You are on page 1of 12

CARIBBEAN ADVANCED PROFICIENCY EXAMINATION (CAPE)

COMMUNICATION STUDIES

INTERNAL ASSESSMENT (I.A)

“Hacking and its effects on a person's lifestyle."

Candidate’s Name:

Candidate’s Number:

Centre Number: 100319

School:

Territory: Jamaica

Teacher: Miss

Year: 2021
Table of Contents

Pages

Introduction……………………….………………………………………………........…….1

Reflection Section

● Preface…………………………………………………………………………...…......2

● Reflective Sample {Many

Forms}……………………………………………...…..............................................3-5

Language Analysis…………………………………………………………………..…...…. 6-

Conclusion………………………………………………………………………..……………8

Bibliography……………………………………………………………………………..…….9
GENERAL INTRODUCTION

This portfolio centres the theme “Hacking”. However, special focus was given to the

topic and basis of the portfolio “Hacking and its effects on a person's lifestyle." The Google

Dictionary defines hacking as the practice of altering a computer software. The purpose for

choosing this topic is to enlighten the public about the detrimental effects hacking can have

on individuals emotionally, physically and mentally in order for them to put more secure

measures in place to protect themselves.

The portfolio consists of a preface which gives an introduction to the reflective piece,

a story titled “Many Forms”. The preface also looks at the intended audience and reasoning

selecting. There is an analysis that evaluates the original narrative, language registers,

dialectal variation and communicative behavior. Another component is the exposition which

assesses how hacking maneuvers aim at deceiving unsuspecting victims and methods used to

manipulate persons, discussing the challenges faced.

Academically, I will be more informed and from the knowledge gained, my readers

will become knowledgeable of the necessary precautions taken to prevent the risk of

unauthorized intrusion. The information gathered will give a clear understanding of hacking,

aiding my career as an architect. Personally, it is of interest to the researcher because of

personal family experience.


PREFACE

The narrative piece “Many Forms” features a young girl by the name of Zoe who

thought she felt love by the presence of a charmed fellow named Kevon; he used

unsuspecting questions to interrogate her about her personal life. She thought she knew him,

who had stolen her credit card number. Later on, she was informed by the bank about some

money transaction and was emotionally distressed; however, she found out what he did and

found solutions to prevent it. Because of her experience, she never let it occur again; hence,

she created a community group to help others within her area who were facing similar

problems and it expanded in which she also wrote a book about the struggles and ways

hackers use to manipulate their suspects. This was written from a 3rd person point of view.

"Many Forms" highlights the different tricks hackers use to deceive their victims.

Therefore, this piece will help ones in or who have recently been affected by differ schemes.

Hence the reason why the intended audience are victims of hacking and those vulnerable to

the cunningness of hackers who readily divulge their personal information. Writing this,

raised my attention and awareness of persons in my country and outside the region who have

suffered yet can’t find any solution.

This narrative piece can be used in educational facilities such as banks and police

stations or online distributions to warn people in taking precautions being victimized.


“MANY FORMS”

The soothing smell of crème de menthe whispered “drink me.” I realized I was early as

usual. As the café got a little less busy, the baristas treated me with a nice hot cup of

cappuccino and a slice of almond cake. Usually, they serve customers at the amazing

outdoor patio that overlooks the bay and a shipping port. After a while, I was carved by a

handsome guy who was a tough built deck man about 25. Everything about him was a soft

and understated joy as he greeted everyone, but was quick to use a smile on one’s face with

unloyalty which was hidden. As he came through that door, my life felt different because we

were one. As he walked, I felt intimidated by him, “Excuse me!” he exclaimed, speaking with

a strong foreign accent, “May I sit here or is it taken?”

“Yes, you may”, I replied.

When he was seated I asked his name, with a delightful smile. He replied, “My name is

Kevon and you are?” I tranced saying “Zoe”.

He sat with dignity. Then my next question came. “So how is it that I have never seen you

here before?”

"I recently moved here like two weeks ago so here I am!”, he said. In the midst of being

enticed by his features, we started to talk about our personal interests.


He said, “Can I get your number or your phone address?” I was suddenly disturbed. Why

would he want my address? I felt harassed by his speech.

The waiter came and asked, “Are you guys finished with your meals?” With a thrill I said

“I’ll pay for everything!”.

Kevon whispered with joy, “Are you sure?”.

TWO DAYS LATER

The phone rang 🎵🎶

“Hello, good Morning. This is the National Commercial Bank Representative. There recently

has been a transaction where your money has been sent to an unauthorized account,”she said.

“Wa-wa-wate deh, What did you say! My! Mi money gawn! Suh how unuh fi mek mi money

gone”, Zoe asked in a shock.

“Miss calm down and speak properly! We are still searching for the whereabouts of the

money. As soon as we collect some more details, you will be contacted,” the representative

replied.

“Beep!!” The phone hung up.

For a minute there, I remembered at the cafe when I paid for everything. The flashbacks

came; I started to think of the phone number, “He never even CALLED” I cried.

He took my credit card number when I was paying for the meals. Yes!! “But how?”, I spoke

internally.
A lot started to run through my mind; I started to feel depression and regret, not knowing that

kevon only looked at who was vulnerable.

I tried to drink the memory away understanding why, however, something hit me. In a rush,

I slapped the keyboard keys until they were numb; establishing what I thought it was. “A

hack him hack mi!” I cried. Knowing all this, I also researched on “How to prevent yourself

from being a hacker victim?”. Subsequently, all the answers were up. The thought of

avenging him took over but the realization of not knowing where he was or whom he said he

was hit me. On this day, I made a vow to never let it occur again. In my situation, I thought

of other people in the world struggling and so I created a community group which went viral

and persons were enlightened.

I even wrote a book titled “How to prevent yourself from being hacked and knowing your

prey?” I elevated from where I was and what I did, yet with ease, I confidently exhaled. I

was a victim but others won’t be!"


LANGUAGE ANALYSIS

The reflective piece “MANY FORMS” recounts the struggles faced by a young lady

who lost all her welfare and regained hope in the precautions to prevent being hacked, thus, it

brought her far into being the woman she was. The writer deftly employs registers, dialectal

variation and communicative behaviour. However, only two will only be discussed - dialect

variation and communicative behaviour. Dialectal variation refers to the changes in

language due to various influences. Creole refers to a stable natural language that develops

from the simplifying and mixing of different languages within a fairly brief period of time:

often, a pidgin evolved into a full-fledged language and Patios refers to a geographical dialect

which differs from the standard language spoken in a given country. Communicative

behaviour can be referred to as a psychological construct which influences individual

differences in the expression of feelings, needs, and thoughts as a substitute for more direct

and open communication.

Different dialects were portrayed within the piece such as Acrolect (purely standard

English) which was clearly stated when Zoe asked Kevon “So how is it that I have never seen
you here before?” Mesolect (Sub-Standard English) brought to life in the paragraph where

Zoe was shocked when she heard the news “Wa-wa-wate deh, What did you say! My money

gawn! Basilect (complete Creole/Patois) with a perfect example coming of Zoe when she

found what Kevon did and stated “A ack him ack mi!” and suh how unuh fi mek mi money

gone”.

Communicative Behaviour is commonly done in communicating emotions

expressed nonverbally. This is firstly presented through Proxemics (the use of space) when

Kevon never called Zoe indicating disconnection between them. It is also seen through

Vocalics (the use of pitch) where the bank representative told the news; Zoe replied with a

confused and arrogant tone and as a result the bank representative had to tell her to calm

down. Lastly, it is depicted through Chronemics (the use of time) where she was stating, "I

was early as usual" revealing it was in the morning of the day.

To conclude, it was evident that the writer used communicative behaviour and

dialectal variation to enhance the reflective sample. There were numerous examples of both,

which were highlighted in the analysis. From their usage, we get a better understanding of the

theme and topic and the effects it had on the victim. It was also good to see that from the

experience, the victim found ways to put a stop to hacking as well as educate others about it.
CONCLUSION

In conclusion, it could be said that the writer has effectively solidified her purpose in

highlighting the effects of hacking. This propelled her to find solutions to rectify the problem.

Also, throughout the reflective section, the writer examined dialectal variation as well as

communicative behaviour to further enlighten or demonstrate to us how hacking affects a

person's lifestyle as well as the many consequences of it. Hacking is real, so people just need

to be vigilant and aware of it so that they will not fall for it.
BIBLIOGRAPHY

Simon V. & Osbourne S/Macmillan Publishers, London (2014): Communication Studies for

CAPE Examinations, 2nd Edition.

SOCIAL ENGINEERING: THE ART OF HUMAN HACKING -Retrieved from

https://books.google.com.jm/books?id=9LpawpklYogC&printsec=frontcover&dq=hacking+

maneuvers&hl=en&sa=X&ved=0ahUKEwid--a88YHqAhVKTDABHUc5AjEQ6AEIRTAE

on December 15,2019

HACKING DEFINITION- Retrieved from

https://www.google.com/url?sa=t&source=web&rct=j&url=https://hackernoon.com/what-is-

hacking-common-objectives-types-and-how-to-guard-against-it-
ab99897ff00b&ved=2ahUKEwj6ttHJ-

IHqAhUnTDABHV_AAeYQFjACegQIDRAM&usg=AOvVaw0MHYxPPFlWL0Xk1wajG

Qdq on December 21,2019

You might also like