8th Grade Writing BEST Argumentative Sampler
8th Grade Writing BEST Argumentative Sampler
This document contains copyrighted materials that remain the property of the respective
owners. In addition, all trademarks and trade names found in this publication are the
property of their respective owners and are not associated with the publisher of this
publication.
Permission is NOT granted for distribution or reproduction outside the Uniform System of
Public K–12 Schools or for commercial distribution of the copyrighted materials without
written authorization from the Florida Department of Education. Questions regarding use of
these copyrighted materials should be sent to the following:
Office of Assessment
Florida Department of Education
325 West Gaines Street, Suite 414
Tallahassee, Florida 32399‑04000
Copyright © 2022
State of Florida
Department of State
Table of Contents
INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
INTRODUCTION
Each spring, students in grades 4–10 are administered a set of source texts and a writing
prompt based on those sources. Students respond to one of two possible modes—
expository or argumentative—and must draw on reading and writing skills while integrating
information from the source materials in order to develop and draft a typed, cohesive essay
response.
Each sampler contains sample student responses that illustrate the score points described
in the rubric of one of the two possible writing modes. As with all B.E.S.T. content, the
sample passage set and prompt were reviewed by a committee of Florida educators to
ensure appropriateness for the intended grade in terms of the text complexity, topic, and
wording.
In this sampler, examples of student responses represent some of the various combinations
of the score points across three scoring domains: Purpose and Structure, Development,
and Language. As a basis for developing a common understanding of the scoring criteria,
a bulleted annotation follows the response to explain the prominent characteristics of
the response described in the rubric. These responses are not meant to describe a
full spectrum of examples for each score point in each domain. Moreover, they do not
necessarily represent the highest or lowest example of each score point in each domain.
All responses are scored holistically; however, responses at any grade level that do not
include source citation cannot earn a score higher than 2 in the Development domain.
It should be noted that in addition to responses that receive the scores described in the
rubric for each domain, some responses earn a score of “0” due to certain conditions as
follows:
A response must go through a minimum of three levels of review before any condition code
can be applied. Many responses formulate a claim/position or central idea by rewording
the prompt, and due to the expectation that evidence will be incorporated in the response,
some degree of exact wording from the sources is expected and allowable. However,
responses receiving a “0” for copied text are comprised of source material and/or prompt
language that dominates the response to the point that original writing is not recognizable
or sufficient.
Because a response that is left completely blank does not meet attemptedness criteria for
the B.E.S.T. Writing assessment, no Writing score can be earned or reported.
The Benchmarks for Excellent Student Thinking (B.E.S.T.) describe what students should
know and be able to do at each grade level. For more information about the benchmarks,
please visit CPALMS at [Link]
Writing Prompt
Write an argumentative essay about whether facial recognition technology is
beneficial or harmful.
Your argumentative essay must be based on this prompt and topic, and it must
incorporate ideas and evidence found in the sources provided.
Facial Recognition
1 You pick up your phone and stare at it. Instantly, the screen unlocks. But it won’t
do that for anyone else. The phone knows who you are. It recognizes the shape of your
face.
2 Welcome to the world of the latest iPhone. It comes with a feature called Face ID.
Apple executive Phil Schiller described it this way at the product launch: “. . . your
iPhone is locked until you look at it and it recognizes you. Nothing has ever been more
simple, natural, and effortless.”
3 Your face isn’t the only characteristic you can use as a password. Many
smartphones already accept fingerprint logins. Other security systems check the shape
of the ear, patterns in the eye, or the way a person walks. All of these characteristics,
called biometrics, are unique enough to identify someone.
4 People like using biometrics for security because they’re easy. You can’t misplace
or forget your own face. They’re also usually very secure. It’s hard to fake another
person’s body parts. But it’s not impossible.
5 And the face may be one of the easiest body parts to copy. Most teens post plenty
of selfies. These could potentially help someone hack into a system like Face ID.
7 Once a biometric password has been stolen, you can’t easily change it. You can’t
get a new face!
8 There’s one more aspect of facial recognition that worries experts. It would be easy
for someone else to hold your phone in front of your face to unlock it. . . .
9 Some people probably won’t worry about all that. It’s just too cool to be able to
unlock a device at a glance.
Excerpt from “Some Devices Recognize Your Face. Is That a Good Thing?” by Kathryn Hulick. Copyright
© 2018 by Muse. Reprinted by permission of Muse via Copyright Clearance Center.
10 As Mike Vance approaches the glass door that leads to RealNetworks’ engineering
office, he smiles slightly at a small camera mounted in front of him. Click. The
door unlocks, responding to a command from software powering the camera that
recognized Vance’s face and confirmed his identity.
12 It took three years, 8 million faces and more than 8 billion data points to develop
the technology, which can identify a face with near perfect accuracy. . . .
13 The introduction of the technology has thrust RealNetworks into the center of a
field that is growing quickly as software gets better at identifying faces. But growing
along with it are privacy concerns and rising calls for regulation—even from the
technology companies that are inventing the biometric software.
15 Facial recognition is used, broadly, in two ways, said Oren Etzioni, CEO of Seattle’s
Allen Institute for Artificial Intelligence, the sister organization to Paul Allen’s brain
science institute. One is consumer convenience, such as grouping photos, and the
other is for surveillance and tracking. . . .
16 But now, as RealNetworks’ SAFR shows, the technology has been moving further
into public spaces. And with that, privacy advocates wonder if people fully realize how
often their faces are being scanned, and advocates and the industry alike question
where the line is between the benefits to the public and the cost to privacy.
Learning a face
18 RealNetworks’ technology maps 1,600 data points on each face it sees. The team
has been “training” its machine for about two years, since the launch of RealTimes,
its free app that lets people build photo slideshows. Baked into the 3,300‑word user
agreement for that app is language that allows RealNetworks to use customer photos
to train its facial‑recognition system.
19 SAFR doesn’t know the identity of people in the RealTimes photos, Vance said—
there are no names, addresses or other identifying information in the massive database
of 8 million faces. But what it can do is tell if two faces are the same person. It’s gotten
so accurate that it can tell identical twins apart and match family photos of the same
person even if they were taken decades apart. . . .
20 In China, the technology is so common that it can identify people who are
jaywalking and display their photos on public digital billboards.
21 The U.S. isn’t near that level yet of routinely identifying people in public streets
or parks, said Clare Garvie, an associate at the Center on Privacy and Technology
at Georgetown Law Center, but she finds the lack of transparency into how the
technology is being used and the lack of federal laws troubling. . . .
22 But proper regulation could prevent that, and there’s reason to be optimistic,
Garvie said, pointing to Microsoft’s call for such laws.
Excerpt from “As facial‑recognition technology grows, so does wariness about privacy. Use at a school
in Seattle fuels debate” by Rachel Lerman. Copyright © 2018 by the Seattle Times. Reprinted by
permission of the Seattle Times via Copyright Clearance Center.
23 Of all the information Facebook collects about you, nothing is more personal than
your face.
24 With 2.2 billion users uploading hundreds of millions of photos a day, the giant
social network has developed one of the single‑largest databases of faces and—with
so many images to train its facial recognition software—one of the most accurate.
25 The question of whether you should let Facebook save your face is gaining in
urgency as it moves to expand its deployment of facial recognition, rolling it out in
Europe, where it was scrapped in 2012 over privacy concerns and scanning and
identifying more people in photos. . . .
26 Should people trust Facebook with one of their most sensitive data points which,
unlike a credit‑card number, can’t—or at least can’t easily—be changed?
27 Distrust over how Facebook treats its customers’ personal data has jumped after
87 million users had their data pilfered1 by Cambridge Analytica. . . .
28 Most forms of tracking target the technology you use. Cookies on your computer.
Digital fingerprints your browser leaves behind. GPS on your smartphone. What makes
this technology different: It tracks the most identifiable part of your body.
29 “You can delete cookies. You can change browsers. And you can leave your
smartphone at home,” says facial recognition expert Alvaro Bedoya, executive director
of Georgetown Law’s Center on Privacy & Technology. “But you can’t delete your face,
and you can’t leave it at home.”
31 The company says it has no plans to make people’s facial recognition data
available to advertisers or outside developers. But the more Facebook can glean from
users’ photos about their interests, activities and social circles, the more precisely it
can target advertising.
32 Facebook says it has tight control over its database of people’s likenesses. Even
if someone were to obtain a “template,” it does not function like other face recognition
systems.
