ࡱ> c 0Objbj 4QbQb] @ @ 4\%)4`^((((((($Y+.R(9((:((&h'&&l((0%) 'a.a. ''Ta.(l((%)a.@ B : Library Research Assignment (Group Project) SPRING 2020 - DUE DATE Introduction Students are to complete aGROUPresearch assignment after a visit by the librarian. Go to the COMP 100 LibGuide ( HYPERLINK "http://Libguides.csun.edu/computer100" http://Libguides.csun.edu/computer100) and contact any librarian for questions: HYPERLINK "http://library.csun.edu/ResearchAssistance/AskUs" http://library.csun.edu/ResearchAssistance/AskUs Questions regarding due dates, point value for completion of the assignment, or appropriateness of topic selection should be directed to your COMP 100 instructor. Research Topics Please review all the topics below, and choose one with your group members. How do computer viruses spread and in what ways do they affect computers? How has the Music/TV industry been affected by the internet and digital downloading?How have sites such as Youtube , Netflix, Hulu, affected the TV/Music industry Smart Phones and Mobile Apps How have they changed us socially? Microblogging -It has surfaced and inspired mainly by people's tendency to jot down babble and post it. They consist of sites like HYPERLINK "http://en.wikipedia.org/wiki/Twitter" Twitterand Chinese equivalent HYPERLINK "http://en.wikipedia.org/wiki/Microblogging_in_China" Weibo(_ZS), also Facebook Status Updates, which are very popular. In what way has Microblogging revolutionized the way information is consumed? Cloud Computing  What is it and related Security Issues. Cyber Crime  Identity Theft -What are the latest ways to steal identity and money?Social Security numbersare the most valuable pieces of consumer information for identity thieves! How can we prepare and protect ourselves? Internet Censorship -How is internet censorship used in China/Middle East/Korea ? Should parents censor what their children are looking at? Should companies see what employees are doing in their time? Computer waste and the environment: whose problem is it? You'd never guess it, but your PC puts about 1,000 pounds of carbon dioxide into the atmosphere every year! What can you do to help? Privacy of Medical Records -What medical information should be confidential? Who, if anybody, should have access to medical records? Is your data safe? Internet Dating -Internet datingis proving a much more successful way to find long-termromanceand friendship for thousands of people than was previously thought, new research shows! Is it safe and for everyone? Augmented Technology for the Handicapped -Using technology to improve the quality of life of the disabled. Some products are natural-voice talkers for the speech impaired, single-switch Internet surfing for quadriplegics, robotic wheelchairs, sensory systems to teach cause-and-effect to severely delayed children, tablet PCs that translate the uncharacteristic handwriting of people with spastic cerebral palsy, and a means to extend special-education class work to home-bound and hospital-bound children, among many other ideas Social Media (Facebook, YouTube, Twitter, LinkedIn, Pinterest, Snapchat, Tumblr, Instagram, Flickr) -Examine and investigate their impacts and effects on Communities, Communications, Relationships, Politics, Self-esteem etc. Cyber Bullying -How has the Internet changed bullying? Is it a Crime? How can it be stopped? What are Universities doing about it? Who is at risk? Self-Driving (Autonomous) Cars -Google, Tesla, Uber and several car manufacturers are all developing technologies that will revolutionize motoring.If the age ofself-driving carsis upon us, what's keeping them off the roads? What are the Federal Regulations? Internet and childrenAre children smarter (or more socialized) because of the Internet? Should children be given a smartphone? What age? The Online Medicine Apps: Can they sometimes substitute the treatment of real Doctors? 5G Wireless System Is it the Future? What are the costs, problems and risks?  HYPERLINK "https://www.ted.com/talks/finn_myrstad_how_tech_companies_deceive_you_into_giving_up_your_data_and_privacy" How tech companies deceive you into giving up your data and privacy? Have you ever actually read the terms and conditions for the apps you use? The personal information you've agreed to let companies collect and how they use your data to target and profile you. Overview of Research Assignment Students will develop a more in-depth understanding of various topics. This will be achieved through the use of research strategies and a systematic exploration of appropriate information sources introduced in the Library Resources lecture.Students will document their research by creating anannotated bibliographyusing the topic selected. Assignment Requirements The annotated bibliography will containSIX (6) sources (for Groups of Two) and NINE (9) sources (for Groups of Three)using theMLA 8 Stylefor the reference citations. Of the 6 (9) sources in the annotated bibliography, at least 2 (3) should be from a book, e-book, personal interview, or media resource (i.e. TV broadcast, or film); 2 (3) should be from a periodical (newspaper, magazine or journal) and 2 (3) should be from freely accessible websites. Each source listed will also include a3-5 sentence annotationwhich will describe the relevance between the information in the source and the topic of the research. The annotated bibliography should be typed in MLA style,Double spacedwithone inch margins (top, bottom, left, and right).Include your names and page number in the header (top aligned right), include your names, Prof. Name, Class name, date on the left side. A cover sheet is not necessary in MLA format! The completed annotated bibliography is due to your instructor on the date announced in class. Summary Activity When you have completed your annotated bibliography, answer the following question in one separate page and attach to your annotated bibliography: Question: If a friend asked you where you found the best information on your selected topic, based on your research activities, what would you tell them you discovered about the process and/or theinformation sources? (NOTE: Every student is to write their own individual summary!) AGrading Rubric (See below) must be printed & stapled to your work. Annotated Bibliography Grading Rubric Name _______________________________ Name _______________________________ Class day and time: __________________________ Name _______________________________ Description: MLA Style Format entire paper double spacedPoints AvailableYour Points Amount DeductedNotesTop Heading Section6Last Name(s) in Right-Hand corner (in heading section)2Page Number one space after last name(s) (same line as last name)2Font must match document2 Left Margin Heading left margin10First Name Last Name (s)2List all first and last namesProfessor L. Parker2-2 if not listed as shownComputers 1002Name of CourseDate (European style)2-2 if European style not usedDouble Spaced (remove extra spaces)2Title - centered6Title of Paper All Important Words Capitalized - centered2Works Cited2Double Spaced (remove extra spaces)2Margins41 Left Margin21 Right Margin21 Bottom MarginWorks Cited Formatting10Double Spaced (remove extra space between sources)2Alphabetical Order by Author (or first word if there is no author) Authors last name first4-4 for each author out of order -4 if last name not firstHanging Indent (Authors name stands alone at the left margin) 4-4 for each incorrect indentCitations MLA style30Two Books (correct citation) Include Print (4 if missing)10-4 for each web/print missingTwo Periodicals (correct citation) Include Web or Print (-4 if missing)10-4 for each web/print missingTwo Web Addresses (correct citation) Include Web or Print (-4 if missing)10-4 for each web/print missingAnnotation26Starts immediately after the citation (MLA style)2-2 for each incorrect Three-Five Sentences24Miscellaneous8Spelling 2(-2 each error)Grammar)2(-2 each errorPunctuation 2,-.<EFRSns K L ` o p   r o p ν~vrlr hR20JhR2hR2hR25hqW@hR2h,5 hch, h,0J h0Jjh0JU h,0Jh,hR2h,>*CJaJ!hR2h,0J5>*CJ\aJhR2h,CJ h0J5\ h| CJ hR2CJ hCJ hR2h,0J5CJ \*FS ` p  p.(. hx^hgd9  & Fxgd9  & Fx\$gd9gd,gd,gd   0p.H(4A.C͹ͯ敁qhR2CJOJPJQJ^JaJ'hqW@hR25CJOJPJQJ^JaJ$hqW@hR2CJOJPJQJ^JaJ hR2hR2hR2hR25\hR2hR25h9h,5h9h,hR2h,5hR2OJPJQJ^Jo(hR2 hR20Jjh0JU h0J$"^_`WXƳxhXE?;?;h, h,0J$hqW@h,CJOJPJQJ^JaJh+CJOJPJQJ^JaJhcCJOJPJQJ^JaJ'hqW@hR25CJOJPJQJ^JaJ!h5CJOJPJQJ^JaJ*jh5CJOJPJQJU^JaJ$h9h9CJOJPJQJ^JaJ$hqW@hR2CJOJPJQJ^JaJ'h9hR25CJOJPJQJ^JaJ$hqW@h9CJOJPJQJ^JaJ_Xp8 s !!1"v"w"x"y""G#J#gdgdc.gdc. & Fgd,gd,gd9  & Fdgd+ & Fdhxgd9Xop_v$*<[s !!!!!!!0"1"C"N"v"x"y"""""J#K###### $$$R$W$X$q$v$w$$$$´´´h Ehc.CJaJ h Ehc."h Ehc.5CJOJQJ\aJ hAhc.hc.hc.5CJ\aJh5CJ\aJhc.CJaJ hc.0Jh h,0Jh,hh,>*CJhh,0J>*CJ6J#K######d$Ifgdgdc.###0"d$Ifgdkd$$Iflr n*3  F\ t0*644 lap2ytc.#####d$Ifgd$d$Ifa$gd##kd$$Iflr n*3  F\  t20*644 lap2ytc.# $ $ $$$d$Ifgd$$R$T$. d$Ifgdkd0$$Ifl r n*3  F\ t0*644 lap2ytc.T$U$V$W$d$IfgdW$X$kd$$$Iflr n*3  F\  t20*644 lap2ytc.X$q$s$t$u$v$d$Ifgdv$w$kdV$$Iflr n*3  F\  t20*644 lap2ytc.w$$$$$$$d$Ifa$gdd$Ifgd$$kd$$Iflr n*3  F\  t20*644 lap2ytc.$$$$$$d$Ifgd$$$$$%%%2%3%I%k%l%%%%%%%%%%%&&&&+&,&4&9&:&I&N&O&_&d&e&v&z&{&&&&&&&.'n'o''''''''(J(K(((()%)&)1)7)8)j))))))))))))))))*U h Ehc.h Ehc.CJaJ"h Ehc.5CJOJQJ\aJV$$kd$$Iflr n*3  F\  t20*644 lap2ytc.$$$$$%d$Ifgd%%kd$$Iflr n*3  F\  t20*644 lap2ytc.%%!%"%#%2%d$Ifgd2%3%kd $$Iflr n*3  F\  t20*644 lap2ytc.3%I%K%L%M%k%d$Ifgdk%l%kdP $$Iflr n*3  F\  t20*644 lap2ytc.l%%%%%%d$Ifgd%%kd $$Iflr n*3  F\  t20*644 lap2ytc.%%%%%%$d$Ifa$gdd$Ifgd%%kd $$Iflr n*3  F\  t20*644 lap2ytc.%%%%%%d$Ifgd%%kd $$Iflr n*3  F\  t20*644 lap2ytc.%%%%&&d$Ifgd&&kd$$Iflr n*3  F\  t20*644 lap2ytc.&&&(&)&*&+&d$Ifgd+&,&kdJ$$Iflr n*3  F\  t20*644 lap2ytc.,&4&6&7&8&9&$d$Ifa$gdd$Ifgd9&:&kd|$$Iflr n*3  F\  t20*644 lap2ytc.:&I&K&L&M&N&d$IfgdN&O&kd$$Iflr n*3  F\  t20*644 lap2ytc.O&_&a&b&c&d&d$Ifgdd&e&kd$$Iflr n*3  F\  t20*644 lap2ytc.e&v&w&x&y&z&d$Ifgdz&{&kd$$Iflr n*3  F\  t20*644 lap2ytc.{&&&&&&$d$Ifa$gdd$Ifgd&&kdD$$Iflr n*3  F\  t20*644 lap2ytc.&&&&&&d$Ifgd&&kdv$$Iflr n*3  F\  t20*644 lap2ytc.&.'0'1'2'T'n'd$Ifgdn'o'kd$$Iflr n*3  F\  t20*644 lap2ytc.o''''''d$Ifgd''kd$$Iflr n*3  F\  t20*644 lap2ytc.''''''$d$Ifa$gdd$Ifgd''kd $$Iflr n*3  F\  t20*644 lap2ytc.''(*(+(,(J(d$IfgdJ(K(kd>$$Iflr n*3  F\  t20*644 lap2ytc.K(((((((d$Ifgd((kdp$$Iflr n*3  F\  t20*644 lap2ytc.(())))%)d$Ifgd%)&)kd$$Iflr n*3  F\  t20*644 lap2ytc.&)1)4)5)6)7)$d$Ifa$gdd$Ifgd7)8)kd$$Iflr n*3  F\  t20*644 lap2ytc.8)j)l)m)n))d$Ifgd))kd!$$Iflr n*3  F\  t20*644 lap2ytc.))))))d$Ifgd))kd8"$$Iflr n*3  F\  t20*644 lap2ytc.))))))$d$Ifa$gdd$Ifgd))kdj#$$Iflr n*3  F\  t20*644 lap2ytc.))))))d$Ifgd))kd$$$Iflr n*3  F\  t20*644 lap2ytc.))))))d$Ifgd)) kd%$$Iflr n*3  F\  t20*644 lap2ytc.))d$Ifgd(-2 each error)Capitalization 2(-2 each error)Total Points100 kd'$$Iflr n*3  F\  t20*644 lap2ytc.$&'(8d$Ifgd$89FMNO2h,h,B*OJQJ^JfHph333q h Ehc.h Ehc.CJaJ"h Ehc.5CJOJQJ\aJ89kd6($$Iflr n*3  F\  t20*644 lap2ytc.9FJKLM$d$Ifa$gdd$IfgdMNkdh)$$Iflr n*3  F\  t20*644 lap2ytc.NO21h:p9/ =!"#$% $$If!vh#v3 #v #vF#v#v\:V l t0*653 5 5F55\/  / p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.$$If!vh#v3 #v #vF#v#v\:V l  t0*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.4$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.0$$If!vh#v3 #v #vF#v#v\:V l  t20*653 5 5F55\/ p2ytc.s666666666vvvvvvvvv666666>6666666666666666666666666666666666666666666666666hH66666666666666666666666666666666666666666666666666666666666666666p62&6FVfv2(&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@$OJPJQJ^J_HmH nH sH tH J`J Normal dCJ_HaJmH sH tH bb c. Heading 1$$@&!B*CJ OJPJQJ^JaJ ph.td@Bd u[ Heading 4ddd@&[$\$5CJOJPJQJ\^JaJDA D Default Paragraph FontRi@R 0 Table Normal4 l4a (k ( 0No List *W`* u[`Strong5\R/R u[Heading 4 Char5CJOJPJQJ\^JaJ6U`6 u[0 Hyperlink >*B*ph`^@"` ,0 Normal (Web)ddd[$\$CJOJPJQJ^JaJ@@2@ qW@ List Paragraph ^m$V/AV c.Heading 1 Char!B*CJ OJPJQJ^JaJ ph.tN@RN c.0HeaderdH$OJPJQJ^J>/a> c.0 Header CharOJPJQJ^JPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭Vc:E3v@P~Ds |w<v ]  X$O(cJ#####$T$W$X$v$w$$$$$%%2%3%k%l%%%%%%%&&+&,&9&:&N&O&d&e&z&{&&&&&n'o'''''J(K(((%)&)7)8)))))))))))89MNO !"#$%&')*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^abdefgKo m*] XXTXtXXtL# @0(  B S  ?<?ry_   l~/0%2%_ 333333333333333333.<\ _ T$D>AAJL(h],drlbTcvh^h`5o(.8^8`.L^`L. ^ `. ^ `.xL^x`L.H^H`.^`.L^`L.h^h`5o(.8^8`.L^`L. ^ `. ^ `.xL^x`L.H^H`.^`.L^`L.^`.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.^`.^`.pp^p`.@ @ ^@ `.^`.^`.^`.^`.PP^P`.^`o(.^`.pL^p`L.@ ^@ `.^`.L^`L.^`.^`.PL^P`L.drL(h]TcvT$D>AA x         x                          3Rr3}Jk>Rr3jthRr31?yu[ & ,qW@ E.hE+Cc.9'| ,caR2] _ @<<<<4 ] @ @@Unknown G.[x Times New Roman5Symbol3. .[x ArialK=   jMS Gothic-3 00007$BCambria;. .[x Helvetica7..{$ CalibriC.,.{$ Calibri LightA$BCambria Math"qhJJ::!20M M KHP  $Pu[2!xx Prof. LP Parker, Lucy      Oh+'0x  4 @ LX`hp Prof. LP Normal.dotmParker, Lucy3Microsoft Office Word@@o@o ՜.+,D՜.+,0 hp  CECS:M   Title 8@ _PID_HLINKSADm khttps://www.ted.com/talks/finn_myrstad_how_tech_companies_deceive_you_into_giving_up_your_data_and_privacyK 4http://en.wikipedia.org/wiki/Microblogging_in_ChinaS%http://en.wikipedia.org/wiki/Twitter H1http://library.csun.edu/ResearchAssistance/AskUs&http://libguides.csun.edu/computer100  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghjklmnopqrstuvwxyz{|}~Root Entry F2Data i*1Table.WordDocument4SummaryInformation(DocumentSummaryInformation8CompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q