SlideShare une entreprise Scribd logo
1  sur  15
WRITING #3.0: RESEARCH PROSPECTUS
English 1302
Spring 2015
Synopsis of the Task.
The final major writing tasks of the semester are all connected,
so this third piece of writing is
the starting point for your fourth and fifth papers as well. (See
“A Preview of Writings #4.0 and
#5.0” below.) Rather than being a formal written paper,
Writing #3.0 is a research
prospectus (or proposal) that will preview for me such issues as
what your research paper
(Writing #4.0) will be about, how you will go about it, and what
other scholars have already
said about the novel you are working with.
The prospectus should be at least 3 pages long, and it will
include a works cited page.
A Preview of Writings #4.0 and #5.0.
Writing #4.0 will be a research paper about a novel of your
choosing.
The paper will be at least six pages long (not counting the
works cited page or abstract) and
will use research methods appropriate to its central research
question. It will once again
utilize MLA citation format. After the projects are all turned
in, each student will give an oral
presentation to the rest of the class on the finding of his or her
work with the novel.
There are a good many options for a discourse such as the one
you will produce for Writing 4.0.
You will do an analysis of your selected novel, but how you go
about this is up to you. We will
discuss several different types of analysis and criticism that you
may wish to use. You may
choose one, or perhaps more than one of these to help frame
your analysis of the novel.
Regardless of what you choose to do, your paper will need to
follow these guidelines.
1. Be appropriate for the English 1302 audience.
2. Be unified around a research question or a research
thesis, rather than
simply reporting on several aspects of a topic.
3. Be “original” in that it attempts to discuss a topic that
has not already
rehashed again and again in print.
4. Be “research”—which will involve the use of one or more
of the
following: library sources (such as print or electronic sources),
historical
sources (such as past issues of newspapers and/or magazines),
surveys,
interviews, media sources, or other appropriate techniques.
Writing #5.0 will be your final examination. For it, I will draw
an essay examination question
from the research you have done for your novel analysis
(Writing #4.0). There will also be
another question on the final that will address the oral
presentations. In both cases, you will be
expected to prepare thorough notes, and to write an academic,
in-class essay response.
Components of the Prospectus (Writing #3.0)
Since this is a different sort of writing than most of you have
ever written, we will spend some
time talking about what a prospectus needs to be like. (For this,
we will follow a specific
handout and notes that we will cover in class. These will
specifically show the format for this
paper). Turning in a final copy of W 3.0 that is not in this
format will have a significant
negative impact on your grade.
Grading Rubric
Inquiry 10
Benefits for the Audience 10
Review of Literature 50
Alternate Source Material 10
Basis for Research 10
Tentative Schedule 5
Tentative List of Works to Be Used 5
The following will serve as the essential components of your
prospectus:
1. What is the central research question or thesis in the study?
2. What is so important about the question/thesis? (i.e., why is
it worthy of writing
about for the English 1302 audience?)
3. What have other scholars had to say about the central
research question you are
investigating? (This is also known as the “Review of the
Literature” section of a
prospectus.)
4. What do you plan as your methodology for the study?
5. What are your qualifications for carrying out this study?
6. What is your tentative schedule for completing this study?
Audience for the Prospectus.
Assume for the prospectus that you are writing directly to me
(consider me the “research
director” of the project). You’ll need to convince me of your
capabilities of carrying out this
project. What this means is that though I may be familiar with
the novel you choose, I may not
know the novel or the scholarship about it very well. Therefore,
you will have to be quite
specific so I am clear about what you are planning to do in the
paper.
Conference Work Week: A special feature of this paper will be
the conference work week.
During the final three days of class before turning this paper
(which will take place the week we
return from Spring Break) in class will function a little
differently than normal. We will still
meet in class, but each student will meet with me briefly for
about 5-7 minutes. Each student
will show me a copy of their rough draft and ask any questions
they might have. After that
meeting he or she will have the rest of the class time to work on
their self-evaluation sheet, their
prospectus, or a daily assignment. All other students will work
on their prospectus in class or a
daily assignment each day. I will pass out a conference
schedule for people to sign-up. If you
are present and have full participation during this week you will
receive 5 participation points for
each day and a bonus 5 for a total of 20 possible participation
points.
What to Turn In. You will need to turn in these items in your
folder: Complete Rough Draft,
Self-Evaluation Sheet, and Sources. As with the previous two
papers, your Final Copy will be
submitted via Blackboard.
Special Considerations. You are free to choose your own novel
for this paper, but it must be
approved by me. I will provide a list of pre-approved novels.
If you wish to do a novel outside
the list, then you must have it approved by me. If you work
with a novel I do not approve you
risk failing the paper. You will also have to find legitimate
academic sources for the paper.
Sources such as Wikipedia, and the various tutoring sites
(Grade Saver, Sparknotes, Shmoop)
will not be accepted. General dictionaries and encyclopedias
will also be exempt from use in the
paper. (Specialized encyclopedias will be allowed)
Evaluation of the Prospectus.
The following will be my criteria for evaluating Writing 3.0:
1. How clearly organized is the prospectus?
2. How thorough has the writer been in investigating what
he/she wants to study? Is the
presentation of the writer’s ideas convincing?
3. How specific are details about the content of the paper’s
potential sources, especially
in the review of literature section?
4. Has the self-evaluation sheet identified how these elements
have been discussed in
the prospectus?
5. How clear is the style?
6. How well-arranged are the sections: overall? Within
paragraphs?
7. How well-controlled is grammar, usage, spelling, and
punctuation?
Tentative Schedule for Writing 3.0
Wednesday, Mar 4: Discuss assignment sheet for W 3.0.
Discuss article summaries and
working with novels for research. For Friday: In CL read
1695-1720 and choose novel.
Friday, Mar 6: Check Novel Selection. Reading Quiz 6,
Discuss forms of criticism, Begin
discussion of prospectus handout and structure. For Monday:
Bring three source summaries to
class. In CL read sample literary analysis 92-96 and review
sample MLA style paper in RFW
527-532.
Monday, Mar 16: Prospectus Structure Quiz. Complete
discussion of prospectus handout
and structure, Discuss sample research paper. For Wednesday:
Bring three new source
summaries to class. Be ready for quiz over prospectus
structure.
Wednesday, Mar 18: Review Works Cited Page and paper
formatting. Test 3. For Friday:
Conferences Begin
Friday, Mar 20: Conferences.
Monday, Mar 23: Conferences
Wednesday, Mar 25: Conferences
Friday, Mar 27: W 3.0 Due. Begin work on W 4.0
WRITING #3.0: RESEARCH PROSPECTUSEnglish 1302
This semester you will find yourself working on a project
consisting of three online forum discussions and a paper. These
4 items carry 30% of your grade.
Form groups ranging in sizes from 2 to 5 people first.
Create a FICTIONAL company that provides a unique service
(please keep all ideas PG), but is facing problems.
o This company can provide personal outer-space tours, create
sunblock for vampires, or be unicorn ranchers even.
o Use an idea that keeps this project from feeling tedious and
boring, thus losing details in the process of creating it.
Discussion specifics will be listed in the discussions
themselves.
Paper specifics:
· Describe IN DETAIL each required component. In order
to receive max credit, ALL QUESTIONS should be answered.
· Document should be at least 2 pages long.
· Cite ALL SOURCES with in-text citations and an MLA
work’s cited page.
What you will need to cover:
Why do you need an IS?
Create a business process modeling notation diagram (BPMN)
to explain your company’s business activities. Insert the image
IN YOUR DOCUMENT.
What operating systems will this system work with?
Who will use this IS (department, positions, etc.)?
How much will it cost? (Hint: Research IS prices or consider
how much each of the five components will cost to purchase,
acquire, and train plus the cost of the developer’s fees).
Will this IS create information silos? If yes, how will your
company overcome these issues?
How long will it take to train people to use this IS?
How easy is it to use?
What are your company’s requirements for it? (Hint: Answers
will vary for this question greatly; some companies require the
IS to be within a specific price range while sacrificing features,
while others have specific design details that must be included.)
What type of DBMS will it need? Something simple, like
Microsoft Access, or something expensive, like Oracle?
How will this system be connected to your workplace’s
network? By wired means? Wirelessly? Or both?
How will you keep the network secure?
Is the system a PIS, WIS, EIS, or IIS?
Could your system include a social media application? If yes,
what features would it include? If no, why not?
How will you keep this system secure? (Hint: This is not the
same as network security.)
What method of installation will be used to implement this new
system (Pilot, Plunge, Phased, or Parallel)?
What are some of the greatest risks faced with the creation and
implementation of this system?
What kind of software will you need? Horizontal, vertical, or
one-of-a-kind applications?
Could you use open-source software? For what?
How long do you feel you will be able to use this system?
Frozen yogurt has become such a huge market with very many
different business all with there own twist.. We decided to come
up with a frozen yogurt shop with our own little twist. Our twist
is we want to mix frozen yogurt and soft served ice cream. We
came up with the name K.E.J.J. standing for the first initial of
our first names of each member of our business. For our
business to be successful we need an information system.
Information systems can improve our efficiency which will
improve our productivity as well as keep us organized.
Based on the size and uniqueness of our business we decide the
most efficient operating system would be windows. We decided
on ios because it is the only operating system compatible with
apple products. By using ios it is compatible with the Revel.
The Revel is our cash register and also contains our point of
sale system, which would be used by employees and managers.
We looked into an information silos but decided against it
because right now its not necessary. Our business consists of
only one shop, if we do well we do plan to extend our business
and then we may have to make changes to our operating system
and maybe adding an information silos.
Starting a business requires many pieces of hardware, software,
training, and maintenance. Within our business we are using an
actual frozen yogurt POS system, off-the-shelf software called
Revel. Revel software comes equipt with Master control,
payment encryption, digital currency integration, creditcard
software, employee scheduling, payroll management, loyalty
programs, pre-configured hardware, split-bill features, social
media integration, enterprise reporting, mobile device
management, and Revel systems APL. This software will be
used through an ipad and on our touch screen interface, which is
through IOS and will cost $119 per month. The hardware itself
will bought separately and multiple pieces will need to be
bought. We will need a Epson Readyprint ™ 2011 receipt
printer($177.10), an Elo 2200L 22 inch touch screen monitor
with anti-glare($870.70), 50 rolls of BCI receipt paper to start
off with($54.30), an APG Vasario 1616 cash drawer that is
compatible with apple/ipad and IOS products($135.10), a
Verifone mx850 payment terminal/credit card reader with a
signature pad($525.30), and a Brecknell 6720U scale with
internal cables($536.80). Each piece of hardware is unique to
the business and will be needed in order to run K.E.J.J
successfully. The installation will be done by a hired technician
and it will cost $2,300 to install. The hired technician would be
installing a parallel system to help implement the new system
because when we expand it will be easy to implement another
new system to our existing system. The greatest risk we would
face when implementing a new system would be a limited
portion of business if we went with the pilot system.
Maintenance per year on this system will range at about
roughly 500 dollars.This interface and software are relatively
easy to use and should take no more than two days for
employees to learn with videos and hands-on training. We will
hire around 13-15 employees and all 4 of our group members
are managers. Each employee will be paid minimum wage and
will be paid for training as well. For 15 employees with 6 hours
of training each it will cost $787.50 to train our employees with
the software and technology in place. Altogether the cost of this
POS system will cost $7,314.80. Our budget for the store was
$30,000-$40,000, so our POS system falls nicely in place.
Today, there is no singular thing more important than security,
and small businesses are no exception. A security that may be
overlooked by a small business is the security of your network.
Not having a secure network can hurt not only your business,
but also yourself and other employees. There is a wealth of vital
information in a business’s database, and there are people that
have the ability to break into and steal information from the
database simply by parking nearby where they can receive
network signal if it is not secured properly. The good news is
there are many ways to ensure your network is secure, and that
any vital information pertaining to your business is safe. In
David Strom’s “10 Tips to Secure Your Small Business
Network” he discusses 10 ways to make sure that your network
remains safe from potential threats.
Using an encryption on any and all wireless access points is key
to protecting sensitive information. If a wireless network is
open, anyone can gather and record sensitive information
(Strom). Leaked sensitive information about a business and its
employees can be a big problem. Employee information such as
full names, social security numbers, and birthdays are often
stored in a business’s database for legal purposes and it is
supposed to remain confidential. If somebody can break into
your network and retrieve this information, they can use it for
crimes such as identity theft. If you are looking for the best
encryption method to keep your network safe, use a WPA2
encryption because it is by far the best method and cannot be
easily broken into (Strom).
Strom also advises that you hide your SSID, or service set
identifier. He goes on to say that you should change the ID to
something that makes it unclear who owns the network. If you
have an ID that is something as specific as “Business Name
Network” then anybody can identify that network as yours and
they will know which network would be best to attempt
breaking into to get sensitive information. Strom suggests using
names such as “wireless” or “router1” as they are not specific
and no critical information is given away.
Another thing that should be done is having the admin default
password changed and have access from outside the network
disabled. This’ll help make sure nobody else can come in and
change your settings or read your log files (Strom). Also,
making sure all PCs are using antivirus and antispyware
protection (Strom). Viruses can be nasty and since they are
inside the system there is no restrictions on what they can and
cannot get access to. This can lead to sensitive information
getting deleted or leaked out to the public or the individual that
put the virus in the system.
VPNs, or Virtual Private Networks, are great for securing your
network as well. VPNs allow employees to access a company’s
intranet when they are away from the office in a safe and secure
manner. This also can be used if you have multiple offices in
different geographic locations. Regular off-site backups are also
important for securing network security as they provide a safety
net for your business. Start with making copies of your key
customer and business data, and then make sure you cover your
personal files (Strom). This way you can still recover
everything that is essential in case something drastic happens
that deletes vital information on the database.
To help expand our business what better way to get our name
out there then social media? We are setting up a facebook
twitter and instagram, as well as creating an app for iphone and
android users that allows you to rapid order. With having social
media accounts we want to offer free wifi. Wan wireless allows
more people to connect to one access point. Where for our cash
register and managers computers they would be hooked up to a
wired network. A wired network allows immensely high speeds,
incredibly long cables that are still really cheap, play and plus;
usually no faffing around with settings. The software we are
using for managers computers is “horizontal-market application
this software provides capabilities common across all
organizations and industries. Word processors, graphic
programs, spreadsheets, and presentation programs are all
horizontal-market application software.” (page 86) Where our
Revel comes with a built in application software. We are also
going to used a closed source secure software that wouldn't
need to be modified for our computers. We also feel we can use
this system for an extended period of time, but it is also based
on our growth as a company.
Based on Porters five forces we focused on the competitive
force aspect we believe this force is more important because we
are trying a new product. We are most worried about
competition from vendors of substitutes. Having a mix of both
frozen yogurt and soft served ice cream we have two big
competitors. Both of these competitors have large amounts of
vendors. The other two forces won’t really impact us right now
because we are a unique business. If our business does well,
than competition of substitutes won’t affect us as much as
competitors and rivals. Considering frozen yogurt is such a big
market with so many vendors are uniqueness will let our
business stand out from our competitors. We believe our
business could do very well and encourage a new product in the
market.
Citations:
"Wired vs. Wireless - Security vs. Speed | ZDNet." ZDNet.
Web. 9 Apr. 2015. <http://www.zdnet.com/article/wired-vs-
wireless-security-vs-speed/>.
Kroenke, David M. <i>Experiencing MIS</i>. 4th ed. Upper
Saddle River, N.J.: Pearson Prentice Hall, 2013.
39,63,95,123,152. Print.
"10 Tips to Secure Your Small Business Network."
Computerworld. Web. 9 Apr. 2015.
<http://www.computerworld.com/article/2547589/networking/10
-tips-to-secure-your-small-business-network.html>.
"Search: Category: Point of Sale Systems, Software: Intuit Pro."
Category: Point of Sale Systems, Software: Intuit Pro. Web. 9
Apr. 2015.
<http://www.barcodesinc.com/p/subcategory=Point_of_Sale_Sy
stems/Software=Intuit_Pro/>.
"Point-of-Sale System Basics for Retailers." Entrepreneur. 26
May 2005. Web. 9 Apr. 2015.
<http://www.entrepreneur.com/article/77960>.
WRITING #3.0  RESEARCH PROSPECTUS English 1302  Spring 20.docx

Contenu connexe

Similaire à WRITING #3.0 RESEARCH PROSPECTUS English 1302 Spring 20.docx

Unit Two Writing in a FieldEssay two builds on some of the sam.docx
 Unit Two Writing in a FieldEssay two builds on some of the sam.docx Unit Two Writing in a FieldEssay two builds on some of the sam.docx
Unit Two Writing in a FieldEssay two builds on some of the sam.docxaryan532920
 
WRITING 4.0 Documented Inquiry Project Novel Analysis E.docx
WRITING 4.0  Documented Inquiry Project Novel Analysis E.docxWRITING 4.0  Documented Inquiry Project Novel Analysis E.docx
WRITING 4.0 Documented Inquiry Project Novel Analysis E.docxericbrooks84875
 
Academic Research_and_Writing by Dr. Sam Ang Sam
Academic Research_and_Writing by Dr. Sam Ang SamAcademic Research_and_Writing by Dr. Sam Ang Sam
Academic Research_and_Writing by Dr. Sam Ang SamChormvirak Moulsem
 
Steps to project_proposal
Steps to project_proposalSteps to project_proposal
Steps to project_proposalChilela Paulus
 
SOCI 403 Social ChangeAmerican Public University SystemWri.docx
SOCI 403 Social ChangeAmerican Public University SystemWri.docxSOCI 403 Social ChangeAmerican Public University SystemWri.docx
SOCI 403 Social ChangeAmerican Public University SystemWri.docxjensgosney
 
6Writingessays
6Writingessays6Writingessays
6WritingessaysJoe Osborn
 
WritingAssignment#4TheMultiple-SourceSynthesisEssay.docx
WritingAssignment#4TheMultiple-SourceSynthesisEssay.docxWritingAssignment#4TheMultiple-SourceSynthesisEssay.docx
WritingAssignment#4TheMultiple-SourceSynthesisEssay.docxjeffevans62972
 
Assignment 1 write an ORIGINAL brief essay of 300 words or mo.docx
Assignment 1 write an ORIGINAL brief essay of 300 words or mo.docxAssignment 1 write an ORIGINAL brief essay of 300 words or mo.docx
Assignment 1 write an ORIGINAL brief essay of 300 words or mo.docxdeanmtaylor1545
 
Guideline for dissertation
Guideline for dissertationGuideline for dissertation
Guideline for dissertationsarala ruban
 
Running head LITERATURE REVIEW INSTRUCTIONS 1PAPER II METHO.docx
Running head LITERATURE REVIEW INSTRUCTIONS 1PAPER II METHO.docxRunning head LITERATURE REVIEW INSTRUCTIONS 1PAPER II METHO.docx
Running head LITERATURE REVIEW INSTRUCTIONS 1PAPER II METHO.docxjeanettehully
 
Running head LITERATURE REVIEW INSTRUCTIONS 1PAPER II METHO
Running head LITERATURE REVIEW INSTRUCTIONS 1PAPER II METHORunning head LITERATURE REVIEW INSTRUCTIONS 1PAPER II METHO
Running head LITERATURE REVIEW INSTRUCTIONS 1PAPER II METHOMalikPinckney86
 

Similaire à WRITING #3.0 RESEARCH PROSPECTUS English 1302 Spring 20.docx (14)

Unit Two Writing in a FieldEssay two builds on some of the sam.docx
 Unit Two Writing in a FieldEssay two builds on some of the sam.docx Unit Two Writing in a FieldEssay two builds on some of the sam.docx
Unit Two Writing in a FieldEssay two builds on some of the sam.docx
 
WRITING 4.0 Documented Inquiry Project Novel Analysis E.docx
WRITING 4.0  Documented Inquiry Project Novel Analysis E.docxWRITING 4.0  Documented Inquiry Project Novel Analysis E.docx
WRITING 4.0 Documented Inquiry Project Novel Analysis E.docx
 
AUS_COM_204_Research_Paper
AUS_COM_204_Research_PaperAUS_COM_204_Research_Paper
AUS_COM_204_Research_Paper
 
Academic Research_and_Writing by Dr. Sam Ang Sam
Academic Research_and_Writing by Dr. Sam Ang SamAcademic Research_and_Writing by Dr. Sam Ang Sam
Academic Research_and_Writing by Dr. Sam Ang Sam
 
Steps to project_proposal
Steps to project_proposalSteps to project_proposal
Steps to project_proposal
 
SOCI 403 Social ChangeAmerican Public University SystemWri.docx
SOCI 403 Social ChangeAmerican Public University SystemWri.docxSOCI 403 Social ChangeAmerican Public University SystemWri.docx
SOCI 403 Social ChangeAmerican Public University SystemWri.docx
 
Annotated Assignment Sheet
Annotated Assignment SheetAnnotated Assignment Sheet
Annotated Assignment Sheet
 
6Writingessays
6Writingessays6Writingessays
6Writingessays
 
WritingAssignment#4TheMultiple-SourceSynthesisEssay.docx
WritingAssignment#4TheMultiple-SourceSynthesisEssay.docxWritingAssignment#4TheMultiple-SourceSynthesisEssay.docx
WritingAssignment#4TheMultiple-SourceSynthesisEssay.docx
 
Milestone Exercise for Eng 102
Milestone Exercise for Eng 102Milestone Exercise for Eng 102
Milestone Exercise for Eng 102
 
Assignment 1 write an ORIGINAL brief essay of 300 words or mo.docx
Assignment 1 write an ORIGINAL brief essay of 300 words or mo.docxAssignment 1 write an ORIGINAL brief essay of 300 words or mo.docx
Assignment 1 write an ORIGINAL brief essay of 300 words or mo.docx
 
Guideline for dissertation
Guideline for dissertationGuideline for dissertation
Guideline for dissertation
 
Running head LITERATURE REVIEW INSTRUCTIONS 1PAPER II METHO.docx
Running head LITERATURE REVIEW INSTRUCTIONS 1PAPER II METHO.docxRunning head LITERATURE REVIEW INSTRUCTIONS 1PAPER II METHO.docx
Running head LITERATURE REVIEW INSTRUCTIONS 1PAPER II METHO.docx
 
Running head LITERATURE REVIEW INSTRUCTIONS 1PAPER II METHO
Running head LITERATURE REVIEW INSTRUCTIONS 1PAPER II METHORunning head LITERATURE REVIEW INSTRUCTIONS 1PAPER II METHO
Running head LITERATURE REVIEW INSTRUCTIONS 1PAPER II METHO
 

Plus de ericbrooks84875

Fundamentals of Risk and InsuranceEmmEtt J. Vaughan • .docx
Fundamentals of Risk and InsuranceEmmEtt J. Vaughan   •   .docxFundamentals of Risk and InsuranceEmmEtt J. Vaughan   •   .docx
Fundamentals of Risk and InsuranceEmmEtt J. Vaughan • .docxericbrooks84875
 
Fungi reproduce ___________________________ by fragmentation, buddin.docx
Fungi reproduce ___________________________ by fragmentation, buddin.docxFungi reproduce ___________________________ by fragmentation, buddin.docx
Fungi reproduce ___________________________ by fragmentation, buddin.docxericbrooks84875
 
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docx
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docxFull-Circle LearningMyLab™ Learning Full Circle for Mar.docx
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docxericbrooks84875
 
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docx
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docxFunctional Behavior Assessment ExampleStudent NameInes SalazarD.docx
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docxericbrooks84875
 
Functional Requirements Document TemplateVersionDescription .docx
Functional Requirements Document TemplateVersionDescription .docxFunctional Requirements Document TemplateVersionDescription .docx
Functional Requirements Document TemplateVersionDescription .docxericbrooks84875
 
Fully answer any ONE of the following essay questions1.  Is the.docx
Fully answer any ONE of the following essay questions1.  Is the.docxFully answer any ONE of the following essay questions1.  Is the.docx
Fully answer any ONE of the following essay questions1.  Is the.docxericbrooks84875
 
Fully answer any ONE of the following essay questions1.  Is t.docx
Fully answer any ONE of the following essay questions1.  Is t.docxFully answer any ONE of the following essay questions1.  Is t.docx
Fully answer any ONE of the following essay questions1.  Is t.docxericbrooks84875
 
From the weeks chapter reading, we learn from the authors that,.docx
From the weeks chapter reading, we learn from the authors that,.docxFrom the weeks chapter reading, we learn from the authors that,.docx
From the weeks chapter reading, we learn from the authors that,.docxericbrooks84875
 
FTER watching the videos and reviewing the other materials in this.docx
FTER watching the videos and reviewing the other materials in this.docxFTER watching the videos and reviewing the other materials in this.docx
FTER watching the videos and reviewing the other materials in this.docxericbrooks84875
 
fter completing the reading this week, we reflect on a few key conce.docx
fter completing the reading this week, we reflect on a few key conce.docxfter completing the reading this week, we reflect on a few key conce.docx
fter completing the reading this week, we reflect on a few key conce.docxericbrooks84875
 
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docxFS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docxericbrooks84875
 
Fromm’s concept of the syndrome of decay included three personality .docx
Fromm’s concept of the syndrome of decay included three personality .docxFromm’s concept of the syndrome of decay included three personality .docx
Fromm’s concept of the syndrome of decay included three personality .docxericbrooks84875
 
From your readings in Chapter 4, choose one of the organizational sy.docx
From your readings in Chapter 4, choose one of the organizational sy.docxFrom your readings in Chapter 4, choose one of the organizational sy.docx
From your readings in Chapter 4, choose one of the organizational sy.docxericbrooks84875
 
From your daily briefs, Kaiser Health News Morning Briefing or P.docx
From your daily briefs, Kaiser Health News Morning Briefing or P.docxFrom your daily briefs, Kaiser Health News Morning Briefing or P.docx
From your daily briefs, Kaiser Health News Morning Briefing or P.docxericbrooks84875
 
From the perspective of the public safety field youre in, aspire to.docx
From the perspective of the public safety field youre in, aspire to.docxFrom the perspective of the public safety field youre in, aspire to.docx
From the perspective of the public safety field youre in, aspire to.docxericbrooks84875
 
From the following terms Orthodox Judaism, Hassidic Judaism.  Brief.docx
From the following terms Orthodox Judaism, Hassidic Judaism.  Brief.docxFrom the following terms Orthodox Judaism, Hassidic Judaism.  Brief.docx
From the following terms Orthodox Judaism, Hassidic Judaism.  Brief.docxericbrooks84875
 
From the end of Chapter 14, complete Discussion Question 3 What are.docx
From the end of Chapter 14, complete Discussion Question 3 What are.docxFrom the end of Chapter 14, complete Discussion Question 3 What are.docx
From the end of Chapter 14, complete Discussion Question 3 What are.docxericbrooks84875
 
From the e-Activity, take a position on this statement People that .docx
From the e-Activity, take a position on this statement People that .docxFrom the e-Activity, take a position on this statement People that .docx
From the e-Activity, take a position on this statement People that .docxericbrooks84875
 
From Chapter Seven How does horizontal growth differ from v.docx
From Chapter Seven How does horizontal growth differ from v.docxFrom Chapter Seven How does horizontal growth differ from v.docx
From Chapter Seven How does horizontal growth differ from v.docxericbrooks84875
 
From the e-Activity, determine the fundamental differences between t.docx
From the e-Activity, determine the fundamental differences between t.docxFrom the e-Activity, determine the fundamental differences between t.docx
From the e-Activity, determine the fundamental differences between t.docxericbrooks84875
 

Plus de ericbrooks84875 (20)

Fundamentals of Risk and InsuranceEmmEtt J. Vaughan • .docx
Fundamentals of Risk and InsuranceEmmEtt J. Vaughan   •   .docxFundamentals of Risk and InsuranceEmmEtt J. Vaughan   •   .docx
Fundamentals of Risk and InsuranceEmmEtt J. Vaughan • .docx
 
Fungi reproduce ___________________________ by fragmentation, buddin.docx
Fungi reproduce ___________________________ by fragmentation, buddin.docxFungi reproduce ___________________________ by fragmentation, buddin.docx
Fungi reproduce ___________________________ by fragmentation, buddin.docx
 
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docx
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docxFull-Circle LearningMyLab™ Learning Full Circle for Mar.docx
Full-Circle LearningMyLab™ Learning Full Circle for Mar.docx
 
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docx
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docxFunctional Behavior Assessment ExampleStudent NameInes SalazarD.docx
Functional Behavior Assessment ExampleStudent NameInes SalazarD.docx
 
Functional Requirements Document TemplateVersionDescription .docx
Functional Requirements Document TemplateVersionDescription .docxFunctional Requirements Document TemplateVersionDescription .docx
Functional Requirements Document TemplateVersionDescription .docx
 
Fully answer any ONE of the following essay questions1.  Is the.docx
Fully answer any ONE of the following essay questions1.  Is the.docxFully answer any ONE of the following essay questions1.  Is the.docx
Fully answer any ONE of the following essay questions1.  Is the.docx
 
Fully answer any ONE of the following essay questions1.  Is t.docx
Fully answer any ONE of the following essay questions1.  Is t.docxFully answer any ONE of the following essay questions1.  Is t.docx
Fully answer any ONE of the following essay questions1.  Is t.docx
 
From the weeks chapter reading, we learn from the authors that,.docx
From the weeks chapter reading, we learn from the authors that,.docxFrom the weeks chapter reading, we learn from the authors that,.docx
From the weeks chapter reading, we learn from the authors that,.docx
 
FTER watching the videos and reviewing the other materials in this.docx
FTER watching the videos and reviewing the other materials in this.docxFTER watching the videos and reviewing the other materials in this.docx
FTER watching the videos and reviewing the other materials in this.docx
 
fter completing the reading this week, we reflect on a few key conce.docx
fter completing the reading this week, we reflect on a few key conce.docxfter completing the reading this week, we reflect on a few key conce.docx
fter completing the reading this week, we reflect on a few key conce.docx
 
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docxFS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
FS-3FORD MOTOR COMPANY AND SUBSIDIARIESCONSOLIDATED INCO.docx
 
Fromm’s concept of the syndrome of decay included three personality .docx
Fromm’s concept of the syndrome of decay included three personality .docxFromm’s concept of the syndrome of decay included three personality .docx
Fromm’s concept of the syndrome of decay included three personality .docx
 
From your readings in Chapter 4, choose one of the organizational sy.docx
From your readings in Chapter 4, choose one of the organizational sy.docxFrom your readings in Chapter 4, choose one of the organizational sy.docx
From your readings in Chapter 4, choose one of the organizational sy.docx
 
From your daily briefs, Kaiser Health News Morning Briefing or P.docx
From your daily briefs, Kaiser Health News Morning Briefing or P.docxFrom your daily briefs, Kaiser Health News Morning Briefing or P.docx
From your daily briefs, Kaiser Health News Morning Briefing or P.docx
 
From the perspective of the public safety field youre in, aspire to.docx
From the perspective of the public safety field youre in, aspire to.docxFrom the perspective of the public safety field youre in, aspire to.docx
From the perspective of the public safety field youre in, aspire to.docx
 
From the following terms Orthodox Judaism, Hassidic Judaism.  Brief.docx
From the following terms Orthodox Judaism, Hassidic Judaism.  Brief.docxFrom the following terms Orthodox Judaism, Hassidic Judaism.  Brief.docx
From the following terms Orthodox Judaism, Hassidic Judaism.  Brief.docx
 
From the end of Chapter 14, complete Discussion Question 3 What are.docx
From the end of Chapter 14, complete Discussion Question 3 What are.docxFrom the end of Chapter 14, complete Discussion Question 3 What are.docx
From the end of Chapter 14, complete Discussion Question 3 What are.docx
 
From the e-Activity, take a position on this statement People that .docx
From the e-Activity, take a position on this statement People that .docxFrom the e-Activity, take a position on this statement People that .docx
From the e-Activity, take a position on this statement People that .docx
 
From Chapter Seven How does horizontal growth differ from v.docx
From Chapter Seven How does horizontal growth differ from v.docxFrom Chapter Seven How does horizontal growth differ from v.docx
From Chapter Seven How does horizontal growth differ from v.docx
 
From the e-Activity, determine the fundamental differences between t.docx
From the e-Activity, determine the fundamental differences between t.docxFrom the e-Activity, determine the fundamental differences between t.docx
From the e-Activity, determine the fundamental differences between t.docx
 

Dernier

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 

Dernier (20)

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 

WRITING #3.0 RESEARCH PROSPECTUS English 1302 Spring 20.docx

  • 1. WRITING #3.0: RESEARCH PROSPECTUS English 1302 Spring 2015 Synopsis of the Task. The final major writing tasks of the semester are all connected, so this third piece of writing is the starting point for your fourth and fifth papers as well. (See “A Preview of Writings #4.0 and #5.0” below.) Rather than being a formal written paper, Writing #3.0 is a research prospectus (or proposal) that will preview for me such issues as what your research paper (Writing #4.0) will be about, how you will go about it, and what other scholars have already said about the novel you are working with. The prospectus should be at least 3 pages long, and it will include a works cited page. A Preview of Writings #4.0 and #5.0. Writing #4.0 will be a research paper about a novel of your choosing. The paper will be at least six pages long (not counting the works cited page or abstract) and will use research methods appropriate to its central research question. It will once again utilize MLA citation format. After the projects are all turned in, each student will give an oral presentation to the rest of the class on the finding of his or her
  • 2. work with the novel. There are a good many options for a discourse such as the one you will produce for Writing 4.0. You will do an analysis of your selected novel, but how you go about this is up to you. We will discuss several different types of analysis and criticism that you may wish to use. You may choose one, or perhaps more than one of these to help frame your analysis of the novel. Regardless of what you choose to do, your paper will need to follow these guidelines. 1. Be appropriate for the English 1302 audience. 2. Be unified around a research question or a research thesis, rather than simply reporting on several aspects of a topic. 3. Be “original” in that it attempts to discuss a topic that has not already rehashed again and again in print. 4. Be “research”—which will involve the use of one or more of the following: library sources (such as print or electronic sources), historical sources (such as past issues of newspapers and/or magazines), surveys, interviews, media sources, or other appropriate techniques. Writing #5.0 will be your final examination. For it, I will draw an essay examination question from the research you have done for your novel analysis (Writing #4.0). There will also be
  • 3. another question on the final that will address the oral presentations. In both cases, you will be expected to prepare thorough notes, and to write an academic, in-class essay response. Components of the Prospectus (Writing #3.0) Since this is a different sort of writing than most of you have ever written, we will spend some time talking about what a prospectus needs to be like. (For this, we will follow a specific handout and notes that we will cover in class. These will specifically show the format for this paper). Turning in a final copy of W 3.0 that is not in this format will have a significant negative impact on your grade. Grading Rubric Inquiry 10 Benefits for the Audience 10 Review of Literature 50 Alternate Source Material 10 Basis for Research 10 Tentative Schedule 5 Tentative List of Works to Be Used 5 The following will serve as the essential components of your prospectus: 1. What is the central research question or thesis in the study? 2. What is so important about the question/thesis? (i.e., why is it worthy of writing
  • 4. about for the English 1302 audience?) 3. What have other scholars had to say about the central research question you are investigating? (This is also known as the “Review of the Literature” section of a prospectus.) 4. What do you plan as your methodology for the study? 5. What are your qualifications for carrying out this study? 6. What is your tentative schedule for completing this study? Audience for the Prospectus. Assume for the prospectus that you are writing directly to me (consider me the “research director” of the project). You’ll need to convince me of your capabilities of carrying out this project. What this means is that though I may be familiar with the novel you choose, I may not know the novel or the scholarship about it very well. Therefore, you will have to be quite specific so I am clear about what you are planning to do in the paper. Conference Work Week: A special feature of this paper will be the conference work week. During the final three days of class before turning this paper (which will take place the week we return from Spring Break) in class will function a little differently than normal. We will still meet in class, but each student will meet with me briefly for about 5-7 minutes. Each student will show me a copy of their rough draft and ask any questions they might have. After that
  • 5. meeting he or she will have the rest of the class time to work on their self-evaluation sheet, their prospectus, or a daily assignment. All other students will work on their prospectus in class or a daily assignment each day. I will pass out a conference schedule for people to sign-up. If you are present and have full participation during this week you will receive 5 participation points for each day and a bonus 5 for a total of 20 possible participation points. What to Turn In. You will need to turn in these items in your folder: Complete Rough Draft, Self-Evaluation Sheet, and Sources. As with the previous two papers, your Final Copy will be submitted via Blackboard. Special Considerations. You are free to choose your own novel for this paper, but it must be approved by me. I will provide a list of pre-approved novels. If you wish to do a novel outside the list, then you must have it approved by me. If you work with a novel I do not approve you risk failing the paper. You will also have to find legitimate academic sources for the paper. Sources such as Wikipedia, and the various tutoring sites (Grade Saver, Sparknotes, Shmoop) will not be accepted. General dictionaries and encyclopedias will also be exempt from use in the paper. (Specialized encyclopedias will be allowed) Evaluation of the Prospectus. The following will be my criteria for evaluating Writing 3.0:
  • 6. 1. How clearly organized is the prospectus? 2. How thorough has the writer been in investigating what he/she wants to study? Is the presentation of the writer’s ideas convincing? 3. How specific are details about the content of the paper’s potential sources, especially in the review of literature section? 4. Has the self-evaluation sheet identified how these elements have been discussed in the prospectus? 5. How clear is the style? 6. How well-arranged are the sections: overall? Within paragraphs? 7. How well-controlled is grammar, usage, spelling, and punctuation? Tentative Schedule for Writing 3.0 Wednesday, Mar 4: Discuss assignment sheet for W 3.0. Discuss article summaries and working with novels for research. For Friday: In CL read 1695-1720 and choose novel. Friday, Mar 6: Check Novel Selection. Reading Quiz 6, Discuss forms of criticism, Begin discussion of prospectus handout and structure. For Monday: Bring three source summaries to class. In CL read sample literary analysis 92-96 and review sample MLA style paper in RFW 527-532.
  • 7. Monday, Mar 16: Prospectus Structure Quiz. Complete discussion of prospectus handout and structure, Discuss sample research paper. For Wednesday: Bring three new source summaries to class. Be ready for quiz over prospectus structure. Wednesday, Mar 18: Review Works Cited Page and paper formatting. Test 3. For Friday: Conferences Begin Friday, Mar 20: Conferences. Monday, Mar 23: Conferences Wednesday, Mar 25: Conferences Friday, Mar 27: W 3.0 Due. Begin work on W 4.0 WRITING #3.0: RESEARCH PROSPECTUSEnglish 1302 This semester you will find yourself working on a project consisting of three online forum discussions and a paper. These 4 items carry 30% of your grade. Form groups ranging in sizes from 2 to 5 people first. Create a FICTIONAL company that provides a unique service (please keep all ideas PG), but is facing problems. o This company can provide personal outer-space tours, create sunblock for vampires, or be unicorn ranchers even. o Use an idea that keeps this project from feeling tedious and boring, thus losing details in the process of creating it.
  • 8. Discussion specifics will be listed in the discussions themselves. Paper specifics: · Describe IN DETAIL each required component. In order to receive max credit, ALL QUESTIONS should be answered. · Document should be at least 2 pages long. · Cite ALL SOURCES with in-text citations and an MLA work’s cited page. What you will need to cover: Why do you need an IS? Create a business process modeling notation diagram (BPMN) to explain your company’s business activities. Insert the image IN YOUR DOCUMENT. What operating systems will this system work with? Who will use this IS (department, positions, etc.)? How much will it cost? (Hint: Research IS prices or consider how much each of the five components will cost to purchase, acquire, and train plus the cost of the developer’s fees). Will this IS create information silos? If yes, how will your company overcome these issues? How long will it take to train people to use this IS? How easy is it to use? What are your company’s requirements for it? (Hint: Answers will vary for this question greatly; some companies require the IS to be within a specific price range while sacrificing features, while others have specific design details that must be included.) What type of DBMS will it need? Something simple, like Microsoft Access, or something expensive, like Oracle? How will this system be connected to your workplace’s network? By wired means? Wirelessly? Or both? How will you keep the network secure? Is the system a PIS, WIS, EIS, or IIS? Could your system include a social media application? If yes, what features would it include? If no, why not? How will you keep this system secure? (Hint: This is not the same as network security.)
  • 9. What method of installation will be used to implement this new system (Pilot, Plunge, Phased, or Parallel)? What are some of the greatest risks faced with the creation and implementation of this system? What kind of software will you need? Horizontal, vertical, or one-of-a-kind applications? Could you use open-source software? For what? How long do you feel you will be able to use this system? Frozen yogurt has become such a huge market with very many different business all with there own twist.. We decided to come up with a frozen yogurt shop with our own little twist. Our twist is we want to mix frozen yogurt and soft served ice cream. We came up with the name K.E.J.J. standing for the first initial of our first names of each member of our business. For our business to be successful we need an information system. Information systems can improve our efficiency which will improve our productivity as well as keep us organized. Based on the size and uniqueness of our business we decide the most efficient operating system would be windows. We decided on ios because it is the only operating system compatible with apple products. By using ios it is compatible with the Revel. The Revel is our cash register and also contains our point of sale system, which would be used by employees and managers. We looked into an information silos but decided against it because right now its not necessary. Our business consists of only one shop, if we do well we do plan to extend our business and then we may have to make changes to our operating system and maybe adding an information silos. Starting a business requires many pieces of hardware, software, training, and maintenance. Within our business we are using an actual frozen yogurt POS system, off-the-shelf software called Revel. Revel software comes equipt with Master control, payment encryption, digital currency integration, creditcard software, employee scheduling, payroll management, loyalty programs, pre-configured hardware, split-bill features, social
  • 10. media integration, enterprise reporting, mobile device management, and Revel systems APL. This software will be used through an ipad and on our touch screen interface, which is through IOS and will cost $119 per month. The hardware itself will bought separately and multiple pieces will need to be bought. We will need a Epson Readyprint ™ 2011 receipt printer($177.10), an Elo 2200L 22 inch touch screen monitor with anti-glare($870.70), 50 rolls of BCI receipt paper to start off with($54.30), an APG Vasario 1616 cash drawer that is compatible with apple/ipad and IOS products($135.10), a Verifone mx850 payment terminal/credit card reader with a signature pad($525.30), and a Brecknell 6720U scale with internal cables($536.80). Each piece of hardware is unique to the business and will be needed in order to run K.E.J.J successfully. The installation will be done by a hired technician and it will cost $2,300 to install. The hired technician would be installing a parallel system to help implement the new system because when we expand it will be easy to implement another new system to our existing system. The greatest risk we would face when implementing a new system would be a limited portion of business if we went with the pilot system. Maintenance per year on this system will range at about roughly 500 dollars.This interface and software are relatively easy to use and should take no more than two days for employees to learn with videos and hands-on training. We will hire around 13-15 employees and all 4 of our group members are managers. Each employee will be paid minimum wage and will be paid for training as well. For 15 employees with 6 hours of training each it will cost $787.50 to train our employees with the software and technology in place. Altogether the cost of this POS system will cost $7,314.80. Our budget for the store was $30,000-$40,000, so our POS system falls nicely in place. Today, there is no singular thing more important than security, and small businesses are no exception. A security that may be overlooked by a small business is the security of your network. Not having a secure network can hurt not only your business,
  • 11. but also yourself and other employees. There is a wealth of vital information in a business’s database, and there are people that have the ability to break into and steal information from the database simply by parking nearby where they can receive network signal if it is not secured properly. The good news is there are many ways to ensure your network is secure, and that any vital information pertaining to your business is safe. In David Strom’s “10 Tips to Secure Your Small Business Network” he discusses 10 ways to make sure that your network remains safe from potential threats. Using an encryption on any and all wireless access points is key to protecting sensitive information. If a wireless network is open, anyone can gather and record sensitive information (Strom). Leaked sensitive information about a business and its employees can be a big problem. Employee information such as full names, social security numbers, and birthdays are often stored in a business’s database for legal purposes and it is supposed to remain confidential. If somebody can break into your network and retrieve this information, they can use it for crimes such as identity theft. If you are looking for the best encryption method to keep your network safe, use a WPA2 encryption because it is by far the best method and cannot be easily broken into (Strom). Strom also advises that you hide your SSID, or service set identifier. He goes on to say that you should change the ID to something that makes it unclear who owns the network. If you have an ID that is something as specific as “Business Name Network” then anybody can identify that network as yours and they will know which network would be best to attempt breaking into to get sensitive information. Strom suggests using names such as “wireless” or “router1” as they are not specific and no critical information is given away. Another thing that should be done is having the admin default password changed and have access from outside the network disabled. This’ll help make sure nobody else can come in and change your settings or read your log files (Strom). Also,
  • 12. making sure all PCs are using antivirus and antispyware protection (Strom). Viruses can be nasty and since they are inside the system there is no restrictions on what they can and cannot get access to. This can lead to sensitive information getting deleted or leaked out to the public or the individual that put the virus in the system. VPNs, or Virtual Private Networks, are great for securing your network as well. VPNs allow employees to access a company’s intranet when they are away from the office in a safe and secure manner. This also can be used if you have multiple offices in different geographic locations. Regular off-site backups are also important for securing network security as they provide a safety net for your business. Start with making copies of your key customer and business data, and then make sure you cover your personal files (Strom). This way you can still recover everything that is essential in case something drastic happens that deletes vital information on the database. To help expand our business what better way to get our name out there then social media? We are setting up a facebook twitter and instagram, as well as creating an app for iphone and android users that allows you to rapid order. With having social media accounts we want to offer free wifi. Wan wireless allows more people to connect to one access point. Where for our cash register and managers computers they would be hooked up to a wired network. A wired network allows immensely high speeds, incredibly long cables that are still really cheap, play and plus; usually no faffing around with settings. The software we are using for managers computers is “horizontal-market application this software provides capabilities common across all organizations and industries. Word processors, graphic programs, spreadsheets, and presentation programs are all horizontal-market application software.” (page 86) Where our Revel comes with a built in application software. We are also going to used a closed source secure software that wouldn't need to be modified for our computers. We also feel we can use
  • 13. this system for an extended period of time, but it is also based on our growth as a company. Based on Porters five forces we focused on the competitive force aspect we believe this force is more important because we are trying a new product. We are most worried about competition from vendors of substitutes. Having a mix of both frozen yogurt and soft served ice cream we have two big competitors. Both of these competitors have large amounts of vendors. The other two forces won’t really impact us right now because we are a unique business. If our business does well, than competition of substitutes won’t affect us as much as competitors and rivals. Considering frozen yogurt is such a big market with so many vendors are uniqueness will let our business stand out from our competitors. We believe our business could do very well and encourage a new product in the market.
  • 14. Citations: "Wired vs. Wireless - Security vs. Speed | ZDNet." ZDNet. Web. 9 Apr. 2015. <http://www.zdnet.com/article/wired-vs- wireless-security-vs-speed/>. Kroenke, David M. <i>Experiencing MIS</i>. 4th ed. Upper Saddle River, N.J.: Pearson Prentice Hall, 2013. 39,63,95,123,152. Print. "10 Tips to Secure Your Small Business Network." Computerworld. Web. 9 Apr. 2015. <http://www.computerworld.com/article/2547589/networking/10 -tips-to-secure-your-small-business-network.html>. "Search: Category: Point of Sale Systems, Software: Intuit Pro." Category: Point of Sale Systems, Software: Intuit Pro. Web. 9 Apr. 2015. <http://www.barcodesinc.com/p/subcategory=Point_of_Sale_Sy stems/Software=Intuit_Pro/>. "Point-of-Sale System Basics for Retailers." Entrepreneur. 26 May 2005. Web. 9 Apr. 2015. <http://www.entrepreneur.com/article/77960>.