Description
Personal Narrative
Describe an encounter with someone whose culture was very different from your own and how that encounter influenced you.
Unformatted Attachment Preview
English 110 Composition Formal Paper #1 - Personal Narrative
Required Word Count - 750 - 1,000 words
Choose one of the following topics:
Describe a meaningful event or experience in your life and how it changed or affected
the person you are today.
Describe a personal moral or ethical predicament or problem that you faced and how it
impacted your life.
Describe an encounter with someone whose culture was very different from your own
and how that encounter influenced you.
(purdue out
Components of Your Narrative
Pog
> Use MLA format: double-spaced, one-inch margins throughout, and required headings. (574,575
> Have an engaging, catchy title.
> Begin with an introduction that establishes the setting, or where the story takes place,
descriptive details, use imagery, clearpoin-
> You must have a minimum of three body paragraphs that continue to provide details
that clearly describe the situation or event.
)
or more
Your conclusion should make clear why this story matters.
Use vivid, descriptive detail and imagery that appeals to the senses.
Include feelings, actions, and thoughts so that your reader knows how you were feeling
and what you were thinking.
& important
Use some dialogue that is smoothly inserted into your paper.
Use correct grammar and mechanics.
List your word count at the bottom of the last page.
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Excellent! Definitely coming back for more study materials.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Business Strategy Differentiation Cost Leadership and Integration Discussion
What are the extremes we encounter in those who reject a balance between faith and reason?
Business Strategy Differentiation Cost Leadership and Integration Discussion
What are the extremes we encounter in those who reject a balance between faith and reason?
Put yourself in the position of creating a disaster recovery
Put yourself in the position of creating a disaster recovery planning team for a small organization (real or fictitious) t ...
Put yourself in the position of creating a disaster recovery
Put yourself in the position of creating a disaster recovery planning team for a small organization (real or fictitious) that operates with limited resources (i.e., capital and human). Discuss the following information:Describe the organization’s business (i.e., retail or healthcare).Determine the most critical roles to fill on the team, as discussed during the reading/module content.Describe how you might combine or fill roles that you don’t have the in-house resources to fill.Your paper should be 3-5 pages in length (
Break Even Quantity
You are an economist for the Vanda-Laye Corporation, which produces and distributes outdoor cooking supplies. The company ...
Break Even Quantity
You are an economist for the Vanda-Laye Corporation, which produces and distributes outdoor cooking supplies. The company has come under new ownership and management and will be undergoing changes in its product lines and operating structure. As an economist, your responsibilities include examining the market factors that affect success or failure of a product, including the supply and demand for the product, market conditions, and the behavior of competitors with similar products.The new owners are evaluating the operating structure, and you have two possible alternatives. One alternative requires a high level of investment in fixed costs compared to the other alternative. Jorge, your supervisor, has assigned you the task of evaluating the two alternatives.Assume that the company has no debt. Regardless of the alternative selected, market conditions will require the selling price of the product to be $3.45 per unit. The details for each alternative are given in the table.
Alternative 1
Alternative 2
Variable costs
$2.20
$2.70
Fixed costs
$80,000
$30,000
Total assets
$350,000
$350,000
Tasks:Jorge has asked you to provide detailed responses to the following questions:
Analyze how the CVP analysis helps management in the planning stage of a new business.
What is the break-even quantity for each of the investment alternatives?
Analyze the breakeven differences between the two alternatives. What does the breakeven quantity tell you?
Which alternative would you recommend to the company? Explain the pros and cons of each alternative and the reasons for your selection.
Submission Details:
Submit a 3-4 page Microsoft Word document, using APA style.
CRJ 3330 SU Presentencing Process Report
The Case
Stella is a 42-year-old married mother of two. She works as an occupational therapist at a private nursing home. ...
CRJ 3330 SU Presentencing Process Report
The Case
Stella is a 42-year-old married mother of two. She works as an occupational therapist at a private nursing home. She is a respected member of the local community and is a member of the parent teacher association (PTA) at her kids' high school. Stella's husband Peter formerly worked as an investment banker but is currently unemployed. He was convicted of federal tax evasion in 2007 and served 15 months in prison for this offense.
Stella has just been convicted of state income tax evasion, because she had not paid state income tax for the past two years. Other than this offense, she has no previous record of any convictions. It was determined in court that she owes the state $4150 in back taxes and interest.
The maximum punishment for state income tax evasion is a fine of up to $25,000 and imprisonment for 25 years.
Based on your research and findings, prepare the PSI report for Stella. Include the following in your report:
In the recommendation section of the PSI report, indicate what type of sentence you would recommend.
If you recommend probation, state the reasons for doing so and specify any conditions that you recommend the court impose.
If you do not recommend probation, justify your recommendations with appropriate reasoning.
Explain how your recommended punishment will deter Stella from committing similar crimes in the future.
discussion post
Post your initial reaction, knowing the community and
the school have faced tragedy not long ago. Explain your course ...
discussion post
Post your initial reaction, knowing the community and
the school have faced tragedy not long ago. Explain your course of
action, from the moment you receive the phone call to arriving at the
school, to provide continuity in student learning and to maintain a
sense of safety and security. What resources would you utilize or
mobilize, and with whom would you collaborate to create equitable and
inclusive practices that address the crisis while maintaining a safe
school culture? Explain your rationale as well as your legal and
ethical responsibilities regarding this situation. Explain the
consequences of not responding effectively and efficiently.the scenario is sent as an attachment labeled wal_eddd8013the other two attachments are resources
Wilmington University Week 2 Solutions to Secure Computer Networks Paper
Laboratory #2: Awareness of the Availability of Security Solutions to Secure Computer Networks
Goal: To make students awar ...
Wilmington University Week 2 Solutions to Secure Computer Networks Paper
Laboratory #2: Awareness of the Availability of Security Solutions to Secure Computer Networks
Goal: To make students aware of the availability of an array of solutions to secure computer networks
Nature: Exploratory
Research and study the available software and hardware techniques to deter, if not eliminate, computer systems attacks. Write a comparative discussion paper on five (5) such techniques.
Pay attention to the following:
Encryption techniques (DNSSEC, IPSec, PGP, S/MIME)
Techniques for fault detection, isolation and repair
Intrusion Detection and Network Forensics
Firewalls (DMZ)
Secure network infrastructure services: DNS, NTP, SNMP
Similar Content
short half page research
research on these following questions:1. why did researchers study nutrition? how did they study it?(e.g. tools)2. when/h...
CMU Film as Method for Presenting Integrated Vision of Future Essay
One page essay on film as method for presenting integrated vision of future technologies in a social, cultural and economi...
University of Houston Sao Jorge Da Mina Paper
You may fulfill this requirement by visiting an organization/ exhibit/ event/ activity or attending a talk on or off-campu...
Native americans in the United States. Fictional but based of Non-Fictional events
For my history class, I have been assigned a paper regarding native americans in the 19th century. In this assignment, my ...
4.2 - Discussion: WTO, World Bank, and IMF
In the video: “How Do the WTO, World Bank, and IMF Work?” Susan George explains what the World Bank, the International...
Final Draft
Complete the final draft please...
Article Summary 2
The fasting of Ramadan is considered as a period when people have humble time to think, do some particular activities and ...
Bem Sex Role 1
Gender identity is an individual’s conception of oneself of being a female, a male, or both. The gender identity concept...
Apple
In his second stint at Apple Inc. Steve Jobs has helped in establishing cooperation as a trusted brand in the PC industry....
Related Tags
Book Guides
The Dispossessed
by Ursula Kroeber Le Guin
Cry the Beloved Country
by Alan Paton
Little Fires Everywhere
by Celeste Ng
The Fault in Our Stars
by John Green
All the Kings Men
by Robert Penn Warren
Into the Wild
by Jon Krakauer
Invisible Man
by Ralph Ellison
Where'd You Go Bernadette
by Maria Semple
Nervous Conditions
by Tsitsi Dangarembga
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Business Strategy Differentiation Cost Leadership and Integration Discussion
What are the extremes we encounter in those who reject a balance between faith and reason?
Business Strategy Differentiation Cost Leadership and Integration Discussion
What are the extremes we encounter in those who reject a balance between faith and reason?
Put yourself in the position of creating a disaster recovery
Put yourself in the position of creating a disaster recovery planning team for a small organization (real or fictitious) t ...
Put yourself in the position of creating a disaster recovery
Put yourself in the position of creating a disaster recovery planning team for a small organization (real or fictitious) that operates with limited resources (i.e., capital and human). Discuss the following information:Describe the organization’s business (i.e., retail or healthcare).Determine the most critical roles to fill on the team, as discussed during the reading/module content.Describe how you might combine or fill roles that you don’t have the in-house resources to fill.Your paper should be 3-5 pages in length (
Break Even Quantity
You are an economist for the Vanda-Laye Corporation, which produces and distributes outdoor cooking supplies. The company ...
Break Even Quantity
You are an economist for the Vanda-Laye Corporation, which produces and distributes outdoor cooking supplies. The company has come under new ownership and management and will be undergoing changes in its product lines and operating structure. As an economist, your responsibilities include examining the market factors that affect success or failure of a product, including the supply and demand for the product, market conditions, and the behavior of competitors with similar products.The new owners are evaluating the operating structure, and you have two possible alternatives. One alternative requires a high level of investment in fixed costs compared to the other alternative. Jorge, your supervisor, has assigned you the task of evaluating the two alternatives.Assume that the company has no debt. Regardless of the alternative selected, market conditions will require the selling price of the product to be $3.45 per unit. The details for each alternative are given in the table.
Alternative 1
Alternative 2
Variable costs
$2.20
$2.70
Fixed costs
$80,000
$30,000
Total assets
$350,000
$350,000
Tasks:Jorge has asked you to provide detailed responses to the following questions:
Analyze how the CVP analysis helps management in the planning stage of a new business.
What is the break-even quantity for each of the investment alternatives?
Analyze the breakeven differences between the two alternatives. What does the breakeven quantity tell you?
Which alternative would you recommend to the company? Explain the pros and cons of each alternative and the reasons for your selection.
Submission Details:
Submit a 3-4 page Microsoft Word document, using APA style.
CRJ 3330 SU Presentencing Process Report
The Case
Stella is a 42-year-old married mother of two. She works as an occupational therapist at a private nursing home. ...
CRJ 3330 SU Presentencing Process Report
The Case
Stella is a 42-year-old married mother of two. She works as an occupational therapist at a private nursing home. She is a respected member of the local community and is a member of the parent teacher association (PTA) at her kids' high school. Stella's husband Peter formerly worked as an investment banker but is currently unemployed. He was convicted of federal tax evasion in 2007 and served 15 months in prison for this offense.
Stella has just been convicted of state income tax evasion, because she had not paid state income tax for the past two years. Other than this offense, she has no previous record of any convictions. It was determined in court that she owes the state $4150 in back taxes and interest.
The maximum punishment for state income tax evasion is a fine of up to $25,000 and imprisonment for 25 years.
Based on your research and findings, prepare the PSI report for Stella. Include the following in your report:
In the recommendation section of the PSI report, indicate what type of sentence you would recommend.
If you recommend probation, state the reasons for doing so and specify any conditions that you recommend the court impose.
If you do not recommend probation, justify your recommendations with appropriate reasoning.
Explain how your recommended punishment will deter Stella from committing similar crimes in the future.
discussion post
Post your initial reaction, knowing the community and
the school have faced tragedy not long ago. Explain your course ...
discussion post
Post your initial reaction, knowing the community and
the school have faced tragedy not long ago. Explain your course of
action, from the moment you receive the phone call to arriving at the
school, to provide continuity in student learning and to maintain a
sense of safety and security. What resources would you utilize or
mobilize, and with whom would you collaborate to create equitable and
inclusive practices that address the crisis while maintaining a safe
school culture? Explain your rationale as well as your legal and
ethical responsibilities regarding this situation. Explain the
consequences of not responding effectively and efficiently.the scenario is sent as an attachment labeled wal_eddd8013the other two attachments are resources
Wilmington University Week 2 Solutions to Secure Computer Networks Paper
Laboratory #2: Awareness of the Availability of Security Solutions to Secure Computer Networks
Goal: To make students awar ...
Wilmington University Week 2 Solutions to Secure Computer Networks Paper
Laboratory #2: Awareness of the Availability of Security Solutions to Secure Computer Networks
Goal: To make students aware of the availability of an array of solutions to secure computer networks
Nature: Exploratory
Research and study the available software and hardware techniques to deter, if not eliminate, computer systems attacks. Write a comparative discussion paper on five (5) such techniques.
Pay attention to the following:
Encryption techniques (DNSSEC, IPSec, PGP, S/MIME)
Techniques for fault detection, isolation and repair
Intrusion Detection and Network Forensics
Firewalls (DMZ)
Secure network infrastructure services: DNS, NTP, SNMP
Earn money selling
your Study Documents