Quantitative Research Design Prompts

Description

This assignment is intended to deepen your understanding of the dissertation process while also developing your scholarly level writing skills. Although the prompts may be of a quantitative nature, each takes into perspective the entire doctoral research viewpoint.

Instructions

After completing the required research and reading for your chosen prompt, post your original response. The responses must be a minimum length of one paragraph and incorporate at least one scholarly level source. Write your response in APA format (7th Ed.). Please review the rubric for further details on grading.

The selected question to write

3B: Threats to Validity

In research, the threat of internal and external validity is commonly discussed. However, some researchers view one more important than the other. In your writing, compare and contrast internal and external validity, and make a determination based on your research/reading for which of the two validity factors is most critical and why, using citations and references to validate your argument.

Research Essay

 Description 

Your final research essay will present a comparison of Sara Teasdale’s poem, “There Will Come Soft Rains” and Ray Bradbury’s short story “There Will Come Soft Rains.” Your will address one of the following questions: 

1) What is the role of humanity in each of the two texts? Expand by illustrating the relationship between nature and humanity as represented in the poem and between humanity and technology as represented in the short story. 

the link for the poem: https://poets.org/poem/there-will-come-soft-rains

the link for the short story: https://urcourses.uregina.ca/pluginfile.php/2300543/mod_resource/content/1/7_There%20Will%20Come%20Soft%20Rains%20by%20Ray%20Bradbury.pdf

you need to compare  both the poem and short story and write a research essay based on the question.

Cryptography Reflection

Assignment:

Provide  a reflection of at least 500 words (or 2 pages double spaced) of how  the knowledge, skills, or theories of cryptography course have been applied, or  could be applied, in a practical manner to your current work  environment. If you are not currently working, share times when you have  or could observe these theories and knowledge could be applied to an  employment opportunity in your field of study.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

·  Use of proper APA formatting and citations. If supporting evidence from  outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

·  Demonstrate a connection to your current work environment. If you are  not employed, demonstrate a connection to your desired work environment.

·  . The assignment asks that you reflect how the knowledge and skills obtained through meeting cryptography course objectives were applied or could be applied in the workplace.

plagiarism report must

discussion

 

Discussion

According to Kirk (2019), The essence of “Formulating Your Brief” is to “identify the context in which your work will be undertaken and then define its aims – this is the who, what, where, when and how.” It could be formal or informal as any project you think you must make it. This phase is where you create a vision for your work.

Reference

Kirk, A. (2019). Data Visualisation: A Handbook for Data Driven Design. Thousand Oaks, CA: Sage Publications, Ltd.

Why is it so important to formulate your brief for a data presentation? Discuss some ways you would implement to formulate an effective brief. What are some advantages to your methods? What are some disadvantages?

agile Wk3

 In your opinion, what might be some team responsibilities that are not covered in any of these roles? Could you see yourself becoming a scrum master? Why or why not? 

250-300 words

network scanning

Select one network scanning software tool in online and explain in detail in 300 words how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up

Physical Security

Topic: Complete a Physical Security Assessment (internal and external) of your place of work or living area.  If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities. Refer to your text on the importance of Lighting and Access Control and be sure to cover the salient issues discussed in the text.

Instructions: Please download the Assignment 2 Physical Security Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. 

Project topic

 

Propose and defend a topic for your final project.  Write  500 words or more explaining why this topic is important for your peers to understand. Be focused and specific. Look into the general topic provided in the list in this folder to find something new and interesting to write about. You should do a deep dive into a topic. Do not do a survey. Use the Research Databases available from the Danforth Library not Google. 

You MUST make a statement saying exactly what your topic is. 

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Respond helpfully to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. Write to help them focus and say something that you think would help them say something that would be valuable.    You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested

Computer Forensics

From the given scenario, we need to find 5 hidden evidences from the given image.dd file. you have to use Autopsy software to extract the .dd file

EH 13

 In 250-300 words.

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.