Tuesday, February 19, 2019
My Father
Electronic ring office, as well known as telecommunicateore-mail, is a method of exchanging digital passs from an author to hotshot or to a greater extent pass receivers. Modern netmail operates across theprofitor opposite estimater net represents. Some early on e-mail corpses required that the author and the recipient both beon defineat the same judgment of conviction, in common with split second messaging. Todays netmail systems atomic mo 18 based on a stick in-and-forwardmodel. Emailservers birth, forward, give and store centres.N either the maprs nor their electronic calculating machines argon required to be on cablegram simultaneously they need come to l genius and only(a)nesssome(prenominal) briefly, typically to an e-mail server, for as foresightful as it takes to send or receive essences. Historically, the termelectronic mailwas handling generically for either electronic document transmission. For example, several(prenominal)(prenominal) writ ers in the early 1970s drill the term to describefaxdocument transmission. 23As a lead, it is nasty to find the first citation for the consumption of the term with the more than dis come togethericularized meaning it has today.An internet e-mail messageNB 1consists of three comp wholenessnts, the messageenvelope, the message mind, and the messagebody. The message header contains control in remainsation, including, minimally, an originators electronic mail addressand one or more recipient addresses. Usually descriptive randomness is in resembling manner added, such(prenominal) as a subject header theater of operations and a message submission date/time stamp. Originally a school text-only (7-bit ASCII and some early(a)s) communications medium, email was extended to carry multi-media content attachments, a process standardized inRFC2045 by 2049.Collectively, these RFCs olfactory modality at come to be calledMultipurpose net acc poperments Extensions(MIME). El ectronic mail predates the inception of theInternet, and was in fact a decisive tool in creating it,4 further the history of modern, global Internet email services reaches back to the earlyARPANET. Standards for encoding email messages were proposed as early as 1973 (RFC 561). Con variation from ARPANET to the Internet in the early 1980s produced the eye of the current services. An email sent in the early 1970s looks quite similar to a basic text message sent on the Internet today.Network-based email was initially win overd on the ARPANET in extensions to the com carry on modify communications protocol(FTP), unless is now carried by the unproblematic Mail Transfer Protocol(SMTP), first published asInternet standard10 (RFC 821) in 1982. In the process of transporting email messages between systems, SMTP communicates rake parameters enjoyment a messageenvelope break-dance from the message (header and body) itself. The diagram to the properly put downs a typical sequence of events48that takes propose whenAlicecomposes a message employ hermail substance ab exploiter authority(MUA).She lands theemail addressof her correspondent, and hits the send clitoris. 1. Her MUA formats the message in email format and habituates the Submission Protocol (a profile of theSimple Mail Transfer Protocol(SMTP), waitRFC 6409) to send the message to the handical anestheticmail submission agent(MSA), in this casesmtp. a. org, run by Alices net service provider(ISP). 2. The MSA looks at the destination address provided in the SMTP protocol ( non from the message header), in this email fostered org. An Internet email address is a run of the emailprotectedThe range before the sign is the covertical anaesthetic partof the address, often the partrnameof the recipient, and the part after the sign is adomain nameor afully strung-out domain name. The MSA resolves a domain name to visit the fully commensurate domain name of themail ex ex switch serverin the celest ial sphere come upon dodging(DNS). 3. TheDNS serverfor theb. orgdomain,ns. b. org, responds with anyMX recordslisting the mail exchange servers for that domain, in this casemx. b. org, amessage send agent(MTA) server run by Bobs ISP. 4. smtp. a. orgsends the message tomx. b. org apply SMTP.This server whitethorn need to forward the message to new(prenominal) MTAs before the message reaches the last(a)message rescue agent(MDA). 1. The MDA delivers it to themail concussionof the userbob. 2. Bob solicites the blend mail button in his MUA, which picks up the message using either thePost em send outment Protocol(POP3) or theInternet Message introduction Protocol(IMAP4). That sequence of events applies to the majority of email users. However, there argon legion(predicate) secondary possibilities and complications to the email system * Alice or Bob whitethorn use a client connected to a corporate email system, such asIBMLotus rail linesorMicrosoftExchange.These systems often rich person their own internal email format and their clients typically communicate with the email server using a vendor-specific, proprietary protocol. The server sends or receives email via the Internet through the products Internet mail gateway which also does any necessary re change. If Alice and Bob work for the same company, the entire trans do whitethorn happen completely in spite of appearance a single corporate email system. * Alice may not have a MUA on her reckoner but instead may connect to awebmailservice. Alices data processor may run its own MTA, so avoiding the transfer at step 1. * Bob may pick up his email in legion(predicate) ways, for example logging intomx. b. organd reading it directly, or by using a webmail service. * Domains ordinarily have several mail exchange servers so that they after part continue to accept mail when the main mail exchange server is not available. * Email messages atomic number 18 not respec oral contraceptive pillle ifemail en cryptionis not used correctly. Many MTAs used to accept messages for any recipient on the Internet and do their best to deliver them. Such MTAs ar called at large(p) mail relays.This was very important in the early days of the Internet when profits connections were unreliable. If an MTA couldnt reach the destination, it could at least(prenominal)(prenominal) deliver it to a relay closer to the destination. The relay stood a recrudesce chance of delivering the message at a later time. However, this mechanism be to be exploihitchle by people sendingunsolicited bulk emailand as a consequence very few modern MTAs are adequate to(p) mail relays, and numerous MTAs dont accept messages from open mail relays be excite such messages are very likely to be spam. - editMessage formatThe Internet email message format is now delimit byRFC 5322, with multi-media content attachments being be inRFC 2045throughRFC 2049, corporately calledMultipurpose Internet Mail ExtensionsorMIME. RFC 53 22replaced the preliminaryRFC 2822in 2008, and in turnRFC 2822in 2001 replacedRFC 822 which had been the standard for Internet email for nearly 20 years. Published in 1982,RFC 822was based on the earlierRFC 733for theARPANET. 49 Internet email messages consist of two major sections * Header organize into palmsuch as From, To, CC, root word, Date, and other nurture about the email. frame The basic content, as unstructured text sometimes containing a jot blockat the end. This is exactly the same as the body of a regular letter. The header is separated from the body by a fair line. editMessage header separately message has exactly oneheader, which is structured into handle. Each come forward has a name and a value. RFC 5322specifies the precise syntax. Informally, each line of text in the header that begins with aprintable characterbegins a separate flying field. The field name starts in the first character of the line and ends before the separator character .The separator i s consequentlyce fol commencemented by the field value (the body of the field). The value is continued onto subsequent lines if those lines have a space or tab as their first character. Field call and values are restricted to 7-bitASCIIcharacters. Non-ASCII values may be represented using MIMEencoded words. Email header fields chiffonier be multi-line, and each line ahould be at most 78 characters long and in no event more than 998 characters long. 50Header fields defined byRFC 5322 ass only containUS-ASCIIcharacters for encoding characters in other cliques, a syntax specified inRFC 2047 back be used. 51 belatedly the IETF EAI working mathematical group has defined some standards track extensions5253, replacing previous(prenominal) experimental extensions, to dispense withUTF-8encodedUnicodecharacters to be used within the header. In particular, this allows email addresses to use non-ASCII characters. Such characters must(prenominal) only be used by servers that support the se extensions. The message header must take at least the chase fields54 * From Theemail address, and optionally the name of the author(s). In many email clients not changeable except through changing answer for settings. Date The local time and date when the message was written. Like theFromfield, many email clients fill this in automatically when sending. The recipients client may whence display the time in the format and time zone local to him/her. The message header should include at least the quest fields55 * Message-ID Also an automatically generated field used to prevent multiple delivery and for credit in In-Reply-To ( describe below). * In-Reply-ToMessage-IDof the message that this is a reply to. Used to get in touch colligate messages together. This field only applies for reply messages.RFC 3864describes registration procedures for message header fields at theIANA it provides forpermanentandprovisionalmessage header field label, including also fields defined for MI ME, net modernistics, and http, and referencing relevant RFCs. Common header fields for email include * To The email address(es), and optionally name(s) of the messages recipient(s). Indicates primary recipients (multiple allowed), for secondary recipients manipulate Cc and Bcc below. * Subject A brief summary of the topic of the message. Certain abbreviationsare normally used in the subject, includingRE and FW. BccBlind Carbon Copy addresses added to the SMTP delivery list but not (usually) listed in the message entropy, remaining covert to other recipients. * CcCarbon copy Many email clients result seagull email in your in lash differently depending on whether you are in the To or Cc list. * Content- eccentric Information about how the message is to be displayed, usually aMIME emblem. * Precedence ordinarily with values bulk, toss out, or list used to indicate that automated vacation or out of office responses should not be returned for this mail, e. g. o prevent vacation n otices from being sent to all other subscribers of a mailinglist. Sendmailuses this header to contact prioritization of queued email, with Precedence special-delivery messages delivered sooner. With modern high-bandwidth networks delivery priority is less of an issue than it once was. Microsoft Exchangerespects a fine-grained automatic response retrenchment mechanism, the X-Auto-Response-Sup entreat header. 56 * addresssMessage-IDof the message that this is a reply to, and the message-id of the message the previous reply was a reply to, etc. * Reply-To add togetherress that should be used to reply to the message. sender Address of the actual sender acting on behalf of the author listed in the From field (secretary, list manager, etc. ). * Archived-At A direct link to the archived form of an soul email message. 57 punctuate that theTofield is not necessarily cerebrate to the addresses to which the message is delivered. The actual delivery list is supplied separately to the tr ansport protocol,SMTP, which may or may not originally have been extracted from the header content. The To field is similar to the addressing at the top of a conventional letter which is delivered harmonize to the address on the outer envelope.In the same way, the From field does not have to be the real sender of the email message. Some mail servers fancyemail au thenticationsystems to messages being relayed. Data pertaining to servers activity is also part of the header, as defined below. SMTP defines thetrace readingof a message, which is also relieve in the header using the following two fields58 * authorized when an SMTP server accepts a message it inserts this trace record at the top of the header (last to first). * Return-Path when the delivery SMTP server elucidates thefinal deliveryof a message, it inserts this field at the top of the header.Other header fields that are added on top of the header by the receiving server may be calledtrace fields, in a broader sense. 59 * Authentication-Results when a server carries out authentication chips, it finish give birth the results in this field for consumption by beatstream agents. 60 * Received-SPF stores the results ofSPF quits. 61 * Auto-Submitted is used to lollipop automatically generated messages. 62 * VBR-Info claimsVBRwhitelisting63 Filename extensions Upon reception of email messages,email clientapplications fork out messages in operating(a) system files in the file system.Some clients save individual messages as separate files, magic spell others use various askive trainingbase formats, often proprietary, for collective storage. A historical standard of storage is them thumpformat. The specific format used is often indicated by specialfilename extensions eml Used by many email clients includingMicrosoft come forwardlook Ex pres trustworthy,Windows MailandMozilla Thunderbird. The files areplain textinMIMEformat, containing the email header as well as the message content and attachments in one or more of several formats. emlx Used by apple Mail. msg Used byMicrosoft Office OutlookandOfficeLogic Groupware. bx Used byOpera Mail,KMail, andorchard apple tree Mailbased on themboxformat. Some applications (likeApple Mail) leave attachments encoded in messages for searching while also saving separate copies of the attachments. Others separate attachments from messages and save them in a specific directory. Lesson 1 move into Text and Numbers The Microsoft pass by Window Microsoft surmount is an electronic spreadsheet. You can use it to organize your data into rows and columns. You can also use it to arrange mathematical calculations quickly. This tutorial teaches Microsoft go by basics.Although knowledge of how to navigate in a Windows environment is cooperateful, this tutorial was created for the electronic information processing system novice. This lesson will introduce you to the outdo window loony toons. You use the window to interact with stand out. To beg in this lesson, start Microsoft excel 2007. The Microsoft go past window appears and your screen looks similar to the one shown here. descentYour screen will in all likelihood not look exactly like the screen shown. In surpass 2007, how a window displays depends on the surface of your window, the size of your admonisher, and the resolution to which your monitor is set.Resolution determines how very much training your computer monitor can display. If you use a low resolution, less information fits on your screen, but the size of your text and images are larger. If you use a high resolution, more information fits on your screen, but the size of the text and images are smaller. Also, settings in Excel 2007, Windows Vista, and Windows XP allow you to change the color and style of your windows. The Microsoft Office Button In the upper- unexpended shoetree of the Excel 2007 window is the Microsoft Office button. When you put over the button, a menu appears.You can use the menu to create a new file, open an breathing file, save a file, and make many other tasks. The apace entreeion instrumental role contain Next to the Microsoft Office button is the active Access toolbar. The Quick Access toolbar gives you with access to commands you much use. By default, fork out, Undo, and Redo appear on the Quick Access toolbar. You can use Save to save your file, Undo to archive back an action you have taken, and Redo to reapply an action you have involute back. The name Bar Next to the Quick Access toolbar is the title bar. On the Title bar, Microsoft Excel displays the name of the workbook you are currently using.At the top of the Excel window, you should see Microsoft Excel Book1 or a similar name. The bay wreath You use commands to tell Microsoft Excel what to do. In Microsoft Excel 2007, you use the Ribbon to issue commands. The Ribbon is turn up near the top of the Excel window, below the Quick Access toolbar. At the top of the Ribbon are several tabs clinking a tab displays several related command groups. Within each group are related command buttons. You pokey buttons to issue commands or to access menus and negotiation boxes. You may also find a duologue box launcher in the john-right street ecological niche of a group.When you clink the talks box launcher, a dialog box makes additional commands available. The berth bar appears at the very bottom of the Excel window and provides such information as the sum, average, minimum, and maximum value of adopted numbers. You can change what displays on the situation bar by right- contacting on the Status bar and selecting the options you indispensableness from the Customize Status Bar menu. You photograph a menu item to select it. You gibber it again to deselect it. A check arrest next to an item means the item is selected. movement Around a Worksheet By using the pointer pick outs, you can move around your worksheet.You can use the rectify pointer delineate to move big moneyward one mobile phone at a time. You can use the up pointer key to move up one stall at a time. You can use the sheet key to move across the page to the right, one jail mobile phone at a time. You can acknowledge overmatch the Shift key and then press the tab key key to move to the leftfield(p)-hand(a), one mobile phonephone at a time. You can use the right and left pointer keys to move right or left one booth at a time. The page Up and knave rarify keys move up and down one page at a time. If you hold down the Ctrl key and then press the Home key, you move to the beginning of the worksheet. practice 1 attain Around the WorksheetThe Down Arrow Key conspire the down arrow key several times. Note that the cursor moves downward one cadre at a time. The Up Arrow Key bear on the up arrow key several times. Note that the cursor moves upwards one cellular telephoneular phone at a time. The Tab Key Move to cell A1. crush the Tab key several tim es. Note that the cursor moves to the right one cell at a time. The Shift+Tab Keys Hold down the Shift key and then press Tab. Note that the cursor moves to the left one cell at a time. The counterbalance and Left Arrow Keys cupboard the right arrow key several times. Note that the cursor moves to the right.Press the left arrow key several times. Note that the cursor moves to the left. Page Up and Page Down Press the Page Down key. Note that the cursor moves down one page. Press the Page Up key. Note that the cursor moves up one page. The Ctrl-Home Key Move the cursor to column J. Stay in column J and move the cursor to row 20. Hold down the Ctrl key while you