drama analysis 10

ASSIGNMENT: Write a short essay (750 words) using one of the drama analysis prompts below. For this paper assignment, we will continue to work with scholarly sources in order to use what specialists in the genre of drama have to say and to build upon their work to frame our own views in our our own academic writing. You have learned about how to effectively read, quote, and respond to sources by furthering the conversation — by either agreeing with a difference, by disagreeing with reasons, or agreeing and disagreeing simultaneously. Now it is time to demonstrate what you’ve learned by critically reading scholarly sources, effectively framing quotations from those sources, and presenting your original viewpoint by using one of the three ways to respond. For this assignment, you should frame and respond to at least one quotation from the scholarly source you used last week in the Week 4 Discussion Activity (it doesn’t have to be the quote you wrote about in the Week 4 DB activity), and search the Library databases for one additional scholarly source that addresses a specific topic from the prompts below.

Prompt #1: Take just a single line or sentence from either Susan Glaspell’s Trifles or Sophocles’ Oedipus the King that you think stands out for some reason as greatly important. Perhaps it states a theme, reveals a character, or serves as a crisis (turning point). Write a critical analysis demonstrating its importance — how it functions, why it is necessary. Essay Outline: The introduction should identify the play under consideration, its author, and any necessary background information that is significantly relevant to the main focus of your essay. The introduction should conclude with your original idea (your thesis) presented as a response to an effectively framed quotation from one of the scholarly sources you found in the Library databases (use the templates for introducing, explaining, and framing quotations in Graff/Birkenstein’s Chapter Three — pp. 42-50). Body paragraphs should support and develop your thesis with specific references to the play, bolstered by effective responses to your scholarly articles. Use the templates in Graff/Birkensteinfor introducing, explaining, and framing a quotation (Chapter Three — pp. 42-50) and the templates for responding to sources in Graff/Birkenstein’s Chapter Four — pp. 55-66. Be sure to clarify what you “say” from what your source “says” by using the templates from Graff/Birkenstein’s Chapter Five (“Distinguishing What You Say from What They Say” — pp. 68-75). Your conclusion should place your original argument within a larger, meaningful context for your reader.

Prompt #2: Identify two or three meaningful objects in either Susan Glaspell’s Trifles or Sophocles’ Oedipus the King that you think stand out for some reason as greatly important. Try to relate the singular importance of each object to the play as a whole. Essay Outline: The introduction should identify the play under consideration, its author, and any necessary background information that is significantly relevant to the main focus of your essay. The introduction should conclude with your original idea (your thesis) presented as a response to an effectively framed quotation from one of the scholarly sources you found in the Library databases (use the templates for introducing, explaining, and framing quotations in Graff/Birkenstein’s Chapter Three — pp. 42-50). Body paragraphs should support and develop your thesis with specific references to the play, bolstered by effective responses to your scholarly articles. Use the templates in Graff/Birkenstein for introducing, explaining, and framing a quotation (Chapter Three — pp. 42-50) and the templates for responding to sources in Graff/Birkenstein’s Chapter Four — pp. 55-66. Be sure to clarify what you “say” from what your source “says” by using the templates from Graff/Birkenstein’s Chapter Five (“Distinguishing What You Say from What They Say” — pp. 68-75). Your conclusion should place your original argument within a larger, meaningful context for your reader.

SOURCE CITATION: Your essay must properly cite either Trifles or Oedipus the King and the two required scholarly sources. Correct source usage consists of two elements: (1) brief in-text citations for any idea or passage that is not your original idea; and (2) a properly formatted list of all Works Cited at the end of the essay. Your Writers Reference textbook contains sections on evaluating and using sources and avoiding plagiarism. Email me with any questions about allowable use.

FORMAT: The essay must conform to MLA standards: double-space, twelve-point font (Times New Roman or Courier), and one-inch margins on all pages. Your Writers Reference textbook contains sections on MLA format instructions and models.

EVALUATION:

15% Introduction: You effectively identify the author and play under consideration and provide brief and relevant background information if necessary.

15% Thesis: You state your main point (or argument) in 1-2 sentences. The thesis is the culmination of your introduction.

30% Organization. Your essay should follow that of a typical literary critique: Since your focus must be on critical analysis, your essay must contain well-structured supporting paragraphs that contain a topic sentence, quotes from the primary text (the play you are writing about) and secondary sources (the two scholarly articles you are using to respond to), an explanation/discussion of the significance of the quotes you use in relation to your thesis, and a concluding sentence or two that situates the entire paragraph in relation to the thesis. Your thesis will focus on some kind of critical analysis of the primary text, so your supporting paragraphs should be organized around each of the quotes you use, explaining the significance of the quotes and why (or how) they illustrate your main point, but you also need to make sure that your paragraphs contain strong transitions and at least six (or more) sentences.

10% Conclusion: Regardless of the argument you make, you want a conclusion that avoids summarizing what you’ve just said, and please avoid writing, “In conclusion.…” Your aim in a conclusion is to place the discussion in a larger context. For example, how might your critical analysis of a single line (or sentence) relate to other important single lines in the work? How might your thesis about important objects be applied to other less important objects found in the text?

15% Grammar and mechanics: Your paper avoids basic grammar mistakes, such as dropped apostrophes in possessives, subject/verb disagreement, arbitrary tense switches, etc. The paper demonstrates a commitment to proofreading by avoiding easy-to-catch typos and word mistakes (effect for affect, for example). The paper adheres to MLA formatting style for in-text citations. Your paper uses the active voice rather than the passive voice and demonstrates an understanding of how to use active verbs (no “to be” verbs) and concise, concrete language.

15% Presentation: Your paper meets the minimum length criteria of 750 words, is typed with a title and your name on it. Your paper must be fully double-spaced throughout to allow room for my comments and editing or the paper will be returned ungraded.

step 1 case scenario read the following case first then proceed to the next steps you work at a research lab and are 1 of the 6 researchers philip a well known and highly respected scientist in the lab has offered a theory that the cholesterol in 1

apa format, in cite qoutes and reference page.

Step 1: Case Scenario

Read the following case first; then proceed to the next steps.

You work at a research lab and are 1 of the 6 researchers. Philip, a well-known and highly respected scientist in the lab has offered a theory that the cholesterol in eggs can have serious negative health effects on children. He cites 5 case studies done in different regions of the country over a two-year period and all studies suggest that negative health issues can be linked to egg consumption. His presentation is very compelling and the research lab has been offered significant amounts of government grant money to promote the findings of the cholesterol study.

The lab goes forward with the cholesterol research and assigns the other 5 researchers the task of furthering the study. After one year of research and much economic success for everyone at the research lab, a meeting is convened to assess the progress of the program. At this meeting, Rose, a second scientist with a long history of field research experience offers the theory that while there could be a relational effect of the cholesterol in eggs to children, she argues that there is no causal relationship and these findings should be published. The group is stunned as no one has ever challenged Philip’s work and his previous studies on other areas have all been accepted by the scientific community. Rose is excoriated by the group and is told by the research lab that Philip’s reputation speaks for itself and her study is not credible and will not be pursued. Two years later, a rival lab proves Rose’s theory and Philp’s research lab loses all government funding.

Step 2: Reflection Part

Ask yourself:

  • How can it be that a group of intelligent, experienced researchers would not explore the possibility of another theory in their study?
  • What is the importance of dissenting opinions?
  • Do I listen to and fully understand the point of view of the person expressing a dissenting opinion, especially if that person is the sole voice in the room.
  • Do I arrive at my opinion without sufficient critical analysis?
  • Am I basing my position on assumptions that I presume to be true, but that perhaps are not sufficiently tested or researched?

After you have thought through your position on this scenario, apply your thinking to this week’s philosophers and complete Step 3 – the writing part of this assignment.

Step 3: Writing Part

In 2-3 pages, explain how Locke and Rousseau might respond to this case of the research lab and groupthink if they were confronted with this situation. How might they explain majority rule and the social contract to illustrate their philosophy in dealing with groupthink? Support your analysis with quotes or paraphrases from the philosophers. Use APA format and citation when writing your assignment.

Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.

Save your assignment as a Microsoft Word document. (Mac users, please remember to append the “.docx” extension to the filename.) The name of the file should be your first initial and last name, followed by an underscore and the name of the assignment, and an underscore and the date. An example is shown below:

Jstudent_exampleproblem_101504

Need Help? Click here for complete drop box instructions.

women should earn equal pay

Argument paper should be 6-7 pages long, including cover sheet and reference page.

The topic/thesis is: “Women should earn equal pay” or “Why women should earn equal pay” (something along those lines)

The argument paper should begin with a one- to three-sentence statement of the main thesis. Writing a thesis involves taking a position concerning an issue. It clearly states the author’s perception, but uses other people’s work to articulate that perception. Your paper should present your beliefs or conclusions related to the topic, without you directly stating your personal beliefs (e.g., Do not say “I think or I believe. Instead, say “In his book, John Doe states….”). The paper should also include material from other sources.

A Crash Course on Research (Argument) Papers

  • Select an issue or dilemma of interest.
  • Review the pertinent literature.
  • Decide on your perception; take a stance.
  • Articulate your perception in a thesis statement.
  • Summarize the issues; demonstrate an understanding of the controversy.
  • Defend/argue in favor of your perception using all resources available.
  • Finish with a strong summary statement that reinforces your thesis.

i want a discussion post in apa format as per the instructions below

Discussion: Security Breach Evaluation

Learning Objectives and Outcomes

  • Analyze the given case study on security breach.
  • Recommend controls to avoid an enterprise security breach.

Assignment Requirements

Read the text sheet named “Local Breach of Sensitive Online Data” and address the following:

Using what you have learned about security breaches, describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach mentioned in the text sheet.

Required Resources

  • Text sheet: Local Breach of Sensitive Online Data (ts_localbreach)

Self-Assessment Checklist

Use the following checklist to support your work on the assignment:

  • I have engaged in a discussion of the assigned topics with at least two of my peers.
  • I have raised questions and solicited peer and instructor input on the topics discussed.
  • I have articulated my position clearly and logically.
  • I have supported my argument with data and factual information.
  • I have provided relevant citations and references to support my position on the issue discussed.
  • I have compared and contrasted my position with the perspectives offered by my peers and highlighted the critical similarities and differences.
  • I have solicited peer and instructor feedback on my arguments and propositions.
  • I have offered a substantive and critical evaluation of my peer’s perspective on the issues that is opposite of mine, and supported my critical review with data and information.
  • I have followed the submission requirements.

write 600 words reflection using the following readings in the attachment as well as read the requirements in the attched ques

Minimum 600 words “Reflection on Social Construction and Identities

help me answer 2


  1. Note. This is the first step to an ongoing project with additional sections due in Weeks Three and Five. Review the requirements of the other sections due in Weeks Three and Five before selecting your explorative mission for this assignment.

    Navigate to the National Oceanic and Atmospheric Administration (NOAA) site at
    http://oceanexplorer.noaa.gov/explorations/explorations.html. You will find explorations for this current year displayed and can access explorations from past years. Explorations completed in past years should provide more information than current years.

    Choose an explorative mission that took place at a marine sanctuary or an ecological preserve. Choose an exploration taking place in a United States National Marine Sanctuary. Search the internet if you need more information on national marine sanctuaries.

    Review the chosen exploration.

    Develop a 10- to 15-slide Microsoft® PowerPoint® presentation.

    Address the following in your presentation:

    • List the basic categories of Earth’s chemical composition and physical properties, with an emphasis on how these factors relate to the ocean.
    • Describe at least one of the early research theories about the origins of life on Earth.
    • List the modern tools of research used in your chosen ocean exploration.
    • List the goals and objectives of the mission and how it relates to the National Ocean Service’s overarching mission.
    • List the areas to be explored by the mission.
    • What challenges did the team encounter?
    • Explain how the data was collected and what modern technologies were used.
    • Explain whether the explorative mission was successful in its findings.
    • How can the information gathered from the mission benefit the field of oceanography?

    List major points in the slides. Include detailed explanations in the speaker notes section that correlate to each point.

    Include videos, audio, photos, diagrams, or graphs as appropriate.






week 2 homework 2

  1. You have been asked by the CIO to explain the Pros and Cons of placement of IT Security within the IT Department or to place IT Security outside the IT Department within the organization. (Do not consider outsourcing IT Security in this situation).
    1. List the Pros and Cons for the CIO
    2. What would you recommend to the CIO
  2. The text discusses the impossibility of computing annualized rates of occurrence. Your Comptroller wants to see data on Return on Investment before funding any security project. Discuss the alternatives or other approaches to securing funding for security projects if annualized rates of occurrence and Return on Investment are not feasible approaches.
  3. In Chapter Two, Bruce Schneier was quoted as saying “Security is a process not a product”. The text goes on to say it is a mistake to focus too heavily on security technology compared to security management.
    1. We must have security technology, what is meant by being focused too heavily on security technology?
    2. Give examples or evidence of focus on security management
  • Please number your answers so they correspond to the questions listed below.
  • After each answer (or clearly state within the answer) the source(s) used. Although form and style is not considered in grading of this assignment, it may be a good opportunity to practice APA form and style rules for citing sources.
  • You should apply what you learn from textbook and reading materials in your response. Make your response to the point.
  • Complete the following readings this week:
    • Chapter 2 Planning and Policy

security risk mitigation plan 2

A Risk Management Analyst identifies and analyzes potential issues that could negatively impact a business in order to help the business avoid or mitigate those risks.

Take on the role of Risk Management Analyst for the organization you chose in Week 1.

Using the Security Risk Mitigation Plan Template, create a 6- to 8-page Security Risk Mitigation Plan for the organization you chose.

Research and include the following:

  • Refer to the course materials and additional resources from the Week 3 assignment, additional resources below, and the grading rubric.
  • Security Risk Mitigation Plan:
  • Select and document security policies and controls.
  • Provide authentication recommendations.
  • Document administrator roles and responsibilities.
  • Document user roles and responsibilities.
  • Determine authentication strategy.
  • Determine intrusion prevention and detection strategy.
  • Determine virus detection strategies and protection.
  • Create auditing policies and procedures.
  • Recommend an education plan for employees on security protocols and appropriate use.
  • Provide recommendations for managing identified risk
  • Avoidance
  • Transference
  • Mitigation
  • Acceptance
  • Address change Management/Version Control.
  • Outline acceptable use of organizational assets and data.
  • Present employee policies (separation of duties/training).
  • Incident response process
  • Preparation
  • Detection
  • Containment/analysis
  • Eradication
  • Restoration/Recovery
  • Lessons learned (root cause analysis and action plan)

