Word processing applications definition

Table of Contents

  1. What are word processing applications?
  2. What is word processor short definition?
  3. What is a word processing easy definition?
  4. What is a word processor and examples?
  5. What is a word processor write any three application of a word processor?
  6. What is word processor class 9?
  7. What is word processor class 3?
  8. What is the best definition of word processing?
  9. What is word processor class 10?
  10. What is word processor class 4?
  11. What do you mean by a word processor?
  12. Which is an example of a word processing application?
  13. What is the kids definition of word processing?
  14. How is word processing similar to other software?

Word Processing refers to the act of using a computer to create, edit, save and print documents. One example of a Word Processor is Microsoft Word, but other word processing applications are also widely used. Examples include: Microsoft Works Word Processor, Open Office Writer, Word Perfect and Google Drive Document..

What is word processor short definition?

word processor, computer program used to write and revise documents, compose the layout of the text, and preview on a computer monitor how the printed copy will appear. (Word processors automatically generate and hide formatting information in the document file.)

What is a word processing easy definition?

Definition of word processing : the production of typewritten documents (such as business letters) with automated and usually computerized typing and text-editing equipment.

What is a word processor and examples?

A word processor, or word processing program, does exactly what the name implies. It processes words. It also processes paragraphs, pages, and entire papers. Some examples of word processing programs include Microsoft Word, WordPerfect (Windows only), AppleWorks (Mac only), and OpenOffice.org.

What is a word processor write any three application of a word processor?

Some of the functions of word processing software include: Creating, editing, saving and printing documents. Copying, pasting, moving and deleting text within a document. Formatting text, such as font type, bolding, underlining or italicizing. Creating and editing tables.

What is word processor class 9?

Answer: A Software or a computer that enables users to build, edit, and print documents is a word processor. It helps users to write text, save it electronically, show it on a computer, edit it by entering keyboard commands and characters, and print it out. People can type words faster than writing in a pen.

What is word processor class 3?

With respect to class 3 Introduction to MS-Word 2010, MS – Word is a word processor developed by Microsoft. It is a program that is used for typing text. The first-word processor was basically computerized typewriters. A word document file can contain text, images, tables, graphs, charts, etc.

What is the best definition of word processing?

Word processing is defined as the creation of a document with a computerized device. The creation, input, editing and formatting of documents and other text using software on a computer.

What is word processor class 10?

Answer: A Software or a computer that enables users to build, edit, and print documents is a word processor. It helps users to write text, save it electronically, show it on a computer, edit it by entering keyboard commands and characters, and print it out. It means they take less time to create a text while typing.

What is word processor class 4?

MS Word is a word processing software. It falls under the category of application software. It is used to create and edit personal and business documents such as letters, reports etc.

What do you mean by a word processor?

Definition – What does Word Processor mean? A word processor is a type of software application used for composing, editing, formatting and printing documents. Word processors have a variety of uses and applications within the business environment, at home and in educational contexts.

Which is an example of a word processing application?

Word processing applications typically include utilities to convert between the native formats of each application. For example, if you are using iWork by Apple you can export it to a format that Microsoft Word can read if that’s what your colleagues are using.

What is the kids definition of word processing?

Kids Definition of word processing : the production of printed documents (as business letters) with automated and usually computerized equipment

How is word processing similar to other software?

Word processors are very similar to two other categories of software: text editors and desktop publishing applications. Applications that support only the basic features from the first list above (and maybe a few others) are sometimes called text editors.

Improve Article

Save Article

Like Article

  • Read
  • Discuss
  • Improve Article

    Save Article

    Like Article

    Word Processing Software :
    The word “word processor” means it processes words with pages and paragraphs. Word processors are of 3 types which are electronic, mechanical, and software.

    The word processing software is used to apply the basic editing and design and also helps in manipulating the text to your pages whereas the word processor, is a device that provides editing, input, formatting, and output of the given text with some additional features.

    It is a type of computer software application or an electronic device. In today’s generation, the word processor has become the word processing software or programs that are running on general-purpose computers.

    Examples or Applications of a Word Processing Software :
     

    • Wordpad
    • Microsoft Word
    • Lotus word pro
    • Notepad
    • WordPerfect (Windows only),
    • AppleWorks (Mac only),
    • Work pages
    • OpenOffice Writer

    Features :
     

    1. They are stand-alone devices that are dedicated to the function.
    2. Their programs are running on general-purpose computers
    3. It is easy to use
    4. Helps in changing the shape and style of the characters of the paragraphs
    5. Basic editing like headers & footers, bullets, numbering is being performed by it.
    6. It has a facility for mail merge and preview.

