on to completely change the way people use computers.
Tom Anderson

Born October 13, 1975, Tom Anderson earned two degrees from the University of California, neither computer-related. In 2003, he teamed up with Chris DeWolfe to set up MySpace, a site intended to help fans connect with their favorite bands and share music.
Internet entrepreneur. Born October 13, 1975 in Santa Monica, California. Anderson received his Bachelor's degree in Rhetoric and English from the University of California, Berkeley in 1998 and his Master's in Film from the University of California, Los Angeles in 2000. In 2003, Anderson, Chris DeWolfe and a few computer programmers set up the first pages of MySpace, which was designed to connect musicians and bands with their fans, enabling them to share their music online.
MySpace quickly became the rage among teens and 20-somethings and has since become the most popular social networking website on the Internet. Anderson now serves as President of the company; DeWolfe is its CEO. All newly created MySpace accounts include Anderson as a default "friend," and he has subsequently become the public face of MySpace.

Steve Wozniak

Steve Wozniak or Stephen Wozniak (born August 11, 1950), known as Steve Wozniak or Woz, is an American computer engineer andprogrammer who founded Apple Computer (now Apple Inc.) with Steve Jobs and Ronald Wayne. Wozniak single-handedly invented the Apple Icomputer and the Apple II computer in the 1970s. These computers contributed significantly to the microcomputer revolution.
During his brief stint at the University of California at Berkeley, Steve Wozniak met Steve Jobs through a mutual friend. The two paired up to form Apple Computer on April 1, 1976, prompting Wozniak to quit his job at Hewlett-Packard.
Working out of a family garage, he and Jobs attempted to produce a user-friendly alternative to the computers that were being introduced by International Business Machines at that time. Wozniak worked on the invention of products and Jobs was responsible for marketing.

Apple Inc. (formerly Apple Computer, Inc.) is an American multinational corporation that designs and sells consumer electronics, computer software, and personal computers. The company's best-known hardware products are the Macintosh line of computers, the iPod, the iPhone and the iPad. Its software includes the OS X and iOS operating system; the iTunes media browser. Apple is the world's third-largest mobile phone maker after Samsung and Nokia. Established on April 1, 1976 in Cupertino, California, and incorporated January 3, 1977, the company was named Apple Computer, Inc. for its first 30 years. The word "Computer" was removed from its name on January 9, 2007, as its traditional focus on personal computers shifted towards consumer electronics.
Apple was established on April 1, 1976 by Steve Jobs, Steve Wozniak, and Ronald Wayne to sell the Apple I personal computer kit.
The Apple I was sold as a motherboard (with CPU, RAM, and basic textual-video chips)—less than what is today considered a complete personal computer. The Apple II was introduced on April 16, 1977. The Apple II was chosen to be the desktop platform for the first "killer app" of the business world—the VisiCalc spreadsheet program. VisiCalc created a business market for the Apple II, and gave home users an additional reason to buy an Apple II—compatibility with the office. Amazon
Amazon.com, Inc. is an American multinational electronic commerce company with headquarters in Seattle, Washington, United States. It is the world's largest online retailer. The company also produces consumer electronics—notably the Amazon Kindle e-book reader and the Kindle Fire tablet computer—and is a major provider of cloud computing services.
The company began as an online bookstore. While the largest brick-and-mortar bookstores and mail-order catalogs might offer 200,000 titles, an online bookstore could sell far more. Bezos wanted a name for his company that began with "A" so that it would appear early in alphabetic order. He began looking through the dictionary and settled on "Amazon" because it was a place that was "exotic and different" and it was the river he considered the biggest in the world, as he hoped his company would be. Since 2000, Amazon's logotype is an arrow leading from A to Z, representing that they carry every product from A to Z. Verisign
Verisign, the largest certificate authority (CA) organization, assigns a digital signature to a customer that contains two encrypted codes called keys--a private key that certifies the customer and a public key, which certifies the customer to anyone using the customer's web site. These codes form what is called a "secure socket layer", or SSL (a digital system developed by Netscape) that insures the website's authenticity.
Verisign verifies web sites using a process that examines traditional documents like articles of incorporation and business licenses as well as digital verification of each site operated by the organization. It is this certification process that is represented by the Verisign trademark on participating web sites. The trademark is generally found in an upper or lower corner of a page and any order forms where personal information is requested should display one. Most Windows systems also display a warning screen when the computer switches to secure mode.
1. Incorrect Grade Report
Your grade report came in the mail today. On the grade report, your grade point average (GPA) is not what you expect. After computing it manually, u discovers that the gap on your grade report is incorrect. What might be causing this error?

Answer: Basically it is either a human error or machine error. The data that is input might be wrong. The program itself may have displayed a wrong result from some reason, as bugs and such. Another possible reason might be the rules for calculating the Grade/Grade Point Average may have changed.

2. Suspicious Charges
Your credit card company called to inform you that your account has a suspicious charge. Upon further investigation, you realize that the charge does not belong to you. What will you do?

Answer: The first thing to do is to ask them(bank or company) to either temporarily hold or close the account until the investigation is done. Some charges might be caused by a ban or company’s error.
3. Shared Printer Error
At the beginning of the semester, your roommate configured your computer so that it could print on the printer in his bedroom. He left for vacation three days ago, and you recently noticed that you are unable to print to his printer from your computer. Each time you attempt to print, you receive an error message stating that the printer is unavailable. What might me wrong?

Answer: There are a number of possible things that went wrong:
1. Computer Name - When a network of computers shares a common server, each unit should possess one unique name. This is to prevent the server from getting confused when it receives print jobs. When naming computers, it is important to follow the recommendations given by the operating system, such as spaces, case and special characters.
2. Printer Sharing Not Installed - Printer sharing problems will most likely occur especially on networks using Windows operating systems when the "File and Printer Sharing for Microsoft Windows" is not enabled. This service should be installed to make the network capable of file sharing. After installing the service, check if it has already been adapted into the computer settings by viewing the adapter properties and making sure the checkbox next to the service is set to "on."
3. Firewalls - Internet connection firewalls usually meddle with peer-to-peer file sharing. When setting up a network for peer-to-peer file sharing, the firewalls should be turned off. Make sure that all firewall settings, including third-party firewall products, are turned off because they can interfere with LAN file sharing and printing.
4. Software Installation Trouble
You have purchased a new video game for you home computer and attempt to install it. Upon inserting the installation disc, however, nothing appears to happen on your computer. What is your next step?

Answer: Check if the CD is already mounted(check it at my computer if your reader “detects” the cd). If it is detected, simply explore the cd and run the .exe(executable)file or the setup file or the autorun file. If it is not detected, check for scratches in the installation disc. This may cause the reader to not read whats in the cd.

5. Problematic Player
After charging your portable media player overnight, you turn it on only to find that it is reporting a low battery, Seconds later, it shuts off automatically. What might be wrong?

Answer: Hardware problems. Either Internal battery is failing or charger is faulty. Buy a new battery or replace charger.

6. Inaccessible Media
You insert an optical disc with digital photos from your most recent family vacation, you discover that your computer will not read the optical disc. What might be wrong?

Answer: Much like the solution in the software installation trouble, there may be physical scratches on the CD. Scratches and scuffs occurs from time to time, especially with frequent use. The scratches may damage the cd and may lead to data loss. Clean the scratched cd if possible.
7. Bank Account Postings
While reviewing your checking account balance online, you notice that debit card purchases have not posted to your account for the past several days. Because you use online banking to balance your account, you become concerned about your unknown account balance. What steps will you take to correct this situation?

Answer: Some transactions takes hours or even days to be completed. There also maybe unexpected error by the time you are online banking. Try contacting their technical support for this problem.

8. GPS Error
You are driving to your friend’s house and are using your GPS receiver for directions. While approaching your destination, you realize that GP receiver instructed you to turn the wrong way on your friend’s street. How could this happened.

