Premium Essay

Using Word Processing Tools

In: Computers and Technology

Submitted By Capwale
Words 302
Pages 2
Check Point
Using Word Processing Tools

As some one who uses Microsoft word on a daily basis I felt as if I was very well aware of its capabilities, but after reading the provided material from this weeks readings I can say that there are a number of things that I was unaware of. For starters there are so many short cut keys that I was unaware of such as selecting ctrl + F in order to find a particular word in your document instantly. In addition the integrated screen shot feature that captures screen shot samples from the background of the word document. Another feature that I found most shocking was the ability to remove background images under the Pictures Tools / Format tab. Whenever I would want to edit a picture I would power up my complicated Photoshop software to accomplish such tasks, I did not know Microsoft word was capable of such complex editing. Another tool that I found interesting would the filter tool “artistic effects”. Be it that there are such apps like Instagram which allows you to do similar, it amazes me that Microsoft Word, a program that I would use primarily for documents is capable of such creative alterations. As I stated, I normally would use Microsoft word for my basics such as typing up a paper, letter, memo etc. But I never considered using Microsoft Office as software to create a full brochure or any graphic creation. It is clear now that exploring beyond just the basic tool commands and working with the more advanced features, Microsoft Word and be more useful. Word is a decent program for the exploratory because you can use different features in a combination to do something the program designers probably never figured on. It is most importantly simple yet

Similar Documents

Premium Essay

Text Mining Research Paper

...preprocessing techniques. The initial process of text mining systems is preprocessing steps. Pre-processing reduces the size of the input text documents significantly. It involves the actions like sentence boundary determination, natural language specific stop-word elimination, tokenization and stemming. This research paper established the comparative analysis of document tokenization tools. I. Introduction Tokenization...

Words: 1209 - Pages: 5

Premium Essay

Police Abuse Essay

...computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four major physical network topologies: bus, star, ring, and mesh. Assignment Requirements Using the Topology Worksheet provided by the instructor, complete the topology name, logical characteristics, and physical characteristics for each topology diagram on the worksheet. Be sure to...

Words: 16043 - Pages: 65

Premium Essay

Unit 1 Labs

...needs and major stakeholders for computer networks and network applications. Describe how digital devices store data. Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): Respond to the multiple-choice questions. Complete the List the Words inside Acronyms table. Required Resources Odom textbook Computer with word processing software Internet access Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four major physical network topologies: bus, star, ring, and mesh. Assignment Requirements Using the Topology Worksheet provided by the instructor, complete the topology name, logical characteristics, and physical characteristics for each topology diagram on the worksheet. Be sure to include the following information: * Name each...

Words: 16182 - Pages: 65

Premium Essay

Introduction to Networking

...computer networks and network applications. * Describe how digital devices store data. * Describe the differences between input and output devices. Assignment Requirements In the Chapter Review Activities at the end of Chapter 1 in the Odom textbook (answers can be found in the textbook): * Respond to the multiple-choice questions. * Complete the List the Words inside Acronyms table. Required Resources * Odom textbook * Computer with word processing software * Internet access * Printer Submission Requirements: Submit your responses as a typed document using Arial or Times New Roman 12-point font, double-spaced. Label your assignment Unit 1 Assignment 1. Unit 2 Assignment 1: Identifying Network Topologies Course Objectives and Learning Outcomes * Identify the major needs and major stakeholders for computer networks and network applications. * Identify the classifications of networks and how they are applied to various types of enterprises. * Draw the four major physical network topologies: bus, star, ring, and mesh. Assignment Requirements Using the Topology Worksheet provided by the instructor, complete the topology name, logical characteristics, and physical characteristics for each topology diagram on the worksheet. Be sure to...

Words: 16043 - Pages: 65

Premium Essay

Love in Europe

...WORD PROCESSING INTRODUCTION Word Processing is one of the most widely used application programs today. Word Processing basically concerns using the computer for secretarial activities. This includes amongst other activities typing of text, filling, storage, retrieval and maintenance of documents. Word Processing software enables automated manipulation of words in terms of entering, storage/ retriveal and printing of text in various forms such as letters, reports, books, and so on. It is the single most common task carried out on PCs. Once a secretary/typist has used a word processing package, he or she will probably wonder how in the world anyone could ever have made do without it. Word Processing has virtually eliminated the need for tippex correction fliud and the need to re-type documents. Making corrections on an already printed document is not only time consuming and cubersome,but revising the same text electronically, using word processors is quick and quite easy. You simply make corrections and revisions to the text on the computer screen before the document is printed in final form. There is no limit to the numbers of times or the frequency of changes to any documents after being into computer. Word Processing is about working with words, and setting them on the paper. The characters of the alphabet are generally formed into words. Words are combined into sentences, following the rules of grammer. Word processingsoftware faciliates the handling of words...

Words: 1930 - Pages: 8

Free Essay

Project Management

...TASKS, DUTIES AND RESPONSIBILITIES KSAOs Perform photocopies Arranging the copies competent in using hand tools like screwdrivers, pliers and multimeters Cutting the paper competent in using hand tools like screwdrivers, pliers and multimeters Disposal of waste paper clean dirt and debris from internal parts Keeping a check on the toner competent in using hand tools like screwdrivers, pliers and multimeters Informing the procurement if ink or toner required competent in using hand tools like screwdrivers, pliers and multimeters Scanning of documents The ability to read and interpret technical drawings and schematics Maintaining folders The ability to read and interpret technical drawings and schematics Maintenance of machine competent in using hand tools like screwdrivers, pliers and multimeters clean dirt and debris from internal parts Skill in troubleshooting failures Resting the machine Ordering paper rim competent in using hand tools like screwdrivers, pliers and multimeters Minimizing waste competent in using hand tools like screwdrivers, pliers and multimeters Electricity check Timely copies of documents Printing documents Binding /Folder separation competent in using hand tools like screwdrivers, pliers and multimeters Ordering/ sorting/arranging the copies Staple the paper competent in using hand tools like screwdrivers, pliers and multimeters Maintain stapler and supply pins Conversion of certain documents into versions The ability to read...

Words: 734 - Pages: 3

Free Essay

Text-to-Speech Synthesis of Two-Syllable Filipino Words

...CONCATENATIVE TEXT-TO-SPEECH SYNTHESIS OF TWO-SYLLABLE FILIPINO WORDS Lourdes T. Tupas, Rowena Cristina L. Guevara, Ph.D., and Melvin Co Digital Signal Processing Laboratory Department of Electrical and Electronics Engineering University of the Philippines, Diliman ABSTRACT In concatenative-based speech synthesizers, one of the most important problems is proper union of speech units to achieve an intelligible and natural-sounding synthetic speech. For that purpose, speech units need to be processed and concatenated so that discontinuities at concatenation points are minimized. Another possible solution to this is by using a larger speech unit to decrease the number of concatenation points. In this project, which utilized two-syllable Filipino words, the speech unit is syllable. Characterization of these Filipino words is done to differentiate words of the same spelling but of different meanings. This characterization took note of the pitch, duration of utterance of each syllable in the word, and the first three formant frequencies. A digital signal processing (DSP) block is also implemented. It accepts two-syllable text and outputs all the possible utterances of that word; this block is the text-to-speech synthesizer. A two-interval forced choice test was conducted to evaluate the level of naturalness of the synthesized speech. Words of the same spelling but of different meanings are distinguished using the prosody and intelligibility test. 1. INTRODUCTION ...

