1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AURORKA [14]
4 years ago
12

Select the tips you should follow when writing a business report.

Computers and Technology
1 answer:
r-ruslan [8.4K]4 years ago
4 0

Business reports are essential in making key decisions in today’s corporate world. You will need to understand what it is that you intend to write and how the content inside can be used. The tips listed below can help you achieve a well written business report.

Identify the intended audience.

Include an abstract.

Include visuals such as graphs and diagrams to illustrate data.

Use a font, size, and style that is easy to read.

Write clear and concisely.

Explanation:

  • Identify the intended audience – You will need to consider the audience and how familiar you think they are with the intended topic. In addition, think about whether or not the information in the report will be useful to the audience.
  • Include an abstract – An abstract is a must have when writing a business report. Write a brief abstract while at the same time maintaining the crucial points of your report. Make sure to include your main findings and include recommendations as well.
  • Include visuals such as graphs and diagrams to illustrate data – Interpret your findings through visuals like diagrams and charts to display quantitative data. The report can be a little bit off if visual figures are not used. However, do not overdo it.
  • Write clearly and concisely and use a font, size, and style that are easy to read - Present your data in a concise way.

Learn more about business reports:

brainly.com/question/2387764

brainly.com/question/11641128

#LearnWithBrainly

You might be interested in
Should a social network own our social data? Is it an invasion of privacy for social networks to collect and use the information
Svetradugi [14.3K]

Answer:

The description for the given question is described in the explanation section below.

Explanation:

No, we don't even own our identity data on social networking sites. It may be said as permission is needed as an factor for recognizing an acceptable interpretation and solution to a circumstance as well as a method to be followed.

  • They would conclude that, in contemplating the data generated from social networking, this could be recognized that although the data that they left as our electronic fingerprints must be used with applications that can provide the businesses with the appropriate strategy to best reach the consumer.
  • With all this into consideration, the method of information gathering does not include personal identifying information, and also the reality that we must be made mindful of what details has been accessed as well as the right to get out of obtaining such details from the social platform.
3 0
3 years ago
Ally is taking a photograph of her friend. What is the orientation of her phone's screen?
In-s [12.5K]

Answer:

portrait

Explanation:

?

8 0
3 years ago
What mechanism can organizations use to prevent accidental changes by authorized users?.
AlladinOne [14]

The process of monitoring and managing changes to software code is known as version control, commonly referred to as source control.  Version control ensures that two users cannot update the same object.

<h3>What is meant by Version control?</h3>

A series of software engineering tools called version control regulates how changes are made to texts, sizable websites, computer programmes, and other collections of information. Version control is a component of software configuration management.

Version control, often known as source control, is the process of keeping track of and controlling changes to software code. Version control systems are computer programmes that help software development teams keep track of changes to source code over time.

Version control improves teamwork and communication while assisting software development teams in keeping track of code changes. Version control enables straightforward, ongoing programme development.

To learn more about version control refer to:

brainly.com/question/26533170

#SPJ4

4 0
2 years ago
in which of the following scenarios would a router send a resign message? answer if a preempted active router fails, the standby
hodyreva [135]

A scenario in which a router would send a resign message include the following: A. if a preempted active router fails, the standby router becomes the active router. If the preempted active router regains service, it sends a coup message. The current active router sends the resign message after receiving the coup message.

<h3>What is a router?</h3>

In Computer technology, a router can be defined as a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving encapsulated data (Ethernet frame) and packets.

<h3>What is a resign message?</h3>

In Computer networking, a resign message can be defined as a set of information that is typically sent by an active Hot Standby Router Protocol (HSRP) network device when it is preparing to go offline or whenever it wants to relinquish the active role due to some other reasons.

This ultimately implies that, a resign message instructs or informs a standby router to get ready to become the active router and take over the active role.

Read more on router here: brainly.com/question/24812743

#SPJ1

8 0
1 year ago
Select the correct line of missing code to create an output of "hello."
s2008m [1.1K]

Answer:

B

Explanation:

This feels like an error on the question issuer's part.

3 0
3 years ago
Other questions:
  • Select three examples of cryptographs. Security tokens Shared-key Malware Firewalls Message authentication code Public-key
    7·2 answers
  • Charles sends Julia text messages every morning insulting her appearance and threatening to hurt her. He writes unflattering des
    5·2 answers
  • Which of the following is an example of a consumer
    14·2 answers
  • Do you see traffic flowing from the internet into your system or from your network to the internet? explain why or why not:
    6·1 answer
  • The measure of how quickly things may be converted to something of value is called.
    10·2 answers
  • Please help me. i will mark you brailiest
    6·1 answer
  • Which of the following domestic appliances does not use a magnet?
    10·2 answers
  • What is another name for repetition in programming?
    11·1 answer
  • Consider the following method:
    9·1 answer
  • Write a short program that asks the user to enter a month &amp; prints a message based on the month
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!