Annotated bibliography for film theory

I need an explanation for this Film question to help me study.

PLEASE READ IT CAREFULLY!

PLEASE INCLUDE EVERY POINT NEEDED.

Compile your bibliography. The number of sources you will need will depend upon your topic, but I recommend that you have no fewer than three and no more than six, beyond those you have chosen from our text.

Assemble and format your bibliography according to Joseph Gibaldi’s Modern Language Association Handbook for Writers of Research Papers. It is essential to the assignment that you consistently use this bibliographic style.

Annotate your bibliography. An annotation is a brief description of the text which summarizes the main issues and indicates the text’s importance to your essay. Each bibliographical entry plus its annotation should be a substantial paragraph. Your entries should be arranged in a recognizable and relevant order, i.e. hierarchically according to importance, chronologically/historically etc. You must provide me with a brief preface to your bibliography (of one paragraph) indicating your essay’s prospective thesis, a justification for the ordering your bibliography and a rationale for including the particular secondary sources you have chosen.

Topic:(CHOOSE ONE of it)

2. With reference to a specific film, compare and contrast Christian Metz’s and Laura Mulvey’s accounts of voyeurism, fetishism and identification. Which is more useful? How and why?

3. How does the Lacanian mirror stage theorize film spectatorship? Evaluate the success and application of Lacanian psychoanalysis to the writing of two film theorists with respect to cinema

(((((Please find academic resources, for example, on JSTOR))))

Digital Trade

I don’t understand this Communications question and need help to study.

STEP 1: Review the graphic on slide 4 (What is Digital Trade)

STEP 2: Choose one of the digital trade factors in bold text from the graphic (do not choose Cloud Services)

Note:

Brief Description(make this the first section heading),

Trends (growing, declining, stable, being replaced by some other technology, etc – Make this the 2nd section heading), and

2 or more articles (preferably)

APA Format

400-600 words

Case study: TOMS shoes Company

I need help with a Management question. All explanations and answers will be used to help me learn.

Questions.

Read carefully the attachment text and answer the following questions:

  • What is the competitive strategy used by TOMS Shoes Company? 1 mark
  • Identify opportunities and threats as well as strengths and weakness of the company. (Illustrate them within a table ). 2 marks
  • Describe the roles of directional, marketing, operations and human resource strategies in the overall well-being of TOMS Shoes Company. 2 marks

Info Tech in Global Economy

I’m working on a Writing question and need guidance to help me study.

Topic: Info Tech in Global Economy

Question:

Chapter 11 – From the chapter, we learned that the pattern of behavior arises from fundamental psychology and in particular, the following: a) our capacity for habitual behavior, b) the difference between intelligence as the manifestation of the coping mode of cognition and understanding as the manifestation of the pervasive optimization mode, and c) the phenomenon of authoritarianism as the need for external authority through a lack of understanding of one’s living environment. On the same line of thought, Andringa (2015), stated that the combination of these phenomena leads to a formal definition – the Bureaucratic Dynamic – and this is where the prevalence of coercive formalization scales with what the author terms as “institutional ignorance” – a measure of how well workers understand the consequences of their own actions both within the organization as well as the wider society…

Q1: In conclusion, the author presents a view that most people may agree with – that “All human activities benefit from some form of formalization, and that formalization allows automating routine tasks, to agree on how to collaborate, determine when and how tasks should be executed, and when they are finished.” The author offers a key reason(s) why procedures should not be changed too often. What are those reasons? Provide a brief explanation.

  • what are those reasons?
  • provide a brief narrative of why procedures should not be changed too often to support your response,
  • DO NOT Copy and Paste Responses Directly from the textbooks and any other digital Internet sources, it’s Verbatim!

Instructions:

  • Minimum 400 words
  • Textbook Attached
  • Need 3 APA References
  • Single space and single page
  • No Plagiarism please.

no specific question, please respond to the four discussion posts as directed (75 words minimum each)

I’m studying for my Computer Science class and don’t understand how to answer this. Can you help me study?

INSTRUCTIONS:

Be clear about which message you are responding to. Refer to specific passages or ideas in the course or text that have sparked your interest. Make sure your contribution adds something new to the discussion. A simple “I agree” may be your initial response, but think about how you can take the conversation to the next level. Use a minimum of 75 words each in response to the 4 classmate post.

IT117: Website Development

CLASSMATE POST #1

Templates are a great way to reduce repetition and standardize a task. In website design, many websites can have the same base style, and in that case a template offers a solid foundation. This can be particularly valuable if you have achieved success with a certain style in the past. Another great application for a template in web design is to focus a group of people on a common vision. Consider a customer having specific requirements for their design and you would like to collaborate amongst multiple people. Using a template in this case keeps the group focused on the customers wants. However, in that same regard, using a template limits creativity by reducing the artistic freedom of the designer. Templates also have the ability to breed complacency in my opinion. If the same template is continually used, the designers may forget the tasks they are not doing frequently because of the automation the template provides.

Jason

CLASSMATE POST #2

Class,

In logging into the web file server for the first time was straightforward for me. I didn’t notice any issues both days that I accessed it. Since my first login I saved my login information on my personal device to speed up the process. I did not delete my email though. I will keep that in a safe place in case of emergencies.

To me although it’s controlled through the web browser, it’s the same as using your file explorer on Windows operating system (OS). The web server seemed very upfront and intuitive. I did not have an issue uploading in either manner of drag and drop, or the browse by folder selection.

Now, given that it is controlled through the web browser and not your local machine you do need to remember to refresh. If you want an updated look at the information that is there this is required. The page will automatically do so when you add items or jump to another folder. If you happen to sit on the site long enough it won’t do it on its own. This isn’t really an issue, but I noticed it when I changed out my file from the seminar the other night. I hovered over the blue icon next the yellow one and the file which gives the time that is was last changed. This hadn’t changed from when I did it which showed “has been changed 0 min ago.”

Did anyone else notice this like I did?

V/R,

Micah

IT261: Desktop Administration

CLASSMATE POST #3

The three most popular features I found for Windows 10 are:

Start menu

This feature allows you to access all of your programs from the click of a button. there is also a search bar from the menu that you can use to search through your programs in real-time. You also have access to your power options. It also allows you to customize widgets on the menu so you can see news feeds whenever you click on it.

Cortana integration

Cortana has been integrated into windows 10 which allows you to search for programs, media, or pretty much anything that’s on your hard drive just by speaking. You can also use it to send email while you are working on something else. Of course this requires that your CPU has a microphone connected.

Virtual Desktops

This feature allows you to view all of your screens at once allowing you to quickly switch between your various programs. It also allows you to see how many programs you have running at a glance.

Travis

CLASSMATE POST #4

The first popular feature in Windows 10 that improves my daily routine is the start menu. Presently, when you tap on the Start catch at the base left of the screen, you get two boards next to each other, with the left section indicating stuck, as of late and most-utilized applications. You additionally get a power catch at the best for alternatives, for example, Hibernate, Standby and Shutdown, and an all applications choice a la Windows 8. The correct section includes a choice of live tiles that you can redo, resize and rearrange. That, as well as the inquiry field at the base will investigate related Internet results notwithstanding projects and documents. I can now have the Start Menu extend to full screen at whatever point I need, taking out the requirement for a Modern UI Start Screen. This makes my start menu and my desk top much more organized to suit my basic needs.

The second popular feature that improves my daily routine is Cortana. Windows 10 brought Microsoft’s voice-controlled advanced right-hand Cortana to my personal computer, to make it simpler for me to interface with my gadget without lifting a finger. I now have the capacity to scan my hard drive for records, pull up photographs from dates, or dispatch PowerPoint introductions just by advising my PC to do as such. I can even get Cortana to send an email while I’m chipping away at a spreadsheet, making performing various tasks substantially simpler.

Lastly, the third popular feature that could improve my daily routine is You Can Now Add Multiple Desktops. Another Multiple Desktops highlight gives you a chance to run another arrangement of windows as though on another screen, however without the physical screen. This will allow you to deal with your large number of open windows and applications. Rather than having various windows open over one another on one work area, you can set up an entire other virtual work area for those projects to dwell in. Set up one particularly for home and leave your applications, for example, Netflix and Amazon open, and make another work area for work on which you keep Word, Excel and Internet Explorer open.

With the new work areas comes another approach to monitor your open applications on Windows 10. On the new working framework, you can either hit the new Task View catch on the errand banish or swipe in from the left edge of the screen to pull up a one-site hit of all your open applications and documents. It’s very little unique in relation to utilizing the Alt-Tab blend alternate route on your console, yet this displays an advantageous path for you to get a review of what’s running.

Jeremie

provide replies to below posts each in 150 words

I’m studying and need help with a Computer Science question to help me learn.

Main que:Briefly describe each of the four classifications of Big Data structure types (i.e. Structured to Unstructured) and provide an example of each , using real-world organizations.

no need to provide answer to main question.read student posts and reply accordingly.

shivan-Data Science & Big Data Analy (ITS-836-14) – Second Bi-Term

Classification of Big Data Structure Data Types

Big data refers to huge amounts of data that are too large to process and analyze by the use of traditional tools hence the data is not stored or managed efficiently. Terabytes of data are being uploaded onto different Apps daily and this poses a real threat to data analysis. There are three classifications of big data structure types, the unstructured, structured and semi-structured.

Structured Data Type

Structured data is the data stored in databases and is ordered. The two main sources of structured data type are humans and the machine. Machine-generated data include those obtained from sensors, financial systems and weblogs. Human-generated structured data type includes those input by the user, such as the name and location

Semi-Structured Data Type

The semi-structured data type is that which are in the database but are not classified as structured and still have some value that can be processed and analyzed. NoSQL documents are considered as semi-structured since they contain keywords that can be used in document processing.

Unstructured Data Type

The unstructured data type has no clear format in storage. They can either be machine-generated or human-generated. Machine-generated data include those from satellites like images and the scientific researches obtained from experiments, (Rebentrost 2014). The human-generated unstructured data type is those that have found mostly on mobile apps, social media and website contents.

Automated Data Type

The automated data type is that which is collected without human intervention from real-world systems. These systems include X-Rays and Life support systems.

shivk-There are certain basic tenets of Big Data that will make it even simpler to answer what is Big Data:

It refers to a massive amount of data that keeps on growing exponentially with time.

It is so voluminous that it cannot be processed or analyzed using conventional data processing techniques.

It includes data mining, data storage, data analysis, data sharing, and data visualization.

The term is an all-comprehensive one including data, data frameworks, along with the tools and techniques used to process and analyze the data

Structured

By structured data, we mean data that can be processed, stored, and retrieved in a fixed format. It refers to highly organized information that can be readily and seamlessly stored and accessed from a database by simple search engine algorithms. For instance, the employee table in a company database will be structured as the employee details, their job positions, their salaries, etc., will be present in an organized manner.

Unstructured

Unstructured data refers to the data that lacks any specific form or structure whatsoever. This makes it very difficult and time-consuming to process and analyze unstructured data. Email is an example of unstructured data.

Semi-structured

Semi-structured data pertains to the data containing both the formats mentioned above, that is, structured and unstructured data. To be precise, it refers to the data that although has not been classified under a particular repository (database), yet contains vital information or tags that segregate individual elements within the data

Jury Reply

I’m studying and need help with a Business Law question to help me learn.

Doing the Data Breach Lawsuit

Facts

An infidelity website, Madison Ashley and its parent company, have been sued in federal court by a man who claims that the companies failed to adequately protect clients’ personal and financial information from theft, saying he suffered emotional distress.

The lawsuit accuses Madison Ashley (MA) and parent company of negligence and invasion of privacy, as well as causing emotional distress. The lawsuit follows a breach of the Madison Ashley website by a group called the Impact Team, which downloaded “highly sensitive personal, financial, and identifying information of the website’s 37 million users.

The lawsuit follows a breach of the MA website by a group called the Impact Team which had threatened to publish the “stolen personal information” if the MA website was not shut down. This information included millions of email addresses for U.S. Government officials, UK civil servants and high-level executives at European and North American corporations.

At Trial

The Plaintiff argues that the data breach could have been avoided if the company had taken “necessary and reasonable precautions to protect its users’ information”. MA knew of several technical issues that could had led to a data breach but did nothing. The defense argues that their damages must be proven and, as there is no indication of credit card fraud or illegal use of the information, there is no basis for the case. Additionally, their website contains this sentence “We cannot ensure the security or privacy of information you provide through the Internet.”

Questions

  1. Do individuals who subscribe to and visit this site have a reasonable expectation of privacy? Why or why not?
  2. Are there facts that would support a tort action and, if so, what tort(s)?
  3. Are there any other defendants besides MA? If so, why sue just MA?

Data Breach Lawsuit

1) I do believe that the subscribers to the Madison Ashley website were owed a reasonable amount of security for their personal information. Regardless of the fact that the website is one which promotes infidelity & is obviously immoral, a contract still existed between MA and its customers. When a person paid money to MA for a subscription to their website, a contract was formed between the two parties. The person puts forth money in exchange for future services to be given via the website. Just because MA puts forth the claim in writing that, ‘We cannot ensure the security or privacy of information you provide through the Internet’, doesn’t make it true or valid. In our textbook an unconscionable contract or clause is explained as something which “…is so unfair that it is rendered void (Business Law 9th ed., pg. 146).” The text goes into further detail in describing exculpatory clauses. The text states, “Closely related to the concept of unconscionability are exculpatory clauses. These are clauses that release a party from liability in the event of monetary or physical injury, no matter who is at fault. Indeed, some courts refer to such clauses in terms of unconscionability. Exculpatory clauses are often held to be unenforceable (Business Law 9th ed., pg. 147).” So as this case goes to court, I would expect either MA to lose the case as their ‘no privacy clause’ would be deemed unenforceable or MA would eventually settle with its customers.

2) There are definitely facts here that would support a tort, specifically a tort of negligence. Entering into a contract with Madison Ashley, the customer relinquishes information such as their full name, address, credit/debit card numbers, email addresses, phone numbers, etc. in order to obtain a subscription. Like virtually all other major websites though, there exists the reasoable expectation that this vital information will be protected from any third parties. So MA had a duty to handle their customers billing information, and personal information with a reasonable amount of security once they were entrusted with it. Having allowed this data to get hacked and fall into the hands of a third party, MA caused harm to its customers by allowing their personal & financial information to leak. Among many other things, many customers might have had expensive divorces as a result of MA’s negligence. MA would have a difficult time successfully defedning against a tort of negligence here.

3) The prompt actually says, ‘An infidelity website, Madison Ashley and its parent company, have been sued in federal court‘. So MA is being sued, but also its parent company is being sued. In this case, Madison Ashley and its parent company would be co-defendants. Both entities are responsible for the website itself which was negligently operated as so to allow its users data to be breached. Its pretty clear that both MA and its parent hold the blame here for the negligence, and it makes sense for the man to be suing both and not just the one.

Watching TED and reading article, then write 250 words discussion

Help me study for my English class. I’m stuck and don’t understand.

1. Watch: https://www.ted.com/talks/juan_enriquez_we_can_reprogram_life_how_to_do_it_wisely

2.Read: “Humanity in the Age of Frankenstein’s Cat (Op-Ed)” (Links to an external site.)

3.Read: Chap. 1-2 in Frankenstein’s Cat

Write a 200+ word answer to this question: “How should people responsibly deal with all of the challenging questions that biotechnology brings to the table?”

  • Please include one quote from the book or article
  • Please include one quote from the Ted Talk
  • Please include an in-text and works cited for all sources you use

Therapy for Clients with Personality Disorders

I don’t know how to handle this Nursing question and need guidance.

Therapy for Clients with Personality Disorders

Clients with personality disorders often find it difficult to overcome their problems and function in daily life. Even when these clients are aware that they have a dysfunction with their personality and are open to counseling, treatment can be challenging for both the client and the therapist. For this Discussion, as you examine personality disorders, consider therapeutic approaches you might use with clients.

Post a description of the personality disorder you selected. Explain a therapeutic approach (including psychotropic medications if appropriate) you might use to treat a client presenting with this disorder, including how you would share your diagnosis of this disorder to the client in order to avoid damaging the therapeutic relationship.

Support your approach with 3or 4 evidence-based literature to support your writing.

need 1&2 in different docs please min 400-500 words each and 2-3references each with citations and please APA

Need help with my Engineering question – I’m studying for my class.

1)This is the last discussion for this short semester. This one should be pretty easy. There are two parts:

Part 1 (4 points): Create a thread and do BOTH of the following:

Tell me (honestly) that you have read chapter 11 in the text.

Describe whether you feel that online class discussion help in learning the material, or that they do not help. (And explain why or why not.)

Part II (bonus points – up to 3): Comment on AT LEAST 3 other students’ threads (1 point per comment, up to 3 points). In each comment, tell the student why their threads throughout the semester have helped you learn more about Emerging Threats and Countermeasures.

This discussion is worth 4 points, but you *can* earn up to 7 points!!!

2)The chart you select to represent your data will be influenced by many factors. Kirk (2016) has put each chart into the five main families below:

  • Categorical: Comparing categories and distributions of quantities values
  • Hierarchical: Charting part-to-whole relationships and hierarchies
  • Relational: Graphing relationships to explore correlations and connections
  • Temporal: Showing trends and activities over time
  • Spatial: Mapping spatial patterns through overlays and distortions

Select a chart type from the text and discuss what the chart is used for and why you selected it. (The author has included a lot of different chart types in our course book)

Remember your initial post on the main topic should be posted by Wednesday 11:59 PM (EST). Your 2 following posts should be commenting on your classmates’ post on different days by Sunday 11:59 PM (EST). You should end the week with 3 total discussion posts.

A quality post is more than stating, “I agree with you.” Maybe you should state why you agree with your classmate’s post. Additionally, post some examples or find a related topic on the internet or University’s library and comment on it in the discussion post.

anishravikir