Research Assignment

In: English and Literature

Submitted By TeamIvy
Words 691
Pages 3
Senior Research Paper 2011-2012

The Basics
Your assignment is to write a persuasive literary analysis research paper over an approved author and topic.

The Topic
Your may choose one of the following topics to write about: 1. How the author’s life influenced their work (if it did at all). 2. A common theme that appears in many of their works.
Keep your preferred topic in mind as you gather your sources. It will help you decide on what source material you should keep and what source material you should discard. All your source material should help you formulate your argument.

The Sources
Your sources must be legitimate and academic. I expect you to use a variety of the sources available in the library including books, online databases, magazines, journal articles, etc…. You may not use generic internet sources (e.g., Poemhunter.com, Wikipedia, Spark Notes, Pink Monkey, etc…). You may use information gathered from books.google.com or scholar.google.com.
Source Requirements: • A minimum of 4 original works by your chosen author- these will be poems, or short stories, or plays, etc… • A minimum of 3 criticisms that provide relevant information about your author and topic. • A minimum of 1 biographical source.
Make sure you have detailed information about your poems and authors, including textual examples, line numbers, and source information need to complete the works cited.

Paper Format
The paper will follow all applicable MLA format requirements, include a works cited page, and be a minimum of six paragraphs in length. These requirements are non-negotiable and their omission will severely impact your final grade.

The Final Product
Your final research project should be in a 1-1.5 ring binder. The binder should include (in order): 1. A creative cover page with the title of your paper and your name. This page does…...

Similar Documents

Research Methodology Assignment

............................ 1 2 Research Methodology ......................................................................................... 1 2.1 Definition of Research Methodology............................................................. 1 2.2 Qualitative versus Quantitative Research Methodologies ............................. 2 2.3 The author’s research philosophy .................................................................. 3 3 Quantitative Methods............................................................................................ 4 4 Example for the Conduction of Quantitative Research ........................................ 5 5 Conclusion ............................................................................................................ 7 Appendix.................................................................................................................. 9 Bibliography .......................................................................................................... 11 1 1 Introduction Research methodology is very important because research is used in most professions as well as in science.1 Managers for example need research to achieve information about the customers and the market they intend to advertise their goods and services before making any kind of decision.2 Researchers and academics apply research methodology to gather new knowledge and information. But often the meaning of research methodology, especially......

Words: 3358 - Pages: 14

It302 Research Assignment 1

...Research Assignment 1 IT 302 Linux System Administration January 21, 2013 The purpose of this paper is to secure UNIX/Linux operating systems from unscrupulous people. It shall be focused on SELinux, chroot jail, and iptables. Each of the three focus areas will be detailed, with specific interest in the following. What organization is behind it and reason entity is involved. How each technology changes the operating system to enforce security, and if the security measure can be easily bypassed. And finally, describe the types of threats each of the technologies is designed to eliminate. Since no two UNIX-based operating system builds are exactly alike, it is important to note that each build may have its own inherent security flaws. SELinux was developed by The United States National Security Agency (NSA). The first version was made available to the open source development community under the GNU GPL on December 22, 2000. The software merged into the mainline Linux kernel 2.6.0-test3, released on 8 August 2003. Other significant contributors include Network Associates, Red Hat, Secure Computing Corporation, Tresys Technology, and Trusted Computer Solutions. Experimental ports of the FLASK/TE implementation have been made available via the TrustedBSD Project for the FreeBSD and Darwin operating systems. The reason NSA is involved in this project is because this organization is responsible for carrying out the research and advanced development of......

Words: 900 - Pages: 4

Research Assignment

...Research Assignment Part I. 1. Student Wonders if College Prepares Us A. McCarthy, K. February 13, 2013. Student Wonders if School Prepares Us. Staff writer Retrieved from http://www.leprovoc.com/student-wonders-if-college-prepares-us-1.2989868#.UScktqWsiSo B. This article discusses how college prepares one for the real world. It gives statistics on job students who obtain jobs after college and students who don’t. C. I may use this article to feed off some ideas for my speech. Although the author does not talk about the things I am, I can still get some ideas from it. Part II. 1. Poll: Students Say High Schools Failing To Support Their Pursuit Of Jobs, College A. Stacy, A. April 19th, 2011. Poll: Students Say High Schools Failing To Support Their Pursuit Of Jobs, College. B. This article discusses high school student’s opinion on why high school is not supporting their future of jobs and college. C. I may use this article to give the other peoples side of why they think school doesn’t prepare them for life. Then I will prove that theory wrong with factual information and statistics. Part III. 1. http://www.timemanagementhelp.com/ A. Retrieved February 20th, 2013, from http://www.timemanagementhelp.com/highschool.htm B. This websites talks about ways to improve on one’s time management. C. I may use this website to give my audience ways they may better their time management while they are in school and in the......

Words: 326 - Pages: 2

Unit 2 Research Assignment

...Research Assignment Java is a general-purpose, concurrent, class-based, object-oriented computer programming language that is specifically designed to have as few implementation dependencies as possible. It is intended to let application developers "write once, run anywhere" (WORA), meaning that code that runs on one platform does not need to be recompiled to run on another. Java applications are typically compiled to bytecode (class file) that can run on any Java virtual machine (JVM) regardless of computer architecture. Strengths:WORA, popularity Weaknesses: Slower than natively compiled languages Sample syntax: class HelloWorldApp { public static void main(String[] args) { System.out.println("Hello World!"); } } C++ is a programming language that is general purpose, statically typed, free form, multi-paradigm and compiled. It is regarded as an intermediate-level language, as it comprises both high-level and low-level language features. Developed by Bjarne Stroustrup starting in 1979 at Bell Labs, C++ was originally named C with Classes, adding object oriented features, such as classes, and other enhancements to the C programming language. The language was renamed C++ in 1983, as a pun involving the increment operator. Strengths:Speed Weaknesses: Older and considered clumsy if compared to Java Sample syntax: #include using namespace std; void main(){ cout << "Hello World!"; } C# is a multi-paradigm programming language......

Words: 477 - Pages: 2

Market Research Assignment

...[pic] [pic] UniSA/Taylor’s College Undergraduate Business Programs Assignment Cover Sheet Please print clearly and attach cover sheet to the front of your assignment Student Name UniSA ID Taylor’s ID Nur Hazwani Bt Hasnul Hisham 100086169 0702W59544 Course Name Course Code Market Research MARK2020 Taylor’s Course Coordinators Name Assignment Due Date MS. Neliza 8TH October 2007 Assignment Name & Number Assignment 2 I declare the following to be my own work and that to the best of my knowledge and belief does not contain any material published or written by another person except where due reference is made in the text. I authorise the University to test any work submitted by me, using text comparison software, for instances of plagiarism. I understand this will involve the University or its contractor copying my work and storing it on a database to be used in future to test work submitted by others. I understand that I can obtain further information on this matter at: http://www.unisanet.unisa.edu.au/learningconnection/student/studying/integrity.asp Signed: CWani Dated: 8th October 2007 Tanjung Golden Village (TGV) Sdn Bhd operates the largest multiplex in the country, Malaysia. TGV has 63 cinemas in 8 multiplexes which located at Klang Valley of five and one multiplex in...

