Explanation of word processing

Word Processing

Andrew Prestage, in Encyclopedia of Information Systems, 2003

I. An Introduction to Word Processing

Word processing is the act of using a computer to transform written, verbal, or recorded information into typewritten or printed form. This chapter will discuss the history of word processing, identify several popular word processing applications, and define the capabilities of word processors.

Of all the computer applications in use, word processing is by far the most common. The ability to perform word processing requires a computer and a special type of computer software called a word processor. A word processor is a program designed to assist with the production of a wide variety of documents, including letters, memoranda, and manuals, rapidly and at relatively low cost. A typical word processor enables the user to create documents, edit them using the keyboard and mouse, store them for later retrieval, and print them to a printer. Common word processing applications include Microsoft Notepad, Microsoft Word, and Corel WordPerfect.

Word processing technology allows human beings to freely and efficiently share ideas, thoughts, feelings, sentiments, facts, and other information in written form. Throughout history, the written word has provided mankind with the ability to transform thoughts into printed words for distribution to hundreds, thousands, or possibly millions of readers around the world. The power of the written word to transcend verbal communications is best exemplified by the ability of writers to share information and express ideas with far larger audiences and the permanency of the written word.

The increasingly large collective body of knowledge is one outcome of the permanency of the written word, including both historical and current works. Powered by decreasing prices, increasing sophistication, and widespread availability of technology, the word processing revolution changed the landscape of communications by giving people hitherto unavailable power to make or break reputations, to win or lose elections, and to inspire or mislead through the printed word.

Read full chapter

URL: 

https://www.sciencedirect.com/science/article/pii/B0122272404001982

Computers and Effective Security Management1

Charles A. Sennewald, Curtis Baillie, in Effective Security Management (Sixth Edition), 2016

Word Processing

Word processing software can easily create, edit, store, and print text documents such as letters, memoranda, forms, employee performance evaluations (such as those in Appendix A), proposals, reports, security surveys (such as those in Appendix B), general security checklists, security manuals, books, articles, press releases, and speeches. A professional-looking document can be easily created and readily updated when necessary.

The length of created documents is limited only by the storage capabilities of the computer, which are enormous. Also, if multiple copies of a working document exist, changes to it should be promptly communicated to all persons who use the document. Specialized software, using network features, can be programmed to automatically route changes to those who need to know about updates.

Read full chapter

URL: 

https://www.sciencedirect.com/science/article/pii/B9780128027745000241

Globalization

Jennifer DeCamp, in Encyclopedia of Information Systems, 2003

II.D.2.c. Rendering Systems

Special word processing software is usually required to correctly display languages that are substantially different from English, for example:

1.

Connecting characters, as in Arabic, Persian, Urdu, Hindi, and Hebrew

2.

Different text direction, as in the right-to-left capability required in Arabic, Persian, Urdu, and Hindi, or the right-to-left and top-to-bottom capability in formal Chinese

3.

Multiple accents or diacritics, such as in Vietnamese or in fully vowelled Arabic

4.

Nonlinear text entry, as in Hindi, where a vowel may be typed after the consonant but appears before the consonant.

Alternatives to providing software with appropriate character rendering systems include providing graphic files or elaborate formatting (e.g., backwards typing of Arabic and/or typing of Arabic with hard line breaks). However, graphic files are cumbersome to download and use, are space consuming, and cannot be electronically searched except by metadata. The second option of elaborate formatting often does not look as culturally appropriate as properly rendered text, and usually loses its special formatting when text is added or is upgraded to a new system. It is also difficult and time consuming to produce. Note that Microsoft Word 2000 and Office XP support the above rendering systems; Java 1.4 supports the above rendering systems except for vertical text.

Read full chapter

URL: 

https://www.sciencedirect.com/science/article/pii/B0122272404000800

Text Entry When Movement is Impaired

Shari Trewin, John Arnott, in Text Entry Systems, 2007

15.3.2 Abbreviation Expansion

Popular word processing programs often include abbreviation expansion capabilities. Abbreviations for commonly used text can be defined, allowing a long sequence such as an address to be entered with just a few keystrokes. With a little investment of setup time, those who are able to remember the abbreviations they have defined can find this a useful technique. Abbreviation expansion schemes have also been developed specifically for people with disabilities (Moulton et al., 1999; Vanderheiden, 1984).

Automatic abbreviation expansion at phrase/sentence level has also been investigated: the Compansion (Demasco & McCoy, 1992; McCoy et al., 1998) system was designed to process and expand spontaneous language constructions, using Natural Language Processing to convert groups of uninflected content words automatically into full phrases or sentences. For example, the output sentence “John breaks the window with the hammer” might derive from the user input text “John break window hammer” using such an approach.

