Professional Documents
Culture Documents
COMMUNICATION STUDIES
Candidate’s Name:
Candidate’s Number:
School:
Territory: Jamaica
Teacher: Miss
Year: 2021
Table of Contents
Pages
Introduction……………………….………………………………………………........…….1
Reflection Section
● Preface…………………………………………………………………………...…......2
Forms}……………………………………………...…..............................................3-5
Language Analysis…………………………………………………………………..…...…. 6-
Conclusion………………………………………………………………………..……………8
Bibliography……………………………………………………………………………..…….9
GENERAL INTRODUCTION
This portfolio centres the theme “Hacking”. However, special focus was given to the
topic and basis of the portfolio “Hacking and its effects on a person's lifestyle." The Google
Dictionary defines hacking as the practice of altering a computer software. The purpose for
choosing this topic is to enlighten the public about the detrimental effects hacking can have
on individuals emotionally, physically and mentally in order for them to put more secure
The portfolio consists of a preface which gives an introduction to the reflective piece,
a story titled “Many Forms”. The preface also looks at the intended audience and reasoning
selecting. There is an analysis that evaluates the original narrative, language registers,
dialectal variation and communicative behavior. Another component is the exposition which
assesses how hacking maneuvers aim at deceiving unsuspecting victims and methods used to
Academically, I will be more informed and from the knowledge gained, my readers
will become knowledgeable of the necessary precautions taken to prevent the risk of
unauthorized intrusion. The information gathered will give a clear understanding of hacking,
The narrative piece “Many Forms” features a young girl by the name of Zoe who
thought she felt love by the presence of a charmed fellow named Kevon; he used
unsuspecting questions to interrogate her about her personal life. She thought she knew him,
who had stolen her credit card number. Later on, she was informed by the bank about some
money transaction and was emotionally distressed; however, she found out what he did and
found solutions to prevent it. Because of her experience, she never let it occur again; hence,
she created a community group to help others within her area who were facing similar
problems and it expanded in which she also wrote a book about the struggles and ways
hackers use to manipulate their suspects. This was written from a 3rd person point of view.
"Many Forms" highlights the different tricks hackers use to deceive their victims.
Therefore, this piece will help ones in or who have recently been affected by differ schemes.
Hence the reason why the intended audience are victims of hacking and those vulnerable to
the cunningness of hackers who readily divulge their personal information. Writing this,
raised my attention and awareness of persons in my country and outside the region who have
This narrative piece can be used in educational facilities such as banks and police
The soothing smell of crème de menthe whispered “drink me.” I realized I was early as
usual. As the café got a little less busy, the baristas treated me with a nice hot cup of
cappuccino and a slice of almond cake. Usually, they serve customers at the amazing
outdoor patio that overlooks the bay and a shipping port. After a while, I was carved by a
handsome guy who was a tough built deck man about 25. Everything about him was a soft
and understated joy as he greeted everyone, but was quick to use a smile on one’s face with
unloyalty which was hidden. As he came through that door, my life felt different because we
were one. As he walked, I felt intimidated by him, “Excuse me!” he exclaimed, speaking with
When he was seated I asked his name, with a delightful smile. He replied, “My name is
He sat with dignity. Then my next question came. “So how is it that I have never seen you
here before?”
"I recently moved here like two weeks ago so here I am!”, he said. In the midst of being
The waiter came and asked, “Are you guys finished with your meals?” With a thrill I said
“Hello, good Morning. This is the National Commercial Bank Representative. There recently
has been a transaction where your money has been sent to an unauthorized account,”she said.
“Wa-wa-wate deh, What did you say! My! Mi money gawn! Suh how unuh fi mek mi money
“Miss calm down and speak properly! We are still searching for the whereabouts of the
money. As soon as we collect some more details, you will be contacted,” the representative
replied.
For a minute there, I remembered at the cafe when I paid for everything. The flashbacks
came; I started to think of the phone number, “He never even CALLED” I cried.
He took my credit card number when I was paying for the meals. Yes!! “But how?”, I spoke
internally.
A lot started to run through my mind; I started to feel depression and regret, not knowing that
I tried to drink the memory away understanding why, however, something hit me. In a rush,
I slapped the keyboard keys until they were numb; establishing what I thought it was. “A
hack him hack mi!” I cried. Knowing all this, I also researched on “How to prevent yourself
from being a hacker victim?”. Subsequently, all the answers were up. The thought of
avenging him took over but the realization of not knowing where he was or whom he said he
was hit me. On this day, I made a vow to never let it occur again. In my situation, I thought
of other people in the world struggling and so I created a community group which went viral
I even wrote a book titled “How to prevent yourself from being hacked and knowing your
prey?” I elevated from where I was and what I did, yet with ease, I confidently exhaled. I
The reflective piece “MANY FORMS” recounts the struggles faced by a young lady
who lost all her welfare and regained hope in the precautions to prevent being hacked, thus, it
brought her far into being the woman she was. The writer deftly employs registers, dialectal
variation and communicative behaviour. However, only two will only be discussed - dialect
language due to various influences. Creole refers to a stable natural language that develops
from the simplifying and mixing of different languages within a fairly brief period of time:
often, a pidgin evolved into a full-fledged language and Patios refers to a geographical dialect
which differs from the standard language spoken in a given country. Communicative
differences in the expression of feelings, needs, and thoughts as a substitute for more direct
Different dialects were portrayed within the piece such as Acrolect (purely standard
English) which was clearly stated when Zoe asked Kevon “So how is it that I have never seen
you here before?” Mesolect (Sub-Standard English) brought to life in the paragraph where
Zoe was shocked when she heard the news “Wa-wa-wate deh, What did you say! My money
gawn! Basilect (complete Creole/Patois) with a perfect example coming of Zoe when she
found what Kevon did and stated “A ack him ack mi!” and suh how unuh fi mek mi money
gone”.
expressed nonverbally. This is firstly presented through Proxemics (the use of space) when
Kevon never called Zoe indicating disconnection between them. It is also seen through
Vocalics (the use of pitch) where the bank representative told the news; Zoe replied with a
confused and arrogant tone and as a result the bank representative had to tell her to calm
down. Lastly, it is depicted through Chronemics (the use of time) where she was stating, "I
To conclude, it was evident that the writer used communicative behaviour and
dialectal variation to enhance the reflective sample. There were numerous examples of both,
which were highlighted in the analysis. From their usage, we get a better understanding of the
theme and topic and the effects it had on the victim. It was also good to see that from the
experience, the victim found ways to put a stop to hacking as well as educate others about it.
CONCLUSION
In conclusion, it could be said that the writer has effectively solidified her purpose in
highlighting the effects of hacking. This propelled her to find solutions to rectify the problem.
Also, throughout the reflective section, the writer examined dialectal variation as well as
person's lifestyle as well as the many consequences of it. Hacking is real, so people just need
to be vigilant and aware of it so that they will not fall for it.
BIBLIOGRAPHY
Simon V. & Osbourne S/Macmillan Publishers, London (2014): Communication Studies for
https://books.google.com.jm/books?id=9LpawpklYogC&printsec=frontcover&dq=hacking+
maneuvers&hl=en&sa=X&ved=0ahUKEwid--a88YHqAhVKTDABHUc5AjEQ6AEIRTAE
on December 15,2019
https://www.google.com/url?sa=t&source=web&rct=j&url=https://hackernoon.com/what-is-
hacking-common-objectives-types-and-how-to-guard-against-it-
ab99897ff00b&ved=2ahUKEwj6ttHJ-
IHqAhUnTDABHV_AAeYQFjACegQIDRAM&usg=AOvVaw0MHYxPPFlWL0Xk1wajG