    Functions :
     

    • It helps in Correcting grammar and spelling of sentences
    • It helps in storing and creating typed documents in a new way.
    • It provides the function of Creating the documents with basic editing, saving, and printing of it or same.
    • It helps in Copy the text along with moving deleting and pasting the text within a given document.
    • It helps in Formatting text like bold, underlining, font type, etc.
    • It provides the function of creating and editing the formats of tables.
    • It helps in Inserting the various elements from some other types of software.

    Advantages :
     

    • It benefits the environment by helping in reducing the amount of paperwork.
    • The cost of paper and postage waste is being reduced.
    • It is used to manipulate the document text like a report
    • It provides various tools like copying, deleting and formatting, etc.
    • It helps in recognizing the user interface feature
    • It applies the basic design to your pages
    • It makes it easier for you to perform repetitive tasks
    • It is a fully functioned desktop publishing program
    • It is time-saving.
    • It is dynamic in nature for exchanging the data.
    • It produces error-free documents.
    • Provide security to our documents.

    Disadvantages :
     

    • It does not give you complete control over the look and feel of your document.
    • It did not develop out of computer technology.

    Like Article

    Save Article

    Word Processing

    Andrew Prestage, in Encyclopedia of Information Systems, 2003

    I. An Introduction to Word Processing

    Word processing is the act of using a computer to transform written, verbal, or recorded information into typewritten or printed form. This chapter will discuss the history of word processing, identify several popular word processing applications, and define the capabilities of word processors.

    Of all the computer applications in use, word processing is by far the most common. The ability to perform word processing requires a computer and a special type of computer software called a word processor. A word processor is a program designed to assist with the production of a wide variety of documents, including letters, memoranda, and manuals, rapidly and at relatively low cost. A typical word processor enables the user to create documents, edit them using the keyboard and mouse, store them for later retrieval, and print them to a printer. Common word processing applications include Microsoft Notepad, Microsoft Word, and Corel WordPerfect.

    Word processing technology allows human beings to freely and efficiently share ideas, thoughts, feelings, sentiments, facts, and other information in written form. Throughout history, the written word has provided mankind with the ability to transform thoughts into printed words for distribution to hundreds, thousands, or possibly millions of readers around the world. The power of the written word to transcend verbal communications is best exemplified by the ability of writers to share information and express ideas with far larger audiences and the permanency of the written word.

    The increasingly large collective body of knowledge is one outcome of the permanency of the written word, including both historical and current works. Powered by decreasing prices, increasing sophistication, and widespread availability of technology, the word processing revolution changed the landscape of communications by giving people hitherto unavailable power to make or break reputations, to win or lose elections, and to inspire or mislead through the printed word.

    Read full chapter

    URL: 

    https://www.sciencedirect.com/science/article/pii/B0122272404001982

    Computers and Effective Security Management1

    Charles A. Sennewald, Curtis Baillie, in Effective Security Management (Sixth Edition), 2016

    Word Processing

    Word processing software can easily create, edit, store, and print text documents such as letters, memoranda, forms, employee performance evaluations (such as those in Appendix A), proposals, reports, security surveys (such as those in Appendix B), general security checklists, security manuals, books, articles, press releases, and speeches. A professional-looking document can be easily created and readily updated when necessary.

    The length of created documents is limited only by the storage capabilities of the computer, which are enormous. Also, if multiple copies of a working document exist, changes to it should be promptly communicated to all persons who use the document. Specialized software, using network features, can be programmed to automatically route changes to those who need to know about updates.

    Read full chapter

    URL: 

    https://www.sciencedirect.com/science/article/pii/B9780128027745000241

    Globalization

    Jennifer DeCamp, in Encyclopedia of Information Systems, 2003

    II.D.2.c. Rendering Systems

    Special word processing software is usually required to correctly display languages that are substantially different from English, for example:

    1.

    Connecting characters, as in Arabic, Persian, Urdu, Hindi, and Hebrew

    2.

    Different text direction, as in the right-to-left capability required in Arabic, Persian, Urdu, and Hindi, or the right-to-left and top-to-bottom capability in formal Chinese

    3.

    Multiple accents or diacritics, such as in Vietnamese or in fully vowelled Arabic

    4.

