What search engines or databases might you use and why

Assignment Help Computer Engineering
Reference no: EM131814793

Assignment: Researching Scenarios

Throughout the course of your academic career, you will be asked to conduct research to support the assertions you make in papers, presentations, and projects. Sometimes getting at the material you will need is fairly straightforward, while other times the research process forces you to get a little creative in seeking out (and finding) the types of source material that will be most useful to you. This exercise will allow you to practice conducting different types of searches.

Choose two of the following scenarios. For each scenario you choose, answer each component as clearly and completely as possible.

1. You are writing up your weekly responses for your COM106 course and want to respond to a classmate who discusses the need to use social media in a job search. You are not familiar with this phrase.

1. Describe what sort of search you would conduct to help you in responding to this student and why. What search engine(s) or database(s) might you use and why? What search terms? How would you go about evaluating the credibility of the information you found?

2. Please share three search results you found after conducting this search that you think would be the most helpful in responding to your fellow student. Give a brief summary of the content of each source and describe why you think it would be appropriate to use in this particular context.

2. You are going to be writing a research paper for your ENG101 class on a social issue of your own choosing. You know that you have always been interested in the role addiction plays in the problem of homelessness, but you are not sure what credible research is available to support this connection.

1. What sort of search might you conduct to help you get the information you seek and why?

2. A search that deals with multiple components sometimes requires a few tries to get at the appropriate information. What keywords or combinations of keywords might help you find the relevant information here? Be sure to include details regarding how you might represent these words within the actual search box (using quotation marks, "and," "or," etc.)

3. Please share three search results you found after conducting this search that you think would be the most helpful in supporting this connection. Give a brief summary of each source and describe why you think it would be appropriate to use in this particular context.

3. You are putting together a presentation on the benefits of sports in the lives of children for your COM180 course. You think that your presentation would be much stronger if you were able to argue against some of the opposition to your point of view, although you are unsure where to find information that opposes your stance.

1. What sort of search might you conduct to help you get the information you seek and why?
2. How will you ensure that the sources you use are credible and reliable?
3. Please share three search results you found after conducting this search that you think would be the most helpful in supporting the opposition's point of view. Give a brief summary of the content of each source and describe why you think it would be appropriate to use in this particular context.

Compile your responses in a 2-3-page paper in Microsoft Word. Clearly cite your sources. Since we do not cover APA format until Module 2, you do not need to use any specific citation format, but you must identify where you found any information you use in your response.

Reference no: EM131814793

Questions Cloud

Create a summary report on an information systems : Create a summary report on an Information Systems technology current event that has impacted a business decision or served prominently .
Research the best practices for developing usable interface : Building a user interface that meets the needs of a diverse population can be incredibly difficult.
What are project closure activities : What are project closure activities and why are they important in project management?
Correcting errors in a trial balance : Correcting errors in a trial balance The following trial balance of Josh Maddy Tutoring Service at May 31, 2016, does not balance.
What search engines or databases might you use and why : What search engine(s) or database(s) might you use and why? What search terms? How would you go about evaluating the credibility of the information you found?
What are some professional organizations : What are some professional organizations that might be of benefit to healthcare administrators?
Overall characteristics for the position being offered : What happens if the response is not exactly what the hiring manager wanted to hear yet the potential employee exhibits great overall characteristics.
Getting paid for the hours worked : Do you think that there are benefits to be salary as opposed to being hourly and only getting paid for the hours worked?
Analyzing accounting errors in given case : Analyzing accounting errors Beth Rothman has trouble keeping her debits and credits equal. During a recent month, Beth made the following accounting errors.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Create a pivottable based on the sales data in the range

create a pivottable based on the sales data in the range a6k15 on the quarter3 worksheet. place the pivottable report

  What are ids and ips

A client of yours is concerned about external intrusion on their corporate network, and those inside their environment that they seek to fire! As a group, complete the following: What are IDS and IPS? What can they protect them against

  Program prompts the user to input three numbers

Write the program that prompts the user to input three numbers. The program should then output the numbers in ascending order.

  What is throw-way model

What is Throw-way model

  How various 8-letters password are possible

Repeat steps 1 and 2 using an encryption alphabet that includes 26 uppercase letters, 26 lowercase letters, and digit 0 through 9.

  Describe three different specific malware instances

Describe three different specific malware instances, with specific real life impact. What is the worst that can happen in these three instances? Defenses

  How the owners of the site will be able to generate revenue

Select a domain name, decide where the site will be hosted, and provide a detailed rationale for the choices made. Determine how the owners of the site will be able to generate revenue (i.e., which e-commerce models can be used)

  Building a simple memory and co-ordination toy

This assignment is concerned with building a simple memory and co-ordination toy using the STM32F3 Discovery board. The initial sequence will show 3 LEDs

  Describe the steps necessary to configuring validation

Describe the steps necessary to configuring validation and revocation so that the validation requests are handled efficiently.

  How to increase scara system security in advance way

Writing research paper of 3 to 4 pages. How to increase SCARA system security in advance way and taking examples to increase the SCADA system security?

  Discuss application to meet the information protection needs

What access control technique should be built into the application to meet the information protection needs

  Security issues while users processing the database

Describe the security issues which may be encountered when the multiple users process the database concurrently.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd