Professional Documents
Culture Documents
1. Using mail merge of MS-Word prepare send New Year greetings to the all
Principal, staffs and students of your institution.
Mail Merge is a useful tool that will allow you to easily produce multiple letters, labels,
envelopes, nametags, and more using information stored in a list, database, or spreadsheet. In
this lesson, you will learn how to use the Mail Merge Wizard to create a data source and a
form letter, and you'll explore other wizard features.
Mail Merge
Video: Using Mail Merge in Word 2010
When you are performing a Mail Merge, you will need a Word document (you can start with
an existing one or create a new one) and a recipient list, which is typically an Excel
workbook. If you'd like to work along with the lesson, you can download the examples
below.
Letter (Word document)
Recipient list (Excel workbook)
To use Mail Merge:
1. Open an existing Word document, or create a new one.
2. Click the Mailings tab.
3. Click the Start Mail Merge command.
4. Select Step by Step Mail Merge Wizard.
The Mail Merge task pane appears and will guide you through the six main steps to complete
a merge. The following is an example of how to create a form letter and merge the letter with
a recipient list.
Step 1:
1. Choose the type of document you want to create. In this example, select Letters.
Step 2:
1. Select Use the current document.
2. Locate your file in the dialog box (you may have to navigate to a different folder),
then click Open.
3. If the address list is in an Excel workbook, select the worksheet that contains the list,
then click OK.
4. In the Mail Merge Recipients dialog box, you can check or uncheck each recipient to
control which ones are used in the merge. When you're done, click OK to close the
dialog box.
5. From the Mail Merge task pane, click Next: Write your letter to move to Step 4.
If you don't have an existing address list, you can click the Type a new list button and
click Create. You can then type your address list.
Step 4:
Now you're ready to write your letter. When it's printed, each copy of the letter will basically
be the same, except the recipient data—like the name and address—will be different on each
one. You'll need to add placeholders for the recipient data so Mail Merge knows exactly
where to add the data. If you're using Mail Merge with an existing letter, make sure the file is
open.
To insert recipient data:
1. Place the insertion point in the document where you want the information to appear.
2. Select Address block, Greeting line, Electronic postage, or More items from the task
pane.
3. Depending on your selection, a dialog box may appear with various options. Select
the desired options, then click OK.
For some letters, you'll only need to add an Address block and Greeting line. Sometimes,
however, you may want to place recipient data within the body of the letter to
further personalize it.
Step 5:
1. Preview the letters to make sure information from the recipient list appears correctly
in the letter. You can use the left and right scroll arrows to view each document.
2. The Merge to Printer dialog box opens. Click All, then click OK.
3. The Print dialog box will appear. Adjust the print settings if needed, then click OK.
2. Demonstrate the different tools of the MS-Word.
The ToolbarA toolbar is a bar containing buttons and options that you use to carry out commands.
With toolbars, commands become just handy and easily accessible to users. The buttons contained
in them are used to access commands more quickly than by opening the menus and the respective
dialog boxes.
ScreenTips
I mentioned earlier that toolbars contain smart icons serving as shortcuts to the main menu
commands. However, these toolbars offer too many buttons of various looks and shapes for a user
to easily remember their names or their functions. You might well ask: 'What is the use of a toolbar
button if its name or function is not known?' Well, the ever-creative programmers at Microsoft also
once contemplated this problem. So they fashioned a tool known as ScreenTip. ScreenTips, also
known as Tooltips, are little pop-up descriptions that appear when you rest the mouse pointer over a
toolbar button. They appear on the screen to provide certain information about a toolbar button,
tracked change, or comment or to display a footnote or endnote.
So, any time you are at a loss as to the name or use of a toolbar button, simply rest the mouse
pointer over such button and immediately, you'll see a little text pop-up below the pointer, saying
something. This is a ScreenTip or ToolTip.
In case the ScreenTips don't appear when you move the pointer over a button, it is possible the
feature has been disabled/turned off. You can turn it on by doing the following:
1. On the Tools menu, click Options and then click the View tab.
2. Under Show, select the ScreenTips check box.
That's all. Those are the steps you'll also take to deactivate the feature, for one reason or
another, though not advisable.
1. On the Menu bar, click View. This displays the View menu.
2. Then, on the View menu, point to Toolbars item.
3. Select and click the name of the desired toolbar from the Toolbars sub-menu.The toolbar
you selected will then appear on screen.
Fig: Showing or hiding a toolbar using the View menu
Fig: Displaying the Customize dialog box via the Toolbar Options button
Standard Toolbar
You have learned that the Standard toolbar is, by default, docked directly below the Menu bar, and
that it contains buttons used for performing tasks similar to the commands available in the Menu
bar. Let's now take a moment to identify the name and purpose/use of each of the buttons on the
Standard toolbar.
