|
home—lects—hws
D2L—breeze (snow day)
Note that not everything I note is not necessarily a point-penalty (but could become one, if repeated in the future). Also, sometimes my comments might be optional suggestions; see me if I made a comment that would make your homework less clear were it followed.
Some markups/comments are just standard proofreading marks.
Some common errors/comments, marked with greek letters (lower-case):
Another example, from a paper:
One example is the interruption of routines between the user controlled application layer and the kernel. By manipulating these interrupts the user can hack into the kernel and gain unwelcome access.How do you “manipulate interrupts”? The words “can hack into” add zero information, and should be deleted.
INTRODUCTION: SINCE THE CREATION OF TECHNOLOGY THERE HAVE BEEN ATTACKS ON COMPUTERS AND OTHER TECHNICAL DEVICES. ALL IN ALL, SECURITY IS IMPORTANT IN AN AGE WHERE TECHNOLOGY RULES THE WORLD. VIRUSES AND WORMS CAN COME FROM ANYWHERE AND EVERYONE WHO USES TECHNOLOGY NEEDS SOME INFORMATION ON THE DIFFERENT WORMS AND VIRUSES THAT EXIST. THIS PAPER WILL CONCENTRATE ON ONE SPECIFIC ATTACK, THE STUXNET WORM.If nothing else, a paper about Stuxnet is not about how the general population needs information on how to protect themselves against computer viruses, so this introduction is actively working to mislead the reader as to what the paper is about.
home—lects—hws
D2L—breeze (snow day)
©2013, Ian Barland, Radford University Last modified 2013.Oct.31 (Thu) |
Please mail any suggestions (incl. typos, broken links) to ibarlandradford.edu |