Web Writing That Works!

           A Project of
           The Communication Circle

Guidelines Rants Patterns Poems Services Classes Press Blog Resources About Us Site Map

HomeGuidelines > 2. Make text scannable. > 2b. Insert Meaningful Headlines and Subheads > Challenges          

 

Diagram

Background

Examples

Audience Fit

Challenges

Bonus! Hot Text chapter (89K, PDF, 2 minutes at 56K)

Challenges

Insert headings and subheads.

(a)

For each item on the bill of materials, you need to define whether or not that material will be pushed out of the warehouse, to await use on the line, or pulled from the warehouse just in time to be used during assembly. Pushing ensures all supplies are there on time, but wastes valuable floor space while you wait for the assembly to get to the point where the materials can be used. Pushing resembles traditional manufacturing. Pulling depends on an intelligent conveyor system, triggered by the software, to offload the material from racks, and bring it to the right spot on the floor at the right time. Pulling takes awhile to fine tune, because there are so many physical problems possible, but once pulling has been established, it saves space on the work floor. Pulling is the more contemporary method of manufacturing. Because each item’s method of delivery must be defined when creating the bill of materials, you now need to choose between push and pull.

Answer

Other ways to make text scannable

2a. Create a meaningful
      title.

2c. Highlight keywords and
      phrases--and links.

2d. Turn any list into a
       bulleted or numbered
       list.

 

(b)

The actinide elements thorium and uranium are found in orthosilicate neutral minerals. Thorium orthosilicate forms tetragonal thorite and monoclinic huttonite; uranium orthosilicates form tetragonal coffinite. These tetragonal orthosilicates are isostructural with zircon. Zircon, because of its durability (~109 years), has been proposed as a host mineral for deep borehole burial of high-grade plutonium that has been recovered from dismantled nuclear weapons. The objective of the project is to develop a material containment system for processing plutonium-bearing zircon under high temperature and high pressure. As to the scope of the project, specifically, researchers will investigate container systems that can withstand temperatures near 1500°C that can be compressed isostatically at pressures near 10,000 psi, and that are inert to reaction mixtures. The benefits include support for actinide competency in thermodynamics, synthesis, materials science and pyrochemistry. The results of this work should provide parameters for safe preparation of a very stable waste form for short and long term disposition of excess plutonium from weapons.

Answer

Resources on Scannability

Taking a Position on Scannability

Heuristic Online Text (HOT) Evaluation for Scannability

Poster

 

(c)

A computer virus is a program designed to destroy your files, sabotage your programs, or degrade the performance of your computer. Many viruses work by attaching themselves to other files, so you may activate a virus simply by opening one of those files. The kind of files that can be infected with a virus include system files, and documents created in programs that allow macros (simple scripting). A macro is a little program, and many people use macros to automate repetitive tasks, such as inserting a long company name into a document, or performing a calculation. Programs such as Microsoft Word and Microsoft Excel offer macros, and, unfortunately, hackers have chosen to create destructive programs using their macros. A virus based on macros, known as a macro virus, is designed to attach itself to other files, to replicate themselves, and to launch actions such as sending infected files to everyone in your email address book. A macro virus can often jump from one operating system to another, and most are designed to go into action the moment you open the infected file. On the other hand, a virus known as a Trojan horse pretends to be a useful program, or a game, so you launch them without realizing their sinister purpose. The effect may be to damage your files, or destroy the performance of your computer. But a Trojan horse is not technically a virus, because it does not replicate and spread like a virus.

Answer

 

 

Home | Guidelines | Rants | Patterns | Poems | Services | Classes | Press | Blog |
Resources | About Us | Site Map

Web Writing that Works!
http://www.WebWritingThatWorks.com
 © 1999-2004 Jonathan and Lisa Price
The Communication Circle
Discuss at HotText@yahoogroups.com
Email us directly at ThePrices@ThePrices.com
Order Hot Text (the book) from Amazon