How many search results were returned

Assignment Help Management Information Sys
Reference no: EM131231142

Description of Topic

This worksheet explores the online resources available from Drexel University Libraries (https://library.drexel.edu/). It will give you hands-on experience in searching, evaluating, and annotatingappropriate references.An annotated bibliography is a list of citations to scholarly research articles, books or book chapters, reports, newspaper or magazine articles, and textbooks. Each citation is followed by a brief summary (1-2 paragraphs) describing and evaluating the resource and its relevance to your topic. The primary purpose of the annotation is to inform readers of the relevance, accuracy, and quality of the sources.

NOTE: Writing an annotation is NOT copying or paraphrasing the abstract or summary of the resource. It must be your original work and it must show that you have critically read and reflected on the resource!

Library Lab

Requirements:Complete the worksheet (below) and include 2 annotated references in either APA or MLA format.

Summon is a Drexel University library search tool that allows you to find high-quality resources that are available online. In this worksheet, you'll explore some features of Summon and create two annotated references on an informatics topic of your choosing.

Question

Step 1: Pick a domain of informatics that you find interesting (e.g. medicine, business, law, music, sports, education, entertainment, etc.). Your search terms should reflect the topic you are interested in; e.g., if the domain of your interest is medicine, you might be interested in electronic health records or some other healthcare information systems. Your search terms should reflect this interest, e.g., "electronic health records systems medicine".

What is the domain you'll be focusing on for this assignment? What search terms might be useful for this topic?

Step 2: Go to this URL and watch the video (~5 min.) on "Using Summon to access library resources".
https://www.youtube.com/watch?v=v-H8vDTcEk4

Step 3: Go to the library homepage (https://www.library.drexel.edu/) and enter your search term(s)from Step 1 into the Summon search box that appears in the center of the page.

How many search results were returned?

Are you happy with the initial results you got? Why or why not?

Step 4: Out of this initial set of results, your goal is to find 2 scholarly articles (full text) thatwill be useful in helping you understand your chosen domain of informatics in greater depth. Use one or more techniques that you learned from the Summon video (i.e. narrowing by ). Keep track of the steps you are taking to narrow your results.

Describe the steps you took to refine your search results (e.g. any filters you applied, sorting, etc.). How many results were returned in each step? Did you have to refine your search terms to get additional results? If yes, what new search terms did you use?

Step 5: Select 2 scholarly articles that help you understand your chosen domain in greater depth. This may require browsing or skimming through several articles - do not simply pick the first two search results! Note: to view the full article you will be prompted to enter your Drexel Email Username (e.g. xyz28) and your Password. Your authorization to view electronic resources will remain in place until you close your browser.

What are the titles of the 2 articles you found? How did you choose them out of your list of results?

Step 6: Read the 2 articles and create an annotated bibliography. Remember, each citation (in APA or MLA format) is followed by a brief summary (1-2 paragraphs) describing and evaluating the resource and its relevance to your topic. The primary purpose of the annotation is to inform readers of the relevance, accuracy, and quality of the sources. You can find several examples of annotated bibliographies at: https://owl.english.purdue.edu/owl/resource/614/03/.

Reference no: EM131231142

Questions Cloud

What were the challenges with the decision : Do you get the impression that GE was concerned about the fact that they had infringed Fonar's patents? Why - what were two or three "take home" messages for you about the importance of patents?
Explain how you have categorized each given example : Explain how you have categorized each example. Explain how using each kind of rhetorical appeal (refer to your specific examples) helps King make his argument.
Discuss one of items on your preliminary hazards list : Discuss one of the items on your Preliminary Hazards List and explain your reasoning for hazard determination.
Design a compressed air energy storage system for a wind : Repeat part 1, but assume that the wind turbine is located near a landfill where low Btu gas can be obtained for free. Compare this option with the design in part a, where the gas has to be purchased at $5 per 1000 standard ft3.
How many search results were returned : Describe the steps you took to refine your search results (e.g. any filters you applied, sorting, etc.). How many results were returned in each step? Did you have to refine your search terms to get additional results? If yes, what new search terms..
What is your preferred style of conflict resolution : What is your preferred style of conflict resolution? Which style do you use for backup? When do you switch from your preferred style to your backup style and why?
Explain leadership effectiveness in different contexts : To compare and explain leadership effectiveness in different contexts. Compare two leaders that you have followed or observed, or that you are currently following or observing. Discuss the leadership effectiveness of each of the two leaders
Derive an expression for the linear battery model power : Tabulate the dimensional power function with a spreadsheet and then plot it. At what point is the maximum nondimensional power achieved?
Fair labor standards act : The Fair Labor Standards Act (FLSA) The Fair Labor Standards Act (FLSA) specifies employee rights, including minimum wage and overtime pay. Students often work in unpaid internships, and employers are not obligated to comply with the FLSA if the stud..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Security considerations

Your manager is quite impressed with the security considerations you explained to her thus far; however, she asks that you give further thought to additional security measures where possible, and to develop a memo citing those additional safeguards. ..

  Write research paper about data communication

Write research paper about Data Communication

  Until recently hur jae-hoon could end debate with junior

until recently hur jae-hoon could end debate with junior staff members just by declaring that the discussion was over.

  Compare the productivity of the two nursing units

analyze and compare the productivity of the two nursing units with respect to: - Adjusted Nursing Hours per Adjusted Discharge.

  Technology and the it fieldwith the advent of new

technology and the it fieldwith the advent of new innovative technologies is there proof to support that it is becoming

  Describe the nature of information system you have selected

Describe the nature of the information system you have selected. Describe the organization that owns and maintains the information system. Describe the existing business process that this system will address.

  Create a risk assessment matrix for the integration

Assignment: Create a risk assessment matrix for the purchase and integration of six new web servers for a start-up Internet firm

  How can the problem of overenthusiastic demand forecasts

How could sales force automation affect salesperson productivity, marketing management, and competitive advantage and should every company become a customer-focused business - What are several e-business applications

  Examine the influence of web-based information

Examine the influence of web-based information on global citizenship and multicultural understanding. Then, compile a list of three factors you believe should be considered when evaluating Internet sources for use in researching information

  What is the relationship between supply chain management

what is the relationship between supply chain management and knowledge management and how do they both relate to

  Compare the six core processes in the sdlc

Compare the six (6) core processes in the SDLC. Give your opinion on which one you believe is the least important in developing software, and explain why. Give your opinion on which one you believe is the most important in developing software, and..

  Determine what cyber security metrics are important

Using academic research materials determine what Cyber Security Metrics are and which ones are most important to an Information Security team at an institution of higher education such as the University of Cincinnati

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd