Justifications Report
Sharon Boone
Marla Cartwright
English 315 Professional Communications
February 21, 2016
Introduction
The implementation of a program can be designated as technical specification or program, software element or any 0ther systems over computer programming and the deployment. Frequently the implementations will be prevailing for a definite description or standards. The program application of a particular organization in the IT industry will give reimbursements and supports for high-level management(Ake & Kevin, 2009). It also deals with the participation of the customer. In addition, advance, the services in future, directing the audiences, the client awareness, and current programs would be understood.
The problem statement
The problem statement was a statement, which describes about, which recommendations should be done for implementing a program with high privacy as well as the security meanwhile unsecure program can source danger to an IT association and help third party to hack the information more with no trouble(Ake & Kevin, 2009). The programs that are unsecure will under no circumstances get to the clients because the programs will make them apprehension about concealed information. Furthermore, the programs must satisfy the need for the end users. Hence, it is necessary to have confidentiality (privacy), high protected, as well as user-friendly programs to circumvent many of the teething troubles.
Method used
The methods used to make an endorsement for implementing programs are two. The first method was formal method and the second one was an evaluation of R&D methods. The software companies in information technology industries helped the formal methods. The evaluation of the of R&D can be used for helping firms to improve the plan for a program and departments the surveys for identifying the usage for programs and awareness was created in an IT industry. In addition, the formal method was also used for the software development(Orthodox Presbyterian Church, 2014).
Alternative methods
Apart from the two methods used, there other method, which can be used for implementing the programs in IT industry and achieve the same results. These are such as Internet as well as software. The software itself can be able to give the codes for that software that in turn can produce a better and most useful result. These are just but a few methods that can be used for implementing the program in the software enterprises of an IT industry.
Criteria
There number of criteria to evaluate Internet, which are as follows;
I. Accuracy
This is primarily used to determine the dependability of the web resource and free from error of the informed contained in the web source. This also includes the attention of who is hosting the site like a university, professional association, or even a commercial host.
II. Authority
To determine the author of the website, study the page carefully for information about the author, and to see if ev ...
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Justifications Report Sharon Boone.docx
1. Justifications Report
Sharon Boone
Marla Cartwright
English 315 Professional Communications
February 21, 2016
Introduction
The implementation of a program can be designated as technical
specification or program, software element or any 0ther systems
2. over computer programming and the deployment. Frequently the
implementations will be prevailing for a definite description or
standards. The program application of a particular organization
in the IT industry will give reimbursements and supports for
high-level management(Ake & Kevin, 2009). It also deals with
the participation of the customer. In addition, advance, the
services in future, directing the audiences, the client awareness,
and current programs would be understood.
The problem statement
The problem statement was a statement, which describes about,
which recommendations should be done for implementing a
program with high privacy as well as the security meanwhile
unsecure program can source danger to an IT association and
help third party to hack the information more with no
trouble(Ake & Kevin, 2009). The programs that are unsecure
will under no circumstances get to the clients because the
programs will make them apprehension about concealed
information. Furthermore, the programs must satisfy the need
for the end users. Hence, it is necessary to have confidentiality
(privacy), high protected, as well as user-friendly programs to
circumvent many of the teething troubles.
Method used
The methods used to make an endorsement for implementing
programs are two. The first method was formal method and the
second one was an evaluation of R&D methods. The software
companies in information technology industries helped the
formal methods. The evaluation of the of R&D can be used for
helping firms to improve the plan for a program and
departments the surveys for identifying the usage for programs
and awareness was created in an IT industry. In addition, the
formal method was also used for the software
development(Orthodox Presbyterian Church, 2014).
Alternative methods
Apart from the two methods used, there other method, which
can be used for implementing the programs in IT industry and
achieve the same results. These are such as Internet as well as
3. software. The software itself can be able to give the codes for
that software that in turn can produce a better and most useful
result. These are just but a few methods that can be used for
implementing the program in the software enterprises of an IT
industry.
Criteria
There number of criteria to evaluate Internet, which are as
follows;
I. Accuracy
This is primarily used to determine the dependability of the web
resource and free from error of the informed contained in the
web source. This also includes the attention of who is hosting
the site like a university, professional association, or even a
commercial host.
II. Authority
To determine the author of the website, study the page carefully
for information about the author, and to see if everyone else has
funded to the site. A good website should give you a way to
contact the producer of the sites.
III. Objectivity
To determine the objective of the website, consider if the same
person or organization is providing the information and
advertising contents. The commercial entities mainly sponsor
good website.
IV. Currency
This is finding out whether the page was last updated. Look if
there might be broken links on the site. Moreover, check how
often new links appear on the site.
V. Coverage
Determine whether the information is adequately covered on the
website; compare the site and its content with 2other related
sites
Findings
The findings used for making a recommendation for that
particular program are as follows; the program should be user
4. welcoming and should reach the users presently(Florida, 2010).
It also upsurges the rationality for the outcome findings, well
understood for implementing the programs, program results can
be understood more quickly, improves the distribution of the
good practices and many opportunities should be made for
improving the program.
Conclusion
In conclusion, it is most likely that the implementation of a
program that is more efficient may require the extended
educator. It also aids person about understanding what a
program should be done, accomplished and how to be practiced.
It is recommendable to have the above-mentioned methods that
are formal and evaluation of R&D methods. Thus, the end users
should understand the program.
References
Ake, Kevin, (2009). Information technology for manufacturing:
reducing costs and expanding capabilities. Boca Raton: St.
Lucie Press.
Florida,(2010). Program evaluation and justification review:
Information Technology Program administered by the
Department of Management Services. [Tallahassee, Fla.]: The
Office
Orthodox Presbyterian Church, (2014). Justification: report.
5. Willow Grove, PA: Committee on Christian Education of the
Orthodox Presbyterian Church.