Unit 5 Assignment 1

In: English and Literature

Submitted By shamone
Words 724
Pages 3
Shamone Gayles
Unit 5 exercise 1: Guided Reading
Chapter 10 1. What is the typical organization on an argument essay?
Introduction /summary of opposing positions including strengths/ limitations of opposing positions/Your understanding of the issue, describing both strengths and limitations of your position/Reasons your understanding is better than the opposing views’ understanding/ Conclusion 2. What are points of contention, and how do you identify them?
My position verses opposing positions, by coming up with the best arguments against your position yourself so you are prepared to counter them. 3. Why is it important to know the stance of your opposition?
By knowing your opposition, you can identify the weaknesses in your stance and how to remedy them. 4. What is the difference between argument and research paper?
In an argument you pick a topic that is controversial and debatable, whereas in a research paper, you do your research and only report what you find, while not trying to sway in either direction.
Chapter 24 1. What is a good way to start the research process?
Define your research question and sharpen it/ develop a working thesis that offers your best guess about how you will answer the research question/ devise a research plan to systematically collect the information needed to answer your research question and determine whether you’re working thesis is verifiable.

2. Why is it important to have a sharp research question?
Sharper research questions will help you narrow the scope of your research, saving you time and effort by allowing you to target the best of sources and information. 3. What is a working thesis? How is it used in research?
You’re working thesis is your best guess about how you will answer your research question. As you do your research, it is likely that you’re working thesis will change,…...

Similar Documents

Nt2580 Unit 5 Assignment 1

...It255 Unit5 Assignment TO: FROM: DATE: SUBJECT:Unit 5 Assignment 1: Testing and Monitoring Security Controls REFERENCE: Testing and Monitoring Security Controls (IT255.U5.TS1) How Grade: One hundred points total. See each section for specific points. Assignment Requirements Part 1:Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. Explain why they might indicate suspicious activity.(Forty points. Twenty points for each event.) # | Security Event & Baseline Anomaly That Might Indicate Suspicious Activity | Reason Why It May Indicate Suspicious Activity | 1. | Authentication Failures | Unauthorized access attempts | 2. | Network Abuses | Employees are downloading unauthorized material. | 3. | | | 4. | | | 5. | | | 6. | | | Part 2: Given a list of end-user policy violations and security breaches, select three breaches and consider best options for monitoring and controlling each incident. Identify the methods to mitigate risk and minimize exposure to threats and vulnerabilities. (Sixty points. Twenty points for each breach.) # | Policy Violations & Security Breaches | Best Option to Monitor Incident | Security Method (i.e., Control) to Mitigate Risk | 1. | A user made unauthorized use of network resources by attacking network entities. | Monitor the logs | Fire the user | 2. | Open network drive shares allow storage privileges to outside users. |...

Words: 258 - Pages: 2

Unit 5 Assignment 1

...Unit 5 Assignment 1 1) Choosing a database management system requires a great deal of analysis. False. 2) When choosing a database management system, you should consider system compatibility and hardware requirements. True. 3) Only insert and update statements are part of a database transaction. True. 4) Physical design is independent of any particular database management system. False. 5) A data type is a column specification that determines what kind of data can be stored in it. True. 6) Int, decimal and money are character numeric types. True. 7) Char and NChar are variable-length character types. False. 8) Varchar and NVarchar are variable length character types. False. 9) NChar and NVarchar are based on the unicode character set. True. 10) Unicode is an expanded character set that contains non-Latin characters. False. 11) A null is the same as a 0 or an empty string. True. 12) You should not allow nulls in columns that are critical to your business rules. True. 13) Tables can only be created by SQL statements in SQL Server. False. 14) Referential integrity exists when every foreign key relates to a primary key. True. 15) When referential integrity is in effect, you cannot delete a record in the primary key table until you have first deleted all the related records in the foreign key table. False. 16) When referential integrity is in effect, you can only enter records in the foreign key side of the relation...

Words: 331 - Pages: 2

Unit 1 Assignment 1

...Unit 1: Assignment 1 1) At its simplest, a database can be seen as a collection of related data. 2) A delimited file is a file where the length of the file is limited. 3) A delimited file is one in which the data is separated by a character such as a comma. 4) All fixed length files are of the same length. 5) In relational databases, logical design is kept separate from physical design. 6) A hierarchical database is designed with a tree-like structure that resembles a file system. 7) Codd defined the core principles of a relational database in 1970. 8) Data redundancy improves the integrity of a database. 9) In a diagram, crows feet notation conveys more information about the relationships. 10) A primary key uniquely identifies each row in a database table. 11) In a relational database, all data is kept in tables, even the information about the tables. 12) SQL is the language used by relational databases to create objects and to manipulate and retrieve data. 13) An entity is someone who is interested in the database. 14) In a statement of scope, a constraint is a limit on what the database will do. 15) Oracle is a popular relational database management system. 16) A relational database management system does not include tools for backing up and restoring databases. 17) Documentation is not an important part of database development. 18) In a statement of work, the......

Words: 363 - Pages: 2

Pt1420 Unit 5 Assignment 1

...Short Answer 1. Explain what is meant by the term “conditionally executed”.       Conditionally executed is called a single alternative decision structure because it provides only one alternative path of execution. The action is conditionally executed because it is performed only when a certain condition is true. 2. You need to test a condition and then execute one set of statements if the condition is true. If the condition is false, you need to execute a different set of statements. What structure will you use? I will use the “If” statement because it is a dual alternative decision structure.   3. If you need to a test the value of a variable and use that value to determine which statement or set of statements to execute, which structure would be the most straightforward to use?       The case structure lets the value of a variable or an expression determine which path of execution the program will take.   4. Briefly describe how the AND operator works. The AND operator takes two Boolean expressions as operands and creates a compound Boolean expression that is True only when both sub-expressions are true.   5. Briefly describe how the OR operator works.       The OR operator takes two Boolean expressions as operands and creates a compound Boolean expression that is true when either of the sub-expressions is true. The following is an example of an If-Then statement that uses the OR operator:   6.When determining whether a number is inside a range, which...

Words: 972 - Pages: 4

Unit 1 Assignment 1

...Homework Unit 1 Assignment 1 1. Why is the CPU the most important component in a computer? It’s the part of the computer that runs programs. 2. What number does a bit that is turned on represent? What number does a bit that is turned off represent? A turned on bit is 1 and a turned off bit is 0. 3. What would you call a device that works with binary data? A digital device 4. What are the words that make up a high-level programming language called? Key words or reserved words 5. What are the short words that are used in assembly language called? Mnemonics 6. What is the difference between a compiler and an interpreter? A compiler translates a high-lever program into a separate machine language program; whereas, an interpreter is a program that both translates AND executes instructions in a high-level program language program. 7. What type of software controls the internal operations of the computer’s hardware? Operating systems which is a type of system software. Unit 2 Assignment 1 Short Answer 1. What does a professional programmer usually do first to gain an understanding of a problem? Works with and interviews the customer to gain an understanding of what the customer wants the program to accomplish. 2. What is a pseudocode? A “fake” code that programmers use to test their programs before executing them. 3. Computer programs typically perform what three steps? A) Input is received B) Some process......

Words: 508 - Pages: 3

Unit 5 Assignment 1 Pt1420

...Short Answer 1. Explain what is meant by the term “conditionally executed”. Conditionally executed is called a single alternative decision structure because it provides only one alternative path of execution. The action is conditionally executed because it is performed only when a certain condition is true. 2. You need to test a condition and then execute one set of statements if the condition is true. If the condition is false, you need to execute a different set of statements. What structure will you use? I will use the “If” statement because it is a dual alternative decision structure. 3. If you need to a test the value of a variable and use that value to determine which statement or set of statements to execute, which structure would be the most straightforward to use? The case structure lets the value of a variable or an expression determine which path of execution the program will take. 4. Briefly describe how the AND operator works. The AND operator takes two Boolean expressions as operands and creates a compound Boolean expression that is True only when both sub-expressions are true. 5. Briefly describe how the OR operator works. The OR operator takes two Boolean expressions as operands and creates a compound Boolean expression that is true when either of the sub-expressions is true. The following is an example of an If-Then statement that uses the OR operator: 6.When determining whether a number is inside a range, which...

Words: 329 - Pages: 2

Unit 1 Assignment 1

...Miosha Vogt ET2560 Unit 1 Assignment 1 Chapter 1: Pg. 43 Quick- Check Exercise 1. Machine language 2. Operating System 3. Translation, Linking, Loading, Execution 4. Source 8. Software, Hardware 9. Variables 10. Secondary storage Pg. 44 Review Questions 3. Two secondary storage devices is a disk drive and flash drive Two input devices is the keyboard and mouse Two output devices is the monitor and printer 5. Syntax error is grammar error of a programming language. 6. The loader copies the executed file into memory and initiates execution of instructions. 7. Memory cells are a grouping of small units called bytes Bytes are the amount of storage required to store a single character, composed of even smaller unit called bits. Bits are binary digits 0-10. 8. Three high languages are Fortran, C, and Java FORTRAN used in scientific programming. C is used in system programming. Java supports web programming and programming Android applications. 9. Ram is volatile and it temporarily stores programs while their being executed, delete when computer is turned off, Rom is not volatile the data stored there will not disappear when the computer is turned off. 2. Write an algorithm in pseudo-code to solve the following problem: Input a temperature in Fahrenheit, and output the temperature in Celsius and Kelvin. Formulas needed are: C = ( 59 ) (F – 32). K= ( 59 ) (F – 32) + 273.15 Algorithm:......

Words: 458 - Pages: 2

Pt1420 Unit 5 Assignment 1. Homework

...Short Answer: 1. Explain what is meant by the term “ conditionally executed.” It is performed only when a certain condition is true. 2. You need to test a condition and then execute one set of statements if the condition is true. If the condition is false, you need to execute a different set of statements. What structure will you use? If the condition is false, we follow another path, which skips the action. 3. If you need to test the value of a variable and use that value to determine which statement or set of statements to execute, which structure would be the most straightforward to use? If and then 4. Briefly describe how the AND operator works. The AND operator connects two Boolean expressions into one compound expression. Both subexpressions must be true for the compound expression to be true. 5. Briefly describe how the OR operator works. The OR operator connects two Boolean expressions into one compound expression. One or both subexpressions must be true for the compound expression to be true. It is only necessary for one of the subexpressions to be true, and it does not matter which. 6. When determining whether a number is inside a range, which logical operator is it best to use? AND 7. What is a flag and how does it work? A flag is a variable that signals when some condition exists in the program. Algorithm Workbench Review: 1.Design an If- Then statement ( or a flowchart with a single alternative decision structure) that assigns 20 to the variable y......

Words: 686 - Pages: 3

Pt1420 Unit 5 Assignment 1. Homework

...Short Answer: 1. Explain what is meant by the term “ conditionally executed.” It is performed only when a certain condition is true. 2. You need to test a condition and then execute one set of statements if the condition is true. If the condition is false, you need to execute a different set of statements. What structure will you use? If the condition is false, we follow another path, which skips the action. 3. If you need to test the value of a variable and use that value to determine which statement or set of statements to execute, which structure would be the most straightforward to use? If and then 4. Briefly describe how the AND operator works. The AND operator connects two Boolean expressions into one compound expression. Both subexpressions must be true for the compound expression to be true. 5. Briefly describe how the OR operator works. The OR operator connects two Boolean expressions into one compound expression. One or both subexpressions must be true for the compound expression to be true. It is only necessary for one of the subexpressions to be true, and it does not matter which. 6. When determining whether a number is inside a range, which logical operator is it best to use? AND 7. What is a flag and how does it work? A flag is a variable that signals when some condition exists in the program. Algorithm Workbench Review: 1.Design an If- Then statement ( or a flowchart with a single alternative decision structure) that assigns 20 to the variable y......

Words: 686 - Pages: 3

Pt2520 Unit 5 Assignment 1,Unit 5 Research Paper 1 and Quiz 4

...Lab 5.1 Unit 5 Assignment 1 1) Choosing a database management system requires a great deal of analysis. TRUE 2) When choosing a database management system, you should consider system compatibility and hardware requirements. TRUE 3) Only insert and update statements are part of a database transaction. FALSE 4) Physical design is independent of any particular database management system. FALSE 5) A data type is a column specification that determines what kind of data can be stored in it. TRUE 6) Int, decimal and money are character numeric types. TRUE 7) Char and NChar are variable-length character types. FALSE 8) Varchar and NVarchar are variable length character types. TRUE 9) NChar and NVarchar are based on the unicode character set. TRUE 10) Unicode is an expanded character set that contains non-Latin characters. TRUE 11) A null is the same as a 0 or an empty string. FALSE 12) You should not allow nulls in columns that are critical to your business rules. TRUE 13) Tables can only be created by SQL statements in SQL Server. FALSE 14) Referential integrity exists when every foreign key relates to a primary key. TRUE 15) When referential integrity is in effect, you cannot delete a record in the primary key table until you have first deleted all the related records in the foreign key table. TRUE 16) When referential integrity is in effect, you can only enter records in the foreign key side of the relation if it relates directly to a record in the primary key......

Words: 1792 - Pages: 8

Nt1110 Unit 5 Assignment 1

...A port expander is a hardware device that will allow users to utilize multiple devices on a single port at the same time. It is the same principle as using a power strip for the power in a home or a splitter for the cable. For example, if you only have 1 Universal Serial Bus (USB) port, yet you have a USB mouse and keyboard, then you can use a USB port expander to allow one port slot to become multiple ports and plug in the mouse and keyboard. Allowing multiple devices to be able to connect to a single port is a major advantage to port expanders. However, one of the biggest drawbacks is that the speed of that port is now divided throughout all the expansion ports, an example being a 3Gbps port expanded to accommodate 4 ports will now have to split that 3Gbps between all 4 ports and not 3Gbps per expansion slot. There are two types of port expanders: internal and external. An internal port expander will usually connect to the motherboard and have an expansion plate with multiple ports along the box of the computer. An external port expander will plug into an existing port (such as a USB) and will then have multiple connections off of the port expander. Port expanders are also very generic and will allow expansion on just about any computer. There are many ports available that come with port expansion hardware. Some examples are, but are not limited to, USB Port Expander Hardware, Microphone Port Expander Hardware, FireWire Port Expander Hardware, Serial Port......

Words: 335 - Pages: 2

Unit 5 Assignment 1

...pasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnm Unit 5 Assignment 1:Future Statement Brain Mapping 8/1/2013 Troy Jones (16609262) GS 1140 | I find the future of Brain Mapping Technology very exciting! Think of it, science has already begun to do this. Can you imagine if we could look at the brain and find exactly where our actions come from? Thoughts, behaviors, actions, and brain trauma/disease just to name a few could be improved upon or better yet cured! This would have a huge impact on our society. Brain diseases like (ALS) Lou Gehrig’s disease for example could be impacted greatly. I personally lost my oldest brother to ALS last year. He was only 54 and died nine months after the diagnosis. It’s a brutal disease. I would like to in vision a future for people without ALS or Autism. Curing......

Words: 274 - Pages: 2

Pm3110 Unit 5 Assignment 1

...Intro to Project Management Hector Diaz PM3110 7/23/15 Instructor: Muhammad Bashir Unit 5 Assignment 1; Simulation/Case Study: The Dulhasti Power Plant After reviewing case study 8.1 in unit 5 of the textbook Project Management: Achieving Competitive Advantage (2nd Edition), I was tasked to elaborate on the challenges of delivering an accurate cost estimation when working on harsh geographical conditions. It was observed in the case study that the geographical location chosen for the construction of the Dulhasti Power Plant in the provinces of Jammu and Kashmir, had become too much of a concern for investors and project coordinators, mainly due to a disputed border conflict between India and Pakistan. Not only did the budget increased exponentially over a 20-plus year period (due to the fact that this project was conceived in 1983), but concerns about the local terrorist and nationalist groups in and around the border began to raise numerous questions regarding safety and of course, budgeting (in the sense of hiring extra security to patrol the area). When the Indian government used a fixed-price contract to favor the lowest bids when initially beginning the project, it was believed to be the best method of approach at the...

Words: 438 - Pages: 2

Unit 5 Assignment 1 Video

...Unit 5 Assignment 1: Video Summary NT1110 There are two major manufactures we use in today’s market which are Intel and AMD. There are some minor competitions but don’t stay on the market for long. The system bus for the CPU is also known as the Front-side bus as it inserts the CPU and has a 64 bit data pass. In the CPU theirs a controller that controls communication between the motherboard and other components with the CPU. The ALU is responsible for performing complex calculations. Communications between the controllers and the ALU’s uses a 32 bit wide internal data bus. A processor is usually measured in GHz. A system Bus is usually measured in MHz and has limiting factors of speed. The multiplier is the ratio between processor and the System bus. The system bus speed x multiplier equals the processor speed. CPU manufactures have come up with different ways to make the CPU work faster. Two multi-processing requires multiple processors (In other words your system must be designed to support more than one CPU on a single motherboard). Dual Core Processors have been recently developed, that means incorporating multiple processors with multiple ALU’s inside a CPU. These ALU’s process their information individually. There’s two cache memory’s which are SRAM and DRAM. SRAM is also called Static RAM, it is faster and more expensive then DRAM, it holds memory without being refreshed and DRAM must be refreshed. There are three types of RAM which are L1 cache, L2 cache, and L3......

Words: 644 - Pages: 3

Et 2560 Unit 5 Assignment 1

...Matthew Lopez ET2560 Intro to C Unit 5 assignment 1 Pg. 238 1. Choose an appropriate kind of loop from Table 5.1 for solving each of the following problems. a. Calculate the sum of the test scores of a class of 35 students. ( Hint: Initialize sum to zero before entering loop.) Endfile- controlled loop b. Print weekly paychecks for a list of employees. The following data are to be entered interactively for each employee: ID, hours worked, and hourly pay rate. An ID of zero marks the end of the data. Sentinel- controlled loop c. Process a data file of Celsius temperatures. Count how many are above 100° C. Input validation loop Pg. 241 – 242 1. Predict the output of this program fragment: i = 0; while ( i <= 5) { printf("% 3d % 3d\ n", i, 10 - i); i = i + 1; } It will show the numbers that appear before 5 2. What is displayed by this program fragment for an input of 8? scanf("% d", & n); ev = 0; while ( ev < n) { printf("% 3d", ev); ev = ev + 2; } printf("\ n") Show the numbers from 0 to 8 increasing by 2 each time Pg. 246 – 247 1. What output values are displayed by the following while loop for a data value of 5? Of 6? Of 7? printf(" Enter an integer> "); scanf("% d", & x); product = x; count = 0; while ( count < 4) { printf("% d\ n", product); product *= x; count += 1; } No values are output 3. The following segment needs some revision. Insert braces where they are needed and correct the...

Words: 752 - Pages: 4