Reference no: EM131017581
Historical site visit and research paper
The purpose of this assignment is to teach you how to prepare to visit an historic site and to acquaint you with a Tennessee historic site.
The paper is due in course D2L Dropboxby midnight, April 6, 2016.ABSOLUTELY NO LATE PAPERS ACCEPTED!!!
Paper requirements: 3-5 pages in length, meaning full text and not including title page, headers, and reference page. You must have at least onescholarly journal orbook that is properly used in the text as a citation and listed on the reference page in proper APA or MLA format.Websites are not accepted for citations!
• Your assignment is to visit one of the following historical sites in Middle Tennessee and to write a paper on your visit experience, answering the questions listed on this page but not limited to those questions.. Choose ONE site from the following list. You may propose alternatives to the Professor, but you must have approval.
• Your paper must also includes documentation of your visit, such as a picture that you took during your visit or a scanned admission ticket.
Historic sites:
• Stones River National Battlefield
• The Hermitage-home of President Andrew Jackson
• The Carter House, Franklin, TN
• Carnton Mansion, Franklin, TN
• Fort Negley, Nashville, TN
• Sam Davis Home, Smyrna, TN
• Shiloh National Military Park
• Old Stone Fort State Park, Manchester
• James K. Polk House, Columbia
• Rhea County Courthouse, Dayton
• Belle Meade Plantation, Nashville
• Rippavilla Plantation, Spring Hill
Questions to address:
1. How you prepared for the visit (readings, etc.)
2. A description of the historic site
3. What makes this site so historic and what are the most important aspects of the site?
4. Your impressions of the site: what were you most impressed by, were you surprised by what you learned, etc.
5. Would you recommend visiting this site to a friend-why or why not?
6. Why should this site continue to be preserved for future generations?
Describe file system and metadata thorough clear and concise
: Describe file system and metadata thorough, clear, and concise. How is metadata used in the file system (a) File Allocation Table (FAT) 32, (b) New Technology File System/Master File Table (NTFS/MFT), and (c) i-Node file system [Hint: Dr. Scoggins..
|
Describe how truman doctrine was relevant to the cold war
: Describe how the Truman Doctrine and the Marshall Plan were relevant to the Cold War in terms of the Iron Curtain, the Berlin Airlift, Asia and Iran. Base your research on Source Documents;
|
What is the opportunity cost for zerbia
: Suppose that Zerbia is currently producing at point D on this PPF. What is the opportunity cost for Zerbia of producing one additional unit of consumer goods? In your answer make sure you provide a numeric value as well as the units of measurement..
|
Write an essay proposal for african music history
: Write an essay proposal for African Music History. The desscription of African music. Described the earlist Africa music and how does it start. How did the music change in these years?
|
What are the most important aspects of the site
: What makes this site so historic and what are the most important aspects of the site? Your impressions of the site: what were you most impressed by, were you surprised by what you learned, etc.
|
Write a program for ijvm called scramble
: Write a program for IJVM called scramble that takes lowercase text from input and prints the next character (i.e. ‘b' is printed as ‘c') and uppercase text and prints the character before (‘B' is printed as ‘A'). Print all other characters as is.
|
Compare the tax advantages of debt versus equity capital
: Use the Internet and Strayer databases to research the advantages and disadvantages of debt for capital formation versus equity for capital formation of a corporation. Prepare a formal letter to the client using the six (6) step tax research proce..
|
What is contained in the payload of the packet
: After the VPN server receives a positive reply from server T, the VPN server will tell program Z that Alice is a legitimate employee. Then program Z will send out the message to the VPN server. When the message leaves program Z, what is contained ..
|
Professional judgment in context feature
: Inherent risk at the financial statement level relates to (a) business and operating-related risks and (b) financial reporting risks.The Professional Judgment in Context feature, "Risks Associated with Financial Statement Misstatements,
|