Beruflich Dokumente
Kultur Dokumente
i-/
Copy Topic:
State Claim:
Ccc
r e
i i
1
(
Identify text
number and
line number
Text I
Textual
Evidence#2
(CC
/ic
:;lLc
jf)VcS
C Phc-
(,(Vi
t
(,
,r
L,
5(
(
n
1
,
Cck
JIA
rr
t
P
Tr Q,
fr?)
Ct
5rt(
r.
/5
/jc
6(((
JW
hu3
1heiu
CL
-s
c5
--i,-i1--
r
-
f
,
eIcC
Text 2
cxr2
1
n
5 I)
StC
Identify text
numberand
line number
d 5
Vj
i-ct-
TeuaI
Evidence #4
ir S
cn
ri-c
;),3
5
f
1
lC
Text I
ldentifytext
numberand
line number
kt
-3
Textual
Evidence#3
fl
liv)) S
an ,c c t5cc i1 ?/r1j
&
Copy Evidence
Explain how evidence supports your claim
Text
line
While downloading app onto phones,
accessing the internet, using GPS, or even
For example:
just making calls and accepting updates,
Text 1, line 17 states that:
users are technically giving consent to be
all of the major cell phone
tracked when they accept terms and
carriers admit to collecting
conditions without reading them carefully or
information about its
do/not pay full attention to privacy policies.
customers,
Textual
Evidence#1
Identify text
number and
line number
Cj?1flC)
II
3t.
CrhC
Sc
IC
,,J,4hL,
V
1
;
Text2b)C
it
,,
hi,:t
Textual
Evidence #5
ic3 I-f-i1
Identify text
number and
line number
Text 3
cvLd
j-tL
+4l
it4
-oi
Cc
c?c5t
hO
OL-
,
44
v14
CcI
j1
cc5
tt
(t,j/
Co-c
r t1
pChA5C-c
cref
3
jhc
,tc
1V]C
1it C
-cI
ch7j
re , E.t 9 rcj
jLI
c4
(Fp
1+1
C1V)cC 4-h
ht
c(?
;ci-iht- o1 4-J-e cj
Textual
Evidence #6 Tt
5 j--
Identify text
number and
line number
I9C
I iC5
S 3
t r)-
3.
J9
-C+
32
ric-
5
(cC4-1
i5
&5
7
c
I)
ci
(I
VL4flC
+h
L-j
-(
4i t2r-
4
aYIt
1e
;4-
1E9
Text 3
cL
C2t?
jY
11
CIOJ -j
7
Textual
Evidence #7
T)Qr
I, i,n3
C1lQ
Oef;
Identify text
number and
line number
cbcit
,cL+5
6SI
ic
SCM
Y1
ccP
Yv
+Dtinj
\Jh(
,J5.Ic55 c( 5
-vrC
1
1
1
L
r s ( (/
5ci L -C
Cte
4-C
Textual
Evidence #8
ic9, i;ns
3tf:S
identify text
number and
line number
C1[CG*C
r.9C4
1jc+f2C(Y
r4C1iiC
TV5
hcJ,
IiC(IV1j ;f]c
ccI ( S ?
QbCY)
-c
IS
(I
eervfY)e
tCCj)
3
(?C Sc v
tfl
The
iiS
CCr(2C
I? C
i-5
nS+13 Ccc,C5
i-cf
CI) +I- I
cXf :2
h5(
tL
V(1
1
t
t(j
Cb5tc5
C1c,
( ( b5I
i-cs
1-)
C/
Of
(SOC)
(iC
C I
tp
CI)
cr\
Ic
LA
Li
Th
H-I
Name________________
Vc
-\J
v({
&oL
L\)y\jj
+ci1
Cc
r{0)
App
kJ
1
f
3,o9i
FQ
(o- uI
wt
.
1
-
frp
krs
is
or No
If not, please inform the writer to add the counterargument. If Yes, please write
down the sentence or sentences that the writer has skillfully written the
counterargument in.
r
t
n1
sA
(-
fli
pftVti
(LJJL.
Jr
fci( .ptih
1
)
fr
(6iV
)jY)
S)
o 1Sn;
Alex Gelabert
Synthesis Essay
Since the introduction of technological powerhouses like Google, Microsoft, and Apple,
people in the technology business have always tried to come out with a new product that will top
the last, Due to this competitive nature of the industry, advancements in technology are being
made presently and will continue to be made in the future; but are these advancements all
beneficial? Consumers can benefit in some ways from
tags in that they can receive ads relevant to them and can have their needs tailored to them by
stores, but it is the companies that get more positive results from the technology. Even with these
benefits, the use of the new technolog brings to the table much more harm than good
Companies should not be allowed to track consumers shopping without their permission because
it is an invasion of privacy, it can reduce jobs meant for people, and can easily be used for the
wrong reasons and/or personal benefit.
CE vc. t LAuk
4.