With the rise of text messaging on mobile devices such as mobile (cell) phones, abbreviations are increasingly commonplace in text communications. Automatic expansion of many abbreviations may not be necessary, however, depending on the context in which the text is being used. Frequent users of text messaging can learn to recognize a large number of abbreviations without assistance.

Read full chapter

URL: 

https://www.sciencedirect.com/science/article/pii/B9780123735911500152

Case Studies

Brett Shavers, in Placing the Suspect Behind the Keyboard, 2013

Altered evidence and spoliation

Electronic evidence in the form of word processing documents which were submitted by a party in litigation is alleged to have been altered. Altered electronic evidence has become a common claim with the ability to determine the changes becoming more difficult. How do you know if an email has been altered? What about a text document?

Case in Point

Odom v Microsoft and Best Buy, 2006

The Odom v Microsoft and Best Buy litigation primarily focused on Internet access offered to customers in which the customers were automatically billed for Internet service without their consent. One of the most surprising aspects of this case involved the altering of electronic evidence by an attorney for Best Buy. The attorney, Timothy Block, admitted to altering documents prior to producing the documents in discovery to benefit Best Buy.

Investigative Tips: All evidence needs to be validated for authenticity. The weight given in legal hearings depends upon the veracity of the evidence. Many electronic files can be quickly validated through hash comparisons. An example seen in Figure 11.4 shows two files with different file names, yet their hash values are identical. If one file is known to be valid, perhaps an original evidence file, any file matching the hash values would also be a valid and unaltered copy of the original file.

Figure 11.4. Two files with different file names, but having the same hash value, indicating the contents of the files are identical.

Alternatively, Figure 11.5 shows two files with the same file name but having different hash values. If there were a claim that both of these files are the same original files, it would be apparent that one of the files has been modified.

Figure 11.5. Two files with the same file names, but having different hash values, indicating the contents are not identical.

Finding the discrepancies or modifications of an electronic file can only be accomplished if there is a comparison to be made with the original file. Using Figure 11.5 as an example, given that the file having the MD5 hash value of d41d8cd98f00b204e9800998ecf8427e is the original, and where the second file is the alleged altered file, a visual inspection of both files should be able to determine the modifications. However, when only file exists, proving the file to be unaltered is more than problematic, it is virtually impossible.

In this situation of having a single file to verify as original and unaltered evidence, an analysis would only be able to show when the file was modified over time, but the actual modifications won’t be known. Even if the document has “track changed” enabled, which logs changes to a document, that would only capture changes that were tracked, as there may be more untracked and unknown changes.

As a side note to hash values, in Figure 11.5, the hash values are completely different, even though the only difference between the two sample files is a single period added to the text. Any modification, no matter how minor, results in a drastic different hash value.

The importance in validating files in relation to the identification of a suspect that may have altered a file is that the embedded metadata will be a key point of focus and avenue for case leads. As a file is created, copied, modified, and otherwise touched, the file and system metadata will generally be updated.

Having the dates and times of these updates should give rise to you that the updates occurred on some computer system. This may be on one or more computers even if the file existed on a flash drive. At some point, the flash drive was connected to a computer system, where evidence on a system may show link files to the file. Each of these instances of access to the file is an opportunity to create a list of possible suspects having access to those systems in use at each updated metadata fields.

In the Microsoft Windows operating systems, Volume Shadow Copies may provide an examiner with a string of previous versions of a document, in which the modifications between each version can be determined. Although not every change may have been incrementally saved by the Volume Shadow Service, such as if the file was saved to a flash drive, any previous versions that can be found will allow to find some of the modifications made.

Where a single file will determine the outcome of an investigation or have a dramatic effect on the case, the importance of ‘getting it right’ cannot be overstated. Such would be the case of a single file, modified by someone in a business office, where many persons had common access to the evidence file before it was known to be evidence. Finding the suspect that altered the evidence file may be simple if you were at the location close to the time of occurrence. Interviews of the employees would be easier as most would remember their whereabouts in the office within the last few days. Some may be able to tell you exactly where other employees were in the office, even point the suspect out directly.

But what if you are called in a year later? How about 2 or more years later? What would be the odds employees remembering their whereabouts on a Monday in July 2 years earlier? To identify a suspect at this point requires more than a forensic analysis of a computer. It will probably require an investigation into work schedules, lunch schedules, backup tapes, phone call logs, and anything else to place everyone somewhere during the time of the file being altered.

Potentially you may even need to examine the hard drive of a copy machine and maybe place a person at the copy machine based on what was copied at the time the evidence file was being modified. When a company’s livelihood is at stake or a person’s career is at risk, leave no stone unturned. If you can’t place a suspect at the scene, you might be able to place everyone else at a location, and those you can’t place, just made your list of possible suspects.

Read full chapter

URL: 

https://www.sciencedirect.com/science/article/pii/B9781597499859000113

When, How, and Why Do We Trust Technology Too Much?

Patricia L. Hardré, in Emotions, Technology, and Behaviors, 2016

Trusting Spelling and Grammar Checkers

We often see evidence that users of word processing systems trust absolutely in spelling and grammar checkers. From errors in business letters and on resumes to uncorrected word usage in academic papers, this nonstrategy emerges as epidemic. It underscores a pattern of implicit trust that if a word is not flagged as incorrect in a word processing system, then it must be not only spelled correctly but also used correctly. The overarching error is trusting the digital checking system too much, while the underlying functional problem is that such software identifies gross errors (such as nonwords) but cannot discriminate finer nuances of language requiring judgment (like real words used incorrectly). Users from average citizens to business executives have become absolutely comfortable with depending on embedded spelling and grammar checkers that are supposed to autofind, trusting the technology so much that they often do not even proofread. Like overtrust of security monitoring, these personal examples are instances of reduced vigilance due to their implicit belief that the technology is functionally flawless, that if the technology has not found an error, then an error must not exist.

Read full chapter

URL: 

https://www.sciencedirect.com/science/article/pii/B9780128018736000054

Establishing a C&A Program

Laura Taylor, Matthew Shepherd Technical Editor, in FISMA Certification and Accreditation Handbook, 2007

Template Development

Certification Packages consist of a set of documents that all go together and complement one another. A Certification Package is voluminous, and without standardization, it takes an inordinate amount of time to evaluate it to make sure all the right information is included. Therefore, agencies should have templates for all the documents that they require in their Certification Packages. Agencies without templates should work on creating them. If an agency does not have the resources in-house to develop these templates, they should consider outsourcing this initiative to outside consultants.

A template should be developed using the word processing application that is the standard within the agency. All of the relevant sections that the evaluation team will be looking for within each document should be included. Text that will remain constant for a particular document type also should be included. An efficient and effective C&A program will have templates for the following types of C&A documents:

Categorization and Certification Level Recommendation

Hardware and Software Inventory

Self-Assessment

Security Awareness and Training Plan

End-User Rules of Behavior

Incident Response Plan

Security Test and Evaluation Plan

Privacy Impact Assessment

Business Risk Assessment

Business Impact Assessment

Contingency Plan

Configuration Management Plan

System Risk Assessment

System Security Plan

Security Assessment Report

The later chapters in this book will help you understand what should be included in each of these types of documents. Some agencies may possibly require other types of documents as required by their information security program and policies.

Templates should include guidelines for what type of content should be included, and also should have built-in formatting. The templates should be as complete as possible, and any text that should remain consistent and exactly the same in like document types should be included. Though it may seem redundant to have the exact same verbatim text at the beginning of, say, each Business Risk Assessment from a particular agency, each document needs to be able to stand alone and make sense if it is pulled out of the Certification Package for review. Having similar wording in like documents also shows that the packages were developed consistently using the same methodology and criteria.

With established templates in hand, it makes it much easier for the C&A review team to understand what it is that they need to document. Even expert C&A consultants need and appreciate document templates. Finding the right information to include the C&A documents can by itself by extremely difficult without first having to figure out what it is that you are supposed to find—which is why the templates are so very important. It’s often the case that a large complex application is distributed and managed throughout multiple departments or divisions and it can take a long time to figure out not just what questions to ask, but who the right people are who will know the answers.

Read full chapter

URL: 

https://www.sciencedirect.com/science/article/pii/B9781597491167500093

Speech Recognition

John-Paul Hosom, in Encyclopedia of Information Systems, 2003

I.B. Capabilities and Limitations of Automatic Speech Recognition

ASR is currently used for dictation into word processing software, or in a “command-and-control” framework in which the computer recognizes and acts on certain key words. Dictation systems are available for general use, as well as for specialized fields such as medicine and law. General dictation systems now cost under $100 and have speaker-dependent word-recognition accuracy from 93% to as high as 98%. Command-and-control systems are more often used over the telephone for automatically dialing telephone numbers or for requesting specific services before (or without) speaking to a human operator. Telephone companies use ASR to allow customers to automatically place calls even from a rotary telephone, and airlines now utilize telephone-based ASR systems to help passengers locate and reclaim lost luggage. Research is currently being conducted on systems that allow the user to interact naturally with an ASR system for goals such as making airline or hotel reservations.

Despite these successes, the performance of ASR is often about an order of magnitude worse than human-level performance, even with superior hardware and long processing delays. For example, recognition of the digits “zero” through “nine” over the telephone has word-level accuracy of about 98% to 99% using ASR, but nearly perfect recognition by humans. Transcription of radio broadcasts by world-class ASR systems has accuracy of less than 87%. This relatively low accuracy of current ASR systems has limited its use; it is not yet possible to reliably and consistently recognize and act on a wide variety of commands from different users.

Read full chapter

URL: 

https://www.sciencedirect.com/science/article/pii/B0122272404001647

Prototyping

Rex Hartson, Pardha Pyla, in The UX Book (Second Edition), 2019

20.7 Software Tools for Making Wireframes

Wireframes can be sketched using any drawing or word processing software package that supports creating and manipulating shapes. While many applications suffice for simple wireframing, we recommend tools designed specifically for this purpose. We use Sketch, a drawing app, to do all the drawing. Craft is a plug-in to Sketch that connects it to InVision, allowing you to export Sketch screen designs to InVision to incorporate hotspots as working links.

In the “Build mode” of InVision, you work on one screen at a time, adding rectangular overlays that are the hotspots. For each hotspot, you specify what other screen you go to when someone clicks on that hotspot in “Preview mode.” You get a nice bonus using InVision: In the “operate” mode, you, or the user, can click anywhere in an open space in the prototype and it highlights all the available links. These tools are available only on Mac computers, but similar tools are available under Windows.

Beyond this discussion, it’s not wise to try to cover software tools for making prototypes in this kind of textbook. The field is changing fast and whatever we could say here would be out of date by the time you read this. Plus, it wouldn’t be fair to the numerous other perfectly good tools that didn’t get cited. To get the latest on software tools for prototyping, it’s better to ask an experienced UX professional or to do your research online.

Read full chapter

URL: 

https://www.sciencedirect.com/science/article/pii/B9780128053423000205

Design Production

Rex Hartson, Partha S. Pyla, in The UX Book, 2012

9.5.3 How to Build Wireframes?

Wireframes can be built using any drawing or word processing software package that supports creating and manipulating shapes, such as iWork Pages, Keynote, Microsoft PowerPoint, or Word. While such applications suffice for simple wireframing, we recommend tools designed specifically for this purpose, such as OmniGraffle (for Mac), Microsoft Visio (for PC), and Adobe InDesign.

Many tools and templates for making wireframes are used in combination—truly an invent-as-you-go approach serving the specific needs of prototyping. For example, some tools are available to combine the generic-looking placeholders in wireframes with more detailed mockups of some screens or parts of screens. In essence they allow you to add color, graphics, and real fonts, as well as representations of real content, to the wireframe scaffolding structure.

In early stages of design, during ideation and sketching, you started with thinking about the high-level conceptual design. It makes sense to start with that here, too, first by wireframing the design concept and then by going top down to address major parts of the concept. Identify the interaction conceptual design using boxes with labels, as shown in Figure 9-4.

Take each box and start fleshing out the design details. What are the different kinds of interaction needed to support each part of the design, and what kinds of widgets work best in each case? What are the best ways to lay them out? Think about relationships among the widgets and any data that need to go with them. Leverage design patterns, metaphors, and other ideas and concepts from the work domain ontology. Do not spend too much time with exact locations of these widgets or on their alignment yet. Such refinement will come in later iterations after all the key elements of the design are represented.

As you flesh out all the major areas in the design, be mindful of the information architecture on the screen. Make sure the wireframes convey that inherent information architecture. For example, do elements on the screen follow a logical information hierarchy? Are related elements on the screen positioned in such a way that those relationships are evident? Are content areas indented appropriately? Are margins and indents communicating the hierarchy of the content in the screen?

Next it is time to think about sequencing. If you are representing a workflow, start with the “wake-up” state for that workflow. Then make a wireframe representing the next state, for example, to show the result of a user action such as clicking on a button. In Figure 9-6 we showed what happens when a user clicks on the “Related information” expander widget. In Figure 9-7 we showed what happens if the user clicks on the “One-up” view switcher button.

Once you create the key screens to depict the workflow, it is time to review and refine each screen. Start by specifying all the options that go on the screen (even those not related to this workflow). For example, if you have a toolbar, what are all the options that go into that toolbar? What are all the buttons, view switchers, window controllers (e.g., scrollbars), and so on that need to go on the screen? At this time you are looking at scalability of your design. Is the design pattern and layout still working after you add all the widgets that need to go on this screen?

Think of cases when the windows or other container elements such as navigation bars in the design are resized or when different data elements that need to be supported are larger than shown in the wireframe. For example, in Figures 9-5 and 9-6, what must happen if the number of photo collections is greater than what fits in the default size of that container? Should the entire page scroll or should new scrollbars appear on the left-hand navigation bar alone? How about situations where the number of people identified in a collection are large? Should we show the first few (perhaps ones with most number of associated photos) with a “more” option, should we use an independent scrollbar for that pane, or should we scroll the entire page? You may want to make wireframes for such edge cases; remember they are less expensive and easier to do using boxes and lines than in code.

As you iterate your wireframes, refine them further, increasing the fidelity of the deck. Think about proportions, alignments, spacing, and so on for all the widgets. Refine the wording and language aspects of the design. Get the wireframe as close to the envisioned design as possible within the constraints of using boxes and lines.

Read full chapter

URL: 

https://www.sciencedirect.com/science/article/pii/B9780123852410000099

– Equipment Or Concept? Essay, Research Paper

WORD PROCESSING-EQUIPMENT OR CONCEPT?

Introduction

Increasing administrative costs in recent years have made the
production of business communications a major expense and one that
will continue to rise. One way to help control the cost of business
communications is to make the processing of documents more
effective and efficient through the use of current technology. Word
processing equipment has been around for more than twenty years.
However, during the last decade it has really made an impact on the
business world.

There are two major contributing factors to this increased
impact. The first is technological advances made in the area of
equipment manufacturing. The second, and just as important, is the
acceptance of the concept of word processing as a system rather
than just a piece of hardware.

Background

Word processing first appeared in the business environment on a
widely distributed basis in 1964. Since that time, the question,
?What is word processing?? has been heard all over the country.
When this question is asked, it is usually aimed primarily at
hardware. But word processing should not be thought of as a piece
of equipment; rather it is a concept for improving the efficiency
of producing business communications. Equipment is but one of
several tools used in the construction of a word processing system.
Word processing is now being accepted as the capability to
transform ideas into written word by employing procedures,
equipment, and people. These three ingredients make word processing
a viable solution to increasing the efficiency and reducing the
cost of producing business communications.

The next question is usually, ?How does word processing actually
work?? Very simply stated, text material can be stored and
retrieved later for manipulation during revision cycles. This
process eliminates the need for lengthy rekeying due to errors or
changes in the document. This process is ideal for long documents
or any document that goes through several revision cycles. Accuracy
and quality are increased because you are only rekeying changed
portions of the document. Processing time is greatly reduced for
all work produced on word processing equipment.

This simple explanation has discussed the benefits available
through word processing. Reductions of processing or keyboarding
time and increases in quality and accuracy are the most important
benefits to be gained from word processing. These benefits can only
be gained, however, by using the three tools discussed earlier to
build your word processing system.

Procedures

Procedures are the backbone of any word processing system.
Automation is not a panacea in itself. However, procedures to
dictate what, how, and when this equipment should be used will
remove many of your administrative burdens. Procedures should be
implemented whether you are employing a centralized or
decentralized processing environment. There should be two sets of
procedures: one for the personnel submitting work to be processed
and another for the operators.

Author?s manual

The author?s manual should include a detailed system
description, along with instructions on how to submit work and what
can be expected of the system. When writing these procedures, keep
in mind that they are not cast in concrete. Procedures should be
reviewed every six months and, as circumstances change, revised and
rewritten. The following items should be considered for inclusion
in the author?s manual:

Goals of the word processing system

System descriptions

Word flow diagrams

Services offered

Dictation guidelines

Transmittal slips

Priorities

Turnaround times

Media retention

Special projection scheduling

Proofreading marks

Corrections

Additional services; e.g., communications, telex, facsimiles

This manual is intended to inform the author or word originator
how to effectively utilize the resources available. If these
guidelines are followed, your authors should know what to submit,
how to submit it, and what to expect in terms of output. With this
accomplished, you have taken a giant stride toward ensuring the
effectiveness of your word processing system.

Operator?s manual

The operator?s manual should include equipment, system, and
document information as well as office standards.
This manual
should be a comprehensive guide outlining exactly what is expected
and who is responsible. The following items should be considered
for the inclusion in the operator?s manual:

System description

Equipment description

Equipment maintenance instructions (on and off instructions,
etc.)

Work flow diagrams

Distribution of work

Priorities

Recordkeeping instructions and forms

Document and machine set-ups (include samples)

Explanation of company standards

This guide is not only informative for full-time employees, but
it is especially helpful in training temporaries and part-time
employees. This manual should contain information necessary to
accomplish all functions of the job other than training to use the
equipment.

