SlideShare a Scribd company logo
1 of 10
IS-365 Writing Rubric
Last updated: January 15, 2018
Student:
Score (out of 50):
General Comments:
Other comments are embedded in the document.
Criterion <- Higher - Quality - Lower ->
Persuasiveness The reader is
compelled by solid
critical reasoning,
appropriate usage of
sources, and
consideration of
alternative
viewpoints.
The document is
logical and coherent
enough that the
reader can accept its
points and
conclusions
Gaps in logic and
uncritical review of
sources cause the
reader to have some
doubts about the
points made by the
document, or
whether they’re
relevant to the
question asked.
The reader is unsure
of what the document
is trying to
communicate, or is
wholly unconvinced
by its arguments
Not
applicable
Evidence and support Exceptional use of
authoritative and
relevant sources,
properly cited,
providing strong
support of the
document’s points
Sufficient relevant
and authoritative
sources give
confidence that the
document is based
on adequate
research
Sources are
insufficient in
number, not
authoritative, not
relevant, or
improperly cited
No sources are used,
undermining the
document’s
foundations
Not
applicable
Writing Word choices, flow
of logic, and
sentence and
paragraph structure
engage the reader,
making for a
pleasurable
experience
Writing is clear and
adequately fulfills
the document’s
purpose
Some issues with
word choice and
sentence and
paragraph structure
interfere with the
conveyance of the
document’s ideas
Frequent questionable
choices in writing
make it difficult to
read and understand
Not
applicable
Language Essentially free of
language errors
Minor errors in
grammar,
punctuation, or
spelling
Noticeable language
errors that detract
from the readability
of the document
Significant language
errors that call the
credibility of the
document into
question
Not
applicable
Formatting (heading
styles, fonts, margins,
white space, tables
and graphics)
Professional and
consistent formatting
that enhances
readability.
Appropriate use of
tables and graphics.
Generally acceptable
formatting choices.
Some missed
opportunities for
displaying data via
tables or graphics.
Inconsistent or
questionable
formatting choices
that detract from the
document’s
readability
Critical formatting
issues that make the
document
unprofessional-
looking
Not
applicable
Page 1
Page 1
Page 2
(Name deleted)
IS-365
Art Fifer
2/17/2017
Technical Documents for Varying Audiences
In this paper, I’ll be exploring the differences in presenting
technical communications to audiences of varying knowledge.
The topic of these two general summaries will be the manner in
which computers connect to each other, including summaries of
several communication protocols, how information traverses the
network, and how it arrives at its destination and is read by the
receiving computer. The first summary presented will be
addressed to readers who are totally unaware of these concepts,
and the second is designed to be a quick review of information
for peers in the IT field who already work with computer
networks. COMPUTER NETWORK CONNECTIONS – SIMPLE
OVERVIEW
For some, communication between computers may be something
of a mystery. You simply connect a computer to your home or
work router, put in the Wi-Fi password, and you’ve magically
gained access to the World Wide Web and all of its information.
What happens during your Internet browsing sessions - how you
receive data, how you stream videos via services such as
Netflix, and other thoughts- are seemingly too difficult to
understand. In this summary, however, I hope to unravel the
enigma of Computer Networking’s basic concepts.
Concept 1: Connecting Computers
The first step in understanding communications is to understand
how computers are connected. Without delving into too much
technical detail, connection is simple – your computer will
make contact with (either by Ethernet cables, Fiber Optics,
Wireless connection, etc) a router or other device. These allow
the two devices to send electrical currents and radio waves,
which is vital to communication – without sending currents or
radio waves, no communication can be achieved. (Marshall
Brian, n.d.) While the specifics of these connections vary (i.e
different hardwired connection types such as Ethernet, Fiber
Optic, and multiple wireless frequencies), as long as computers
link via these methods, networking can be achieved. Computers
will send binary bits, either a 1 or 0, by sending an electrical
current or pausing, respectively. These 1’s and 0’s translate into
information, though its translation is rather complex, so we’ll
move onto the next concept.
Concept 2: Packets
Here’s where things start to get more complex than hooking up
a cable and sending currents. Although computers send
information via bits, there needs to be a pattern to the madness.
This takes shape in the form of packets – little packages
containing information used to send and receive messages.
When you tell your computer to go to www.stevenson.edu, for
