Mail Merge: Lesson 50 Application Software: Advanced Features of Word Processing
Mail Merge: Lesson 50 Application Software: Advanced Features of Word Processing
LESSON 50
APPLICATION SOFTWARE: ADVANCED FEATURES OF WORD
PROCESSING
MAIL MERGE
Mail merge is a powerful feature of word processing
software. If you need to create numerous documents
that are similar but require at least a modicum of
personalisation, learning to use the mail merge feature
in word processing will save you a lot of time.
Mail merge can be used to create any type of printed documents, as well as
electronically distributed documents and faxes.
Here are some examples that can be created with mail merge:
• Catalogues
• Invoices
• Labels
• Envelopes
• Form letters
• Certificates
When used wisely, mail merge will greatly improve your productivity.
115
Ramadan, SMK Pekan 2006
11.Select the sheets you want to use and click OK. Select the record you
want to merge and click OK.
12.Click Next.
13.In the Mail Merge task pane, click More items.
14.An insert Merge Field dialog box is displayed. Insert the field you want
in your labels. Click close.
15.Arrange your merge field as desired, click Update all labels, click next,
preview your labels.
16.The first page of your label will merge for you for your preview. Click
next to complete the merge.
17.Click Edit individual labels to view all the labels and make any custom
edits that are needed.
DROP CAP
A drop cap allows you to offset the first letter of the
sentences or paragraph. It is basically the first letter
of the first word of a paragraph displayed in a large
font which can add a touch o style or class to a
document.
WATERMARK
A watermark is any text or graphic image that is
printed to overlap the existing text in a document,
either in the background or foreground. For example,
the word “Draft” printed lightly behind the text can be
considered as a watermark. It adds to the general
design without preventing readers from seeing the
text above it.
116
Ramadan, SMK Pekan 2006
How to : Watermark
1. Start Microsoft Word.
2. From the menu bar, click at Format, point to Background and then click
Printed Watermark.
3. To insert text watermark, in the Text box, type My Watermark, choose
Century Gothic for the font. Click Auto for the size and choose the
colour.
4. Click to select the Semitransparent check box (default setting) then
click the Diagonal option next to Layout.
5. Click OK. The watermark that you have just created is now visible on
the document sheet.
MICROSOFT EQUATION
The Microsoft Equation is a tool in Microsoft Word
that will allow you to easily create complex equation
on your computer. When you create an equation, it
becomes embedded in the word document.
117
Ramadan, SMK Pekan 2006
21.On the summation Template button. Select the summation format with
upper and lower limit option.
22.Fill the dotted box for upper and lower limits with the corresponding
values.
23.Use the arrow keys to move to the different places of the summation
to type in the characters.
24.To exit the Microsoft Equation, click outside the shaded box.
LESSON 51
APPLICATION SOFTWARE: ADVANCED FEATURES OF
SPREADSHEET SOFTWARE
Most spreadsheet software has advanced features to allow you to work more
productively. For example:
• macro
• lookup
• protection
• pivot table
118
Ramadan, SMK Pekan 2006
MACRO
Macro is a sequence of keystrokes and instructions
that are recorded and saved. Microsoft Excel is an
example of a program that allows you to create
macros. You can set whether to run the macro by
using a new button in the toolbar or a shortcut key
such as CTRL+D, ALT+H or CTRL+ALT+S.
Macros can automate complex tasks and reduce the number of steps
required to complete tasks that you perform frequently.
LOOKUP
One of the more powerful functions available in
spreadsheet is the Lookup function. This allows you to
take any value entered, find it in a designated table,
and then return a value from that same table. It is
very practical, for example, if you wish to look up a
student's name by typing in the identification number
or MyKad number.
PROTECTION
Spreadsheet has a protection feature that allows you
to protect your information from being lost. Once a
worksheet or workbook is protected no information
can be modified or erased until the spreadsheet has
been unprotected.
This feature is very useful when you share spreadsheets with others. It’s
often important to make sure that the spreadsheet is protected from
changes.Microsoft Excel provides a feature called "Protection" that allows you
to ensure that nothing on your spreadsheet gets changed accidentally.
PIVOT TABLE
Spreadsheet has a feature that allows users to
summarise and simplify tasks that contain a lengthy list
using complex criteria. This feature is called Pivot Table.
A complex criterion refers to each column of field in
source data that summarises multiple rows of
information. A Pivot Table is a hidden reporting tool that
can sort and sum large amounts of data in lists and
tables.
119
Ramadan, SMK Pekan 2006
COMPARISON BETWEEN MICROSOFT EXCEL XP AND
OPENOFFICE CALC 2.0
As with Microsoft Word and OpenOffice Writer, comparison between Microsoft
Excel and OpenOffice Calc is not an easy task. Firstly, the former’s license
needs to be bought while spreadsheet software licensing for OpenOffice Calc
is absolutely free.
Often we find features which are better in one or the other. Each new version
will definitely have some improvements upon features that will make each
one better.
LESSON 52
APPLICATION SOFTWARE: ADVANCED FEATURES OF
PRESENTATION
Presentation software allows users to combine text, photos, clip art, graphs,
animation, sound and even video into a series of electronic slides like those
shown on the screen. Most presentation software has advanced features to
make your presentation more effective. For example:
• organisation chart
• rehearse timing
• PowerPoint show
• photo album
ORGANISATION CHART
Organisational charts are a great way to relate certain
topics together. They can be used to visually show:
• An organisation’s structure
• A flow of logical steps of a project
• A family tree
REHEARSE TIMING
Sometimes, however, people may not know how long
each slide should be displayed. PowerPoint allows you
to rehearse the timings. It will run the slide show on
manual and begin recording times. When you are
done, it can place those times in the presentation for
you.
POWERPOINT SHOW
You can save your presentation as a Powerpoint
Show(.pps) file so that your presentation will open
straight into screen show mode.
PHOTO ALBUM
PowerPoint's Photo Album feature allows you to insert
several photos quickly and edit your "album" once the
images have been placed.
122
Ramadan, SMK Pekan 2006
LESSON 53
APPLICATION SOFTWARE: GRAPHICS EDITING
CROP
In graphics software, the crop tool is used for cropping
or cutting pictures down to size. The required area is
selected using the crop tool, then the crop is applied
to leave just the selected area.
123
Ramadan, SMK Pekan 2006
PHOTO ENHANCE
Enhancing Pictures allows you to add new and exciting
effects to your pictures to make them better. Photo
enhancements include:
• cropping
• changing background
• combining elements from two or more pictures.
• Adding or removing colour.
• Adjusting or modifying colours and size.
• Adding other special effects like borders and spotlight.
Photoshop has an easy to use desktop and user interface. The look of the
GIMP is similar to Photoshop. Both employ toolboxes with understandable
symbols. And thus, the GIMP is as easy to use as Photoshop. The GIMP is
comparable to Photoshop with actual photo editing and image manipulation
tools. For example:
• drawing tools
• cropping tools
• colour correction tools
• image enhancement tools
• layers
• channels
• gradient editor
• transparencies
However, the GIMP does not have all the features like “path” and “actions”,
that Photoshop has.
LESSON 54
TYPES AND USAGES OF UTILITY PROGRAMS
124
Ramadan, SMK Pekan 2006
FILE MANAGER
File manager is the software used to manage files on a
disk. It provides functions to delete, copy. move,
rename and view files as well as create and manage
folders (directories).
File manager performs tasks of formatting and copying disks, displaying a list
of files on a storage medium, checking the amount of used or free space on a
storage medium, organising, copying, renaming, deleting, moving and
sorting files and also creating shortcuts.
DIAGNOSTIC UTILITY
A diagnostic utility compiles technical information
about a computer's hardware and certain system
software programs and then prepares a report
outlining any identified problems.Information in the
report assists technical support staff in remedying any
problems.
DISK DEFRAGMENTER
When an operating system stores data on a disk, it
places the data in the first available sector on the disk.
It attempts to place data in sectors that are
contiguous but this is not always possible. When the
contents of a file are scattered across two or more
non-contiguous sectors, the file is fragmented.
The process of defragmentation is the reorganising of the disk so the files are
stored in contiguous sectors. A fragmented disk has many files stored in non-
contiguous sectors. Defragmenting reorganises the files so they are located
in contiguous sectors, which speeds access time.
125
Ramadan, SMK Pekan 2006
LESSON 55
MORE TYPES AND USAGES OF UTILITY PROGRAMS
BACKUP UTILITY
Backup utility allows users to copy or back up,
selected files or an entire hard disk to another storage
medium.
Why is it important?
The program allows the user to retrieve data if the
hard drive fails and there are no more programs or
files that can function.
DATA RECOVERY
A data recovery utility is used to restore the data that
has been physically damage or corrupted. Data can be
damaged by viruses, bad software, hardware failure
and power fluctuations that occur while data is being
written or recorded.
126
Ramadan, SMK Pekan 2006
VIRUS PROTECTION
It is essential that you install antivirus software.
Antivirus software is a utility program that scan the
hard disks, floppy disks and memory to detect viruses.
Virus Signature
A virus signature or virus definition is known as a specific pattern of a virus
code.
Quarantines
Keeping a virus away because it is dangerous.
DATA COMPRESSION
Data compression utility is a utility that removes
redundant elements, gaps and unnecessary data from a
computer’s storage space so that less space is required
to store or transmit data. With the increasing use of
large graphics, sound, and video files, data compression
is necessary both to reduce the time required and to
reduce the time required to transmit such large files
over a network.
Compressed files are sometimes called zipped files because they usually
have a .ZIP extension. A compressed file must be unzipped or restored to its
original form before being used. Two popular file compression utilities are
PKZIP and WinZip.
127
Ramadan, SMK Pekan 2006
Both windows and the applications you run create temp files needed only for
a small tasks and system restore after certain types of system problems.
These files are stores in the Temp folder.
LESSON 56
PROPRIETARY AND OPEN SOURCE SOFTWARE
PROPRIETARY SOFTWARE
Proprietary software is also called closed source
software. The closed source software or proprietary
software offers a stable system with support if the
software fails or malfunctions.
128
Ramadan, SMK Pekan 2006
COMPARISON
LESSON 57
ADVANTAGES AND DISADVANTAGES OF PROPRIETARY
SOFTWARE
130
Ramadan, SMK Pekan 2006
• Customising the software is nearly impossible because when users buy
proprietary software will receive binary version of the program, not the
code as the code is the maufacturer’s trade secret.
LESSON 58
ADVANTAGES AND DISADVANTAGES OF OPEN SOURCE
SOFTWARE
In addition to the basic operating system, Linux also includes many free
utility programs.Users can obtain Linux in a variety of ways. Some download
it free from the web. Others purchase it from vendors for a minimal fee.
There are also open source browsers such as Firefox and open source image
editor – the GIMP. The GIMP is very reliable and cost effective for normal
users who do not need extra features offered in other graphics software such
as Adobe Photoshop.
• The source code are available to users and they have the rights to
modify them.
• This will allow improvements to the software without having to invest
large sum of money in research and development.
• The modified and improved source codes can be freely redistributed.
The software can be used in any way and for any legal purposes. There is no
restriction in a unilateral way on how the software could be used.
131
Ramadan, SMK Pekan 2006
Since nobody in particular is responsible for the codes, there is no exact
knowledge and assurance on when the codes are going to be fixed if there a
bugs in it.Thus, users will have to use the problematic software until
someone rectifies the problem.
Open source usually comes without warranty and after sales support should
the software fail or malfunction. This is because the software usually
distributed free of charge or sold for very minimal fees.
LESSON 59
PC PRE-ASSEMBLING
These components are made of metal with sharp edges. You may cut your
finger if you are not careful. When handling computer components like
motherboards, video cards, memory, or even a hard drive, it is important to
hold them by the edges. Our fingers would not come in contact with any
conductors, thus decreasing the chance of causing any electro static
discharge (ESD) damage.
132
Ramadan, SMK Pekan 2006
LESSON 60
PC ASSEMBLING
TYPES OF MOTHERBOARDS
There are several types of motherboards in the market
based on what type of processor we are going to use.
For example if you have an Intel Pentium 4 or Intel
Celeron processor, you can use a Gigabyte or an MSI
motherboard, which are well known locally, or you can
also use an Intel motherboard. If you decided to have
an AMD K8 processor, you can use a Gigabyte or an
MSI motherboard.
Place the CPU into the ZIF socket. Make sure pin
number one is placed correctly.
133
Ramadan, SMK Pekan 2006
134
Ramadan, SMK Pekan 2006
135
Ramadan, SMK Pekan 2006
136
Ramadan, SMK Pekan 2006
137
Ramadan, SMK Pekan 2006
LESSON 61
BIOS SETUP
138
Ramadan, SMK Pekan 2006
139
Ramadan, SMK Pekan 2006
ADVANCED MENU
Peripheral configuration
Use this screen to turn on or off the serial and
parallel ports, plus to change more specific
configuration.
Drive Configuration
If you were to install a new hard drive you would
want to check here to make sure the setting are
noted.
Floppy Configuration
Should you install new floppy disk drive, you might
need to modify certain setting here.
USB Configuration
USB or Universal Serial Bus ports provide fast
connection with peripheral devices such as a mouse.
POWER MENU
The Advanced Configuration and Power Interface
(ACPI) settings enable you to dictate ho much system
resources are allocated to each peripheral device. If
not in use, a PC can shut down a device, saving
system resources.
You may also turn on and off the “after power failure” type setting, which
determines how your system reacts in the event of a power failure.