Additional Resources

  • Intrusion prevention begins with an IPS that can automatically detect and stop intrusions. However, no control can stop all intrusions. Consequently, we need strong detection controls, including
  • Log Management
  • User Behavior Analysis
  • Network Behavior Analysis
  • The purpose of separation of duties is to ensure no one person can perform all tasks associated with a critical business process. This helps prevent fraud and mistakes. A common way to do this is the creation of roles (RBAC) and the assignment of tasks in an access matrix (spreadsheet). This allows data owners to understand who can do what and how to remove one or more tasks to ensure no role can perform all business process tasks. A separation of duties tool is attached below. The tabs along the bottom take you to the various business processes included. Adapt this to any set of business processes.
  • Employee training is typically focused on the contents of the acceptable use policy.A Risk Management Analyst identifies and analyzes potential issues that could negatively impact a business in order to help the business avoid or mitigate those risks.A Risk Management Analyst identifies and analyzes potential issues that could negatively impact a business in order to help the business avoid or mitigate those risks.Take on the role of Risk Management Analyst for the organization you chose in Week 1.Using the Security Risk Mitigation Plan Template, create a 6- to 8-page Security Risk Mitigation Plan for the organization you chose.Research and include the following:
    • Refer to the course materials and additional resources from the Week 3 assignment, additional resources below, and the grading rubric.
    • Security Risk Mitigation Plan:
    • Select and document security policies and controls.
    • Provide authentication recommendations.
    • Document administrator roles and responsibilities.
    • Document user roles and responsibilities.
    • Determine authentication strategy.
    • Determine intrusion prevention and detection strategy.
    • Determine virus detection strategies and protection.
    • Create auditing policies and procedures.
    • Recommend an education plan for employees on security protocols and appropriate use.
    • Provide recommendations for managing identified risk
    • Avoidance
    • Transference
    • Mitigation
    • Acceptance
    • Address change Management/Version Control.
    • Outline acceptable use of organizational assets and data.
    • Present employee policies (separation of duties/training).
    • Incident response process
    • Preparation
    • Detection
    • Containment/analysis
    • Eradication
    • Restoration/Recovery
    • Lessons learned (root cause analysis and action plan)

    Additional Resources

    • Intrusion prevention begins with an IPS that can automatically detect and stop intrusions. However, no control can stop all intrusions. Consequently, we need strong detection controls, including
    • Log Management
    • User Behavior Analysis
    • Network Behavior Analysis
    • The purpose of separation of duties is to ensure no one person can perform all tasks associated with a critical business process. This helps prevent fraud and mistakes. A common way to do this is the creation of roles (RBAC) and the assignment of tasks in an access matrix (spreadsheet). This allows data owners to understand who can do what and how to remove one or more tasks to ensure no role can perform all business process tasks. A separation of duties tool is attached below. The tabs along the bottom take you to the various business processes included. Adapt this to any set of business processes.
    • Employee training is typically focused on the contents of the acceptable use policy.

week 4a example

Instructions

Replicate class examples exactly as demonstrated in class lecture.

Submit your worked data in one single MS Excel Workbook. Create separate (appropriately labeled) worksheets within a single workbook for each example.

Example files should be named as follows:

  • Week1_FirstInitialLastname
  • e.g. Week 1 class examples on confidence intervals for Michael Phelps would be named Week1_MPhelps.xlsx

If you have limitations on the number of datasets you can assign in StatTools, you may breakup the original shell into two separate workbooks.

Name your two files, Week4a_File1_FirstInitialLastname and Week4a_File2_FirstInitialLastname

children s ward consultant essay

You are a consultant in a children’s ward for a long-term care hospital facility geared towards ages 3 to 10 years old. The facility directors ask you to construct an indoor/outdoor play center and activity schedule to allow those in early and middle childhood to maintain and develop their cognitive, physical, social, and emotional growth while recovering from their injuries/illnesses.

Justify for the facility’s stakeholders the use and placement for each piece of play equipment, toy, and furniture. Make it clear when and why you would need to divide some of the space to separate children in early childhood from those in middle childhood. Be sure to specify:

  1. How does each piece of play equipment, toy, and furniture contribute to the four types of development (e.g., fine-motor movement helps physical growth)?
  2. How does each piece facilitate social-emotional bonds of children with their families?
  3. How does each piece improve coping and adjustment to long-term care?
  • Your paper should be seven to nine pages (not including the required title or reference pages) and double spaced.
  • The paper should be based on references to scholarly materials (rather than on introductory textbooks, popular website writings, or musings, for example). To that, your paper should synthesize current, relevant research on your topic from at least five scholarly sources. Cite and reference these sources according to APA style.
  • Include an introduction that provides a clear statement of your position on the topic, a body that discusses the implications of possible solutions for the project under consideration, and a conclusion regarding how best to manage the issue (i.e., your informed opinion on the issues raised).