Download presentation
Presentation is loading. Please wait.
Published byEdwina Hunter Modified over 9 years ago
1
1
2
What is desktop publishing software used for? 2
3
Is used for composition, layout, editing and formatting of a document Can include: –text –graphics and pictures –templates for letters, calendars and publications 3
4
Programs to use include: –Microsoft ® Word ® –Microsoft ® Publisher ® –Adobe ® InDesign ® Popular uses include: –letters –newsletters –calendars –reports and essays –brochures and fliers 4
5
What are presentation applications used for? 5
6
Are used to display information, usually in the form of a slideshow Programs to use include: –Microsoft ® PowerPoint ® –Prezi Pro ® –Corel ® Presentations Popular uses include: –business and educational presentations –photo slideshows 6
7
What should you remember when creating a presentation? 7
8
Include the following: –limit the amount of text on one slide –use bullets to organize information –font size should be at least 24 point –avoid hard to read fonts and colors 8
9
What are the examples of spreadsheet applications? 9
10
Are a screen-oriented interactive program enabling a user to lay out data on screen –rectangular table (or grid) of information, often financial data Programs to use include: –Microsoft ® Excel ® –KSpread ® –OpenOffice Calc ® –Abykus ® 10
11
Popular uses include: –calculating financial information –organizing numerical and textual data –creating charts and graphs Tips and features include: –automatic calculations using formulas –combine spreadsheets into a workbook –auto-fill function recognizes patterns in the spreadsheet 11
12
Are like an electronic filing cabinet Are a processing system in which data can be stored, manipulated, reported and managed Programs to use include: –Microsoft ® Access ® –MySQL ® –Oracle ® 12
13
Popular uses include: –reports and data collection –address books –reservation systems –customer, payroll and employee information –sales and order tracking 13
14
Tips include: –sketch your database relationships on paper before creating –keep track of the relationships between various parts of the database –integrate formulas to calculate data with ease Features include: –grouping, sorting and arranging various types of data –creating multiple reports using the same data –compiling mail merge documents 14
15
Allow multiple users to work on related tasks at the same time Provide an avenue to help users coordinate and keep track of ongoing projects together Programs to use include: –Lotus ® Notes –Microsoft ® SharePoint ® 15
16
Popular uses include: –organizing calendars and schedules –databases –reference libraries Tips and features include: –allow teams to work on same project from any location –document sharing –extension to clients, suppliers, etc. 16
17
Are software designed to control the hardware of a computer in order to allow users and application programs to make use of it Programs to use include: –Microsoft ® Windows ® –Mac ® OS –Linux ® 17
18
Include the following computer-based programs: –Microsoft ® Outlook ® –Windows ® Live Mail –Mozilla ® Thunderbird Web browsers may also substitute for the mail client, such as: –Gmail ® –Hotmail ® –Yahoo ® 18
19
Is etiquette or proper behavior in the electronic environment Violations include: –sending an immediate, angry overreaction to an e-mail message –typing a message in all capital letters –forwarding personal messages without permission –sending a personal message to an entire list of contacts –sending e-mail messages criticizing others –using emoticons – typed symbols to indicate facial expressions – in business e-mail 19
20
Courts have upheld the right of corporations to review the e-mail of employees who use company resources to compose and send e- mail messages, such as: –hardware –software –time Employees should be sensible in their use of e-mail –do not put in electronic writing anything you would not want publicly distributed 20
21
Have been implemented by many organizations Should clearly define an employer’s expectations about how e-mail should be used by employees Should outline conditions for when personal e-mail is acceptable 21
22
Include the following: –spam: unsolicited commercial e-mail uses an inexpensive Internet connection –worms and viruses use e-mail as a way of reaching vulnerable computers 22
23
Also include the following: –phishing: an e-mail falsely claiming to be an established legitimate business attempts to scam the user into providing private information which will be sued for identity theft directs the user to visit a bogus website asks the user to update personal information the real organization already has, such as: –passwords –credit card information –social security number –bank account number 23
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.