100% (1)
Pages:
1 pages/≈275 words
Sources:
0
Style:
APA
Subject:
Literature & Language
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 3.6
Topic:

Activity: Reverse Outline. Literature & Language Essay

Essay Instructions:

For this activity, you will construct a reverse outline of your persuasive essay draft. Answer the following questions to generate a reverse outline of the essay draft you completed in the previous module. You should begin by opening your essay in a word processing program like Microsoft Word.

1 - Type or copy and paste your thesis into this textbox.

2 - Type or copy and paste your first body paragraph into this textbox (NOTE: If you retype it, you might catch small-scale errors, such as grammar or punctuation).

3 - Next to each letter, fill in the Point, Information, and Explanation for your paragraph above. Then, type brief notes about whether or not you need more information, or if you feel you've accomplished what you need for this Point.

P:

I:

E:

4 - Type or copy and paste your second body paragraph into this textbox (NOTE: If you retype it, you might catch small-scale errors, such as grammar and punctuation).

5 - Next to each letter, fill in the Point, Information, and Explanation for your paragraph above. Then, type brief notes about whether or not you need more information, or if you feel you've accomplished what you need for this Point.

P:

I:

E:

6 - Type or copy and paste your third body paragraph into this textbox (NOTE: If you retype it, you might catch small-scale errors, such as grammar and punctuation).

7 - Next to each letter, fill in the Point, Information, and Explanation for your paragraph above. Then, type brief notes about whether or not you need more information, or if you feel you've accomplished what you need for this Point.

P:

I:

E:

8 - Type or copy and paste your fourth body paragraph into this textbox (NOTE: If you retype it, you might catch small-scale errors, such as grammar and punctuation).

9 - Next to each letter, fill in the Point, Information, and Explanation for your paragraph above. Then, type brief notes about whether or not you need more information, or if you feel you've accomplished what you need for this Point.

P:

I:

E:



10 - If you have one, type or copy and paste your fifth body paragraph into this textbox. If you do not have a fifth body paragraph, please enter "N/A."

Next to each letter, fill in the Point, Information, and Explanation for your paragraph above. Then, type brief notes about whether or not you need more information, or if you feel you've accomplished what you need for this Point. If you do not have a fifth body paragraph, please enter "N/A" in the textbox below.

P:

I:

E:

Now that you have filled in each of the textboxes above, click on the "Download Word Document" link below. When you open the Word document, you will see all of your responses from the prompts above saved and collated in the document. Save your document, and use your comments to make revisions to your essay draft—which you will submit at the end of Module 7. When making these revisions, you should ask yourself the following questions:



• Do the main ideas you've written down flow logically from one to the next?

• Are the topics organized? Do they reflect the order presented in the thesis statement?

• Were you able to fill out the PIE information for each supporting paragraph?

• Are there any gaps in information?

• Is there more information on one topic over others or vice versa?

• Do any topics or examples stand out as being out of order?

• Rearrange paragraphs and sections of your paper, as needed.

**** I have attached the persuasive essay draft that you wrote for me.

Essay Sample Content Preview:

Reverse Outline
Students Name
Institutional Affiliation
Thesis statement: There are other solutions for dealing with cyber-attacks such as the creation of strong password policies and the destruction of the hacked data.
First paragraph: Hacking back creates endless battles between the hacker and the organization being hacked hence risking the loss of more data. Also, it creates the possibility of the hacker exposing the data that they had already hacked and, this can have negative impacts on the reputation of the company. For instance, the data might have been very crucial to some of the clients and, hence, the hackers can decide to blackmail them. Before a client trusts to keep their data with a certain company. They are assured that the data will not be accessible by a third party and therefore, they do not expect the organization to lose. Hence, the organization should not hack back since this can result in their clients finding out that their data has been leaked. The outcome is that most of the clients will withdraw their services with that organization. Therefore, it is not good to hack back.
P: Hacking back creates endless battles between the hacker and the organization being hacked hence risking the loss of more data
I: I have given several explanations as to the dangers that hacking back would create for the company that was hacked into
E: The information provided helps in convincing the audience that they should not hack back because it has a lot negative impacts on the organization. This pargrapgh has sufficient information.
Second paragraph: The creation of strong passwords reduces the chances of a company being hacked into. Companies should ensure that the Information and Technology team is up to date with the current system requirements. This enables the workers to change their passwords regularly. As well, the password policy should prevent the employees from using a password that they have used before this stands the hackers a better chance of guessing the password. Also, there are obvious passwords that cannot be used such as a personal identity card number or their mobile phone number. Most people choose these as their passwords and, therefore, they can easily be guessed by anyone hence allowing a third party to access the organization's data. The IT team should ensure that they have clear login records for all the employees so that they can be able to detect any suspicious activity and act on time. Employees should also be given strict rules regarding the use of their login details. Among them is ensuring that they always log out of a device once they have finished doing a specific activity. This does not only prevent hacking but also ensures that other employees do not use another person's login details to carry out malicious activities. Therefore, in the event whereby an organization has been hacked into, it is important for them to review their password policy to prevent future attacks (Kallberg, 2015).
P: The creation of strong passwords reduces the chances of a company...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Sign In
Not register? Register Now!