(Main ideas and Major supporting points)

Read the questions very carefully at least 2 or 3 times.

Circle all the keywords in the question.

Many good questions generate some degree of opinion based on expert experience, but answers to this question will tend to be almost entirely based on opinions, rather than facts, references, or specific expertise.

Decide if you need to write a 1-paragraph or a multi-paragraph answer.

Check your answer for grammar and punctuation.

(Their ignorance shows in the technical mistakes made in their articles.)

From the perspective of a computer-illiterate journalist, the work of a computer criminal may indeed be incomprehensible.

Write a brief outline of all the points you want to mention in your answer.

The worm released into the Internet by Robert Morris in Nov 1988seems to have jolted most computer professionals into realizingthat ethics and law are essential to the computer profession.

Read over your answer again and check if all the main ideas have been included.

I want to start the conclusion of my essay by using

3. Use a that shows how your opinion adds to the argument or suggests those previous statements and arguments are incomplete or faulty. Follow up with a statement that expresses your opinion.

So, to sum up … or To sum it up, …

These malicious programs are a new way to release confidential information from a victim's computer, with the confidential information going to the author of the malicious program, but to some person unknown to the author of the malicious program.

Do you think they are formal and stylish?

"Many students come from low-income families and they simply don't have the resources to buy new clothing to suit the headmaster's fashion whims."

The first is right, the second sounds awkward.

If a vandal were to break into anoffice and either damage or steal the punch cards, the vandal could beadequately punished under traditional law of breaking and entering, vandalism,or theft.

The most basic structure for an essay includes just fiveparagraphs.

However, after about 1975, it became common to enter programs and data fromremote terminals (a keyboard and monitor) using a modem and a telephoneline.

Unauthorized changing of data is generally a fraudulent act.

In 1999, the virus infected a [possibly confidential] document on a victim's computer, then automatically sent that document and copy of the virus via e-mail to other people.

4. Be careful not to be too sarcastic:

It is important to keep the tone of your essay professional, by avoiding emotional language and any language that expresses an accusation. Use factual statements that are supported by sound evidence.