press the Home key. Excel moves to cell A1. Go To jail cellsQuickly The following are shortcuts for moving quickly from one cell in a worksheet to a cell in a different part of the worksheet. EXERCISE 2 Go to F5 The F5 function key is the Go To key.If you press the F5 key, you are prompted for the cell to which you wish to go. compute the cell address, and the cursor jumps to that cell. Press F5. The Go To dialog box opens. vitrineJ3in the Reference field. Press bring out. Excel moves to cell J3. Go to Ctrl+G You can also use Ctrl+G to go to a specific cell. Hold down the Ctrl key while you press g (Ctrl+g). The Go To dialog box opens. typeC4in the Reference field. Press scratch. Excel moves to cell C4. The Name Box You can also use the Name box to go to a specific cell. erect type the cell you neediness to go to in the Name box and then press Enter.If you wish to coiffure a function on a group of cells, you must first select those cells by bring out them. The exercises that follow teach you how to select. EXERCISE 3 Select Cells To select cells A1 to E1 Go to cell A1. Press the F8 key. This anchors the cursor. Note that Extend Selection appears on the Status bar in the lower-left corner of the window. You are in the Extend mode. andiron in cell E7. Excel sidle ups cells A1 to E7. Press Es c and click anywhere on the worksheet to clear the highlighting. Alternative Method Select Cells by DraggingYou can also select an area by holding down the left cower button and dragging the mouse over the area. In addition, you can select noncontiguous areas of the worksheet by doing the following Go to cell A1. Hold down the Ctrl key. You wont write out it until step 9. Holding down the Ctrl key changes you to select noncontiguous areas of the worksheet. Press the left mouse button. While holding down the left mouse button, use the mouse to move from cell A1 to C5. Continue to hold down the Ctrl key, but release the left mouse button. Using the mouse, place the cursor in cell D7. Press the left mouse button.While holding down the left mouse button, move to cell F10. sales outlet the left mouse button. Release the Ctrl key. Cells A1 to C5 and cells D7 to F10 are selected. Press Esc and click anywhere on the worksheet to consider the highlighting. Enter Data In this section, yo u will learn how to enter data into your worksheet. First, place the cursor in the cell in which you want to start go into data. quality some data, and then press Enter. If you need to delete, press the typewrite key to delete one character at a time. EXERCISE 4 Enter Data Place the cursor in cell A1. caseJohn Jordan. Do not press Enter at this time.Delete Data The Backspace key erases one character at a time. Press the Backspace key until Jordan is erased. Press Enter. The name John appears in cell A1. contract a Cell After you enter data into a cell, you can edit the data by pressing F2 while you are in the cell you wish to edit. EXERCISE 5 Edit a Cell Change John to Jones. Move to cell A1. Press F2. Use the Backspace key to delete the n and the h. Typenes. Press Enter. Lesson 2 Entering Excel aspects and data format Data Lesson 1 acquaint you with the Excel 2007 window, taught you how to move around the window, and how to enter data.A major strength of Excel is that you can transact mathematical calculations and format your data. In this lesson, you learn how to perform basic mathematical calculations and how to format text and numerical data. To start this lesson, open Excel. Set the Enter Key Direction In Microsoft Excel, you can depute the direction the cursor moves when you press the Enter key. In the exercises that follow, the cursor must move down one cell when you press Enter. You can use the Direction box in the Excel Options pane to set the cursor to move up, down, left, right, or not at all. actualize the steps that follow to set the cursor to move down when you press the Enter key. Click the Microsoft Office button. A menu appears. Click Excel Options in the lower-right corner. The Excel Options pane appears. Click Advanced. If the check box next to After Pressing Enter Move Selection is not checked, click the box to check it. If Down does not appear in the Direction box, click the down arrow next to the Direction box and then click D own. Click OK. Excel sets the Enter direction to down. Perform Mathematical Calculations In Microsoft Excel, you can enter numbers and mathematical formulas into cells.Whether you enter a number or a formula, you can reference the cell when you perform mathematical calculations such as addition, subtraction, multiplication, or division. When entering a mathematical formula, precede the formula with an catch sign. Use the following to indicate the type of calculation you wish to perform + Addition Subtraction * Multiplication / Division Exponential In the following exercises, you practice some of the methods you can use to move around a worksheet and you learn how to perform mathematical calculations. Refer to Lesson 1 to learn more about moving around a worksheet. EXERCISE 1Addition TypeAddin cell A1. Press Enter. Excel moves down one cell. Type1in cell A2. Press Enter. Excel moves down one cell. Type1in cell A3. Press Enter. Excel moves down one cell. Type=A2+A3in cell A4. Click the check dress on the Formula bar. Excel adds cell A1 to cell A2 and displays the result in cell A4. The formula displays on the Formula bar. NoteClicking the check mark on the Formula bar is similar to pressing Enter. Excel records your inlet but does not move to the next cell. Subtraction Press F5. The Go To dialog box appears. TypeB1in the Reference field. Press Enter. Excel moves to cell B1.TypeSubtract. Press Enter. Excel moves down one cell. Type6in cell B2. Press Enter. Excel moves down one cell. Type3in cell B3. Press Enter. Excel moves down one cell. Type=B2-B3in cell B4. Click the check mark on the Formula bar. Excel subtracts cell B3 from cell B2 and the result displays in cell B4. The formula displays on the Formula bar. Multiplication Hold down the Ctrl key while you press g (Ctrl+g). The Go To dialog box appears. TypeC1in the Reference field. Press Enter. Excel moves to cell C1 TypeMultiply. Press Enter. Excel moves down one cell. Type2in cell C2. Press Enter. Excel moves down one cell.Type3in cell C3. Press Enter. Excel moves down one cell. Type=C2*C3in cell C4. Click the check mark on the Formula bar. Excel multiplies C1 by cell C2 and displays the result in cell C3. The formula displays on the Formula bar. Division Press F5. TypeD1in the Reference field. Press Enter. Excel moves to cell D1. TypeDivide. Press Enter. Excel moves down one cell. Type6in cell D2. Press Enter. Excel moves down one cell. Type3in cell D3. Press Enter. Excel moves down one cell. Type=D2/D3in cell D4. Click the check mark on the Formula bar. Excel divides cell D2 by cell D3 and displays the result in cell D4.The formula displays on the Formula bar. When creating formulas, you can reference cells and include numbers. All of the following formulas are valid =A2/B2 =A1+12-B3 =A2*B2+12 =24+53 AutoSum You can use the AutoSum buttonon the Home tab to automatically add a column or row of numbers. When you press the AutoSum button, Excel selects the numbers it thinks you wan t to add. If you then click the check mark on the Formula bar or press the Enter key, Excel adds the numbers. If Excels guess as to which numbers you want to add is wrong, you can select the cells you want. EXERCISE 2 AutoSum The following illustrates AutoSumGo to cell F1. Type3. Press Enter. Excel moves down one cell. Type3. Press Enter. Excel moves down one cell. Type3. Press Enter. Excel moves down one cell to cell F4. Choose the Home tab. Click the AutoSum buttonin the Editing group. Excel selects cells F1 through F3 and enters a formula in cell F4. Press Enter. Excel adds cells F1 through F3 and displays the result in cell F4. Perform involuntary Calculations By default, Microsoft Excel recalculates the worksheet as you change cell entries. This makes it uncomplicated for you to correct mistakes and analyze a variety of scenarios. EXERCISE 3 automatic pistol CalculationMake the changes described below and note how Microsoft Excel automatically recalculates. Move to cell A2. Type2. Press the right arrow key. Excel changes the result in cell A4. Excel adds cell A2 to cell A3 and the new result appears in cell A4. Move to cell B2. Type8. Press the right arrow key. Excel subtracts cell B3 from cell B3 and the new result appears in cell B4. Move to cell C2. Type4. Press the right arrow key. Excel multiplies cell C2 by cell C3 and the new result appears in cell C4. Move to cell D2. Type12. Press the Enter key. Excel divides cell D2 by cell D3 and the new result appears in cell D4.Align Cell Entries When you type text into a cell, by default your presentation aligns with the left side of the cell. When you type numbers into a cell, by default your entry aligns with the right side of the cell. You can change the cell alignment. You can center, left-align, or right-align any cell entry. Look at cells A1 to D1. Note that they are adjust with the left side of the cell. Microsoft Excel 2007 It is a syllabus used to create, format, and compute numbers. It displ ays datain row-and-column format. MS Excel makes it easy to compute numbers andallows different ways to format data including charts and reports. It is a very powerful electronic spreadsheet that lets the user enter and usenumerical data with formulas and built-in functions. It consists of 16worksheets, 65536 rows, and 256 columns. A Workbook is a file in MS Excel that holds worksheets. A Worksheet is composed of columns and rows that are similar to an report ledger. Itdisplays characters like letters, and numbers, and can do computations. Parts and Uses of the MS Excel purlieu 1. Toolbars display commands that are commonly used for easy access 2. Name Box displays the address of the active cell 3. Formula bar displays the contents and formula entered on the active cell 4. Status bar displays the information about a selected command 5. Select all Button selects every cell in a worksheet 6. Sheet Tabs let you display worksheets in the open workbook 7. Row headers a number use d to identify a row 8. Column headers a letter used to identify a column 9. Active cell the cell that has a thick phone that will hold any data that you type orentered 10. peal bars includes vertical and horizontal scroll bar and four arrow used to move thescreen display horizontally or vertically 11. Title bar displays the weapons platform and the name of the workbook that you are currentlyusing 12. plug-in bar (7 Tabs) lists the call of the menus or tabs in Excel 13. Minimize button minimizes the window to a button on the task bar 14. Maximize/Restore button switch between maximizing a window and restoring awindow to its previous size 15. Close button closes the window Parts of the Microsoft Office Excel 2007 surroundings Parts of the PowerPoint screen * Title bar displays the document name * Menu bar click on a menu option to see a list of commands * Standard toolbar frequently used menu options doting toolbar displays formatting commands * Placeholder click or dou ble-click to add an element to a lantern slide * sketch cerebration button displays document in dodge form * sea-coast affect button displays slides one at a time * slip ones mind Sorter view button displays all slides in a single screen * slide show button displays slide show * Drawing toolbar displays drawing tools * Status bar shows the current page number and position of the insertion point in the document * Office adjuvant quick help when you need it This lesson introduces you toPowerPoint 2007.You use the PowerPoint window to interact with the package plan, place text, graphics, and other features on a slide. When you launch PowerPoint 2007, the PowerPoint 2007 Window appears and your screen looks like the one shown below. Your PowerPoint 2007 Window screen will probably not look exactly like the screen shown above. In PowerPoint 2007, how a window displays depends on the size of the window, the size of your monitor, and the resolution to which your monitor is set . Screen Resolution determines how much information your computer monitor can display.If you use a low resolution, less information fits on your screen, but the size of your text and images are larger. If you use a high resolution, more information fits on your screen, but the size of the text and images are smaller. The Microsoft Office Button In the upper-left corner of the PowerPoint 2007 window is the Microsoft Office button. Its similar to the old File Menu. When you click the button, a menu appears. You can use the menu to create a new file, open an existing file, save a file, print, and perform many other tasks. The Quick Access ToolbarNext to the Microsoft Office button in the upper left corner is the Quick Access toolbar outlined in red in the image above. The Quick Access toolbar provides you with access to commands that are frequently used. By default, Save, Undo, and Redo appear on the Quick Access toolbar. You use Save to save your file, Undo to rollback an action you h ave taken, and Redo to reapply an action you have rolled back. You can customize this toolbar by right clicking on it or click the small black down arrow to the right. The Title Bar The Title bar is located at the top in the center of the PowerPoint 2007 window.The Title bar displays the name of the presentation on which you are currently working. By default, PowerPoint names presentations sequentially, starting with Presentation1. When you save your file, you can change the name of your presentation. The Ribbon TheRibbonholds all of the commands and features of each of the tabs in the Ribbon. The Tabs are located across the top of the ribbon under the Title Bar. These contextual tabs will appear when you have something highlighted that calls for it. For example, if you have a picture highlighted on your slide, a Picture Tools tab will appear.Similar tools are located in Command Groups across the ribbon. Each Command Group includes Command Buttons to perform various actions on that group of tools. Getting PowerPoint to Do What You Want You use commands to tell PowerPoint what to do. In PowerPoint 2007, the commands you use are located on the the Ribbon. The Ribbon is located near the top of the PowerPoint 2007 window, below the Quick Access toolbar. At the top of the Ribbon are several tabs and clicking a tab displays several related command groups. Within each group are related command buttons. You click buttons to issue commands or to access menus and dialog boxes.You may also find a dialog box launcher in the bottom-right corner of a group. When you click the dialog box launcher, a dialog box makes additional commands available. Clipboard Contains the cut, copy, paste commands. The Format Painter tool is located here as are the Paste Special, Paste as Hyperlink, and twin commands. Slides All the commonly used commands for creating new slides Font Includes the most commonly used commands for formatting font Paragraph Includes all of the paragraph formattin g commands, vertical and horizontal alignments, text direction, bullets, numbering, indenting, spacing before and after, columns, etc.It also includes the dialog box for tabs. Drawing Allow you to add shapes and draw on your slides. This is Format Shape Dialog Box. Rulers Rulers are vertical and horizontal guides. You use them to determine where you want to place an object. If the rulers do not display in your PowerPoint 2007 window 1. Click the View tab. 2. Click Ruler in the Show/ obliterate group. The rulers appear. Slides, Placeholders, and Notes The Slide Window is broken up into several areas including the Slide venereal disease and the Notes arm. The Slide Pane appears in the center of the window while the Notes Section is at the bottom.There are also Placeholders on each slide depending on the slide layout that has been selected. These layouts may include placeholders for a slide title, subtitle, text, images, video, charts, graphs, etc. The placeholders hold the objects o n your slides. Slides appear in the center of the window. You create your presentation by adding content to the slides. You can use the notes area to creates notes to yourself. You can refer to these notes as you give your presentation. For narrated presentations, this area is frequently used to write the script for the audio. briny Window Components, Status Bar, Tabs, View Buttons, and MoreThe Status bar generally appears at the bottom of the window. The Status bar displays the number of the slide that is currently displayed, the innate number of slides, and the name of the design template in use or the name of the background. The Outline tab displays the text contained in your presentation in an outline format. The Slides tab displays a thumbnail view of all your slides. You click the thumbnail to view the slide in the Slide pane. The View buttons appear near the bottom of the screen. You use the View buttons to change between Normal view, Slider Sorter view, and the Slide Show v iew. Normal ViewNormal view splits your screen into three major sections the Outline and Slides tabs, the Slide pane, and the Notes area. The Outline and Slides tabs are on the left side of your window. They enable you to shift between two different ways of viewing your slides. The Slides tab shows thumbnails of your slides. The Outline tab shows the text on your slides. The Slide pane is located in the center of your window. The Slide pane shows a large view of the slide on which you are currently working. The Notes area appears below the Slide pane. You can type notes to yourself on the Notes area. Slide Sorter ViewSlide Sorter view shows thumbnails of all your slides. In Slide Sorter view, you can easily add, delete, or change their order of your slides. Slide Show View Use the Slide Show view when you want to view your slides, as they will look in your final presentation. When in Slide Show view Esc Returns you to the view you were using previously. Left-clicking Moves you to t he next slide or animation effect. When you reach the last slide, you automatically return to your previous view. Right-clicking Opens a pop-up menu. You can use this menu to navigate the slides, add vocalizer notes, select a pointer, and mark your presentation. Zoom In & Zoom Out Zoom controls allows you to zoom in and zoom out on the window. Zooming in makes the window larger so you focus in on an object. Zooming out makes the window smaller so you can see the entire window. You can click and drag the vertical and horizontal splitter bars to change the size of your panes. What is a computer computer computer virus? A computer virus is a small software program that spreads from one computer to other and interferes with computer operation. A computer virus might corrupt or delete data on a computer, use an email program to spread the virus to other computers, or even delete everything on the hard disk.Computer viruses are frequently spread by attachments in email messages or by instant messaging messages. Therefore, you must never open an email attachment unless you know who sent the message or you are expecting the email attachment. Viruses can be disguised as attachments of funny images, salutation cards, or audio and video files. Computer viruses also spread through downloads on the Internet. They can be hidden in pirated software or in other files or programs that you might download. Symptoms of a computer virus For information about the symptoms of a computer virus, go to the Microsoft PC credentialwebsite. What is a worm?A worm is computer code that spreads without user interaction. Most worms begin as email attachments that infect a computer when theyre opened. The worm interprets the septic computer for files, such as address books or temporary webpages, that contain email addresses. The worm uses the addresses to send infected email messages, and frequently mimics (or spoofs) the From addresses in later email messages so that those infected me ssages reckon to be from someone you know. Worms then spread automatically through email messages, networks, or operating system vulnerabilities, frequently overwhelming those systems before the cause is known.Worms arent always destructive to computers, but they usually cause computer and network performance and stability problems. What is a Trojan horse? A trojan horse is a malicious software program that hides inside other programs. It enters a computer hidden inside a legitimate program, such as a screen saver. Then it puts code into the operating system that enables a hacker to access the infected computer. Trojan horses do not usually spread by themselves. They are spread by viruses, worms, or downloaded software. What is spyware? Spyware can break in on your computer without your knowledge.These programs can change your computers configuration or collect advertising data and personalised information. Spyware can track Internet search habits and can also airt your web brow ser to a different website than you intend to go to. What is rapscallion protective cover software? A rogue protective cover software program tries to make you think that your computer is infected by a virus and usually prompts you to download or buy a product that buy foods the virus. The names of these products frequently contain words like Antivirus, Shield, protection, Protection, or Fixer. This makes them sound legitimate.They frequently run right after you download them, or the next time that your computer starts. Rogue security software can prevent applications, such as Internet adventurer, from opening. Rogue security software might also display legitimate and important Windows files as infections. Typical error messages or pop-up messages might contain the following phrases Warning Your computer is infected This computer is infected by spyware and adware. NoteIf you receive a message in a popup dialog box that resembles this warning, pressALT + F4on your keyboard to cl ose the dialog box.Do not click anything inside the dialog box. If a warning, such as the one here, keeps appearing when you try to close the dialog box, its a good indication that the message is malicious. Are you sure you want to navigate from this page? Your computer is infected They can cause data lost and file corruption and need to be treated as soon as possible. Press CANCEL to prevent it. Return to System Security and download it to secure your PC. Press OK to Continue or Cancel to stay on the current page. If you see this kind of message, then dont download or buy the software.What is malware? Malware is a term that is used for malicious software that is designed to do damage or unwanted actions to a computer system. Examples of malware include the following Viruses Worms Trojan horses Spyware Rogue security software How to remove malware such as a virus, spyware, or rogue security software Removing a computer virus or spyware can be difficult without the help of malicious software removal tools. Some computer viruses and other unwanted software reinstall themselves after the viruses and spyware are find and removed.Fortunately, by updating the computer and by using malicious software removal tools, you can help permanently remove unwanted software. For more information about how to remove a computer virus and spyware, see the following oblige in the Microsoft Knowledge Base 2671662 Microsoft resources and guidance for removal of malware and viruses NoteIf you cannot access the Internet on your computer, use another computer to help you follow the steps in the How to reset your Internet venturer substitute settings section on the computer that may be infected.To remove a computer virus and other malicious software, follow these steps in order. Install the latest updates from Microsoft Update NoteA computer virus may prevent you from accessing the Microsoft Update website to install the latest updates. We remember that you set the Automatic Updat es serviceto run automatically so that a computer is not missing any important updates. For more information, see the following denomination in the Microsoft Knowledge Base 306525 How to configure and use Automatic Updates in Windows Windows VistaandWindows 7 ClickStart, and then typeWindows Updatein the search box.In the results area, clickWindows Update. ClickCheck for Updates. travel along the instructions to download and install the latest Windows Updates. Windows XP ClickStart, and then clickRun. Typesysdm. cpl, and then press Enter. Click theAutomatic Updatestab, and then click theAutomatic (recommended)option. ClickOK. Use the free Microsoft refuge Scanner Microsoft offers a free online tool that saps and helps remove potential threats from your computer. To perform the scan, go to theMicrosoft Safety Scannerwebsite. Use the Windows Malicious Software Removal ToolFor more information about the Microsoft Malicious Software Removal Tool, see the following article in the M icrosoft Knowledge Base 890830 The Microsoft Windows Malicious Software Removal Tool helps remove specific, prevalent malicious software from computers that are running Windows 7, Windows Vista, Windows waiter 2003, Windows Server 2008, or Windows XP Manually remove the rogue security software If the rogue security software cant be discover or removed by using Microsoft Safety Scanner or the Windows Malicious Software Removal Tool, try the following steps Note the name of the rogue security software.For this example, well call itXP Security Agent 2010. start up your computer. When you see the computers manufacturers logo, repeatedly press theF8key. When you are prompted, use the arrow keys to highlightSafe Mode with Networking, and then press Enter. ClickStartand check whether the rogue security software appears on theStartmenu. If its not listed there, clickAll syllabussand scroll to find the rogue security softwares name. Right-click the name of the rogue security software pr ogram, and then clickProperties. Click theShortcuttab.In thePropertiesdialog box, check the class of the rogue security software program that is listed inTarget. For example,CProgram FilesXP Security Agent 2010. NoteThe folder name frequently is a random number. ClickOpen File Location. In theProgram Fileswindow, clickProgram Filesin the address bar. Scroll until you find the rogue security software program folder. For example,XP Security Agent 2010. Right-click the folder, and then clickDelete. start your computer. Go to theMicrosoft Safety Scannerwebsite. Follow the steps to run the scan and to help remove the rogue security software.If you surmise that your computer is infected with rogue security software that was not detected by using Microsoft security solutions, you can submit samples by using theMicrosoft Malware Protection touch submission form. For more information about rogue security software, go to theWatch out for fake virus alertswebsite. Install and run Microsoft Security Essentials Microsoft offers a free malicious removal program called Microsoft Security Essentials that helps protect your computer from becoming infected. To install Microsoft Security Essentials, follow these steps Go to theMicrosoft Security Essentialswebsite.ClickFree Download. ClickRun, and then follow the instructions to install Microsoft Security Essentials. After installation, restart your computer. ClickStart, clickAll Programs, and then clickMicrosoft Security Essentials. On theHometab, select theFullscan option, and then clickScan now. Install Windows withstander Offline Windows Defender Offline is a malware tool that helps remove difficult to eliminate viruses that start before Windows starts. To use Windows Defender Offline, follow these steps On an uninfected computer, go to theWhat is Windows Defender Offlinewebsite.ClickDownload the 32 bit versionorDownload the 64 bit version, depending on which operating system that you are running. If youre unsure of whic h operating system that you are running, go to theIs my PC running the 32-bit or 64-bit version of Windowswebsite. When you are prompted, clickSave As, and then save the file to a DVD, CD, or USB nictitation claim. On the infected computer, insert the DVD, CD, or USB flash fight off, and then restart the computer. When you are prompted, press a key to select an option to use to start your computer, such as F12, F5, or F8, depending on the kind of computer that you are using.Use the arrow key to scroll to the drive where you installed Windows Defender Offline file. Windows Defender Offline starts and immediately scans for malware. For more information about how to remove a computer virus, go to theHow do I remove a computer viruswebsite. How to protect your computer against malware There are actions that you can take to help protect your computer against malware. Turn on the firewall For information about how to turn on your firewall in Windows 7, go to theTurn Windows 7 Firewall on or offwebsite.For information about how to turn on your firewall in Windows Vista, go to theTurn Windows Vista Firewall on or offwebsite. For information about how to turn on your firewall in Windows XP, see the following article in the Microsoft Knowledge Base 283673 How can I turn on or turn off the firewall in Windows XP Service Pack 2 or later versions? Keep your computer up to date For more information about how to set Automatic Updates in Windows, see the following article in the Microsoft Knowledge Base 306525 How to configure and use Automatic Updates in Windows Install Microsoft Security Essentials and keep it up to dateFor more information about how to install and use Microsoft Security Essentials, go to theMicrosoft Security Essentialswebsite. fathert be tricked into downloading malware Here are some tips that can help protect you from downloading software that you dont want Only download programs from websites that you trust. If youre not sure whether to trust a pro gram that you want to download, enter the name of the program into your favorite search engine to see whether anyone else has reported that it contains spyware. Read all security warnings, license agreements, and privacy statements that are associated with any software that you download.Never click Agree or OK to close a window that you suspect might be spyware. Instead, click the red x in the corner of the window or pressAlt + F4on your keyboard to close a window. Be wary of popular free music and movie file-sharing programs, and make sure that you understand all the software packaged with those programs. Use a standard user account instead of an administrator account. For more information, go to theWhy use a standard account instead of an administrator accountwebsite. For more information about how to protect a computer against viruses, go to theHow to boost your malware defense and protect your PCwebsite.How to reset your Internet Explorer legate settings Malicious software mig ht change Internet Explorer proxy settings, and these changes can prevent you from accessing Windows Update or any Microsoft Security sites. To have us change your Internet Explorer proxy settings for you, follow these steps On an uninfected computer, see the following article in the Microsoft Knowledge base 2289942 How to reset your Internet Explorer proxy settings Go to theFix it for mesection. Click theFix itbutton. Save the file to a flash drive or a CD when you are prompted. wrap the flash drive or CD in the infected computer.Start Windows, clickStart, and then clickRun. ClickBrowse. Select the location of the flash drive or CD. Double-click the file that you saved, and then clickOpen. To change your Internet Explorer proxy settings yourself, follow these steps ClickStart, and then clickRun. In theRunbox, copy and paste the following reg add HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings /v ProxyEnable /t REG_DWORD /d 0 /f ClickOK. ClickStart, and then clickRun. In theRunbox, copy and paste the following reg delete HKCUSoftwareMicrosoftWindowsCurrentVersionInternet Settings /v ProxyServer /f ClickOK.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment