Friday, April 23, 2021

I search paper example

I search paper example

i search paper example

sample_i-search_paper_revised ‎‎ (2)‎‎.doc This sample paper is the property of the University of Michigan, and republished here for educational purposes. © The Regents of the University of  · Search paper is usually less formal than a traditional research paper; it tells the story of the writer’s personal search for information, as well as what the writer learned about the topic. Many I-Search papers use the structure illustrated in the framework below. Print this framework and use it as a guide when you write your own I-Search paper SAMPLE I-SEARCH PAPER LIVING WITH ASTHMA Anne Smith What I Already Knew / What I Wanted to Know “Well, Annie, it looks like you have asthma,” our family physician informed me. I could not believe what I was hearing. I thought that I had been suffering from a very stubborn cold. Questions started going through my head as I listened to Dr. Davis explain my condition



Research Paper Example - Outline and Free Samples



In this essay, this use of first-person point of view continues. In the book, Macrorie criticized traditional research papers that students were often asked to i search paper example in i search paper example. On pageBergmann writes: Although an I-Search assignment calls for a personal narrative, i search paper example, like most academic writing it is written to communicate to a particular audience, not for the writer alone.


I search paper example purpose is to help you discover and communicate the personal and professional significance of your research to a particular audience.


Sample Personal Research Narrative Essays: On pages of Bergmann's chapter is a sample personal research narrative essay. Another sample I-Search paper can be seen by clicking i search paper example, although this example has fewer sources and fewer scholarly sources than this assignment calls for. Moving from the Reflective Annotated Bibliography to the Personal Research Narrative: For writing assignment 2, you wrote a reflective annotated bibliography on a topic related to technology.


In that assignment, for each of the articles you found, you wrote not only a précis of the article but also some vocabulary, reflection, and quotes from the article. Hopefully through that assignment, you developed an interest in a focused aspect of your topic. For writing assignment 2, you may have found articles on MOOCs in general. Perhaps, as a result of your findings, you have now done more research and have focused on MOOCs for a particular field of study e.


You then found more articles related to not only MOOCs but also MOOCs for learning computer programming or MOOCs for learning creative writing. For writing assignment 2, you may have found articles on cybersecurity as a broad topic. Perhaps, as a result of your findings, you have now done more research and have focused on cybersecurity and mobile devices.


You then found more articles related to not only cybersecurity as a general topic but specifically on cybersecurity and mobile devices. For writing assignment 2, you may have found articles on technology in the health care industry. Perhaps, as a result of your findings, you have now done more research and have focused on the cloud computing in the health care industry. You then found more articles specifically on this topic.


It is this research experience on which you will write the personal research narrative. Examining the Sample Personal Research Narrative in Bergmann's Chapter: Note how, i search paper example, in the sample student personal research narrative on pagethe student begins by providing the background that gave him interest in the topic.


He then discusses his first steps in researching the topic. Describe to the reader what you thought when you started researching, what you already knew about the subject, what interested you in the subject, etc.


Then describe your various steps, i search paper example on what surprised you, what ideas did not seem valid to you, what research articles you may have questioned, i search paper example, etc. You might consider your response essay, which was the first essay you wrote for this class, i search paper example.


The personal research narrative is, i search paper example, in some ways, an expanded response essay. In the personal research narrative, you may be responding to several authors while providing a narrative of your thought process and learning process throughout your research journey. Requirements: Your paper should be words. It should include at least ten sources, six of which should be scholarly. The sources are to be cited and listed in APA format, i search paper example.


Additional resources: In our class, in the e-reserves section, we have a chapter from the book by Graff, G. The chapter mentions various techniques to apply in stating what an author said and your response to the author. As was recommended for the response essay, it is recommended that you read through that chapter so i search paper example you might apply these techniques to this essay. Essay Zoo. ORDER NOW! Сontact Us. Sign In. Forgot password?


Not register? Register Now! Our Catalog. English U. Total cost:. I-Search Name: Subject: Date of submission I-Search Our society of scholars and practitioners acknowledges that the recent past has witnessed several cases of cyber insecurity. I agree with Rader, Wash and Brooks who define cyber insecurity as cases of attacks on computers or computer systems. I believe the latest known event of cyber insecurity occurred in December Specifically, Sony Pictures Entertainment experienced a cyber-attack that resulted in devastating losses because I was surprised to learn that hackers pilfered and erased their data.


The cyber-attack on the Estonian government also attracted my attention to the subject because Herzog reveals many departments in the country's government experienced a denial of service attack. As a result, I acknowledge that cyber insecurity is not only an interesting subject, but also a subject that requires attention from technologists. be taken in order to curb cyber insecurity. I believe cyber insecurity is possible because of existing vulnerabilities.


To be specific, I believe that Reddy and Reddy are justified to mention that the main hacking tricks include using Trojan programs, fake websites, spyware, spoofing, pharming, and internet public records. For example, I believe that hackers use Trojan programs together with instant messaging applications to promote cyber insecurity, i search paper example. This owes to the reality that Gercke argues that hackers use Trojan programs to plant backdoors in computers and computer systems without notifying the users of the computers or computer system.


It also came to my attention that spoofing enables cyber criminals to gain unauthorized access to computers. The argument is highlighted by the fact that hackers modify addresses from trusted websites and use such i search paper example to communicate with other computers as though the their computers have trusted addresses.


Gercke also increased my knowledge by highlighting that spyware is used by hackers for their activities. In fact, the author captured my attention by arguing that spyware can remove and gather information from a computer system without the knowledge of the user.


Consequently, I believe hackers use spyware to monitor their victim's computers and obtain useful information about their victims' browsing activities. They could then divert the victims' adverts and advertise their own links in order to earn money.


The same author also acknowledges that pharming also enables cyber criminals to direct traffic to phony websites. Therefore, I deduced that hackers exploit vulnerabilities in I search paper example servers or change hosts file on their victims' computer in order to apply the attacking technique.


I made deduction because Zember and McGibbon explain the relationship between the DNS server, the host file, i search paper example, and website traffic. After reviewing a publication by Bogdanoski and Petreski n. dI was able to acknowledge that fake websites also promote cyber insecurity.


As evidence, I learnt that cyber criminals create fake websites and lure innocent internet users into their sites using links and advertisements. Such websites contain counterfeit business services or goods that gain the attention of most internet users. Consequently, the users can fill in their bank details into the website where they are stolen by hackers. The results of my study on cyber insecurity also reveal that cyber criminals use denial of service attacks to promote cyber insecurity.


I made the conclusion after agreeing with Podhorecwho argues that, hackers could spam a computer system with constant messages. It follows that such an action prevents users i search paper example the system from accessing or using the system.


I acknowledge that cyber insecurity is a problem to global society because of the large number of non-expert tec Do you need a custom essay? Order right now:. YOU MAY ALSO LIKE Smoking Essays Manifest destiny Essays Trifles Essays Vietnam war Essays Ethics Essays Globalization Essays Kite runner Essays Drugs Essays Artificial intelligence Essays George washington Essays The crucible Essays Body image Essays Terrorism Essays Autism Essays Edgar allan poe Essays Mahatma gandhi Essays.


Other Topics:. Educational Tool Description: The respondents would be educated about compassion fatigue and nurse burnout and how nurses are affected by this problem Description: Define professional socialization.


Using the criteria for a profession described in the assigned readings, discuss three 3 criteria of the nursing profession which support professional socialization Description: LinX Computation Imaging Ltd is company founded in the yearby Ziv Attar and Tovchigrechko Order Now. org We are an established and reputable company, with over 10 years in the essay business.


Terms of Service Privacy Policy Buy APA Research Paper Buy English Essay Buy an Economics Paper Buy Admission Essay Online.




I search paper video

, time: 5:25





I-Search Essay, Essay Example


i search paper example

SAMPLE SIBERIAN HUSKY I-SEARCH PAPER Example 1 Kaitlin Example Teacher’s Name English 9,10,11, or 12 13 March Siberian Huskies What I Wanted to Know When I first began my search for this I­Search, I chose a question that I really wanted to know the answer to SAMPLE I-SEARCH PAPER. LIVING WITH ASTHMA. What I Already Knew / What I Wanted to Know. “Well, Annie, it looks like you have asthma,” our family physician informed me. I could not believe what I was hearing. I thought that I had been suffering from a very stubborn cold  · On pages of Bergmann's chapter is a sample personal research narrative essay. Another sample I-Search paper can be seen by clicking here, although this example has fewer sources and fewer scholarly sources than this assignment calls for. Moving from the Reflective Annotated Bibliography to the Personal Research Narrative

No comments:

Post a Comment