Saturday
August 2, 2014

Homework Help: COM/220 RESEARCH WRITING

Posted by Anonymous on Thursday, February 18, 2010 at 10:50pm.

Can anyone help me or help me get started please?

ASSIGNMENTS
1. CheckPoint: Full-Sentence Outline
• Resources: Organizing Your Research Paper & Bias, Rhetorical Devices, and Argumentation
• Due Date: Day 4 [Individual forum]
• Review the criteria for full-sentence outlines in Organizing Your Research Paper on the student web page.
• Create a full-sentence outline that includes effective arguments and counterarguments to support your thesis. (Note: Outline only the body of your paper.) Remember to avoid bias and fallacies and to include rhetorical devices that strengthen your writing.
• Answer the following: Where did you place the most effective arguments in your paper? Explain your reasoning. How did you address counterarguments without weakening your own premise?
• Post the full-sentence outline as a Microsoft® Word attachment.
My Thesis statement
Even though most personal information is protected, identity is an easy crime to commit because personal information is easily accessible.


I plan to support my thesis with compelling arguments and counter arguments by looking for opposing viewpoints and finding evidence to refute them and I will examine the bold acts of Identity Theft from all sides. I am going to address any bias or fallacies that I may come across. I am going to find the strongest possible evidence to support my claims. I will take detailed notes during my research and give credit where it is due. My research will be credible and trustworthy. I will gather information from different types of sources and make sure the information is current. I will allow significant time for gathering my information and keep in mind that eighty percent of my paper should be my own thoughts and ideas. I will also remember that no more than twenty percent should consist of quotations.


Possible compelling arguments include: -- How easy it is to find personal information online -- People are willing to provide personal information online, on the phone, and in person without knowing who is asking for the information.
Possible compelling counterarguments include: -- Many companies provide protection for their customers and would lose business if every customer became a victim of identity theft -- Some people choose not to provide their personal information because they want to protect themselves from identify theft.

Answer this Question

First Name:
School Subject:
Answer:

Related Questions

COM 220 - Can anyone help me or help me get started please? ASSIGNMENTS 1. ...
COM/220 RESEARCH WRITING - Can anyone help me or help me get started please? ...
research writing - Create a full-sentence outline that includes effective ...
COM 220 - • Create a full-sentence outline that includes effective arguments and...
English - Can someone tell me if this is right for 1. CheckPoint: Full-Sentence ...
com 220 - Bias Rhetorical Devices and Argumentation found in the speech Citizen ...
English - Teen Pregnancy • Create a full-sentence outline that includes ...
research writing - In what ways are full-sentence outlines more beneficial than ...
moore - Construct a full-sentence outline. · Develop visuals to strengthen the ...
Research Writing - What examples of rhetorical devices did you hear in the ...

Search
Members