Words: 1796 - Pages: 8

Facebook : English Research Assignment

...Facebook english reae RESEARCH ASSIGNMENT THE STUNNING IMPACT OF FACEBOOK IN TODAYS SOCIAL ORDER INTRODUVTION: * ATTENTION GETTER: Did you know, the utilization of Facebook can make you feel terrible about yourself? * THESES: Sure, Facebook can make you feel like you have got all the friends in the world, but it also makes you feel lonely and left out, hinders your privacy, and in more regrettable case, can even lead to cyber bullying Body: * Facebook gives you a false sense of connection. 1. Not all the friends on your list are real. 2. Can lead to comparisons between your friends. You always feel the other person is more rich, has more friends and is way happier. * Privacy issues are one of the major issues faced by facebook users 1. Facebook encourages people to be more public about their personal lives 2. When inappropriate images are uploaded, they can affect your career when a background check is done. * Facebook and teenage cyberbullying 1. Fake profiles are created and abusive texts are sent and posted. 2. According to 2010 CBC news report around 42% of teenagers using facebook have been victims. CONCLUSION: * Memorable statement: Technology is clearly advancing humankind, curing sickness, taking us closer to space, improving our standards of living. – But it is also at the same time, deteriorating some aspects of all of this, and too much of reality is at risk of disappearing unless we can detach......

Words: 318 - Pages: 2

Research Database Assignment Form

...Research Database Assignment Form Describe briefly your topic of interest (15 possible points): The area that was chosen for this assignment is alarm fatigue. Alarm fatigue has been described as the process that occurs when nurses are desensitized due to too many alarms that are sounding constantly. Often times, there is no clinical indication for alarms that are sounding. This leads nurses to make the assumption that certain alarms are not important or the alarms very simply become background noise. Alarm fatigue has become nationally recognized and is the National Patient Safety Goal (NPSG) that was implemented by JCAHO for 2014.  Medical alarms that are supposed to make nurses aware that something is wrong with the patient and prevent sentinel events have resulted in sentinel events. Some research has been done to show that alarms that were ignored is what led to the sentinel event occurring.  I chose to research this area as I have witnessed this in the workplace over the years. I am reluctant to see what the outcomes of research on this subject will lead to and what protocol implementations will occur to meet the 2016 JCAHO deadline for this problem to be addressed. #1 Database (or collection) (30 possible points): Title of source: Association for the Advancement of Medical Instrumentation (AAMI) Location of source (URL): http://www.aami.org/htsi/alarms/library.html Owner or publisher: Healthcare Technology Safety Institute (HTSI) Describe (in......

Words: 1346 - Pages: 6

Research Methods Assignment

...International Security and Conflict Research Methods Assignment In the field of political and international relations studies, there are two broad types of research methods, which include and combine various research methods, based on its designs and core principles, and they are quantitative and qualitative research methods. Also, there is the third one, called experimental research method, which does not fit into qualitative and quantitative methods, but rather constitutes separate research design, although it might be based on qualitative and quantitative methods’ tools and theories. Quantitative research methods include many particular techniques and in general could be described as methods, which works with numbers and applies statistical analysis by using various mathematical operations with formulas and computer software. The usage of surveys and various types of databases are examples of quantitative methods. Scientists conduct surveys either in person, or through telephones, mail or internet to collect data concerning people’s opinion and attitudes about particular events in politics and international relations (Box-Steffensmeier, 2008, p. 9-10). Then, gathered information could be analyzed through the coding of data into numbers and application of tools of statistical analysis on them. Surveys allowed scientists to form databases from the collected data that made it possible to share databases with other scientists, especially with the emergence of internet, test...

Words: 1069 - Pages: 5

Research Assignment 7 (China)

...Academic Honesty PolicyIndividual Assignment Cover Page  Submitted to: |    DR. Constance Bates   | Submitted by: |   Anette Leiton   | Your Phone Number: |   305-490-4663  | Your e-mail: |  aleit001@fiu.edu    | Date of Submission: |  12/07/2014   | Title of Assignment: | Research Assignment # 6 ( China)  | CERTIFICATION OF AUTHORSHIP: I certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledged and disclosed in the paper. I have also cited any sources from which I used data, ideas or words; either quoted directly or paraphrased I also certify that this paper was prepared by me specifically for this course. Signature:Anette Leiton ___________________________________________________  | | Research Assignment 7 Brillianc e and Blunde rs in China ’s Supply Cha in (10 pts) Correct answers are based on course-assigned material (text and readings). This week the main topics are competition and supply chain. China is our focus country. We can start with the “Brilliance” part: from diamonds to Eastern Europe to South Africa. And now we have reshoring: back to the US. Last article is about how global supply chain is evolving. 1. China is now the biggest buyer of diamonds from Antwerp, importing $737 M in the first 3 Months of 2010. 2. The Belgian diamonds may have been cut in China to save money. 3. Perhaps surprisingly, China is building low-cost......

Words: 398 - Pages: 2

Research Assignment 4.1

...Homework The following homework is designed to cover the course objectives for this unit. Research Assignment 4.1 (Start): 1. Read the following scenario: In 2006, Microsoft posted a high-level summary of 235 patents that were allegedly violated by Free and Open Source Software (FOSS), including the Linux Kernel, Samba, OpenOffice.org, and others. Shortly after that, MS entered into a series of three contracts with Novell, one of which was a patent agreement that basically said, “Don’t sue us and we won’t sue you.” 2. Write a research paper summarizing answers to the following questions: * At the time of this scenario, some dire consequences were predicted for FOSS. How has FOSS fared since then? Linux is still active, and all of the products that are mentioned are still active. Ubuntu got a new release, and it still includes Samba and many other FOSS programs. * What impact have these events made since then, or will they make? At the time of the scenario, some dire consequences were predicted for FOSS. How has FOSS fared since then?       Foss has a lingering shadow cast by Microsoft claiming that the free and open software community has violated over 200 of their patents. One of the main consequences that could have come out of the lawsuit from Microsoft is   FOSS goers would no longer have access to free software.   Steve Ballmer CEO of Microsoft states in an interview with CNN, "FOSS patrons are going to have to play by the......

Words: 2884 - Pages: 12

Research Assignment

...Critiquing Research According to Webster (1985), to research is to search or investigate exhaustively. He also states that it is, “A careful or diligent search, studious inquiry aimed at the discovery and interpretation of facts.” The piece being critically reviewed is an article by Dr Ann Seed (1995), “Crossing the Boundaries – Experiences of neophyte nurses.” Readers sometimes assume that if a report was accepted for publication; the study must be sound (Polit & Beck 2004), unfortunately this is not always true. In order to determine the quality of the work, a critical review is needed. This work will use the Model for Critical Appraisal of Studies by B Roe (1993). The Introduction The introduction should acquaint readers with the research problem and context (Polit & Beck 2004). The introduction in Seeds research is informative but does not give actual reasons for the study and what expectations are. These are not established at all in the published piece; this is a problem for the reader as it leaves one guessing what Seed feels the importance is and what the intentions were, this should have been highlighted in the beginning. Literature review Seed does not use a literary review. Cormack (2000) states all articles should; as quoted in Polit & Beck (2004); Glaser and Strauss (1967) disagree, and state it is not correct to take on qualitative research having pre-examined earlier works. The author does not discuss reasons why she has not included a literary...

Words: 2373 - Pages: 10

Research Method Proposal Assignment

...Research Methods Assignment 1. The research question is whether exposure to sun and listening to familiar music affects a person’s mood. 2. The research hypothesis is that a person who is exposed to the sun and listens to familiar music would be in a better mood than a person not exposed to the sun and listens to unfamiliar music. 3. The population of interest for the research could theoretically include all group ages and their status in life. For the sake of the research, our sample would be students between ages 22-27 from 4 different universities (sample size of at least 60 people to get significant results). 4. We will divide our sample into 4 different groups Sun exposure + familiar music (group 1) | Sun exposure + non-familiar music (group 2) | No son exposure + familiar music (group 3) | No sun exposure + non-familiar music (group 4) | 5. The independent variables in this research are sun exposure and listening to familiar music. The dependent variable is the person’s mood. Sun exposure can be practically defined by determining a certain amount of time from which we can conclude that a person has been exposed to sun (i.e. 30 minutes). The definition for familiar music can be determined by a pilot before we begin our research on a population which is not part of the sample through which we can find out which songs are familiar (and conversely non-familiar). This way we can define practically and operationally which songs are familiar and......

Words: 672 - Pages: 3

Nr439 Research Database Assignment

...Research Database Assignment Form Type your answers to the following questions using complete sentences and correct grammar, spelling, and syntax. Click Save as and save the file with your last name and assignment, e.g., NR439_Research_Database_Smith. Submit to the Research Database basket in the Dropbox by 11:59 p.m. MT Sunday at the end of Week 4. The guidelines and grading rubric for this assignment may be found in Doc Sharing. Name: Describe briefly your topic of interest/research question (15 possible points): "Delirium is a serious disturbance in a person's mental abilities that results in a decreased awareness of one's environment and confused thinking" (The Mayo Clinic, 2012).  A common trend I have noticed at my facility is the increased frequency of hospital admissions from (SNF) Skilled nursing facilities.  The resident is sent to the hospital under a psychiatric hold due to an alteration in mental status with aggression.  During the RN-RN handoff report, the nurse will state that the resident sits in their room all day but will act out by refusing medications and striking at staff.  The resident does have some good moments, but has unpredictable or erratic behavior.  Once on our unit it is discovered that the patient has an active urinary tract infection coupled with dehydration and a lost hearing aid; all of which are treatable at the SNF.  "Treating delirium involves providing good basic care, such as ensuring patients are getting enough fluids and......

Words: 1637 - Pages: 7

It221-Research Assignment 1

...IT221 Research assignment 1 1. Why Windows Server 2008 comes in different versions? What is the significance of each version The reason Windows Server 2008 many different versions is to meet the needs of its customers. They provide many 7 different versions ranging from the basic entry level software for a small business to very large corporations that require immense computing power. The Microsoft website states “Each Windows Server 2008 R2 edition provides key functionality to support any sized business and IT challenge.” (Microsoft.com, 2010) Windows Server 2008 R2 (Foundation) – Is the basic starter server package. Windows Server 2008 R2 (Standard) – Is well built, with the average tools and flexibility. Windows Server 2008 R2 (Enterprise) – Specialized to meet the needs of very unique applications. Windows Server 2008 R2 (Datacenter) – Has a Very large capacity. Windows Server 2008 R2 (Web) – For internet applications only. Windows Server 2008 R2 (HPC Suite) – It is Customizable to get the most out of the system resources. Windows Server 2008 R2 (Itanium Based) – It is the most scalable. (Microsoft.com, 2010) 2. What are the new features or enhancements made to Windows Server 2008? How is Windows Server 2008 different from Windows Server 2003? Some of the new features according to Microsoft’s website are Powerfull Hardware and Scaling Features, Reduced Power Consumption, Hyper-V in Windows server 2008 R2 SP1, Expand Desktop Deployment......

Words: 493 - Pages: 2

Research Assignment

...Tone Rogers IT 221 Research Assignment Part 2 & 3 11/16/11 The purpose for Global Names Zone in Windows Server 2008 DNS is to aid retirement WINS. Keep in mind that it is not a replacement for WINS. Also it is not intended to support the single-labeled name resolution of records that are dynamically registered in WINS, records which typically are not managed by IT administrators according Microsoft wizard. According to Microsoft TechNet with RODC organizations can easily deploy domain controllers in locations. Which security can be guaranteed. It differs by having better security, faster login time, and more efficient access to resource on the network. Background loading is a new feature on Windows Server 2008. When this service starts, it creates one or more threads of execution to load the zones that are stored in Active Directory. After the Global Names zone is deployed, when a Windows Vista-based DNS client attempts to resolve a single-label name, it appends the primary DNS suffix to the single-label name and submits the name query request to its DNS server. IPv6, which has been covered in previous editions of this column, is a new suite of Internet standard protocols. IPv6 is designed to address many of the issues of the current version—IPv4—such as address depletion, security, auto configuration, and the need for extensibility. One difference in IPv6 is that its addresses are 128 bits long, while IPv4 addresses are only 32 bits. IPv6......

Words: 578 - Pages: 3

One Piece 320 The Ultimate Attack Force | Facebook | Ch.268 : 2016 New Year's Eve SP