Draw it!, Vocabulary, Inferences and Conflict

Vocabulary, Inferences, Character Analysis

Perseverance, Answers and Questions

Rather thanwrite new statutes for forged e-mail addresses or unauthorizedsending of e-mail in someone else's name, I would prefer that legislaturesbroaden the existing criminal statutes for analogous crimes with paper and ink.

Vocabulary, Character Analysis

Symbols, vocabulary, perseverance

Because he was a juvenile, his name can not be publicly disclosed, so he was called by his Internet pseudonym The Royal Canadian Mounted Police seized Mafiaboy's computer.

®Over 35,000 Web Pages, or click below

The detonated program might stop working (e.g., go into an infinite loop), crash the computer, release a virus, delete data files, or any of many other harmful possibilities.

Conflict, vocabulary, character development, Quote Analysis


®Over 35,000 Web Pages, or click below



In March 1997, a young hacker disabled the telephone serviceat the Worcester, Massachusetts airport for six hours,which disabled the air-traffic control system and other critical services.

-- lots of ideas and activities to use while reading _Holes._

This time he was sentenced to 21 months in prison,followed by two years of "supervised release"during which time he was forbidden to eitherown or use any computer for his personal use.

Very thorough plot summaries and analyses and many lesson ideas.

1990),, 967 F.2d 561 (11thCir. 1992).
Riggs was first convicted in 1986 for his unauthorized use ofa computer and was sentenced to a mere 15 days of community serviceand placed on probation for 18 months.

Two comments on word usage in this essay:

I put "more serious" in quotation marks, because the victim ofharassment certainly is adversely affected by the harassment, thereforeit is a serious matter to the victim.

I originally wrote this essay in May 1999.

The point made in that essay is that, out of approximately 61000malicious programs for the Microsoft Windows operating system,there have been arrests and convictions of the author(s) of malicious programs:

- chapter-by-chapter comprehension questions (and answers).



It is often difficult to get law enforcement personnel and prosecutorsinterested in harassment, unless threats of death or seriousbodily harm are made, simply because the resources of the criminaljustice system are strained by "more serious" criminal activities.

Literery criticism may be found in a number of forms:



A particularly disturbing form of harassment is sending a forgede-mail that appears to be from the victim and containsracist remarks, or other embarrassing text, that will tarnish thereputation of the victim.