SlideShare a Scribd company logo
1 of 4
Download to read offline
1
Technical Communications
BT0084 Part-2
By Milan K Antony
2
1. Choose a 150 word passage from a technical article addressed to an expert
audience. (You can choose this from any journal or web) Rewrite the passage so that
it is clear and interesting to the general reader. (10 marks)
In the past, memory leaks haven't posed huge problems for Web developers.
Pages were kept relatively simple and navigation between different locations within a site
was a great way to clean up any loose memory. If there was a leak, it was most likely
small enough to go unnoticed.New Web applications live up to higher standards. A page
might run for hours without being navigated and retrieve updated information
dynamically through Web services. Language features are pushed to the breaking point
by combining complex event schemes, object-oriented JScript, and closures to produce
entire applications. With these and other changes, certain memory leak patterns are
becoming more prominent, especially those previously hidden by navigation.The good
news is that memory leak patterns can be easily spotted if you know what to look for.
Most of the troublesome patterns you might face have known workarounds requiring only
a small amount of extra work on your behalf. While some pages might still fall prey to
small memory leaks, the most noticeable ones can be easily removed.
2. Write a short note on the strength and weaknesses of Systems Development Life
Cycle. (5 marks)
The Systems Development Life Cycle (SDLC), or Software Development Life Cycle in
systems engineering and software engineering, is the process of creating or altering
systems, and the models and methodologies that people use to develop these systems. The
concept generally refers to computer or information systems.In software engineering the
SDLC concept underpins many kinds of software development methodologies. These
methodologies form the framework for planning and controlling the creation of an
information system[1]
: the software development process. Few people in the modern
computing world would use a strict waterfall model for their Systems Development Life
Cycle (SDLC) as many modern methodologies have superseded this thinking. Some will
argue that the SDLC no longer applies to models like Agile computing, but it is still a
term widely in use in Technology circles. The SDLC practice has advantages in
traditional models of software development, that lends itself more to a structured
environment. The disadvantages to using the SDLC methodology is when there is need
for iterative development or (i.e. web development or e-commerce) where stakeholders
need to review on a regular basis the software being designed. Instead of viewing SDLC
from a strength or weakness perspective, it is far more important to take the best practices
3
from the SDLC model and apply it to whatever may be most appropriate for the software
being designed. Strengths Weaknesses Control. Increased development time. Monitor
Large projects. Increased development cost. Detailed steps. Systems must be defined up
front. Evaluate costs and completion targets. Rigidity. Documentation. Hard to estimate
costs, project overruns. Well defined user input. User input is sometimes limited. Ease of
maintenance. Development and design standards. Tolerates changes in MIS staffing.
3. Write a note on plagiarism as an ethical issue in technical journalism.
(5 marks)
Within academia, plagiarism by students, professors, or researchers is considered
academic dishonesty or academic fraud, and offenders are subject to academic censure,
up to and including expulsion. In journalism, plagiarism is considered a breach of
journalistic ethics, and reporters caught plagiarizing typically face disciplinary measures
ranging from suspension to termination of employment. Some individuals caught
plagiarizing in academic or journalistic contexts claim that they plagiarized
unintentionally, by failing to include quotations or give the appropriate citation. While
plagiarism in scholarship and journalism has a centuries-old history, the development of
the Internet, where articles appear as electronic text, has made the physical act of copying
the work of others much easier.Plagiarism is not the same as copyright infringement.
While both terms may apply to a particular act, they are different transgressions.
Copyright infringement is a violation of the rights of a copyright holder, when material
protected by copyright is used without consent. On the other hand, plagiarism is
concerned with the unearned increment to the plagiarizing author's reputation that is
achieved through false claims of authorship.
4. Rewrite the following passages to make them simple, concise and effective. (5
marks)
i) It is understandable that your highly respected firm is exceedingly anxious to
secure the valuable services of competent young men who have undergone
specialized and detailed training in the outstanding educational institutions of our
day – and let me say in a patriotic aside, our noteworthy institutions are indeed
comparable in prowess and achievement and dignity to the most heralded
universities and colleges of any nation – and thus it is my earnest conviction that
when you go far afield in search of promising prospects for your dominant
organizations, you will proceed eventually to the hallowed college from which I send
forth this missive.
4
ii) Past experiences show that the Internal Revenue Service would take action to
disallow the claiming of the tax benefits resulting from the use of multiple
corporations in so far as they are established primarily for that purpose
5. Convert the following sentences from active into passive (5 marks)
i) It was decided that the number of stipends to poor students may be
increased (by the Staff Council)
It has been decided by Staff Council that number of stipend to poor student may be
increased..
ii) A vigorous literacy drive has been launched by the ladies of this town.
The ladies of this town had launched a vigorous literacy drive.
iii) If hospitals are not to become human rights wastelands, action must be taken by
patients to protect their rights.
Action must be taken by patients to protect their right if not hospitals are to
become human rights wasteland .
iv) The most important thing is that reliable maintenance is necessary for operations
of an airline to be efficient.
Reliable maintenance is the most important thing of an airline to be efficient
v) Meal prices are also affected by the increase in employees.
The increase in employees also affected meal prices