Office
Assistant Opens Help or invokes the Office Assistant to
(Microsoft provide help topics and tips to help you accomplish your task.
Office Help)
Formatting Toolbar
The Formatting toolbar offers shortcut buttons to help format a document quickly. From the
Formatting toolbar, you can quickly apply formatting attributes such as Font; Font Color;
Alignment; Line Spacing; Bullets and Numbering, etc, document text, to save time.
The following table provides a list of Formatting toolbar buttons and a brief description of each.
Drawing Toolbar
The Drawing toolbar is located at the bottom of the window, between the Horizontal Scroll bar and
the Status bar. Like every other toolbar, this also contains smart icons representing shortcuts to
Main menu commands in Word.
It holds buttons/tools used in creating drwaings, such as rectangles, ovals, lines, arrows, WordArt
text, etc. It also offers tools for inserting organizational charts and ready-made pictures and Clip
Arts from their different locations.
Also included in this toolbar are tools for formatting inserted objects and for adding special effects
such as shadow or 3-D to lines, rectangles, ovals, etc. Like every other toolbar also, the Drawing
toolbar can be displayed or hidden.
The following table shows a list of tools offered on the Drawing toolbar, and their functions:
On a worksheet, you can enter simple formulas to add, divide, multiply, and subtract two or more
numeric values. You can also use the AutoSum feature to quickly total a series of values without
having to enter any of them manually in a formula. Once you have created a formula, you can fill it
into adjacent cells — no need to create the same formula over and over again.
When you become familiar with these simple formulas, you may want to learn more about how to
create complex formulas and try some of the many functions that are available in Excel.
All formula entries start with an equal sign (=). For simple formulas, simply type the equal sign
followed by the numeric values that you want to calculate and the math operators that you want to
use — the plus sign (+) to add, the minus sign (-) to subtract, the asterisk (*) to multiply, and the
forward slash (/) to divide. Then, press ENTER, and Excel instantly calculates and displays the
result of the formula.
For example, when you type =12.99+16.99 in cell C5 and press ENTER, Excel calculates the result
and displays 29.98 in that cell.
The formula that you enter in a cell remains visible in the formula bar, and you can see it whenever
that cell is selected.
IMPORTANT: Although there is a SUM function, there is no SUBTRACT function. Instead, use
the minus (-) operator in a formula; for example, =8-3+2-4+12. Or, you can use a minus sign to
convert a number to its negative value in the SUM function; for example, the formula =SUM(12,5,-
3,8,-4) uses the SUM function to add 12, 5, subtract 3, add 8, and subtract 4, in that order.
Use AutoSum
The easiest way to add a SUM formula to your worksheet is to use AutoSum. Select an empty cell
directly above or below the range that you want to sum, and on the Home or Formula tabs on the
Ribbon, click AutoSum > Sum. AutoSum will automatically sense the range to be summed and
build the formula for you. It can also work horizontally if you select a cell to the left or right of the
range to be summed.
AutoSum vertically
The AutoSum Wizard has automatically detected cells B2:B5 as the range to be summed. All you
need to do is press ENTER to confirm it. If you need add/exclude more cells, you can hold the Shift
Key > Arrow key of your choice until your selection matches what you want, and press ENTER
when you're done.
Intellisense function guide: the SUM(number1,[number2], …) floating tag beneath the function is
its Intellisense guide. If you click the SUM or function name, it will turn into a blue hyperlink,
which will take you to the Help topic for that function. If you click the individual function
elements, their representative pieces in the formula will be highlighted. In this case only B2:B5
would be highlighted since there is only one number reference in this formula. The Intellisense tag
will appear for any function.
AutoSum horizontally
Once you have created a formula, you can copy it to other cells — no need to create the same
formula over and over again. You can either copy the formula, or use the fill handle to copy
the formula to adjacent cells.
For example, when you copy the formula in cell B6 to C6, the formula in that cell automatically
changes to update to cell references in column C.
Once you copy the formula, make sure that the cell references are correct. Cell references can
change based on absolute or relative references. For more information, see Copy and paste a
formula to another cell or worksheet.
Example: =1/8
4. Using MS-Excel Prepare Pie and bar chart to show current branch wise and
batch wise status of students, pass outs, fails for last five years.
Excel
1. In your spreadsheet, select the data to use for your pie chart.
For more information about how pie chart data should be arranged, see Data for pie charts.
2. Click Insert > Insert Pie or Doughnut Chart, and then pick the chart you want.
3. Click the chart and then click the icons next to the chart to add finishing touches:
o To show, hide, or format things like axis titles or data labels, click Chart Elements .
o To quickly change the color or style of the chart, use the Chart Styles .
TIP: As you hover over each choice in the drop down menu, it will show you a preview of
your data in the highlighted chart format.
3. Now you will see the bar chart appear in your spreadsheet with horizontal bars to represent
both the shelf life and restock time for each product. The shelf life (in days) is displayed as
orange horizontal bars and the restock time (in days) is displayed as blue horizontal bars.
You can see the axis values on the bottom of the graph for these horizontal bars.
4. Finally, let's update the title for the bar chart.
To change the title, click on "Chart Title" at the top of the graph object. You should see the
title become editable. Enter the text that you would like to see as the title. In this tutorial, we
have entered "Product Life (in Days)" as the title for the bar chart.
5. Using MS-PowerPoint Prepare a power point presentation of last year annual activities of
your polytechnic.
&
6. Using MS-PowerPoint Prepare a power point presentation on current scientific research
based on direction of your teacher.
PowerPoint presentations work like slide shows. To convey a message or a story, you break it down
into slides. Think of each slide as a blank canvas for the pictures, words, and shapes that will help
you build your story.
Choose a theme
When you open PowerPoint, you’ll see some built-in themes and templates. A theme is a slide
design that contains matching colors, fonts, and special effects like shadows, reflections, and more.
1. Choose a theme.
2. Click Create, or pick a color variation and then click Create.
On the Home tab, click the bottom half of New Slide, and pick a slide layout.
NOTE: If you frequently save files to a certain folder, you can ‘pin’ the path so that it is always
available (as shown below).
Save your work as you go. Hit Ctrl+S often.
Add text
Add pictures
To insert a picture that is saved on your local drive or an internal server, choose Pictures, browse
for the picture, and then choose Insert.
To insert a picture from the Web, choose Online Pictures, and use the search box to find a picture.
Slides are best when you don’t cram in too much information. You can put helpful facts and notes
in the speaker notes, and refer to them as you present.
1. To open the notes pane, at the bottom of the window, click Notes .
2. Click inside the Notes pane below the slide, and begin typing your notes.
Give your presentation
To start the presentation at the first slide, in the Start Slide Show group, click From Beginning.
If you’re not at the first slide and want to start from where you are, click From Current Slide.
If you need to present to people who are not where you are, click Present Online to set up a
presentation on the web, and then choose one of the following options:
7. Prepare a Project Report on definition, types, and history of viruses and
antivirus virus packages to fight with viruses.
A computer virus is malicious code that replicates by copying itself to another program, computer
boot sector or document and changes how a computer works. The virus requires someone to
knowingly or unknowingly spread the infection without the knowledge or permission of a user or
system administrator. In contrast, a computer worm is stand-alone programming that does not need
to copy itself to a host program or require human interaction to spread. Viruses and worms may
also be referred to as malware.
A virus can be spread by opening an email attachment, clicking on an executable file, visiting an
infected website or viewing an infected website advertisement. It can also be spread through
infected removable storage devices, such USB drives. Once a virus has infected the host, it can
infect other system software or resources, modify or disable core functions or applications, as well
as copy, delete or encrypt data. Some viruses begin replicating as soon as they infect the host, while
other viruses will lie dormant until a specific trigger causes malicious code to be executed by the
device or system.
Many viruses also include evasion or obfuscation capabilities that are designed to bypass
modern antivirus and antimalware software and other security defenses. The rise of polymorphic
malware development, which can dynamically change its code as it spreads, has also made viruses
more difficult to detect and identify.
Types of viruses
File infectors. Some file infector viruses attach themselves to program files, usually selected .com
or .exe files. Some can infect any program for which execution is requested, including .sys, .ovl,
.prg, and .mnu files. When the program is loaded, the virus is loaded as well. Other file infector
viruses arrive as wholly contained programs or scripts sent as an attachment to an email note.
Macro viruses: These viruses specifically target macro language commands in applications like
Microsoft Word and other programs. In Word, macros are saved sequences for commands or
keystrokes that are embedded in the documents. Macro viruses can add their malicious code to the
legitimate macro sequences in a Word file. Microsoft disabled macros by default in more recent
versions of Word; as a result, hackers have used social engineering schemes to convince targeted
users to enable macros and launch the virus. As macro viruses have seen a resurgence in recent
years, Microsoft added a new feature in Office 2016 that allows security managers to selectively
enable macro use for trusted workflows only, as well as block macros across an organization.
Overwrite viruses. Some viruses are designed specifically to destroy a file or application's data.
After infecting a system, an overwrite virus begins overwriting files with its own code. These
viruses can target specific files or applications or systematically overwrite all files on an infected
device. An overwrite virus can install new code in files and applications that programs them to
spread the virus to additional files, applications and systems.
Polymorphic viruses. A polymorphic virus is a type of malware that has the ability to change or
mutate its underlying code without changing its basic functions or features. This process helps a
virus evade detection from many antimalware and threat detection products that rely on identifying
signatures of malware; once a polymorphic virus' signature is identified by a security product, the
virus can then alter itself so that it will no longer be detected using that signature.
Resident viruses. This type of virus embeds itself in the memory of a system. The original virus
program isn't needed to infect new files or applications; even if the original virus is deleted, the
version stored in memory can be activated when the operating system loads a specific application or
function. Resident viruses are problematic because they can evade antivirus and antimalware
software by hiding in the system's RAM.
Rootkit viruses. A rootkit virus is a type of malware that installs an unauthorized rootkiton an
infected system, giving attackers full control of the system with the ability to fundamentally modify
or disable functions and programs. Rootkit viruses were designed to bypass antivirus software,
which typically scanned only applications and files. More recent versions of major antivirus and
antimalware programs include rootkit scanning to identify and mitigate these types of viruses.
System or boot-record infectors. These viruses infect executable code found in certain system
areas on a disk. They attach to the DOS bootsector on diskettes and USB thumb drives or the
Master Boot Record on hard disks. In a typical attack scenario, the victim receives storage device
that contains a boot disk virus. When the victim's operating system is running, files on the external
storage device can infect the system; rebooting the system will trigger the boot disk virus. An
infected storage device connected to a computer can modify or even replace the existing boot code
on the infected system so that when the system is booted next, the virus will be loaded and run
immediately as part of the master boot record. Boot viruses are less common now as today's devices
rely less on physical storage media.
History of computer viruses
The first known computer virus was developed in 1971 by Robert Thomas, an engineer at BBN
Technologies. Known as the "Creeper" virus, Thomas' experimental program infected mainframes
on ARPANET, displaying the teletype message, "I'm the creeper: Catch me if you can."
The first computer virus to be discovered in the wild was "Elk Cloner," which infected Apple II
operating systems through floppy disks and displayed a humorous message on infected computers.
Elk Cloner, which was developed by 15-year-old Richard Skrenta in 1982, was designed as a prank
but it demonstrated how a potentially malicious program could be installed in an Apple computer's
memory and prevent users from removing the program.
The term "computer virus" wasn't used until a year later. Fred Cohen, a graduate student at the
University of California, wrote an academic paper titled "Computer Viruses -- Theory and
Experiments" and credited his academic advisor and RSA Security co-founder Leonard Adleman
with coining the phrase "computer virus" in 1983.
Famous computer viruses
Notable examples of early computer viruses include the "Brain" virus, which initially appeared in
1986 and is considered to be the first MS-DOS personal computer virus. Brain was a boot sector
virus; it spread through infected floppy disk boot sectors and, once installed on a new PC, it would
install itself to the system's memory and subsequently infect any new disks inserted into that PC.
The "Jerusalem" virus, also known as the "Friday the 13th" virus, was discovered in 1987 and
spread throughout Israel via floppy disks and email attachments. The DOS virus would infect a
system and delete all files and programs when the system's calendar reached Friday the 13th.
The Melissa virus, which first appeared in 1999, was distributed as an email attachment. If the
infected systems had Microsoft Outlook, the virus would be sent to the first 50 people in an infected
user's contact list. The "Melissa" virus also affected macros in Microsoft Word and disabled or
lowered security protections in the program.
The "Archiveus" Trojan, which debuted in 2006, was the first known case of a ransomware virus
that used strong encryption to encrypt users' files and data. Archiveus targeted Windows systems,
used RSA encryption algorithms (earlier versions of ransomware used weaker and easily defeated
encryption technology) and demanded victims purchase products from an online pharmacy.
The "Zeus" Trojan, one of the most well-known and widely spread viruses in history, first appeared
in 2006 but has evolved over the years and continued to cause problems as new variants emerge.
The Zeus Trojan was initially used to infect Windows systems and harvest banking credentials and
account information from victims. The virus spread through phishing attacks, drive-by downloads
and man-in-the-browser techniques to infect users. The Zeus malware kit was adapted by
cybercriminals to include new functionality to evade antivirus programs as well as spawn new
variants of the Trojan such as "ZeusVM," which uses steganography techniques to hide its data.
"Cabir" virus is the first verified example of a mobile phone virus for the now defunct Nokia
Symbian operating system. The virus was believed to be created by a group from the Czech
Republic and Slovakia called 29A, who sent it to a number of security software companies,
including Symantec in the United States and Kapersky Lab in Russia. Cabir is considered a proof-
of-concept virus, because it proves that a virus can be written for mobile phones, something that
was once doubted.