9.1: Understanding Graphics

Learning Objectives

  • Define graphics
  • Identify why graphics are used in technical communications
  • Examine the guidelines for graphics

What Are Graphics?

The term “graphics” refers to the visual or non-textual elements of technical communications. Graphics include tables and figures. The term “figures” encompasses graphs, charts, illustrations, diagrams, and photographs.

Why Are Graphics Used in Technical Communication?

Graphics are important in technical communication. We learn more from a document when graphics are included (Gatlin, 1988). In fact, people learn about 1/3 more from a document with graphics than without (Levie & Lentz, 1982). A study found that readers learn faster and are better able to use the information they learn when the text includes graphics (Große, Jungmann, & Drechsler, 2015). That does not, of course, mean that you should place graphics randomly into every spot possible in a report. On the contrary, graphics should be used selectively, carefully and correctly. 

What Are the Guidelines for Using Graphics?

Here are ten guidelines for using graphics:

  1. Identify areas in your text where you discuss data to consider if it would be better shown as a graphic (e.g., a table or graph).
  2. Watch out for areas in your text where you define a series of terms; this may be better shown as a table. 
  3. Make sure the complexity of your graphics is appropriate to your audience, subject matter, and purpose.
  4. Use a title and number for each graphic.
  5. Indicate the source of data/information in graphics using APA-style documentation
  6. Intersperse graphics and text on the same page. Don’t put graphics on pages by themselves and don’t attach them to the end of documents unless they form part of an Appendix.
  7. Include identifying details on the graphics such as illustration labels, axis labels, keys; your reader should understand the graphic easily.
  8. Place graphics as near as possible to the point in the text where they are relevant; however, if a graphic does not fit properly on one page, put it at the top of the next, and continue with regular text on the preceding page. Don’t leave half a page blank just to keep a graphic near the text it is associated with.
  9. Cross-reference all graphics from the appropriate text. In the cross-reference, give the figure or table number, indicate the subject matter of the graphic, and provide explanatory information as necessary.
  10. Discuss graphics in the text of your report/communication. Don’t just throw a table, graph, or chart out there unexplained. Orient readers to it and explain its significance.

TRY IT

Exercise 9.1:  Effective Graphics?

Browse through these recent journal articles on the topic of computer network security. Make five (5) observations about the uses of graphics (including tables, graphs, illustrations, diagrams, and photographs) in these articles. Link your observations back to the guidelines listed on this page. 

Computer Network Security Defense Model” by Yiming NiuWenyong Du and Zhenying Tang (2022)

Computer Network Security Technology Based on Java” by Qi Gao and Jinniu Bai (2021) 

Research on Risk Factors of Fuzzy Evaluation of Network Security Based on Computer Big Data” by Peikun XieYiFan Dang and Yang Dang (2021) 

References & Attributions

References

Gao, Q., & Bai, J. (2021). Computer network security technology based on java. Journal of Physics. Conference Series, 2143(1), 12019. https://doi.org/10.1088/1742-6596/2143/1/012019

Gatlin, P. L. (1988). Visuals and prose in manuals: The effective combination. In Proceedings of the 35th International Technical Communication Conference (pp. RET 113-115). Arlington, VA: Society for Technical Communication.

Große, C. S., Jungmann, L., & Drechsler, R. (2015). Benefits of illustrations and videos for technical documentations. Computers In Human Behavior, 45109-120. doi:10.1016/j.chb.2014.11.095

Levie, W.H., and Lentz, R. (1982). Effects of text illustrations: A review of research. Journal of Educational Psychology, 73, 195-232.

Niu, Y., Du, W., & Tang, Z. (2022). Computer network security defense model. Journal of Physics. Conference Series, 2146(1), 012041. https://doi.org/10.1088/1742-6596/2146/1/012041

Xie, P., Dang, Y., & Dang, Y. (2021). Research on risk factors of fuzzy evaluation of network security based on computer big data. Journal of Physics. Conference Series, 2033(1), 12171. https://doi.org/10.1088/1742-6596/2033/1/012171

Attributions

Content on this page is adapted from Open Technical Communication: Chapter 4: Document Design, which is licensed under a Creative Commons Attribution 4.0 International License.

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Writing in a Technical Environment (First Edition) Copyright © 2022 by Centennial College is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.

Share This Book