Word Processing
Andrew Prestage, in Encyclopedia of Information Systems, 2003
I. An Introduction to Word Processing
Word processing is the act of using a computer to transform written, verbal, or recorded information into typewritten or printed form. This chapter will discuss the history of word processing, identify several popular word processing applications, and define the capabilities of word processors.
Of all the computer applications in use, word processing is by far the most common. The ability to perform word processing requires a computer and a special type of computer software called a word processor. A word processor is a program designed to assist with the production of a wide variety of documents, including letters, memoranda, and manuals, rapidly and at relatively low cost. A typical word processor enables the user to create documents, edit them using the keyboard and mouse, store them for later retrieval, and print them to a printer. Common word processing applications include Microsoft Notepad, Microsoft Word, and Corel WordPerfect.
Word processing technology allows human beings to freely and efficiently share ideas, thoughts, feelings, sentiments, facts, and other information in written form. Throughout history, the written word has provided mankind with the ability to transform thoughts into printed words for distribution to hundreds, thousands, or possibly millions of readers around the world. The power of the written word to transcend verbal communications is best exemplified by the ability of writers to share information and express ideas with far larger audiences and the permanency of the written word.
The increasingly large collective body of knowledge is one outcome of the permanency of the written word, including both historical and current works. Powered by decreasing prices, increasing sophistication, and widespread availability of technology, the word processing revolution changed the landscape of communications by giving people hitherto unavailable power to make or break reputations, to win or lose elections, and to inspire or mislead through the printed word.
Read full chapter
URL:
https://www.sciencedirect.com/science/article/pii/B0122272404001982
Computers and Effective Security Management1
Charles A. Sennewald, Curtis Baillie, in Effective Security Management (Sixth Edition), 2016
Word Processing
Word processing software can easily create, edit, store, and print text documents such as letters, memoranda, forms, employee performance evaluations (such as those in Appendix A), proposals, reports, security surveys (such as those in Appendix B), general security checklists, security manuals, books, articles, press releases, and speeches. A professional-looking document can be easily created and readily updated when necessary.
The length of created documents is limited only by the storage capabilities of the computer, which are enormous. Also, if multiple copies of a working document exist, changes to it should be promptly communicated to all persons who use the document. Specialized software, using network features, can be programmed to automatically route changes to those who need to know about updates.
Read full chapter
URL:
https://www.sciencedirect.com/science/article/pii/B9780128027745000241
Globalization
Jennifer DeCamp, in Encyclopedia of Information Systems, 2003
II.D.2.c. Rendering Systems
Special word processing software is usually required to correctly display languages that are substantially different from English, for example:
- 1.
-
Connecting characters, as in Arabic, Persian, Urdu, Hindi, and Hebrew
- 2.
-
Different text direction, as in the right-to-left capability required in Arabic, Persian, Urdu, and Hindi, or the right-to-left and top-to-bottom capability in formal Chinese
- 3.
-
Multiple accents or diacritics, such as in Vietnamese or in fully vowelled Arabic
- 4.
-
Nonlinear text entry, as in Hindi, where a vowel may be typed after the consonant but appears before the consonant.
Alternatives to providing software with appropriate character rendering systems include providing graphic files or elaborate formatting (e.g., backwards typing of Arabic and/or typing of Arabic with hard line breaks). However, graphic files are cumbersome to download and use, are space consuming, and cannot be electronically searched except by metadata. The second option of elaborate formatting often does not look as culturally appropriate as properly rendered text, and usually loses its special formatting when text is added or is upgraded to a new system. It is also difficult and time consuming to produce. Note that Microsoft Word 2000 and Office XP support the above rendering systems; Java 1.4 supports the above rendering systems except for vertical text.
Read full chapter
URL:
https://www.sciencedirect.com/science/article/pii/B0122272404000800
Text Entry When Movement is Impaired
Shari Trewin, John Arnott, in Text Entry Systems, 2007
15.3.2 Abbreviation Expansion
Popular word processing programs often include abbreviation expansion capabilities. Abbreviations for commonly used text can be defined, allowing a long sequence such as an address to be entered with just a few keystrokes. With a little investment of setup time, those who are able to remember the abbreviations they have defined can find this a useful technique. Abbreviation expansion schemes have also been developed specifically for people with disabilities (Moulton et al., 1999; Vanderheiden, 1984).
Automatic abbreviation expansion at phrase/sentence level has also been investigated: the Compansion (Demasco & McCoy, 1992; McCoy et al., 1998) system was designed to process and expand spontaneous language constructions, using Natural Language Processing to convert groups of uninflected content words automatically into full phrases or sentences. For example, the output sentence “John breaks the window with the hammer” might derive from the user input text “John break window hammer” using such an approach.