140
Ramadan, SMK Pekan 2006
BOOT MENU
You may configure the boot sequence in the boot
menu. This boot menu controls the order of the
devices from which the BIOS will load the operating
system.
EXIT MENU
Your BIOS probably contains an Exit screen that gives
you a safe way to leave the firmware. You can save
your changes in the Complementary Metal Oxide
Semiconductor (CMOS) and exit the BIOS or cancel
the changes.
Some BIOS come with another built-in safety feature. If you choose to exit
BIOS by pressing the ESC button, you will be asked whether you want to
discard changes before exiting.Look for the instruction to save the changes in
CMOS. In this case, type ‘F10’ and choose ‘Yes’ (Y) to save changes and exit
the BIOS.
LESSON 62
HARD DISK PARTITIONING AND FORMATTING
We create partitions on the hard disk for different purposes. For example:
• Data
• Games
• Backups
WHY PARTITION?
Disk partitioning is the process of dividing and
organising a disk into different specific sections.
141
Ramadan, SMK Pekan 2006
Increases Security
Encryption is one of the methods of protecting critical
data fro theft or corruption, but it slows down the
computer performance. By partitioning the disk, you
can encrypt only those partitions that need protection,
and other parts of your system will run unencrypted
and hence faster.
Organises Information
By partitioning a disk, you can organise your data
logically. The data is arranged in categories according
to different functions or objectives.
Increases Productivity
Partitioning a disk can increase productivity. You will
save time searching for a particular file and may
complete some useful tasks.
142
Ramadan, SMK Pekan 2006
Follow the instruction, when you get the message to ‘press any key to boot
from CD’. Once the boot from CD-ROM has started, it will display at the top
of the screen : Setup is inspecting your computer's hardware configuration.
After a brief delay, the Microsoft “Windows Setup” installation screen is
displayed. “Setup is loading files”, means it is loading all types of device
drivers.”
It will finally state: "Setup is starting Windows" and will display after a short
delay the "Windows XP Professional Setup" screen. Select "to set up
Windows XP now" and press the ENTER key.
143
Ramadan, SMK Pekan 2006
Now, a partition is created. Select the partition and press Enter to set up
Windows XP on the selected partition. Choose a desired format either using
NTFS or FAT for the partition. Click ENTER on the chosen format.
After the restart, Windows XP starts the first time with the graphical user
interface. Setup will continue to copy files and to install the OS.
LESSON 63
INSTALLING THE OPERATING SYSTEM
144
Ramadan, SMK Pekan 2006
LESSON 64
INSTALLING AN APPLICATION SOFTWARE
INSTALLING MS OFFICE XP
In this session, you will be guided through the
installation of Microsoft Office XP. Check
minimum hardware and system requirements:
• Windows 98
• 133 MHz Processor
• 24 MB RAM
145
Ramadan, SMK Pekan 2006
• 245 MB of available hard disk space
146
Ramadan, SMK Pekan 2006
LESSON 65
INSTALLING A UTILITY PROGRAM
147
Ramadan, SMK Pekan 2006
LESSON 66
PERVASIVE COMPUTING
It is about the ability to deliver any information to any device over any
network. In short, it is about computers everywhere where computers are
embedded into equipments, machines, furniture or people. The current
technology has evolved into embedded, networked and wireless.
Ubiquitous
A synonym of the word ‘pervasive’, meaning things that seem to be
everywhere.
148
Ramadan, SMK Pekan 2006
Calm Technology
In computing, calm technology aims to reduce the "excitement" of
information overload by letting the user select what information is at the
center of their attention and what information is peripheral. The term was
coined by Mark Weiser, chief technologist, and John Seeley Brown, director of
the Xerox Palo Alto Research Lab. In the coming age of ubiquitous computing
in which technology will become at once pervasive yet invisible, Weiser and
Brown foresee the need for design principles and methods that enable users
to sense and control what immediately interests them while retaining
peripheral awareness of other information possibilities that they can at any
time choose to focus on. Calm technology, they envision, will not only relax
the user but, by moving unneeded information to the edge of an interface,
allow more information to exist there, ready for selection when needed.
PERVASIVE COMPUTING
Pervasive computing devices are not personal
computers, but very tiny - even invisible - devices,
either mobile or embedded in almost any type of
object imaginable, including cars, tools, appliances,
clothing and various consumer goods - all
communicating through interconnected networks.
149
Ramadan, SMK Pekan 2006
EXAMPLE OF PERVASIVE COMPUTING
This is an example of pervasive computing in our daily lives which is the
automatic Touch 'n Go SmartTAG toll gate.
150