Procedures really are the foundation that our system will be
built on. The advances in technology in word processing have been
phenomenal in the last ten years. Because of increases technology,
it is very important to control this area, and the only way to do
that is through a systematic procedural approach.

Equipment

Selecting equipment for a word processing installation is
without a doubt a difficult task. Technical information about
hardware and software is readily available through sources like
trade journals, vendors, consumer reports, consulting firms, and
word processing associations. The problem arises in applying the
information you have compiled to the needs of your organization.
Theses needs are the foundation on which you design your system and
should be the basis on which you make your equipment selection.

The first step in evaluating the type of equipment needed is to
ascertain the types of work performed in your organization. You
should break down by percentages the instances of short and long
letters and memos, repetitive letter, reports, statistical work,
forms, printing applications, and communications use. The
complexity of text editing and manipulation should be determined
for each of these categories. With this information, you should be
able to decide on a category of equipment to fit your needs. Every
organization?s needs and applications for word processing equipment
are different. No single type of equipment, therefore, is the best
for all situations. But one of the types available will fit into
and meet your word processing needs.

Staffing

Personnel is the last building block in constructing your word
processing system. It is not listed last because of order of
importance, however, A well-qualified staff will mean the
difference between success and failure. The traditional methods of
producing documents in the office have changed. The qualifications
needed for a good word processor can be broken down into tangible
and intangible key factors. In the tangible area there are seven
basic background skills that are necessary:

Fast and accurate keyboarding

Transcription of dictation

Proofreading

Grammatical skills

Use of resource materials

Mathematics

Concepts and theory of word processing

Intangible personality traits represent a large area of
qualifications that are just as necessary:

A service attitude-proffesional, businesslike, cooperative, and
positive

A sense of humor

Aptitude for machines

Ability to concentrate

Good logical problem-solving skills

Stability

Responsibility, sense of pride in work

Good team attitude, respect for standard procedures

This formula is not foolproof; an individual with these
qualifications still may not make a good word processing operator.
However, an individual possessing these skills is certainly a
well-qualified applicant for word processing positions and could be
an asset to your word processing system.

Conclusion

The answer to the question, ?What is word processing?? is that
it is a concept. This concept is based on three ingredients

Procedures dictate what, how, and when paperwork will be
produced.

The equipment is the tool to accomplish the result.

Word processing personnel actually produce the result, using
procedures and the equipment.

By employing all three ingredients you should be able to greatly
increase the efficiency of processing paperwork in your office.

cn

?Venice? Encyclopedia of Britannica Online. [Accessed January 3
2000]

Holt, Rinehart, and Winston. World Geography Today. Austin TX:
Harcourt Brace & Company, 1997

Word processing is the process of adding text to a word processing unit such as a computer or typewriter. The typed words are stored in the computer or word processor temporarily to allow for editing before a hard copy of the document. The term «word processing» is a fairly general term, so it may refer to several types of writing without the use of pen and paper. Typewriters, for example, process words directly onto a paper without storing the data, while computers use specific programs to store the typed data before printing.

Modified typewriters have been commonly used in the past for word processing. The typewriter would store the data — usually with the use of a computer chip — before printing the words onto a page. The person using the word processor could then check the writing for errors before printing the final draft. When computers became common in the workplace and at home, word processors became mostly obsolete, though some models are still used for a wide range of purposes, including as educational devices for students with special needs.

Typewriters create words directly on paper without storing any data.

Typewriters create words directly on paper without storing any data.

Computers have generally taken over word processing duties. The computers feature specific programs in which a person can type manuscripts of any length. The data is stored as an electronic document that can be opened, closed, saved, and edited at any time. This allows the user to make corrections or changes to a document multiple times before printing out a hard copy of the document. In many cases, the document is not printed out onto hard copy paper at all; instead, it can be used on the internet, in e-mails, or for other digital purposes.

Computers use specific word processing programs to store the typed data before printing.

Computers use specific word processing programs to store the typed data before printing.

Simpler programs, such as text editors or notepads, can be used to record text quickly without excess formatting options, such as multiple fonts or font sizes. Such programs are easy to use and do not come loaded with formatting features, such as color, multiple fonts, line spacing options, and so on. They are meant to be used for quick word processing that will not need to be formatted for presentation.

Word processing software often includes several features unavailable on typewriters or older word processors. Such features may include the ability to manipulate the layout of the text, the size and color of the font, the type of font used, line spacing, margin adjustments, and the ability to insert photos, web links, graphs, charts, and other objects directly into the document.