More Related Content

What's hot

Filtering.pete
Filtering.peteFiltering.pete
Filtering.petekadair26
 
Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentationgreti79
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomGabriella Maree Wheeler
 
Impacts of ict in society
Impacts of ict in societyImpacts of ict in society
Impacts of ict in societyMat_J
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computingsappingtonkr
 
Meeting Your Civil Rights Accessibility Obligations
Meeting Your Civil Rights Accessibility ObligationsMeeting Your Civil Rights Accessibility Obligations
Meeting Your Civil Rights Accessibility ObligationsRaymond Rose
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomMrs.Faust
 
Exploring mobile learning with JISC Advance ; Implementing mobile learning in...
Exploring mobile learning with JISC Advance ; Implementing mobile learning in...Exploring mobile learning with JISC Advance ; Implementing mobile learning in...
Exploring mobile learning with JISC Advance ; Implementing mobile learning in...College of North West London
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizensStaci Trekles
 
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Jerry Sakala
 
The Legal Year in Review: Digital Access Cases
The Legal Year in Review: Digital Access CasesThe Legal Year in Review: Digital Access Cases
The Legal Year in Review: Digital Access Cases3Play Media
 
The Potential of Adaptive Interfaces as an Accessibility Aid for Older Web Users
The Potential of Adaptive Interfaces as an Accessibility Aid for Older Web UsersThe Potential of Adaptive Interfaces as an Accessibility Aid for Older Web Users
The Potential of Adaptive Interfaces as an Accessibility Aid for Older Web UsersDavid Sloan
 
CyberLearning 2016 Accessibility
CyberLearning 2016 AccessibilityCyberLearning 2016 Accessibility
CyberLearning 2016 AccessibilityRaymond Rose
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterMark Moran
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalLea Bailey
 

What's hot (17)

Filtering.pete
Filtering.peteFiltering.pete
Filtering.pete
 
Student privacy presentation
Student privacy presentationStudent privacy presentation
Student privacy presentation
 
The legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroomThe legal, safe and ethical use of technology in the classroom
The legal, safe and ethical use of technology in the classroom
 
Mississippi State University Adams
Mississippi State University AdamsMississippi State University Adams
Mississippi State University Adams
 
Impacts of ict in society
Impacts of ict in societyImpacts of ict in society
Impacts of ict in society
 
Legal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational ComputingLegal, Ethical, and Social Issues in Educational Computing
Legal, Ethical, and Social Issues in Educational Computing
 
Meeting Your Civil Rights Accessibility Obligations
Meeting Your Civil Rights Accessibility ObligationsMeeting Your Civil Rights Accessibility Obligations
Meeting Your Civil Rights Accessibility Obligations
 
Teaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the ClassroomTeaching Ethical and Legal use of Technology in the Classroom
Teaching Ethical and Legal use of Technology in the Classroom
 
Exploring mobile learning with JISC Advance ; Implementing mobile learning in...
Exploring mobile learning with JISC Advance ; Implementing mobile learning in...Exploring mobile learning with JISC Advance ; Implementing mobile learning in...
Exploring mobile learning with JISC Advance ; Implementing mobile learning in...
 