1
pilfered: stolen
37 “This technology is powerful in a way that our society isn’t really used to,”
Bedoya says.
Excerpt from “Facebook wants to save your face. Should you say yes to facial recognition?” by
Jessica Guyenn. Copyright © 2018 by USA Today. Reprinted by permission of USA Today via
Copyright Clearance Center.
Writing Prompt
Write an argumentative essay about whether facial recognition technology is
beneficial or harmful.
Your argumentative essay must be based on this prompt and topic, and it must
incorporate ideas and evidence found in the sources provided.
* Citation is not a holistic consideration. Without citation, the highest score possible in Development is 2.
** Claim in Grade 7 benchmarks
1 ● Position** may be absent, ● Response may demonstrate ● Vocabulary and word choice
Below ambiguous, or confusing, lack of understanding of may be vague, unclear, or
grade‑level demonstrating lack of the topic and/or lack of confusing.
performance awareness of task. development. ● Sentence structure may be
demonstrated. ● Demonstrates little or no ● Elaboration may consist simplistic or confusing.
discernible organizational of confusing ideas or ● Use of grammar,
structure. demonstrate lack of punctuation, capitalization,
● Transitions may be absent or knowledge of elaborative and/or spelling may contain a
confusing. techniques. density and variety of severe
● Introduction and conclusion ● Evidence from the sources errors, demonstrating lack
may be unrelated to the may be absent, vague, and/ of command of standard
response and/or create or confusing. English conventions, often
confusion. ● Counterclaim(s) are absent or obscuring meaning.
● Too brief to demonstrate confusing. ● Tone and/or voice may be
knowledge of purpose, ● Lacks appropriate citations. inappropriate.
structure, or task. ● Too brief to demonstrate ● Brevity with errors
knowledge of elaboration, demonstrates lack of
topic, or sources. command of language skills.
* Citation is not a holistic consideration. Without citation, the highest score possible in Development is 2.
** Claim in Grade 7 benchmarks
Technology all over the world is progressing greatly at a very fast pace. We
already know that government officiated organizations use advanced technology
that can profile someone within a minute. But did you know that some phones,
such as an Iphone for example, can unlock by the fingerprint, eye pattern and
even your face? Although this might sound like a beneficial way to make life
simpler, facial recognition technology can be very harmful in numerous ways. For
example, if you get your biometric information stolen it can not be replaced, there
is not an actual answer to who’s hands the information goes to and there just
wont be any privacy in the lives of those who use technology. Facial recognition
programs say that they are developing way to make sure it only unlocks your
phone using your face, there are several ways to hack the system.
To begin with, new Iphones are able to unlock phones using facial recognition
programs. Facial recognition functions similar to fingerprinting, the system
recognizes each face has unique features that can not be copied and matches
the results to just one person. But there are too many ways to get your biometric
information pilfered by somebody else. In source 1, “Some Devices Recognize
Your Face. Is That a Good Thing?” the passage states, “ In 2016, researchers at
the university of North Carolina gathered plublicly available Facebook photos.
They used them to build 3D models of faces. Then they showed these fake faces
to five different facial recognition systems. Four out of the five let the imposter
in. (Face ID wasn’t part of the test)”. This helps explain how even though it was a
study performed and controlled by a university, anyone with bad intentions could
steal your information. However, getting your credit card stolen for example and
your face essentially are completely different things. It is much simpler to call
your bank and have them deal with the stolen card than it is to change your face.
With that, there are other ways that another person could steal your face, such as
simply putting your phone in front of your face. In the world of technology, there is
not a way to genuinely have one hundred percent of privacy.
Facebook does this but wants to take it one step further by using your pictures
and tracking what you look like and what you wear. If that isnt an invasion of
privacy then what is? All of this just to get advertisements targeted towards you,
its not worth the risk really.
Facebook also says in source 3, “ Facebook wants to save your face. Should
you say yes to facial recognition?”,“The company says it has no plans to make
people’s facial recognition data available to advertisers or outside developers.”.
