1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreyy89
3 years ago
10

WILL GIVE BRAINLIEST TO FIRST AND BEST ANSWER!

Computers and Technology
1 answer:
sladkih [1.3K]3 years ago
5 0

Answer:

1. Write to the Reader

2. Structure your report

3. Back up your report with data

4. Separate facts with opinions

Explanation:

1. Remember that you’re not writing the report for yourself. You’re probably writing for clients or management, so you need to know how familiar they are with the concepts and terminologies that your team uses. If they’re not well-acquainted with it, you may have to spend the first part of your report defining them so readers can follow along. Or, you might want to dumb it down a bit to layman’s terms and cut back on acronyms and jargon. A good way to practice this is to do the same with meeting notes.

2. One thing all reports should have in common is a form of structure. Ideally, you want to organize information into different segments so that your reader can identify relevant sections and quickly refer back to them later on. Common sections include a background or abstract to explain the project’s purpose, and a final summary of the document’s contents.

3. A good project report is going to have lots of data backing it up, whether it is defending the team’s performance or breaking down a successful project. Accurate charts, spreadsheets, and statistics are a must if the report is to have any degree of credibility when presented to clients. Many project management tools provide flexible project reporting features to help PM’s compile and present data in meaningful ways.

4. You should never confuse the two when writing a project report, especially if you are doing a post-mortem on a failed project. Opinions are subjective and should never be presented as absolutes. The report should be scrubbed of any personal views or preferences unless absolutely necessary. And if your opinion is required, be sure to clearly identify it as such. You may want to put it in an entirely different section, if possible.

Hope this helped

Kinda, really good at this stuff.

You might be interested in
The _____ dialog box lets you specify which files are to be merged.
andreev551 [17]
C. Combine Documents
---------------------------------
The Combine Documents dialog box lets you specify which files are to be merged.

8 0
3 years ago
In learning information security, it is important to understand that threats to your company's information assets are present 24
coldgirl [10]

1. Acts of human error

<u>Explanation:</u>

Insecurity their are many threats that make a desktop or workstation or laptop.  Normally end users have to update operating systems and virus signature updates by periodic scheduling task moreover to avoid threats end-user also have to do periodic scheduling scanning. And the virus cleaning. Download the third-party malware and spyware and then the cleaning process.

End-users have made sure all required service is activated and running in the organization.

The team has to make sure any software threats are found in PC or workstation or laptop or desktop or LAN and try to remove make system up running without any threats.

8 0
3 years ago
By what decade were books readily available to the public across the United States and Europe?
Westkost [7]

Answer:

1690's hope i could help!

5 0
3 years ago
. (a) Prove or disprove carefully and in detail: (i) Θ is transitive and (ii) ω is transitive. (b) Assume n is a positive intege
Sergio [31]

Answer:

The Following are the solution to this question:

Explanation:

In Option a:

In the point (i) \Omega is transitive, which means it converts one action to others object because if \Omega(f(n))=g(n) indicates c.g(n). It's true by definition, that becomes valid. But if \Omega(g(n))=h(n), which implies c.h(n). it's a very essential component. If c.h(n) < = g(n) = f(n) \. They  \Omega(f(n))   will also be h(n).  

In point (ii), The  value of \Theta is convergent since the \Theta(g(n))=f(n). It means they should be dual a and b constant variable, therefore a.g(n) could only be valid for the constant variable, that is  \frac{1}{a}\ \  and\ \ \frac{1}{b}.

In Option b:

In this algorithm, the input size value is equal to 1 object, and the value of  A is a polynomial-time complexity, which is similar to its outcome that is O(n^{2}). It is the outside there will be a loop(i) for n iterations, that is also encoded inside it, the for loop(j), which would be a loop(n^{2}). All internal loops operate on a total number of N^{2} generations and therefore the final time complexity is O(n^{2}).

6 0
3 years ago
A data structure used to bind an authenticated individual to a public key is the definition of ________.
patriot [66]

Answer:

Digital Certificate is the correct answer of this question.

Explanation:

Digital certificates are always for encryption and identification for transmitting public keys.The concept of digital certificate is a data structure used for linking an authenticated person to a public key. It is used to cryptographically attach public key rights to the organization that controls it.

<u>For example</u>:- Verisign, Entrust, etc.

  • An appendix to an electronic document that is used for authentication purposes.
  • A digital certificate's most frequent use is to confirm that an user sending a message is who he or she appears to be, and provide the recipient with the means to encode a response.

4 0
3 years ago
Other questions:
  • To add text to a slide when using presentation software, you need to add a text box. To add a text box, click the Text Box butto
    6·2 answers
  • Create a dictionary named letter_counts that contains each letter and the number of times it occurs in string1. Challenge: Lette
    14·1 answer
  • A type of indent where the first line of text starts at the left margin and the second and succeeding lines of text are indented
    7·2 answers
  • Write a function that, given an array A of N integers, of which represents loads caused by successive processes, the function sh
    15·1 answer
  • X = 19 y = 5 print (x % y)
    11·1 answer
  • Please complete the following questions. It is important that you use complete sentences and present the questions and answers w
    6·1 answer
  • Ano ang bunga ng pagsunod sa tamang konsiyensiya?
    12·2 answers
  • Choose the missing words in the code below.
    12·1 answer
  • Assume that the Vehicle class contains a virtual method named CalculateMaxSpeed(). Assume that both the MotorVehicle and Automob
    12·1 answer
  • GIF is example of raster image<br><br><br> RIGHT OR WRONG?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!