Tracking technology relies heavily on the publics use of already existing technology. It is
said in dext 1 how every time a person searches for a website on a laptop, downloads an app on a
smartphone, or drives by a store with a GPS that cell phone companies hay
he abiii to track
this and use the information they receive for marketing purposes (lines 23 10) Althougn this
b.fits consumers by receiving relevant ads from com.panies, and benefits companies by
jbbtaining insight on what Its consumers want to buy, this technolog is largely an invasion of
priacy Text I states ho cell phone companies do not notify consumers about the data the
they collect and that consumers are automatically opted into this process (lines 202 1 24)
2
:/7
Companies are going behind the back of its customers and obtaining their personal information
1/
in an unethical manner. Certain information is personal for a reason and cell phone users like
Flarrine Freeman/(texil. line 12) would overwhelmingly agree that companies should respect its
customers privacy by stopping this tracking nonsense.
All action/science-fiction movie lovers have seen or heard of a movie with the main
premise being a robot revolution or technology becoming too smart for mankind to maintain.
Although these movies may be fun to watch, it isnt crazy To think that technology could one day
overtake humans when, in fact, ifs alrdv happening. Text 3 states how RFID readers will have
the ability to scan customers items as they exit the store and charge it to an RFID credit card
(Ies 30-32). This couldnt be better for owners of companies and stores looking to increase
/tficiency and reduce shoplifting in the workplace. Ilowever, this could not be any worse for
\
people around the country. This new use of technology takes away countless sales and cashier
jobs from hard-working i\mericans. The new technology vil1 just be another excuse for an
already lazy country (compared to others around the world) to sit around and get every thing
handed to them by technology. With the fast-growing landscape of the technology industry, it
ouidnt surprise a rational thinker hen humans become too dependcnt on technology that at
completely uproots everyday life.
With so man advancements made in tee flnologv everyday, it isnt shocking, that people
use technology as a multipurpose ntlet, Specifc to the texts, the use of tracking technology can
he used in multiple ways: beneficial to society or for selfish reasons. In text 2 it talks about how
in the presidential election of 2012. the Romney and Ohama campaigns followed voters through
their internet searches to gathenformation on their personal views. They did this by installing
cookies their computers (lies 39-41). Not only is this an invasion of privacY, but it also brings to
focus how tracking technology can be utilized many more avs than the axerage American
kno s about, It also mentions in text 2 ho\/I 50 million American Internet users were used for
data by the aforementioned campaigns (lines 43-44). That is about 800 o of the registered x oting
population in the U.S., meaning 18 year olds and older (line 44). l his misuse of technology by a
relatiely small number of people affects the large majority of the population in this country.
Companies must be up front about t e technology or should stop the use of it altogether before it
stops being used as a marketin tool(text 1. line 10) and expands to something bigger and most
likely worse.
As time passes, technological adxancements will continue to be made on a global scale.
There is no stopping or deny ing this, Many of these advancements like smartphones and
computers are extremely relevant and important in today s times. Iloweer, some new
teh+1ogis. such as that of tracking. can be seen as more problematic than beneficial to society.
Een though there are benefits to the use of tracking technology, companies should not be able to
make use of it because it is an
wrong reasons.
mx asion of priacy. it can reduce jobs, and it can be used for the
4.
is
Nt
at
It
55
5
4
C;
O
C
9
9
C
C
-I
55
0.
C
C
Criteria
Content and Analysia: tire
cEtcot to which the essay
cooves complex ides and
information clearly afld
accurately In order to
support claims In on anlysin
nt the teSts
Cuhrrencr, Organization,
and Style: the extent to
which the essay logically
orgauiecs eumptes ideas,
concepts., sod information
using formal style and
precise languagv
As essay ttstt
Air essay that
Au essay that
An essay thai
2
Essays at this Level;
THE STATE EDUCATION DEPARTMENT I THE UNIVERSITY OF THE STATE OF NEW YORK I ALBANY, NY 12234
3
Essays at this Level;
-introduce a reasonable claim, as
directed by the task
4
Essays at this Level:
little or no
esidenes- from shs. tests
oppos.tng
tests
-deinonsirnmle a
lack of control.
cxhibtttng thequent rrritrs that ittakir
cotnpreticusmmiii difficult
New York State Regents Examination in English Language Arts (Common Core)
Part 2 Rubric
Writing From Sources: Argument
5
Essays at this Level;
-introduce a precise and thoughtful
claim, as directed by the task
6
Essays ai tkLs Level:
paraphrased material
\
-pmsens ideai fishy and
ttouglt5tlslly, staking highly
tffecttve use rif a wide rattgc of
specific and relevant evidence to
support analysis
-dctttopsmrie onlrol4if
conreritions with essctttiallStio
with sophisticated
laniuage
crr&s, cern
addresses fester texts thus rcqsttretl by the task can be scored tso htghcr tItan a 3.
isa personul response until makes little 0mG referettee to the task or texts can he scored rio higher than a I.
is totally copied front the task sod/or texts with no original student writttig mimuss hr scored all,
is totally utirelatud to tlte tusk. illegible, itmcoherotit, blank, or utmrecugmmizahle as English most be scored as aU
capitalization, putsctuation.
Control of Conventions:
the extent to which the essay
demonstrates command of
conventions
of standard English
grammar, usage,
and spelling