...Tricks * By typing Alt+x you can quickly add the Unicode character into your document. * Highlight any block of text and then press F2, now place the cursor at the spot where ever you wish to move that text and press enter. * If you are working on an extensive document in MS WORD, you can press F5+Shift keyboard shortcut to cycle through the spots hat you edited most freshly. * You can select rectangular blocks of text in a word document and apply formatting to the selected part. Hold down the ALT key and drag the mouse to select any rectangular area you want to. * Select some text in the WORD and then press SHIFT+F3 to promptly change the case of the selection. * You can triple click anywhere in the paragraph to select the entire paragraph in the WORD. Press CTRL key and click anywhere in the sentence to select that entire sentence. * You can write anywhere on the page, all you need to do is just double click anywhere on the document and start writing. * Word has a feature known as Spike that is used to move images and text from several locations in a document and paste them all at once to a different location. To use this feature Spike, select any text or image in the document and then press CTRL+F3 to move that selection to the spike. * To convert into a plain text, just select block and press Ctrl+Spacebar and the text will be changed into plain text. * You can write math expression in your document, highlight that and press calculator...
Words: 279 - Pages: 2
...Part 1- Specifications Table (MS Word) Case Study- Director’s Request for PCs Please use the document “Case Study Instructions Director’s Request for PCs” found in the Case Study Instructions conference topic for the list of requirements which should be met by this project. Part 1: For the case study outlines in the Instructions topic, create MS Word tables that identify and contain the hardware and software requirements to meet the director's requirements. The MS Word document in its final form will include 5 MS Word tables. It will include a two-paragraph narrative summary that classifies the user type and identifies the PC category(ies) that will be recommended. Think of the narrative summary as an executive summary where you outline the recommendations without going into a great deal of detail. You will write this executive summary after you have completed the tables. But place the executive summary after your title page, BEFORE the 5 tables. Students are expected to conduct external research to adequately address all aspects of the assignment requirements. Any outside sources should be correctly cited in APA style at the end of the table. Students will need to include specific requirements from the case study to show why each item is being recommended. Each element listed below must be incorporated into the assignment. Omissions will result in loss of points. |Requirement |Points Allocated |Comments...
Words: 952 - Pages: 4
...or if you cannot open the document, go to method 2. Back to the top Method 2: Check other documents and programs Sometimes, this behavior may be caused by factors other than document damage. To eliminate these other factors, follow these steps: Look for similar behavior in other documents. Look for similar behavior in other 2007 Microsoft Office programs or 2010 Microsoft Office programs. If any of these steps indicate that the problem is not in the document, you will then have to troubleshoot Word 2007 or Word 2010, the 2007 Office suite, the 2010 Office suite, or the operating system that is running on the computer. Back to the top Troubleshooting steps to try if you can open the damaged document Method 1: Change the template that is used by the document Step 1: Determine the template that is used by the document Open the problem document in Word. In Word 2007, click the Microsoft Office Button, and then click Options. In Word 2010, click File on the Ribbon, and then click Options. Click Add-Ins. In the Manage box, click Templates under View and manage Office add-ins Click Go. The Document template box will list the template that is...
Words: 3477 - Pages: 14
...ENGINE COOLING SYSTEM B ENGINE A SECTION CO ENGINE COOLING SYSTEM C D CONTENTS APPLICATION NOTICE ............................................. 2 . How to Check Vehicle Type .................................... 2 . PRECAUTIONS ......................................................... 3 . Precautions for Supplemental Restraint System (SRS) “AIR BAG” and “SEAT BELT PRE-TENSIONER” ................................................................. 3 . Precautions for Liquid Gasket ................................. 3 . REMOVAL OF LIQUID GASKET SEALING ......... 3 . LIQUID GASKET APPLICATION PROCEDURE 3 ..... PREPARATION .......................................................... 5 . Special Service Tools .............................................. 5 . Commercial Service Tools ....................................... 6 . OVERHEATING CAUSE ANALYSIS ......................... 7 . Troubleshooting Chart ............................................. 7 . COOLING SYSTEM ................................................... 9 . Cooling Circuit ......................................................... 9 . . System Chart ........................................................ 10 ENGINE COOLANT ..................................................11 . Inspection ...............................................................11 . LEVEL CHECK ...................................................11 . LEAK CHECK .....................................................11 . Changing Engine...
Words: 6160 - Pages: 25
...Situation 1: Identify a general approach for facilitating the customer over the telephone. What are the possible challenges in the given situation? What strategies would help you overcome the challenges? My general approach to this situation would be to ensure that I understand exactly what the user is intending to do, and what version of Excel they are using. A possible challenge to this situation is that the customer wants to use a program that is completely new to him. To overcome this challenge, I will speak to the customer slowly so that they can understand the basics of Exel. If causes to the problem or question described by the customer are unclear in the situation, explain how you would further diagnose the problem or question. I would go over each step that the customer wants to learn, and offer to send them an email with step-by-step instructions on what he needs to do. Once the causes are identified, describe a step-by-step troubleshooting process to help the customer complete the task. -I would ask the customer to gather all of the receipts and expense logs. -Have the customer fill in all the required fields on the spreadsheet that pertain to the company. -Total the amounts -Calculate hard copy expense report and or receipts. -Check all of the information entered If the customer has problems understanding or following your instructions, briefly explain an alternative situation. If the customer is still having problems...
Words: 279 - Pages: 2
...LESSON 2 BASIC COMMANDS IN LINUX AND WINDOWS LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS “License for Use” Information The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a public institution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license including college classes, university classes, trade-school classes, summer or computer camps, and similar. To purchase a license, visit the LICENSE section of the Hacker Highschool web page at www.hackerhighschool.org/license. The HHS Project is a learning tool and as with any learning tool, the instruction is the influence of the instructor and not the tool. ISECOM cannot accept responsibility for how any information herein is applied or abused. The HHS Project is an open community effort and if you find value in this project, we do ask you support us through the purchase of a license, a donation, or sponsorship. All works copyright ISECOM, 2004. 2 LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS Table of Contents “License for Use” Information....................
Words: 2543 - Pages: 11
... 10 out of 10 points | | | A multi-tasking operating system is capable of executing more than one program at a time for a user.Answer | | | | | Selected Answer: | True | Correct Answer: | True | | | | | Question 2 10 out of 10 points | | | ASCII code is one of the code schemes used to represent characters in a byte.Answer | | | | | Selected Answer: | True | Correct Answer: | True | | | | | Question 3 10 out of 10 points | | | Operating systemAnswer | | | | | Selected Answer: | d. all of the above | Correct Answer: | d. all of the above | | | | | Question 4 10 out of 10 points | | | About 95 percent of the UNIX operating system is written in C language.Answer | | | | | Selected Answer: | True | Correct Answer: | True | | | | | Question 5 10 out of 10 points | | | The two major versions of the UNIX operating system are AT&T's UNIX version V and Berkeley UNIX.Answer | | | | | Selected Answer: | True | Correct Answer: | True | | | | | Question 6 10 out of 10 points | | | You must login to use the system. It means that, in response to prompts you type your user Id and password.Answer | | | | | Selected Answer: | True | Correct Answer: | True | | | | | Question 7 10 out of 10 points | | | You can change your password as many times as you wish.Answer | |...
Words: 285 - Pages: 2
...Dhaka Passing Year : 2006 Degree : HSC GPA : A+ Institution : Mirpur Girls’ Ideal Laboratory Institute. Board : Dhaka Passing Year : 2008 Degree : B.Sc in Economics Result : Appeared Institution : Jahangirnagar University Passing Year : Appeared. Additionald Courses In Honours Level: • English • State and Politics • Bangladesh: History, Society & Culture • Computer Fundamentals Language Proficiency: Bengali: Excellent in speaking, reading and writing. English: Excellent in speaking, reading and writing. Computer Skills: • Proficient in computer assembling, hardware troubleshooting and maintenance. • Operating system : Ms Dos and Windows (95, 98, XP, 07) • Microsoft Office Packages : MS-Word, MS-Excel, MS-Access, MS-Power Point. • Internet &...
Words: 385 - Pages: 2
...ZARA: IT for Fast Fashion With ZARA's fashion business expanding, Salgado and Sanchez have a critical decision to make on whether to upgrade the current, seemingly out of date IT system. Like other large clothing retailers, ZARA adopts a highly standardized business model for ordering, design, manufacturing and procurement across all product categories and regions. However, unlike most clothing retailers, ZARA's business model is based on fast delivery times with minimal inventory, decentralized decision making process and very low data integration among different stores. Unlike its competitors, Zara relies on its individual store managers and designers, rather than an elite team of senior managers, to perform market research on latest trends and decide what clothes to design and procure. ZARA's approach to Information Technology is based on its business needs. In order to establish itself as a brand, which aligns closely with customers' taste, ZARA needs to have information on latest trends from all its stores to keep pace with the ever-changing fashion world. On the other hand, ZARA's popularity and high growth requires an upgraded IT system, which can be easily replicated and scalable to new stores. ZARA's current DOS system serves this purpose efficiently as it is easy to install in a newly opened store and requires little training. ZARA's approach of simple, non-integrated low cost IT investment is well in sync with its decentralized...
Words: 1179 - Pages: 5
...According to the point of view of Salgado , Zara is getting bigger and bigger and its operating system getting more and more obsolete. Thus, it gives Zara to have a comparative advantage because for a strategic perspective. Although Zara's advantage over its competitors is not so much a result of IT leverage, the sustainability of its competitive edge might be at risk due to a lack in IT investment.The current assumption for the IT investment states about 18,000 hours. The Zara's staff devoted to IT contains about 50 people divided in several departments. So we can suppose that only 10 people are devoted to POS software and so 10 people are able to handle this project. With a brief calculation, we can figure that it would take too much time to set up this project with an internal team. That is why we are prone to think that externalize would provide a more efficient solution, completely handle by an outsourced professional team. It could be a little more expensive at short and long term that is why if we choose this option we have to integrate a training system of our staff to lower the outsourced fees. An important point is that Zara has always developed its own IT solutions and if we make it through subcontractors we are not sure that it would match with Zara values or way of doing. Zara has been used to make it alone. Thus we think that some member of the IT staff could work with subcontractors in order to lower these expenses and help them to create an It solution...
Words: 600 - Pages: 3
.... Evaluate Microsoft’s strategy in good and poor economic times. In Good Economic Times: Microsoft is the world’s most successful software company. The original mission of this company is “a computer on every desk and in every home, running Microsoft software.” Microsoft's tactic was to be a software manufacturer and make its operating system available to computer manufacturers for use in their personal computer products, and then sell the owners of PCs software to run on that operating system. The history was begins in early 1980, where Microsoft creates DOS Operating System for IBM computer. The company used this inertial success with IBM to sell software to other manufacturer, quickly making Microsoft a major player in this industry. This is one of the changes for Microsoft to grown faster with the inertial advertising efforts focused on communicating the company range products from DOS to the launch of Excel and Windows. Later in 1986, Microsoft went to public with windows operating system and Microsoft office. The strategy contribute to launch this two application is a milestone for Microsoft to future successful. After that, Microsoft found an instant success where they launch the window 3.0 which is offered an improved set of windows icons and application like file manager and program manager where still being used today. Microsoft doing a magazine advertising and received endorsement from the top computer magazine in the industry is another...
Words: 321 - Pages: 2
...LECTURE SCHEDULE 5 Operating System – Some Fundamental DOS Commands,Rules for naming files in DOS and Types of files Operating System Operating system is a set of software that controls and manages hardware and basic system operations for a computer. The operating system loads programs into the computer's memory, runs these programs, and manages peripherals like disks and printers. Example: Disk Operating System (DOS) Windows LINUX Mac UNIX Disk Operating System (DOS) • • In the 1980s or early 1990s, the operating system that shipped with most PCs was a version of the Disk Operating System (DOS) created by Microsoft: MS-DOS. MS-DOS is a disk-based, single-user, single-task and character based user interface (CUI) operating system. Goto MSDOS from Windows Operating System: Click Start Button Choose Program Choose Accessories Click Command Prompt as shown below: Or Click Start Button Choose Run Type cmd in the Open tab as shown below: Command Prompt will get displayed as shown: The DOS commands can be entered in the command prompt and executed. Some Examples of DOS commands DIR Command The dir command allows you to see the available files in the current and/or parent directories. Examples: 1. DIR Lists all files and directories in the directory that you are currently in. 2. dir /w If information on the date / time and other information on the files are not needed, then this command can be used to list just the files and directories...
Words: 1089 - Pages: 5
...INFORMATION OF 8086 WORKING WITH MS-DOS AND BIOS.... The Processing Environment The processing environment for MASM includes the processor on which your programs run, the operating system your programs use, and the aspects of the segmented architecture that influence the choice of programming models. 8086-Based Processors The 8086 “family” of processors uses segments to control data and code. The later 8086-based processors have larger instruction sets and more memory capacity, but they still support the same segmented architecture. Knowing the differences between the various 8086-based processors can help you select the appropriate target processor for your programs. The instruction set of the 8086 processor is upwardly compatible with its successors. To write code that runs on the widest number of machines, select the 8086 instruction set. By using the instruction set of a more advanced processor, you increase the capabilities and efficiency of your program, but you also reduce the number of systems on which the program can run. Processor Modes Real mode allows only one process to run at a time. The mode gets its name from the fact that addresses in real mode always correspond to real locations in memory. The MS-DOS operating system runs in real mode. Windows 3.1 operates only in protected mode, but runs MS-DOS programs in real mode or in a simulation of real mode called virtual-86 mode. In protected mode, more than one process can be active at any one time...
Words: 6814 - Pages: 28
...Learning Objectives After completing this chapter, you will be able to: 1. Define operating system. 2. Define enhancements. 3. Explain the function and purpose of OS version numbers. 4. List some of the types of system configurations. 5. Explain the need and procedure for booting the system. 6. Explain the function of disk files. 7. Explain the function of and rules for file specifications. 8. List and explain the importance of the two types of computer files. 9. Describe the function and purpose of commands. 10. Compare and contrast internal and external commands. 11. Explain the function and purpose of the DIR, VER, and CLS commands. 12. Explain the purpose of and the procedure for using the DATE and TIME commands. 13. Explain the legal and ethical ramifications of copying disks that were not purchased. 14. Explain the purpose and function of the DISKCOPY command. 15. Explain the necessary steps to end a work session. Student Outcomes 1. Identify your system configuration. 2. Boot the system. 3. Use the DIR command to display the files on the screen. 4. Use the VER command to determine which version of Windows is being used. 5. Use the CLS command to clear the screen. 6. Use the DATE and TIME commands to set or change the date and time on the computer. 7. Make a copy of a disk. 8. End a computer work session. Chapter Overview Most people who use computers are really interested in application software. They want programs that are easy to use and that help them solve specific...
Words: 73166 - Pages: 293
...While contrasting UNIX systems to Windows a few of the features discovered in UNIX incorporate: the usage of simple text for saving data; a ordered file system; UNIX manages tools for example printing equipments, mouse and keyboard and also other tools like files. The UNIX system also manages directories and procedures like files. There's only one root directory inside the UNIX operating system hierarchical tree. UNIX utilizes devices and applications via the command line in contrast to utilizing a single monolithic application which includes all the same functionality. The kernel offers services to begin and stop applications, deals with the file system that saves and arranges the computer system files and data. The kernel usually shifts data into as databases for storage and use. Both UNIX and Windows file systems are ordered and both support lengthy names as much as 255 characters. File Processing Evaluation UNIX programs that are based upon simple text files for setup use a lot of powerful devices that are utilized to process text files. Piping is widely utilized to reroute the result of one command to the input of the subsequent command. UNIX deals with most command in a consecutive order (first in first out) but the procedure may be overridden by making use of variables and alternatives (ADD). This lets commands to be installed collectively and implemented without storing all the results to an output file. UNIX utilizes commands that include: Echo - shows text...
Words: 2702 - Pages: 11