Answer: the entire system of GPS is dependent on a network of 24 satellites orbiting the earth. One of the most common source of error is clock inaccuracy. Others are:
•Ionosphere and troposphere disturbances: These cause the satellite signal to slow down as it passes through the atmosphere. However the GPS system has a built in model that accounts for an average amount of these disturbances.
•Signal reflection: Here the signal hits and is reflected off objects like tall buildings, rocks etc. This causes the signal to be delayed before it reaches the receiver.
•Ephemeris errors: Ephemeris errors are also known as orbital errors. These are errors in the satellite’s reported position against its actual position.
•Clock errors: The built in clock of the GPS receiver is not as accurate as the atomic clocks of the satellites and the slight timing errors leads to corresponding errors in calculations.
•Visibility of Satellites: The more the number of satellites a GPS receiver can lock with, the better its accuracy. Buildings, rocks and mountains, dense foliage, electronic interference, in short everything that comes in the line of sight cause position errors and sometimes make it unable to take any reading at all. GPS receivers do not work indoors, underwater and underground.
•Satellite Shading: For the signals to work properly the satellites have to be placed at wide angles from each other. Poor geometry resulting from tight grouping can result in signal interference.
9. Shopping for Software
You are shopping for software that will assist with your home landscape design. The package for the program you would like to purchase states that it was designed for the most recent version of Windows, but an older version is installed on your computer. How can you determine whether the program will run on your computer?

Answer: As a part of a program’s documentation, prerequisites or guideline on which hardware or software are to recommended are listed which is known as system requirements. It may be a file or it can be found on a software’s manual. Most of the program wont run at all if you have the wrong version of something that is needed.

10. Unsolicited Communication
Lately, you have been receiving many unsolicited e-mail messages, text messages, instant messages and telephone calls. These message not only are annoying, but they also are consuming large amounts of your time. Form a team of three people and decide what steps are necessary to minimize these unsolicited communications. One team member should research how to stop unsolicited e-mail messages, one team member should research how to stop unsolicited text messages and instant messages, and another team member should research how to stop unsolicited telephone calls. Finally, all team members should research where these unsolicited calls and messages might be originating and how to prevent being added to distribution lists in the future.
Unsolicited emails can be prevented by:
•Avoiding displaying your email address in Internet chat rooms and only give out your email address on secure sites. Avoiding including your email address when you post to newsgroups.
•Be careful when selecting a free ISP or e-mail account. Some of these services make their money by letting 'sponsors' send email messages to their subscribers.
•If your email provider doesn't have a built-in spam filter, search the Web for email filters and other anti-spam software. Many of these programs are free and can be easily installed

Unsolicited text messages can be prevented by:
•Call your cellular provider's customer service number. Ask the representative what your options are for blocking unwanted text messages.
•Log on to your cellular provider's website, if you are instructed to do so, and follow the provider's instructions on how to register and block the offending phone numbers.
•If a message with the same body is constantly being sent, block the message.

Unsolicited telephone calls can be prevented by:
•Use an answering machine.Hook up the answering machine to answer the telephone calls after the first or third ring. There will be no need to let the telephone ring more than three times--you aren't going to answer if you want to stop unwanted telephone calls.
•Purchase a caller ID system that has blocking capability. Hook the system up to your home phone in accordance with the manufacturer's instructions. Enter the specific phone numbers that you do not want calling you. The caller ID will prevent your phone from ringing when those people call.
•Contact your telephone service provider and explain that you want a certain phone number to be blocked. They can also do a specific call trace directly if the call is originating from their local service area. Most providers can also block a number on request (called a "call screen") for a monthly fee.
1. Search Sleuth
(1) What company was the first to sell a USB flash drive?

In early 2000, Trek Corporation was the first company to sell such a device. In late 2000, IBM was the first to sell a flash drive in North America.

Source: http://www.usbdirect.com.au/about-usb-drives/history-of-the-usb-mainmenu-29

(2) What is the significance of the Universal symbol on Apple’s Mac applications programs?

The symbol signifies that the software is both PowerPC(G4,G5) and Intel-based Macintosh computers.

Source: https://developer.apple.com/softwarelicensing/agreements/maclogo.html

(3) Which retailers offer to dispose of old computer and other electronic products properly to help protect the environment?

Electronics TakeBack Coalition promotes green design and responsible recycling in the electronics industry.
Source: http://www.electronicstakeback.com/about-us/

(4) What are the three Illustrative Grant Commitments the Bill & Melinda Gates Foundation has made?

