Some examples of practice or professional practice

Assignment Help Basic Computer Science
Reference no: EM133052114

Primary Task Response: Within the Discussion Board area, write 500-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

The Scholar-Practitioner and Planning for Dissertation Research

In the Research Prospectus Template, there are several references to "practice" and "professional practice." The document indicates that you must complete a dissertation study with a study problem that is "both practice-based and scholarship-supported." You have undoubtedly heard yourself referred to as a "scholar practitioner." These statements all point to the uniqueness of the "practitioner doctorate" as distinct from a "research doctorate." For this assignment, reflect upon the following questions in your primary post:

In your degree field and concentration area, what are some examples of "practice" or "professional practice" that will be addressed through your research study?

What do you understand to be some of the unique characteristics of your practitioner doctorate?

How would you describe someone who embodies the characteristics of the scholar-practitioner?

What thoughts do you have at this time about your journey from doctoral learner to scholar-practitioner? How will you need to be successful for your future dissertation research?

Reference no: EM133052114

Questions Cloud

Current and emerging technologies : We all had the unfortunate experience of seeing how computers can, at times, make life's journey about more difficult.
Different methods of destroying data : Research and explain the different methods of destroying data; provide examples of where they would be employed.
Impact the forensic investigation : Research the challenges of Blockchain technology and how it would impact the forensic investigation.
Adjacency List Representation : Discuss the advantages and disadvantages of adjacency list and adjacency matrix in relation to a weighted graph representation.
Some examples of practice or professional practice : In your degree field and concentration area, what are some examples of "practice" or "professional practice" that will be addressed through your research study?
Business process redesign : If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign
Create database model : Create a simple class diagram containing three classes: Vehicle, Car, and Truck. Provide two attributes for each of these three classes.
Principal ingredients of public-key cryptosystem : List three approaches to message authentication. What are the principal ingredients of a public-key cryptosystem? What is a digital signature?
Industry experts believe blockchain is technology : Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Confidence interval of the variance and standard deviation

Find the 98% confidence interval of the variance and standard deviation Assume the variable is normally distributed. round your answer to one decimal place.

  IT Project Management

What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs?

  Compare this with existing distance-vector router learning

Assume that routers only receive new-network notices from other routers, and that the originating routers receive their IP network information via configuration

  Relationship between marginal cost-marginal revenue

What is the relationship between marginal cost, marginal revenue, price, and average cost for firms in competitive and oligopolistic industries?

  Compare and contrast the four levels of protection

Compare and contrast the four levels of protection used during spill response and cleanup activities. In your discussion, provide an example of a spill or cleanup scenario for each level

  Illustrating the worst case scenario

Identify the URLs for 2 videos that you think do a particularly good job of illustrating the worst case scenario

  How frequently should costs be updated

Consider a situation in which several tasks may be for one to two years rather than the 200 hours normally used in the work-package level of the WBS.

  Static methods for processing an array of marks

For this task you will create a class containing a number of static methods for processing an array of marks, which are scores in a test. Each mark is an integer in the range 0 to 100 inclusive. On the Interact site for this subject, you will be p..

  Baseline security requirements

What are baseline security requirements that should be applied to the design and implementation of applications, databases, systems, network infrastructure,

  Applications she utilized before a shutdown

These were the last applications she utilized before a shutdown These applications are pinned to the task bar

  How will the scope be identified

Implement a black box, external database security test that responds to the following:

  Normally perform rollout and support functions

Identify the job title for those who normally perform rollout and support functions for the IDS desktop solution.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd