3 July 2019
Anderson, Mark. “Andy Warhol’s Work: The 1970s.” The Warhol Museum, Aug. 2017, http://www.warholmuseus.com/career/1970s. Accessed 3 Jul. 2019.
Author’s Last Name, First. “Title of the Particular Webpage Capitalized and in Quotation Marks.” Name of the Organization Who Produced the Website Capitalized and in Italics, Date the webpage was last updated, actual web address, Date you found this information in the following format: day, month abbreviated as three letters, year.
-The first citation is what an actual website might look like if you put it in MLA format. The second citation explains exactly what each item is in the citation above it.
-The title of the page is Works Cited (with “s” on “Works” even if you were to only have one source). Center it, and use plain text: no underlining, italics, bold, etc. Works Cited is the only thing centered; citations should be left aligned using a hanging indent. See below.
-Notice the way the citations are indented: this is called a hanging indent. To achieve a hanging indent on MS Word, highlight the citation, right click it, select “Paragraph,” and select “Special.” Then choose “hanging.” Repeat these steps for each citation.
-Alphabetize citations by the author’s last name. Avoid numbering citations or using bullet points.
-If there is no author listed for the citation, put the citation in alphabetical order based on the title.
-If you can’t find the organization that produced the website, (the part that goes in italics) it likely isn’t a credible source. Avoid Wikipedia as a source. Using Wikipedia is lazy and doesn’t reflect college level research skills because the pages generally regurgitate information from other sources. Go to the original source; use the sources the Wikipedia page provides as references. #lifehack
-The date websites were last updated tend to at the bottom of the webpage. (Be sure to scroll all the way to the bottom of the page.) If there isn’t a date listed, use n.d., which stands for no date.
-The reason you include an access date (date you actually found the website) is that information online can be updated or changed at any time. The access date means you recorded information from that website as of that date. Your access date will always need to be in this format: 26 Aug. 2019.
-I only included the format for a website because that is the most common source used for this assignment. If you have other sources, Google “OWL at Purdue MLA citations” to find the format for nearly any kind or source.[supanova_question]
Instructions: Essay Questions Read the attached article by Julienne Meyer on evaluating
Instructions: Essay Questions
Read the attached article by Julienne Meyer on evaluating action research.
Answer the following questions based on the article
Your answers must be in your own words (not quotes from the article) and demonstrate understanding of key concepts
Explain why the role of research subjects in participatory action research differs from their role in traditional research.
Describe how action research increases the application of science in clinical practices.
Explain the need for an ethical code of practice in action research.
Errors do not interfere with
Severe Errors or not addressed
Format for Submission
Double-spaced – no face page
Each answer must be a minimum of 5 sentences
Upload as MS Word document to Blackboard by due date
Free of spelling and grammar and punctuation errors
Questions 1 – 3
Answers present accurate information
Answers demonstrate correct application of key concepts.
WHAT IS INFORMATION LITERACY? According to the American Library Association (ALA) and
WHAT IS INFORMATION LITERACY?
According to the American Library Association (ALA) and the Association of College and Research Librarians (ACRL), information literacy is “a set of abilities requiring individuals to recognize when information is needed and have the ability to locate, evaluate, and use effectively the needed information.”
WHY IS INFORMATION LITERACY IMPORTANT TO ME?
In his article “Googlepedia: Turning Information Behaviors into Research Skills,” Randall McClure notes that “the ways in which most writers find, evaluate, and use information have changed significantly over the past ten years” (221). Most students now begin the process of research on the Web, often going to familiar sites like Google or Wikipedia. Since they use these sites often in daily life, students are comfortable using them to search for information. However, you have probably been warned that information on the Web is not always reliable and accurate. As a result, the research process requires a careful evaluation of the accuracy, authority, and relevance of all sources. In this unit, you will conduct academic research and further improve your information literacy skills.
Reading Assignment: /content/enforced/1398249-CO.610.ENGL1102.81038.20182/mcclure–googlepedia (1).pdf
In addition to the online sources noted above, consider the following steps that might be helpful in your research process:
Google Topic: Get a sense of your topic by Googling to see what information is out there on your argument.
Read newspapers: Newspaper databases will lead you to articles in the news or editorials about your topic.
Review general texts and references or general topics in databases: In GALILEO, the EBSCO database provides full-text versions of some articles. Research your topic on GALILEO to get ideas on how to narrow and develop the broader topic found in the Sundance article you chose.
Visit the library: College, university, and many public libraries contain journals that include articles on all of the topics you are considering.
HOW DO I GOOGLE?
After reading Randall McClure’s article, compose a response of at least 200 words to the following prompt:
Type your name, your professor’s name, your name, or your favorite subject into a search engine, such as Google or Yahoo.
My name: Brittny Knight
What do you notice about the search returns? Are they videos, vlogs, blogs, scholarly articles, news articles, paid ads, etc?
How do the returns appear to be prioritized?
How do you know they are prioritized that way?
From the results you see, discuss how the returns could help and/or hurt your research for an academic paper if you relied only on a search engine for your information.
What strategy from McClure’s article will be most helpful to you as an academic researcher and why?[supanova_question]
In this discussion, you are going to describe a problem you want
Writing Assignment Help In this discussion, you are going to describe a problem you want to explore in your final paper. You will present a BRIEF description of the problem. Then you will try to persuade your classmates to share your view that this problem needs to be looked at.
