Premium Essay

College Research Assignment

In: Other Topics

Submitted By markfire343
Words 397
Pages 2
Massachusetts Institute of Technology

The college I choose to research is Massachusetts Institute of Technology. MIT is a private research university located in Cambridge, Massachusetts. The enrollment size is roughly around 4,000 and 6,000 students. I choose to research this school because MIT places among the top ten in many overall rankings of universities in the America. Also I recently heard on KPBS about the school and how prestigious the school is. The big thing that distinguishes this school from others is that this school has been known to educate geniuses. Also this school is Consistently ranked among the top engineering and computer science programs in the world. MIT offers a wide curriculum designed to allow students to explore their own interests in increasing depth and hands on. The thing that really interested me about this school is that they believe that a “hand on training” is the best way to train students. I also believe that learning something new will stick best if done hands on. Nearly every single engineering major is offered at this school, however they do not offered any fire science classes. With an acceptance rate of around 10%, MIT is one of the most selective colleges in the United States. Some of the basic requirements to be eligible to apply to MIT are having a 4.0 and a 2,400 on the SAT. The incoming freshman GPA’s are around a 4.0 and are at least a 2,400 on the SAT. They have many internship/job/education opportunities at MIT they also have many extracurricular activities. Also the more experience you have the more points you will get towards being accepted. It also matters where and when you got that experience.

Arambula 2 My chance of being admitted into this school is very low on the account that my test scores are average instead of above average. Also I am very educated so I…...

Similar Documents

Premium Essay

Research Methodology Assignment

............................ 1 2 Research Methodology ......................................................................................... 1 2.1 Definition of Research Methodology............................................................. 1 2.2 Qualitative versus Quantitative Research Methodologies ............................. 2 2.3 The author’s research philosophy .................................................................. 3 3 Quantitative Methods............................................................................................ 4 4 Example for the Conduction of Quantitative Research ........................................ 5 5 Conclusion ............................................................................................................ 7 Appendix.................................................................................................................. 9 Bibliography .......................................................................................................... 11 1 1 Introduction Research methodology is very important because research is used in most professions as well as in science.1 Managers for example need research to achieve information about the customers and the market they intend to advertise their goods and services before making any kind of decision.2 Researchers and academics apply research methodology to gather new knowledge and information. But often the meaning of research methodology, especially......

Words: 3358 - Pages: 14

Free Essay

It302 Research Assignment 1

...Research Assignment 1 IT 302 Linux System Administration January 21, 2013 The purpose of this paper is to secure UNIX/Linux operating systems from unscrupulous people. It shall be focused on SELinux, chroot jail, and iptables. Each of the three focus areas will be detailed, with specific interest in the following. What organization is behind it and reason entity is involved. How each technology changes the operating system to enforce security, and if the security measure can be easily bypassed. And finally, describe the types of threats each of the technologies is designed to eliminate. Since no two UNIX-based operating system builds are exactly alike, it is important to note that each build may have its own inherent security flaws. SELinux was developed by The United States National Security Agency (NSA). The first version was made available to the open source development community under the GNU GPL on December 22, 2000. The software merged into the mainline Linux kernel 2.6.0-test3, released on 8 August 2003. Other significant contributors include Network Associates, Red Hat, Secure Computing Corporation, Tresys Technology, and Trusted Computer Solutions. Experimental ports of the FLASK/TE implementation have been made available via the TrustedBSD Project for the FreeBSD and Darwin operating systems. The reason NSA is involved in this project is because this organization is responsible for carrying out the research and advanced development of......

Words: 900 - Pages: 4

Premium Essay

Research Assignment

...Research Assignment Part I. 1. Student Wonders if College Prepares Us A. McCarthy, K. February 13, 2013. Student Wonders if School Prepares Us. Staff writer Retrieved from http://www.leprovoc.com/student-wonders-if-college-prepares-us-1.2989868#.UScktqWsiSo B. This article discusses how college prepares one for the real world. It gives statistics on job students who obtain jobs after college and students who don’t. C. I may use this article to feed off some ideas for my speech. Although the author does not talk about the things I am, I can still get some ideas from it. Part II. 1. Poll: Students Say High Schools Failing To Support Their Pursuit Of Jobs, College A. Stacy, A. April 19th, 2011. Poll: Students Say High Schools Failing To Support Their Pursuit Of Jobs, College. B. This article discusses high school student’s opinion on why high school is not supporting their future of jobs and college. C. I may use this article to give the other peoples side of why they think school doesn’t prepare them for life. Then I will prove that theory wrong with factual information and statistics. Part III. 1. http://www.timemanagementhelp.com/ A. Retrieved February 20th, 2013, from http://www.timemanagementhelp.com/highschool.htm B. This websites talks about ways to improve on one’s time management. C. I may use this website to give my audience ways they may better their time management while they are in school and in the......

Words: 326 - Pages: 2

Premium Essay

Unit 2 Research Assignment

...Research Assignment Java is a general-purpose, concurrent, class-based, object-oriented computer programming language that is specifically designed to have as few implementation dependencies as possible. It is intended to let application developers "write once, run anywhere" (WORA), meaning that code that runs on one platform does not need to be recompiled to run on another. Java applications are typically compiled to bytecode (class file) that can run on any Java virtual machine (JVM) regardless of computer architecture. Strengths:WORA, popularity Weaknesses: Slower than natively compiled languages Sample syntax: class HelloWorldApp { public static void main(String[] args) { System.out.println("Hello World!"); } } C++ is a programming language that is general purpose, statically typed, free form, multi-paradigm and compiled. It is regarded as an intermediate-level language, as it comprises both high-level and low-level language features. Developed by Bjarne Stroustrup starting in 1979 at Bell Labs, C++ was originally named C with Classes, adding object oriented features, such as classes, and other enhancements to the C programming language. The language was renamed C++ in 1983, as a pun involving the increment operator. Strengths:Speed Weaknesses: Older and considered clumsy if compared to Java Sample syntax: #include using namespace std; void main(){ cout << "Hello World!"; } C# is a multi-paradigm programming language......

Words: 477 - Pages: 2

Premium Essay

Market Research Assignment

...[pic] [pic] UniSA/Taylor’s College Undergraduate Business Programs Assignment Cover Sheet Please print clearly and attach cover sheet to the front of your assignment Student Name UniSA ID Taylor’s ID Nur Hazwani Bt Hasnul Hisham 100086169 0702W59544 Course Name Course Code Market Research MARK2020 Taylor’s Course Coordinators Name Assignment Due Date MS. Neliza 8TH October 2007 Assignment Name & Number Assignment 2 I declare the following to be my own work and that to the best of my knowledge and belief does not contain any material published or written by another person except where due reference is made in the text. I authorise the University to test any work submitted by me, using text comparison software, for instances of plagiarism. I understand this will involve the University or its contractor copying my work and storing it on a database to be used in future to test work submitted by others. I understand that I can obtain further information on this matter at: http://www.unisanet.unisa.edu.au/learningconnection/student/studying/integrity.asp Signed: CWani Dated: 8th October 2007 Tanjung Golden Village (TGV) Sdn Bhd operates the largest multiplex in the country, Malaysia. TGV has 63 cinemas in 8 multiplexes which located at Klang Valley of five and one multiplex in...

Words: 1796 - Pages: 8

Free Essay

Facebook : English Research Assignment

...Facebook english reae RESEARCH ASSIGNMENT THE STUNNING IMPACT OF FACEBOOK IN TODAYS SOCIAL ORDER INTRODUVTION: * ATTENTION GETTER: Did you know, the utilization of Facebook can make you feel terrible about yourself? * THESES: Sure, Facebook can make you feel like you have got all the friends in the world, but it also makes you feel lonely and left out, hinders your privacy, and in more regrettable case, can even lead to cyber bullying Body: * Facebook gives you a false sense of connection. 1. Not all the friends on your list are real. 2. Can lead to comparisons between your friends. You always feel the other person is more rich, has more friends and is way happier. * Privacy issues are one of the major issues faced by facebook users 1. Facebook encourages people to be more public about their personal lives 2. When inappropriate images are uploaded, they can affect your career when a background check is done. * Facebook and teenage cyberbullying 1. Fake profiles are created and abusive texts are sent and posted. 2. According to 2010 CBC news report around 42% of teenagers using facebook have been victims. CONCLUSION: * Memorable statement: Technology is clearly advancing humankind, curing sickness, taking us closer to space, improving our standards of living. – But it is also at the same time, deteriorating some aspects of all of this, and too much of reality is at risk of disappearing unless we can detach......

Words: 318 - Pages: 2

Free Essay

Research Database Assignment Form

...Research Database Assignment Form Describe briefly your topic of interest (15 possible points): The area that was chosen for this assignment is alarm fatigue. Alarm fatigue has been described as the process that occurs when nurses are desensitized due to too many alarms that are sounding constantly. Often times, there is no clinical indication for alarms that are sounding. This leads nurses to make the assumption that certain alarms are not important or the alarms very simply become background noise. Alarm fatigue has become nationally recognized and is the National Patient Safety Goal (NPSG) that was implemented by JCAHO for 2014.  Medical alarms that are supposed to make nurses aware that something is wrong with the patient and prevent sentinel events have resulted in sentinel events. Some research has been done to show that alarms that were ignored is what led to the sentinel event occurring.  I chose to research this area as I have witnessed this in the workplace over the years. I am reluctant to see what the outcomes of research on this subject will lead to and what protocol implementations will occur to meet the 2016 JCAHO deadline for this problem to be addressed. #1 Database (or collection) (30 possible points): Title of source: Association for the Advancement of Medical Instrumentation (AAMI) Location of source (URL): http://www.aami.org/htsi/alarms/library.html Owner or publisher: Healthcare Technology Safety Institute (HTSI) Describe (in......

Words: 1346 - Pages: 6

Premium Essay

Research Methods Assignment

...International Security and Conflict Research Methods Assignment In the field of political and international relations studies, there are two broad types of research methods, which include and combine various research methods, based on its designs and core principles, and they are quantitative and qualitative research methods. Also, there is the third one, called experimental research method, which does not fit into qualitative and quantitative methods, but rather constitutes separate research design, although it might be based on qualitative and quantitative methods’ tools and theories. Quantitative research methods include many particular techniques and in general could be described as methods, which works with numbers and applies statistical analysis by using various mathematical operations with formulas and computer software. The usage of surveys and various types of databases are examples of quantitative methods. Scientists conduct surveys either in person, or through telephones, mail or internet to collect data concerning people’s opinion and attitudes about particular events in politics and international relations (Box-Steffensmeier, 2008, p. 9-10). Then, gathered information could be analyzed through the coding of data into numbers and application of tools of statistical analysis on them. Surveys allowed scientists to form databases from the collected data that made it possible to share databases with other scientists, especially with the emergence of internet, test...

Words: 1069 - Pages: 5

Premium Essay

Research Assignment 7 (China)

...Academic Honesty PolicyIndividual Assignment Cover Page  Submitted to: |    DR. Constance Bates   | Submitted by: |   Anette Leiton   | Your Phone Number: |   305-490-4663  | Your e-mail: |  aleit001@fiu.edu    | Date of Submission: |  12/07/2014   | Title of Assignment: | Research Assignment # 6 ( China)  | CERTIFICATION OF AUTHORSHIP: I certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledged and disclosed in the paper. I have also cited any sources from which I used data, ideas or words; either quoted directly or paraphrased I also certify that this paper was prepared by me specifically for this course. Signature:Anette Leiton ___________________________________________________  | | Research Assignment 7 Brillianc e and Blunde rs in China ’s Supply Cha in (10 pts) Correct answers are based on course-assigned material (text and readings). This week the main topics are competition and supply chain. China is our focus country. We can start with the “Brilliance” part: from diamonds to Eastern Europe to South Africa. And now we have reshoring: back to the US. Last article is about how global supply chain is evolving. 1. China is now the biggest buyer of diamonds from Antwerp, importing $737 M in the first 3 Months of 2010. 2. The Belgian diamonds may have been cut in China to save money. 3. Perhaps surprisingly, China is building low-cost......

Words: 398 - Pages: 2

Premium Essay

Research Assignment

...Critiquing Research According to Webster (1985), to research is to search or investigate exhaustively. He also states that it is, “A careful or diligent search, studious inquiry aimed at the discovery and interpretation of facts.” The piece being critically reviewed is an article by Dr Ann Seed (1995), “Crossing the Boundaries – Experiences of neophyte nurses.” Readers sometimes assume that if a report was accepted for publication; the study must be sound (Polit & Beck 2004), unfortunately this is not always true. In order to determine the quality of the work, a critical review is needed. This work will use the Model for Critical Appraisal of Studies by B Roe (1993). The Introduction The introduction should acquaint readers with the research problem and context (Polit & Beck 2004). The introduction in Seeds research is informative but does not give actual reasons for the study and what expectations are. These are not established at all in the published piece; this is a problem for the reader as it leaves one guessing what Seed feels the importance is and what the intentions were, this should have been highlighted in the beginning. Literature review Seed does not use a literary review. Cormack (2000) states all articles should; as quoted in Polit & Beck (2004); Glaser and Strauss (1967) disagree, and state it is not correct to take on qualitative research having pre-examined earlier works. The author does not discuss reasons why she has not included a literary...

Words: 2373 - Pages: 10

Premium Essay

Research Method Proposal Assignment

...Research Methods Assignment 1. The research question is whether exposure to sun and listening to familiar music affects a person’s mood. 2. The research hypothesis is that a person who is exposed to the sun and listens to familiar music would be in a better mood than a person not exposed to the sun and listens to unfamiliar music. 3. The population of interest for the research could theoretically include all group ages and their status in life. For the sake of the research, our sample would be students between ages 22-27 from 4 different universities (sample size of at least 60 people to get significant results). 4. We will divide our sample into 4 different groups Sun exposure + familiar music (group 1) | Sun exposure + non-familiar music (group 2) | No son exposure + familiar music (group 3) | No sun exposure + non-familiar music (group 4) | 5. The independent variables in this research are sun exposure and listening to familiar music. The dependent variable is the person’s mood. Sun exposure can be practically defined by determining a certain amount of time from which we can conclude that a person has been exposed to sun (i.e. 30 minutes). The definition for familiar music can be determined by a pilot before we begin our research on a population which is not part of the sample through which we can find out which songs are familiar (and conversely non-familiar). This way we can define practically and operationally which songs are familiar and......

Words: 672 - Pages: 3

Premium Essay

College English - Research - Gun Violence

...Instructor Quesenbury English 1301 - 002 03 December 2014 Research Paper Today's schools have to focus on so much more than reading, writing, and arithmetic. Although school officials strive to protect the student and faculty from gun violence, it's a reality in today's world. Truly something is seriously wrong because school buildings should be a safe place for all. Study after study conducted on the who's and why's of school gun violence reveals an important fact: There is no reasonable answer for such violence to have taken such a rise in incidence and continue to be the prevailing societal threat it is today, in every school across the nation, especially large school communities. The whole community needs to act together and get involved. The statistics are threatening enough. The U.S. Department of Education estimated 5.5 million students were enrolled in pre-kindergarten through grade 12 in the 2006-07 school year. Among this population, during this single year, there were 767,000 violent assaults and 35 (27 homicides and 8 suicides) school associated violent deaths (Dinkes, pars. 5, 6, 10). From the broader period, years 1999 to 2006, reported 116 students killed in 109 school associated incidents (Shuster, par. 2). Although national attention to school shootings has heightened in recent years, a violent incident in a school setting was first recorded in 1955. In a Swathermore College dorm in Swarthmore, Pennsylvania on January 11, Bob Bechtel, age 22...

Words: 1794 - Pages: 8

Free Essay

Career Research Assignment

...Ataur Rahman CARD 405 Jan 30th, 2010 Career Research Assignment Scenario: You just found out that your spouse received a promotion at his/her job. The only problem is that this promotion will force you to move to another state. Fortunately, you have just graduated from DeVry University and are ready to obtain a position with your new degree. Before you go, you want to do some research. •What type of position will you will be seeking and in which state? I will be looking for a database administrator position in Omaha, Nebraska. •What type of salary can you expect for this position in your new state? Average database administrator salary in Omaha, NE = $68,000 Average salary of jobs with related titles range between $58,000 and $96,000 http://www.indeed.com/salary/about_salary.jsp http://www.indeed.com/salary?q1=Database+Administrator&l1=Omaha%2C+NE The following shows a wider range of salaries, giving me a better idea of the actual possibilities of obtaining employment that will adequately support my needs. Salary Data for Database Administrator in Omaha, NE as of September 2009 25th percentile Median 75th percentile $24,960.00 $65,000.00 $75,000.0 http://www.ihiredatabasepros.com/t-Database-Administrator-s-Nebraska-c-Omaha-salary.html What is the “official” (such as the information provided in The Occupation Outlook Handbook Online located in the Webliography) employment outlook for this position in your new......

Words: 1098 - Pages: 5

Free Essay

Research Assignment

...Senior Research Paper 2011-2012 The Basics Your assignment is to write a persuasive literary analysis research paper over an approved author and topic. The Topic Your may choose one of the following topics to write about: 1. How the author’s life influenced their work (if it did at all). 2. A common theme that appears in many of their works. Keep your preferred topic in mind as you gather your sources. It will help you decide on what source material you should keep and what source material you should discard. All your source material should help you formulate your argument. The Sources Your sources must be legitimate and academic. I expect you to use a variety of the sources available in the library including books, online databases, magazines, journal articles, etc…. You may not use generic internet sources (e.g., Poemhunter.com, Wikipedia, Spark Notes, Pink Monkey, etc…). You may use information gathered from books.google.com or scholar.google.com. Source Requirements: • A minimum of 4 original works by your chosen author- these will be poems, or short stories, or plays, etc… • A minimum of 3 criticisms that provide relevant information about your author and topic. • A minimum of 1 biographical source. Make sure you have detailed information about your poems and authors, including textual examples, line numbers, and source information need to complete the works cited. Paper Format The paper will follow all applicable MLA......

Words: 691 - Pages: 3

Premium Essay

Research Assignment

...Tone Rogers IT 221 Research Assignment Part 2 & 3 11/16/11 The purpose for Global Names Zone in Windows Server 2008 DNS is to aid retirement WINS. Keep in mind that it is not a replacement for WINS. Also it is not intended to support the single-labeled name resolution of records that are dynamically registered in WINS, records which typically are not managed by IT administrators according Microsoft wizard. According to Microsoft TechNet with RODC organizations can easily deploy domain controllers in locations. Which security can be guaranteed. It differs by having better security, faster login time, and more efficient access to resource on the network. Background loading is a new feature on Windows Server 2008. When this service starts, it creates one or more threads of execution to load the zones that are stored in Active Directory. After the Global Names zone is deployed, when a Windows Vista-based DNS client attempts to resolve a single-label name, it appends the primary DNS suffix to the single-label name and submits the name query request to its DNS server. IPv6, which has been covered in previous editions of this column, is a new suite of Internet standard protocols. IPv6 is designed to address many of the issues of the current version—IPv4—such as address depletion, security, auto configuration, and the need for extensibility. One difference in IPv6 is that its addresses are 128 bits long, while IPv4 addresses are only 32 bits. IPv6......

Words: 578 - Pages: 3

DR Sammlung von 1933 bis 1945 ! | 776 مسلسلات عربي 2018 HDTV الحلقة 29 ﺩﺭاﻣﺎ مسلسل عمود البيت الحلقة 29 التاسعة والعشرون عمود البيت 2018  اتش دي يوتيوب , مشاهدة الحلقة 29 التاسعة والعشرون من مسلسل عمود... | Counterpart - 2ª Temporada Legendada Torrent Drama / Ficção / Suspense 2018 Anonymous Content / Starz 1080p 720p FullHD HD WEB-DL MKV DownloadSegunda temporada completa com todos os episódios já lançados da série...