Intro - digitalcitizens
Intro - digitalcitizensIntro - digitalcitizens
Intro - digitalcitizens
 
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
Digital Citizenship Policy Formulation with Lubuto Trust College Stakeholders
 
The Legal Year in Review: Digital Access Cases
The Legal Year in Review: Digital Access CasesThe Legal Year in Review: Digital Access Cases
The Legal Year in Review: Digital Access Cases
 
The Potential of Adaptive Interfaces as an Accessibility Aid for Older Web Users
The Potential of Adaptive Interfaces as an Accessibility Aid for Older Web UsersThe Potential of Adaptive Interfaces as an Accessibility Aid for Older Web Users
The Potential of Adaptive Interfaces as an Accessibility Aid for Older Web Users
 
CyberLearning 2016 Accessibility
CyberLearning 2016 AccessibilityCyberLearning 2016 Accessibility
CyberLearning 2016 Accessibility
 
Understanding CIPA to Fight the Filter
Understanding CIPA to Fight the FilterUnderstanding CIPA to Fight the Filter
Understanding CIPA to Fight the Filter
 
Wingate Policy Paper
Wingate Policy PaperWingate Policy Paper
Wingate Policy Paper
 
Filters firstamendmenttla2011 final
Filters firstamendmenttla2011 finalFilters firstamendmenttla2011 final
Filters firstamendmenttla2011 final
 

Similar to Technical Communications rewritten for general audience

Management And Business
Management And BusinessManagement And Business
Management And BusinessKristen Wilson
 
Instructions to a project presentation1. Identify a health pr.docx
Instructions to a project presentation1. Identify a health pr.docxInstructions to a project presentation1. Identify a health pr.docx
Instructions to a project presentation1. Identify a health pr.docxcarliotwaycave
 
Why You Should Go To A Community College Free Es
Why You Should Go To A Community College Free EsWhy You Should Go To A Community College Free Es
Why You Should Go To A Community College Free EsMichelle Wilson
 
Cognitive Computing.PDF
Cognitive Computing.PDFCognitive Computing.PDF
Cognitive Computing.PDFCharles Quincy
 
Cognitive future part 1
Cognitive future part 1Cognitive future part 1
Cognitive future part 1Peter Tutty
 
Cognitive future part 1
Cognitive future part 1Cognitive future part 1
Cognitive future part 1Peter Tutty
 
How to improve an ECM system
How to improve an ECM systemHow to improve an ECM system
How to improve an ECM systemAtle Skjekkeland
 
Big Dig Research Paper
Big Dig Research PaperBig Dig Research Paper
Big Dig Research PaperCandice Him
 
Creating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White PaperCreating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White PaperRebecca Ricks
 
Problem Statement Of Durban
Problem Statement Of DurbanProblem Statement Of Durban
Problem Statement Of DurbanMichele Thomas
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEMShehanperamuna
 
Standards considered harrmful
Standards considered harrmfulStandards considered harrmful
Standards considered harrmfulJean Rohmer
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
 
003 P1 Friends Essay Thatsnotus. Online assignment writing service.
003 P1 Friends Essay  Thatsnotus. Online assignment writing service.003 P1 Friends Essay  Thatsnotus. Online assignment writing service.
003 P1 Friends Essay Thatsnotus. Online assignment writing service.Donna Sims
 
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research EssayHIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essaysorayan5ywschuit
 
Technolody Acceptance Model
Technolody Acceptance ModelTechnolody Acceptance Model
Technolody Acceptance ModelKimberly Thomas
 

Similar to Technical Communications rewritten for general audience (20)

Management And Business
Management And BusinessManagement And Business
Management And Business
 
Instructions to a project presentation1. Identify a health pr.docx
Instructions to a project presentation1. Identify a health pr.docxInstructions to a project presentation1. Identify a health pr.docx
Instructions to a project presentation1. Identify a health pr.docx
 
Why You Should Go To A Community College Free Es
Why You Should Go To A Community College Free EsWhy You Should Go To A Community College Free Es
Why You Should Go To A Community College Free Es
 
Cognitive Computing.PDF
Cognitive Computing.PDFCognitive Computing.PDF
Cognitive Computing.PDF
 