Words: 2642 - Pages: 11

Premium Essay

Intorduction to Computers

...|Batch: |March, 2011 | |Tutor: |B Jagadish Chandra Reddy | A warm welcome to all the students enrolled for this unit. The unit handbook will give you a clear understanding of the aim and learning objectives of the unit. It will also portray the unit planning in terms of coverage, prerequisites for each session, tools and techniques used by the tutor and the level of efforts expected to be put by a student. It will make you aware of the assessment policy, assignment schedule, pass criteria, generic merit and distinction descriptors. Lastly, it will spell out the required efforts expected from your side in order to achieve the learning outcomes. Aim This unit is aimed at students who need sufficient knowledge of word processing to write assignments, use spreadsheets and make presentations. Unit Planning |Session Plan...

Words: 474 - Pages: 2

Free Essay

Learning Team Collaboration Bis/220 Week 2

...agencies. In addition, this makes new systems vulnerable, and the security can be breached by hackers. Information technology can be applicable in my workplace by better securing customer’s information. In addition, providing security controls by going the extra mile to safeguard customer’s information will secure controls and help build customers confidence. My knowledge has increased because I understand security, and I know I have to take steps to protect my computer by incorporating the software to safeguard information from hackers. By using word processing tools to communicate business objectives within the business environment using word processing tools is extremely useful in relaying information such as business documents through the use of word. The tools of word help produce business letters or memos or any documents to enhance the effectiveness and help achieve the objective on any subject matter. Knowing all the tools of word will make my documents look more professional in relaying information to my coworkers or collaborating with teams...

Words: 321 - Pages: 2

Premium Essay

Microsoft Office Program: Helpful to Student's Studies

...Studies I. INTRODUCTION In this fast reaching world, the studies of every individual become more complicated. We have now going beyond the imagination of each human being and applying this through technology. Merely fact, technology is a very big help in the lives of each learners specifically to the highschool students here in Gonzalo Aler National High School. The school adapted technology as one of the most important tools in learning and computer is one of the best examples. Computer is one of the best systematic knowledge that can be used. Using this product of technology, learners challenged to be maximized in their learning by being more creative and become more interested in studying. Today, computer does not just help to the student but it is an essential one to give courage and help improves the skills of individual. With the ever increasing population of computer technology, it is almost impossible to find an educational establishment that does not use it. Computers are becoming a more and more important within education as both a learning tool for students and for keeping records of all individuals at the school. Computers allow students to access more information more easily and the introduction of the internet means that this information is available to hand 24/7. Whether this is a good prospect or not is something that is debated frequently. For every factual and accurate piece of information that can be found on the internet, there are ten false ones. This...

Words: 3073 - Pages: 13

Premium Essay

Chapter 4 Review Questions 1-5

...Chapter 4 “IT Infrastructure: Hardware and Software” Review Questions 1-5 1. What are the components of IT infrastructure? • Define information technology (IT) infrastructure and describe each of its components. IT infrastructure consists of the shared technology resources that provide the platform for the firm’s specific information system applications. Major IT infrastructure components include computer hardware, software, data management technology, networking and telecommunications technology, and technology services. 2. What are the major computer hardware, data storage, input, and output technologies used in business? * Computer Hardware: Mainframes, midrange computers, PC’s, workstations, and supercomputers. * Data Storage: Magnetic disk, optical disc, magnetic tape and storage networks. * Input devices: Keyboards, computer mice, touch screens (including those with multitouch), magnetic ink and optical character recognition devices, pen-based instruments, digital scanners, sensors, audio input devices, and radio-frequency identification devices. * Output devices: Display monitors, printers, and audio output devices. • List and describes the various type of computers available to businesses today. * Mainframes are a large-capacity, high-performance computer that can process large amounts of data very rapidly. * Midrange computers are servers computers are specifically optimized to support a computer network, enabling users to share files...

Words: 3229 - Pages: 13

Premium Essay

Bis220 Week 2 Lta

...220 This paper meets the requirements for this assignment. Collaborate with your learning team to discuss the previous week’s objectives Discuss what you learned, that could be applicable to your workplace or personal life and how your knowledge has increased as a result of what you experienced through the learning activities in the previous week Submit your team summary of the discussion in a 1-to 2-page Microsoft Word document. 1.1 Explain the benefits of information systems in the work environment. 1.2 Describe ethical issues related to information technology. 1.3 Use word processing tools to communicate business objectives 1.1 Benefits of information systems in the work environment. Information systems are intended for information. Information stored such as data and knowledge. Records of data such as employees’ hours, student grades, and student identification numbers are known as information systems. Knowledge is data and information that has been organized together. For example a student’s name along with the GPA is an organized data with information, which is easy to organize in a category for students with a GPA over 3.0. An information system supports business in working more precise, efficient, organized, and maximize productivity. Businesses have an electronic storage system to protect companies’ important information saved and secured. Information that is protected can be accessed by certain users in the company and IT has the control and protection...

Words: 1067 - Pages: 5

Premium Essay

Technology Effects on Children

...changing with the utilization of technology. Some creative software and other word processing softwares support children with the expressive types of writing. Multimedia platform permits children to compose anything with a PC while likewise expanding their inspiration to writing. Corrections onscreen permit students to alter their work and go from a draft to a last composed item easily (Hawkins, 2010). With the use of word processing softwares like the Microsoft word, students can overcome issues with manual print production, in this way staying away from challenges experienced by a few students when writing with pencils or other manual articles. Another advantage of utilizing technology to suppose the art of writing is the use of keyboard (Hawkins, 2010). Using a keyboard prevents troubles for the students who have issues with fine motor abilities that would ordinarily be experienced while physically composing with pencils, pastels or markers (Hawkins, 2010). They additionally examine how word processing can make the progressions of the writing procedure simpler by means of conceptualizing, drafting, altering and changing. Word processing takes into consideration features like simple removal or insertion of words, paragraphs and sentences (Hawkins, 2010). The use of technology has affected writing by offering features in the word processing like the grammar and spelling checker tools, the copy, cut and paste tool and the online feedback option when composing in emails in terms of attachments...

Words: 305 - Pages: 2

Free Essay

Computer

...Computer crime involves: Theft by computer (including identity theft and phis hing) Software piracy and intellectual property misuse Software sabotage (malw are- including worms, viruses, Trojan horses, e tc.) Hacking and electronic trespassing. The computer crime dossier Computer crime: any crime accomplished through knowledge or use of computer technology Businesses and government institutions lose billions of dollars every year to computer criminals The majority of crimes is committed by company insiders Typically covered up or not reported to authorities to avoid embarrassment According to a 2001 survey of over 500 companies and government agencies: 85% detected computer security breaches in the preceding 12 months Financial losses due to security breaches topped $377 million 70% reported that Internet connections were frequent points of attack Only 31% said that internal systems were frequent points of attack. Theft by computer Theft is the most common form of computer crime. Computers are used to steal Money Goods Information Computer resources One common type of computer theft today is the actual theft of computers, such as notebook and PDAs Notebook and PDAs are expensive Data stored on a computer can be more valuable Denial o f Service ( DOS) Attacks bombard servers and Web sites with so much bogus traffic that they are effectively shut down networks, denying service to legitimate customers and clients. Computer security Protecting computer systems...

Words: 7438 - Pages: 30

Premium Essay

Phhonological Analysis: Levels Of Natural Language Processing

...Chapter 1: Introduction Natural Language Processing Natural Language Processing (NLP) is the computerized approach to analyzing text that is based on both a set of theories and a set of technologies. And, being a very active area of research and development, there is not a single agreed-upon definition that would satisfy everyone, but there are some aspects, which would be part of any knowledgeable person’s definition. Several elements of this definition can be further detailed. Firstly the imprecise notion of ‘range of computational techniques’ is necessary because there are multiple methods or techniques from which to choose to accomplish a particular type of language analysis. ‘Naturally occurring texts’ can be of any language, mode, genre,...

Words: 1945 - Pages: 8