Write annotated bibliography

Assignment Help Basic Computer Science
Reference no: EM132524374

Instructions

For this assignment, you must research an area of specialization using the NCU library. Begin by locating 10 articles that include some form of empirical research within the past 5 years. Look for articles with a clearly identified problem, some kind of testing or data collection, and results that are analyzed and presented. It's a good idea to collect articles of a similar subject matter.

Part 1

Using the 10 collected articles, write an annotated bibliography that examines the most current publications on a research topic. An annotated bibliography is a collection of annotations that provides a brief account of the available research on a given topic. While creating an annotation for a single article helps you think deeply about that article, creating an annotated bibliography with multiple annotations helps you gain a good perspective on what's currently being published about a research topic.

The annotations in your annotated bibliography should indicate you have selected a range of materials related to your topic and that you have critically read and thought about the content in each article. You absolutely must be able to identify the key points of each article. If you can't easily do this, then the article probably doesn't support your topic very well and should not be included in the research effort.

Annotated Bibliography Guidelines

When creating an annotated bibliography based on APA style, the annotated bibliography should consist of two elements: the citation in APA style and the annotation. The length of each annotation in the annotated bibliography should be approximately 1 to 3 paragraphs. Each annotation should include these items:

Summary: Summarize the article by indicating the main arguments, the purpose of the article, and the covered topics. Be sure the summary answers the following questions: If someone asked what this article is about, what would you say? What type of research was conducted? What were the results?

Assessment: After summarizing the article, you must evaluate the quality of the article. Is the author a credible source? Is the information reliable? Is the content biased or objective? Is the research valid? Were there any limitations?

Reflection: Once you've summarized and assessed the article, you need to add a statement relating the item to your research topic. Think about how the article fits into your research. How does the article support your research project? Has it changed how you think about your topic?

Formatting

The annotation should immediately follow the citation on the next line, without an additional paragraph return. Double spacing is used throughout the document. The entire annotation should be indented 1 inch from the left. Only the author's last name in the citation is flush left.

Part 2

For the second part of this assignment, schedule a 15-minute video conference with your instructor to discuss your research topic and your favorite article from your annotated bibliography. Be ready to answer questions about the selected article and related articles presented in your annotated bibliography. You should be able to compare and contrast your favorite article with other research in its field, improvements that could be made to the article, and research that has been built upon that research since it was published.

Reference no: EM132524374

Questions Cloud

Description of the organization and proposed risks : Brief description of the organization and proposed risks. Rationale if the same ERM models and/or techniques can be used in the organization to mitigate risks
Annotated bibliography-advocate for proactive research : How do the articles collectively advocate for proactive research, evaluation, and implementation of new technologies and ideas?
Difference between hardware and software version : Research on what is a forensic read/write blocker and what is the difference between a hardware and a software version?
Organizational behaviour : You have been hired as the manager of a casual dining restaurant. After a few days on the job, you notice that one server, Graham,
Write annotated bibliography : Write an annotated bibliography that examines the most current publications on a research topic.
E-commerce and mobile technology : If a company is experiencing decline due to competition suggest ways that company can use E-Commerce and Mobile Technologies to increase its visibility and sale
Management hierarchy-strategic-managerial and operational : Discuss how the three levels of management hierarchy: strategic, management, and operational relates to the mission of a business.
Concepts of data visualization : As an IT manager, discuss how you would use the materials and concepts of DATA VISUALIZATION communicating IT information to other department.
Project portfolio management : What is that project? Provide complete description. Consider using Project portfolio management. What was the scoop, deliverable, and results of the project?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine its angular velocity in radians per second

A clothes dryer is rotating at 500 revolutions per minute. Determine its angular velocity in radians per second.

  Identify the troublesome computer''s ip address and host

What commands would you use to identify the troublesome computer's ip address and host name?

  Operating systems using shellcode

1. How did the "Blaster Worm" attack Windows-32 operating systems using Shellcode? Explain its mechanism.

  What is the right command

1) List the filename of each file whose pathname starts with /etc/apt that contains at least one occurrence of the string apt.

  Types of relationships is important for database designers

Discuss why you think making the distinction between these types of relationships is important for database designers.

  What advice do you have for users of electronic media

What advice do you have for users of electronic media? Are there pitfalls to avoid?

  Hyper-v virtualized environment

You are an administrator for the Contoso Corporation and the Hyper-V virtualized environment has been running only for a couple of weeks.

  Steps to follow to get evidence in investigating files

Drive that you are investigating comprises several password-protected files and other files with headers which do not match extension. What procedures would you require to follow to retrieve evidence?

  Explain how it is relevant to network security

Pick a topic related to a computer crime and explain how it is relevant to network security

  Displays the factorial for every integer

Write an application that displays the factorial for every integer value from 1 to 10. A factorial of a number is the product of that number multiplied by each positive integer lower than it. For example, 4 factorial is 4 * 3 * 2 * 1, or 24.

  Enterprise systems and data management

Demonstrate communication skills to present a coordinated, coherent and independent exposition of knowledge and ideas in dealing with Enterprise Systems

  Meeting real business needs

Technological solutions, while meeting real business needs, do come at a cost: money, training, corporate culture, privacy, etc.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd