IT Literacy 2
Last updated
Last updated
Basic knowledge on word processing and spreadsheets
Discuss with the Scout Leader about the safety precautions that should be taken when using the internet, and about the etiquette when using the internet
A Word processor is a computer program that provides for input, editing, formatting, and output of text. It includes some additional features such as creating, editing, saving, and printing documents.
Word Processing Softwares are available on all devices (Web, Mobile, Desktop/Laptop) as well as on all Operating Systems (IOS, MacOS, Windows, Linux)
Microsoft Office: Word
WPS Office
Open Office
Google Docs
MIcrosoft Office: Word
Collabio
Strike
Google Docs
IA Writer
Microsoft Office: Word
Google Docs
Apps on both markets
Most of the Word Processing softwares come as a bundle/package
eg: MS word comes with Microsoft Office Package (365 or individual)
You can type very easily using a word processor. Word processor provides you with many features to create a document so that you can type any type of document. Word processor gives you more features in typing anything than typewriter-like - word processor has unlimited pages. You keep typing and as soon as the first page is over, the word processor lets you type on the new page. While you are typing on the typewriter, you have to enter another page as soon as the page ends. Everything you type in the word processor is visible to you so that you can also correct it if the wrong word is typed. But there is no such facility in the typewriter that you can correct the wrong word.
Copy is also a great feature of the word processor, using which you can copy any text. The copy feature is there in all types of word processors. With the use of copy features, you can use the same text multiple times in the document without writing it, which saves you time as well.
The cut is also a great feature of the word processor, using which you can cut any text in the document. The cut feature is completely different from the copy feature. For example, by using the copy feature, the copied text is in both the places in the document, such as - from where you copied your text and where you pasted the text, while the cut text is removed from the part of the document where The text is cut from.
The paste is also a great feature of the word processor, using which you can paste any copied or cut text on any part of the document. Any text is copied or cut only for pasting.
Multimedia is also a great feature of the word processor, using which you make your document more attractive. Using multimedia features, you can insert multimedia in your document like - clip art, charts, images, pictures, video, etc.
Text formatting is also a great feature of the word processor, using which you can make your document more beautiful. Using text formatting features, you can change the font of the text of your document, the size of the text, and the color of the text and you can also bold, italicize, and underline your text.
Spelling and Grammar is also a great feature of the word processor, using which you can check the spelling and grammar errors of the document.
Adjusting the layout is also a great feature of the word processor, using which you can modify the margins, size, and layout of the document according to your need.
Find is also a great feature of the word processor, using which you can find any word or sentence in the document. This feature helps you a lot, just imagine if your document is 100 to 150 pages. If you have to find any word or sentence, then it will take you a lot of time, but you can find that word or sentence in a few seconds using the find features.
Search and Replace is also a great feature of the word processor, using which you can find any word or sentence in the document and replace that word with a new word using the replace feature. If your document is 100 to 500 pages, then imagine how much time and effort it will take to manually replace a word. But using the Search and Replace feature, you can replace any word or sentence with a new word or sentence in a few seconds.
Indentation and lists are also a great feature of the word processor, using which you can add tabs, bullet lists, and number lists to the document so that your document looks more beautiful.
Insert tables is also a great feature of the word processor, using which you can insert tables in the document.
Multiple windows are also a very good feature of a word processor, using which you can open multiple windows in word processor software. This feature is used by people to use more than one-word processors windows at the same time.
In a word processor, you have to press the ctrl and N buttons simultaneously to open more than one window.
AutoCorrect is also a great feature of word processors using which to automatically correct any common errors in your document like - (typing "teh" and having it autocorrected to "the").
Headers and footers are also a great feature of the word processor, using which you can add anything according to your need in the headers and footers of your document like - page numbers, dates, footnotes, etc.
If we want to send the same information to different people at the same time, then there is a feature in the word processor using which we can do that and that feature is named mail merge. Using mail merge, the body of the letter is typed once and it is sent to different addresses.
There are various advantages of word processor software, which are given below.
Quality
Storage of Text
Security
Word processor helps us to create error free documents. Every document prepared through word processor is absolutely correct in spelling and grammar, there is no possibility in it, and word processor allows us to make many copies of the same format.
In word processor we can create of any number of page document and in word processor we can copy any word or sentence any number of times. You can also use it by making some changes in any old word file in the word processor, for which we do not need to create a new word file.
In a word processor, we can secure any document while creating it. As soon as someone opens that document, he asks for password before opening the document, and only after entering the correct password, the document will open.
There are various uses of word processor software, and this word processor are used in different fields which are - education field, planning or business-related works, for making assignments and home, etc.
