Article Writing Homework Help
Residency Research Paper Assignment Deliverable write a research paper to address all aspects of the case study/assignment presented below. This research paper should be no less than 10 pages of cont
Residency Research Paper Assignment Deliverable
write a research paper to address all aspects of the case study/assignment presented below. This research paper should be no less than 10 pages of content. You must include outside sources and properly cite and reference your sources. You must have at least 10 references, 5 of which must be scholarly peer-reviewed articles. In addition to the 10 pages of content, you must include a title page, abstract, and reference page. This report must be in proper APA format. You may refer to the UC Library or the Purdue OWL site for proper APA formatting guidelines.
Paper Sections: The following sections should be outlined as major headers in the paper.
- Introduction
- Background
- Discussion
- Conclusion
- References
All written reports must be submitted in MS Word. The paper submission will use SafeAssign. You may check your work using SafeAssign up to 3 times to make corrections prior to submission. Please ensure to properly paraphrase and use the proper (Author, YYYY) formatted APA citations with any outside content brought into the paper.
Be prepared to present a 10 to 15 -minute presentation on this assignment Sunday, October 13th. This means you will complete the research paper, then provide a summary of each of the key points of the research your group conducted. Each member of the group will have a speaking role in the presentation.
Each group must submit both the written research paper assignment and the presentation slides in the proper Residency assignment locations.
Residency Research Paper Assignment Details
The purpose of the research paper is to give a thorough review of Asymmetric Cryptography
Items that should be addressed include, but are not limited to:
- Strengths of using this form of cryptography
- Weaknesses of using this form of cryptography
- Description of algorithms that implement cryptography and strengths / weaknesses of each algorithm
- Relevant examples of modern applications / industry that utilize cryptography.
- Future use of this approach or strategy