The purpose of this memo is to demonstrate my ability to write in a readable prose style.
Summary
In this memo I will display excerpts from previous writings and show how they could be improved. When I finish my degree in IT Networking and Security, I must be able to convert technical information into easily understandable language. The Information Technology field requires an ability to communicate effectively with others. I have reviewed past writing assignments and found that I can improve my prose.
Clear and Specific
It is important to be very clear and specific when delivering technical information. People in upper-level management positions may not have a technical background. I need to provide all the necessary information without using technical jargon. My first example is from a report on the different forms of biometric
…show more content…
One of the largest challenges faced by companies today is confirming the identity of computer users. Ensuring that users can easily confirm their identity can be difficult. Ease of use and security are generally opposite to each other. Biometrics attempts to solve these issues. Biometrics uses something that you are, like a fingerprint, to verify your identity.
I found that in most of my technical writing I use unnecessary jargon. This is fine when communicating solely with other people who understand the terminology. Using jargon when trying to inform someone without a technical background can be confusing and intimidating. This is counter-productive to the purpose of communicating information. After analyzing my original writing, I was able to replace the jargon with more-common language.
Be Concise
Writing in a readable prose requires conciseness. It is unnecessary to use fancy words or wordy phrases. The goal is to only include needed information. This is one of the major differences between technical writing and other forms. As an example I have revised a sample from a paper I wrote about quantum
Frahm holds a similar point of view encouraging clear, straightforward writing not one with a “Confusing introduction. Lack of content. Bad transitions. (and) Excessive grammatical errors.” (Frahm 271).
Writing is hardly ever done with just one sentence. It is a combination of sentences that all have to coincide with one another to reach a goal of clarity. "A series of clear sentences can still be confusing if we fail to design them to fit their context, to reflect a constant point of view, to emphasize our most important ideas. These sentences could all refer to the same set of conditions, but each leads us to understand the conditions from a different point of view," (Williams, 45). It is always a good idea to start out small; take a sentence and make is clear. This then needs to be applied to groups of sentences together to make the whole sample of writing clear.
Many times, my writing consists of a solid introduction with a good idea, but it wanes as it nears the ending and the conclusion is not effective so as to remain consistent with the proper sequence of the sentence (2-3-1). The reader of my work must distinguish the most important points of the work, understanding the general theme, while remaining captivated by a consistently interesting paper. If a primary point exists, it needs to be expanded, emphasized, or supported. The work needs to remain interesting and captivating throughout. For the reader to infer my opinion on the subject matter, I must show approval or disapproval of it in some way.
Some suggestions that Zinnser makes are quite simple. You should keep your sentences uncluttered with not too many words. You should also pay close attention to your tenses as not to confuse your reader. You should be very careful about knowing what you want to write about and think it through so that it will make sense. Zinnser states that “the secret of good writing is to strip every sentence to its cleanest components.
Biometric and encryption sounds are not too fresh, for most users, any of each technology alone is not enough to make you feel excitement. However, If we develop a new study or a new technology, which combine the biometrics and encryption. We can find that the technology combining these two techniques are very amazing.
...work Security Article). With this given information in the essay, is a great start to learn how to keep your network secure. This is only a small part of the prevention of infiltration of your network and computer. If one desires to learn more, go above and beyond and continue to learn on how to keep your network secure.
Technical Reasoning: I will intensify my Technical Reasoning to be more successful with my writing by examine the the assignment to the fullest. I will also stick with the task until I can figure out exactly what is required of me to complete my final reflection
The costs of implementing biometrics into security, specifically passports, are enormous. In many instances, cost is much higher than traditional forms of security such as passwords and personal identification numbers.10 Biometrics also puts users...
Biometrics is described as the use of human physical features to verify identity and has been in use since the beginning of recorded history. Only recently, biometrics has been used in today’s high-tech society for the prevention of identity theft. In this paper, we will be understanding biometrics, exploring the history of biometrics, examples of today’s current technology and where biometrics are expected to go in the future.
what makes it easier to write a good paper, and how the manner that the
My strong curiosity towards the field of Cybersecurity dates back to my pre-university days when I started reading sci-fi novels. Digital Fortress, a techno-thriller novel written by Dan Brown, explored the theme of government surveillance, security and civil liberties. This theme is brought out in the book by portraying cryptographic techniques, security policies and implications of these policies. This gravitated me towards the field of security. With little programming experience, I was eager to begin my nascent adventure in the field of Cybersecurity. Although I’ve gained exposure in the field of security during the course of my Bachelor’s degree, I believe pursuing a master’s degree in Cybersecurity will allow me to explore the field of security in greater depth and utilize it effectively to address more real-world challenges.
When a sender and a receiver are experts in the subject discussed, they will probably use technical language. On the other hand, they might have different knowledge and it is possible that they will discuss new information. The main idea is that they have the possibility to use the established technical language. Nevertheless, it is almost impossible to separate strict technical language from colloquial language.
The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad. The following report will provide you guidance about auditing and hardening techniques applied though the 7 Domains by utilizing IT Security Best Practices.
The agreement between the company and I was to advice the company management toward adopting the best network management plan and security plan. Through the study, I carried out in the firm I was required to evaluate the firm requirement in term of network planning and making sure that the firm has proper mechanism to secure its systems against malicious damage. Considering that, the management personnel have background in IT therefore; they required me to give an expert opinion on the best ways in which they can adopt the network management and the security plan. They required me to evaluate firm needs and what the IT world would offer the firm to enable them to lay down plans for the network and security in the firm.
As one of the feature of biometric, signature verification is used to find the authenticity of a person to give the access the most valued and important documents and shelf. Firstly the signature of a person are taken as a reference in database. To generate the database, number of attempts from the same person has been taken, as it would permit minute deviations in signatures that generates due to environmental conditions. Once it is done, then the signatures at other times are every time then verified with the existing database. Because of confidentially of the file/document/transaction giving access is the crucial process that should be monitored with perfection. The same happens with offline signature verification. Computerized process and verification algorithm (thus software) takes fully care of signature under test, generate results that are 100% authentic, and advocates credibility of the concerned person .However, there might raise issue of authenticity even if the same person performs the signature. Or, at times a forge person may duplicate the exact signature. Many research have been done to find the accuracy of result so as to prevent from forgery. Forgery is also divided into different categories depending upon their severity as