    Nonlinear text entry, as in Hindi, where a vowel may be typed after the consonant but appears before the consonant.

    Alternatives to providing software with appropriate character rendering systems include providing graphic files or elaborate formatting (e.g., backwards typing of Arabic and/or typing of Arabic with hard line breaks). However, graphic files are cumbersome to download and use, are space consuming, and cannot be electronically searched except by metadata. The second option of elaborate formatting often does not look as culturally appropriate as properly rendered text, and usually loses its special formatting when text is added or is upgraded to a new system. It is also difficult and time consuming to produce. Note that Microsoft Word 2000 and Office XP support the above rendering systems; Java 1.4 supports the above rendering systems except for vertical text.

    Read full chapter

    URL: 

    https://www.sciencedirect.com/science/article/pii/B0122272404000800

    Text Entry When Movement is Impaired

    Shari Trewin, John Arnott, in Text Entry Systems, 2007

    15.3.2 Abbreviation Expansion

    Popular word processing programs often include abbreviation expansion capabilities. Abbreviations for commonly used text can be defined, allowing a long sequence such as an address to be entered with just a few keystrokes. With a little investment of setup time, those who are able to remember the abbreviations they have defined can find this a useful technique. Abbreviation expansion schemes have also been developed specifically for people with disabilities (Moulton et al., 1999; Vanderheiden, 1984).

    Automatic abbreviation expansion at phrase/sentence level has also been investigated: the Compansion (Demasco & McCoy, 1992; McCoy et al., 1998) system was designed to process and expand spontaneous language constructions, using Natural Language Processing to convert groups of uninflected content words automatically into full phrases or sentences. For example, the output sentence “John breaks the window with the hammer” might derive from the user input text “John break window hammer” using such an approach.

    With the rise of text messaging on mobile devices such as mobile (cell) phones, abbreviations are increasingly commonplace in text communications. Automatic expansion of many abbreviations may not be necessary, however, depending on the context in which the text is being used. Frequent users of text messaging can learn to recognize a large number of abbreviations without assistance.

    Read full chapter

    URL: 

    https://www.sciencedirect.com/science/article/pii/B9780123735911500152

    Case Studies

    Brett Shavers, in Placing the Suspect Behind the Keyboard, 2013

    Altered evidence and spoliation

    Electronic evidence in the form of word processing documents which were submitted by a party in litigation is alleged to have been altered. Altered electronic evidence has become a common claim with the ability to determine the changes becoming more difficult. How do you know if an email has been altered? What about a text document?

    Case in Point

    Odom v Microsoft and Best Buy, 2006

    The Odom v Microsoft and Best Buy litigation primarily focused on Internet access offered to customers in which the customers were automatically billed for Internet service without their consent. One of the most surprising aspects of this case involved the altering of electronic evidence by an attorney for Best Buy. The attorney, Timothy Block, admitted to altering documents prior to producing the documents in discovery to benefit Best Buy.

    Investigative Tips: All evidence needs to be validated for authenticity. The weight given in legal hearings depends upon the veracity of the evidence. Many electronic files can be quickly validated through hash comparisons. An example seen in Figure 11.4 shows two files with different file names, yet their hash values are identical. If one file is known to be valid, perhaps an original evidence file, any file matching the hash values would also be a valid and unaltered copy of the original file.

    Figure 11.4. Two files with different file names, but having the same hash value, indicating the contents of the files are identical.

    Alternatively, Figure 11.5 shows two files with the same file name but having different hash values. If there were a claim that both of these files are the same original files, it would be apparent that one of the files has been modified.

    Figure 11.5. Two files with the same file names, but having different hash values, indicating the contents are not identical.

    Finding the discrepancies or modifications of an electronic file can only be accomplished if there is a comparison to be made with the original file. Using Figure 11.5 as an example, given that the file having the MD5 hash value of d41d8cd98f00b204e9800998ecf8427e is the original, and where the second file is the alleged altered file, a visual inspection of both files should be able to determine the modifications. However, when only file exists, proving the file to be unaltered is more than problematic, it is virtually impossible.

    In this situation of having a single file to verify as original and unaltered evidence, an analysis would only be able to show when the file was modified over time, but the actual modifications won’t be known. Even if the document has “track changed” enabled, which logs changes to a document, that would only capture changes that were tracked, as there may be more untracked and unknown changes.

    As a side note to hash values, in Figure 11.5, the hash values are completely different, even though the only difference between the two sample files is a single period added to the text. Any modification, no matter how minor, results in a drastic different hash value.

    The importance in validating files in relation to the identification of a suspect that may have altered a file is that the embedded metadata will be a key point of focus and avenue for case leads. As a file is created, copied, modified, and otherwise touched, the file and system metadata will generally be updated.

    Having the dates and times of these updates should give rise to you that the updates occurred on some computer system. This may be on one or more computers even if the file existed on a flash drive. At some point, the flash drive was connected to a computer system, where evidence on a system may show link files to the file. Each of these instances of access to the file is an opportunity to create a list of possible suspects having access to those systems in use at each updated metadata fields.

    In the Microsoft Windows operating systems, Volume Shadow Copies may provide an examiner with a string of previous versions of a document, in which the modifications between each version can be determined. Although not every change may have been incrementally saved by the Volume Shadow Service, such as if the file was saved to a flash drive, any previous versions that can be found will allow to find some of the modifications made.

    Where a single file will determine the outcome of an investigation or have a dramatic effect on the case, the importance of ‘getting it right’ cannot be overstated. Such would be the case of a single file, modified by someone in a business office, where many persons had common access to the evidence file before it was known to be evidence. Finding the suspect that altered the evidence file may be simple if you were at the location close to the time of occurrence. Interviews of the employees would be easier as most would remember their whereabouts in the office within the last few days. Some may be able to tell you exactly where other employees were in the office, even point the suspect out directly.

    But what if you are called in a year later? How about 2 or more years later? What would be the odds employees remembering their whereabouts on a Monday in July 2 years earlier? To identify a suspect at this point requires more than a forensic analysis of a computer. It will probably require an investigation into work schedules, lunch schedules, backup tapes, phone call logs, and anything else to place everyone somewhere during the time of the file being altered.

    Potentially you may even need to examine the hard drive of a copy machine and maybe place a person at the copy machine based on what was copied at the time the evidence file was being modified. When a company’s livelihood is at stake or a person’s career is at risk, leave no stone unturned. If you can’t place a suspect at the scene, you might be able to place everyone else at a location, and those you can’t place, just made your list of possible suspects.

    Read full chapter

    URL: 

    https://www.sciencedirect.com/science/article/pii/B9781597499859000113

    When, How, and Why Do We Trust Technology Too Much?

    Patricia L. Hardré, in Emotions, Technology, and Behaviors, 2016

    Trusting Spelling and Grammar Checkers

    We often see evidence that users of word processing systems trust absolutely in spelling and grammar checkers. From errors in business letters and on resumes to uncorrected word usage in academic papers, this nonstrategy emerges as epidemic. It underscores a pattern of implicit trust that if a word is not flagged as incorrect in a word processing system, then it must be not only spelled correctly but also used correctly. The overarching error is trusting the digital checking system too much, while the underlying functional problem is that such software identifies gross errors (such as nonwords) but cannot discriminate finer nuances of language requiring judgment (like real words used incorrectly). Users from average citizens to business executives have become absolutely comfortable with depending on embedded spelling and grammar checkers that are supposed to autofind, trusting the technology so much that they often do not even proofread. Like overtrust of security monitoring, these personal examples are instances of reduced vigilance due to their implicit belief that the technology is functionally flawless, that if the technology has not found an error, then an error must not exist.

    Read full chapter

    URL: 

    https://www.sciencedirect.com/science/article/pii/B9780128018736000054

    Establishing a C&A Program

    Laura Taylor, Matthew Shepherd Technical Editor, in FISMA Certification and Accreditation Handbook, 2007

    Template Development

    Certification Packages consist of a set of documents that all go together and complement one another. A Certification Package is voluminous, and without standardization, it takes an inordinate amount of time to evaluate it to make sure all the right information is included. Therefore, agencies should have templates for all the documents that they require in their Certification Packages. Agencies without templates should work on creating them. If an agency does not have the resources in-house to develop these templates, they should consider outsourcing this initiative to outside consultants.

