Can you recall which features were redesigned

Assignment Help Management Information Sys
Reference no: EM132240312

INFORMATION TECHNOLOGY - TECHNICAL WRITING

Content & Development of the Eight Listed Items (include images, video and content hyperlinks where needed to extend presentation)

Find a professional article online written for people in your field. Identify the intended reader and purpose. Write description of the article describing the elements in the article that helped you identify the reader and purpose. Be sure to include the URL of the article.

Study your school's Web site. Imagine you are a potential transfer student looking for a new school. Analyze the usefulness of the information available and how easy it is to locate information about various majors and directions about applying for admission. Identify 2-3 features of the Web site you would change in some way. Support your answer with citations from the text.

The following bulletin at a large manufacturing company provides guidelines for the plant security supervisors in assigning duties to the plant security guards at five separate plants. Revise and reorganize to make the bulletin easier to read and more useful to the supervisors. All supervisors must be conscious of the need to reduce costs and properly use available security guards int he most effective manner. Consider staggering the start and quit times to ensure a larger force during the peak demand hours.

Every effort should be made to eliminate nonsecurity service functions, such as airport pickup, mail runs, drives to banks, drives to medical centers, parcel pickup. The supervisors should regularly review the schedule to be sure the coverage meets the needs of the plant. Guards assigned to gates should advise the shift supervisors whenever they leave their posts, including for lunch break. Nonsecurity service functions should be contracted out if possible. Drives to banks should be performed by the responsible department, but a department may request a security guard escort.

Guards assigned to patrols, shipping and receiving docks, and special surveillance should tell the shift supervisors when they leave their assigned task, even for the lunch break. Supervisors should consider combining spot checks with regular duties of guards. For example, if a guard must open a gate and passes the trash center, the guard can spot check the trash pickup on the way to or from opening the gate. Supervisors must know about outside employment of guards.

These outside activities should not adversely affect the security arrangements at the plant. In general, security guards should not also work at racetracks or casinos, or any places associated with gambling. Guards also should not be in partnership with co-workers since that relationship could negatively affect plant security.

Supervisors need to check attendance records regularly. Frequent illness may indicate the guard cannot do the physical tasks appropriately. Questionable illness reports should be checked. Guards who operate small businesses may resist the normal rotation because it will interfere with their outside employment. Security requires a 7-day operation.

Find a real-world letter, memo, bulletin, pamphlet, or report online. Identify specific style problems. Evaluate the style and clarity of the document, and identify specific areas where revision would help readers. Support you answers with citations from the text. Be sure to include a url to the document you are evaluating.

Find a Web site you use frequently and analyze how you use it. How easy is it to find the features you want to see? Has the home page changed since you began using it?

Can you recall which features were redesigned? How consistent is the placement of navigation links on the pages you use?

How informative are the headings and page titles? Are there any distracting elements? Are the graphics helpful or simply decorative?

Are there moving graphics or text? If so, do they enhance the usefulness of the site? Write a memo to your instructor, analyzing the design of the Web site. Support your answers with citations from the text. Be sure to include the url.

Find the home pages for the following: a) Ford Motor Company, b) Chrysler, and c) General Motors. Analyze the design features of these home pages in terms of users who are seniors or have problems making precise movements with the mouse. Report your findings to your instructor in a memo.

Find a review of a computer product online. Using the information in the review, write a task oriented set of instructions from the review. Be sure to include meaningful tasks and graphics. Use your book as a reference. Be sure to include the URL as a reference.

Reference no: EM132240312

Questions Cloud

Why you select phd in information technology : As an individual, what are your strengths and weakness and how will they impact you as a PhD student?
Write a small introduction about an it based company : List three type of threats you think the company could face or is already facing. Prioritize those threats and include an explanation.
What are the issues and root causes that necessitates : What are the issues and root causes that necessitates the enactment and/or establishment of Federal, state and local government laws.
Provide your opinion as to whether or not you agree : The use of packet sniffers by employees is forbidden in many organizations. Provide your opinion as to whether or not you agree with this policy.
Can you recall which features were redesigned : Can you recall which features were redesigned? How consistent is the placement of navigation links on the pages you use?
Identify the purpose and audience of your report : Choose any technical topic to write your report about. Identify the purpose and audience of your report.
Descirbe what is the most common implementation : Look up information on anthrax or another biological attack (like smallpox), sarin or another toxic gas, low-level radiological contamination attack.
Identify and evaluate two business intelligence tools : Identify and evaluate at least two business intelligence tools that could be effectively used to report business performance. Justify your response.
Determine three forms of database connectivity methods : Determine at least three forms of database connectivity methods that can be used as an interface between applications.

Reviews

Write a Review

Management Information Sys Questions & Answers

  How does e-commerce affect developing countries

Is it increasing or decreasing? How does e-commerce affect developing countries? What are the advantages and disadvantages of a global market?

  Analyze the parent goal of the maintain node

Determine the incompleteness in the provided model fragment and fix the anomaly. Explain what the anomaly is and propose a way for it to be rectified.

  Describe the data breach incident and the primary causes

Describe the data breach incident and the primary causes of the data breach. Analyze how the data breach could have been prevented with better adherence to and compliance with regulatory requirements

  Evaluate the existing infrastructure as it currently exists

An international law firm has asked you to engage in a risk and mitigation evaluation and plan for their organization.

  Computer security is not an issue for organizations alone

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of..

  Impact of global expansion on supply chain practices - what

impact of global expansion on supply chain practices - what impact has global expansion had on supply chain

  Create a domain model class diagram for the rmo csms

Create a domain model class diagram for the RMO CSMS marketing subsystem. Note: The graphically depicted solution is not included in the required page length.

  Gem infosys, a small software company

Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days. The organization uses a firewall, three file servers, two Web servers, one Windows 2008 ..

  How does the health insurance portability act affect

How does the Health Insurance Portability and Accountability Act (HIPPA) affect various health care organizations?What new standards in the American Recovery and Reinvestment Act of 2009 affect various health care organizations?

  Describe what law violations are evident now

Describe what law violations are evident now or might become evident as the days go by and Finally, what strategy should Mike's company employ now, keeping in mind the laws about insider trading that you've learned about.

  The root beer game simulationbullwhips and root beerwhy

the root beer game simulationbullwhips and root beerwhy supply chain management is so difficultby michael beanthe basic

  Discuss the financial statement presentation and disclosures

Discuss the financial statement presentation and disclosures associated with consolidations related to Off balance sheet transactions, Variable-Interest Entities, and Noncontrolling Interest.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd