Preview

Analysis Of Writing Assignment: The Five Weaknesses Of Letter

Satisfactory Essays
Open Document
Open Document
520 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Analysis Of Writing Assignment: The Five Weaknesses Of Letter
Seth Hendrixson
10/4/12

Writing Assignment 6.12

Five weaknesses of the letter:

1. When writing you should limit your long lead in sentences. Here is an example of a long lead in sentence from the letter:

“To ensure the improvement of your after-hours security, you should initially make a decision with regard to exactly what you contemplate must have protection.”

You could re-write the sentence to say: “To improve your after-hours security, you must decide what needs to be protected.”

2. You should eliminate flabby expressions like the ones used in this sentence:

“Due to the fact that we feel you will want to obtain protection for both your equipment and data, we will make suggestions for taking a number of judicious
…show more content…
When writing sometimes people try to use words to make their message sound more “businesslike”. You avoid using trite business phrases like the ones used in the following sentence:

“As per your request, the undersigned is transmitting to you the attached documents with regards to the improvement of security in your business.”

Instead of saying “as per your request” you can re-write the opening of that sentence by simply “as you request” in its place. This makes the sentence easier to understand.

4. Another important thing to remember when writing is to reject the use of redundancies. The following sentence is an example of using redundancies:

“My last and final recommendation, you should install space alarms, which are sensors that look down over the areas that are to receive protection, and activate bells or additional lights, thus scaring of intruders.”

The use of the words, “last and final” is redundant because they mean the same thing. You should re-write the sentence using just one of the words and it would make a better sentence.

5. Using bullets and lists can help improve the readability and comprehension of your message. In the second paragraph the writer begins to list the security improvements that the receiver of the message needs to make. It would be better to use bullets and or a list system to improve the “skim value” of your

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Physical entry controls will consist of guard’s at all perimeter doors, and into all secure areas. Also a security system on all outer doors that is monitored 24 hours a day by a security company. There will also be motion sensors at all available accessible areas. There will be barbed wire around all access to first and second floor areas around perimeter fence. There will also be badges for person ale according to security level as well as guest. Also security cameras in all accessible areas with 360 degree rotation as well as nightvision.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    1.3 - Explain the purpose of legal and organizational requirements for the security and confidentiality of information…

    • 1681 Words
    • 7 Pages
    Better Essays
  • Good Essays

    NT1310 NFPA Codes

    • 1390 Words
    • 5 Pages

    In order for us as a person and an IT Administrator is to stay safe. History has shown the safety departments about having to write policies which are used to provide recommended practices for the design and installation of safety standards with the Telecommunications infrastructure that will support a wide variety of existing and future services, using industry accepted design and installation methods.…

    • 1390 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    1.3 – Explain the purpose of legal and organisational requirements for the security and confidentiality of information.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    This means that an individual's wish to protect his or her privacy must be balanced against the needs of the…

    • 559 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Feedback: Christine this is a good start where you have demonstrated a sound understanding of ways to maintain a secure work environment. Can you take it one step further and provide a specific example of how security can be maintained also? Consider some of the ways that this is done at your current or previous workplace. (2.3)…

    • 620 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The premises complies with health and safety and that there is suitable security in place…

    • 1213 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Ms Lucy Godfrey

    • 3239 Words
    • 13 Pages

    Each employee should be given such information, instruction and training as is necessary to enable the safe…

    • 3239 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Unit 4 1.2 and 1.4

    • 2237 Words
    • 9 Pages

    All staff to understand the safeguarding procedure and understand their role in keeping children safe.…

    • 2237 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Midterm Review Essay

    • 2756 Words
    • 12 Pages

    2. Start the date 2 inches from the top edge of the paper or 1…

    • 2756 Words
    • 12 Pages
    Satisfactory Essays
  • Good Essays

    To make sure all safe guarding policies are been followed for example the safe door policy.…

    • 1262 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Network Security

    • 523 Words
    • 3 Pages

    * Provides adequate security for all of the company communications and documents (especially sensitive sales documents). All POS services must be protected. All general network access should be segmented from the company POS services.…

    • 523 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Punctuation and Rule

    • 2521 Words
    • 11 Pages

    This information was extracted from Help Yourself: A Guide to Writing and Rewriting, Mattson, Leshing, & Levi, 3rd Edition. Englewood Cliff: Prentice Hall, 1993. (out of print). The information contained herein is consistent with all major style guides for Standard American English Language usage.…

    • 2521 Words
    • 11 Pages
    Powerful Essays