Describe why each site you used is credible and accurate

Assignment Help Computer Engineering
Reference no: EM131479917

ASSIGNMENT

Overview

All too often, people rush to find a solution without fully defining or understanding the problem in the first place.

In this first challenge, you will select and define a problem that is relevant to you. Then you will use the power of the Internet to research the problem and gain a full understanding of all factors involved in it. You may use the list of sample problems to get started or select from.

Submit this assignment as a Microsoft Word document. [By this point, you should have already activated your Microsoft Office 365 account and should be able to access Microsoft Word on your Strayer laptop. If you need help using Microsoft Word, please contact your instructor.]

NOTE: This assignment will be run automatically through SafeAssign plagiarism detection software and an originality report will be sent to your instructor.

Instructions:

Write a one to two page overview of the problem you plan to work on for the next four challenges. Your overview should tell the story of why this problem is important and relevant to you. Be sure to include the following information.

1. Part 1: Define the problem.

a. State your specific problem. Review the "Sample Problems" document for ideas or select a problem that you have seen in your job, life, surroundings or the media that you want to address.

b. Explain why you chose your selected problem, including why it is relevant to you.

2. Part 2: Research. Use the Internet to research the problem and list five valid online resources that helped you learn more about your chosen problem. Try to pick a range of sites from government to business to academic.

a. List each of your resources and include the name of the website and the URL (web address).

b. In two or three sentences, explain why each site was useful as well as credible. Did it help you understand the importance of the issue? Did it help you see that others are impacted? Did it confirm that this is a problem that others face?

c. Explain why each site you used is credible and accurate. NOTE: If you aren't sure how to do this, read the Learn content for guidance and/or discuss with your instructor.

3. Part 3: Include non-credible resources. Share two sites that were not credible and why you decided not to use them.

a. List each of the resources you decided not to include (including the name of the website and the URL (web address).)

b. In two or three sentences, explain why each site was not credible/accurate/useful. What was wrong with the site? Why did you decide this resource should not be used?

4. Part 4: Understand the problem. After conducting research, add additional details that will help fully explain the problem.

a. Provide details on what is or might be causing the problem.
b. Describe how it is impacting/or could be impacting you.
c. Does this problem in any way create other problems?
d. Based on your research, how does this impact others?

Reference no: EM131479917

Questions Cloud

How many books are sold each month by the publisher : How many books are sold each month by the publisher? This is important because quantity discounts are available from the publisher.
How does that employer maintain compliance with that statute : Apply that law to a business situation created by that employer. How does (or did) that employer maintain compliance with that statute?
How much should it borrow in period one : Assume that a country produces an output Q of 50 every year. The world interest rate is 10%. Consumption C is 50 every year, and I = G = 0.
How much should it borrow in period one : Assume that a country produces an output Q of 50 every year. The world interest rate is 10%. Consumption C is 50 every year, and I = G = 0.
Describe why each site you used is credible and accurate : why each site you used is credible and accurate. NOTE: If you aren't sure how to do this, read the Learn content for guidance or discuss with your instructor.
What are common characteristics your chosen religion shares : What are common characteristics your chosen religion shares with the others - How is this religion responding to challenges
Does diversification eliminate consumption risk in each case : Consider a world of two countries: Highland (H) and Lowland (L). Each country has an average output of 9 and desires to smooth consumption.
International labor rights : Assignment: International Labor Rights - Discuss whether or not workers are exploited in manufacturing of US imports.
Discuss the fiscal policy or monetary policy : In 2001, President George W. Bush and Federal Reserve Chairman Alan Greenspan were both concerned about a sluggish U.S. economy. They also were concerned.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd