100% found this document useful (1 vote)
180 views

Data Commentary: Mr. Jhonathan S. Cadavido

The document discusses computer viruses and their common sources of infection for U.S. businesses. It states that email attachments are responsible for nearly 90% of virus infections, with viruses entering through email the most common way infections are detected. Users should be wary of all email attachments and ensure antivirus software is up to date. However, businesses remain vulnerable to viruses due to human error and new viruses not yet identified by antivirus programs.

Uploaded by

Nathan Cadavido
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
180 views

Data Commentary: Mr. Jhonathan S. Cadavido

The document discusses computer viruses and their common sources of infection for U.S. businesses. It states that email attachments are responsible for nearly 90% of virus infections, with viruses entering through email the most common way infections are detected. Users should be wary of all email attachments and ensure antivirus software is up to date. However, businesses remain vulnerable to viruses due to human error and new viruses not yet identified by antivirus programs.

Uploaded by

Nathan Cadavido
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

DATA COMMENTARY

Mr. JHONATHAN S. CADAVIDO


Team Leader, School Research Team
Cluster Chairman, Cluster XI Research Team
Member, BOD-Teacher Researchers Association of Quezon
Member, Reading Association of the Philippines
Member, Linguistic Society of the Philippines
Member, International Association of Multidisciplinary Research
Associate Member, Asian Teachers of English as a Foreign Language
A computer virus is a program that is specifically and maliciously
designed to attack a computer system destroying data. As businesses have
become increasingly dependent on computers, e-mail, and the internet
concern over the potential destructiveness of such viruses has also grown.
Table 5 shows the most common sources of infection for U.S. businesses. As
can be seen, in a great majority of cases, the entry point of the virus
infection can be detected, with e-mail attachments being responsible for
nearly 9 out of 10 viruses. This very high percentage is increasingly alarming,
especially since with a certain amount of caution such infections are largely
preventable. In consequence, e-mail users should be wary of all
attachments, even those from a trusted colleague or a known sender. In
addition, all computers used for e-mail need to have a current version of a
good antivirus program whose virus definitions are updated regularly. While
it may be possible to lessen the likelihood of downloading an infected file,
businesses are still vulnerable to computer virus problems because of human
error and the threat of new, quickly spreading viruses that cannot be
identified by antivirus software.
STRUCTURE OF DATA COMMENTARY

1. Location elements and/or summary statements


2. Highlighting statements
3. Discussions of implications, problems, exceptions,
recommendations, etc
LOCATION ELEMENT AND SUMMARIES
GENERALIZATION
One classic verb for qualifying (or defending) a generalization is
the verb tend.
Children living in poverty have a history of health problems.
Children living in poverty tend to have a history of health
problems.

Another way of to defending a generalization is to qualify the


subject.
Many children living in poverty have a history of health
problems.
A majority of children living in poverty have a history of health
problems.
In most parts of the world, children living in poverty have a
history of health problems.
An alternative strategy is to distance yourself from the data by
showing in some way that it is soft. Here are few examples.
WEAKER CLAIMS
Strong claim: The factory has benefited from the recent
technology upgrade.

The factory seems to have benefited from the recent


technology upgrade.
The factory appears to have benefited from the recent
technology upgrade.
It seems that the factory has benefited from the recent
technology upgrade.
It has been said that the factory seems to have benefited
from the recent technology upgrade.
WEAKER VERBS
Finally, claims can be reduced in strength by choosing a
weaker verb.

At the beginning of this unit, we compared the following.


Unsound policies of the IMF led to the financial crisis.
(stronger)
Unsound policies of the IMF contributed to the financial
crisis. (weaker)

You might also like