Riley, Brian, and Amanda are all part of the same coding class. The professor assigned a coding project where students had two weeks to come up with their own code.

Homework Help: Questions and Answers: Riley, Brian, and Amanda are all part of the same coding class The professor assigned a coding project where students had two weeks to come up with their own code. No collaboration was allowed. When grading, the professor noticed the similarities when he ran the Moss analysis. Amanda and Brian’s code were a 94% match and both matched 72% of Riley’s code. The professor said there were no other close analyses in the class.

Riley, Brian, and Amanda are all part of the same coding class. The professor assigned a coding project where students had two weeks to come up with their own code. No collaboration was allowed. When grading, the professor noticed the similarities when he ran the Moss analysis. Amanda and Brian's code were a 94% match and both matched 72% of Riley's code. The professor said there were no other close analyses in the class.
Amanda and Brian decided to meet together in the library so they could hang out while working on their codes separately. Riley texted Amanda because she was having problems starting her code. Amanda sent a screenshot of her code to Riley to use as a reference.What honor code violation is Amanda responsible for?A. Plagiarism
B. Cheating
C. Complicity
D. Falsification
E. No violation

Amanda and Brian decided to meet together in the library so they could hang out while working on their codes separately. Riley texted Amanda because she was having problems starting her code. Amanda sent a screenshot of her code to Riley to use as a reference.

What honor code violation is Amanda responsible for?

A. Plagiarism
B. Cheating
C. Complicity
D. Falsification
E. No violation

Answer:

First, let’s understand the question (scenario): 

  • Amanda and Brian worked on their projects in the library, but there is no indication that they actively shared or copied each other’s code. However, their codes were 94% similar. This suggests that they might have indirectly shared work while working together.
  • Riley texted Amanda asking for help with starting her code. Amanda sent a screenshot of her code to Riley. As a result, Riley’s code had a 72% match with Amanda’s code.

Given Options: Step by Step Answering

A. Plagiarism

  • Plagiarism involves taking someone else’s work and presenting it as one’s own without giving credit.
  • Riley copying parts of Amanda’s code might be considered plagiarism on Riley’s part. However, Amanda provided her code willingly, so her role isn’t classified as plagiarism.

B. Cheating

  • Cheating generally involves breaking rules to gain an unfair advantage. Sharing code in a scenario where “no collaboration was allowed” falls under cheating. Amanda’s sharing of her code with Riley fits this category.

C. Complicity

  • Complicity is assisting or enabling another person to commit a violation. By sharing her code with Riley, Amanda enabled Riley to copy it, thus making Amanda complicit in Riley’s plagiarism or cheating.

D. Falsification

  • Falsification involves altering or inventing information. There is no evidence that Amanda altered or invented information here.

E. No Violation

  • Given the situation, Amanda clearly violated the honor code by sharing her code.

Final Answer:

Based on the above analysis, the correct answer is

C. Complicity.

Amanda is responsible for complicity because she assisted Riley by sending a screenshot of her code, which Riley could then use to complete the assignment. This action goes against the professor’s instruction of “no collaboration” and helped Riley potentially violate the honor code.

Learn More: Homework Help

Q. When I attach a file to my e-mail, will SMTP send it to the e-mail server?

Q. Q. In order to avoid the dangers of social media and get the most out of your online experience, you should:

Q. Which of the following statements best describes the permanency of online activity?

Q. Smart home voice assistants and non-computer devices that can access the internet are known as

Q. As it relates to algorithms for the SELECT operation, which search algorithm would you use if you wanted to retrieve every record in the file and test whether its attribute values satisfy the selection condition?

Q. Information can be digitized and transmitted over fiber-optic cables because of recent advances in technology. Which ethical obligation of this new capability is now being realized?

Q. Which of the following acts on behalf of people in the physical world in a way that complements human abilities?

Leave a Comment

Comments

No comments yet. Why don’t you start the discussion?

    Comments