But how do we know that they will not share our information for their empire to
improve? Facebook is all about progressing and making life easier but it doesnt
see like what they are doing is for our benefit as they have showed time and
time again. The question of the hour is, where does our biometric data go when
we submit it to facial recognition systems? Well no one really knows. Source
3 states, “ In December, Facebook expanded the scope of its technology with
the announcement that it would let users know when someone posts a photo of
them, even if they are not tagged in it. The technology informs you if someone
uses a photo of you in their profile picture to help detect impersonations. It also
makes it possible for the visually impaired to have screen readers tell them whos
tagged in friends’ photos.” Well, Facebook says that it is a harmless way to detect
when you are in a photo, for advertisements and to make it easier for visually
impaired people, people still are clueless as to where the information is stored and
who it is given to. Technology may be advancing but society is not ready for the
responsibilities it comes with.
The year is 2021, not much has changed except the fact that you have this
vibrant, new future that allows you to access your phone using facial recognition.
You return to your house from another typical day of work, just to get a phone call
to soon discover that someone has retained all of your phone information and is
leaking it online. How did such a crime take place? By simply copying your face,
hackers now have unlimited access to your phone, privacy, and all your valuable
information stored onto there. Is this what you want to happen to you?
A key factor before you allow access to your face like this is to dertermine
the amount of trust you have for whomever you wish to give this out to. Is this
company reliable? For instance, a massive marketer for the use of Face ID is
Facebook, who wishes to use it for beneficial circumstances such as being able
to spot out anyone who uses your picture and notify you immediatley. Though
their intentions are decent, it can easily be used against them. As I stated in
the paragraph above, hackers can easily gain access by simply using your face
now. Facebook, whilst being a large company, still isn’t completely reliable. It is
mentioned that, “Distrust over how Facebook treats its customers’ personal data
has jumped after 87 million users had their data pilfered by Cambridge Analytica.”
87 million people in the world have already had their data been stolen without the
new facial recognition technology. Imagine a world in which this technology is
inclusive to everyone with a phone.
be safe to use. “SAFR doesn’t now the identity of people in the RealTimes photos,
Vance said‑‑‑ there are no names, addresses or other identifying information in
the massive database of 8 million face,” but that should never be apart of the
arguement in the first place, as that was never a concern. The concern is that your
information stored on your phone can be hacked by unwanted forces who can
gain access to your data via Face ID.
In conclusion, not everything that glitters is gold, just as not every brand
new idea for technology is just as beneficial as it seems to be. Beneath the clever
marketing of effecience and performance, lies the dark truth of higher risk than
reward. In the time where everything must be fast and urgent, sometimes it’s
important to taka step back and analyze the situation for what it is.
4 – Purpose/Structure
● The position taken (Facial recognition being used as a method to access your phone is more
harmful than it is beneficial) is focused on the task and is consistently maintained throughout.
● The organizational structure being used strengthens the response and advances the argument.
● Transitional strategies (By; For one; Well; Now; also; Once; For instance; Though; As I
stated; Another; In conclusion; sometimes) are purposefully used to connect ideas within and
among paragraphs, creating cohesion.
● An effective introduction draws the reader in with a scenario about a future in which you are
the victim of identity theft, and then sets up the rest of the response to explain why this future
should be avoided. The conclusion is brief but effective, appealing to the audience (analyze the
situation).
2 – Development
● Skillful development demonstrates thorough understanding of the topic.
● Original writing with paraphrasing, text evidence, examples, narrative and rhetorical
techniques constitute an effective elaboration that enhances the argument (Why might this be of
any concern? Well, think about all of the information and data you have saved on your phone.
Now imagine if absolute strangers have it in their hands, and can give it out to anyone like
free samples at your local Costco).
● Relevant evidence from multiple sources (all three sources) is smoothly integrated, lending
credibility to the argument.
● Grade‑level expectations for counterclaim(s) are fully addressed in the introduction, the 2nd
and 3rd body paragraphs, and in the conclusion.
● Although the response demonstrates above grade‑level accomplishment, lack of citation
prevents the score from moving beyond the 2 level.
4 – Language
● The integration of academic vocabulary (vibrant; retained; unlimited; valuable; certainly;
absolute; massive; circumstances; decent; gain; inclusive; fatigued; unwanted forces; glitters;
clever; dark truth of higher risk) strengthens and furthers the ideas.
● Various sentence structures (mostly compound and complex ones) are skillfully used,
contributing to the fluidity of ideas.
● Use of standard English grammar with very few errors demonstrates consistent command of
the communication of ideas.
● Tone and voice strengthen the overall argument, as evidenced in the introduction and
conclusion.
Techology has improved and is continuing to improve every day and making
life a little sweeter everytime. Take facial reconginiton for example, it has advanced
and improved over the years, but has had a lot of conservercsy, even though their
has been issues we still use it, this is because its just that beneficial to society.
Facial recongintion is beneficial because it identifies criminals and helpes them to
get caught quicker, makes our lives easier, and it helps people with disabilities
Criminals has been smarter and using more unique techniques but so
has techinology, it has made it easier to find and identify the criminal. Facial
reconginition can be used on cameras and drones to find criminals quicker than
ever before, get them behind bars fast, and ensure everybody safety. In source 2
paragrapgh 20 it states “In China, the technology is so common that it can identify
people who are jaywalking and dispaly their photos on public digital billboards.”
Using this kind of technlogy, identifing people that robbed a bank willl be as easy
as indetifying people that robbed a convient store. This way hiding would be
difficult, even in the most secretive spot facial recongintion will be able to find
them. Which would be beneficial to everyone, well.....maby not the crimincal.
On the other hand, facial apperences are eaisily reprical and isnt that secure.
Technology can also be used to copy people faces and use it to get into people
phones or other things secured by facial reconginition. In source 1 paragrapgh 6
it states “They used them to build 3D models of faces. Then2 they showed thes
fake faces to five different facial reognition systems. Four out of the five let the
imposter in.” This raises concerns on how protected is your private information
and how easy people can get into it. Always worring about if someone is getting
into your things isnt good and isnt going to let you be at ease. Having that little bit
of space for someone to get into your account isnt safe.
All in all, facial regoncition is very beneficial. It helps to catch the bad guys,
makes out life a little easier, and helps people with disabilities. Even thoughfacial
recongition has a small posibility of someone getting into your private things, it is
always improving and would take a lot of work just for someone to duplicate your
face. Facial recocognition is one of the newest improvements in our society and
is going to keep imroving. If I was you I would go on ahead and jup on this fast
moving train.
3 – Purpose/Structure
● The position in this response (Facial recongintion is beneficial) is focused on the task and is
generally maintained throughout.
● The organizational structure is logical and allows for the advancement of the argument, with
each body paragraph following one of the three topics outlined in the introduction (because it
identifies criminals and helpes them to get caught quicker; makes our lives easier, and it helps
people with disabilities).
● Purposeful transitional strategies (for example; but; even though; This way; Another; Yes;
Having an easier way out; isnt just; On the other hand; All in all; Even though) are used to
connect ideas within and among paragraphs.
● A sufficient introduction gives some context about technology and facial recognition and sets
up a clear position and the key points for the body paragraphs. The conclusion summarizes
the response while avoiding repetitive language and ends on a direct appeal to the audience to
attempt to give some sense of completeness.
3 – Development
● There is a logical development that demonstrates understanding of the topic.
● An adequate elaboration combining original student writing (Us as people havent gotten lazy
per‑say, but like to spend more time on other things then putting in a long code in our phones
to make sure no one gets in or unlocking doors) with paraphrase, text evidence, and rhetorical
techniques support the argument.
● Relevant evidence from multiple sources is integrated to lend credibility to the argument.
● Grade‑level expectations for counterclaim(s) are sufficiently addressed in the introduction, the
2nd body paragraph, and the 4th body paragraph.
● Evidence is appropriately cited.
3 – Language
● Academic vocabulary (improved; advanced; unique techniques; ensure; secretive; time
consuming; disabilites; biased; concerns; duplicate) is integrated, demonstrating clear
expression of ideas.
● Sentence structure is varied, showing grade‑appropriate language facility.
● Use of grammar—Despite spelling errors and usage errors, the response shows overall
grade‑appropriate command of standard English conventions.
● The tone and voice are appropriate for the overall argument, as evidenced in the 2nd body
paragraph.
Have you ever forgotten your password? Or locked yourself out of your
phone? Well that will not be happening anymore! New phones are being created
to recognize your face and use that information to unlock the phone. This is an
amazing idea because all you have to do is look at your phone and you are in.
We are living in the future with all this technology! We have the world at our
fingertips and the safest form of getting into our devices to exist. You can not
steal a face, it is impossible, a face is unique. Even parents, who their child looks
exactly like them, can not steal the face of their child. It is the safest possible way
to get in to your devices. No more passwords, which are honestly easy to guess.
Now, using your fingerprint is just as safe as using your face, but with a fingerprint
you usually have a password and multiple people´s fingerprints in the phone. But
using your face to unlock a device is brilliant and the safest way to make sure
nobody gets into your phone. In source two the text says, “each face has its own
unique signature” meaning it can not be stolen.
Not only is facial recognition safe but it is fast and easy. In todays life
everything is becoming easier and easier. Nobody wants to go through the
struggle of typing a password evertime they need to enter their phone. The world
is changing before our very eyes. These technologies are only going to get easier
to use. Humans love things to be easy, companies have figured out that humans
are getting lazier and need things to be easier for them. But really, how easily
we can get into our phone now is remarkable. Our world is growing so much. In
source one the author says, “People like using biometrics for security because
they are easy. You can not misplace or forget your own face.” Everyone agrees
that this is brilliant and easy tenchnology.
Some people might say that you could just hold the phone up to the persons
face, or use a photo of them but that would only happen if you knew them
personally or kidnapped them! But how is someones privacy being invaded more
than they already are posting on instagram or snapchat. We get to be part of the
safest way to enter your devices. What is so wrong about that? We already post
a ton of personal things on our social media, so our privacy is not technically
being invaded with facial recognition. In source number one, “people enjoy
using biometrics as a password because it is easy and secure. It is very hard
to fake another human beings body parts” you see, everyone agrees that facial
recognition is great.
3 – Purpose/Structure
● The position is present (This [facial recognition technology] is an amazing idea because all
you have to do is look at your phone and you are in), focused on the task, and is generally
maintained throughout the response.
● The organizational structure is logical and advances the argument. After the introduction, the
topic of safety is addressed; then that of fast and easy access to devices before the idea of
privacy is called in to counter an opposing view.
● Transitional strategies (Well; Even; Now; But; Not only; In todays life; But really; or; In
conclusion; And) are purposefully used to connect ideas within and among paragraphs.
● Sufficient introduction and conclusion contribute to a sense of completeness. The introduction
draws the reader in by asking some rhetorical questions about problems they’ve experienced,
and then promising to show how facial recognition will fix these issues. The conclusion is
brief, but succinctly summarizes the key points and attempts to end on a satisfying idea for the
reader (This is a complete win, we have deciphered how to be safe and secure).
3 – Development
● The response has a logical development, demonstrating understanding of the topic.
● Elaboration is adequate, with a combination of original student writing (Even parents, who
their child looks exactly like them, can not steal the face of their child), paraphrase, text
evidence, and rhetorical techniques (such as rhetorical questions in the introduction) to support
the argument.
● Relevant evidence from multiple sources is integrated, lending credibility to the argument.
● Grade‑level expectations for counterclaim(s) are sufficiently addressed in the third body
paragraph.
● Evidence is appropriately cited.
3 – Language
● Integration of academic vocabulary (amazing; brilliant; remarkable; kidnapped; invaded;
technically; deciphered) in the response demonstrates clear expression of ideas.
● Grade‑appropriate language facility is demonstrated through a variety of sentence structures.
● Use of grammar demonstrates grade‑appropriate command of standard English conventions.
● The tone used is appropriate for the overall argument, evidenced in the introduction and
conclusion.
Facial recognition is a common key for many devices. Many people trust
and use facial recognition to keep their information safe. Do people know that
facial recognition could leed to more danger? Some people put their information
on a device that could get hacked. Some people might get hacked or even be
exposed. Facial recognition technology is harmful to people who use it.
To start of, facial recognition serves an easy way to hack into someone’s
device. Someone might be able to make a replica of a face and hack into the
device. Source 1 proves, “Four out of the five let the imposter in.” This proves
that it is possible to make replicas of a face. Most replicas were proven succesful.
Even though people think no one has the face same as theirs, someone could
make a copy and easily hack into their device. People might start making fake
replicas and now those people are in danger because once someone hacks your
device, your information is no longer classified. Now that it is easier to get peoples
information, you might want to reconcider facial recognition.
Furthermore, facial recognition records your face an then could easily get
any information they want. Someone might try to track you down and with
facial recognition it is easy to do that. Source 3 explains, “One is consumer
convenience, such as grouping photos, and the other is for surveillance and
tracking...” This evidence shows that facial recognition is also used for traking
people down. Once facial recognition scans your face, information that was
private could now be exposed. This could prove to be more dangerous to the
people that don’t want their identity revealed. This is dangerous because if this
information falls into the wrong hands then many people could be in danger.
Moving on, some people think it is benifical if facial recognition can reconize
you. People might rely on it because they think that not many people would be
able to find them. Although people think that facial recognition is keeping us safe,
it really is a threat. Sorce 2 states, “... can recognize people in photos and videos
even if their face are obscured, picking up clues from posture and body shape.”
Even though this might be true, someone could easily track you down if facial
recognition knows what your features are. If you don’t want to be seen but facial
recognition is figuring out who and where you are, this can only lead to more
danger and could hurt many people.
3 – Purpose/Structure
● This response has a stated position (Facial recognition technology is harmful to people who
use it) that is focused on the task and is generally maintained.
● The organizational structure is logical and allows the argument to advance—from the first idea
(facial recognition serves as an easy way to hack into someone’s device) to the second idea
(negative use of hacked information), to addressing opposing views.
● There are purposeful transitional strategies (To start of; Even though; Now; Furthermore;
Once; Moving on; Although; Over all; If; then) that connect the ideas throughout.
● Sufficient introduction and conclusion give a sense of completeness to the essay.
3 – Development
● There is a logical development that demonstrates understanding of the topic.
● The elaboration is adequate—with a combination of original writing, paraphrase, text
evidence, and rhetorical techniques to support the argument.
● The relevant evidence is integrated from multiple sources (all three), lending credibility to the
argument.
● Grade‑level expectations of counterclaim(s) is sufficiently addressed in the third body
paragraph—with acknowledgments in the first body paragraph and in the conclusion.
● Evidence is appropriately cited (Source 1 proves; Source 3 explains; Sorce 2 states).
3 – Language
● Academic vocabulary is integrated (common key; serves; classified; exposed; revealed;
catious; reconcider)), demonstrating clear expression of ideas.
● The variety of sentence structures used demonstrates grade‑appropriate language facility.
● Use of grammar demonstrates grade‑appropriate command of standard English conventions—
despite a few spelling errors.
● The tone and voice used are appropriate for the overall argument, as evidenced in the first
body paragraph.
To add on to, unlike many things in life you can’t change your face for your
password. One i put facial recognition on my phone cousin got into my phone,
look through my stuff, bought a twenty dollar app (game) on my phone. In source
3 it states “But you can’t delete your face, and you can’t leave it at home”. I say
a crazy ex on youtube grabbed her ex husband phone, got through his security
with facial recognition and transfered 3 thousand dollars to her account and got
arrested. “software gets better at identifying faces. But growing along privacy
concerns and rising calls for regulation”.
To continue, big companies are using facial recognition and this can get your
information released easier. In source 3 it states “ What may seem harmless ‑
allowing Facebook to create an impression of your face ‑ can be more telling than
some people think. And soon it could reveal your health, privacy experts say”.
Theres these things on this chatting service snapchat you can save someones
selfie or snap on their gallary on their phone and see their location on snapchat.
In source 3 it states “Facebook can glean from user’s photos about their interests,
activities, and social circles, the more percisely it can target advertising.” One time
i search up Ps4 (Playstation four) controllers on Google and for a month of ads for
knoch off and legit Ps4 contollers to buy and it was annoying.
In conclusion, facial recognition can do more bad than good. With there being
more other passwords and that you can just delete facial recognition because you
can’t delete your face also big companies are using facial recognition and this can
get your information released easier. Facial recognition is the most technological
way of security we have to wait and see.
Have you heard that face recognition is a thing now adays? Facial recognition
is scanning your face to keep it in a database and to unlock phones, or even to
know more about your life online. Some people say facial recognition is a good
thing to have, and a step up in technology, but it is harmful because it makes your
personal life so vulnerable. Facial recognition is also bad because it can be used
in a database and stored somewhere, possibly without your knowing. The last
reason facial recognition is harmful is because is the future, it will be possible to
know people medical conditions/records just with facial recognition.
In conclusion, I hope you can see why facial recognition is harmful. One
reason is because it can be stored in a database without your knowing. The
second reason is because it can expose medical records and/or conditions. Facial
recognition is a complete and total privacy breach and should be banned/ heavily
restricted.
Privacy is important, but when people use social media or just have a phone
there is a lack of privacy. Almost everyone has a phone and in that phone there
is your private information. What if someone knows your password and then they
can get to your phone and take all your private information to take it against you.
No problem, now you have a password and your face is now also used as your
password. But is using your face safe? First of a lot of people use phones and
also a lot of them take pictures as in selfies and when a person posts it people
can now take that photo of their face and use it against them. How you may
ask? Well in passage 1 it states “In 2016, researchers at the University of North
Carolina gathered publicly available Facebook photos. They used them to build
3D models of faces. Then they showed these fake faces to five different facial
recognition systems. Four out of the five let the imposter in. (Face ID wasn’t part
of the test)” (paragraph 6). This means that when a person is taking a selfie and
posting it they are basically giving people permission of seeing what they look
like and now that person can get their identity stolen. Also why facial‑ recognition
is harmful to people security is that some social media can also steal some of
your personal information. In passage 3 it says “Facebook’s facial recognition
technology analyzes photos and videos to create a unique “template” to identify
you. The technology is a shortcut that scans photos to suggest names of friends
to tag” (paragraph 30). This means that social media like facebook already knows
what you look like thanks to facial recognition. Honestly that’s kinda creepy. In
conclusion, facial recognition might not seem harmful but maybe think twice
before you do anything and be safe.
Do you happen to have an iPhone, or know someone that owns one? Have
you noticed that their/ your phone most likely has Face ID. It’s a (somewhat) new
way to unlock your phone without even touching it. Some say facial recognition
technology is harmful, others say it’s quite beneficial. Although facial recognition
is natural, simple, and effortless, I still believe that, in some ways, Facial ID can be
harmful. Here’s why.
It’s not impossible to unlock one’s cellular device, even though’s that carry a
password. It may take a little time and patience, but some can get that job done
and possibly walk away with all your personal information. Someone can easily
take a photo off of social media and use that photo to hack into a system such as
Face ID. People do it all the time. It’s nothing new. If someone were to unlock your
phone, they could hack all of your personal information such as your credit/ debit
card information, your adress, your passwords to your social media accounts, etc.
All it takes is your face/ password and BOOM! they’re in, they know all of your
personal information and there’s possibly nothing you can do about it. “It’s hard to
fake another person’s body parts. But it’s not impossible.”.
I think facial recognition is a really good thing like the fingerprint recognition. I
believe that facial recognition is a good thing because it takes less time to open
your phone. facial recognition is one of the better things about iphones it takes
less time and you dont have to use nothing but your face to open the phone. In
my opinion i believe i phones are better than androids and iphones should be
the only phone. I also believe that iphones are super expensive and they schould
lower the price.
I think facial recognition technology is harmful. Your face isn’t the only
characteristic you can use as a password. People like using biometrics for security
because they’re easy. They’re also usually very secure. According to Kathryn
Hulick in “Some Devices Recognize Your Face. Is That a Good Thing?” she
says in source 1 that “It’s hard to fake another person’s body parts. But it’s not
impossible.” And the face may be one of the easiest body parts to copy. Once a
biometric password has been stolen, you can’t easily change it. You can’t get a
new face!
First, it took three years, 8 million faces and more than 8 billion data points
to develop the technology, which can identify a face with near perfect accuracy.
Facial‑recognition technology is already common, used in everything from photo
apps that sort pictures of people to unlocking an iPhone to law‑enforcement
agencies searching databases of driver’s license photos. Facial‑recognition
technology functions much like fingerprinting – each face has its own unique
signature, and companies teach machines to recognize and match people’s
unique features.
On the other hand, nothing is more personal than your face. Most forms
of tracking target the technology you use. Cookies on your computer. Digital
fingerprint your browser leaves behind. GPS on your smartphone. Facial
recognition, sometimes called faceprinting, is used by major technology
companies around the globe.
This sample response has been purposefully constructed in order to illustrate multiple methods
of copying text. It is important to note that some of the copied examples do not contain the
same techniques; however, all of the techniques are considered copy. For this reason, it is
recommended that educators/parents/students examine the copied responses at all grade levels.