With the rise of text messaging on mobile devices such as mobile (cell) phones, abbreviations are increasingly commonplace in text communications. Automatic expansion of many abbreviations may not be necessary, however, depending on the context in which the text is being used. Frequent users of text messaging can learn to recognize a large number of abbreviations without assistance.
Read full chapter
URL:
https://www.sciencedirect.com/science/article/pii/B9780123735911500152
Case Studies
Brett Shavers, in Placing the Suspect Behind the Keyboard, 2013
Altered evidence and spoliation
Electronic evidence in the form of word processing documents which were submitted by a party in litigation is alleged to have been altered. Altered electronic evidence has become a common claim with the ability to determine the changes becoming more difficult. How do you know if an email has been altered? What about a text document?
Case in Point
Odom v Microsoft and Best Buy, 2006
The Odom v Microsoft and Best Buy litigation primarily focused on Internet access offered to customers in which the customers were automatically billed for Internet service without their consent. One of the most surprising aspects of this case involved the altering of electronic evidence by an attorney for Best Buy. The attorney, Timothy Block, admitted to altering documents prior to producing the documents in discovery to benefit Best Buy.
Investigative Tips: All evidence needs to be validated for authenticity. The weight given in legal hearings depends upon the veracity of the evidence. Many electronic files can be quickly validated through hash comparisons. An example seen in Figure 11.4 shows two files with different file names, yet their hash values are identical. If one file is known to be valid, perhaps an original evidence file, any file matching the hash values would also be a valid and unaltered copy of the original file.
Figure 11.4. Two files with different file names, but having the same hash value, indicating the contents of the files are identical.
Alternatively, Figure 11.5 shows two files with the same file name but having different hash values. If there were a claim that both of these files are the same original files, it would be apparent that one of the files has been modified.
Figure 11.5. Two files with the same file names, but having different hash values, indicating the contents are not identical.
Finding the discrepancies or modifications of an electronic file can only be accomplished if there is a comparison to be made with the original file. Using Figure 11.5 as an example, given that the file having the MD5 hash value of d41d8cd98f00b204e9800998ecf8427e is the original, and where the second file is the alleged altered file, a visual inspection of both files should be able to determine the modifications. However, when only file exists, proving the file to be unaltered is more than problematic, it is virtually impossible.
In this situation of having a single file to verify as original and unaltered evidence, an analysis would only be able to show when the file was modified over time, but the actual modifications won’t be known. Even if the document has “track changed” enabled, which logs changes to a document, that would only capture changes that were tracked, as there may be more untracked and unknown changes.
As a side note to hash values, in Figure 11.5, the hash values are completely different, even though the only difference between the two sample files is a single period added to the text. Any modification, no matter how minor, results in a drastic different hash value.
The importance in validating files in relation to the identification of a suspect that may have altered a file is that the embedded metadata will be a key point of focus and avenue for case leads. As a file is created, copied, modified, and otherwise touched, the file and system metadata will generally be updated.
Having the dates and times of these updates should give rise to you that the updates occurred on some computer system. This may be on one or more computers even if the file existed on a flash drive. At some point, the flash drive was connected to a computer system, where evidence on a system may show link files to the file. Each of these instances of access to the file is an opportunity to create a list of possible suspects having access to those systems in use at each updated metadata fields.
In the Microsoft Windows operating systems, Volume Shadow Copies may provide an examiner with a string of previous versions of a document, in which the modifications between each version can be determined. Although not every change may have been incrementally saved by the Volume Shadow Service, such as if the file was saved to a flash drive, any previous versions that can be found will allow to find some of the modifications made.
Where a single file will determine the outcome of an investigation or have a dramatic effect on the case, the importance of ‘getting it right’ cannot be overstated. Such would be the case of a single file, modified by someone in a business office, where many persons had common access to the evidence file before it was known to be evidence. Finding the suspect that altered the evidence file may be simple if you were at the location close to the time of occurrence. Interviews of the employees would be easier as most would remember their whereabouts in the office within the last few days. Some may be able to tell you exactly where other employees were in the office, even point the suspect out directly.
But what if you are called in a year later? How about 2 or more years later? What would be the odds employees remembering their whereabouts on a Monday in July 2 years earlier? To identify a suspect at this point requires more than a forensic analysis of a computer. It will probably require an investigation into work schedules, lunch schedules, backup tapes, phone call logs, and anything else to place everyone somewhere during the time of the file being altered.
Potentially you may even need to examine the hard drive of a copy machine and maybe place a person at the copy machine based on what was copied at the time the evidence file was being modified. When a company’s livelihood is at stake or a person’s career is at risk, leave no stone unturned. If you can’t place a suspect at the scene, you might be able to place everyone else at a location, and those you can’t place, just made your list of possible suspects.
Read full chapter
URL:
https://www.sciencedirect.com/science/article/pii/B9781597499859000113
When, How, and Why Do We Trust Technology Too Much?
Patricia L. Hardré, in Emotions, Technology, and Behaviors, 2016
Trusting Spelling and Grammar Checkers
We often see evidence that users of word processing systems trust absolutely in spelling and grammar checkers. From errors in business letters and on resumes to uncorrected word usage in academic papers, this nonstrategy emerges as epidemic. It underscores a pattern of implicit trust that if a word is not flagged as incorrect in a word processing system, then it must be not only spelled correctly but also used correctly. The overarching error is trusting the digital checking system too much, while the underlying functional problem is that such software identifies gross errors (such as nonwords) but cannot discriminate finer nuances of language requiring judgment (like real words used incorrectly). Users from average citizens to business executives have become absolutely comfortable with depending on embedded spelling and grammar checkers that are supposed to autofind, trusting the technology so much that they often do not even proofread. Like overtrust of security monitoring, these personal examples are instances of reduced vigilance due to their implicit belief that the technology is functionally flawless, that if the technology has not found an error, then an error must not exist.
Read full chapter
URL:
https://www.sciencedirect.com/science/article/pii/B9780128018736000054
Establishing a C&A Program
Laura Taylor, Matthew Shepherd Technical Editor, in FISMA Certification and Accreditation Handbook, 2007
Template Development
Certification Packages consist of a set of documents that all go together and complement one another. A Certification Package is voluminous, and without standardization, it takes an inordinate amount of time to evaluate it to make sure all the right information is included. Therefore, agencies should have templates for all the documents that they require in their Certification Packages. Agencies without templates should work on creating them. If an agency does not have the resources in-house to develop these templates, they should consider outsourcing this initiative to outside consultants.
A template should be developed using the word processing application that is the standard within the agency. All of the relevant sections that the evaluation team will be looking for within each document should be included. Text that will remain constant for a particular document type also should be included. An efficient and effective C&A program will have templates for the following types of C&A documents:
- ▪
-
Categorization and Certification Level Recommendation
- ▪
-
Hardware and Software Inventory
- ▪
-
Self-Assessment
- ▪
-
Security Awareness and Training Plan
- ▪
-
End-User Rules of Behavior
- ▪
-
Incident Response Plan
- ▪
-
Security Test and Evaluation Plan
- ▪
-
Privacy Impact Assessment
- ▪
-
Business Risk Assessment
- ▪
-
Business Impact Assessment
- ▪
-
Contingency Plan
- ▪
-
Configuration Management Plan
- ▪
-
System Risk Assessment
- ▪
-
System Security Plan
- ▪
-
Security Assessment Report
The later chapters in this book will help you understand what should be included in each of these types of documents. Some agencies may possibly require other types of documents as required by their information security program and policies.
Templates should include guidelines for what type of content should be included, and also should have built-in formatting. The templates should be as complete as possible, and any text that should remain consistent and exactly the same in like document types should be included. Though it may seem redundant to have the exact same verbatim text at the beginning of, say, each Business Risk Assessment from a particular agency, each document needs to be able to stand alone and make sense if it is pulled out of the Certification Package for review. Having similar wording in like documents also shows that the packages were developed consistently using the same methodology and criteria.
With established templates in hand, it makes it much easier for the C&A review team to understand what it is that they need to document. Even expert C&A consultants need and appreciate document templates. Finding the right information to include the C&A documents can by itself by extremely difficult without first having to figure out what it is that you are supposed to find—which is why the templates are so very important. It’s often the case that a large complex application is distributed and managed throughout multiple departments or divisions and it can take a long time to figure out not just what questions to ask, but who the right people are who will know the answers.
Read full chapter
URL:
https://www.sciencedirect.com/science/article/pii/B9781597491167500093
Speech Recognition
John-Paul Hosom, in Encyclopedia of Information Systems, 2003
I.B. Capabilities and Limitations of Automatic Speech Recognition
ASR is currently used for dictation into word processing software, or in a “command-and-control” framework in which the computer recognizes and acts on certain key words. Dictation systems are available for general use, as well as for specialized fields such as medicine and law. General dictation systems now cost under $100 and have speaker-dependent word-recognition accuracy from 93% to as high as 98%. Command-and-control systems are more often used over the telephone for automatically dialing telephone numbers or for requesting specific services before (or without) speaking to a human operator. Telephone companies use ASR to allow customers to automatically place calls even from a rotary telephone, and airlines now utilize telephone-based ASR systems to help passengers locate and reclaim lost luggage. Research is currently being conducted on systems that allow the user to interact naturally with an ASR system for goals such as making airline or hotel reservations.
Despite these successes, the performance of ASR is often about an order of magnitude worse than human-level performance, even with superior hardware and long processing delays. For example, recognition of the digits “zero” through “nine” over the telephone has word-level accuracy of about 98% to 99% using ASR, but nearly perfect recognition by humans. Transcription of radio broadcasts by world-class ASR systems has accuracy of less than 87%. This relatively low accuracy of current ASR systems has limited its use; it is not yet possible to reliably and consistently recognize and act on a wide variety of commands from different users.
Read full chapter
URL:
https://www.sciencedirect.com/science/article/pii/B0122272404001647
Prototyping
Rex Hartson, Pardha Pyla, in The UX Book (Second Edition), 2019
20.7 Software Tools for Making Wireframes
Wireframes can be sketched using any drawing or word processing software package that supports creating and manipulating shapes. While many applications suffice for simple wireframing, we recommend tools designed specifically for this purpose. We use Sketch, a drawing app, to do all the drawing. Craft is a plug-in to Sketch that connects it to InVision, allowing you to export Sketch screen designs to InVision to incorporate hotspots as working links.
In the “Build mode” of InVision, you work on one screen at a time, adding rectangular overlays that are the hotspots. For each hotspot, you specify what other screen you go to when someone clicks on that hotspot in “Preview mode.” You get a nice bonus using InVision: In the “operate” mode, you, or the user, can click anywhere in an open space in the prototype and it highlights all the available links. These tools are available only on Mac computers, but similar tools are available under Windows.
Beyond this discussion, it’s not wise to try to cover software tools for making prototypes in this kind of textbook. The field is changing fast and whatever we could say here would be out of date by the time you read this. Plus, it wouldn’t be fair to the numerous other perfectly good tools that didn’t get cited. To get the latest on software tools for prototyping, it’s better to ask an experienced UX professional or to do your research online.
Read full chapter
URL:
https://www.sciencedirect.com/science/article/pii/B9780128053423000205
Design Production
Rex Hartson, Partha S. Pyla, in The UX Book, 2012
9.5.3 How to Build Wireframes?
Wireframes can be built using any drawing or word processing software package that supports creating and manipulating shapes, such as iWork Pages, Keynote, Microsoft PowerPoint, or Word. While such applications suffice for simple wireframing, we recommend tools designed specifically for this purpose, such as OmniGraffle (for Mac), Microsoft Visio (for PC), and Adobe InDesign.
Many tools and templates for making wireframes are used in combination—truly an invent-as-you-go approach serving the specific needs of prototyping. For example, some tools are available to combine the generic-looking placeholders in wireframes with more detailed mockups of some screens or parts of screens. In essence they allow you to add color, graphics, and real fonts, as well as representations of real content, to the wireframe scaffolding structure.
In early stages of design, during ideation and sketching, you started with thinking about the high-level conceptual design. It makes sense to start with that here, too, first by wireframing the design concept and then by going top down to address major parts of the concept. Identify the interaction conceptual design using boxes with labels, as shown in Figure 9-4.
Take each box and start fleshing out the design details. What are the different kinds of interaction needed to support each part of the design, and what kinds of widgets work best in each case? What are the best ways to lay them out? Think about relationships among the widgets and any data that need to go with them. Leverage design patterns, metaphors, and other ideas and concepts from the work domain ontology. Do not spend too much time with exact locations of these widgets or on their alignment yet. Such refinement will come in later iterations after all the key elements of the design are represented.
As you flesh out all the major areas in the design, be mindful of the information architecture on the screen. Make sure the wireframes convey that inherent information architecture. For example, do elements on the screen follow a logical information hierarchy? Are related elements on the screen positioned in such a way that those relationships are evident? Are content areas indented appropriately? Are margins and indents communicating the hierarchy of the content in the screen?
Next it is time to think about sequencing. If you are representing a workflow, start with the “wake-up” state for that workflow. Then make a wireframe representing the next state, for example, to show the result of a user action such as clicking on a button. In Figure 9-6 we showed what happens when a user clicks on the “Related information” expander widget. In Figure 9-7 we showed what happens if the user clicks on the “One-up” view switcher button.