Cognitive future part 1
Cognitive future part 1Cognitive future part 1
Cognitive future part 1
 
Cognitive future part 1
Cognitive future part 1Cognitive future part 1
Cognitive future part 1
 
How to improve an ECM system
How to improve an ECM systemHow to improve an ECM system
How to improve an ECM system
 
Big Dig Research Paper
Big Dig Research PaperBig Dig Research Paper
Big Dig Research Paper
 
Codemaking
CodemakingCodemaking
Codemaking
 
Creating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White PaperCreating Trustworthy AI: A Mozilla White Paper
Creating Trustworthy AI: A Mozilla White Paper
 
Problem Statement Of Durban
Problem Statement Of DurbanProblem Statement Of Durban
Problem Statement Of Durban
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
Standards considered harrmful
Standards considered harrmfulStandards considered harrmful
Standards considered harrmful
 
A Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive ComputingA Survey of Building Robust Business Models in Pervasive Computing
A Survey of Building Robust Business Models in Pervasive Computing
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
003 P1 Friends Essay Thatsnotus. Online assignment writing service.
003 P1 Friends Essay  Thatsnotus. Online assignment writing service.003 P1 Friends Essay  Thatsnotus. Online assignment writing service.
003 P1 Friends Essay Thatsnotus. Online assignment writing service.
 
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research EssayHIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
HIT164 COMPUTING FUNDAMENTALSAssignment 1 Research Essay
 
Technolody Acceptance Model
Technolody Acceptance ModelTechnolody Acceptance Model
Technolody Acceptance Model
 

More from Techglyphs

Bt9002 Grid computing 2
Bt9002 Grid computing 2Bt9002 Grid computing 2
Bt9002 Grid computing 2Techglyphs
 
Bt9002 grid computing 1
Bt9002 grid computing 1Bt9002 grid computing 1
Bt9002 grid computing 1Techglyphs
 
Bt8901 objective oriented systems2
Bt8901 objective oriented systems2Bt8901 objective oriented systems2
Bt8901 objective oriented systems2Techglyphs
 
Bt0062 fundamentals of it(1)
Bt0062 fundamentals of it(1)Bt0062 fundamentals of it(1)
Bt0062 fundamentals of it(1)Techglyphs
 
Bt0062 fundamentals of it(2)
Bt0062 fundamentals of it(2)Bt0062 fundamentals of it(2)
Bt0062 fundamentals of it(2)Techglyphs
 
Bt0064 logic design1
Bt0064 logic design1Bt0064 logic design1
Bt0064 logic design1Techglyphs
 
Bt0064 logic design2
Bt0064 logic design2Bt0064 logic design2
Bt0064 logic design2Techglyphs
 
Bt0066 database management system1
Bt0066 database management system1Bt0066 database management system1
Bt0066 database management system1Techglyphs
 
Bt0066 database management system2
Bt0066 database management system2Bt0066 database management system2
Bt0066 database management system2Techglyphs
 
Bt0067 c programming and data structures2
Bt0067 c programming and data structures2Bt0067 c programming and data structures2
Bt0067 c programming and data structures2Techglyphs
 
Bt0067 c programming and data structures 1
Bt0067 c programming and data structures 1Bt0067 c programming and data structures 1
Bt0067 c programming and data structures 1Techglyphs
 
Bt0068 computer organization and architecture
Bt0068 computer organization and architecture Bt0068 computer organization and architecture
Bt0068 computer organization and architecture Techglyphs
 
Bt0068 computer organization and architecture 2
Bt0068 computer organization and architecture 2Bt0068 computer organization and architecture 2
Bt0068 computer organization and architecture 2Techglyphs
 
Bt0070 operating systems 1
Bt0070 operating systems  1Bt0070 operating systems  1
Bt0070 operating systems 1Techglyphs
 
Bt0070 operating systems 2
Bt0070 operating systems  2Bt0070 operating systems  2
Bt0070 operating systems 2Techglyphs
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1Techglyphs
 
Bt0072 computer networks 2
Bt0072 computer networks  2Bt0072 computer networks  2
Bt0072 computer networks 2Techglyphs
 
Bt0074 oops with java2
Bt0074 oops with java2Bt0074 oops with java2
Bt0074 oops with java2Techglyphs
 
Bt0074 oops with java
Bt0074 oops with javaBt0074 oops with java
Bt0074 oops with javaTechglyphs
 
Bt0075 rdbms with mysql 1
Bt0075 rdbms with mysql 1Bt0075 rdbms with mysql 1
Bt0075 rdbms with mysql 1Techglyphs
 

More from Techglyphs (20)

Bt9002 Grid computing 2
Bt9002 Grid computing 2Bt9002 Grid computing 2
Bt9002 Grid computing 2
 
Bt9002 grid computing 1
Bt9002 grid computing 1Bt9002 grid computing 1
Bt9002 grid computing 1
 
Bt8901 objective oriented systems2
Bt8901 objective oriented systems2Bt8901 objective oriented systems2
Bt8901 objective oriented systems2
 
Bt0062 fundamentals of it(1)
Bt0062 fundamentals of it(1)Bt0062 fundamentals of it(1)
Bt0062 fundamentals of it(1)
 
Bt0062 fundamentals of it(2)
Bt0062 fundamentals of it(2)Bt0062 fundamentals of it(2)
Bt0062 fundamentals of it(2)
 
Bt0064 logic design1
Bt0064 logic design1Bt0064 logic design1
Bt0064 logic design1
 
Bt0064 logic design2
Bt0064 logic design2Bt0064 logic design2
Bt0064 logic design2
 
Bt0066 database management system1
Bt0066 database management system1Bt0066 database management system1
Bt0066 database management system1
 
Bt0066 database management system2
Bt0066 database management system2Bt0066 database management system2
Bt0066 database management system2
 
Bt0067 c programming and data structures2
Bt0067 c programming and data structures2Bt0067 c programming and data structures2
Bt0067 c programming and data structures2
 
Bt0067 c programming and data structures 1
Bt0067 c programming and data structures 1Bt0067 c programming and data structures 1
Bt0067 c programming and data structures 1
 
Bt0068 computer organization and architecture
Bt0068 computer organization and architecture Bt0068 computer organization and architecture
Bt0068 computer organization and architecture
 
Bt0068 computer organization and architecture 2
Bt0068 computer organization and architecture 2Bt0068 computer organization and architecture 2
Bt0068 computer organization and architecture 2
 
Bt0070 operating systems 1
Bt0070 operating systems  1Bt0070 operating systems  1
Bt0070 operating systems 1
 
Bt0070 operating systems 2
Bt0070 operating systems  2Bt0070 operating systems  2
Bt0070 operating systems 2
 
Bt0072 computer networks 1
Bt0072 computer networks  1Bt0072 computer networks  1
Bt0072 computer networks 1
 
Bt0072 computer networks 2
Bt0072 computer networks  2Bt0072 computer networks  2
Bt0072 computer networks 2
 
Bt0074 oops with java2
Bt0074 oops with java2Bt0074 oops with java2
Bt0074 oops with java2
 
Bt0074 oops with java
Bt0074 oops with javaBt0074 oops with java
Bt0074 oops with java
 
Bt0075 rdbms with mysql 1
Bt0075 rdbms with mysql 1Bt0075 rdbms with mysql 1
Bt0075 rdbms with mysql 1
 

Recently uploaded

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 

Recently uploaded (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

Technical Communications rewritten for general audience

  • 2. 2 1. Choose a 150 word passage from a technical article addressed to an expert audience. (You can choose this from any journal or web) Rewrite the passage so that it is clear and interesting to the general reader. (10 marks) In the past, memory leaks haven't posed huge problems for Web developers. Pages were kept relatively simple and navigation between different locations within a site was a great way to clean up any loose memory. If there was a leak, it was most likely small enough to go unnoticed.New Web applications live up to higher standards. A page might run for hours without being navigated and retrieve updated information dynamically through Web services. Language features are pushed to the breaking point by combining complex event schemes, object-oriented JScript, and closures to produce entire applications. With these and other changes, certain memory leak patterns are becoming more prominent, especially those previously hidden by navigation.The good news is that memory leak patterns can be easily spotted if you know what to look for. Most of the troublesome patterns you might face have known workarounds requiring only a small amount of extra work on your behalf. While some pages might still fall prey to small memory leaks, the most noticeable ones can be easily removed. 2. Write a short note on the strength and weaknesses of Systems Development Life Cycle. (5 marks) The Systems Development Life Cycle (SDLC), or Software Development Life Cycle in systems engineering and software engineering, is the process of creating or altering systems, and the models and methodologies that people use to develop these systems. The concept generally refers to computer or information systems.In software engineering the SDLC concept underpins many kinds of software development methodologies. These methodologies form the framework for planning and controlling the creation of an information system[1] : the software development process. Few people in the modern computing world would use a strict waterfall model for their Systems Development Life Cycle (SDLC) as many modern methodologies have superseded this thinking. Some will argue that the SDLC no longer applies to models like Agile computing, but it is still a term widely in use in Technology circles. The SDLC practice has advantages in traditional models of software development, that lends itself more to a structured environment. The disadvantages to using the SDLC methodology is when there is need for iterative development or (i.e. web development or e-commerce) where stakeholders need to review on a regular basis the software being designed. Instead of viewing SDLC from a strength or weakness perspective, it is far more important to take the best practices
  • 3. 3 from the SDLC model and apply it to whatever may be most appropriate for the software being designed. Strengths Weaknesses Control. Increased development time. Monitor Large projects. Increased development cost. Detailed steps. Systems must be defined up front. Evaluate costs and completion targets. Rigidity. Documentation. Hard to estimate costs, project overruns. Well defined user input. User input is sometimes limited. Ease of maintenance. Development and design standards. Tolerates changes in MIS staffing. 3. Write a note on plagiarism as an ethical issue in technical journalism. (5 marks) Within academia, plagiarism by students, professors, or researchers is considered academic dishonesty or academic fraud, and offenders are subject to academic censure, up to and including expulsion. In journalism, plagiarism is considered a breach of journalistic ethics, and reporters caught plagiarizing typically face disciplinary measures ranging from suspension to termination of employment. Some individuals caught plagiarizing in academic or journalistic contexts claim that they plagiarized unintentionally, by failing to include quotations or give the appropriate citation. While plagiarism in scholarship and journalism has a centuries-old history, the development of the Internet, where articles appear as electronic text, has made the physical act of copying the work of others much easier.Plagiarism is not the same as copyright infringement. While both terms may apply to a particular act, they are different transgressions. Copyright infringement is a violation of the rights of a copyright holder, when material protected by copyright is used without consent. On the other hand, plagiarism is concerned with the unearned increment to the plagiarizing author's reputation that is achieved through false claims of authorship. 4. Rewrite the following passages to make them simple, concise and effective. (5 marks) i) It is understandable that your highly respected firm is exceedingly anxious to secure the valuable services of competent young men who have undergone specialized and detailed training in the outstanding educational institutions of our day – and let me say in a patriotic aside, our noteworthy institutions are indeed comparable in prowess and achievement and dignity to the most heralded universities and colleges of any nation – and thus it is my earnest conviction that when you go far afield in search of promising prospects for your dominant organizations, you will proceed eventually to the hallowed college from which I send forth this missive.
  • 4. 4 ii) Past experiences show that the Internal Revenue Service would take action to disallow the claiming of the tax benefits resulting from the use of multiple corporations in so far as they are established primarily for that purpose 5. Convert the following sentences from active into passive (5 marks) i) It was decided that the number of stipends to poor students may be increased (by the Staff Council) It has been decided by Staff Council that number of stipend to poor student may be increased.. ii) A vigorous literacy drive has been launched by the ladies of this town. The ladies of this town had launched a vigorous literacy drive. iii) If hospitals are not to become human rights wastelands, action must be taken by patients to protect their rights. Action must be taken by patients to protect their right if not hospitals are to become human rights wasteland . iv) The most important thing is that reliable maintenance is necessary for operations of an airline to be efficient. Reliable maintenance is the most important thing of an airline to be efficient v) Meal prices are also affected by the increase in employees. The increase in employees also affected meal prices