These are three of the many Illustrative Grant Commitments the Bill & Melinda Gates Foundation have made:
•GAVI Alliance, expanding childhood immunization: $1.5 billion
•United Negro College Fund, Gates Millennium Scholars Program: $1.37 billion
•PATH Malaria Vaccine Initiative (MVI): $456 million
Source: http://www.gatesfoundation.org/about/Pages/foundation-fact-sheet.aspx
(5) According to Fortune, at what company the MBA students most want to work when they graduate?

Where do MBA students most want to work when they get out of school? Investment banks and consulting firms are still popular choices, but for the second straight year, the most coveted employer is Google, a recent survey found.

Source: http://money.cnn.com/2008/05/27/news/companies/mba_survey.fortune/index.htm

(6) Who created the first set of icons for the Macintosh computer? What sound does her Clarus the Dogcow make?

Designed by Susan Kare, Clarus — Dogcow’s given name — makes a “moof” sound and was found on all versions of the Mac operating system until OS X. In the late 1980s, she surged in popularity and started to be used by other developer groups — even Microsoft once used Dogcow in an advertisement.

Source: http://mashable.com/2010/07/08/10-apple-facts/

(7) What company manufactured the first notebook computer, the UltraLite, in the 1989?
In 1989, NEC released UltraLite, considered by some to be the first "notebook style" computer. It was a laptop size computer which weighed under 5 lbs.

Source: http://inventors.about.com/library/inventors/bllaptop.htm
2. Green Computing

1. Upgrade
Make energy efficiency job one when shopping for a new computer or peripherals. Look for the Energy Star labels or check out the Climate Savers Computing product catalog.
2. Downsize
Switch to a laptop when you don't need the fuller capability of a desktop. Laptops typically consume less power and, hey, they can be used at a coffee house!
3. Take a Nap
Use computer and monitor sleep modes to save nearly half a ton of carbon dioxide and more than $60 a year in energy costs.
4. Kill the Screen Saver
Screen savers make for pretty pictures but they aren't necessary on modern monitors. Studies show they actually consume more energy than if you simply dimmed or turned the monitor off when not in use.
5. Dim the Screen
Turn down your monitor's brightness setting. The brightest setting on a monitor consumes twice the power used by the dimmest setting.
6. Nix the Extras
Shut down such peripherals as printers, speakers and scanners when not in use.
7. Fight Phantom Power
Plug all your electronics into one power strip and switch it off when you're finished. If you want to avoid rebooting, put processors on a separate strip.
8. Minimize
Close unused or infrequently used applications. Is it really necessary to keep Photoshop, Word, Outlook, Safari and Internet Explorer all open at the same time?
9. Monitor Energy Use
Give your system a once over with a power meter that displays how much energy you're actually consuming.
10. Create a System
Establish multiple power schemes to address different usage models. For example, create a power scheme to play CDs that immediately shuts off your hard drive and monitor without putting your system into standby mode.
3. Social Networking

Three of Facebook’s Popular Features:

Share and keep in touch with the important groups in your life.

Organize gatherings, respond to invites, and keep up with what your friends are doing.

Facebook Pages help businesses, organizations and brands share their stories and connect with people. Like Pages you're interested in to get updates about their activity.

The Podcasts app allows you to add your favorite video and audio podcasts to your profile. The interface is fairly simple. The home page shows the basics: My Podcasts, Friends Podcasts, Most Popular Podcasts, Invite Friends, and (currently) Playing. There’s tons of great podcasts from which to search through, and once selected, you can listen, share with friends, and post to your profile. If you want to share your favorite podcast but can’t fnd it through the application’s search, you can simply add the URL, and post it your profile.
This app is a really simple interface that allows your network to view which songs have been recently played from your iTunes, via last.fm. Due to Facebook rules against auto-updating, however, your recently scrobbled tracks may take some time to show up. Sometimes when you check out your friend’s tracks and try to play, nothing happens. Regardless, still a good application.

Deadline is basically a quiz game. The goal is to answer multiple choice, current event questions in as little of the 30 seconds allowed. Each question starts at 100 points, and quickly diminishes through the 30 seconds. As you answer questions, you can see your average overall score per question, as well as your overall percentage of correct answers. Each time you answer the question, correctly or incorrectly, Deadline shows you the actual correlating news story. Not only that, you can read more on each store, and bookmark them as well.
Deadline offers three ways to cheat, but the interesting part is how you accrue the cheats. First cheat is “Beat the Clock” which allows you to stop the clock at any point while answering a question. You get this cheat by answering 10 questions in a row, correctly of course. Second, is the “50/50″ (ala Millionaire) that will remove two of the incorrect answers which you receive by inviting 5 friends. Lastly, is the “Free Pass” allowing you to get the answer and keep the points, for each person you invited that adds the app. With as intense as the questions are, this is great incentive.
4. Blogs

CNET Blogs

Woz: Apple got arrogant

For Steve Wozniak, he who co-founded Apple, has declared that the company has been -- well, how can I put this? Yes, OK. "Arrogant."
"Part of me wishes Apple had not been so, kind of, arrogant and feeling like 'we're the only one with the right clue.' I wish they had made wider versions -- a small and a large version of the iPhone," he said.
Yes, he did say arrogant. And I don't I feel he said it because he has unusually large hands.
Indeed, he explained: "I think Apple tricked itself by saying 'Oh, you can reach everything with one thumb.' And I don't see anybody having trouble using the larger screens (...) But Apple said that as a defensive move because everyone else had larger screens."
Warming to his thesis, he said: "Not all people want the same thing. A lot of people want the big screens." Just as they want big cars and even big meals.
"You get a feeling you're getting more with a larger screen," he mused.
He also wishes "that iPhone had been just a great a product as it was, but more open."
As for the way phones are marketed, he offered: "Comparing feature to feature to feature, that's just bullshit." No one buys a phone, he said, because it has one feature and another phone doesn't.
iPhone 5 traffic volume already surpasses Samsung's Galaxy S3

Apple's iPhone 5 has been available for only a few weeks, but already it's generating more Web traffic volume than the Samsung Galaxy S3.
Online advertising network Chitika today released results of a study it conducted on Web traffic volume between the iPhone 5 and the Galaxy S3. The company found that of "millions of mobile ad impressions" it recorded on the iPhone 5 and Galaxy S3, more than half -- 56 percent -- originated from Apple's handset. Samsung's smartphone nabbed 44 percent of the total impressions.
"Only 18 days since the public release of the iPhone 5, the newest Apple device has overtaken the Galaxy S III in terms of Web traffic volume," Chitika wrote today in a blog post. "Record-breaking sales numbers, along with new 4G browsing speeds which encourage data usage, are the most likely explanation for this tremendous growth."
Chitika's data is based on mobile ad impressions it collected across its network between October 3 and October 9. The company didn't say how the iPhone 5 and Galaxy S3 fared against other smartphones.

Lenovo: Making it in the U.S.A. (Q&A)
China's premier PC company, Lenovo, is moving some of its desktop, laptop, and tablet production to the U.S. I asked the company -- which Gartner says is now the largest PC maker on the planet -- to explain what making a product in the U.S. means exactly.

Q: What does "made in the U.S." mean in this case?
Stanton: The correct designation under U.S law would be "assembled in the U.S. with some foreign content." In the electronics business, parts are made all over the world.
How does this give you a leg up on competitors like Apple and HP, which make most of their stuff in China and Asia?
Stanton: There are a lot benefits to having your own manufacturing capabilities versus working with [manufacturing] partners, like our competitors. Time to market. Being able to take your innovations quickly and put them in [the products], and benefits with control and responsiveness.

What about labor costs in the U.S.?
Stanton: Labor costs in general are higher [in the U.S.] but we believe customers are going to see value in getting the turnaround times that we can deliver. And there are customers who see value in the fact that products are assembled in the U.S.

Microsoft Surface and its rivals: The first wave of Windows RT tablets
Of the first batch of RT tablets, the most anticipated is undoubtedly the Microsoft Surface RT. The future of Windows tablets is riding on the success of the Surface, which itself is riding on the price Microsoft decides for it.
Dell XPS 10
The Dell XPS 10 houses an as-of-yet unidentified ARM CPU and will include microSD, USB slots, and a touchpad keyboard. No word on price yet.
Lenovo IdeaPad Yoga 11
At $799, the Yoga 11 is currently the most expensive RT tablet. That's partly because most RT tablet pricing has yet to be revealed, but additionally, the Yoga 11 is just really expensive
Asus Vivo Tab RT
The Vivo Tab RT will sport a $599 pricetag, a Tegra 3 CPU, and a 1366x768 screen. That price unfortunately doesn't include the optional keyboard dock to be offered by Asus.
Microsoft Surface RT
Ah, the big daddy of Windows RT tablets. Microsoft's Surface will be the standard against which all other Windows tablets are judged. It's feature-rich with high levels of production pumped into it, but the biggest question is still price. With only a few weeks left before its assumed late October debut, we still have no official word on how much it'll cost. Surface's price relative to other tablets in the market will factor very heavily into its success or failure.
Green Tech
Newest Popemobile is an EV
If cleanliness is next to godliness, then ecology must be right there beside it, as this week the Pope took possession of a new electric vehicle, built specially for his Holiness by Renault.
The new Popemobile is based on the Kangoo Max Z.E., an electric van-type vehicle not sold in the U.S. The drive system, composed of a 44-kilowatt electric motor and 22 kilowatt-hour lithium ion battery pack, is similar to that used in the Nissan Leaf. The Pope will be able to ride for about 110 miles on a charge.
MS Office coming to iOS in 2013

Although Microsoft’s Office applications were rumored to be coming to the App Store this year, the company now plans on releasing Office in a native iOS version next year, according to reports. Product manager Petr Bobek told Czech site IHNEDthat Office 2013 would hit the market in the first quarter of next year, and that iOS would be among the included available operating systems for the productivity suite. Although the iOS Office release was apparently confirmed in a press release spotted by The Verge, a Microsoft US spokesperson claimed that the company has yet to announce retail availability for the new Office.

Apple licenses copied Swiss clock design

Apple and the Swiss national railway (SBB) have reached a licensing agreement for Apple’s use of the iconic SBB clock design,the SBB announced. Following the release of iOS 6 with a new iPad-specific Clock application, Apple was accused of stealing the SBB design, and similarities between the software and SBB’s clocks were obvious. The SBB looked for credit and/or compensation from Apple, which apparently didn’t take long. Terms of the deal were not disclosed.

Apple patent aims to hide and reveal device features

An Apple patent filing reveals a technique that would allow certain components of a device to be concealed until needed. The patent suggests that components could switch between transparent or opaque states, with the user instructing the device to reveal a component, which could contain a biometric sensor, image capture device, or strobe flash, among other possibilities.

5. Ethics in Action
The internet has increased the ease with which students can plagiarize material for research paper assignments. Teachers are using online service, such as Turnitin and PlagiarismDetect.com, to help detect plagiarized papers and to help students understand how to cite sources correctly. Visit the Turnitin website and then write a summary of how this service is used. How does this service attempt to prevent plagiarism through the Turnitin Write Cycle? How prevalent is plagiarism on your campus? What is your schools’s official policy on disciplining students who submit plagiarized papers? Does your school have an honor code? If required, submit your summary to your instructor.

Turnitin is the leading originality checking and plagiarism prevention service used by millions of students and faculty, and thousands of institutions worldwide. Turnitin encourages best practices for using and citing other people’s written material. The service offers a complete web-based service to manage the process of submitting and tracking papers electronically, providing better—and faster—feedback to students.
Institutions license Turnitin on an annual basis. The institutions are encouraged to communicate with students about their use of Turnitin and how their academic integrity policies work. An instructor sets up a class and an assignment in the Turnitin service. Students or instructors then submit papers to Turnitin via file upload or cut and paste. Turnitin’s proprietary software then compares the paper’s text to a vast database of 12+ billion pages of digital content (including archived internet content that is no longer
available on the live web) as well as over 110 million papers in the student paper archive, and 80,000+ professional, academic and commercial journals and publications
Turnitin determines if text in a paper matches text in any of the Turnitin databases. By itself, Turnitin does not detect or determine plagiarism—it just detects matching text to help instructors determine if plagiarism has occurred. Indeed, the text in the student’s paper that is found to match a source may be properly cited and attributed.
Full transcript