example, your computer sends many small groups of
information out through the router – each packet (much like real
life postal mail) has a send and receive address so that routers
know where its destination is, allowing it to forward the packet.
When the web server receives your packets, it sends you back
information containing what you need to construct the website.
From here, you can send information back and forth to
accomplish tasks like signing up for newsletters, purchasing
items off of Amazon.com, etc.
Concept 3: Protocols
Finally, we’ll quickly explain how different packets
communicate. There are two major protocols for packets
traversing networks:
· TCP
· UDP
The first protocol, “TCP” (Transmission Control Protocol), is
described as a “chatty” protocol. This means that every time
you send a packet to another machine, the machine
acknowledges that it received all packets from you (some may
be lost due to various issues). If it did not receive all packets, it
informs you, and your machine must resend the missing packet
so that your message can be totally complete. This type of
protocol is vital when you need communication to be utterly
complete, and not miss anything. (i.e emails and other messages
– you don’t want part of your email missing when the boss
receives it).
The second protocol, UDP (User Datagram Protocol), is far
simpler. If you connect to Netflix using TCP, find a show you
want to watch, and hit play, you’ll find that your movie is
sending its packets to you via UDP, not TCP. UDP is far more
efficient than communicating streams than TCP. The reason for
this is that UDP, unlike TCP, does not make sure that you
receive all packets. Because it’s sending so many packets to you
constantly as you watch, it doesn’t have time to resend a
missing packet. You’ll notice missing packets when the quality
of the picture becomes slightly blocky or it lags momentarily.
Summary
While this still may be hard to grasp, hopefully some of these
base concepts will stay with you. Networking is a very complex
subject, and thoroughly explaining every detail would be
cumbersome and tedious. Thus, this document was designed to
present a few base concepts at a (hopefully) understandable
level. Remember: information is sent via little packets - much
like the mail service – which contain requests of the
information you send or receive. The two protocols for sending
packets are UDP and TCP – TCP is useful for most connections,
as it ensures every bit of data is received by you. As UDP
doesn’t ask to make sure you received the information, it’s
useful for streaming and other similar uses. COMPUTER
NETWORK CONNECTIONS – PEER OVERVIEW
In this summary, I’ll be reviewing the basic fundamentals of
Networking, as a simple refresher for troubleshooting in the
workplace.
Bits and Binary
Connecting your machine is possible via one of many cable
types or wireless connections. Some common methods of
connections are:
· Coaxial Cable
· Twisted Pair
· Fiber Optic
· 802.11 Wireless Connection
Once you’ve connected your machine to a router or another
machine via one of these methods, your computer will begin
transmitting by an electrical current or radio waves to send bits
to the receiving machine, which are then formed into
information for the receiving machine. These signals are either
“on” or “off,” depending on whether the machine receives a
signal or a pause during the message. Of course, these are
translated to binary digits – 1’s and 0’s, to create the
information. Packets
When sending information across the network, information is
formed into packets. These packets include the destination and
source IP Addresses within its header, and the information
deeper inside. While traversing the network, routers will only
check the source and destination addresses, as the information
inside is irrelevant to the router itself. Once the packet arrives
at the destination, the receiving machine peels off the OSI
layers of the packet, and reads the information within. These
packets’ headers and processes vary depending on the protocol
of the packet itself.
Protocols
The main two protocols should be familiar – TCP and UDP.
TCP, or Transmission Control Protocol, is used for most
communication across the internet. It’s a connection-oriented
protocol, which beings its communications via the “Three-way
Handshake” (Syn, Syn-Ack, Ack). Once communication has
been established, TCP will ensure that no packet is missing,
because if it is, information vital to the message will be
missing. UDP, on the other hand, is a connectionless protocol,
meaning it’s of little consequence whether the receiving device
gets every single packet. UDP will not check with the machine,
and will continue sending its own information to the receiver.
As such, it’s extremely useful for streaming services and
anything of similar nature.
Bibliography
Marshall Brian, T. W. (n.d.). How WiFi Works. Retrieved from
HowStuffWorks:
http://computer.howstuffworks.com/wireless-network1.htm

