Reference no: EM13727025
In order to successfully complete this assignment, the student must:
1. Select one article from the list below and read carefully and completely.
2. Write a one-page, single-spaced review of the article.
3. The review should have four elements:
A. What is the author's primary argument/thesis?
B. What evidence of support does the author give to defend and/or prove the argument/thesis?
C. In your view, what are the strengths of the article?
D. In your view, what are the weaknesses of the article?
4. The review should meet the following format guidelines:
A. It should be typed (single-space)
B. Students should save the final document as a .rtf document (rich text format).
C. The margins should be set at one inch (top, bottom, left, right).
D. The font style should be Times New Roman.
E. The font size should be 12 point.
F. Type your name in the upper left hand corner of the paper.
5. Grades for this assignment will be based on the following:
A. The extent to which you successfully identify the author's primary argument (25 points possible).
B. The extent to which you identify and summarize the author's supporting evidence(25 points possible).
C. The quality of your evaluation of the strengths of the article (25 points possible).
D. The quality of your evaluation of the weaknesses of the article (25 points possible).
E. Failure to follow the format guidelines will result in substantial loss of points.
F. Poor spelling and grammar/punctuation will also result in a loss of points.
Warning: this is not a collaborative activity. Though several students may choose to review the same article, they should refrain from working together on their written reviews. In cases where two students have turned in the same review or reviews that have a high degree of similarity as to indicate collaboration, said students will be subject to sanctions. To avoid this, simply do your own work in your own words.
7. Recommended due date: Week Seven.
8. Academic honesty: when submitting written work, students are on their honor. Any student found to have engaged in plagiarism will be subject to disciplinary action per college policy. Students should review the College's statement on plagiarism on the course menu.
Identify the contributing factors that caused the disaster
: Research an article on one of the focusing events that occurred between the years of 1927-1950 (The Great Mississippi Flood of 1927, 1930s Dust Bowl, or Texas City Explosion). Respond to the following questions: Identify the contributing factors th..
|
How to uphold army ethic and army values and reinforce trust
: What it means to be a professional. How to uphold the Army Ethic and Army Values and reinforce Trust. How to inspire Stewardship of the Army Profession and enhancing Espirit de Corps.
|
Developing a brief summary of endogenous
: Developing a brief summary of endogenous and exogenous growth theories and analyzing the impact of government policy on the long-term growth rate of an economy.
|
Case study on research genetics
: ABC Institute of Research has sensitive information that needs to be protected from its rivals. The Institute has collaborated with XYZ Inc. to research genetics. The information must be kept top secret at any cost.
|
What is the author primary argument or thesis
: What is the author's primary argument/thesis? What evidence of support does the author give to defend and/or prove the argument/thesis?
|
Explain what are your company''s likely weaknesses
: What are your company's likely weaknesses? Is the competition in your industry segment entrenched? Is your own management team inexperienced? Will it be challenging to actually produce your product and maintain quality?
|
What risks does ge face in its foreign operations
: What advantages does General Electric seek to attain from its international business activities and what actions is it taking to gain these advantages from its international activities?
|
Prepare a descriptive matrix describing the major competitor
: Prepare a descriptive matrix describing the major competitors to the product/service you have presented. Consider direct, indirect, substitutes, and future competitors
|
Case study on computer security
: Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer.
|