With the use of this word processor software, you can do many things, whose names are given below.
Memos.
Making Card.
Letter writing
Legal Copies.
Making resume/CV.
Letters and letterhead.
Reference documents.
writing short stories.
A spreadsheet is a computer program that can capture, display and manipulate data arranged in rows and columns. Spreadsheets are one of the most popular tools available with personal computers.
A spreadsheet is generally designed to hold numerical data and short text strings. In a spreadsheet program, spaces that hold items of data are called spreadsheet cells. These can be renamed to better reflect the data they hold and can be cross-referenced through row numbers and column letters.
The following are just a few of the features available in most spreadsheet programs.
Cell formatting
Within the spreadsheet, selected cells can be formatted to represent various numeric values. For example, financial data can be given accounting formatting, which will apply decimal places and commas to represent dollars and cents.
Formulas
Under the formula bar, users can perform calculations on the contents of a cell against the contents of another cell. For example, if a person were using the spreadsheet to reconcile transactions, they could highlight all the cells that need to be added up and insert a sum function.
Some commonly used spreadsheet software programs today:
Microsoft Excel as part of the Microsoft Office suite and cloud-based subscription service Microsoft 365 (formally Office 365). It is available for Windows, macOS, Android and iOS.
Google Sheets: Part of Google's web-based application suite, Google Workspace. Google Sheets is free and also available as a desktop application for Google Chrome OS and assorted mobile OSes, such as Android and iOS.
Potential employers or customers don't need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn't hand purely personal information out to strangers individually—don't hand it out to millions of people online.
Marketers love to know all about you, and so do hackers. Both can learn a lot from your browsing and social media usage. But you can take charge of your information. As noted by Lifehacker, both web browsers and mobile operating systems have settings available to protect your privacy online. Major websites like Facebook also have privacy-enhancing settings available. These settings are sometimes (deliberately) hard to find because companies want your personal information for its marketing value. Make sure you have enabled these privacy safeguards, and keep them enabled.
You wouldn't choose to walk through a dangerous neighborhood—don't visit dangerous neighborhoods online. Cybercriminals use lurid content as bait. They know people are sometimes tempted by dubious content and may let their guard down when searching for it. The Internet's demimonde is filled with hard-to-see pitfalls, where one careless click could expose personal data or infect your device with malware. By resisting the urge, you don't even give the hackers a chance.
When you go online in a public place, for example by using a public Wi-Fi connection, PCMag notes you have no direct control over its security. Corporate cybersecurity experts worry about "endpoints"—the places where a private network connects to the outside world. Your vulnerable endpoint is your local Internet connection. Make sure your device is secure, and when in doubt, wait for a better time (i.e., until you're able to connect to a secure Wi-Fi network) before providing information such as your bank account number.
To further improve your Internet browsing safety, use secure VPN connection (virtual private network ). VPN enables you to have a secure connection between your device and an Internet server that no one can monitor or access the data that you’re exchanging. Read more about What is VPN
A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather. As PCWorld advises, don't download apps that look suspicious or come from a site you don't trust.
Passwords are one of the biggest weak spots in the whole Internet security structure, but there's currently no way around them. And the problem with passwords is that people tend to choose easy ones to remember (such as "password" and "123456"), which are also easy for cyber thieves to guess. Select strong passwords that are harder for cybercriminals to demystify. Password manager software can help you to manage multiple passwords so that you don't forget them. A strong password is one that is unique and complex—at least 15 characters long, mixing letters, numbers and special characters.
Any time you make a purchase online, you need to provide credit card or bank account information—just what cybercriminals are most eager to get their hands on. Only supply this information to sites that provide secure, encrypted connections.You can identify secure sites by looking for an address that starts with https: (the S stands for secure) rather than simply http: They may also be marked by a padlock icon next to the address bar.
The Internet does not have a delete key, as that young candidate in New Hampshire found out. Any comment or image you post online may stay online forever because removing the original (say, from Twitter) does not remove any copies that other people made. There is no way for you to "take back" a remark you wish you hadn't made, or get rid of that embarrassing selfie you took at a party. Don't put anything online that you wouldn't want your mom or a prospective employer to see.
People you meet online are not always who they claim to be. Indeed, they may not even be real.Fake social media profiles are a popular way for hackers to cozy up to unwary Web users and pick their cyber pockets. Be as cautious and sensible in your online social life as you are in your in-person social life.
Internet security software cannot protect against every threat, but it will detect and remove most malware—though you should make sure it's to date. Be sure to stay current with your operating system's updates and updates to applications you use. They provide a vital layer of security.
Keep these 10 basic Internet safety rules in mind and you'll avoid many of the nasty surprises that lurk online for the careless.