Once you create the key screens to depict the workflow, it is time to review and refine each screen. Start by specifying all the options that go on the screen (even those not related to this workflow). For example, if you have a toolbar, what are all the options that go into that toolbar? What are all the buttons, view switchers, window controllers (e.g., scrollbars), and so on that need to go on the screen? At this time you are looking at scalability of your design. Is the design pattern and layout still working after you add all the widgets that need to go on this screen?
Think of cases when the windows or other container elements such as navigation bars in the design are resized or when different data elements that need to be supported are larger than shown in the wireframe. For example, in Figures 9-5 and 9-6, what must happen if the number of photo collections is greater than what fits in the default size of that container? Should the entire page scroll or should new scrollbars appear on the left-hand navigation bar alone? How about situations where the number of people identified in a collection are large? Should we show the first few (perhaps ones with most number of associated photos) with a “more” option, should we use an independent scrollbar for that pane, or should we scroll the entire page? You may want to make wireframes for such edge cases; remember they are less expensive and easier to do using boxes and lines than in code.
As you iterate your wireframes, refine them further, increasing the fidelity of the deck. Think about proportions, alignments, spacing, and so on for all the widgets. Refine the wording and language aspects of the design. Get the wireframe as close to the envisioned design as possible within the constraints of using boxes and lines.
Read full chapter
URL:
https://www.sciencedirect.com/science/article/pii/B9780123852410000099
Unit 9. Basic word processing skills
Click play on the following audio player to listen along as you read this section.
– the use of a program (software application) running on a computer that allows users to create, edit, format, and store documents.
Create a Document
Steps to create a new word processing document (Word, Office 365):
- Start Microsoft Word.
- Click the File tab.
- Click the New tab.
- Click Blank document. (A new blank document appears.)
- Type your text. The text you type will be inserted into the document.
Edit a Document
– making revisions to a document, focusing on correcting errors, improving the accuracy of language, rearranging, making words and sentences clearer and more effective, etc.
Editing in word processing may include the following tasks:
- Adding text (terms, phrases, paragraphs, etc.)
- Deleting a part of a text
- Copying text
- Moving text
- Pasting text
- Checking for grammar and spelling
- Formatting text
Select Text
Before editing text, you’ll need to select it. This is also sometimes called “highlighting text.”
- Click File Explorer icon.
- Go to the location where stores your file or folder (hard drive, USB, etc.).
- Open the document you wish to edit.
- Move the I-beam pointer to where you wish to select text.
- To select a word: double-click the word.
- To select an entire line of text: move the I-beam to the left of the line until it turns into a right-pointing arrow, then click.
- To select a paragraph: triple-click the paragraph.
- To select any amount of text: click and drag the I-beam over the text to highlight it.
- To select an entire document: move the I-beam to the left of any text until it turns into a right-pointing arrow , then triple-click. Or click the Home tab, under Editing, click Select, and then click Select All.
Delete (or remove) text
Method 1
- Select the text you wish to delete.
- Press the Delete key (on the keyboard).
Method 2
- Move the I-beam pointer to the text you want to delete. Click to set the insertion point there (a blinking vertical line).
- To delete text to the left of the insertion point, press the Backspace key on the keyboard. (On a Mac keyboard, press the Delete key.)
- To delete text to the right of the insertion point, press the Delete key on the keyboard. (On a Mac keyboard, press the fn key plus the Delete key.)
Copy and Paste
Copy vs. cut
- – duplicates the selected item (text, symbol, table, image, etc.).
- – removes the selected item from its original position.
Copy and paste vs. cut and paste
- Copy and paste – duplicates the selected item. The selected item can be found in both original and the new, pasted location(s).
- Cut and paste – duplicates the selected item then deletes the original. The selected data can be found only at the new, pasted location (the item has moved from one location to another).
Steps to copy / cut and paste
Method 1
- Open the document you wish to edit.
- Select the item you wish to Copy or Cut.
- Right-click the highlighted item and click Copy or Cut. You can also use your keyboard:
- Copy: Cntr + c (On a Mac, it is Cmd + c)
- Cut: Cntr + x (On a Mac, it is Cmd + x)
- Position the insertion point where you wish to insert the item.
- Right-click and click the Paste icon. You can also use your keyboard by pressing Cntr + v (On a Mac, it is Cmd + v).
Method 2
- Open the document you wish to edit.
- Select the item you wish to copy or cut.
- Click the Home tab at the top (on the ribbon). Click the Copy button.
- Position the insertion point where you wish to insert the item.
- Under the Home tab at the top, click the Paste button.
Review a Document
Check Spelling and Grammar
Method 1
- Open the document you wish to edit.
- Right-click a word that is underlined with a wavy line (that indicates a misspelled word).
- Select the correct spelling from the suggestion list to correct the spelling error. For each error, Word will offer one or more suggestions.