    A template should be developed using the word processing application that is the standard within the agency. All of the relevant sections that the evaluation team will be looking for within each document should be included. Text that will remain constant for a particular document type also should be included. An efficient and effective C&A program will have templates for the following types of C&A documents:

    Categorization and Certification Level Recommendation

    Hardware and Software Inventory

    Self-Assessment

    Security Awareness and Training Plan

    End-User Rules of Behavior

    Incident Response Plan

    Security Test and Evaluation Plan

    Privacy Impact Assessment

    Business Risk Assessment

    Business Impact Assessment

    Contingency Plan

    Configuration Management Plan

    System Risk Assessment

    System Security Plan

    Security Assessment Report

    The later chapters in this book will help you understand what should be included in each of these types of documents. Some agencies may possibly require other types of documents as required by their information security program and policies.

    Templates should include guidelines for what type of content should be included, and also should have built-in formatting. The templates should be as complete as possible, and any text that should remain consistent and exactly the same in like document types should be included. Though it may seem redundant to have the exact same verbatim text at the beginning of, say, each Business Risk Assessment from a particular agency, each document needs to be able to stand alone and make sense if it is pulled out of the Certification Package for review. Having similar wording in like documents also shows that the packages were developed consistently using the same methodology and criteria.

    With established templates in hand, it makes it much easier for the C&A review team to understand what it is that they need to document. Even expert C&A consultants need and appreciate document templates. Finding the right information to include the C&A documents can by itself by extremely difficult without first having to figure out what it is that you are supposed to find—which is why the templates are so very important. It’s often the case that a large complex application is distributed and managed throughout multiple departments or divisions and it can take a long time to figure out not just what questions to ask, but who the right people are who will know the answers.

    Read full chapter

    URL: 

    https://www.sciencedirect.com/science/article/pii/B9781597491167500093

    Speech Recognition

    John-Paul Hosom, in Encyclopedia of Information Systems, 2003

    I.B. Capabilities and Limitations of Automatic Speech Recognition

    ASR is currently used for dictation into word processing software, or in a “command-and-control” framework in which the computer recognizes and acts on certain key words. Dictation systems are available for general use, as well as for specialized fields such as medicine and law. General dictation systems now cost under $100 and have speaker-dependent word-recognition accuracy from 93% to as high as 98%. Command-and-control systems are more often used over the telephone for automatically dialing telephone numbers or for requesting specific services before (or without) speaking to a human operator. Telephone companies use ASR to allow customers to automatically place calls even from a rotary telephone, and airlines now utilize telephone-based ASR systems to help passengers locate and reclaim lost luggage. Research is currently being conducted on systems that allow the user to interact naturally with an ASR system for goals such as making airline or hotel reservations.

    Despite these successes, the performance of ASR is often about an order of magnitude worse than human-level performance, even with superior hardware and long processing delays. For example, recognition of the digits “zero” through “nine” over the telephone has word-level accuracy of about 98% to 99% using ASR, but nearly perfect recognition by humans. Transcription of radio broadcasts by world-class ASR systems has accuracy of less than 87%. This relatively low accuracy of current ASR systems has limited its use; it is not yet possible to reliably and consistently recognize and act on a wide variety of commands from different users.

    Read full chapter

    URL: 

    https://www.sciencedirect.com/science/article/pii/B0122272404001647

    Prototyping

    Rex Hartson, Pardha Pyla, in The UX Book (Second Edition), 2019

    20.7 Software Tools for Making Wireframes

    Wireframes can be sketched using any drawing or word processing software package that supports creating and manipulating shapes. While many applications suffice for simple wireframing, we recommend tools designed specifically for this purpose. We use Sketch, a drawing app, to do all the drawing. Craft is a plug-in to Sketch that connects it to InVision, allowing you to export Sketch screen designs to InVision to incorporate hotspots as working links.

    In the “Build mode” of InVision, you work on one screen at a time, adding rectangular overlays that are the hotspots. For each hotspot, you specify what other screen you go to when someone clicks on that hotspot in “Preview mode.” You get a nice bonus using InVision: In the “operate” mode, you, or the user, can click anywhere in an open space in the prototype and it highlights all the available links. These tools are available only on Mac computers, but similar tools are available under Windows.

    Beyond this discussion, it’s not wise to try to cover software tools for making prototypes in this kind of textbook. The field is changing fast and whatever we could say here would be out of date by the time you read this. Plus, it wouldn’t be fair to the numerous other perfectly good tools that didn’t get cited. To get the latest on software tools for prototyping, it’s better to ask an experienced UX professional or to do your research online.

    Read full chapter

    URL: 

    https://www.sciencedirect.com/science/article/pii/B9780128053423000205

    Design Production

    Rex Hartson, Partha S. Pyla, in The UX Book, 2012

    9.5.3 How to Build Wireframes?

    Wireframes can be built using any drawing or word processing software package that supports creating and manipulating shapes, such as iWork Pages, Keynote, Microsoft PowerPoint, or Word. While such applications suffice for simple wireframing, we recommend tools designed specifically for this purpose, such as OmniGraffle (for Mac), Microsoft Visio (for PC), and Adobe InDesign.

    Many tools and templates for making wireframes are used in combination—truly an invent-as-you-go approach serving the specific needs of prototyping. For example, some tools are available to combine the generic-looking placeholders in wireframes with more detailed mockups of some screens or parts of screens. In essence they allow you to add color, graphics, and real fonts, as well as representations of real content, to the wireframe scaffolding structure.

    In early stages of design, during ideation and sketching, you started with thinking about the high-level conceptual design. It makes sense to start with that here, too, first by wireframing the design concept and then by going top down to address major parts of the concept. Identify the interaction conceptual design using boxes with labels, as shown in Figure 9-4.

    Take each box and start fleshing out the design details. What are the different kinds of interaction needed to support each part of the design, and what kinds of widgets work best in each case? What are the best ways to lay them out? Think about relationships among the widgets and any data that need to go with them. Leverage design patterns, metaphors, and other ideas and concepts from the work domain ontology. Do not spend too much time with exact locations of these widgets or on their alignment yet. Such refinement will come in later iterations after all the key elements of the design are represented.

    As you flesh out all the major areas in the design, be mindful of the information architecture on the screen. Make sure the wireframes convey that inherent information architecture. For example, do elements on the screen follow a logical information hierarchy? Are related elements on the screen positioned in such a way that those relationships are evident? Are content areas indented appropriately? Are margins and indents communicating the hierarchy of the content in the screen?

    Next it is time to think about sequencing. If you are representing a workflow, start with the “wake-up” state for that workflow. Then make a wireframe representing the next state, for example, to show the result of a user action such as clicking on a button. In Figure 9-6 we showed what happens when a user clicks on the “Related information” expander widget. In Figure 9-7 we showed what happens if the user clicks on the “One-up” view switcher button.

    Once you create the key screens to depict the workflow, it is time to review and refine each screen. Start by specifying all the options that go on the screen (even those not related to this workflow). For example, if you have a toolbar, what are all the options that go into that toolbar? What are all the buttons, view switchers, window controllers (e.g., scrollbars), and so on that need to go on the screen? At this time you are looking at scalability of your design. Is the design pattern and layout still working after you add all the widgets that need to go on this screen?

    Think of cases when the windows or other container elements such as navigation bars in the design are resized or when different data elements that need to be supported are larger than shown in the wireframe. For example, in Figures 9-5 and 9-6, what must happen if the number of photo collections is greater than what fits in the default size of that container? Should the entire page scroll or should new scrollbars appear on the left-hand navigation bar alone? How about situations where the number of people identified in a collection are large? Should we show the first few (perhaps ones with most number of associated photos) with a “more” option, should we use an independent scrollbar for that pane, or should we scroll the entire page? You may want to make wireframes for such edge cases; remember they are less expensive and easier to do using boxes and lines than in code.

    As you iterate your wireframes, refine them further, increasing the fidelity of the deck. Think about proportions, alignments, spacing, and so on for all the widgets. Refine the wording and language aspects of the design. Get the wireframe as close to the envisioned design as possible within the constraints of using boxes and lines.

    Read full chapter

    URL: 

    https://www.sciencedirect.com/science/article/pii/B9780123852410000099

    By Louise Balle

    Updated September 28, 2017

    A word processor is an application that allows you to type in, edit, format, save, and print text. The text shows on screen the same or very similar to how it will appear in hard copy format. Word processors are commonly used by students, writers, authors, desktop publishing professionals and layout artists. Before you purchase a word processor, try several out. Some can be downloaded for free, and other can be downloaded for a trial period.

    Microsoft Word

    One of the most well-known and widely used word processing applications on the market is Microsoft Word. Word has more than 90 percent of the word processing market and more than 450 million users. Microsoft Corp. first released this program to the market in 1989, and since then there have been a number of upgrades to the software. Word can be purchased as part of the Microsoft Office suite of programs, which include Excel, PowerPoint, Outlook and Publisher. Word can be used to format text and build layout documents.

    WordPerfect

    WordPerfect is a word processing application from Corel Corp.. WordPerfect was popular in the early 1990s. It is best for writing simple essays and articles. Though it isn’t used as much today, WordPerfect is compatible with Microsoft Word, meaning that you can open and edit WordPerfect files in the Word program, then save them as WordPerfect files again. WordPerfect also can be used for formatting and laying out documents.

    Lotus Word Pro

    If you use Lotus Notes or Lotus 1-2-3—common in corporate environments—Lotus Word Pro is an ideal program for your word processing needs. This program works in concert with Lotus applications to allow you to create and distribute formatted text documents. It is produced and distributed by IBM Corp. Lotus Word Pro is also compatible with Microsoft Word and ideal for writing reports, memos and proposals.

    iWork Pages

    Pages is a word processing program offered by Apple Incorporated, so if you own a Mac computer this might be the ideal option for your needs. It is a part of Apple’s iWork suite of programs. Pages allows you to perform basic word processing functions—writing and formatting—as well as more complex graphical layout actions. You can open and save Pages files in Microsoft Word.

    And the Rest

    There are dozens of word processors on the market. Other lesser-known word processors include OpenOffice Writer, Adobe InCopy, AbiWord, Microsoft Works and Scrivener. A growing number of online word processors are available and include Google Docs and Microsoft Office Web Apps.

    There
    are many different kinds of applications, all with lots of spiffy
    features.

    Word
    processing
    is the
    application that is used most often and most widely. We will start
    with it to learn about the terms and features that are common to most
    applications, as well as some that are specific to word processing.
    Then we will look at other major applications and what they do.

    Examples
    of word processing programs: Microsoft Word, WordPerfect, Lotus
    WordPro, and Open Office Writer.

    Word Processing

    Word
    processing is the most
    used computer application
    !


    It
    has replaced the typewriter as the main way words are put on paper.
    Documents can be revised and corrected before they are ever printed.
    An existing document can be used as a template,
    or pattern, for a new one. So the user doesn’t have to recreate
    standard documents from scratch each time. This is a major time-saver
    and helps keep things consistent.

    Purpose:

    • To
      produce documents

    Main
    advantage:

    • Can
      easily change what has been done

    • Can
      reuse existing documents as a template

    Steps to produce a document

    • Create

    • Edit

    • Format

    • Print

    • Save
      (often!!)

    Let’s
    look at the terms involved in these steps more closely.

    Most of
    these terms also apply to the other standard applications, so we will
    not redefine them for all.

    reate

    You
    create
    a document when you open a blank document and enter text.

    Features/Terms:

    Word
    wrap —

    Automatically
    wrapping the text to the next line so it all fits within the
    screen’s width.

    Change the size of the screen and the text
    moves to fit in the space.

    Cursor

    Symbol
    for where text will appear like:

    Enter
    text-

    Ttype
    new text

    Scrolling —

    Moving
    document around within window

    Select

    Highlight
    text, usually by dragging. Commands and keystroke combinations
    will apply to the selected material.

    Edit

    Make
    changes

    Cut

    Remove
    selection from document and store temporarily on the Clipboard,
    which is a section of computer memory. The Windows Clipboard can
    hold only one thing at a time. The Office Clipboard from Office XP
    and later versions can hold many items.

    Copy

    Duplicate
    selection onto Clipboard

    Paste

    Place
    contents of the Clipboard at cursor location

    Undo

    Reverses
    whatever change you just made

    Some
    programs will only «undo» the last change.

    Others
    keep a list and can undo more, depending on how many changes the
    program tracks.

    Insert

    Add
    text at location without overwriting existing text

    Overwrite

    Typing
    overwrites existing text, replacing whatever characters were there
    already

    Delete

    Remove
    text (not saved anywhere)

    Search

    Look
    for specific word(s) or character(s) in the document

    Replace

    Can
    replace specific word(s) or character(s) with stated text

    Template

    Document
    that serves as a pattern for a new document

    Thesaurus 

    Looks
    for synonyms for selected word

    Spelling check —

    Looks
    for spelling errors

    Grammar check —

    Looks
    for grammar/style errors (of limited help)

    Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]

    • #
    • #
    • #
    • #
    • #
    • #
    • #
    • #
    • #
    • #
    • #

    Понравилась статья? Поделить с друзьями:
  • Word processing and typing
  • Word processing and students
  • Word processing and spreadsheet applications
  • Word processing and mac
  • Word processing and its functions