Skip to main content

Documenting A Day

   Working with Microsoft Word, PowerPoint and Excel was just the refresher that I was needing. I have worked with these platforms for years now but as we know, the less we ‘use’ it the more we ‘lose’ it. As in lose our memory for how to properly navigate each platform and take advantage of their respective features and capabilities. As such, this exercise was very much needed and I am thankful for it. Each program has their own strengths and specialties, and it ultimately boils down to what it is we are trying to do.



   Word has always been my go-to for writing papers and this makes sense because it was built with this in mind. Word is literally billed as a ‘Word processor’ computer application. This means it was designed specifically for creating formatted text. “Formatted text refers to features of a document like margins, text size, bold text, italicized text, colors, number of columns, etc,” (Vahid & Lysecky, 2019). These features come in handy to express different emotions through text. They help to draw the reader’s attention and show what parts are of more importance. For example: bolded and underlined text catches the eye and therefore holds more weight. The best scenario for using Word is for writing research papers.



   PowerPoint was designed for giving slideshow presentations. Which is to say, this platform helps to visually present information. To have various ‘slides’ of information represented in a sequential manner. Editing tools are embedded within these applications and are what allow users the ability to add formatted text, figures, and graphics. Graphics not only applies to picture files but also animation effects. The animation effects add to the overall viewing experience by giving movement to stationary elements. “Users specify a timed list of animation effects such as appearing, disappearing or changes in position within the slide,” (Vahid & Lysecky, 2019). Presentation applications also include capabilities to display the finished product to an audience. The ideal scenario for PowerPoint is when a presentation is needed, such as for a final project to exhibit what was learned throughout a given course.



   The Excel spreadsheet is the ideal application for representing all sorts of data in the form of tables and charts. The data itself can be text or numerical. The Excel spreadsheet layout is comprised of squares we call ‘cells’ that are organized into columns labeled A, B, etc. and rows labeled 1, 2, etc. (Vahid & Lysecky, 2019). Users can enter data into each cell. Users can go a step further and enter formulas into each cell, which then calculates the data. Examples include sums and averages. When the data is entered, Excel can even generate graphical charts presenting said data in a different way. The ideal scenario for Excel is to create a monthly budget, which will help show how funds are being spent and help users see how their money is being spent.


   This exercise was a great reminder for how to properly use the Word, PowerPoint and Excel applications. The directions and requirements were extremely helpful because they provided guidance and structure. Being required to use animations for example in the PowerPoint was helpful because it forced me to learn how to use that feature. In terms of my experience, using Excel was the most challenging application for me. I do not use Excel as much as Word and PowerPoint because of how precise users must be when creating and entering their data. One misstep and the entire formula is off. There is so much that Excel can do that it is almost overwhelming. Which is why having the guide was so beneficial. I was able to follow the guide step by step and found that it was straightforward and not as challenging as I previously thought. Overall, the application that was most appropriate for documentation my day would have to be Word because the prompt felt like a journal entry. Since journals are primarily based on text, that is why Word is best suited since it is a word processor.



Reference
Vahid, F., & Lysecky, S. (2019). Computing technology for all. zyBooks.

Comments

Popular posts from this blog

Network Security

    With the advent of computers and the internet, so too came the invention of harmful scams. These malicious entities have become more and more prevalent since the turn of the century and exist in various forms. From existing in different types of computer viruses, spam emails, phishing, and Denial of Service (DoS) attacks there are a multitude of ways for user’s personal information to be accessed and disseminated without knowledge or consent.               During week 3 of our course we learned about ping commands and even practiced using these to access different websites. This week’s venture into security took the concept even further by revealing how one can use ping commands in a negative and harmful way in the form of Denial of Service (DoS) attacks. These types of security breaches require no hacking of any kind, nor does it involve the installation of any type of malicious software which is also known ...

Applying Algorithmic Design & Data Structure Techniques

   This week's resource article describes an algorithm as, "a procedure that you can write as a C function or program, or any other language. An algorithm states explicitly how the data will be manipulated." (Complexity Analysis, n.d.).    The length of time a program takes to complete a given task depends on its algorithm. The algorithm deals with how data is organized and how it is accessed. The biggest considerations for creating applications are time complexity and space complexity.     With time complexity, this refers to the number of operations needed and the time it takes it takes for them to run. This is typically measured in milliseconds. Operations are typically: 'compare', 'swap', 'fetch from memory' and 'send to memory'. While each operation takes only a small amount of time; the number of operations that are necessary grow exponentially. As the list of operations grows, so too does the time it takes for them to be enacted.    ...

CPT 307: Data Structures & Algorithms - Week 1!

 Hello World! I am back in the blogosphere after several months. The present course is called "Data Structures & Algorithms" and this week's focus is centered around installing Java and reviewing object-oriented design principles.  Thankfully the instructions embedded within the course made the installation of Java and IDE (integrated development environment) NetBeans seamless. The links provided to each website were straightforward (for the most part):  NetBeans (version 16):  https://netbeans.apache.org/download/index.html Java (version 19):  https://www.oracle.com/java/technologies/downloads/ The 4 major principles of Object-Oriented Programming:  1) Encapsulation - The hiding of data implementation by restricting access to accessors and mutators. The pieces that surround the data that forms the class. An Accessor is a method that is used to ask an object about itself (Lewallen, 2005). This is typically in the form of properties. Mutators are public...