Advocacy Paper Rubric
Health 201
Topic: Should minors receive rhinoplasties with parental consent?
Section |
Criteria |
Points |
Topic Proposal |
Topic submission is the first stage of the assignment. This should be a paragraph submitted with the topic a short paragraph explaining what the issue is and why it is important to the student.
Grader will evaluate: - Was the topic proposal submitted on time. - Did the topic proposal show evidence of thinking about the issue and demonstrate background reading on the topic? - If a revision was necessary, was feedback incorporated. |
5 |
Primary Argument Summary |
Primary argument summary is a brief paragraph explaining what perspective the student will be advocating in the paper.
Grader will evaluate: - Has the student demonstrated understanding of his/her primary argument. - Has the student submitted at least one source for his/her primary argument. |
5 |
Counter Argument Summary |
Counter argument summary is a brief paragraph explaining what perspective the student will be advocating against in the paper.
Grader will evaluate: - Has the student demonstrated understanding of his/her counter argument. - Has the student submitted at least one source for his/her counter argument. |
5 |
Introduction |
The introduction should contain topic background and presentation of relevant facts. These facts will be used to support arguments and counter arguments as appropriate in future sections. The introduction should answer the question: What is the controversy inherent in the topic you have chosen?
Grader will evaluate: - Does the introduction of your topic provide adequate definitions and background information? - Are all statements of “fact” cited and referenced? This includes everything from statistics and definitions to general statements. |
15 |
Primary Argument |
The primary argument presents the practical problem or dilemma inherent in the chosen topic. The dilemma must be well defined and the critical issues both explained and justified. The argument must employ relevant facts that are properly referenced.
Grader will evaluate: - Has the author defined a primary argument that is well-supported, objective and non-biased? - Has the author justified his/her arguments with facts and are these facts properly cited/referenced? |
20 |
Counter Argument |
The counter argument presents a different perspective on the practical problem that was presented in the primary argument. This argument must be well defined and the critical issues should be both explained and justified. The argument must employ relevant facts that are properly referenced.
Grader will evaluate: - Has the author defined a counter argument that is well-supported, objective and non-biased? - Has the author justified his/her counter argument with facts and are these facts properly cited/referenced? |
20 |
Resolution (conclusion) |
The resolution should circle back to the primary argument and explain why the primary argument is still the correct conclusion despite the stated counterargument.
Grade will evaluate: - Has the author presented the primary argument in a new light that allows the primary argument to overcome the counter argument? |
20 |
Format |
Adherence to formal academic writing should be adhered to in the advocacy paper.
Grader will evaluate: - Was this paper written in the third person? - Does the paper have a cover page? - Does the paper contain a minimum of three citations (APA style recommended)? - Was this paper proofread for grammar, spelling, typos, etc.? - Does this paper contain sections headers and have a clear flow? |
10 |
Discussion 1: 802.11 which is commonly known at WLAN is extension to LAN (local area network ), which provides enhanced user mobility and net work access (Cyrus, T. Et al). It consists of group of network nodes which can communication radio communication in home, office or building campus. It is legacy technology is use very less. Securing any system should meet some basic fundamentals of security. Authentication, integrity and confidentiality are the basic aspects those needs to be provided to secure the system. There are two ways 802.11 provides authentication, open-system and shared key. Open system is not trusty authentication mechanism, the reason is it only accepts the MAC address for authentication, which can be spoofed and is not verified. Shared-key involves AP(access point) sending some sort of challenge to client , then client generates the response for the challenge and sends it back. AP validates the response and compares with the challenge sent. This was a shared secret can validate that it was only sent to client and not other party. WEP (wired equivalent privacy) is the algorithm security algorithm for 802.11 . It gives confidentiality , integrity and authentication to 802.11. WEP gives RC4 cypher algorithm to encrypt the communication. It only support 40 bit key. Private vendor might support longer keys , but its not part of the standard. Reference : Cyrus, T., Scarfone, K., Dicoi,D.,Sexton, M. Guide to securing legacy wireless 802.11 wireless networks. National Institute of Standard Technology. Discussion 2: The various wireless technologies to maximize the use of available radio frequencies were WiMAX and Wi-Fi. Worldwide interoperability microwave access (WiMAX) is a rapidly growing IP-based wireless technology that offers easily realizable promises to deliver voice, data, and video signals over the internet throughout the world, including rural communities of emerging nations. (Abate, 2009) It comprises a WiMAX base station (BS) and customer premise equipment (CPE) for indoor service, and a mobile unit or modem for outdoor service. WiMAX BS theoretically covers a range of up to 30 miles, but it is really limited to a more practical range of 6 miles. Wi-Fi is a well-known wireless network that allows devices such as computers, phones and other equipment like printers and video cameras to connect with the Internet. It allows these devices and many more to exchange information with one another, creating a network. The different methods that can be used to secure wireless networking were described below: Use stronger encryption Use a secure WPA password Check for rogue Wi-Fi access points Provide a separate network for guests Hide your network name Use a firewall Enable MAC authentication for your users Use a VPN Reference: Abate, Z. (2009). WiMax RF Systems Engineering. Artech House, Inc.

Get help from top-rated tutors in any subject.
Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com