Need help? We are here

Research the artist and a theme

Instructions

You will select one of the major, heard-of artist mentioned in the textbook as a subject for your research paper.

Step 1: Research the artist and a theme within their work

  • This paper should be more than just being “about” the artist. It is not a biography. Focus on two pieces by the artist.
  • Identify a theme or central idea about the artist or his/her artwork (your thesis) as it relates to a theme explored in Module 4 (Part 4 of the textbook) and then build the essay around that idea.
  • Select an artist from the list below:
    • Ana Mendieta
    • Chuck Close
    • Robert Mapplethorpe
    • Faith Ringgold
    • Kehinde Wiley
    • Carrie Mae Weems
    • Judy Chicago
    • Cindy Sherman
    • Yasumasa Morimura
    • Shirin Neshat
  • The expectation is that the research should represent information from several sources (at least 3 — websites will only count as sources if they are online versions of print material) and that any direct borrowing of wording from these sources will be indicated by quotation marks and listed on the works cited page.

Step 2: Write the essay

  • Draft your thesis (remember, this is not a biography paper so your thesis needs to be about the art)
  • Identify a common theme within the artist works
    • What is the context of their work? Cultural? Spiritual? Political? Historical?

Step 3: Before you submit… make sure that you have the following:

  • The essay length should be a minimum of 2 pages. (Not including the Works Cited page)
  • The paper should meet normal standards for documentation (citations and works cited such as found in the Modern Language Association, 8th ed.).
    • Use MLA format (Times New Roman 12-point size font, double-spaced, appropriate in-text citations, Works Cited page, etc…)
  • At least 3 sources — websites will only count as sources if they are online versions of print material 
  • Similarity Report must within 0-10%

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Integrating Security Most of the security issues today can be traced back to flaws in application development. With this in

Integrating SecurityMost of the security issues today can be traced back to flaws in application development. With this in mind, consider how a company can integrate best practices into their software development standards.Review the SANS Institute’s InfoSec reading room paper titled “Integrating Security into Development, No Pain Required” found athttps://software-security.sans.org/resources/paper/reading-room/integrating-security-development-pain-required.How

Is the term corporate entrepreneurship an oxymoron In other words can corporationsespecially large onesbe innovative Support your answer with examples.

Is the term corporate entrepreneurship an oxymoron? In other words, can corporations—especially large ones—be innovative? Support your answer with examples.Use the Internet to find an example of two corporate innovations—one brought about through autonomous strategic behavior and one developed through induced strategic behavior. Which innovation seems to hold the most

It is necessary for an RNBSNprepared nurse to demonstrate an enhanced understanding of the pathophysiological processes of disease the clinical

It is necessary for an RN-BSN-prepared nurse to demonstrate an enhanced understanding of the pathophysiological processes of disease, the clinical manifestations and treatment protocols, and how they affect clients across the life span.Evaluate the Health History and Medical Information for Mr. C., presented below.Based on this information, formulate a conclusion

Introduction When it comes to improving the transmission system to meet our nations growing electricity demands companies not only face

IntroductionWhen it comes to improving the transmission system to meet our nation’s growing electricity demands, companies not only face financial complications but also social complications. The concept of “NIMBY” (Not in My Backyard) has proven to be a strong influencing factor on the advancement of much-needed energy infrastructure updates.Many environmental

Linux Implementation Proposal: Client Response Memo Hide Assignment InformationTurnitinThis assignment will be submitted to Turnitin.Instructions Faster Computing was impressed with

Linux Implementation Proposal: Client Response MemoHide Assignment InformationTurnitin®This assignment will be submitted to Turnitin®.InstructionsFaster Computing was impressed with your presentation. The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:(12.3.2: Describe the implementation of

Learn About creating good password security. An IT Security consultant has made three primary recommendations regarding passwords: Prohibit guessable passwords

Learn About creating good password security.An IT Security consultant has made three primary recommendations regarding passwords:Prohibit guessable passwordssuch as common names, real words, numbers onlyrequire special characters and a mix of caps, lower case and numbers in passwordsReauthenticate before changing passwordsuser must enter old pwbefore creating new oneMake authenticators unforgeabledo