Categories
Writers Solution

Correlation between Extracurricular Activities and Academic Performance

An Annotated Bibliography is a summary or evaluation of sources. The summary typically contains a discussion on the point of the book or article, an evaluation of the source, and finally a reflection. For this assignment, you will create an annotated bibliography of 6 research articles from peer-reviewed or scholarly sources that relate to your topic as defined in the Unit 1 assignment. The topic is (Correlation between Extracurricular Activities and Academic Performance).   You will be able to use this assignment to write your literature review which is due at the end of this Unit.

To get started on this assignment first read Chapter 2: Types of Sources, Chapter 5: Search Tools, Chapter 6: Evaluating Sources, and Chapter 8: How to Cite Sources from your Citing Sources (2020) textbook. As you read through the chapters, be sure to view the embedded video clips within the chapters. For a sample of an Annotated Bibliography refer to the Purdue Online Writing Lab (n.d.) Annotated Bibliography Samples. Be sure to scroll down to the APA example.

Next, (if you have access) watch the optional video from UWlibraries which will provide you an explanation and examples of what a scholarly article includes.

Note: there are two parts to this assignment.

Part One: Conduct a scholarly search for 6 peer-reviewed or scholarly sources based on your chosen topic from Unit 1.

Part Two: Create an Annotated Bibliography (should be in list format) of 6 sources related to your topic from Unit 1. Your Annotated Bibliography should include:

1. The full APA citation for the source including the web link.

2. In one paragraph, for each source

  • Discuss the point or main thesis of the source.
  • Evaluate the source for reliability and how it compares to other sources in your Annotated Bibliography.
  • Analyze the source for its relevance to your study.

Your Discussion should be a minimum of 250 words in length and not more than 450 words. Please include a word count. Following the APA standard, use references and in-text citations for the textbook and any other sources. 

References

Choosing & Using Sources: A guide to academic research. (2020). Teaching & Learning, University Libraries. https://ohiostate.pressbooks.pub/choosingsources/

Purdue OWL Online Writing Lab. (n.d.). Annotated bibliography examples. Purdue OWL Online Writing Lab. https://owl.purdue.edu/owl/general_writing/common_writing_assignments/annotated_bibliographies/annotated_bibliography_samples.html

Reading Assignment. 

Choosing & Using Sources: A guide to academic research. (2020). Teaching & Learning, University Libraries. https://ohiostate.pressbooks.pub/choosingsources/2.  Pubrica Academy. (2019, August 8). Why is it important to do a literature review in research? https://pubrica.com/academy/research/why-is-it-important-to-do-a-literature-review-in-research/  3.Purdue OWL Online Writing Lab. (n.d.). Annotated bibliography examples. Purdue OWL Online Writing Lab. https://owl.purdue.edu/owl/general_writing/common_writing_assignments/annotated_bibliographies/annotated_bibliography_samples.html 4. Purdue OWL Online Writing Lab. (n.d.). Writing a literature review. Purdue OWL Online Writing Lab.  https://owl.purdue.edu/owl/research_and_citation/conducting_research/writing_a_literature_review.html 

Optional Video

1. Taylor, D. (28, June 2010). Writing the literature review (part one): Step by step tutorial for graduate students [Video]. YouTube. https://www.youtube.com/watch?v=2IUZWZX4OGI  (5:21)  

2. Taylor, D. (28, June 2010). Writing the literature review (part two): Step by step tutorial for graduate students [Video]. YouTube. https://www.youtube.com/watch?v=UoYpyY9n9YQ (7:40)

  • This is a two-part series of videos that will explain how to write your literary review.

3.  University of Washington Libraries. (2011, July 19). What is a scholarly journal article? [Video]. YouTube. http://www.youtube.com/watch?v=PuyCJnv3auk (2:55) 

  • This video gives you a specific explanation and examples of what scholarly articles include and shows you how to locate them

WE HAVE DONE THIS ASSIGNMENT BEFORE, WE CAN ALSO DO IT FOR YOU

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER on Correlation between Extracurricular Activities and Academic Performance

Are You looking for Assignment and Homework Writing help? We Provide High-Quality Academic Papers at Affordable Rates. No Plagiarism.

TO BE RE-WRITTEN FROM THE SCRATCH

Categories
Writers Solution

Apply research, academic and communication skills appropriate to the level of study and observe academic referencing requirements

A SSESSMENT 1 PART B BRIEF
Subject Code and Title MGT502 Business Communication
Assessment Forming an Argument
Individual/Group Individual
Length Up to a page
Learning Outcomes The Subject Learning Outcomes demonstrated by successful completion of the task below include:
a) Apply research, academic and communication skills appropriate to the level of study and observe academic referencing requirements.
b) Critically analyse texts and/or multimedia material in both a business and academic context.
c) Identify and apply effective communication methods within a business and academic environment.
Submission 12 Week Delivery: Due by 11:55 pm AEST/AEDT Sunday of Module 4.1 (Week 7)
Intensive class: Due by 11:55 pm AEST/AEDT Sunday of Module 4.1 (Week 4)
Weighting 20%
Total Marks 100 marks
Assessment Task
Write a critical argument on the topic selected in Assessment 1 Part A Annotated Bibliography.
Provide supporting evidence for the argument from the resources used in Assessment 1 Part A.
Please refer to the Task Instructions for details on how to complete this task.
Context
This assessment has been prescribed to appraise your’ ability to think critically and form an argument supported by evidence. It allows you to demonstrate your ability to understand the material you are using and to apply it in ways that go beyond what has been read.
This assessment has been designed to:
• Appraise your ability to critically evaluate academic and other research to form an argument on an organisational topic that is supported by evidence.
• Enhance your writing skills so they are able to form persuasive and convincing arguments and communicate them effectively.
The resources used in Assessment 1 Part A Annotated Bibliography are expected to be utilised in this assessment to support the argument.
Instructions

  1. Write a critical argument up to a page on the topic selected in Assessment 1 Part A.
  2. Use the annotated bibliography resources from Assessment 1 Part A for sourcing evidence and ideas for your argument. Review the resources critically and select at least 5 to be used as references for this assessment.
  3. Please consider the following factors, when forming the argument:
    • A good argument is convincing whereby the premises are acceptable, the supporting evidence is relevant to the claim and provides sufficient grounds for acceptance of the claim.
    • You will be expected to form an academic and financial argument in favour, or against, utilizing the communications solution in the modern workplace.
    • Make a clear point and justify it.
  4. Please structure your argument as follows:
    • Title page
    • Introduction: provide a short introduction with a claim.
    • Main body: with a logical structure including supporting evidence from academic sources.
    • Conclusion: a concise conclusion which restates your claim and summarises your argument.
    • References: please provide the reference list on a separate page.
  5. Please use at least 5 in-text citations. Indicate logical connections and use connecting words
  6. You are strongly advised to read the rubric, which is an evaluation guide with criteria for grading your assignment—this will give you a clear picture of what a successful forming an argument looks like.
    Referencing
    It is essential that you use appropriate APA style for citing and referencing research. Please see more information on referencing in the Academic Skills webpage.
    Submission Instructions:
    Submit the Forming an Argument document via the Assessment link in the main navigation menu in MGT502: Business Communication.
    The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades.
    Academic Integrity
    All students are responsible for ensuring that all work submitted is their own and is appropriately referenced and academically written according to the Academic Writing Guide. Students also need to have read and be aware of Torrens University Australia Academic Integrity Policy and Procedure and subsequent penalties for academic misconduct. These are viewable online.
    Students also must keep a copy of all submitted material and any assessment drafts.
    Assessment Rubric
    Assessment Attributes Fail
    (Yet to achieve minimum standard) 0-49% Pass
    (Functional)
    50-64% Credit
    (Proficient) 65-74% Distinction
    (Advanced)
    75-84% High Distinction
    (Exceptional)
    85-100%
    Evaluation of information selected to
    support the argument
    Percentage for this
    criterion = 50%
    Limited understanding of key concepts required to support the argument.
    Confuses logic and emotion. Information taken from reliable sources but without a coherent analysis or synthesis.
    Resembles a recall or summary of key ideas.
    Personal opinion without
    reflection, expert judgment or rigor, unsubstantiated by evidence from the research/course materials.
    Supports personal opinion and information substantiated by evidence from the research/course materials.
    Demonstrates a capacity to apply and justify the use of relevant concepts.
    Discriminates between assertion of personal opinion and information substantiated by robust evidence from the research/course materials and extended reading.
    Well demonstrated capacity apply and justify relevant concepts.
    Analysis and evaluation reflect growing judgement, intellectual independence, rigor and
    adaptability
    Systematically and critically discriminates between assertion of personal opinion and information substantiated by robust evidence from the research/course materials and extended reading.
    Information is taken from sources with a high level of interpretation/evaluation to develop a comprehensive critical analysis or synthesis.
    Exhibits intellectual independence, rigor, good judgement and adaptability.
    MGT502_Assessment_1_Part B_Brief_Forming an Argument_Module Due 4.1 Page 5 of 5
    Effective
    Communication
    Percentage for this
    criterion = 15%
    Difficult to understand for audience, no logical/clear structure, poor flow of ideas, argument lacks supporting evidence.
    Audience cannot follow the line of reasoning.
    Information, arguments and evidence are presented in a way that is not always clear and logical.
    Line of reasoning is often difficult to follow.
    Information, arguments and evidence are well presented, mostly clear flow of ideas and arguments.
    Line of reasoning is easy to follow.
    Information, arguments and evidence are very well presented; the presentation is logical, clear and well supported by evidence.
    Argument is convincing and persuasive.
    Expertly presented; the presentation is logical, persuasive, and well supported by evidence, demonstrating a clear flow of ideas.
    Engages and sustains audience’s interest in the topic and demonstrates a persuasive and convincing argumentation.
    Correct citation of key
    resources and evidence
    Percentage for this
    criterion = 35%
    Demonstrates inconsistent use of good quality, credible and relevant resources to support and develop ideas
    Demonstrates use of credible and relevant resources to support and develop ideas, but these are not always explicit or well developed.
    Demonstrates use of credible resources to support and develop ideas.
    Demonstrates use of good quality, credible and relevant resources to support and develop arguments and statements.
    Show evidence of wide scope within the organisation for sourcing evidence.
    Demonstrates use of high- quality, credible and relevant resources to support and develop arguments and position statements.
    Show evidence of wide scope within and without the organisation for sourcing evidence.
    MGT502_Assessment_1_Part B_Brief_Forming an Argument_Module Due 4.1 Page 5 of 5

WE HAVE DONE THIS ASSIGNMENT BEFORE, WE CAN ALSO DO IT FOR YOU

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER on Apply research, academic and communication skills appropriate to the level of study and observe academic referencing requirements

Are You looking for Assignment and Homework Writing help? We Provide High-Quality Academic Papers at Affordable Rates. No Plagiarism.

TO BE RE-WRITTEN FROM THE SCRATCH

Categories
Writers Solution

From inquiry to academic writing: A practical guide (4th ed.). Bedford/St. Martin’s

 Please follow the professor instructions and this must be your own work and not copy and paste off of someone work or article. Please read the study guide and watch out for spelling and grammar errors. Please use the APA 7th edition format. This is a DBA course and needs to be on done on this level. I have attached Unit VI

Book reference:Greene, S., & Lidinsky, A. (2018). From inquiry to academic writing: A practical guide (4th ed.). Bedford/St. Martin’s. https://online.vitalsource.com/#/books/9781319071677

Instructions
Editing

In Unit V, you wrote an introduction to a proposed research topic that was supposed to appeal to readers. In Unit VI, you revised it. In this lesson, using the free version of the software Tool, Grammarly, or similar, edit your document, and submit the final version. You can download the free version of Grammarly at Grammarly.com.

Resources

The following resource(s) may help you with this assignment.

Categories
Writers Solution

Book Reference:Greene, S., & Lidinsky, A. (2018). From inquiry to academic writing: A practical guide (4th ed.). Bedford/St. Martin’s.

please follow the professor instructions and make sure it is your own work and not copy and paste off of someone else work or article. Please read the study guide and watch out for spelling and grammar errors. Please use the APA 7th edition.

Book Reference:Greene, S., & Lidinsky, A. (2018). From inquiry to academic writing: A practical guide (4th ed.). Bedford/St. Martin’s. https://online.vitalsource.com/#/books/9781319071677

Instructions
Tables

Greene and Lidinsky (2018) discuss the use of visual rhetoric in writing (pp. 297–311). Review the information listed below, and create a table of information using correct APA Style for formatting, spacing, and headings.Fifty participants were used to measure three latent variables: Job Satisfaction (A), Work Satisfaction (B), and Turnover Intention (C). The arithmetic means were A = 3.81, B = 3.41, and C = 4.14 with a standard deviation of 0.49, 0.50, and 0.34, respectively. The minimum scores were A = 2.46, B = 2.23, and C = 3.40, and the maximum scores were 4.93, 4.29, and 4.83, respectively. The range was 2.47 for A, 2.06 for B, and 1.43 for C. The standard errors were at A = 0.07, B = 0.07, and C = 0.05.

Resources

The following resource(s) may help you with this assignment.

Categories
Writers Solution

Writing Sample: The Connection Between Academic and Professional Integrity

Craft your analysis/writing sample, including Part 1 (The Connection Between Academic and Professional Integrity) and Part 2 (Strategies for Maintaining Integrity of Work). 

Part 1: Writing Sample: The Connection Between Academic and Professional Integrity
In the space below write a 2- 3-paragraph analysis that includes the following:
Explanation for the relationship between academic integrity and writing
Explanation for the relationship between professional practices and scholarly ethics 
Cite at least 2 resources that support your arguments, being sure to use proper APA formatting. 
Use Grammarly and SafeAssign to improve the product.
Explain how Grammarly, Safe Assign, and paraphrasing contributes to academic integrity

PART 2: Strategies for Maintaining Integrity of Work
Expand on your thoughts from Part 1 by: 
Identifying and describing strategies you intend to pursue to maintain integrity and ethics of your 1) academic work while a student of the MSN program, and 2) professional work as a nurse throughout your career. Include a review of resources and approaches you propose to use as a student and a professional

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

NO PLAGIARISM (100% Sure)

CLICK HERE TO MAKE YOUR ORDER  Writing Sample: The Connection Between Academic and Professional Integrity

TO BE RE-WRITTEN FROM THE SCRATCH

Categories
Writers Solution

fundamental educational principle and the cornerstone of high quality academic work

WEB DEVELOPMENT (INTRODUCTION) WEDE5020/d
ASSESSMENT TYPE: POE (PAPER )
TOTAL MARK ALLOCATION: 100 MARKS
TOTAL HOURS: A minimum of 30 HOURS is suggested to complete this assessment
By submitting this assignment, you acknowledge that you have read and understood all the rules as per the terms in the registration contract, in particular the assignment and assessment rules in The IIE Assessment Strategy and Policy (IIE009), the intellectual integrity and plagiarism rules in the Intellectual Integrity Policy (IIE023), as well as any rules and regulations published in the student portal.
INSTRUCTIONS:
• No material may be copied from original sources, even if referenced correctly, unless it is a direct quote indicated with quotation marks. No more than 10% of the assignment may consist of direct quotes.
• Any assignment with a similarity index of more than 25% will be scrutinised for plagiarism. Please make sure you attach a similarity report to your POE if required.
• Make a copy of your assignment before handing it in.
• Assignments must be typed unless otherwise specified.
• All work must be adequately and correctly referenced.
• Begin each section on a new page.
• Follow all instructions on the assignment cover sheet.
• This is an individual assignment.
Additional Instructions:
1. All tasks in this POE must be completed individually.
Referencing Rubric ____
Providing evidence based on valid and referenced academic sources is a fundamental educational principle and the cornerstone of high quality academic work. Hence, The IIE considers it essential to develop the referencing skills of our students in our commitment to achieve high academic standards.
Poor quality formatting in your referencing will result in a penalty of a maximum of five (5) marks against the percentage mark awarded, according to the following guidelines. Please note, however, that evidence of plagiarism in the form of copied or uncited work (not referenced), absent reference lists, or exceptionally poor referencing, may result in action being taken in accordance with The IIE’s Intellectual Integrity Policy (0023).
Required Subtract 1 Subtract 2 Subtract 3 Subtract 4 Subtract 5
• Consistent in-text referencing style
• Quotation marks, page
numbers,
years, etc. applied
correctly
• Only one or two minor mistakes in style made
• All sources are accurately reflected and included in
a reference
list • Consistent in-text referencing style
• Quotation marks, page numbers,
years, etc. applied
correctly
• Fewer than five minor
mistakes made
• More than 90% of the sources are correctly reflected and included in a
reference list
• Consistent in-text referencing style
• Quotation marks, page numbers,
years, etc. not always applied correctly
• Not all paraphrased content referenced
• At least 80% of the sources are correctly reflected and included in a
reference list
• Consistent in-text referencing style
• Quotation marks used for direct quotes but page numbers missing
• At least 70% of the sources are correctly reflected and included in
a reference
list • In-text referencing used but
inconsistent
• Paraphrased material cited but not referenced accurately or consistently
in text
• Quotation marks and/or page numbers for direct quotes missing
• At least 60% of the sources are correctly reflected and included in reference list • Poor and inconsistent referencing style used
• At least 50% of the sources are correctly reflected and included in
reference
list
• Quotation marks and/or page numbers for direct quotes
missing
• May be
referred for action in
accordance with IIE 0023
Intellectual
Integrity
Policy
Portfolio of Evidence (PoE) — Background ___ __
The need for organisations and businesses to have a responsive, well-designed website is critical to allow them to showcase their achievements, remain relevant and ensure competitiveness.
Alongside this, organisations may also use their website to generate revenue.
As you complete this POE, you will develop a website for an NGO, NPO or small/medium business of your choice. As your progress through each task, you will use knowledge gained in the different learning units and add in several features to your website. The outcome is to construct a welldesigned website which will provide the NGO, NPO or organisation with a web presence.
The simplified process is as follows:
• In Task 1, you will develop the basic structure of your website (using HTML5).
• In Task 2, you will improve upon your work in the previous task and add in styling to your website (using CSS3). You will also finalise the content across all your pages and make your site responsive.
• In Task 3, you will add a level of interaction by way of a web-form. This could could be implemented using Google Forms or any other suitable method.
Whilst this POE does not prescribe a specific NGO, NPO or organisation for which you must develop the website, you are encouraged to go out and search for a real-world NGO, NPO or organisation that could benefit from your service. Alternatively, you may use a hypothetical, but realistic example. Your lecturer must sign-off an approval for your chosen organisation and a broad statement of the envisaged website. Remember to always be respectful of any copyrights and trademarks.
Since each task builds on the previous tasks, it is essential that you work consistently and invest the necessary effort throughout the process. You are required to consult the rubrics at the end of this document to ensure that you submit all work that is required. It is recommended that you double-check that you have included everything. Lastly, the end-product of this POE may also add value to your CV as work experience.
Instructions __
In order to successfully complete this POE, you will be required to conduct additional research and consult online resources. Links to some of these online resources have been included in your Module Guide but you will still need to consult other sources on your own. Please ensure that you attribute all code that you re-use from other sources in accordance with the IIE’s Referencing Guide.
Task 1 — HTML5_________________ ____ (Marks: 100)
In this task, you are required to develop the structure of your site in HTML5.
Your site must incorporate the following features:
• Your webpage title(s) must be appropriate.
• Your website must include appropriate logos and branding.
• Your website must have a working navigation menu.
• Your website must include appropriate content including headings, text, images, tables and any other multimedia.
• Your website must include an appropriate footer.
• Whilst you do not need to incorporate CSS in this task, your website should have some
basic styling in terms of fonts and colours.
The website should incorporate a minimum of 6 webpages that contain several types of content.
These are the minimum requirements:
• A Homepage which welcomes users to the site and displays relevant information about the NGO, NPO or organisation.
• An About Us page which discusses the organisation, its history, mission, and vision.
• An Our Work page which outlines the work carried out by the organisation.
• A Photo Gallery which showcases the organisation, its staff, its work and projects. For now, this may be a basic gallery which you will improve on in subsequent tasks.
• A Get Involved page which contains a form that allows users to submit their details as a sponsor, volunteer or client. This form should collect information such as full name, email address, contact number and the enquiry that a user has. The form should also include submit and reset button. For this task, you need to build the form, but it does not need to be functional.
• A Contact Us page which includes contacts details of the organisation (including physical address, telephone numbers, social media links, an embedded Google Map, and any other relevant details).
Submission
Create a NetBeans project which will contain the all files and folders which you will need for your website. Some of these folders may not include content now, but content will be added in upcoming tasks. You are required to submit the completed task electronically (including folders, subfolders and files). Place all your work in a zip file named WEDE5010_Task 1[Your Student Number]_[Your Name].zip.
