SlideShare a Scribd company logo
1 of 2
You have written a four-source essay and a six-source essay and
are working toward the multiple-source essay. Throughout the
semester up to this point, you have integrated sources into your
writing and have gleaned various strategies in using different
ways of integrating sources.
As we conclude the course, please examine the following short
paragraph on a hypothetical paper about cybersecurity and the
Internet of Things. The writer has made some errors in his
integration of Shindell as a source.
Please identify at least two errors. Describe what the errors are
in a sentence or two. (You don’t have to re-write the
paragraph. You just need to describe what the errors are.)
One potential method of hacking into a hospital’s records is
through a wearable device. Often, wearable devices are used by
health care institutions to monitor blood pressure or other
health conditions. However, such devices expose
vulnerabilities in the system. (Shindell, 2018) argues that
hackers increasing integrate malware to infect such devices and
then use them as foundations upon which to attack the health
care institution’s IT systems. Specifically, (Shindell, 2018)
maintains that ransomware is especially pernicious. “During an
attack, victims will typically encounter a screen giving them
directions for paying a ransom to retrieve their data…” “More
than half of hospitals surveyed were hit with ransomware in the
previous 12 months.”
You have written a four-source essay and a six-source essay and

More Related Content

Similar to You have written a four-source essay and a six-source essay and

20574-38941-1-PB.pdf
20574-38941-1-PB.pdf20574-38941-1-PB.pdf
20574-38941-1-PB.pdfIjictTeam
 
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...IJCI JOURNAL
 
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdfA Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdfKatie Naple
 
The Technical Report and Executive SummaryTechnical report Your.docx
The Technical Report and Executive SummaryTechnical report Your.docxThe Technical Report and Executive SummaryTechnical report Your.docx
The Technical Report and Executive SummaryTechnical report Your.docxgloriab9
 
The Top Five Essential Cybersecurity Protections for Healthcare Facilities
The Top Five Essential Cybersecurity Protections for Healthcare FacilitiesThe Top Five Essential Cybersecurity Protections for Healthcare Facilities
The Top Five Essential Cybersecurity Protections for Healthcare FacilitiesMatthew J McMahon
 
DHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information ResourcesDHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information ResourcesDavid Sweigert
 
Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...
Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...
Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...Insecurity Insight
 
Development of a Web Application for Fake News Classification using Machine l...
Development of a Web Application for Fake News Classification using Machine l...Development of a Web Application for Fake News Classification using Machine l...
Development of a Web Application for Fake News Classification using Machine l...IRJET Journal
 
OSCon 2011 Talk: The implications of open source technologies in safety criti...
OSCon 2011 Talk: The implications of open source technologies in safety criti...OSCon 2011 Talk: The implications of open source technologies in safety criti...
OSCon 2011 Talk: The implications of open source technologies in safety criti...Shahid Shah
 
Assignment 2 Healthcare Informatics and System BreachesYou ar.docx
Assignment 2 Healthcare Informatics and System BreachesYou ar.docxAssignment 2 Healthcare Informatics and System BreachesYou ar.docx
Assignment 2 Healthcare Informatics and System BreachesYou ar.docxjosephinepaterson7611
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxdaniahendric
 
The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...
The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...
The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...ijseajournal
 
Development of an expert system for reducing medical errors
Development of an expert system for reducing medical errorsDevelopment of an expert system for reducing medical errors
Development of an expert system for reducing medical errorsijseajournal
 
A new approach for formal behavioral
A new approach for formal behavioralA new approach for formal behavioral
A new approach for formal behavioralijfcstjournal
 
A comprehensive study on disease risk predictions in machine learning
A comprehensive study on disease risk predictions  in machine learning A comprehensive study on disease risk predictions  in machine learning
A comprehensive study on disease risk predictions in machine learning IJECEIAES
 
ISOL 536Security Architecture and DesignLab Threat Mod.docx
ISOL 536Security Architecture and DesignLab  Threat Mod.docxISOL 536Security Architecture and DesignLab  Threat Mod.docx
ISOL 536Security Architecture and DesignLab Threat Mod.docxvrickens
 

Similar to You have written a four-source essay and a six-source essay and (18)

Malvin proposal
Malvin proposalMalvin proposal
Malvin proposal
 
20574-38941-1-PB.pdf
20574-38941-1-PB.pdf20574-38941-1-PB.pdf
20574-38941-1-PB.pdf
 
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
 
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdfA Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
 
The Technical Report and Executive SummaryTechnical report Your.docx
The Technical Report and Executive SummaryTechnical report Your.docxThe Technical Report and Executive SummaryTechnical report Your.docx
The Technical Report and Executive SummaryTechnical report Your.docx
 
The Top Five Essential Cybersecurity Protections for Healthcare Facilities
The Top Five Essential Cybersecurity Protections for Healthcare FacilitiesThe Top Five Essential Cybersecurity Protections for Healthcare Facilities
The Top Five Essential Cybersecurity Protections for Healthcare Facilities
 
Cyber
CyberCyber
Cyber
 
DHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information ResourcesDHHS ASPR Cybersecurity Threat Information Resources
DHHS ASPR Cybersecurity Threat Information Resources
 
Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...
Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...
Security in Numbers Database (SiND): Monitoring Actions that Interfere with A...
 
Development of a Web Application for Fake News Classification using Machine l...
Development of a Web Application for Fake News Classification using Machine l...Development of a Web Application for Fake News Classification using Machine l...
Development of a Web Application for Fake News Classification using Machine l...
 
OSCon 2011 Talk: The implications of open source technologies in safety criti...
OSCon 2011 Talk: The implications of open source technologies in safety criti...OSCon 2011 Talk: The implications of open source technologies in safety criti...
OSCon 2011 Talk: The implications of open source technologies in safety criti...
 
Assignment 2 Healthcare Informatics and System BreachesYou ar.docx
Assignment 2 Healthcare Informatics and System BreachesYou ar.docxAssignment 2 Healthcare Informatics and System BreachesYou ar.docx
Assignment 2 Healthcare Informatics and System BreachesYou ar.docx
 
Analysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docxAnalysis of personal information security behavior and awareness.docx
Analysis of personal information security behavior and awareness.docx
 
The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...
The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...
The Plagiarism Detection Systems for Higher Education - A Case Study in Saudi...
 
Development of an expert system for reducing medical errors
Development of an expert system for reducing medical errorsDevelopment of an expert system for reducing medical errors
Development of an expert system for reducing medical errors
 
A new approach for formal behavioral
A new approach for formal behavioralA new approach for formal behavioral
A new approach for formal behavioral
 
A comprehensive study on disease risk predictions in machine learning
A comprehensive study on disease risk predictions  in machine learning A comprehensive study on disease risk predictions  in machine learning
A comprehensive study on disease risk predictions in machine learning
 
ISOL 536Security Architecture and DesignLab Threat Mod.docx
ISOL 536Security Architecture and DesignLab  Threat Mod.docxISOL 536Security Architecture and DesignLab  Threat Mod.docx
ISOL 536Security Architecture and DesignLab Threat Mod.docx
 

More from walthamcoretta

If overload does not get you, underload might. People are not ever b.docx
If overload does not get you, underload might. People are not ever b.docxIf overload does not get you, underload might. People are not ever b.docx
If overload does not get you, underload might. People are not ever b.docxwalthamcoretta
 
If we sensed and attended equally to each stimulus in the world, the.docx
If we sensed and attended equally to each stimulus in the world, the.docxIf we sensed and attended equally to each stimulus in the world, the.docx
If we sensed and attended equally to each stimulus in the world, the.docxwalthamcoretta
 
If Men Could Menstruate By Gloria Steinem, Ms. Magazine, O.docx
If Men Could Menstruate By Gloria Steinem, Ms. Magazine, O.docxIf Men Could Menstruate By Gloria Steinem, Ms. Magazine, O.docx
If Men Could Menstruate By Gloria Steinem, Ms. Magazine, O.docxwalthamcoretta
 
If machine 2 was purchased on April 1 instead of July 1, what would .docx
If machine 2 was purchased on April 1 instead of July 1, what would .docxIf machine 2 was purchased on April 1 instead of July 1, what would .docx
If machine 2 was purchased on April 1 instead of July 1, what would .docxwalthamcoretta
 
If I Had Been the Attorney of Record Then...For this Written Assig.docx
If I Had Been the Attorney of Record Then...For this Written Assig.docxIf I Had Been the Attorney of Record Then...For this Written Assig.docx
If I Had Been the Attorney of Record Then...For this Written Assig.docxwalthamcoretta
 
If the Quabbin Reservoir Watershed is 100 km2, the average preci.docx
If the Quabbin Reservoir Watershed is 100 km2, the average preci.docxIf the Quabbin Reservoir Watershed is 100 km2, the average preci.docx
If the Quabbin Reservoir Watershed is 100 km2, the average preci.docxwalthamcoretta
 
Identifytwo barriers that influence your critical thinking.Inc.docx
Identifytwo barriers that influence your critical thinking.Inc.docxIdentifytwo barriers that influence your critical thinking.Inc.docx
Identifytwo barriers that influence your critical thinking.Inc.docxwalthamcoretta
 
If using the Ballard Integrated Managed Services, Inc. (BIMS) case s.docx
If using the Ballard Integrated Managed Services, Inc. (BIMS) case s.docxIf using the Ballard Integrated Managed Services, Inc. (BIMS) case s.docx
If using the Ballard Integrated Managed Services, Inc. (BIMS) case s.docxwalthamcoretta
 
Identifying OpportunitiesSelect a company which is described in re.docx
Identifying OpportunitiesSelect a company which is described in re.docxIdentifying OpportunitiesSelect a company which is described in re.docx
Identifying OpportunitiesSelect a company which is described in re.docxwalthamcoretta
 
Identifying and responding effectively to grant proposals is more an.docx
Identifying and responding effectively to grant proposals is more an.docxIdentifying and responding effectively to grant proposals is more an.docx
Identifying and responding effectively to grant proposals is more an.docxwalthamcoretta
 
Identify the research problem.Identify the research purpose.Summ.docx
Identify the research problem.Identify the research purpose.Summ.docxIdentify the research problem.Identify the research purpose.Summ.docx
Identify the research problem.Identify the research purpose.Summ.docxwalthamcoretta
 
Identify two analytical tools used to process data collection..docx
Identify two analytical tools used to process data collection..docxIdentify two analytical tools used to process data collection..docx
Identify two analytical tools used to process data collection..docxwalthamcoretta
 
Identify two different examples (one positive and one negative) of.docx
Identify two different examples (one positive and one negative) of.docxIdentify two different examples (one positive and one negative) of.docx
Identify two different examples (one positive and one negative) of.docxwalthamcoretta
 
Identify three (3) Websites that you plan to use for your research o.docx
Identify three (3) Websites that you plan to use for your research o.docxIdentify three (3) Websites that you plan to use for your research o.docx
Identify three (3) Websites that you plan to use for your research o.docxwalthamcoretta
 
Identify the four basic financial statements.Describe the purpos.docx
Identify the four basic financial statements.Describe the purpos.docxIdentify the four basic financial statements.Describe the purpos.docx
Identify the four basic financial statements.Describe the purpos.docxwalthamcoretta
 
Identify Funding OpportunityAfter you have completed your public h.docx
Identify Funding OpportunityAfter you have completed your public h.docxIdentify Funding OpportunityAfter you have completed your public h.docx
Identify Funding OpportunityAfter you have completed your public h.docxwalthamcoretta
 
Identify at least two (2) factors that have led to the explosive gro.docx
Identify at least two (2) factors that have led to the explosive gro.docxIdentify at least two (2) factors that have led to the explosive gro.docx
Identify at least two (2) factors that have led to the explosive gro.docxwalthamcoretta
 
Identify two (2) classical Greek and or Roman figures or qualities.docx
Identify two (2) classical Greek and  or Roman figures or qualities.docxIdentify two (2) classical Greek and  or Roman figures or qualities.docx
Identify two (2) classical Greek and or Roman figures or qualities.docxwalthamcoretta
 
Identify the subject and the verb1. Te angry student dropped the c.docx
Identify the subject and the verb1. Te angry student dropped the c.docxIdentify the subject and the verb1. Te angry student dropped the c.docx
Identify the subject and the verb1. Te angry student dropped the c.docxwalthamcoretta
 
Identify and describe a historical event in which the deindividuatio.docx
Identify and describe a historical event in which the deindividuatio.docxIdentify and describe a historical event in which the deindividuatio.docx
Identify and describe a historical event in which the deindividuatio.docxwalthamcoretta
 

More from walthamcoretta (20)

If overload does not get you, underload might. People are not ever b.docx
If overload does not get you, underload might. People are not ever b.docxIf overload does not get you, underload might. People are not ever b.docx
If overload does not get you, underload might. People are not ever b.docx
 
If we sensed and attended equally to each stimulus in the world, the.docx
If we sensed and attended equally to each stimulus in the world, the.docxIf we sensed and attended equally to each stimulus in the world, the.docx
If we sensed and attended equally to each stimulus in the world, the.docx
 
If Men Could Menstruate By Gloria Steinem, Ms. Magazine, O.docx
If Men Could Menstruate By Gloria Steinem, Ms. Magazine, O.docxIf Men Could Menstruate By Gloria Steinem, Ms. Magazine, O.docx
If Men Could Menstruate By Gloria Steinem, Ms. Magazine, O.docx
 
If machine 2 was purchased on April 1 instead of July 1, what would .docx
If machine 2 was purchased on April 1 instead of July 1, what would .docxIf machine 2 was purchased on April 1 instead of July 1, what would .docx
If machine 2 was purchased on April 1 instead of July 1, what would .docx
 
If I Had Been the Attorney of Record Then...For this Written Assig.docx
If I Had Been the Attorney of Record Then...For this Written Assig.docxIf I Had Been the Attorney of Record Then...For this Written Assig.docx
If I Had Been the Attorney of Record Then...For this Written Assig.docx
 
If the Quabbin Reservoir Watershed is 100 km2, the average preci.docx
If the Quabbin Reservoir Watershed is 100 km2, the average preci.docxIf the Quabbin Reservoir Watershed is 100 km2, the average preci.docx
If the Quabbin Reservoir Watershed is 100 km2, the average preci.docx
 
Identifytwo barriers that influence your critical thinking.Inc.docx
Identifytwo barriers that influence your critical thinking.Inc.docxIdentifytwo barriers that influence your critical thinking.Inc.docx
Identifytwo barriers that influence your critical thinking.Inc.docx
 
If using the Ballard Integrated Managed Services, Inc. (BIMS) case s.docx
If using the Ballard Integrated Managed Services, Inc. (BIMS) case s.docxIf using the Ballard Integrated Managed Services, Inc. (BIMS) case s.docx
If using the Ballard Integrated Managed Services, Inc. (BIMS) case s.docx
 
Identifying OpportunitiesSelect a company which is described in re.docx
Identifying OpportunitiesSelect a company which is described in re.docxIdentifying OpportunitiesSelect a company which is described in re.docx
Identifying OpportunitiesSelect a company which is described in re.docx
 
Identifying and responding effectively to grant proposals is more an.docx
Identifying and responding effectively to grant proposals is more an.docxIdentifying and responding effectively to grant proposals is more an.docx
Identifying and responding effectively to grant proposals is more an.docx
 
Identify the research problem.Identify the research purpose.Summ.docx
Identify the research problem.Identify the research purpose.Summ.docxIdentify the research problem.Identify the research purpose.Summ.docx
Identify the research problem.Identify the research purpose.Summ.docx
 
Identify two analytical tools used to process data collection..docx
Identify two analytical tools used to process data collection..docxIdentify two analytical tools used to process data collection..docx
Identify two analytical tools used to process data collection..docx
 
Identify two different examples (one positive and one negative) of.docx
Identify two different examples (one positive and one negative) of.docxIdentify two different examples (one positive and one negative) of.docx
Identify two different examples (one positive and one negative) of.docx
 
Identify three (3) Websites that you plan to use for your research o.docx
Identify three (3) Websites that you plan to use for your research o.docxIdentify three (3) Websites that you plan to use for your research o.docx
Identify three (3) Websites that you plan to use for your research o.docx
 
Identify the four basic financial statements.Describe the purpos.docx
Identify the four basic financial statements.Describe the purpos.docxIdentify the four basic financial statements.Describe the purpos.docx
Identify the four basic financial statements.Describe the purpos.docx
 
Identify Funding OpportunityAfter you have completed your public h.docx
Identify Funding OpportunityAfter you have completed your public h.docxIdentify Funding OpportunityAfter you have completed your public h.docx
Identify Funding OpportunityAfter you have completed your public h.docx
 
Identify at least two (2) factors that have led to the explosive gro.docx
Identify at least two (2) factors that have led to the explosive gro.docxIdentify at least two (2) factors that have led to the explosive gro.docx
Identify at least two (2) factors that have led to the explosive gro.docx
 
Identify two (2) classical Greek and or Roman figures or qualities.docx
Identify two (2) classical Greek and  or Roman figures or qualities.docxIdentify two (2) classical Greek and  or Roman figures or qualities.docx
Identify two (2) classical Greek and or Roman figures or qualities.docx
 
Identify the subject and the verb1. Te angry student dropped the c.docx
Identify the subject and the verb1. Te angry student dropped the c.docxIdentify the subject and the verb1. Te angry student dropped the c.docx
Identify the subject and the verb1. Te angry student dropped the c.docx
 
Identify and describe a historical event in which the deindividuatio.docx
Identify and describe a historical event in which the deindividuatio.docxIdentify and describe a historical event in which the deindividuatio.docx
Identify and describe a historical event in which the deindividuatio.docx
 

Recently uploaded

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 

Recently uploaded (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

You have written a four-source essay and a six-source essay and

  • 1. You have written a four-source essay and a six-source essay and are working toward the multiple-source essay. Throughout the semester up to this point, you have integrated sources into your writing and have gleaned various strategies in using different ways of integrating sources. As we conclude the course, please examine the following short paragraph on a hypothetical paper about cybersecurity and the Internet of Things. The writer has made some errors in his integration of Shindell as a source. Please identify at least two errors. Describe what the errors are in a sentence or two. (You don’t have to re-write the paragraph. You just need to describe what the errors are.) One potential method of hacking into a hospital’s records is through a wearable device. Often, wearable devices are used by health care institutions to monitor blood pressure or other health conditions. However, such devices expose vulnerabilities in the system. (Shindell, 2018) argues that hackers increasing integrate malware to infect such devices and then use them as foundations upon which to attack the health care institution’s IT systems. Specifically, (Shindell, 2018) maintains that ransomware is especially pernicious. “During an attack, victims will typically encounter a screen giving them directions for paying a ransom to retrieve their data…” “More than half of hospitals surveyed were hit with ransomware in the previous 12 months.”