Your initial post will have two parts:
What is the problem? (Lack of Cyber Defense Support, Resources, and Public Knowledge) Describe it in terms of who, what, where, when, how, and why. Be succinct and clear about what is at stake.
An increase in the rising cyber threat activity and cyber conflict, expanding slowly every day, more sophisticated threat actors are causing financial risk to business and at an all-time high. Not to mention, we are facing an invasion on privacy as well, the lack of awareness to cyber defense and personal security over privacy has sky rocketed risk making cyber-attacks much more impactful. This impact is felt on a global scale, and every nation including our own has started to feel the brunt of damage and setbacks, initially there were no risk or repercussions for attackers but currently today we are slowly adding more repercussions which balances the risk. Private and public sectors need to come together to continue to limit risk and cyberwarfare towards businesses, new trends also play a big role in this as well. Since the government works hand in hand with the public and private sectors, such as companies like Microsoft and Amazon, running cloud services and software for government computer systems. It’s common to see these companies form strong alliances with our government to create strong defenses. The only issue that makes or breaks these powerful relationships is negotiating price and contracts, money should not be the main factor defending against foreign or even domestic cyber-attacks.
Why should this problem be examined? Persuade your peers that money/time should be committed to this problem. Use the appeals of ethos, logos, and pathos (described below) as appropriate to convince them that this is an important issue to be studied and/or solved.
This problem needs to be examined as well as the many others such as lack of awareness and knowledge within our society, because it yields the power to affect everything we do and utilize on a daily basis. Almost everyone utilizes the internet or uses it in some capacity, securing your personal information especially online should be all users concern but also those that steer away from it. Remember, if you don’t use the internet doesn’t mean someone isn’t acting under your identity. Looking at Instagram alone, how many times do you run across false accounts, you can look through your favorites account and see fake accounts within the comment section. If you’re doing this from Starbucks free Wi-Fi public hotspots, which can be extremely beneficial and convenient, but you are exposed because it’s an unsecured network. Free Wi-Fi is everywhere, especially while traveling and they are ideal spots, but also standard locations to conduct malicious activity since anybody can access them; there is no authentication process or security. These examples are just the tip of the iceberg of one aspect, which is personal security, but nationally is another ball game which may still affect you personally. We need to employ a mesh security that provides peace of mind to everyday citizens and businesses. [supanova_question]
ANNOTATED BIBLIOGRAPHY 1 Annotated Bibliography Brandon Walker ENGL110: Making Writing Relevant Jolene
ANNOTATED BIBLIOGRAPHY 1
ENGL110: Making Writing Relevant
Electronic Warfare: DOD Actions Needed to Strengthen Management and Oversight. (n.d.). U.S. Government Accountability Office (U.S. GAO). https://www.gao.gov/products/gao-12-479
The article analyses how the DOD faces various trials in a progressively complex electromagnet setting, which risks their warfare capabilities. It looks at how the Department of Defense might use a comprehensive plan to ensure that capabilities in electronic warfare are integrated over the course of military operations. This article is property of the United States, with the director of defense sharing his comments on capabilities, limitations, and strategies. The article focuses on a strategy that the Department of Defense will greatly benefit from, which involves implementing parties, roles, duties, and performance measurements to guarantee that all entities are effectively supporting the goal. Therefore, this article will be beneficial in understanding the strategy that the DOD may and should use to ensure the departmental components, specifically, electronic warfare capabilities in all the faces of military operations.
The DOC cyber strategy: The Department of Defense Cyber Strategy
(n.d.). Homeland Security Digital Library at NPS. https://www.hsdl.org/?view&did=764848
The article focuses on cyberspace and how it threatens the United States’ technological and military advantages. The article goes on to explain how the Department of Defense has made remarkable progress in establishing greater cyber capabilities, implementing its structures and strategies, and cultivating the important relationships for the country’s defense. It focuses on the strategy and how it presents an aggressive specified plan for achieving success. The article shows how the strategic environment can change quickly, hence, the Department of Defense needs to have a dynamic and flexible approach. This source will effectively aid in understanding how the Department of Defenses’ strategy is used to strengthen infrastructure within the United States of America.
CHM 1040. GENERAL CHEMISTRY II LAB WEEK 7. CHAPTER 18. THERMODYNAMICS NAME:
CHM 1040. GENERAL CHEMISTRY II LAB
WEEK 7. CHAPTER 18. THERMODYNAMICS
NAME: __Christina Njoroge__________________
Solve the following problems from the textbook. (10 points each).
Practice Exercise on page 638 (First solve Example 18.1 and then attempt the practice exercise).
Practice Exercise on page 640 (First solve Example 18.2 and then attempt the practice exercise).
Practice Exercise on page 640 (First solve Example 18.3 and then attempt the practice exercise).
Practice Exercise on page 646 (First solve Example 18.4 and then attempt the practice exercise).
Practice Exercise on page 650 (First solve Example 18.5 and then attempt the practice exercise).
Practice Exercise on page 652 (First solve Example 18.6 and then attempt the practice exercise).
Practice Exercise on page 653 (First solve Example 18.7 and then attempt the practice exercise).
Practice Exercise on page 654 (First solve Example 18.8 and then attempt the practice exercise).
Problem 18.14 on page 657 (First solve Example 18.3 and then attempt the problem).
Problem 18.18 on page 657 (First solve Example 18.4 and then attempt the problem).[supanova_question]