Write a paper on a particular information technolog

Assignment Help Management Information Sys
Reference no: EM131739061

Assignment  - Word Research Paper

Word Processing

You are to write an information technology related research paper with a minimum of 1000 words using Microsoft Word 2016. Any topic that you would study in this course would be appropriate for this paper.

For instance, you may wish to write an informative paper on a particular information technology, or you may wish to critique a particular technology, or you may wish to compare and contrast similar technologies. The only mandatory requirement for the topic is that it must be related to Information Technology.

Basic Requirements:

All of the following requirements must be met in order to receive a grade on the paper. If the paper does not satisfy any of the following, it will receive a grade of zero.

The paper must be a minimum of 1000 words in content as displayed by Microsoft Word (when highlighting the content areas). The title page, table of contents, bibliography, and plagiarism statement are not considered part of the word count! It's better to play this on the safe side, and write more rather than trying to minimally meet this requirement.

The topic of the paper must be related to information technology.

The primary source of the paper must come from one of the required sites.

The document submitted must be in Word 2016 format.

The file must be submitted on Blackboard on time. No late submissions will be accepted.

Part 1. Research

Begin by finding an interesting technology-related article from one of the seven news resources listed below to serve as the topic for your paper.

This will act as your "primary source" for your paper. The article you choose should have been written this year; that is, the publication year should be 2017. Make note of the article's title, publication, publication date, author, and URL to use in your citations.
Any primary source that does not have an author or publication date is not acceptable.

Once your primary source and the topic for your paper has been established, use the resources available from FSU Libraries to find at least four additional sources of information on your topic:

One source must be another web site published by an authority on the topic (you may use the above seven sites, for instance, to find this authority). This source need not come from the FSU library database.

There must be at least two recent database articles (published within the last year) from databases provided at the FSU Library's database index.

At least one book published in 2011 or later (we will only look at the year of publication) - you can use the search feature at the top of the Libraries page to help find appropriate titles. This can be a hard copy book or an eBook.

Note that you may need to use different, but related, keywords to find all five resources. For example, you could find thousands of web pages with a Google search on keywords "ransomware", but the same search at FSU Libraries might turn up nothing. In that case, you might try related keywords like "cryptocurrency ransom", or something more general like "impact of computer crime on society" in order to find a book related to your topic.

Learn as much as you can about your topic from the sources. You needn't quote directly from your resources (except where instructed in part 2), although if you do, you will need to use quotation marks for a short quote, or a block quotation for a larger one.

There are several citation styles used for various types of research. For this paper, you are required to use MLA style.

Paper Formatting Instructions: Follow all of the instructions in Part 2 to format the paper you write for this assignment.

Part 2. Word Processing

Open a new document in Word 2016. You should choose the "Blank Document" template for your paper.

Name the file using the format of "YOURID.docx", where YOURID is your FSU identifier.

Reference no: EM131739061

Questions Cloud

Mutually assured destruction and ballistic missile defense : Mutually Assured Destruction and Ballistic Missile Defense are examples
What should done before measuring an unknown ph of solution : What should be done before measuring an unknown pH of a solution using a pH meter. What is the first thing to do after putting a weighing boat on the balance
What crimes were committed in the given problem : Larceny Joe, a purchasing agent of ABC Company, entered into a contract to purchase software on behalf of ABC from a software company represented by Harry.
Define globalization is major force in the world today : Globalization is major force in the world today and it is largely believed to be a force of integration and disintegration
Write a paper on a particular information technolog : Write an informative paper on a particular information technology, or you may wish to critique a particular technology.
Explain one or more agile project management approaches : Briefly explain one or more Agile project management approaches. What types would be more appropriate for Agile approaches.
Distinguish the imf and the world bank in both their mission : Distinguish the IMF and the World Bank in both their mission and the events in which they are involved
Potential biggest benefit for microsoft : Describe the cloud’s potential biggest benefit for Microsoft and the cloud’s biggest threat to Microsoft.
Briefly describe the rico act : Racketeer Influenced and Corrupt Organizations Act (RICO) Don, a p . romoter of prize fights, formed a corporation. Don was the sole shareholder, sole director.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How could erp vendors make it easier for customers

Much has been written in the news media about ERP systems, both in print and online. Using library resources or the Internet, report on one company's positive experience with implementing an ERP system, and on another company's disappointing exper..

  In which poor cybersecurity policy can disrupt business

Analyze the overall manner in which poor cybersecurity policy can disrupt business continuity. Provide at least two examples of such disruption to support your response.

  Develop procedures for supporting the new system

Develop procedures for supporting the new system and its users and for applying system patches. Specify procedures that will be needed for securing data assets.

  Until recently hur jae-hoon could end debate with junior

until recently hur jae-hoon could end debate with junior staff members just by declaring that the discussion was over.

  What societal changes are resulting from social networks

Customer security is a serious concern for e-commerce. An e-commerce system needs to ensure that customers are indeed who they say they are, their customer information is accurate and secure, and only authorized individuals have access to the cust..

  Describe the cisco campus architecture

Describe the Cisco Campus architecture

  Explain material planning push pull system

Material Planning Push Pull System - What issues about "pull" versus "push" assumptions are the author's arguments based on? Provide examples to support your response.

  Does this perspective make sense to you

The research of Nan and Harter (2009) suggests that there is a "beneficial range of budget pressure" (p. 636) resulting in improved software development efficiency. Does this perspective make sense to you? How might this concept be realized within..

  Developing engaging interview questions

Developing engaging interview questions is the significant to a positive employment interview. Questions can be categorized in to two areas.

  What is the purpose of the tool

What is the purpose of the tool?What features does the tool have?What industries benefit most from this type of tool?What similar tools are available from competing BI solution provides?

  Planning the major elements of an e-commerce web site

E-commerce involves significantly more than just the presentation of products in a shopping cart.

  Explain competency-base and traditional approach to training

Describe why the competencies of the past are not compatible with the competencies of the future for the global organization. Explain the competency-based and the traditional approach to training.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd