Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

You have written a four-source essay and a six-source essay and are working toward the multiple-source essay.  Throughout the semester up to this point, you have integrated sources into your writing

You have written a four-source essay and a six-source essay and are working toward the multiple-source essay.  Throughout the semester up to this point, you have integrated sources into your writing and have gleaned various strategies in using different ways of integrating sources.

As we conclude the course, please examine the following short paragraph on a hypothetical paper about cybersecurity and the Internet of Things.  The writer has made some errors in his integration of Shindell as a source. 

Please identify at least two errors.  Describe what the errors are in a sentence or two.  (You don’t have to re-write the paragraph.  You just need to describe what the errors are.)

One potential method of hacking into a hospital’s records is through a wearable device.  Often, wearable devices are used by health care institutions to monitor blood pressure or other health conditions.  However, such devices expose vulnerabilities in the system.  (Shindell, 2018) argues that hackers increasing integrate malware to infect such devices and then use them as foundations upon which to attack the health care institution’s IT systems.  Specifically, (Shindell, 2018) maintains that ransomware is especially pernicious.  “During an attack, victims will typically encounter a screen giving them directions for paying a ransom to retrieve their data…”   “More than half of hospitals surveyed were hit with ransomware in the previous 12 months.”

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question