SlideShare a Scribd company logo
Students Name
Professor’s Name
Course
Date
What is APA style?
Is an American Psychological writing style developed in 1929
by social scientist to guide writing.
Writing style for academic documents such as journals, thesis
and books.
Consists of different rules and procedures to be observed during
writing.
Writers and publishers use uniform elements in writing such as
title page, paper citation, body presentation, punctuations and
abbreviations, presentation of numbers and statistics and many
others.
Writers and publishers can use the style purely or can modify it
to achieve given writing standards. The format has been
developed over the years to suit the growing needs of scientific
writing.
2
What is the need of APA style?
The style was developed due to the need of uniform scientific
reporting.
Uniformity and simplicity of the style enables users to be able
to read through the documents faster with ease.
It provides clarity in the academic works by preventing
language biasness.
The rules enables all facts and ideas to be disclosed without any
distraction in the writings.
The style enables writers to follow rules in their work thereby
making the writings consistent. Again, the style has a standard
language to be used by every scholar or publisher. For this
reason, the format enables accuracy in all academic writings.
3
General APA guidelines
The work should be typed and printed on a standardized white
paper of 8.5 x 11 inch per paper.
The document should have a 1 inch margin in both sides.
The beginning of all the paragraphs should be indented by
pressing Tab once or placing five spaces.(Lester et al. 35).
APA format recommends the use of 12 pt. of Times New
Romans font for clarity.
The paper uses single space after periods or punctuation marks
in every sentence.
The entire work is finally double spaced for clarity.
The general guidelines are set to ensure that all the work is
clear and presentable. This is important as scholars don’t strain
to read the information in the paper.
4
Grammar and Language in APA
The style encourages the use of active voice in all the writings
(Szuchman et al. 37).
The author should always use bias free language in the writings.
Writers must observe grammatical rules which include;
Avoiding dangling modifiers
Ensuring verbs and subject agreement
Avoid using linguistic devices such as clichés, alliteration and
rhyming words.
Use of correct spelling of words.
Avoid being redundant in the writing
The sentences should never begin with numbers.
Arthurs use less abbreviations in their work.
Observation of grammar rules enables the readers to get the
actual ideas of the writer. Again, the rules enables scholars not
to be confused as a result of usage of inconsistent words.
5
Title page
The title information should have a specific page.
It contains the heading, writers, and the institutional affiliation
of the scholar. (Szuchman et al. 159).
It includes the running head flushed to the right with the page
number flushed to the right. The format is as shown;
Running head: PAPER TITLE page number
Note that the paper title is in capital case while the running
head in in small caps.
All other pages have headings flushed to the right as shown
PAPER TITLE page number
The title page is important in providing the first impression of
the work. All the titles in the paper should be in the upper case
except the one used in the title page which contains both upper
and lower case caps. The main words should begin with upper
case while miner words begin with lower case.
6
Title page
The main characters in the title should begin in capital letters
while other words begin in small letters. (Szuchman and Lenore
91).
The information should be written in the middle of the page.
The heading should not be more than 12 words in length without
any abbreviations.
The authors name is typed below the title starting with the first
name, middle name(s) and the last name.
Institution affiliation is typed below the authors name.
All text in the title page should be double spaced.
The author’s name should not contain initials such as Dr., PHD.
And others. Besides, the institution affiliation is used to
indicate the place or facilities used by the aurthor to conduct
the academic research.
7
Abstract
The writing should have an abstract.
The abstract provide an overview of the paper. (Szuchman and
Lenore 74)
It should be between 75-100 words .
The abstract should be placed in it’s a different page after the
title page.
It should be headed “Abstract” at the center in the upper end of
the page.
The abstract should not be indented.
The abstract is used to show how the writer has organized the
work. Again, it can be used to provide the main words in the
paper.
8
Body
This part is always on a different section of the work.
The heading which is in both upper and lower case should
appear at the center of the first line (Swales et al. 53) .
The introduction follows the title.
Headings should be used to organize the work and show
important sections.
The author must in text the source documents used in the
writing.
Visual figures can be used to illustrate given points.
The body always starts on the third page. In case the author uses
visual figures and diagrams, they should be as simple as
possible to enable the reader to understand the work.
9
Paper Citation
All the materials used must be cited in the paper (Swales et al.
63).
If the writer directly quotes from a material, citation must
include the authors last name, year of publication and page of
the book as shown;
“APA style is often difficult to use,”(John, 2014, p. 35), as
students confuse it with other styles
Use paragraph numbers to cite online work with no page
numbers.
In case of long quotations, omit the quotation marks then write
the words indented from the left margin on a different section as
illustrated below;
John’s (2014) study concluded that:
Many first year scholars encounter many challenges in APA
formatting. However, with good practice, the students find the
style very easy to use as compared with others. For this reason,
most lectures encourage their learners to always use the style in
their work.
Scholars have to cite their work to prevent plagiarism.
Furthermore, citation is a way of recognizing and appreciating
other scholars work in the academic field.
10
Paper Citation Cont’
When a writer has summarized or paraphrased a given authors
work, the writers identity and period of publication is given as
shown;
According to John (2014), APA formatting style is difficult for
most first year students.
The page paraphrased can also be indicated but not a must.
Lectures always encourage students to use APA format in their
writings (John, 2014, p. 35).
In case the material has two authors, “&” is used to include both
names as shown;
Kennedy, G. C., & John, P. L. (2007). (Kennedy & John, 2007)
In case of three authors;
Maurice, K. A., Ken, E. L., & Vista, U. N. (2004).
First citation, (Maurice, Ken, & Vista, 2004)
Subsequent citations, (Maurice et al., 2004)
In citing a material published by two authors, always include
both names of the writers in every place. However, in case of
three authors, only use the three names of the writers in the first
citing.
11
Paper Citation Cont’
More than three authors is cited as;
Felix, B. C., Alfred, M., Mali, K., MacCleopas, R. T., & Vista,
M. (2004). Becomes, (Felix et al., 2004)
When citing materials from the internet, always use the last date
the material was revised by the writer.
In case no authors are included in the work, use the main words
of the title instead of the writer.
Use “n.d.” when the work has no date of formatting instead of
the date.
For example,
John and Kennedy (2014) give important concepts in APA
formatting style.
The APA style is one of the easiest formatting writing styles(
APA Style, n. d.).
12
References
Sources used should have a separate page at the end of the
work.(Szuchman et al. 84).
The page should be headed “Reference” in the middle of the
first line of the paper.
Every cited works must be provided at the reference.
References should be having hanging indentions.
The sources should be given in an alphabetic manner using the
last name of the first author.
Any sources apart from journal articles should have upper case
in the first letter of a title or a subtitle, first words of proper
nouns and letters after colon or a dash in the title.
The references enable the reader to be able to trace the facts in
the research done.
13
References Cont’
All the main words in the journal title should be in capital
letters (Szuchman et al. 143).
The titles of major materials should appear in italics.
Shorter works such as essays and some journals should not be
quoted or italicized.
Arthurs names should start with last names then other initials
follow.
In case the authors are more than six, list them then use “et al”
after the sixth writer.
14
References Cont’
Single authors; Last name first, followed by author initials. For
example;
John, K. (2014)…….
Incase of two authors , the writers names are given then & is
used between the names as shown;
Kennedy, S., & Abril, W. I. (2007)…………..
When the authors are an organization,
American Dentist Association. (2007)……
When the paper uses citations with no authors name, a writer
should use a shortened title of the work using the main words.
When two or more writings by the same author is given, the
scholar should list them following each other according to the
year of publication as shown,
John, J. K. (2008)…….
John, J. K. (2010)…….
References where authors have first similar names, the
subsequent names should be used to arrange the sources
alphabetically. Again, if the sources are from the same author in
the same year, they should be organized alphabetically in the
order of the article first word of the title.
15
References Cont’
The basic format for referencing books is given by (Szuchman
and Lenore 84);
writers last name and initials(Year of publication or editing).
Book heading. Place: printer
In case the book has been edited, it should contain the word
“ed.” At the end of the title.
Electronic references;
Web page,
Scholars name (Last date of edition). Title of resource. Web
address where the information was retrieved.
Online publications,
Author last name(s) and initials (last date of edition). Title of
material, Heading of the publication, volume number(edition
number). Date of retrieval, web page address
In case a author appears in a source document as a sole author
then as a main writer in a group of writers, then the single
author entry should be first. Besides, where, the authors
name(s) are not there but the editors name are given, the editors
last names and initials should be used.
16
Works Cited
Lester, James D., and James D. Lester. Writing research
papers: A complete guide. Pearson, 2012.
Swales, John M., and Christine B. Feak. Academic writing
for graduate students: Essential tasks and skills. Vol. 1.
Ann Arbor, MI: University of Michigan Press, 2004.
Szuchman, Lenore T., and Barbara Thomlison. Writing with
style: APA style for social work. Cengage Learning, 2010.
Szuchman, Lenore T. Writing with style: APA style made
easy. Cengage Learning, 2013.
Windows Network Proposal - Networking
You have been hired by Fixing Windows LLC as an Information
Technology consultant to develop a technology proposal. Fixing
Windows LLC manufactures and distributes solar panel for the
consumer market. Your job is to submit a proposal that meets
their criteria.
Current Implementation/Concerns:
· The company will have 3 locations (Los Angeles, Dallas, and
Houston) but are planning to grow rapidly due to high demand
in solar panels. Main staff will be at Dallas and Houston
offices.
· Data security is priority since patent and trademarks are at
stake.
· Los Angeles sales personnel will need secure remote access to
Houston office.
· The WAN connectivity is in place and it is not an issue. There
is ample bandwidth in place.
· Feel free to make other assumptions but they need to be noted
in the paper.
Topics to Cover:
Your document should cover the content presented in the
course. The outline below contains recommended points to
cover. You are free to add other related information.
Describe the technical and business reasons for each choice,