Task 2 — CSS and Responsive Design ____ (Marks: 100)
In this task, you are required to develop the styling of your website and incorporate responsive design.
These are the required features:
• Improve upon the previous task, based on feedback from your lecturer.
• Your website must be developed using HTML5 and styled using CSS3.
• Your website must be styled consistently using a suitable combination of inline, internal
and external style sheets.
• Your styling must make your website responsive (i.e. automatically adjust to different
screen and device sizes).
You may also add in these optional features:
• Embedding of social media feeds and YouTube videos, as necessary.
Submission
You are required to submit the completed task electronically (including folders, subfolders and files). Place all your work in a zip file named WEDE5010_Task 2 [Your Student Number] [Your
Name].zip.
POE — Final Submission__ __(Marks: 100)
In this task, you are required to transform your website into a fully-functional interactive website which is ready to be hosted.
These are the activities to be completed:
• Improve upon the previous tasks, based on feedback from your lecturer.
• Ensure that photo-gallery is now fully functional.
• Extend your website to process form submissions.
• Package the completed website ready to be hosted.
• Complete a reflection on your learning experience – please see details below.
Processing Form Submissions
In the previous tasks, you developed an HTML5 form to allow visitors to submit their details to get involved. You need to add validation to this form.
You are also required to create a second form which allows a user of the website to provide their email address to subscribe to a newsletter. To achieve this, you are required use Google Forms.
Complete the following steps:
• Visit Google Forms (https://forms.google.com) and build a simple Google Form which prompts the user to enter their email address to subscribe to a newsletter.
• Embed this form into the Homepage of your website.
• In Google Forms, include an add-on which sends an email to a webmaster’s email address when a user submits their email address. (Hint: there are several add-ons which can help you fulfil this).
• Test your form.
• Include screenshots of the submissions saved in Google Sheets and the email notification in your mailbox.
Visit this link for guidance on creating and embedding Google Forms: https://support.google.com/docs/topic/9055404?hl=en&ref_topic=1382883
Reflection
In your reflection of this module, you are required to reflect on what you have learnt in this course. Aspects which you could reflect on include:
• What were the most and least beneficial aspects of this course?
• How did each of the learning units contribute to your knowledge of web development?
• How did the knowledge gained from each of the learning units assist you in completing the tasks in this POE?
• Do you think you will use the skills in this course in your career? If yes, explain how.
• If you were to rewind life one semester, what would you do differently in this course and what would you do the same?
The length of this reflection should not exceed one page.
Submission
As part of your submission, you must include all folders, subfolders and files used throughout this
POE. You are required to create a folder named WEDE5010_POE [Your Student Number] [Your Name].
The following must be included in this folder:
• A folder named Task 1 – this must contain your original Task 1 submission. • A folder named Task 2 – this must contain your original Task 2 submission.
• A folder named POE – this must contain:
o A document outlining specific corrections that you made based on feedback from
Task 1 and Task 2. o Your completed website incorporating all corrections and required features. o A reflection on your learning through this course.
o You are required to zip this folder and submit it electronically.
Appendix A
Assessment Sheet (Marking Rubric)
MODULE NAME: MODULE CODE:
WEB DEVELOPMENT (INTRODUCTION) WEDE5010/d/p
STUDENT NAME:
STUDENT NUMBER:
TASK 1 RUBRIC Levels of Achievement Feedback
In order to be awarded full marks for these elements of
Task 1, you need to have: Excellent Good Developing Poor
Score Ranges Per Level (½ marks possible)
Development: NetBeans project created correctly with all required folders and subfolders. 5 3-4 1-2 0
File names: HTML files are appropriately named. 6 4-5 2-3 0-1
Navigation menu: appropriate links included. 6 4-5 2-3 0-1
Navigation menu: works correctly with no broken links. 6 4-5 2-3 0-1
Webpage: Footer included with appropriate content. 5 3-4 1-2 0
Webpage: Homepage included with appropriate content. 10 8-7 4-6 0-3
Webpage: About Us page included with appropriate content. 10 8-7 4-6 0-3
TASK 1 RUBRIC (CONTINUED) Levels of Achievement Feedback
In order to be awarded full marks for these elements of
Task 1, you need to have: Excellent Good Developing Poor
Score Ranges Per Level (½ marks possible)
Webpage: Our Work page included with appropriate content. 10 8-7 4-6 0-3
Webpage: Photo Gallery page included with appropriate content. 10 8-7 4-6 0-3
Webpage: Get Involved page included with appropriate content. 10 8-7 4-6 0-3
Webpage: Contact Us page included with appropriate content. 10 8-7 4-6 0-3
Design: Organisational branding is evident. 3 2 1 0
Design: Basic styling applied appropriately. 4 2 1-2 0
Acknowledgement of sources. 5 3-4 1-2 0
TASK 1 SUBTOTAL /100
Appendix B
Assessment Sheet (Marking Rubric)
MODULE NAME: MODULE CODE:
WEB DEVELOPMENT (INTRODUCTION) WEDE5010/d/p
STUDENT NAME:
STUDENT NUMBER:
TASK 2 RUBRIC Levels of Achievement Feedback
In order to be awarded full marks for these elements of
Task 2, you need to have: Excellent Good Developing Poor
Score Ranges Per Level (½ marks possible)
CSS: Appropriate use of inline, internal and external style sheets. 5 3-4 1-2 0
CSS: Choice of elements, colours and fonts is user-friendly and appropriate for the chosen NGO, NPO or cause. 10 8-7 4-6 0-3
CSS: Style sheets are consistently applied across all pages. 5 3-4 1-2 0
Styling: Homepage content is styled appropriately. 10 8-7 4-6 0-3
Styling: About Us page content is styled appropriately. 10 8-7 4-6 0-3
Styling: Our work page content is styled appropriately. 10 8-7 4-6 0-3
TASK 2 RUBRIC (CONTINUED) Levels of Achievement Feedback
In order to be awarded full marks for these elements of
Task 2, you need to have: Excellent Good Developing Poor
Score Ranges Per Level (½ marks possible)
Styling: Photo Gallery page content is styled appropriately. 10 8-7 4-6 0-3
Styling: Get Involved page content is styled appropriately. 10 8-7 4-6 0-3
Styling: Contact Us page content is styled appropriately. 10 8-7 4-6 0-3
Responsive Design: Responsive design is implemented correctly. 15 11-14 6-10 0-5
Acknowledgement of sources. 5 3-4 1-2 0
TASK 2 SUBTOTAL /100
Appendix C
Assessment Sheet (Marking Rubric)
MODULE NAME: MODULE CODE:
WEB DEVELOPMENT (INTRODUCTION) WEDE5010/d/p
STUDENT NAME:
STUDENT NUMBER:
POE RUBRIC Levels of Achievement Feedback
In order to be awarded full marks for these elements of the POE, you need to have: Excellent Good Developing Poor
Score Ranges Per Level (½ marks possible)
Photo gallery: fully-functional with navigation and captions. 10 8-7 4-6 0-3
Form processing: First form validation incorporated. 10 8-7 4-6 0-3
Google Form: Second Form created on Google Forms. 15 11-14 6-10 0-5
Google Form: Google Form embedded correctly. 15 11-14 6-10 0-5
Google Form: Screenshot of email notification sent on
Google Form submission. 15 11-14 6-10 0-5
POE RUBRIC (CONTINUED) Levels of Achievement Feedback
In order to be awarded full marks for these elements of the POE, you need to have: Excellent Good Developing Poor
Score Ranges Per Level (½ marks possible)
Google Form: Screenshot of captured responses provided. 10 8-7 4-6 0-3
Improvements: Student has provided evidence of improvements to previous tasks. 10 8-7 4-6 0-3
Reflection: Student has reflected deeply on their learning experience. 10 8-7 4-6 0-3
Acknowledgement of sources. 5 3-4 1-2 0
POE SUBTOTAL /100

WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

quality initiative project across a healthcare facility in Saudi Arabia

TO BE RE-WRITTEN FROM THE SCRATCH

Categories
Writers Solution

What is your perception of researchers and the role you believe they serve in the academic community?

For each DQ elaborate within 260-300 words. Use in text citations accordingly. Use scholarly reference(s) along with the one(s) attached as well. Use and cite references accordingly.

DQ 1) What is your perception of researchers and the role you believe they serve in the academic community? What kinds of mental and behavioral changes do you think you will need to make in order to become a successful researcher?

DQ 2) Many learners approach a doctoral program with great enthusiasm. However, enthusiasm and passion alone do not guarantee success. Often, learners want to begin the research process immediately without the proper skills in place to be successful. Although, passion is necessary, it is important that all learners develop a plan of action to be successful. All learners must make a transition from being a student completing assignments to being a self-directed researcher. This requires students to be self-motivated, to engage in reflective scholarly practice, and to be receptive to feedback and critique from peers and faculty.

How might these three practices support your development of a doctoral identity and help you meet the academic expectations for doctoral learners? What potential challenges to do you foresee with incorporating these practices into your routine? What adjustments will you need to make to overcome these challenges? *(This response does not require research support.)

References:

GCU Doctoral Research: The Purposeful Path to a Successful Dissertation

Ames, C., Berman, R., & Casteel, A. (2018). A preliminary examination of doctoral student retention factors in private online workspaces. International Journal of Doctoral Studies13, 79-106. doi:10.28945/3958

https://lc.gcumedia.com/webbooks/gcu-doctoral-research-the-purposeful-path-to-a-successful-dissertation/v4.1/#/home

Grit, Growth Mindset, and Deliberate Practice in Online Learning

Read:

McClendon, C., Neugebauer, R. M., & King, A. (2017). Grit, growth mindset, and deliberate practice in online learning. Journal of Instructional Research6, 8-17. doi:10.9743/jir.2017.2

https://files.eric.ed.gov/fulltext/EJ1153307.pdf

A Preliminary Examination of Doctoral Student Retention Factors in Private Online Workspaces

Read:

Ames, C., Berman, R., & Casteel, A. (2018). A preliminary examination of doctoral student retention factors in private online workspaces. International Journal of Doctoral Studies13, 79-106. doi:10.28945/3958

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services What is your perception of researchers and the role you believe they serve in the academic community?

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

did Women’s Studies emerge in the academic community? Why are Women’s Studies programs inherently interdisciplinary?

Women’s Studies emerged in the academic community in conjunction with the second-wave feminist movement whose goal was to bring women from different backgrounds together and to become more knowledgeable of their experiences. The academic discipline of Women’s Studies started during the 1970s and it observes women’s lives from around the world. It focuses on how gender interconnects with other differences such as disability, class, age, ethnicity, race, and sex-orientation. Women’s studies is an interdisciplinary field and it examines gender as a social and cultural construct, the social status and contributions of women, and the relationships between power and gender. Women Studies disciplines consist of history, politics, literature, theory, psychology, and sociology. Literature is one of the most important disciplines in Women’s Studies. We rediscovering of old texts and while trying to understand the symbolism in the writings so that the women’s point of view can not be ignored or lost by the males point of view and contesting sexism in mainstream literature. Old literature during the first wave of feminism that I really admired while taking me World Lit Class was “A Room of Ones Own”, by Virginia Woolf. She spoke of how the only way for a woman to thrive in society during that time was to have her own home and maintain her own finances. The only reason she was able to maintain her own way of life was because her Aunt had passed and left her money. However other women had to rely on the finances of men.

Project 4: System Development or Application Assurance

Start Here

It is critical that cybersecurity professionals be able to use all applicable systems, tools, and concepts to minimize risks to an organization’s cyberspace and prevent cybersecurity incidents. In this project, you will demonstrate your understanding of how to apply security principles, methods, and tools within the software development life cycle. You will also apply your knowledge of the cybersecurity implications related to procurement and supply chain risk management.

This is the fourth and final project for this course. There are 13 steps in this project. Begin below to review your project scenario.

Transcript

Competencies

Your work will be evaluated using the competencies listed below.

• 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

• 1.5: Use sentence structure appropriate to the task, message and audience.

• 2.4: Consider and analyze information in context to the issue or problem.

• 9.4: Software Security Assurance: Demonstrate secure principles, methods, and tools used in the software development life cycle.

• 9.5: Software Security Assurance: Describe the cybersecurity implications related to procurement and supply chain risk management.

Step 1: Assess Software Vulnerabilities

Project 2 outlined the steps involved to produce a final vulnerability and threat assessment, and Project 3 covered risk analysis and mitigation. Those assessments were across the entire enterprise and included numerous elements outside the realm of systems and technology. However, they did uncover opportunities for improvement in the application software processes.

For this step, return to the vulnerability and threat assessment from Project 2 and focus on all areas of application software that were itemized. Give additional thought to uncover software that perhaps did not make the list or were assumed to be secure and simply overlooked.

The assignment is to create a more comprehensive list of application software that could place the enterprise at risk of a breach, loss of data, loss of production, and/or loss of brand confidence.

The assessment should include the application of secure principles, development models such as the maturity model or integrated product and process development (IPPD), software development methods, libraries and toolsets used in the software development life cycle or systems development life cycle.

Use the Software Vulnerability Assessment Template to submit your results for feedback.

Submission for Project 4: Software Vulnerability Assessment

Previous submissions

0

Drop files here, or click below.

Add Files

In the next step, you will review your organization’s software procurement policy.  

Step 2: Review Software Procurement Policy

Upon completion of the software specific vulnerability assessment, conduct a review of the organization’s software procurement policies for software development methods.

Note that there is no submitted assignment for this step. Your review will be used in the submission for the following steps.

When the review is complete, move to the next step, where you will create a table or spreadsheet that lists recommended policies for software procurement that address certain questions or concerns.

Step 3: Create a Software Procurement Policy List

You’ve reviewed the organization’s policies for software development methods. Now it’s time to create a policy list for software procurement. The following are some sample questions to be included in a software procurement policy:

• Does the vendor provide any cybersecurity certifications with the product?

• Does the vendor provide access to the source code for the product? Are there other security issues in source code to be addressed?

• What is the guaranteed frequency of security updates to be provided for the product?

• What is the implementation process for software updates/upgrades?

What are additional questions or concerns that should be included in the procurement process? Create a table or spreadsheet that lists recommended policies to properly address these questions or concerns.

Use the Procurement Policy Template to list the cybersecurity implications related to procurement and supply chain risk management and submit your results for feedback.

Submission for Project 4: Procurement Policy List

Previous submissions

0

Drop files here, or click below.

Add Files

In the next step, you will generate assurances or controls to address each of the policy issues identified here.

Step 4: Document Relevant Software Acceptance Policies

Now that the procurement policies have been identified in the previous step, what assurances or controls should be established as policy that would evaluate the security implications during the software acceptance process? The objective is to provide a one-page overview of security testing that would be included in the acceptance of a vendor’s application.

The next step in this project will document the actual testing and validation. This step is simply to verify the congruence between the procurement process and acceptance process. In other words, do the procurement policies establish the correct cyber security framework for software purchase and do the acceptance policies match?

In considering the security implications of the in the software acceptance phase of the development cycle, use the Software Acceptance Policy Template to document recommended tests and assurances for the procurement policies identified in the previous steps.

Submit your results below for feedback.

Submission for Project 4: Software Acceptance Policy

Previous submissions

0

Drop files here, or click below.

Add Files

In the next step, you will research software testing and validation.

Step 5: Research Software Testing and Validation Procedures

Based on the software acceptance policies created in the previous step, consider what testing and validation procedures could be used to assure compliance.

Note that there is no submitted assignment for this step. You will submit the final list of recommended testing and validation procedures in the next step.

Step 6: Document Software Testing and Validation Procedures

You’ve completed the research, and it is now time to create testing and validation procedures that follow a specific process to assure compliance. The key to the success of this step is to document exact procedures to be followed by a testing team prior to installation.

At a minimum, the procedures should address the following questions:

• What are potential vulnerabilities inherent in the application platform?

• How well does the vendor document preventive measures built into the application?

• Are there alternative solutions provided by the vendor or in the application in case of a breach?

• What additional safeguards can be added to ensure the security of the software environment?

The testing and validation procedures should address each of these concerns.

The executive team will want to see specific steps for the testing team to follow as the team members complete the tests and assurances you recommended in the previous step.

Document your specific testing and validation recommendations from a cybersecurity policy standpoint in the Test Script Procedures Template and submit for feedback.

Submission for Project 4: Test Script Procedures

Previous submissions

0

Drop files here, or click below.

Add Files

In the next step, you will consider procedures for upgrading software.

Step 7: Review Software Upgrade Procedures

In the last step, you documented testing and validation requirements. In this step, it’s important to review software upgrades. Installation of a software upgrade has similar, yet unique requirements from the previous steps. In most enterprise environments, software updates and upgrades follow a specific change management routine. However, complete reliance on this procedure can lead to unintended oversight of cybersecurity issues. The change management process is generally focused on detecting errors and the auditing and logging of changes in the operational environment after the upgrade has been performed.

From the cyber perspective, this is not enough. As demonstrated in previous steps, significant effort is required to ensure a secure environment, not just an operational one. The question to be answered is “when” should the upgrade be performed during an application or system change. Should it be performed multiple times during the update?

Think through this issue thoroughly and make notes on your thought process. It is important that the risk analysis associated with an application or system change is conducted at the optimal time.

Note that there is no submitted assignment for this step. However, the research and corresponding notes related to this step will be applicable to the final report for Maria and the other executives. When this is complete, move to the next step, where supply chain risks will be considered.

Step 8: Review Supply Chain Risks

Following the previous steps relative to the supply chain and previous projects, it is time to thoroughly review risk within the supply chain.

Like many companies, your organization is dependent on a supply chain, so the software development process must include a supply chain risk management (SCRM) plan to minimize the impact of supply chain-related risks on business operations and the security of the infrastructures and data.

Note that there is no submitted assignment for this step. The identified supply chain risks will be reported in the next step.

Step 9: Document Supply Chain Risks

After review, it’s time to document supply chain risks. This portion of the overall report requires a two- to three-page narrative that addresses the following supply chain concerns:

1. Describe cybersecurity implications related to the procurement process.

2. Provide recommendations that would address these concerns.

3. Include appropriate supply chain risk management practices.

Where appropriate, cite references to support the assertions in the recommendations and conclusion.

Submit your report on supply chain concerns here for feedback.

Submission for Project 4: Supply Chain Cyber Security Risk Report

Previous submissions

0

Drop files here, or click below.

Add Files

Then, move to the next step, in which you will consider how the procedures of acquisition, procurement, and outsourcing line up in the organization.

Step 10: Consider Alignment Issues

Based on the review and recommendations on the supply chain described in the previous step, consider how well the policies and procedures regarding the acquisition, procurement, and outsourcing of software in your organization are aligned.

Outline a strategic approach to getting all the functions in alignment. There is no submission for this step. The alignment recommendations will be submitted in the next step.

Step 11: Develop an Acquisition Alignment Report

Keeping the alignment issues in mind from the previous step, prepare a one-page plan to align acquisition, procurement, and outsourcing of software applications for the enterprise. This should be a strategic approach to getting all the functions in alignment. Start with a request for information, proceed through acquisition, testing, and implementation, and finish with ongoing maintenance of the application.

All the work has been done in the previous steps. This step is designed to “bring it all together” in one easy-to-understand approach. The approach will be used in the final step to complete the supply chain analysis with a mitigation plan as it applies to software acquisition and maintenance.

Submit your one-page plan to align acquisition, procurement, and outsourcing efforts with your organization’s information security goals here for feedback.

Submission for Project 4: Acquisition Alignment Report

Previous submissions

0

Drop files here, or click below.

Add Files

In the next step, you will consolidate all your work thus far.

Step 12: Consolidate Your Work

The acquisition plan alignment is complete. For this exercise, collate all the material presented in the previous steps into a cohesive presentation that describes the entire software risk analysis processes and articulates specific supply chain cybersecurity threats and the technologies and policies that can be used to mitigate them.

You will use your consolidated results in your final project submission in the next step.

Project 4: System Development or Application Assurance

Step 13: Write the Risk Analysis/Supply Chain Threats/Mitigation Report

Management is always interested in solutions, and Maria Sosa and the other executives at your company are no exception. In the case of cybersecurity, there are no absolute solutions to an ever-changing environment. However, there are steps to mitigation that might eliminate or minimize the results of certain vulnerabilities. This final step is to describe the mitigation strategies recommended as a result of all previous steps in the project.

The final report for the executive meeting should be five to seven pages, only one to two of which will have to be written in this step. The remainder is from all the previous steps in the project.

Use the Supply Chain Risk Mitigation Final Report Template to submit your specific testing and validation procedures.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

• 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

• 1.5: Use sentence structure appropriate to the task, message and audience.

• 2.4: Consider and analyze information in context to the issue or problem.

• 9.4: Software Security Assurance: Demonstrate secure principles, methods, and tools used in the software development life cycle.

• 9.5: Software Security Assurance: Describe the cybersecurity implications related to procurement and supply chain risk management.

Submission for Project 4: Supply Chain Risk Mitigation Final Report

Previous submissions

0

Drop files here, or click below.

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals did Women’s Studies emerge in the academic community? Why are Women’s Studies programs inherently interdisciplinary?

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

In your own words, what is academic integrity?

  1. In your own words, what is academic integrity?
  2. How might violations of academic integrity (plagiarism) impact: 
    1. You?
    2. The reputation of your program?
    3. The reputation of graduates from your schools?
    4. A potential employer? 

each question need to have 4-5 sentences for each question

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals.
  • In your own words, what is academic integrity?

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Explain why students with EBD are less successful on academic tasks than their peers. How does student motivation influence both instruction and learning?

 This assignment has three parts. All parts should be submitted in one document.

Part 1: Explain why students with EBD are less successful on academic tasks than their peers. How does student motivation influence both instruction and learning?

Part 2: Defend your position on the following statement: When curriculum and instruction are adapted or modified, it dilutes, or “dumbs-down,” the curriculum. Cite at least three peer-reviewed articles to help support your position.

Part 3: As a special education teacher, discuss some instructional modification options for students with EBD. In your response, choose any grade or content area ensuring to describe the classroom environment, your interactions as the teacher, and specifically how you would modify/adapt the curriculum, materials, classwork, and homework.

Length: 4-6 pages, not including title and reference page.

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery- primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. LO1 How does student motivation influence both instruction and learning

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG