Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Impact of AI on Education and Employment

Assignment 2: Annotated Bibliography
Hide Assignment Information

Turnitin™

This assignment will be submitted to Turnitin™.

Instruction
s

Overview

Create an annotated bibliography of four sources that could be used for
your research project, including at least two articles from scholarly
journals.

Grading

This assignment is worth 210 points (21%) of your final course grade.

Earning the maximum possible score on this assignment will require
students to:

Step 1: complete all assigned essay components and answer reflection
questions in the initial submission (earning up to 85% of the possible
points)

Step 2: revise and resubmit the essay and complete revision reflection
questions (earning up to 15% of the possible points)

To see required components and associated points in the assignment
rubric, please view this assignment through the Assignments area of the
classroom and scroll to the bottom.

Due Dates

The deadline for initial submission of this assignment is the end of Week 4
(Tuesday, 11:59 PM Eastern).

The revision and revision reflection will be due seven days after receiving
feedback on your initial submission or as specified by your instructor.

Connection to other Course Assignments

• The annotated bibliography is part of your research project,
which examines a current issue or event in the news from
the perspective of your field of study.

• The annotated bibliography builds on your work from the
first few weeks of class selecting an appropriate topic and
then developing a more focused research question.

• The annotated bibliography contributes to the research
project by helping you collect and analyze your sources.

As you complete the tasks required for this assignment, you will be
working toward several of the course outcomes:

• Identify valid and reliable sources that can be used in the
composition of a research paper (Course outcomes 1 and 2)

• Explain the nature of selected sources and their relevance
of sources to the research paper (Course outcome 2)

• Set up an annotated bibliography in APA format (Course
outcome 5)

• Demonstrate accurate grammar and mechanics in writing
(Course outcome 5)

Step 1: Initial Submission (earn up to 85% of the possible points for the
assignment)

Your initial submission should include all of the following components:

Sources

Four sources related to your research question, including at least two from
scholarly journal articles. All four sources should be high-quality sources

that you can use in your research project. Refer to Week 3: Selecting
Sources Wisely. You may decide to use some or all of the sources that you
posted in Week 3, Discussion 1: Identifying and Evaluating Sources.

Content and Organization

Include your name and a title that reflects your topic at the top of the first
page.

Below the title, indicate your research question.

Following the explanations in the week 4 learning resources [The
Annotated Bibliography (videos) and the Sample Annotated Bibliography],
create an annotated bibliography of four sources. For each source, include:

• Reference citation in APA forma
• Annotation of 150 ±25 words, formatted in a single paragraph, with

• summary
• evaluation
• use

You may (but do not have to) use CiteFast to create your reference
citations. If you use CiteFast, be sure to check for accuracy and make any
necessary corrections.

Language Choices

• As a writer, you are free to decide how you use language, keeping
the following in mind:

• style: your language choices should result in a consistent
writing style that is purposeful and aligned with your goals

• readability: your language choices should ensure that your
ideas are clear and easy to follow

• When composing your assignment, think about the conventions for
academic writing, including:

• punctuation: this includes things such as recommended use
of commas, colons, and apostrophes.

• word-level accuracy: this includes things such as
capitalization, spelling, word-tense, and usage.

• sentence-level accuracy: this includes things such as
sentence boundaries, subject-verb agreement, and
pronoun-antecedent agreement.

• Take time to review your language choices after you’ve drafted your
assignment. Think about your goals for the style of this writing and
your own writing habits (like using “text-speak,” omitting
capitalization, or writing sentence fragments). Revise as necessary to
accomplish your style and readability goals.

• Reading your writing aloud is a helpful technique when reviewing
your language choices for style and readability.

Length and Format

Each annotated bibliography entry begins with a reference citation in APA
format, followed by a single-paragraph annotation of 150 +/- 25 words
(125-175 words each). The entire completed assignment should be at least
600 words.

Order the references alphabetically, according to the first words of the
reference citations.

Incorporate these elements of APA style:

• Use one-inch margins.
• Double space.
• Use an easy-to-read font between 10-point and 12-point.
• Format reference citations with a hanging indent.

A title page is not required, but make sure you include your name and a
title that reflects your topic at the top of the first page.

Reflection Questions

The reflection questions are to be answered separately. Post these in the
“comments” box when submitting your assignment. You can number your
answers or write them in paragraph form. Be sure to address all four
questions.

1. Aside from simply meeting the requirements, what were your
personal goals for this assignment?

2. When reviewing your language choices, what choices did you
make to approach your goals for staying within or moving
beyond conventions for academic writing? To what degree did
the Grammar Lab content impact the choices you made?

3. What parts of your work on this assignment are you most
proud of?

4. What challenged you in this assignment and/or where do you
need additional support from your instructor?

Step 2: Revise and Resubmit (earn up to 15% of the possible points for the
assignment)

Students who want to earn the up to the maximum possible score can
choose to complete the following revision and revision reflection
components of the assignment.

• Revise your assignment based on feedback from your instructor,
your peers, and/or your own writing goals. In your revision, track the
changes from your first draft so that your instructor can easily
identify where you made revisions. Submit your revised essay as a
file in this assignment folder.

• Use strikethrough to indicate areas that should be deleted.
• Use bold-face to indicate areas where you are adding

content.

• Complete a revision reflection. The reflection questions are to be
answered separately and posted in the “comments” box when
submitting your revised assignment. You can number your answers
or write them in paragraph form. Be sure to address all three
questions.

• Which areas of feedback did you choose to address in
your revised version and why?

• How did you address this feedback in your revised
version?

• Which areas of feedback did you choose not to address
in your revised version and why?

  • Assignment 2: Annotated Bibliography

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Wk4_300

Need help with a question. Due 3/10/2025 @ 9PM n the Week 4 labs, you performed tasks such as creating a cluster, restoring files, configuring account lockout policies, and verifying RAM usage.  Note: Ensure you have completed all lab exercises from Week 4 before completing this assessment. Assessment Details Write a 350-

Event Khusus dan Promosi di Witching Pot

“Saya sangat puas dengan pengalaman taruhan di situs ini. Setiap elemen, dari navigasi hingga pembayaran, berjalan dengan mulus. Ini menunjukkan profesionalisme dan kualitas layanan mereka. Saya pasti akan kembali lagi!”

Business/computer

Isolation Discussion Thread: Cybersecurity — Layering-Abstraction-Process Isolation The NSA has identified what they call the First Principles of cybersecurity. The following lists three of these: Principle Last Name Starts With Layering A through H Abstraction I through Q Process Isolation R through Z For your discussion, describe the principle assigned

D 3 of 459

 Building Block Technologies    What is an operational technology?  How is it similar or different than Consumer IoT? What emerging risks can you identify for an operational technology in a hypothetical utilities distribution monitoring & control environment (pipelines & transmission grids)?

D 2 of 459

  Follow the attach document to complete this work. Questions: 1. Consumer Internet of Things (IoT) has become ubiquitous and represents a major vector of cyber risk. Provide examples of consumer IoT that may be found in your own home (not sharing exact details is OK) 2. Provide a high

D 1 of 459

Follow the attach document to complete this work. Building Block Technologies   1. Software, Hardware, and Network Communications are considered building block technologies for enterprises. Define what they are, how they are used and give an example. 2. What are the most notable cyber risks for each type of building block?

D 8 0f 360

Follow the attach document to complete this work. International Cooperation for Cybersecurity   Prepare a 5- to 7-paragraph briefing statement that explains why wealthy nations and developing nations should work together to improve cybersecurity for the globally connected networks referred to as “the Internet.” Your statement should address the following.

D 7 of 360

Follow the attach document to complete this work. Policy Soup: Dealing with the Aftermath of a New Cybersecurity Policy   Prepare a 5 to 7 paragraph “Expert Opinion” for local government officials. This document should present a strategy for communicating with residents about a new “cybersecurity” policy that requires a

D 6 of 360

Follow the attach document to complete this work.  Partnerships for Improving State and Local Government Cybersecurity   Before you begin, read this report:  National League of Cities ( ) (Click the Download Report link at the bottom of the page) Prepare a briefing statement (3 to 5 paragraphs) for a group

D 5 of 360

Follow the attach instruction to complete this work. Background Briefing: How will the Governor’s Initiatives Improve Cybersecurity for the State’s Critical Infrastructures?   Discussion we transition from federal to state critical infrastructure. You are working for the Chief of Staff (CoS) for a newly elected Governor. The governor asked the

D 4 of 360

Follow the attach instruction to complete this work. Panel Presentation: Privacy Impact Assessments (PIA)  Coordinators of an upcoming conference, attended by federal government IT managers and staff, invited you to participate in a panel presentation about privacy. For this activity, prepare a 5 to 7 paragraph briefing statement which answers

Proj4-final

Project 4: Postmigration Activities  Step 1: Postmigration Activities Overview  Like any software development project, migration projects require careful planning to ensure success. This planning includes the postmigration testing and maintenance phase. Start this project by researching and planning the  postmigration activities that will be required to get BallotOnline’s migrated workloads in

Discussion-4

Discussion: Postmigration Approaches and Activities Contains unread posts Now that you have completed BallotOnline’s cloud migration, you will discuss the cloud postmigration activities and approaches. You should cover the following areas: · What is the business impact after the migration? · How will you manage service-level agreements in the cloud?

D 3 of 360

Follow the attach instructions to complete this work. How does FedRAMP help agencies ensure that Digital Government services are secure?   Must post first. Subscribe The format for your week 3 discussion is a backgrounder (“briefing paper”). Background papers are summaries of issues provided to help decision-makers/leaders/managers make decisions. Decision-makers

D 2 of 360

Follow the attach document to complete this work.  Briefing Statement: Security Implications of OPEN Data   Representatives from the  Joint Committee on Cybersecurity and Information Technology have asked you to provide a briefing as part of their “Cyber Scholars Day.” The committee is sponsoring this day of briefings and outreach for

D 1 of 360

Follow the attach document to complete this work. Growing Reliance on Digital Government Services   Your 1 discussion short paper assignment is to write a  workplace newsletter article. As you work on this type of discussion item, think about the newsletters you receive in your workplace. Are they engaging? Do they

Week 3 Discussion: PUMP Versus PMBOK® Guide Approach

I put the links to both the text and the PMBOK Guide, it is through my school library so it may not come up without my login at the botton of the instructions also in bold letters is the information to both the course text and the guide please let

wk 9 distance edu

PLEASE SEE IF YOU CAN LOOK UP THE READING IN THE FILE PORTION, I WAS NOT ABLE TO PULL IT UP UNFORTUNATELY!  After reading “Applying “Design Thinking” in the Context of Media Management EducationLinks to an external site.,” think about all aspects of learning online: activities, workload, faculty-to-learner communication, and