More Related Content

Similar to IS-365 Writing Rubric Last updated January 15, 2018 .docx

Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Renee Jones
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfAbenetAsmellash
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To InternetMohit Dhankher
 
Global Transition Of Internet Protocol
Global Transition Of Internet ProtocolGlobal Transition Of Internet Protocol
Global Transition Of Internet ProtocolMiles Priar
 
Questions On Protocol And Protocol
Questions On Protocol And ProtocolQuestions On Protocol And Protocol
Questions On Protocol And ProtocolMonique Jones
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systemsmitali.ray
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptxkebeAman
 
ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3John Mathias
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communicationijtsrd
 
Ch01.pdf kurose and ross
Ch01.pdf kurose and rossCh01.pdf kurose and ross
Ch01.pdf kurose and rossDavid Charles
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Lakeisha Jones
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerceS S
 
Lesson4.9 c u4l3 tcp (transmission control protocol)
Lesson4.9 c u4l3 tcp (transmission control protocol)Lesson4.9 c u4l3 tcp (transmission control protocol)
Lesson4.9 c u4l3 tcp (transmission control protocol)Lexume1
 
Protocols and standards
Protocols and standardsProtocols and standards
Protocols and standardsPriyankaM69
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraAmit Chandra
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And DisadvantagesRenee Jones
 

Similar to IS-365 Writing Rubric Last updated January 15, 2018 .docx (20)

Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
 
HNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdfHNS L III UC2 Installing and Managing Network Protocols .pdf
HNS L III UC2 Installing and Managing Network Protocols .pdf
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
Global Transition Of Internet Protocol
Global Transition Of Internet ProtocolGlobal Transition Of Internet Protocol
Global Transition Of Internet Protocol
 
Questions On Protocol And Protocol
Questions On Protocol And ProtocolQuestions On Protocol And Protocol
Questions On Protocol And Protocol
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Ch4 Protocols.pptx
Ch4 Protocols.pptxCh4 Protocols.pptx
Ch4 Protocols.pptx
 
ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3ND0801_Assignment_3_Protocols for P3
ND0801_Assignment_3_Protocols for P3
 
Comparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet CommunicationComparison of DOD and OSI Model in the Internet Communication
Comparison of DOD and OSI Model in the Internet Communication
 
Ch01.pdf kurose and ross
Ch01.pdf kurose and rossCh01.pdf kurose and ross
Ch01.pdf kurose and ross
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
 
Internet1
Internet1Internet1
Internet1
 
The internet
The internetThe internet
The internet
 
Notes e commerce
Notes e commerceNotes e commerce
Notes e commerce
 
Lesson4.9 c u4l3 tcp (transmission control protocol)
Lesson4.9 c u4l3 tcp (transmission control protocol)Lesson4.9 c u4l3 tcp (transmission control protocol)
Lesson4.9 c u4l3 tcp (transmission control protocol)
 
Protocols and standards
Protocols and standardsProtocols and standards
Protocols and standards
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
 
7 layer OSI model
7 layer OSI model7 layer OSI model
7 layer OSI model
 
Network Advantages And Disadvantages
Network Advantages And DisadvantagesNetwork Advantages And Disadvantages
Network Advantages And Disadvantages
 
Ipv4 tutorial
Ipv4 tutorialIpv4 tutorial
Ipv4 tutorial
 

More from bagotjesusa

Issues Identify at least seven issues you see in the case1..docx
Issues Identify at least seven issues you see in the case1..docxIssues Identify at least seven issues you see in the case1..docx
Issues Identify at least seven issues you see in the case1..docxbagotjesusa
 
Issues and disagreements between management and employees lead.docx
Issues and disagreements between management and employees lead.docxIssues and disagreements between management and employees lead.docx
Issues and disagreements between management and employees lead.docxbagotjesusa
 
ISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010 VOLUME 13 .docx
ISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010    VOLUME 13 .docxISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010    VOLUME 13 .docx
ISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010 VOLUME 13 .docxbagotjesusa
 
ISSA Journal September 2008Article Title Article Author.docx
ISSA Journal  September 2008Article Title  Article Author.docxISSA Journal  September 2008Article Title  Article Author.docx
ISSA Journal September 2008Article Title Article Author.docxbagotjesusa
 
ISOL 536Security Architecture and DesignThreat Modeling.docx
ISOL 536Security Architecture and DesignThreat Modeling.docxISOL 536Security Architecture and DesignThreat Modeling.docx
ISOL 536Security Architecture and DesignThreat Modeling.docxbagotjesusa
 
ISOL 533 Project Part 1OverviewWrite paper in sections.docx
ISOL 533 Project Part 1OverviewWrite paper in sections.docxISOL 533 Project Part 1OverviewWrite paper in sections.docx
ISOL 533 Project Part 1OverviewWrite paper in sections.docxbagotjesusa
 
Is the United States of America a democracyDetailed Outline.docx
Is the United States of America a democracyDetailed Outline.docxIs the United States of America a democracyDetailed Outline.docx
Is the United States of America a democracyDetailed Outline.docxbagotjesusa
 
Islamic Profession of Faith (There is no God but God and Muhammad is.docx
Islamic Profession of Faith (There is no God but God and Muhammad is.docxIslamic Profession of Faith (There is no God but God and Muhammad is.docx
Islamic Profession of Faith (There is no God but God and Muhammad is.docxbagotjesusa
 
ISAS 600 – Database Project Phase III RubricAs the final ste.docx
ISAS 600 – Database Project Phase III RubricAs the final ste.docxISAS 600 – Database Project Phase III RubricAs the final ste.docx
ISAS 600 – Database Project Phase III RubricAs the final ste.docxbagotjesusa
 
Is teenage pregnancy a social problem How does this topic reflect.docx
Is teenage pregnancy a social problem How does this topic reflect.docxIs teenage pregnancy a social problem How does this topic reflect.docx
Is teenage pregnancy a social problem How does this topic reflect.docxbagotjesusa
 
Is Texas so conservative- (at least for the time being)- as many pun.docx
Is Texas so conservative- (at least for the time being)- as many pun.docxIs Texas so conservative- (at least for the time being)- as many pun.docx
Is Texas so conservative- (at least for the time being)- as many pun.docxbagotjesusa
 
Irreplaceable Personal Objects and Cultural IdentityThink of .docx
Irreplaceable Personal Objects and Cultural IdentityThink of .docxIrreplaceable Personal Objects and Cultural IdentityThink of .docx
Irreplaceable Personal Objects and Cultural IdentityThink of .docxbagotjesusa
 
IRB is an important step in research. State the required components .docx
IRB is an important step in research. State the required components .docxIRB is an important step in research. State the required components .docx
IRB is an important step in research. State the required components .docxbagotjesusa
 
irem.orgjpm jpm® 47AND REWARDRISK .docx
irem.orgjpm      jpm®      47AND  REWARDRISK .docxirem.orgjpm      jpm®      47AND  REWARDRISK .docx
irem.orgjpm jpm® 47AND REWARDRISK .docxbagotjesusa
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxbagotjesusa
 
In two paragraphs, respond to the prompt below. Journal entries .docx
In two paragraphs, respond to the prompt below. Journal entries .docxIn two paragraphs, respond to the prompt below. Journal entries .docx
In two paragraphs, respond to the prompt below. Journal entries .docxbagotjesusa
 
Investigative Statement AnalysisInitial statement given by Ted K.docx
Investigative Statement AnalysisInitial statement given by Ted K.docxInvestigative Statement AnalysisInitial statement given by Ted K.docx
Investigative Statement AnalysisInitial statement given by Ted K.docxbagotjesusa
 
Investigating Happiness at College SNAPSHOT T.docx
Investigating   Happiness   at   College  SNAPSHOT  T.docxInvestigating   Happiness   at   College  SNAPSHOT  T.docx
Investigating Happiness at College SNAPSHOT T.docxbagotjesusa
 
Investigate Development Case Death with Dignity Physician-Assiste.docx
Investigate Development Case Death with Dignity  Physician-Assiste.docxInvestigate Development Case Death with Dignity  Physician-Assiste.docx
Investigate Development Case Death with Dignity Physician-Assiste.docxbagotjesusa
 
Inventory and Production Management in Supply Chains.docx
Inventory and Production Management in Supply Chains.docxInventory and Production Management in Supply Chains.docx
Inventory and Production Management in Supply Chains.docxbagotjesusa
 

More from bagotjesusa (20)

Issues Identify at least seven issues you see in the case1..docx
Issues Identify at least seven issues you see in the case1..docxIssues Identify at least seven issues you see in the case1..docx
Issues Identify at least seven issues you see in the case1..docx
 
Issues and disagreements between management and employees lead.docx
Issues and disagreements between management and employees lead.docxIssues and disagreements between management and employees lead.docx
Issues and disagreements between management and employees lead.docx
 
ISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010 VOLUME 13 .docx
ISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010    VOLUME 13 .docxISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010    VOLUME 13 .docx
ISSN1369 7021 © Elsevier Ltd 2010DECEMBER 2010 VOLUME 13 .docx
 
ISSA Journal September 2008Article Title Article Author.docx
ISSA Journal  September 2008Article Title  Article Author.docxISSA Journal  September 2008Article Title  Article Author.docx
ISSA Journal September 2008Article Title Article Author.docx
 
ISOL 536Security Architecture and DesignThreat Modeling.docx
ISOL 536Security Architecture and DesignThreat Modeling.docxISOL 536Security Architecture and DesignThreat Modeling.docx
ISOL 536Security Architecture and DesignThreat Modeling.docx
 
ISOL 533 Project Part 1OverviewWrite paper in sections.docx
ISOL 533 Project Part 1OverviewWrite paper in sections.docxISOL 533 Project Part 1OverviewWrite paper in sections.docx
ISOL 533 Project Part 1OverviewWrite paper in sections.docx
 
Is the United States of America a democracyDetailed Outline.docx
Is the United States of America a democracyDetailed Outline.docxIs the United States of America a democracyDetailed Outline.docx
Is the United States of America a democracyDetailed Outline.docx
 
Islamic Profession of Faith (There is no God but God and Muhammad is.docx
Islamic Profession of Faith (There is no God but God and Muhammad is.docxIslamic Profession of Faith (There is no God but God and Muhammad is.docx
Islamic Profession of Faith (There is no God but God and Muhammad is.docx
 
ISAS 600 – Database Project Phase III RubricAs the final ste.docx
ISAS 600 – Database Project Phase III RubricAs the final ste.docxISAS 600 – Database Project Phase III RubricAs the final ste.docx
ISAS 600 – Database Project Phase III RubricAs the final ste.docx
 
Is teenage pregnancy a social problem How does this topic reflect.docx
Is teenage pregnancy a social problem How does this topic reflect.docxIs teenage pregnancy a social problem How does this topic reflect.docx
Is teenage pregnancy a social problem How does this topic reflect.docx
 
Is Texas so conservative- (at least for the time being)- as many pun.docx
Is Texas so conservative- (at least for the time being)- as many pun.docxIs Texas so conservative- (at least for the time being)- as many pun.docx
Is Texas so conservative- (at least for the time being)- as many pun.docx
 
Irreplaceable Personal Objects and Cultural IdentityThink of .docx
Irreplaceable Personal Objects and Cultural IdentityThink of .docxIrreplaceable Personal Objects and Cultural IdentityThink of .docx
Irreplaceable Personal Objects and Cultural IdentityThink of .docx
 
IRB is an important step in research. State the required components .docx
IRB is an important step in research. State the required components .docxIRB is an important step in research. State the required components .docx
IRB is an important step in research. State the required components .docx
 
irem.orgjpm jpm® 47AND REWARDRISK .docx
irem.orgjpm      jpm®      47AND  REWARDRISK .docxirem.orgjpm      jpm®      47AND  REWARDRISK .docx
irem.orgjpm jpm® 47AND REWARDRISK .docx
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
In two paragraphs, respond to the prompt below. Journal entries .docx
In two paragraphs, respond to the prompt below. Journal entries .docxIn two paragraphs, respond to the prompt below. Journal entries .docx
In two paragraphs, respond to the prompt below. Journal entries .docx
 
Investigative Statement AnalysisInitial statement given by Ted K.docx
Investigative Statement AnalysisInitial statement given by Ted K.docxInvestigative Statement AnalysisInitial statement given by Ted K.docx
Investigative Statement AnalysisInitial statement given by Ted K.docx
 
Investigating Happiness at College SNAPSHOT T.docx
Investigating   Happiness   at   College  SNAPSHOT  T.docxInvestigating   Happiness   at   College  SNAPSHOT  T.docx
Investigating Happiness at College SNAPSHOT T.docx
 
Investigate Development Case Death with Dignity Physician-Assiste.docx
Investigate Development Case Death with Dignity  Physician-Assiste.docxInvestigate Development Case Death with Dignity  Physician-Assiste.docx
Investigate Development Case Death with Dignity Physician-Assiste.docx
 
Inventory and Production Management in Supply Chains.docx
Inventory and Production Management in Supply Chains.docxInventory and Production Management in Supply Chains.docx
Inventory and Production Management in Supply Chains.docx
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

IS-365 Writing Rubric Last updated January 15, 2018 .docx

  • 1. IS-365 Writing Rubric Last updated: January 15, 2018 Student: Score (out of 50): General Comments: Other comments are embedded in the document. Criterion <- Higher - Quality - Lower -> Persuasiveness The reader is compelled by solid critical reasoning, appropriate usage of sources, and consideration of alternative viewpoints. The document is logical and coherent enough that the reader can accept its points and conclusions Gaps in logic and uncritical review of sources cause the reader to have some doubts about the
  • 2. points made by the document, or whether they’re relevant to the question asked. The reader is unsure of what the document is trying to communicate, or is wholly unconvinced by its arguments Not applicable Evidence and support Exceptional use of authoritative and relevant sources, properly cited, providing strong support of the document’s points Sufficient relevant and authoritative sources give confidence that the document is based on adequate research Sources are insufficient in
  • 3. number, not authoritative, not relevant, or improperly cited No sources are used, undermining the document’s foundations Not applicable Writing Word choices, flow of logic, and sentence and paragraph structure engage the reader, making for a pleasurable experience Writing is clear and adequately fulfills the document’s purpose Some issues with word choice and sentence and paragraph structure interfere with the conveyance of the document’s ideas
  • 4. Frequent questionable choices in writing make it difficult to read and understand Not applicable Language Essentially free of language errors Minor errors in grammar, punctuation, or spelling Noticeable language errors that detract from the readability of the document Significant language errors that call the credibility of the document into question Not applicable Formatting (heading styles, fonts, margins, white space, tables
  • 5. and graphics) Professional and consistent formatting that enhances readability. Appropriate use of tables and graphics. Generally acceptable formatting choices. Some missed opportunities for displaying data via tables or graphics. Inconsistent or questionable formatting choices that detract from the document’s readability Critical formatting issues that make the document unprofessional- looking Not applicable
  • 6. Page 1 Page 1 Page 2 (Name deleted) IS-365 Art Fifer 2/17/2017 Technical Documents for Varying Audiences In this paper, I’ll be exploring the differences in presenting technical communications to audiences of varying knowledge. The topic of these two general summaries will be the manner in which computers connect to each other, including summaries of several communication protocols, how information traverses the network, and how it arrives at its destination and is read by the receiving computer. The first summary presented will be addressed to readers who are totally unaware of these concepts, and the second is designed to be a quick review of information for peers in the IT field who already work with computer networks. COMPUTER NETWORK CONNECTIONS – SIMPLE OVERVIEW For some, communication between computers may be something of a mystery. You simply connect a computer to your home or work router, put in the Wi-Fi password, and you’ve magically gained access to the World Wide Web and all of its information. What happens during your Internet browsing sessions - how you receive data, how you stream videos via services such as Netflix, and other thoughts- are seemingly too difficult to understand. In this summary, however, I hope to unravel the enigma of Computer Networking’s basic concepts. Concept 1: Connecting Computers The first step in understanding communications is to understand how computers are connected. Without delving into too much
  • 7. technical detail, connection is simple – your computer will make contact with (either by Ethernet cables, Fiber Optics, Wireless connection, etc) a router or other device. These allow the two devices to send electrical currents and radio waves, which is vital to communication – without sending currents or radio waves, no communication can be achieved. (Marshall Brian, n.d.) While the specifics of these connections vary (i.e different hardwired connection types such as Ethernet, Fiber Optic, and multiple wireless frequencies), as long as computers link via these methods, networking can be achieved. Computers will send binary bits, either a 1 or 0, by sending an electrical current or pausing, respectively. These 1’s and 0’s translate into information, though its translation is rather complex, so we’ll move onto the next concept. Concept 2: Packets Here’s where things start to get more complex than hooking up a cable and sending currents. Although computers send information via bits, there needs to be a pattern to the madness. This takes shape in the form of packets – little packages containing information used to send and receive messages. When you tell your computer to go to www.stevenson.edu, for example, your computer sends many small groups of information out through the router – each packet (much like real life postal mail) has a send and receive address so that routers know where its destination is, allowing it to forward the packet. When the web server receives your packets, it sends you back information containing what you need to construct the website. From here, you can send information back and forth to accomplish tasks like signing up for newsletters, purchasing items off of Amazon.com, etc. Concept 3: Protocols Finally, we’ll quickly explain how different packets communicate. There are two major protocols for packets traversing networks:
  • 8. · TCP · UDP The first protocol, “TCP” (Transmission Control Protocol), is described as a “chatty” protocol. This means that every time you send a packet to another machine, the machine acknowledges that it received all packets from you (some may be lost due to various issues). If it did not receive all packets, it informs you, and your machine must resend the missing packet so that your message can be totally complete. This type of protocol is vital when you need communication to be utterly complete, and not miss anything. (i.e emails and other messages – you don’t want part of your email missing when the boss receives it). The second protocol, UDP (User Datagram Protocol), is far simpler. If you connect to Netflix using TCP, find a show you want to watch, and hit play, you’ll find that your movie is sending its packets to you via UDP, not TCP. UDP is far more efficient than communicating streams than TCP. The reason for this is that UDP, unlike TCP, does not make sure that you receive all packets. Because it’s sending so many packets to you constantly as you watch, it doesn’t have time to resend a missing packet. You’ll notice missing packets when the quality of the picture becomes slightly blocky or it lags momentarily. Summary While this still may be hard to grasp, hopefully some of these base concepts will stay with you. Networking is a very complex subject, and thoroughly explaining every detail would be cumbersome and tedious. Thus, this document was designed to present a few base concepts at a (hopefully) understandable level. Remember: information is sent via little packets - much like the mail service – which contain requests of the information you send or receive. The two protocols for sending packets are UDP and TCP – TCP is useful for most connections, as it ensures every bit of data is received by you. As UDP doesn’t ask to make sure you received the information, it’s
  • 9. useful for streaming and other similar uses. COMPUTER NETWORK CONNECTIONS – PEER OVERVIEW In this summary, I’ll be reviewing the basic fundamentals of Networking, as a simple refresher for troubleshooting in the workplace. Bits and Binary Connecting your machine is possible via one of many cable types or wireless connections. Some common methods of connections are: · Coaxial Cable · Twisted Pair · Fiber Optic · 802.11 Wireless Connection Once you’ve connected your machine to a router or another machine via one of these methods, your computer will begin transmitting by an electrical current or radio waves to send bits to the receiving machine, which are then formed into information for the receiving machine. These signals are either “on” or “off,” depending on whether the machine receives a signal or a pause during the message. Of course, these are translated to binary digits – 1’s and 0’s, to create the information. Packets When sending information across the network, information is formed into packets. These packets include the destination and source IP Addresses within its header, and the information deeper inside. While traversing the network, routers will only check the source and destination addresses, as the information inside is irrelevant to the router itself. Once the packet arrives at the destination, the receiving machine peels off the OSI layers of the packet, and reads the information within. These packets’ headers and processes vary depending on the protocol of the packet itself. Protocols The main two protocols should be familiar – TCP and UDP.
  • 10. TCP, or Transmission Control Protocol, is used for most communication across the internet. It’s a connection-oriented protocol, which beings its communications via the “Three-way Handshake” (Syn, Syn-Ack, Ack). Once communication has been established, TCP will ensure that no packet is missing, because if it is, information vital to the message will be missing. UDP, on the other hand, is a connectionless protocol, meaning it’s of little consequence whether the receiving device gets every single packet. UDP will not check with the machine, and will continue sending its own information to the receiver. As such, it’s extremely useful for streaming services and anything of similar nature. Bibliography Marshall Brian, T. W. (n.d.). How WiFi Works. Retrieved from HowStuffWorks: http://computer.howstuffworks.com/wireless-network1.htm