citing other resources as appropriate. The Windows Server 2016
operating system should be used for all aspects of the solution.
The topics include:
DNS and DHCP
· How had DHCP installation and authorization been
implemented?
· DHCP scope design (e.g., lease times, number of scopes,
address range)
· Will a form of DHCP fault tolerance be implemented?
· Will DHCP reservations be used for servers?
· How can IPAM be utilized?
· How will IPv6 be utilized?
· How will DNS be implemented?
· DNS Security
· How will DNS be handled for the second and third site?
· What namespace should Fixing Windows LLC implement?
· What types of zones needed?
File Services, DISTRIBUTED FILE SYSTEM (DFS) AND
BRANCHCACHE:
· How will the shares be secured?
· Will quotas be used? FSRM be configured?
· Will DFS be implemented?
Remote Services and NETWORK POLICY SERVER (NPS):
· What technology will be implemented to provide secure
remote access for users?
· Who should have remote access?
Discuss these other server 2016 Networking concepts:
· HIGH PERFORMANCE NETWORK SOLUTIONS
· SOFTWARE-DEFINED NETWORKING (SDN)
Submission Requirements:
There are specific requirements for the assignment: The final
submission should contain at least 6 pages’ worth of text
written by the student (not counting title page, images,
diagrams, tables, or quotations), but may be longer, not to
exceed approximately 10 pages’ worth of student-supplied text.
(With the required diagram, and other images, title page, etc.,
the final submission may end up being more than 10 pages in
length.) It must be double-spaced, have 1-inch margins, and use
12-point Times New Roman or 10-point Arial/Helvetica font. A
title page is required; APA format for the title page is optional.
· At least one diagram must be included (not counted towards
the minimum length described above). You can have more.
· The submission must cover all of the 6 major topics outlined
above. Each choice should be explained with technical and
business reasoning. The solution should be reasonably detailed.
· The structure of the final submission is flexible. There is no
specific format required, although it should be organized
logically and represent a single, unified solution. It is likely
that the format will include separate sections for each of the 6
topics required, as well as a summary.
· At least one non-textbook, non-LabSim, non-Wikipedia
reference is required; preferably, this would be a “best practice”
guide or similar content from Microsoft or an experienced
provider of Microsoft solutions.
· Be sure to properly quote or cite any sources used. APA
format is required for in-text citations and the list of works
cited at the end. It is expected that you are already familiar with
UMUC's "Policy on Academic Dishonesty and Plagiarism." It is
available in the Academic Policies section of the Syllabus; there
are also links in the Webliography. In its simplest form, if you
are using text from a source, you must cite and/or quote it. If
plagiarism is found, then there will be a penalty to the grade.
Running Head: WINDOWS NETWORK PROPOSAL
WINDOWS NETWORK PROPOSAL
11
Windows Network Proposal - Networking
Ademola Adebisi
Serhiy Kuzhanov
CMIT 370
03/01/19
Introduction
Fixing Windows LLC is taking steps towards having a
technology solution capable of effectively supporting its
growing operations. Windows Server 2016 is only succeeded by
one generation of the server releases, placing it as a modern
solution for organizations that choose to embrace it, and
provides solutions that meet the needs of the company. Fixing
Windows LLC doesn’t have to worry about implementing
different solutions for its different offices, with this solution
capable of being effectively deployed to serve these multiple
locations.
Active Directory
At both the Dallas and Houston offices will be an active
directory forest, and each of them will contain the domain,
application, and group policy and configuration data and will
operate independently of each other as users will not be capable
of accessing the other forest. Each of the active directory
forests will consist of domain controllers that will be constantly
exchanging files among each other. To determine the
extensibility of the system, tasks like data replication will
happen within these active directory forests. There will be
around six or so domain controllers in an active directory forest
and these will be responsible for supporting administrative
activities for Fixing Windows LLC. Comment by Serhiy
Kuzhanov: This is against every Microsoft best practice
Comment by Serhiy Kuzhanov: What files do domain
controllers need to exchange and why?
The main domain controller of the company will be located at
the Houston offices, with Dallas also being capable of hosting
the controller. However, for redundancy purposes, there will
also be a read-only domain controller that will be installed at
the Los Angeles offices, with backup solutions. As a read-only
setup, the Los Angeles domain controller will not be likely to
threaten the security of the man controller in Houston. The Los
Angeles office will be a sales office, with a small staff and as
such will need minimal technical support compared to the
Dallas and Houston offices. These offices, given their relatively
large sizes in terms of personnel and operations, will be from
where the active directory will be managed. With different
departments and the employees conducting different roles and
responsibilities within the organization, organizational units
will be established, with each unit for each of the various
departments, and each of them operating independently. User
profiles along with their permissions, system privileges and
access controls will be managed within these organizational
units, ensuring that each of the units is responsible for setting
up the credentials for users under them and that the access
controls granted to the user are within the limits of the user’s
duties. For tracking and auditing purposes, there will be the
flexible single master on (FSMO) roles that will be installed on
a small number of stations, with the roles ending up on domain
controllers from where other stations will access to get a given
role (Palmer, 2017). Comment by Serhiy Kuzhanov: If you
have two forests, how can you have one mail domain controller?
You will at least have two main domain controllers – one for
each forest. And how can you say that Dallas is capable of
hosting a domain controller if you already said that you will
deploy an independent forest at that site, so it MUST include a
domain controller
Group Policy
The system administrators of Fixing Windows LLC will use
Group Policy to establish user and machine configurations, with
settings like determining the limit of user’s failed login
attempts before they are locked out of the system, to the
deployment of applications. The Group Policy settings are
applicable to all levels within the active directory, including the
domain, organizational unit, to a site computer. The policy
settings can be edited and managed through the Microsoft
Management Console or through the PowerShell. The Group
Policy Object Editor is responsible for managing the various
group policies and is located under the management console and
the administrator has the option of browsing the various policies
and subsequently making a selection. PowerShell could also be
used to make edits to group policies, with a module dedicated
solely to the management of group policies, which will however
only be available at the Houston office which has been
configured as the domain controller (Palmer, 2017).
Group Policy allows for application deployment either
through publishing or assigning. Deployment through assigning
happens when the particular application can be accessed by
users and other workstations. From any of the company’s
workstation, the employees of Fixing Windows LLC will be
capable of accessing any application that had been deployed by
way of assigning. It is a cheap way of deploying applications
and will ensure that employees have easy access to basic and
essential applications they require to complete their
responsibilities. When an application has been deployed via
publishing, then the application will only be available to the
users, where instead of it being installed within the computer,
will be tied to a particular user. Whenever a user needs to
access the application, they will log onto any computer and will
then be prompted to install the application, which will then be
uninstalled when they log off. It is a useful solution when there
is a need to restrict the access to certain applications to specific
users within the organization. Publishing will then become a
part of the company’s data security efforts as it will place
restrictions on access to sensitive applications and the data that
come with them. The company has a number of trade secrets
that it would prefer to be restricted to a few authorized
individuals within the organization. Providing access to these
applications via assigning would expose them to the risk of
being accessed by unauthorized individuals, making publishing
the most appropriate solution to maintain confidentiality
(Krause, 2016).
Information security is important for any organization, and
Fixing Windows LLC has been provided with Windows Firewall
with Advanced Security, which is deployable under Group
Policy settings. It is a capable tool that can be utilized to screen
all traffic moving in and out of the system for potential threats.
From the group policy settings, the administrator can also
undertake user access control and determine the privileges that
various users will be granted within the system. It should
prevent unauthorized attempts to access or manipulate data in
the system without the express authorization to do so, with any
user that seeks such access needing to have been granted the
right credentials (Krause, 2016).
DNS
DNS will be used to provide name resolution through the
provision of temporary IP addresses to the TCP/IP and to DHCP
for the provision of temporary IP addresses to client computers.
The activities of DNS will be supported by three servers, with
other backup servers that will be deployed to act as failover
options in the event that the primary servers are down. The
servers will be housed at both the Houston and Dallas offices
with a DNS server at each of the offices. The servers will be
installed and configured at these offices manually, ensuring
there is a direct interaction between the technical team and the
server for purposes of making any identification of potential
issues with the servers and addressing them as soon as possible.
The main server will be responsible for managing the addresses,
hosting most of them, with any other addresses being hosted
within the backup server. The main server will be the location
from which clients will be provided with their IP addresses,
with this continuing until such a point that the backup server
will need to take over should the primary server experience
failure. The backup server has been envisioned as the principal
backup solution for the main server, containing similar data and
capabilities and could hence easily take over for the main server
in the event of failure (Thomas, 2017). Comment by Serhiy
Kuzhanov: That is a function of DHCP
As the company seeks or more ways to remain up to date with
emerging technology, it will be taking steps towards the use of
mobile devices within the organization, which should mobility
and allow for employees to access company technology
resources even when away from the office. With mobile
devices, it can happen much more efficiently, with the devices
being highly portable while at the same time possessing
capabilities for sophisticated functionalities. These devices will
make use of two virtual servers deployed to utilize split DNS,
with a much more simplified approach for the DNS namespace
design (Palmer, 2017).
File Services
A file system will be installed within its own independent
server and will be assigned a unique IP address. Users, on the
other hand, will be provided with virtual drives they will use for
individual tasks with shared drives deployed for hosting
network files. The file server resource manager (FSRM) will be
used to administer both the user and the shared drives, with a
number of actions taken to ensure the efficient use of the
available resources. Individual users will be allocated a limited
space size within the drives assigned to them while the different
departments given their varying needs will be allocated the
space on a case by case basis to ensure each department to have
the optimal space allocation for its operations. The same way,
should any user or department require additional space, they
will place requests for the same and further allocations will also
happen on a case by case basis. However, the quota system will
be strictly maintained, with an additional request for space
needing to be done only at the utmost necessity, with users
being more careful with the way they use up the space allocated
to them. The administrator will, therefore, be responsible for
both setting up and enforcing rules on effective space
management within the system, making extensive use of the
capabilities provided by the file server resource manager
(FSRM). The File Classification Infrastructure (FCI) is a tool
within the FSRM that can classify various file formats and
subsequently used to restrict certain formats from being stored
within the various allocated spaces, whether within individual
user drives or the shared drives. As such, users will be
prevented from storing certain files types within their drives to
ensure they do not use up their allotted space for non-essential
storage. The administrator will be alerted whenever a given user
or department is close to depleting their allotted space. It
should give the administrator to decide on how to handle the
situation, which could include analyzing the user space for
potential optimization leading to more space being freed up or
seeking ways to provide the additional space. FCI could also be
used to place encryption on certain files to restrict access to
them as well as place expiry dates on other files and ensure they
are deleted within a certain period of time. The latter could be a
response to dealing with certain file types that are no longer of
use to the organization and their effective disposal will lead to
the availability of more space to be allocated to users and
departments (Thomas, 2017).
With Distributed File Services (DFS) are DFS Replication
and DFS Namespaces, providing the availability of a common
directory to users. With DFS Replication, there is the capability
to conduct folder replication across multiple sites and multiple
servers, and do with efficiency. To make effective use of the
available space, file compression algorithms are used on files,
leaving more space available for further utilization in future. An
effective compression method used will be the remote
differential compression which instead of making replications
of an entire file, will instead seek out the modification that was
made to it and retain those modifications. Such an approach
should avoid unnecessary redundancies and lead to appropriate
use of space. DFS Namespaces provide an administrator with a
virtual view of shared folders that have hosted within different
servers and consists of a single root that has multiple other
targets and links. Multiple root targets can be mapped from a
single root, and users are able to view a namespace as a single
folder containing multiple subfolders within it. It is a quite
effective solution for when data is spread out across multiple
servers, making tedious for users to access the different servers
individually to access the data. Instead, users get a streamlined
solution where all these servers can be viewed as a single folder
known as the namespace and allowing for easier conducting of
tasks by viewing multiple folders from different servers from a
single location (Palmer, 2017).
Remote Services
The remote server access role can be implemented with three
role services namely Direct Access, Web Application Proxy and
Routing and Remote Access. Remote access provides
centralized administration and the monitoring and tracking of
Direct Access and Routing and Remote Access Service, which
can be deployed on one Edge server. The management of these
technologies can be conducted via both Remote Access
Microsoft Management Console as well as on the Windows
PowerShell. Direct Access provides users with remote access
capabilities to applications as well as other shared resources
that are located within a restricted internal network, providing
such access without the user having to resort to a virtual private
network (VPN). Direct Access will launch a connection with
another within the network that has been enabled for Direct
Access and establishes a two-way connection via the internet,
doing away with the need of the remote users to first access the
company’s internal network. The system administrator will have
their capabilities and reach expanded as they will be able to
conduct remote administration tasks without necessarily having
to use a virtual private network to achieve that (Krause, 2016).
With an office located thousands of miles away in Los
Angeles from the Texas offices, the employees in Los Angeles
should easily access the resources within the Houston and even
the Dallas offices. This will, however, require that there be a
reliable WAN internet connect since the Direct Access remote
capabilities will require reliable internet service to successful
establish remote access. The system administrators will also
benefit, allow for seamless connection to all of the company’
technology resources via an efficient solution (Thomas, 2017).
Windows Server Update Service (WSUS)
The Windows Server Update Service (WSUS) streamlines the
capabilities of the administrators to conduct management and
distribution of updates to the system via the central management
console. Known as an update source, the server responsible will
be connected to Microsoft Update, from where it will be getting
regular information on available and upcoming updates. The
administrator will have the choice of making further additions
to the servers in a bid to improve their capabilities. With
Windows Server Update Service, Fixing Windows LLC will
have streamlined the update management tasks for the whole
system by having them done from a centralized console,
allowing for a comprehensive view of the system. An automated
solution will ensure updates still happen even if the
administrators forget to make themselves. The Windows
PowerShell enhanced capabilities will extend to the
management of The Windows Server Update Service (WSUS)
(Krause, 2016).
Summary
The Windows Server 2016 was released with many more
features, some new and some Justas they were in the previous
iteration as well as many improvements. Fixing Windows LLC
has thus being provided with the requisite tools and capabilities
that will allow it to continue growing its operations with the
right technological tools.
Appendix
Direct Access communication between two sites
References
Krause, J. (2016). Mastering Windows Server 2016. Packt
Publishing Ltd.
Palmer, M. (2017). Hands-On Microsoft Windows Server 2016.
Cengage Learning.
Thomas, O. (2017). Windows Server 2016 Inside Out (includes
Current Book Service). Microsoft Press.
Meaning of Problem Statement in a Research
A problem statement refers to clear description of issues(s) such
as the vision, issues statement as well as approach that is
needed to solve a particular problem (Bryman, 2008).
A problem statement is used to help an individual or a team to
remain focus on research efforts so as to solve a given problem.
A problem statement should be designed to address the
following questions:
*
Cont’
What is the problem? - In this sense the focus is on boundaries
of the problem such as customers or work flow among others
Who has the problem? – Focuses on the person or group that is
affected by the problem. For instance, it can be customers or
particular groups among others.
Why- Relates to the reasons that indicate the importance of
solving a particular problem?
*
Cont’
When- Relates to particular time when the problem occurs.
Where- Relates to specific area that is affected with the problem
such as certain places or process among others.
*
Cont’
The purpose for writing problem statement is as follows:
Introduce the significance of studying particular topic or issues
to readers
Put the problem is a given context to make it easy for carry out
study on it
Gives information concerning the tools that will be needed to
display required information.
*
Description of a Background
The main issue in the background of the problem is the ability
to reflect on facts related to problem so that other readers can
understand the problem well.
Background description enables researchers to have better
understanding on how to design the experiment (Schindler &
Cooper, 2014).
In order to have a good description of background information
the researcher needs to consider answering the5W’s.
*
General information in a Background Search
Wide view of the subject of study (root of the problem)
Definition of the topic
Major dates as well as events in the study
The key words and specific concepts concerning the study.
*
Problem Description and Research objective
Description of the problem includes particular important points
such as the hypothesis concerning the research, main
treatments, and explanation of the location and scope of the
study. Problem description should be done on specific terms
other than general terms.
Research objectives are the descriptions what researchers expect
to achieve at the end of the study (David, 2011). The objectives
in this case are determined through looking at the kind of
research that needs be done as well as information that should
be obtained by the study. The kind of questions and subjects of
study are the important factors for determining the research
objective
*
Examples on How Samples can be used
Samples are used when collecting data to represent the entire
population. For instance, collecting sample data through
observing a particular group of people so as to help in making
inferences concerning the general population.
Some of the information such as individual opinions can be
obtained through sampling (opinions of college students) to
give a bigger picture concerning the popularity of particular
political candidate among the youths among others.
*
Definition of Limitations of Research and Example
Research limitations refers to shortcomings or influences that
put restriction to the methodology and conclusion of a research
yet the researcher has no control over such issues (David,
2011).
Some of the areas that can be used to identity limitations
include the analysis, choice of date collection methods, nature
of self-reporting, nature of the samples (scope) used in the
experiment as well as the time limit.
An example of a research limitation is on a study that is done
in a particular city involving men is subjected to limitations
such as gender, sample size as well as the location.
*
Example of Diagram and Chart
The percentage of new students who joins different sports in
their school each year
Example of number of cars sold within particular period
*
Chart1FootballRubgyTennisOthers
Sales
0.4
0.2
0.25
0.15
Sheet1SalesFootball40%Rubgy20%Tennis25%Others15%To
resize chart data range, drag lower right corner of range.
Chart1week 1week 1week 1week 2week 2week 2week 3week
3week 3week 4week 4week 4
Nissan
Toyota
others
0
7
8
3
10
5
7
7
4
4
3
4
Sheet1NissanToyotaothersweek 11o78week 23105week
3774week 4434To resize chart data range, drag lower right
corner of range.
Conclusion
Most of the research studies have gaps which need to be
foundation for conducting other studies in the future.
When mentioning limitations the researcher should state the
choices
*
Recommendations
Every researcher should strive to reduce the scope of limitations
during the study.
Every researcher should follow all the necessary steps when
doing a research in order to have a comprehensive research
study.
*
References
Bryman, A. (2008). Social research methods, 4th edition.
Oxford: Oxford University Press
Schindler, P., & Cooper, D. (2014). Business research
Methods. New York: McGraw-Hill.
David, S.(2011). Qualitative research: Issues of Theory,
method and practice, 3rd edition. New Delhi: Sage
Publications.
*

More Related Content

Similar to Students NameProfessor’s NameCourseDateWhat .docx

PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
KunjamKhurana1
 
1 AMERICAN PSYCHOLOGICAL ASSOCIATION APA GU.docx
1  AMERICAN PSYCHOLOGICAL ASSOCIATION APA GU.docx1  AMERICAN PSYCHOLOGICAL ASSOCIATION APA GU.docx
1 AMERICAN PSYCHOLOGICAL ASSOCIATION APA GU.docx
oswald1horne84988
 
APA Formatting and Style Guide .pptx
APA Formatting and Style Guide .pptxAPA Formatting and Style Guide .pptx
APA Formatting and Style Guide .pptx
EdthorGabriel
 
Swarup Das-040.pptx
Swarup Das-040.pptxSwarup Das-040.pptx
Swarup Das-040.pptx
Swarup Das
 
Grand Canyon UniversityAmerican Psychological Association [APA] St.docx
Grand Canyon UniversityAmerican Psychological Association [APA] St.docxGrand Canyon UniversityAmerican Psychological Association [APA] St.docx
Grand Canyon UniversityAmerican Psychological Association [APA] St.docx
shericehewat
 
Ppt apa
Ppt apaPpt apa
AMERICAN PSYCHOLOGICAL ASSOCIATION REFERENCING STYLE & CITATION
AMERICAN PSYCHOLOGICAL ASSOCIATION REFERENCING STYLE & CITATIONAMERICAN PSYCHOLOGICAL ASSOCIATION REFERENCING STYLE & CITATION
AMERICAN PSYCHOLOGICAL ASSOCIATION REFERENCING STYLE & CITATION
MarkLeniel
 
Asa
AsaAsa
Apa Writing Purpose
Apa Writing PurposeApa Writing Purpose
Apa Writing Purpose
Where To Buy Papers Bethlehem
 
APA Primer
APA PrimerAPA Primer
4.2 APA 6th Edition Formatting and Style Guide.ppt
4.2 APA 6th Edition Formatting and Style Guide.ppt4.2 APA 6th Edition Formatting and Style Guide.ppt
4.2 APA 6th Edition Formatting and Style Guide.ppt
Marilyn Castro Laquindanum
 
Understanding APA
Understanding APAUnderstanding APA
Understanding APA
Generative Learning Group
 
APA STYLE
APA STYLEAPA STYLE
APA STYLE
HabibaSaeed5
 
Apa6th gilman fall2010
Apa6th gilman fall2010Apa6th gilman fall2010
Apa6th gilman fall2010referen
 
How To Write A Good Research PaperResearch paper presents
How To Write A Good Research PaperResearch paper presents How To Write A Good Research PaperResearch paper presents
How To Write A Good Research PaperResearch paper presents
meagantobias
 
APA Scavenger HuntAll of the answers can be found in the Unive.docx
APA Scavenger HuntAll of the answers can be found in the Unive.docxAPA Scavenger HuntAll of the answers can be found in the Unive.docx
APA Scavenger HuntAll of the answers can be found in the Unive.docx
armitageclaire49
 
Apa 6th edition introduction
Apa 6th edition introductionApa 6th edition introduction
Apa 6th edition introductionmanobillla
 

Similar to Students NameProfessor’s NameCourseDateWhat .docx (20)

PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
1 AMERICAN PSYCHOLOGICAL ASSOCIATION APA GU.docx
1  AMERICAN PSYCHOLOGICAL ASSOCIATION APA GU.docx1  AMERICAN PSYCHOLOGICAL ASSOCIATION APA GU.docx
1 AMERICAN PSYCHOLOGICAL ASSOCIATION APA GU.docx
 
APA Formatting and Style Guide .pptx
APA Formatting and Style Guide .pptxAPA Formatting and Style Guide .pptx
APA Formatting and Style Guide .pptx
 
Swarup Das-040.pptx
Swarup Das-040.pptxSwarup Das-040.pptx
Swarup Das-040.pptx
 
Grand Canyon UniversityAmerican Psychological Association [APA] St.docx
Grand Canyon UniversityAmerican Psychological Association [APA] St.docxGrand Canyon UniversityAmerican Psychological Association [APA] St.docx
Grand Canyon UniversityAmerican Psychological Association [APA] St.docx
 
Ppt apa
Ppt apaPpt apa
Ppt apa
 
AMERICAN PSYCHOLOGICAL ASSOCIATION REFERENCING STYLE & CITATION
AMERICAN PSYCHOLOGICAL ASSOCIATION REFERENCING STYLE & CITATIONAMERICAN PSYCHOLOGICAL ASSOCIATION REFERENCING STYLE & CITATION
AMERICAN PSYCHOLOGICAL ASSOCIATION REFERENCING STYLE & CITATION
 
Asa
AsaAsa
Asa
 
Apa primer (rev)
Apa primer (rev)Apa primer (rev)
Apa primer (rev)
 
Apa Writing Purpose
Apa Writing PurposeApa Writing Purpose
Apa Writing Purpose
 
APA Primer
APA PrimerAPA Primer
APA Primer
 
Apa primer (rev)
Apa primer (rev)Apa primer (rev)
Apa primer (rev)
 
Peer review - MCS 389
Peer review - MCS 389Peer review - MCS 389
Peer review - MCS 389
 
4.2 APA 6th Edition Formatting and Style Guide.ppt
4.2 APA 6th Edition Formatting and Style Guide.ppt4.2 APA 6th Edition Formatting and Style Guide.ppt
4.2 APA 6th Edition Formatting and Style Guide.ppt
 
Understanding APA
Understanding APAUnderstanding APA
Understanding APA
 
APA STYLE
APA STYLEAPA STYLE
APA STYLE
 
Apa6th gilman fall2010
Apa6th gilman fall2010Apa6th gilman fall2010
Apa6th gilman fall2010
 
How To Write A Good Research PaperResearch paper presents
How To Write A Good Research PaperResearch paper presents How To Write A Good Research PaperResearch paper presents
How To Write A Good Research PaperResearch paper presents
 
APA Scavenger HuntAll of the answers can be found in the Unive.docx
APA Scavenger HuntAll of the answers can be found in the Unive.docxAPA Scavenger HuntAll of the answers can be found in the Unive.docx
APA Scavenger HuntAll of the answers can be found in the Unive.docx
 
Apa 6th edition introduction
Apa 6th edition introductionApa 6th edition introduction
Apa 6th edition introduction
 

More from orlandov3

Students Name Asaad HalawnaiCourse Title Intercultural Encount.docx
Students Name Asaad HalawnaiCourse Title Intercultural Encount.docxStudents Name Asaad HalawnaiCourse Title Intercultural Encount.docx
Students Name Asaad HalawnaiCourse Title Intercultural Encount.docx
orlandov3
 
Students must identify one business networking events such as a semi.docx
Students must identify one business networking events such as a semi.docxStudents must identify one business networking events such as a semi.docx
Students must identify one business networking events such as a semi.docx
orlandov3
 
Students must be careful about what they post on social media..docx
Students must be careful about what they post on social media..docxStudents must be careful about what they post on social media..docx
Students must be careful about what they post on social media..docx
orlandov3
 
Students must draw on all of the readings for the particular selec.docx
Students must draw on all of the readings for the particular selec.docxStudents must draw on all of the readings for the particular selec.docx
Students must draw on all of the readings for the particular selec.docx
orlandov3
 
Students must identify one business networking events such as a .docx
Students must identify one business networking events such as a .docxStudents must identify one business networking events such as a .docx
Students must identify one business networking events such as a .docx
orlandov3
 
Students maintained and submitted weekly reflective narratives throu.docx
Students maintained and submitted weekly reflective narratives throu.docxStudents maintained and submitted weekly reflective narratives throu.docx
Students maintained and submitted weekly reflective narratives throu.docx
orlandov3
 
Students learning self-regulation strategies may not always reco.docx
Students learning self-regulation strategies may not always reco.docxStudents learning self-regulation strategies may not always reco.docx
Students learning self-regulation strategies may not always reco.docx
orlandov3
 
Students learn in a variety of ways. It is important for teachers to.docx
Students learn in a variety of ways. It is important for teachers to.docxStudents learn in a variety of ways. It is important for teachers to.docx
Students learn in a variety of ways. It is important for teachers to.docx
orlandov3
 
Students learn sociology by doing sociology, in addition to re.docx
Students learn sociology by doing sociology, in addition to re.docxStudents learn sociology by doing sociology, in addition to re.docx
Students learn sociology by doing sociology, in addition to re.docx
orlandov3
 
Students draft a formal case report exploring a real-world issue per.docx
Students draft a formal case report exploring a real-world issue per.docxStudents draft a formal case report exploring a real-world issue per.docx
Students draft a formal case report exploring a real-world issue per.docx
orlandov3
 
Students learn in a variety of ways. It is important for teacher.docx
Students learn in a variety of ways. It is important for teacher.docxStudents learn in a variety of ways. It is important for teacher.docx
Students learn in a variety of ways. It is important for teacher.docx
orlandov3
 
STUDENTS JOURNAL ENTRY  As I progressed in this class I tried a.docx
STUDENTS JOURNAL ENTRY  As I progressed in this class I tried a.docxSTUDENTS JOURNAL ENTRY  As I progressed in this class I tried a.docx
STUDENTS JOURNAL ENTRY  As I progressed in this class I tried a.docx
orlandov3
 
Students at Northwood Middle School are given one class from List A .docx
Students at Northwood Middle School are given one class from List A .docxStudents at Northwood Middle School are given one class from List A .docx
Students at Northwood Middle School are given one class from List A .docx
orlandov3
 
Students are typically consumers in the school community. To what ex.docx
Students are typically consumers in the school community. To what ex.docxStudents are typically consumers in the school community. To what ex.docx
Students are typically consumers in the school community. To what ex.docx
orlandov3
 
Students are to watch Liberty The American Revolution part 6 answer.docx
Students are to watch Liberty The American Revolution part 6 answer.docxStudents are to watch Liberty The American Revolution part 6 answer.docx
Students are to watch Liberty The American Revolution part 6 answer.docx
orlandov3
 
Students are to write a four to five paper based on a current events.docx
Students are to write a four to five paper based on a current events.docxStudents are to write a four to five paper based on a current events.docx
Students are to write a four to five paper based on a current events.docx
orlandov3
 
Students are to write a two-page narrative that summarizes the argum.docx
Students are to write a two-page narrative that summarizes the argum.docxStudents are to write a two-page narrative that summarizes the argum.docx
Students are to write a two-page narrative that summarizes the argum.docx
orlandov3
 
Students are to complete this assignment based on the movie Losing .docx
Students are to complete this assignment based on the movie Losing .docxStudents are to complete this assignment based on the movie Losing .docx
Students are to complete this assignment based on the movie Losing .docx
orlandov3
 
Students are to have a titlecover page and bibliography page as wel.docx
Students are to have a titlecover page and bibliography page as wel.docxStudents are to have a titlecover page and bibliography page as wel.docx
Students are to have a titlecover page and bibliography page as wel.docx
orlandov3
 
Students are to observe two or more adults unknown to the observ.docx
Students are to observe two or more adults unknown to the observ.docxStudents are to observe two or more adults unknown to the observ.docx
Students are to observe two or more adults unknown to the observ.docx
orlandov3
 

More from orlandov3 (20)

Students Name Asaad HalawnaiCourse Title Intercultural Encount.docx
Students Name Asaad HalawnaiCourse Title Intercultural Encount.docxStudents Name Asaad HalawnaiCourse Title Intercultural Encount.docx
Students Name Asaad HalawnaiCourse Title Intercultural Encount.docx
 
Students must identify one business networking events such as a semi.docx
Students must identify one business networking events such as a semi.docxStudents must identify one business networking events such as a semi.docx
Students must identify one business networking events such as a semi.docx
 
Students must be careful about what they post on social media..docx
Students must be careful about what they post on social media..docxStudents must be careful about what they post on social media..docx
Students must be careful about what they post on social media..docx
 
Students must draw on all of the readings for the particular selec.docx
Students must draw on all of the readings for the particular selec.docxStudents must draw on all of the readings for the particular selec.docx
Students must draw on all of the readings for the particular selec.docx
 
Students must identify one business networking events such as a .docx
Students must identify one business networking events such as a .docxStudents must identify one business networking events such as a .docx
Students must identify one business networking events such as a .docx
 
Students maintained and submitted weekly reflective narratives throu.docx
Students maintained and submitted weekly reflective narratives throu.docxStudents maintained and submitted weekly reflective narratives throu.docx
Students maintained and submitted weekly reflective narratives throu.docx
 
Students learning self-regulation strategies may not always reco.docx
Students learning self-regulation strategies may not always reco.docxStudents learning self-regulation strategies may not always reco.docx
Students learning self-regulation strategies may not always reco.docx
 
Students learn in a variety of ways. It is important for teachers to.docx
Students learn in a variety of ways. It is important for teachers to.docxStudents learn in a variety of ways. It is important for teachers to.docx
Students learn in a variety of ways. It is important for teachers to.docx
 
Students learn sociology by doing sociology, in addition to re.docx
Students learn sociology by doing sociology, in addition to re.docxStudents learn sociology by doing sociology, in addition to re.docx
Students learn sociology by doing sociology, in addition to re.docx
 
Students draft a formal case report exploring a real-world issue per.docx
Students draft a formal case report exploring a real-world issue per.docxStudents draft a formal case report exploring a real-world issue per.docx
Students draft a formal case report exploring a real-world issue per.docx
 
Students learn in a variety of ways. It is important for teacher.docx
Students learn in a variety of ways. It is important for teacher.docxStudents learn in a variety of ways. It is important for teacher.docx
Students learn in a variety of ways. It is important for teacher.docx
 
STUDENTS JOURNAL ENTRY  As I progressed in this class I tried a.docx
STUDENTS JOURNAL ENTRY  As I progressed in this class I tried a.docxSTUDENTS JOURNAL ENTRY  As I progressed in this class I tried a.docx
STUDENTS JOURNAL ENTRY  As I progressed in this class I tried a.docx
 
Students at Northwood Middle School are given one class from List A .docx
Students at Northwood Middle School are given one class from List A .docxStudents at Northwood Middle School are given one class from List A .docx
Students at Northwood Middle School are given one class from List A .docx
 
Students are typically consumers in the school community. To what ex.docx
Students are typically consumers in the school community. To what ex.docxStudents are typically consumers in the school community. To what ex.docx
Students are typically consumers in the school community. To what ex.docx
 
Students are to watch Liberty The American Revolution part 6 answer.docx
Students are to watch Liberty The American Revolution part 6 answer.docxStudents are to watch Liberty The American Revolution part 6 answer.docx
Students are to watch Liberty The American Revolution part 6 answer.docx
 
Students are to write a four to five paper based on a current events.docx
Students are to write a four to five paper based on a current events.docxStudents are to write a four to five paper based on a current events.docx
Students are to write a four to five paper based on a current events.docx
 
Students are to write a two-page narrative that summarizes the argum.docx
Students are to write a two-page narrative that summarizes the argum.docxStudents are to write a two-page narrative that summarizes the argum.docx
Students are to write a two-page narrative that summarizes the argum.docx
 
Students are to complete this assignment based on the movie Losing .docx
Students are to complete this assignment based on the movie Losing .docxStudents are to complete this assignment based on the movie Losing .docx
Students are to complete this assignment based on the movie Losing .docx
 
Students are to have a titlecover page and bibliography page as wel.docx
Students are to have a titlecover page and bibliography page as wel.docxStudents are to have a titlecover page and bibliography page as wel.docx
Students are to have a titlecover page and bibliography page as wel.docx
 
Students are to observe two or more adults unknown to the observ.docx
Students are to observe two or more adults unknown to the observ.docxStudents are to observe two or more adults unknown to the observ.docx
Students are to observe two or more adults unknown to the observ.docx
 

Recently uploaded

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 

Recently uploaded (20)

Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 

Students NameProfessor’s NameCourseDateWhat .docx

  • 1. Students Name Professor’s Name Course Date What is APA style? Is an American Psychological writing style developed in 1929 by social scientist to guide writing. Writing style for academic documents such as journals, thesis and books. Consists of different rules and procedures to be observed during writing. Writers and publishers use uniform elements in writing such as title page, paper citation, body presentation, punctuations and abbreviations, presentation of numbers and statistics and many others. Writers and publishers can use the style purely or can modify it to achieve given writing standards. The format has been developed over the years to suit the growing needs of scientific writing.
  • 2. 2 What is the need of APA style? The style was developed due to the need of uniform scientific reporting. Uniformity and simplicity of the style enables users to be able to read through the documents faster with ease. It provides clarity in the academic works by preventing language biasness. The rules enables all facts and ideas to be disclosed without any distraction in the writings. The style enables writers to follow rules in their work thereby making the writings consistent. Again, the style has a standard language to be used by every scholar or publisher. For this reason, the format enables accuracy in all academic writings. 3 General APA guidelines The work should be typed and printed on a standardized white paper of 8.5 x 11 inch per paper. The document should have a 1 inch margin in both sides. The beginning of all the paragraphs should be indented by pressing Tab once or placing five spaces.(Lester et al. 35). APA format recommends the use of 12 pt. of Times New Romans font for clarity. The paper uses single space after periods or punctuation marks in every sentence.
  • 3. The entire work is finally double spaced for clarity. The general guidelines are set to ensure that all the work is clear and presentable. This is important as scholars don’t strain to read the information in the paper. 4 Grammar and Language in APA The style encourages the use of active voice in all the writings (Szuchman et al. 37). The author should always use bias free language in the writings. Writers must observe grammatical rules which include; Avoiding dangling modifiers Ensuring verbs and subject agreement Avoid using linguistic devices such as clichés, alliteration and rhyming words. Use of correct spelling of words. Avoid being redundant in the writing The sentences should never begin with numbers. Arthurs use less abbreviations in their work. Observation of grammar rules enables the readers to get the actual ideas of the writer. Again, the rules enables scholars not to be confused as a result of usage of inconsistent words. 5
  • 4. Title page The title information should have a specific page. It contains the heading, writers, and the institutional affiliation of the scholar. (Szuchman et al. 159). It includes the running head flushed to the right with the page number flushed to the right. The format is as shown; Running head: PAPER TITLE page number Note that the paper title is in capital case while the running head in in small caps. All other pages have headings flushed to the right as shown PAPER TITLE page number The title page is important in providing the first impression of the work. All the titles in the paper should be in the upper case except the one used in the title page which contains both upper and lower case caps. The main words should begin with upper case while miner words begin with lower case. 6 Title page The main characters in the title should begin in capital letters while other words begin in small letters. (Szuchman and Lenore 91). The information should be written in the middle of the page. The heading should not be more than 12 words in length without any abbreviations. The authors name is typed below the title starting with the first name, middle name(s) and the last name. Institution affiliation is typed below the authors name.
  • 5. All text in the title page should be double spaced. The author’s name should not contain initials such as Dr., PHD. And others. Besides, the institution affiliation is used to indicate the place or facilities used by the aurthor to conduct the academic research. 7 Abstract The writing should have an abstract. The abstract provide an overview of the paper. (Szuchman and Lenore 74) It should be between 75-100 words . The abstract should be placed in it’s a different page after the title page. It should be headed “Abstract” at the center in the upper end of the page. The abstract should not be indented. The abstract is used to show how the writer has organized the work. Again, it can be used to provide the main words in the paper. 8
  • 6. Body This part is always on a different section of the work. The heading which is in both upper and lower case should appear at the center of the first line (Swales et al. 53) . The introduction follows the title. Headings should be used to organize the work and show important sections. The author must in text the source documents used in the writing. Visual figures can be used to illustrate given points. The body always starts on the third page. In case the author uses visual figures and diagrams, they should be as simple as possible to enable the reader to understand the work. 9 Paper Citation All the materials used must be cited in the paper (Swales et al. 63). If the writer directly quotes from a material, citation must include the authors last name, year of publication and page of the book as shown; “APA style is often difficult to use,”(John, 2014, p. 35), as students confuse it with other styles Use paragraph numbers to cite online work with no page numbers. In case of long quotations, omit the quotation marks then write the words indented from the left margin on a different section as illustrated below;
  • 7. John’s (2014) study concluded that: Many first year scholars encounter many challenges in APA formatting. However, with good practice, the students find the style very easy to use as compared with others. For this reason, most lectures encourage their learners to always use the style in their work. Scholars have to cite their work to prevent plagiarism. Furthermore, citation is a way of recognizing and appreciating other scholars work in the academic field. 10 Paper Citation Cont’ When a writer has summarized or paraphrased a given authors work, the writers identity and period of publication is given as shown; According to John (2014), APA formatting style is difficult for most first year students. The page paraphrased can also be indicated but not a must. Lectures always encourage students to use APA format in their writings (John, 2014, p. 35). In case the material has two authors, “&” is used to include both names as shown; Kennedy, G. C., & John, P. L. (2007). (Kennedy & John, 2007) In case of three authors; Maurice, K. A., Ken, E. L., & Vista, U. N. (2004). First citation, (Maurice, Ken, & Vista, 2004)
  • 8. Subsequent citations, (Maurice et al., 2004) In citing a material published by two authors, always include both names of the writers in every place. However, in case of three authors, only use the three names of the writers in the first citing. 11 Paper Citation Cont’ More than three authors is cited as; Felix, B. C., Alfred, M., Mali, K., MacCleopas, R. T., & Vista, M. (2004). Becomes, (Felix et al., 2004) When citing materials from the internet, always use the last date the material was revised by the writer. In case no authors are included in the work, use the main words of the title instead of the writer. Use “n.d.” when the work has no date of formatting instead of the date. For example, John and Kennedy (2014) give important concepts in APA formatting style. The APA style is one of the easiest formatting writing styles( APA Style, n. d.).
  • 9. 12 References Sources used should have a separate page at the end of the work.(Szuchman et al. 84). The page should be headed “Reference” in the middle of the first line of the paper. Every cited works must be provided at the reference. References should be having hanging indentions. The sources should be given in an alphabetic manner using the last name of the first author. Any sources apart from journal articles should have upper case in the first letter of a title or a subtitle, first words of proper nouns and letters after colon or a dash in the title. The references enable the reader to be able to trace the facts in the research done. 13 References Cont’ All the main words in the journal title should be in capital letters (Szuchman et al. 143). The titles of major materials should appear in italics. Shorter works such as essays and some journals should not be quoted or italicized. Arthurs names should start with last names then other initials follow.
  • 10. In case the authors are more than six, list them then use “et al” after the sixth writer. 14 References Cont’ Single authors; Last name first, followed by author initials. For example; John, K. (2014)……. Incase of two authors , the writers names are given then & is used between the names as shown; Kennedy, S., & Abril, W. I. (2007)………….. When the authors are an organization, American Dentist Association. (2007)…… When the paper uses citations with no authors name, a writer should use a shortened title of the work using the main words. When two or more writings by the same author is given, the scholar should list them following each other according to the year of publication as shown, John, J. K. (2008)……. John, J. K. (2010)……. References where authors have first similar names, the
  • 11. subsequent names should be used to arrange the sources alphabetically. Again, if the sources are from the same author in the same year, they should be organized alphabetically in the order of the article first word of the title. 15 References Cont’ The basic format for referencing books is given by (Szuchman and Lenore 84); writers last name and initials(Year of publication or editing). Book heading. Place: printer In case the book has been edited, it should contain the word “ed.” At the end of the title. Electronic references; Web page, Scholars name (Last date of edition). Title of resource. Web address where the information was retrieved. Online publications, Author last name(s) and initials (last date of edition). Title of material, Heading of the publication, volume number(edition number). Date of retrieval, web page address In case a author appears in a source document as a sole author then as a main writer in a group of writers, then the single author entry should be first. Besides, where, the authors name(s) are not there but the editors name are given, the editors last names and initials should be used. 16
  • 12. Works Cited Lester, James D., and James D. Lester. Writing research papers: A complete guide. Pearson, 2012. Swales, John M., and Christine B. Feak. Academic writing for graduate students: Essential tasks and skills. Vol. 1. Ann Arbor, MI: University of Michigan Press, 2004. Szuchman, Lenore T., and Barbara Thomlison. Writing with style: APA style for social work. Cengage Learning, 2010. Szuchman, Lenore T. Writing with style: APA style made easy. Cengage Learning, 2013. Windows Network Proposal - Networking You have been hired by Fixing Windows LLC as an Information Technology consultant to develop a technology proposal. Fixing Windows LLC manufactures and distributes solar panel for the consumer market. Your job is to submit a proposal that meets their criteria. Current Implementation/Concerns: · The company will have 3 locations (Los Angeles, Dallas, and Houston) but are planning to grow rapidly due to high demand in solar panels. Main staff will be at Dallas and Houston offices. · Data security is priority since patent and trademarks are at stake. · Los Angeles sales personnel will need secure remote access to Houston office.
  • 13. · The WAN connectivity is in place and it is not an issue. There is ample bandwidth in place. · Feel free to make other assumptions but they need to be noted in the paper. Topics to Cover: Your document should cover the content presented in the course. The outline below contains recommended points to cover. You are free to add other related information. Describe the technical and business reasons for each choice, citing other resources as appropriate. The Windows Server 2016 operating system should be used for all aspects of the solution. The topics include: DNS and DHCP · How had DHCP installation and authorization been implemented? · DHCP scope design (e.g., lease times, number of scopes, address range) · Will a form of DHCP fault tolerance be implemented? · Will DHCP reservations be used for servers? · How can IPAM be utilized? · How will IPv6 be utilized? · How will DNS be implemented? · DNS Security · How will DNS be handled for the second and third site? · What namespace should Fixing Windows LLC implement? · What types of zones needed? File Services, DISTRIBUTED FILE SYSTEM (DFS) AND BRANCHCACHE: · How will the shares be secured?
  • 14. · Will quotas be used? FSRM be configured? · Will DFS be implemented? Remote Services and NETWORK POLICY SERVER (NPS): · What technology will be implemented to provide secure remote access for users? · Who should have remote access? Discuss these other server 2016 Networking concepts: · HIGH PERFORMANCE NETWORK SOLUTIONS · SOFTWARE-DEFINED NETWORKING (SDN) Submission Requirements: There are specific requirements for the assignment: The final submission should contain at least 6 pages’ worth of text written by the student (not counting title page, images, diagrams, tables, or quotations), but may be longer, not to exceed approximately 10 pages’ worth of student-supplied text. (With the required diagram, and other images, title page, etc., the final submission may end up being more than 10 pages in length.) It must be double-spaced, have 1-inch margins, and use 12-point Times New Roman or 10-point Arial/Helvetica font. A title page is required; APA format for the title page is optional. · At least one diagram must be included (not counted towards the minimum length described above). You can have more. · The submission must cover all of the 6 major topics outlined above. Each choice should be explained with technical and business reasoning. The solution should be reasonably detailed. · The structure of the final submission is flexible. There is no specific format required, although it should be organized logically and represent a single, unified solution. It is likely that the format will include separate sections for each of the 6 topics required, as well as a summary. · At least one non-textbook, non-LabSim, non-Wikipedia
  • 15. reference is required; preferably, this would be a “best practice” guide or similar content from Microsoft or an experienced provider of Microsoft solutions. · Be sure to properly quote or cite any sources used. APA format is required for in-text citations and the list of works cited at the end. It is expected that you are already familiar with UMUC's "Policy on Academic Dishonesty and Plagiarism." It is available in the Academic Policies section of the Syllabus; there are also links in the Webliography. In its simplest form, if you are using text from a source, you must cite and/or quote it. If plagiarism is found, then there will be a penalty to the grade. Running Head: WINDOWS NETWORK PROPOSAL WINDOWS NETWORK PROPOSAL 11 Windows Network Proposal - Networking Ademola Adebisi Serhiy Kuzhanov CMIT 370 03/01/19
  • 16. Introduction Fixing Windows LLC is taking steps towards having a technology solution capable of effectively supporting its growing operations. Windows Server 2016 is only succeeded by one generation of the server releases, placing it as a modern solution for organizations that choose to embrace it, and provides solutions that meet the needs of the company. Fixing Windows LLC doesn’t have to worry about implementing different solutions for its different offices, with this solution capable of being effectively deployed to serve these multiple locations. Active Directory At both the Dallas and Houston offices will be an active directory forest, and each of them will contain the domain, application, and group policy and configuration data and will operate independently of each other as users will not be capable of accessing the other forest. Each of the active directory forests will consist of domain controllers that will be constantly exchanging files among each other. To determine the extensibility of the system, tasks like data replication will happen within these active directory forests. There will be around six or so domain controllers in an active directory forest and these will be responsible for supporting administrative activities for Fixing Windows LLC. Comment by Serhiy Kuzhanov: This is against every Microsoft best practice Comment by Serhiy Kuzhanov: What files do domain controllers need to exchange and why? The main domain controller of the company will be located at the Houston offices, with Dallas also being capable of hosting the controller. However, for redundancy purposes, there will also be a read-only domain controller that will be installed at
  • 17. the Los Angeles offices, with backup solutions. As a read-only setup, the Los Angeles domain controller will not be likely to threaten the security of the man controller in Houston. The Los Angeles office will be a sales office, with a small staff and as such will need minimal technical support compared to the Dallas and Houston offices. These offices, given their relatively large sizes in terms of personnel and operations, will be from where the active directory will be managed. With different departments and the employees conducting different roles and responsibilities within the organization, organizational units will be established, with each unit for each of the various departments, and each of them operating independently. User profiles along with their permissions, system privileges and access controls will be managed within these organizational units, ensuring that each of the units is responsible for setting up the credentials for users under them and that the access controls granted to the user are within the limits of the user’s duties. For tracking and auditing purposes, there will be the flexible single master on (FSMO) roles that will be installed on a small number of stations, with the roles ending up on domain controllers from where other stations will access to get a given role (Palmer, 2017). Comment by Serhiy Kuzhanov: If you have two forests, how can you have one mail domain controller? You will at least have two main domain controllers – one for each forest. And how can you say that Dallas is capable of hosting a domain controller if you already said that you will deploy an independent forest at that site, so it MUST include a domain controller Group Policy The system administrators of Fixing Windows LLC will use Group Policy to establish user and machine configurations, with settings like determining the limit of user’s failed login attempts before they are locked out of the system, to the deployment of applications. The Group Policy settings are applicable to all levels within the active directory, including the domain, organizational unit, to a site computer. The policy
  • 18. settings can be edited and managed through the Microsoft Management Console or through the PowerShell. The Group Policy Object Editor is responsible for managing the various group policies and is located under the management console and the administrator has the option of browsing the various policies and subsequently making a selection. PowerShell could also be used to make edits to group policies, with a module dedicated solely to the management of group policies, which will however only be available at the Houston office which has been configured as the domain controller (Palmer, 2017). Group Policy allows for application deployment either through publishing or assigning. Deployment through assigning happens when the particular application can be accessed by users and other workstations. From any of the company’s workstation, the employees of Fixing Windows LLC will be capable of accessing any application that had been deployed by way of assigning. It is a cheap way of deploying applications and will ensure that employees have easy access to basic and essential applications they require to complete their responsibilities. When an application has been deployed via publishing, then the application will only be available to the users, where instead of it being installed within the computer, will be tied to a particular user. Whenever a user needs to access the application, they will log onto any computer and will then be prompted to install the application, which will then be uninstalled when they log off. It is a useful solution when there is a need to restrict the access to certain applications to specific users within the organization. Publishing will then become a part of the company’s data security efforts as it will place restrictions on access to sensitive applications and the data that come with them. The company has a number of trade secrets that it would prefer to be restricted to a few authorized individuals within the organization. Providing access to these applications via assigning would expose them to the risk of being accessed by unauthorized individuals, making publishing the most appropriate solution to maintain confidentiality
  • 19. (Krause, 2016). Information security is important for any organization, and Fixing Windows LLC has been provided with Windows Firewall with Advanced Security, which is deployable under Group Policy settings. It is a capable tool that can be utilized to screen all traffic moving in and out of the system for potential threats. From the group policy settings, the administrator can also undertake user access control and determine the privileges that various users will be granted within the system. It should prevent unauthorized attempts to access or manipulate data in the system without the express authorization to do so, with any user that seeks such access needing to have been granted the right credentials (Krause, 2016). DNS DNS will be used to provide name resolution through the provision of temporary IP addresses to the TCP/IP and to DHCP for the provision of temporary IP addresses to client computers. The activities of DNS will be supported by three servers, with other backup servers that will be deployed to act as failover options in the event that the primary servers are down. The servers will be housed at both the Houston and Dallas offices with a DNS server at each of the offices. The servers will be installed and configured at these offices manually, ensuring there is a direct interaction between the technical team and the server for purposes of making any identification of potential issues with the servers and addressing them as soon as possible. The main server will be responsible for managing the addresses, hosting most of them, with any other addresses being hosted within the backup server. The main server will be the location from which clients will be provided with their IP addresses, with this continuing until such a point that the backup server will need to take over should the primary server experience failure. The backup server has been envisioned as the principal backup solution for the main server, containing similar data and capabilities and could hence easily take over for the main server in the event of failure (Thomas, 2017). Comment by Serhiy
  • 20. Kuzhanov: That is a function of DHCP As the company seeks or more ways to remain up to date with emerging technology, it will be taking steps towards the use of mobile devices within the organization, which should mobility and allow for employees to access company technology resources even when away from the office. With mobile devices, it can happen much more efficiently, with the devices being highly portable while at the same time possessing capabilities for sophisticated functionalities. These devices will make use of two virtual servers deployed to utilize split DNS, with a much more simplified approach for the DNS namespace design (Palmer, 2017). File Services A file system will be installed within its own independent server and will be assigned a unique IP address. Users, on the other hand, will be provided with virtual drives they will use for individual tasks with shared drives deployed for hosting network files. The file server resource manager (FSRM) will be used to administer both the user and the shared drives, with a number of actions taken to ensure the efficient use of the available resources. Individual users will be allocated a limited space size within the drives assigned to them while the different departments given their varying needs will be allocated the space on a case by case basis to ensure each department to have the optimal space allocation for its operations. The same way, should any user or department require additional space, they will place requests for the same and further allocations will also happen on a case by case basis. However, the quota system will be strictly maintained, with an additional request for space needing to be done only at the utmost necessity, with users being more careful with the way they use up the space allocated to them. The administrator will, therefore, be responsible for both setting up and enforcing rules on effective space management within the system, making extensive use of the capabilities provided by the file server resource manager (FSRM). The File Classification Infrastructure (FCI) is a tool
  • 21. within the FSRM that can classify various file formats and subsequently used to restrict certain formats from being stored within the various allocated spaces, whether within individual user drives or the shared drives. As such, users will be prevented from storing certain files types within their drives to ensure they do not use up their allotted space for non-essential storage. The administrator will be alerted whenever a given user or department is close to depleting their allotted space. It should give the administrator to decide on how to handle the situation, which could include analyzing the user space for potential optimization leading to more space being freed up or seeking ways to provide the additional space. FCI could also be used to place encryption on certain files to restrict access to them as well as place expiry dates on other files and ensure they are deleted within a certain period of time. The latter could be a response to dealing with certain file types that are no longer of use to the organization and their effective disposal will lead to the availability of more space to be allocated to users and departments (Thomas, 2017). With Distributed File Services (DFS) are DFS Replication and DFS Namespaces, providing the availability of a common directory to users. With DFS Replication, there is the capability to conduct folder replication across multiple sites and multiple servers, and do with efficiency. To make effective use of the available space, file compression algorithms are used on files, leaving more space available for further utilization in future. An effective compression method used will be the remote differential compression which instead of making replications of an entire file, will instead seek out the modification that was made to it and retain those modifications. Such an approach should avoid unnecessary redundancies and lead to appropriate use of space. DFS Namespaces provide an administrator with a virtual view of shared folders that have hosted within different servers and consists of a single root that has multiple other targets and links. Multiple root targets can be mapped from a single root, and users are able to view a namespace as a single
  • 22. folder containing multiple subfolders within it. It is a quite effective solution for when data is spread out across multiple servers, making tedious for users to access the different servers individually to access the data. Instead, users get a streamlined solution where all these servers can be viewed as a single folder known as the namespace and allowing for easier conducting of tasks by viewing multiple folders from different servers from a single location (Palmer, 2017). Remote Services The remote server access role can be implemented with three role services namely Direct Access, Web Application Proxy and Routing and Remote Access. Remote access provides centralized administration and the monitoring and tracking of Direct Access and Routing and Remote Access Service, which can be deployed on one Edge server. The management of these technologies can be conducted via both Remote Access Microsoft Management Console as well as on the Windows PowerShell. Direct Access provides users with remote access capabilities to applications as well as other shared resources that are located within a restricted internal network, providing such access without the user having to resort to a virtual private network (VPN). Direct Access will launch a connection with another within the network that has been enabled for Direct Access and establishes a two-way connection via the internet, doing away with the need of the remote users to first access the company’s internal network. The system administrator will have their capabilities and reach expanded as they will be able to conduct remote administration tasks without necessarily having to use a virtual private network to achieve that (Krause, 2016). With an office located thousands of miles away in Los Angeles from the Texas offices, the employees in Los Angeles should easily access the resources within the Houston and even the Dallas offices. This will, however, require that there be a reliable WAN internet connect since the Direct Access remote capabilities will require reliable internet service to successful establish remote access. The system administrators will also
  • 23. benefit, allow for seamless connection to all of the company’ technology resources via an efficient solution (Thomas, 2017). Windows Server Update Service (WSUS) The Windows Server Update Service (WSUS) streamlines the capabilities of the administrators to conduct management and distribution of updates to the system via the central management console. Known as an update source, the server responsible will be connected to Microsoft Update, from where it will be getting regular information on available and upcoming updates. The administrator will have the choice of making further additions to the servers in a bid to improve their capabilities. With Windows Server Update Service, Fixing Windows LLC will have streamlined the update management tasks for the whole system by having them done from a centralized console, allowing for a comprehensive view of the system. An automated solution will ensure updates still happen even if the administrators forget to make themselves. The Windows PowerShell enhanced capabilities will extend to the management of The Windows Server Update Service (WSUS) (Krause, 2016). Summary The Windows Server 2016 was released with many more features, some new and some Justas they were in the previous iteration as well as many improvements. Fixing Windows LLC has thus being provided with the requisite tools and capabilities that will allow it to continue growing its operations with the right technological tools. Appendix Direct Access communication between two sites
  • 24. References Krause, J. (2016). Mastering Windows Server 2016. Packt Publishing Ltd. Palmer, M. (2017). Hands-On Microsoft Windows Server 2016. Cengage Learning. Thomas, O. (2017). Windows Server 2016 Inside Out (includes Current Book Service). Microsoft Press. Meaning of Problem Statement in a Research A problem statement refers to clear description of issues(s) such as the vision, issues statement as well as approach that is needed to solve a particular problem (Bryman, 2008).
  • 25. A problem statement is used to help an individual or a team to remain focus on research efforts so as to solve a given problem. A problem statement should be designed to address the following questions: * Cont’ What is the problem? - In this sense the focus is on boundaries of the problem such as customers or work flow among others Who has the problem? – Focuses on the person or group that is affected by the problem. For instance, it can be customers or particular groups among others. Why- Relates to the reasons that indicate the importance of solving a particular problem? * Cont’ When- Relates to particular time when the problem occurs. Where- Relates to specific area that is affected with the problem such as certain places or process among others.
  • 26. * Cont’ The purpose for writing problem statement is as follows: Introduce the significance of studying particular topic or issues to readers Put the problem is a given context to make it easy for carry out study on it Gives information concerning the tools that will be needed to display required information. * Description of a Background The main issue in the background of the problem is the ability to reflect on facts related to problem so that other readers can understand the problem well. Background description enables researchers to have better understanding on how to design the experiment (Schindler & Cooper, 2014). In order to have a good description of background information the researcher needs to consider answering the5W’s. *
  • 27. General information in a Background Search Wide view of the subject of study (root of the problem) Definition of the topic Major dates as well as events in the study The key words and specific concepts concerning the study. * Problem Description and Research objective Description of the problem includes particular important points such as the hypothesis concerning the research, main treatments, and explanation of the location and scope of the study. Problem description should be done on specific terms other than general terms. Research objectives are the descriptions what researchers expect to achieve at the end of the study (David, 2011). The objectives in this case are determined through looking at the kind of research that needs be done as well as information that should be obtained by the study. The kind of questions and subjects of study are the important factors for determining the research objective *
  • 28. Examples on How Samples can be used Samples are used when collecting data to represent the entire population. For instance, collecting sample data through observing a particular group of people so as to help in making inferences concerning the general population. Some of the information such as individual opinions can be obtained through sampling (opinions of college students) to give a bigger picture concerning the popularity of particular political candidate among the youths among others. * Definition of Limitations of Research and Example Research limitations refers to shortcomings or influences that put restriction to the methodology and conclusion of a research yet the researcher has no control over such issues (David, 2011). Some of the areas that can be used to identity limitations include the analysis, choice of date collection methods, nature of self-reporting, nature of the samples (scope) used in the experiment as well as the time limit. An example of a research limitation is on a study that is done in a particular city involving men is subjected to limitations such as gender, sample size as well as the location. *
  • 29. Example of Diagram and Chart The percentage of new students who joins different sports in their school each year Example of number of cars sold within particular period * Chart1FootballRubgyTennisOthers Sales 0.4 0.2 0.25 0.15 Sheet1SalesFootball40%Rubgy20%Tennis25%Others15%To resize chart data range, drag lower right corner of range. Chart1week 1week 1week 1week 2week 2week 2week 3week 3week 3week 4week 4week 4 Nissan Toyota others 0 7 8 3 10 5 7 7 4
  • 30. 4 3 4 Sheet1NissanToyotaothersweek 11o78week 23105week 3774week 4434To resize chart data range, drag lower right corner of range. Conclusion Most of the research studies have gaps which need to be foundation for conducting other studies in the future. When mentioning limitations the researcher should state the choices * Recommendations Every researcher should strive to reduce the scope of limitations during the study. Every researcher should follow all the necessary steps when doing a research in order to have a comprehensive research study. *
  • 31. References Bryman, A. (2008). Social research methods, 4th edition. Oxford: Oxford University Press Schindler, P., & Cooper, D. (2014). Business research Methods. New York: McGraw-Hill. David, S.(2011). Qualitative research: Issues of Theory, method and practice, 3rd edition. New Delhi: Sage Publications. *