Method 2
- Open the document you wish to edit.
- Click the Review tab.
- Click the Editor button (it may also say, “Spelling and Grammar”). If the program finds spelling errors, the Spelling & Grammar pane will appear.
- Click one of the options from the suggestion list to change the spelling error. The program will move to the next misspelled word.
Find Synonyms
Method 1
- Open the document you wish to edit.
- Right-click a word for which you wish to find a synonym for.
- Click the Synonyms command from the pop-out menu.
- Find a desired word in the list and click it to replace the original word.
- If none of the synonyms are desired, click the Thesaurus command to open the full thesaurus. (The Thesaurus pane will appear.)
- Find a desired word in the Thesaurus pane list and right-click it and then click Insert.
- Close the Thesaurus pane.
Method 2
- Open the document you wish to edit.
- Select a word for which you wish to use the thesaurus.
- Click the Review tab.
- Click the Thesaurus button.
- Find a desired word in the “Thesaurus” pane and right-click it and then click Insert.
- Close the Thesaurus pane.
A word processor is software or a device that allows users to create, edit, and print documents. It enables you to write text, store it electronically, display it on a screen, modify it by entering commands and characters from the keyboard, and print it. Of all computer applications, word processing is the most common.
What are the word processing skills?
Basic Word Processing Skills:
- add text.
- enter text.
- format text: font, style, size, and color.
- adjust line spacing.
- insert and format WordArt.
- insert and format clip art or picture file.
- modify the text wrap of an object.
- draw and format shapes.
What is the meaning of the word processing?
: the production of typewritten documents (such as business letters) with automated and usually computerized typing and text-editing equipment. Other Words from word processing Example Sentences Learn More about word processing.
What is a word processor in computer?
Word processor, computer program used to write and revise documents, compose the layout of the text, and preview on a computer monitor how the printed copy will appear.
What are the three types of word processor?
Through history, there have been 3 types of word processors: mechanical, electronic and software.
What is the best free word processor?
5 Best Free Word Processor Software (2020)
- Office Word Online.
- LibreOffice Writer.
- Google Docs.
- Pages.
- Dropbox Paper.
How do I save and close a document?
Open the File menu and click Save. The Save As dialog box appears. In the File name box, enter a desired name for the document….The methods use:
- The File menu.
- The Close button on the title bar.
- The Context menu.
- The System menu.
- Shortcut keys.
How do you close a document in Microsoft Word?
How to Close a Document in Microsoft Word
- Click the gray “X” in the upper-right-hand corner.
- Select Close from the File menu.
What is the difference between close and exit in Microsoft Word?
When you close a document in Word, the document itself leaves your screen and you can no longer edit it. The program remains open for you to switch to another document. When you exit Word, the entire program closes and must be opened again in order to edit any documents.
What are the steps to save a Microsoft Word document?
Save your document Click FILE > Save, pick or browse to a folder, type a name for your document in the File name box, and click Save. Save your work as you go – hit Ctrl+S often. To print, click the FILE tab, and then click Print.
What are the 2 ways that you can close a document?
There are two ways to close a document:
- • close your document without exiting the software; or.
- •
- Choose File > Close to close your document without exiting.
- If you have modified your document since the last time you saved, you are prompted to save the changes.
How do you close a document but keep the word processing program open?
Now, the best way to close just the documents (and leave the program window open after closing the last document) is to use either of two shortcuts. Using either Ctrl+W or Ctrl+F4 will close just the current document.
How do I open a saved document?
Open an OpenDocument Text file in Word
- Click the Microsoft Office Button. , and then click Open.
- In the File of type list, click OpenDocument Text.
- Click the file you want to open, and then click Open.
How do you close a Word document that won’t close?
Using a Mac
- Click on the “Apple” menu in the upper-left corner of the screen.
- Click on the “Force Quit” option in the drop-down menu to open the Force Quit Window.
- Click on the Microsoft Word option in the list of open programs.
- Click on the “Force Quit” button to force quit the Word program.
Will I lose my Word document if I force quit?
If the document was saved at least once and AutoRecover was enabled in Word > Preferences, you can force-quit Word, as it will detect the AutoRecover files next time around and offer you to recover the file.
Will word autosave if I force quit?
If you haven’t been working that long, then you will not have an AutoRecover file to recover. Also, if you have closed or quit the file manually, then the AutoRecover file is gone. Each time Word opens, it searches for AutoRecover files. To check and see if it is enabled, go to the Word options and click on “Save”.
How do I close a Word 2010 program?
Closing a Document in Word 2010
- Step 1 − Click the File tab and select the Close option.
- Step 2 − When you select the Close option and if the document is not saved before closing, it will display the following Warning box asking whether the document should be saved or not.
- Step 3 − To save the changes, click Save, otherwise click Don’t Save.
How can I recover a Word document I was working on when my computer crashed?
These can be found via File, Open and clicking the Recover Unsaved Documents button found at the very bottom of the Recent File List. Open Word and select File, Options. In the Options dialog box select Save from the left hand menu. Note the AutoRecover files location.
Can I recover a Word document I didn’t save?
If you forgot to save Word document or your computer restarted and lost Word document, you can use the AutoRecover feature to recover unsaved Word document. Open Word, click the File tab > click Info > click Manage Document > click Recover Unsaved Documents. Then, find the unsaved Word document, click Open > Save As.
How do I recover an unsaved Word document in Windows 10?
Go to File / Manage Document and click on the File tab. Now select “Document Management”, then “Recover Unsaved Documents”. In the new window, you will see a list of all unsaved Word documents.
How do I recover a TMP file in Word?
How to Recover a Temp File in Word
- Click the “Start” button. In Windows XP, click “Search,” “For Files or Folders” and type “*.
- Search the list of results for the Word temp file.
- Write down the name of the document, or make note of the file location.
- Launch Microsoft Word.
- Select “All Files” in the “Files of Type” drop down.
- Tip.
How do I turn on AutoSave in Word?
Go to File > Options > Save. Check that the AutoSave box is ticked.
Is there a way to recover unsaved Word documents on Mac without Autorecover?
After the scan, click “Type”, and expand “Unsaved Documents”. Click the exact file type – Word, Excel, Powerpoint, Keynote, Pages, Numbers you lost without saving. Step 3. Double-click to preview your unsaved file, select the right version and click “Recover” to save the file to another secure location on Mac.
Is there a way to recover unsaved Word documents on Mac?
Steps to recover an unsaved Word document on Mac:
- Open a Finder window on your Mac.
- Select the entire computer as the location. That will be searched and enter ‘AutoRecovery’ in the Search field.
- Double-click on the file to be recovered. This will open the file in Microsoft Word.
- Select the File menu and choose Save As.
Word processing is the act of using a word processor to create, edit, customize, preserve and print a document. A Word processor is a computer program that facilitates word processing, a good example is Microsoft Word.
Word processing was one of the earliest applications for personal computers in office productivity. Modern word processors provide users with a graphical user interface (GUI). GUIs allow users some form of what-you-see-is-what-you-get (WYSIWYG) editing.
A word processing application is a type of software that displays characters based on a user’s input on an external or internal keyboard. Simply put, with a word processor you can type, edit and print documents on the go.
There are popular word processors or word processing applications that are widely in use. They include Corel Word Perfect, OpenOffice, LibreOffice, WordPad, Google Docs, etc.
With a word processing application, you can create different kinds of documents including letters, resume, memo, books, newsletter, cards, etc. Though word processing applications are not originally meant for creating graphics, in recent times, they can create amazing graphic docs.
Word processing applications allow the user to edit, modify, and format documents based on display preferences. By this, we mean that you can customize the text in your document to look the way you want it. This is done by formatting the size, color, and other features in your document.
Among the core functionality of word processing applications is the ability to insert images, clipart, tables, and WordArt. There are also inbuilt commands to create a table of contents, bibliography, and document borders. Word processors have lots of commands and functionalities which have made them common use in education, business, and industry.
There are different word processing applications available; Microsoft Word and WordPerfect are the most commonly used.
Basic Commands
Using word processing applications, creating and editing documents is made easy through the use of some of the following commands:
- Copy (CTRL + C) – The process of duplicating existing texts either in the same document or in another document.
- Cut (CTRL + X) – The process of moving existing text from one location to another in the same or another document.
- Autocorrect – A command that automatically corrects misspelled words using the inbuilt dictionary of words.
- Font – A set of letters that represents a typeface such as Arial, Times new roman, Tahoma, etc.
- Bold (CTRL + B) – A command that darkens the color of selected texts in a document.
- Underline (CTRL + U) – A command that underlines selected texts in a document.
- Formatting – A process of customizing the text and layout of a document to suit its purpose. Some formatting commands include alignment (CTRL+L, CTRL+R, CTRL+J), font color, font size, page setup, etc.
There are many commands in word processing applications that enable its users to achieve their aim. To get started learning how to use a word processor, continue below.
Uses of Word Processor
- Word processors are used in creating letters, letterheads, memos, and reference documents in business.
- Word Processing software can be used to type, Save, Format, Preview & Print text.
- It can also be used to create and edit pictures, images, symbols, and
- One can use word processors to search and replace words; cut/copy and paste words.
- It can be used to perform the following: Spelling and grammar check, Thesaurus (Dictionary), Mail Merging, and create tables.
Examples of Word Processors
The following are some examples of word processing software:
- WordPad,
- Microsoft Word,
- Microsoft Works,
- WordPerfect,
- AppleWorks,
- OpenOffice Writer
Task one
Identify at least two most popularly used word processing software in your environment. If they are not on the above list, add them. Use the comment section to respond to this task.
Using Word Processor
Loading Microsoft Word
To load Microsoft Word, do the following:
- In Win XP, Click Start >>> All Programs >>> Microsoft Office >>> Microsoft Word.
- In Win Vista and 7, Click Start >>> Type ‘word’ in the Search box >>> select Microsoft Word from the list.
- In Win 8, 8.1 & 10, press the WINDOWS LOGO button on the keyboard
- From the tiled menu, select Word 2013 as shown below.
In general, whichever windows you are working with, you can load Microsoft Word by doing the following:
MS Word opens.
Create a Document in Microsoft Word
To create a file, load Microsoft Word application, type text such as letter, memo, or anything you want to do. (See uses of a word processor)
Save a File in Microsoft Word
In an already opened Microsoft Word application, do the following:
- Click File and select Save As, from the menu list, the Save As dialog box will appear as shown below.
- Type the name of the file in the File Name box and click the save button. The file will be saved in My documents by default.
Open/ retrieve a saved file
To retrieve a saved file from any application, do the following:
- Open the folder where you saved the file (e.g. my documents): To open my documents folder; double-click my documents icon on the desktop OR right-click Documents icon on the desktop and select Open from the list.
- Locate the name of the file you want to open or retrieve in the folder (files are arranged in alphabetical order).
- Double-click the ‘file’s name’ icon in the folder OR right-click the ‘file’s name’ icon and choose Open from the list. The application opens with contents of the file.
- If you want to retrieve the file for safe keeping in another location, then you can save the file again by selecting a different location from the Save in the drop-down list in the Save As dialog box.
Exiting Microsoft word
To close an already opened Microsoft Word do the following:
- Press the key combinations CTRL + F4 to close an open word document without exiting word.
- Press the key combinations ALT + F4 to exit Word application.
- Click the [X] icon in the top right corner of the open Word application as shown below.
Printing in MS Word
To print your document is very simple.
Before you print, you must have a printer connected to your computer system.
If you do not have a printer, you can print to Pdf or XPS files, then copy the file to a system that has a printer.
To print do the following:
- Select File >> Print. The print and print preview window will show
The left pane of the window shows the print options while the right pane shows your printable document.
In the left pane, check the print options. For example:
- Choose a printer from the Printer drop-down arrow. You can choose pdf or XPS document writer here.
- If you want to print all the pages, select “Print All Pages”. If you want to print the current page only, select “Print Current Page”, under
- When you are set to print, click the Print
Word processing is the process of adding text to a word processing unit such as a computer or typewriter. The typed words are stored in the computer or word processor temporarily to allow for editing before a hard copy of the document. The term «word processing» is a fairly general term, so it may refer to several types of writing without the use of pen and paper. Typewriters, for example, process words directly onto a paper without storing the data, while computers use specific programs to store the typed data before printing.
Modified typewriters have been commonly used in the past for word processing. The typewriter would store the data — usually with the use of a computer chip — before printing the words onto a page. The person using the word processor could then check the writing for errors before printing the final draft. When computers became common in the workplace and at home, word processors became mostly obsolete, though some models are still used for a wide range of purposes, including as educational devices for students with special needs.
Computers have generally taken over word processing duties. The computers feature specific programs in which a person can type manuscripts of any length. The data is stored as an electronic document that can be opened, closed, saved, and edited at any time. This allows the user to make corrections or changes to a document multiple times before printing out a hard copy of the document. In many cases, the document is not printed out onto hard copy paper at all; instead, it can be used on the internet, in e-mails, or for other digital purposes.
Simpler programs, such as text editors or notepads, can be used to record text quickly without excess formatting options, such as multiple fonts or font sizes. Such programs are easy to use and do not come loaded with formatting features, such as color, multiple fonts, line spacing options, and so on. They are meant to be used for quick word processing that will not need to be formatted for presentation.
Word processing software often includes several features unavailable on typewriters or older word processors. Such features may include the ability to manipulate the layout of the text, the size and color of the font, the type of font used, line spacing, margin adjustments, and the ability to insert photos, web links, graphs, charts, and other objects directly into the document.