Upload
edwina-hunter
View
213
Download
0
Tags:
Embed Size (px)
Citation preview
3
Desktop Publishing Software• Is used for composition, layout, editing and
formatting of a document• Can include:
– text– graphics and pictures– templates for letters, calendars and
publications
4
Writing & Desktop Publishing Software
• Programs to use include:– Microsoft® Word ®
– Microsoft® Publisher ®
– Adobe® InDesign®
• Popular uses include:– letters– newsletters– calendars– reports and essays– brochures and fliers
6
Presentation Applications• Are used to display information, usually in
the form of a slideshow• Programs to use include:
– Microsoft® PowerPoint®
– Prezi Pro®
– Corel® Presentations
• Popular uses include:– business and educational presentations– photo slideshows
8
Presentation Application Tips• Include the following:
– limit the amount of text on one slide– use bullets to organize information– font size should be at least 24 point– avoid hard to read fonts and colors
10
Spreadsheet Applications• Are a screen-oriented interactive program
enabling a user to lay out data on screen– rectangular table (or grid) of information, often
financial data
• Programs to use include:– Microsoft® Excel®
– KSpread®
– OpenOffice Calc®
– Abykus®
11
Spreadsheet Applications• Popular uses include:
– calculating financial information– organizing numerical and textual data– creating charts and graphs
• Tips and features include:– automatic calculations using formulas– combine spreadsheets into a workbook– auto-fill function recognizes patterns in the
spreadsheet
12
Database Applications• Are like an electronic filing cabinet• Are a processing system in which data can
be stored, manipulated, reported and managed
• Programs to use include:– Microsoft® Access®
– MySQL®
– Oracle®
13
Database Applications• Popular uses include:
– reports and data collection– address books– reservation systems– customer, payroll and employee information– sales and order tracking
14
Database Applications• Tips include:
– sketch your database relationships on paper before creating
– keep track of the relationships between various parts of the database
– integrate formulas to calculate data with ease
• Features include:– grouping, sorting and arranging various types of data
– creating multiple reports using the same data
– compiling mail merge documents
15
Collaborative & Groupware Applications
• Allow multiple users to work on related tasks at the same time
• Provide an avenue to help users coordinate and keep track of ongoing projects together
• Programs to use include:– Lotus® Notes– Microsoft® SharePoint®
16
Collaborative & Groupware Applications
• Popular uses include:– organizing calendars and schedules– databases– reference libraries
• Tips and features include:– allow teams to work on same project from any
location– document sharing– extension to clients, suppliers, etc.
17
Operating System Applications
• Are software designed to control the hardware of a computer in order to allow users and application programs to make use of it
• Programs to use include:– Microsoft® Windows®
– Mac® OS– Linux®
18
E-Mail Applications• Include the following computer-based
programs:– Microsoft® Outlook®
– Windows® Live Mail– Mozilla® Thunderbird
• Web browsers may also substitute for the mail client, such as:– Gmail®
– Hotmail®
– Yahoo®
19
Netiquette• Is etiquette or proper behavior in the electronic
environment• Violations include:
– sending an immediate, angry overreaction to an e-mail message
– typing a message in all capital letters– forwarding personal messages without permission– sending a personal message to an entire list of
contacts– sending e-mail messages criticizing others– using emoticons – typed symbols to indicate facial
expressions – in business e-mail
20
E-Mail Privacy• Courts have upheld the right of corporations
to review the e-mail of employees who use company resources to compose and send e-mail messages, such as:– hardware– software– time
• Employees should be sensible in their use of e-mail– do not put in electronic writing anything you would
not want publicly distributed
21
E-Mail Privacy Policies• Have been implemented by many
organizations• Should clearly define an employer’s
expectations about how e-mail should be used by employees
• Should outline conditions for when personal e-mail is acceptable
22
E-Mail Issues• Include the following:
– spam: unsolicited commercial e-mail• uses an inexpensive Internet connection
– worms and viruses• use e-mail as a way of reaching vulnerable
computers
23
E-Mail Issues• Also include the following:
– phishing: an e-mail falsely claiming to be an established legitimate business
• attempts to scam the user into providing private information which will be sued for identity theft
• directs the user to visit a bogus website• asks the user to update personal information the
real organization already has, such as:– passwords– credit card information– social security number– bank account number