Quiz Logistics and Policies

Quiz Taking Policies

You may not communicate with anyone (electronically or in person) during this exam.  Please turn off your phone and other nearby devices and ensure that you are not in a room with someone that will attempt to communicate with you. In particular, you may not be in the same room with anyone that is a current student.

You may use your own and the posted course notes as reference. You man not use any other resources.

You may use scratch paper and a pen/pencil to take notes and sketch out solutions.

General Academic Integrity Guidelines

The following statements are excerpted from the Northwestern Provost’s Office Academic Integrity: A Basic Guide. Please read it in full.

A. Basic Standards of Academic Integrity

Registration at Northwestern requires adherence to the University's standards of academic integrity. These standards may be intuitively understood, and cannot in any case be listed exhaustively; the following examples represent some basic types of behavior that are unacceptable:

  1. Cheating: using unauthorized notes, study aids, or information on an examination; altering a graded work after it has been returned, then submitting the work for regrading; allowing another person to do one's work and submitting that work under one's own name; submitting identical or similar papers for credit in more than one course without prior permission from the course instructors.

  2. Plagiarism: submitting material that in part or whole is not entirely one's own work without attributing those same portions to their correct source.

  3. Fabrication: falsifying or inventing any information, data or citation; presenting data that were not gathered in accordance with standard guidelines defining the appropriate methods for collecting or generating data and failing to include an accurate account of the method by which the data were gathered or collected.

  4. Obtaining an Unfair Advantage: (a) stealing, reproducing, circulating or otherwise gaining access to examination materials prior to the time authorized by the instructor; (b) stealing, destroying, defacing or concealing library materials with the purpose of depriving others of their use; (c) unauthorized collaborating on an academic assignment (d) retaining, possessing, using or circulating previously given examination materials, where those materials clearly indicate that they are to be returned to the instructor at the conclusion of the examination; (e) intentionally obstructing or interfering with another student's academic work (f) recycling one’s own work done in previous classes without obtaining permission from one’s current instructor or (g) otherwise undertaking activity with the purpose of creating or obtaining an unfair academic advantage over other students' academic work.

  1. Aiding and Abetting Academic Dishonesty: (a) providing material, information, or other assistance to another person with knowledge that such aid could be used in any of the violations stated above;(b)providing false information in connection with any inquiry regarding academic integrity;or(c)providing(including selling) class materials to websites that sell or otherwise share such materials – including homework, exams and exam solutions, submitted papers or projects, as well as original course materials (for example, note packets, power point decks, etc.). In addition to violating Northwestern’s policies on academic integrity, such conduct may also violate University policies related to copyright protection.

  2. Falsification of Records and Official Documents: altering documents affecting academic records; forging signatures of authorization or falsifying information on an official academic document, grade report, letter of permission, petition, drop/add form, ID card, or any other official University document.

  3. Unauthorized Access to computerized academic or administrative records or systems: viewing or altering computer records, modifying computer programs or systems, releasing or dispensing information gained via unauthorized access, or interfering with the use or availability of computer systems or information.