Word
processing
is
the use of a word processor to create documents using computers.

Word
processing can also refer to advanced shorthand techniques.
Shorthand is an abbreviated symbolic writing method that improves
speed of writing or brevity as compared to a normal method of
writing a language. The process of writing in shorthand is
stenography. Typical shorthand systems provide symbols or
abbreviations for words and common phrases, which allow someone well
trained in the system to write as people speak.

Shorthand was user more
widely in the past, before the invention of recording and dictation
machines. Until recently, shorthand was considered as essential part
of secretarial training and was useful for journalists as well
Shorthand notes are typically temporary, intended for later
transcription to longhand, sometimes used in conjunction with
specialized Keyboard. In this sense of the term, the processing may
or may not be being done on a computer terminal, but on a modified
typewriter.

Word processing developed as
specialized application programs, on mainframe computers during the
1970’s as “online computing” (with the use of personal
terminal devices having from text based editors used by programmers
and computer professionals. The advent of microprocessors and, in
the late 1970’s, the ability to place intelligent devices on the
desks of workers of reasonable cost in duding cheaper and smaller
printers, led to “ word processing”. These were primarily acmes
at typists, particularly those in centralized typing pools where
other workers send handwritten notes or Dictaphone tapes to be
transcribed into documents for printing and returning. Considerable
time saving economics were achieved by word processing operators.
Especially as the word processing systems evolved to give more
powerful functions.

By the early 1990’s, the
typing and word processing pool had disappeared. The evolution of
word processing software continued with both increased ability and
ease of use as PC’s increased in power and as graphical user
interfaces become powerful document creation packages able to
manipulate images as well as text to create publications to a
standard. Not only the typing pool disappeared but the career of
typist too.

The evolution from typing
using mechanical devises to electronic word processing systems to
“do – it yourself” PC based packages provided commercial.
Companies rose and grew strong and then declined and even
disappeared as a result of the fast changes. Wand computers is the
best example of a company that became very successful on the back of
specialized word processing systems but then collapsed when it lost
its revenue from word processing systems develop.

Exercise
17. Answer the questions.

1. What is
word
processing?

2. What
does shorthand
improve?

3. What
does stenography
mean?

4. What
are shorthand
notes?

5. What
did word
processing application programs evolve from?

6. What
led to the introduction of machines dedicated to “word
processing”?

7. What
was achieved by word
processing operators?

8. When
did the typing and word
processing pool disappear? Why?

9. What
happened to companies as a result of the fast changes? Give an
example.

Exercise
18. Give the equivalents:

Symbolic
writing method, invention of recording and dictation machines, in
conjunction with specialized keyboard, specialized application
programs, advanced shorthand technique, abbreviated symbolic writing
method, secretarial training, later transcription to long hand,
modified typewriter, centralized typing pools, to be typically
temporary, lead to the introduction of machines, to be achieved by
word processing operators, to become powerful document creation, to
write as people speak, to rise and grow strong, disappear as a
result of quick changes, to loose the revenue.

Exercise
19. Match the terms to their explanations:

terms

explanations

shorthand

something that was created

stenography

to reach

invention

result of success

advent

symbolic writing method

achieve

apparition of something
new

revenue

the process of writing in
Shorthand

Exercise
20. Decide if the following statements are true or false. Correct
the false ones:

1.
Shorthand
is widely used nowadays.

2.
Shorthand notes are usually permanent.

3.
The advent of microprocessors led to the introduction of dedicated
machines.

4.
By the early 1990’s the career of typist had disappeared.

5.
Wand computers is the best example of a company that became very
successful.

Exercise
21.
Study
the given
definitions
by heart.

1.
Shorthand
is an abbreviated symbolic writing method that improves speed of
writing.

2. Word
processing

is a specialized application program, evolved to give more powerful
functions.

3. The
process of writing in shorthand is stenography,
from the Greek “stenos” (narrow, close).

Exercise
22. Find all the sentences with Past Participle and Present
Participle in the function of attribute translate them.

Exercise
23. Make a short summary of the text.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]

  • #
  • #
  • #
  • #
  • #
  • #
  • #
  • #

    19.02.20167.56 Mб23n1.djvu

  • #

    19.02.201641.37 Mб36n1.pdf

  • #
  • #

word_processing, software, review, technical_writingWhat is a Word Processor?

You might have heard the widely thrown around term of ‘paperless office’ or ‘paperless environment’. Although we’re still a long way off from realizing that dream, but there are instances where paper as such is no longer required to any type of official business level communication.

Most of the credit for this definitely goes to word processor programs and applications that help employees put in their communication through digital means. Not only have such word processors allowed for quick and easy communication internally (or externally) within an organization but also has helped improve effectiveness and efficiency of a workplace – since waiting times have been reduced drastically.

So before we dive deep into the different types of word processors available in the market, let’s have a look at how it all began.

The History of Word Processor – How It All Began?

Take today’s word processors as an extension or an evolved form of a type writer. Originally marketed back in 1867, a manual typewriter was first introduced in to the market by a gun manufacturing company.

The first phase of this evolution involved electric typewriters, which could be used for typing of letters automatically while adding/removing specific letters in case of any corrections.

Automatic Typewriters

This was as ‘automatic’ as you could get – a type writer person would manually type something, then proof read it for any mistakes. Once he/she was satisfied, a final re-type would be needed to actually finish the document.

The operators in charge of these word processors were trained typists, who had to be very careful with specifics of a page like orientation, line spacing, page width and all of these details had to be taken into consideration manually. Later on, change in font was added as a new feature enjoyed by some of the leading newspaper agencies for their print production and newsletters. The default ‘typing ball’ font slowly was replaced by a collection of changeable fonts.

From Typewriters to Word Processors

At that time, there were no personal computers. Machines would specifically be built for the purpose of word processing. Rather than evolving through ideas of mathematicians and computer geeks, the word processor was in fact born out of the necessity of writers. Later on, as the computers started to trickle down into our personal lives did we see word processors integrated with the personal computer.

As such, the actual introduction of word processing software that we see today is not marked for sure with a historical timeline. But it’s safe to say that with the mass division of personal computers and printers in the early 1990’s, typewriters as such were fully replaced with dedicated word processing software and programs rather than having to resort to separate machines for typing text on to paper.

Let us fast forward to present time and see what exactly are Word Processors used for nowadays.

Word Processors – What Are They Used For?

In a contemporary office (or a professional) environment, a word processing software is used to create documents and reports like for example a resume or a marketing proposal. Text is entered by typing letters using a keyboard on to a software that takes care of the functions of editing, copying, pasting, deleting and other formatting methods.

Features of a Word Processor

Some of the basic features of a word processor includes:

  • Copying, editing, saving and printing reports and documents
  • Copying, deleting, pasting, and shifting text within a certain page/document
  • Formatting of text like changing size (font size), italicizing (italics), bolding (bold) or strikethroughs and underlines
  • Formatting tables (drawing/inserting rows and columns to make full-fledged tables)
  • Placing pictures, graphs and all sorts of illustrations within and around the text document
  • Correction of spelling mistakes and a fully functioning dictionary in most cases

Word processing software should not be confused with simple text editors. Text editors (like Window’s Notepad) can also allow you to type in text with a few basic formatting inputs but don’t have the more advanced features like underlining, different fonts, adding pictures and graphs etc.

Top Three Popular and Best Word Processors

So let us now look at what word processors are the best options available out there in the market. We will start off with the most popular one as of yet; Microsoft Word.

Microsoft Word

Microsoft Word, word_processor, ms_word, word_2013Microsoft Word is hands down the most popular of all word processing software out there. According to the company Microsoft itself, the estimation is that around half a billion people on this planet currently use Microsoft Word for the purpose of word processing. It is therefore no surprise that 90 percent of the word processing market share is captured by Microsoft Word.

Originally introduced to the public back in the year 1989, the current version of Microsoft Word has seen numerous updates (multiple times each year) and comes as a package with the suite of Office applications along with PowerPoint, Publisher, Excel, and Outlook.

WordPerfect

WordPerfect, word_processor, softwareIf you ask someone knowledgeable in the computer industry to name a software other than Microsoft Word itself, the word WordPerfect will be the obvious answer. More suited towards writing short essays and quick articles, WordPerfect best strength is its compatibility with Microsoft Word. A bit ironic but it definitely does the trick when you need to open up WordPerfect documents with Microsoft Word.

Lotus Word Pro

Lotus Word Pro, word_processor, software, word_processingIf your office computers are integrated on Lotus portal, then Lotus Word Pro is your ideal for all your needs. Lotus Word Pro can be connected with all your Lotus applications to produce properly formatted documents. Although it’s produced and distributed by IBM Corporation, it’s also compatible with Windows based programs particularly Microsoft Word.

Author: Bilal Ibrar

A marketing graduate with a passion for writing on topics related to social media, technology and business in general. Hobbies include gaming, animation and motorsports

Понравилась статья? Поделить с друзьями:
  • Explanation of word problems
  • Explanation of word problem
  • Explanation of word order
  • Explanation of the word time
  • Explanation of russian word