Skip to main content

Compendium Article 3: The Power of Office - How Microsoft Changed the Business Landscape


    
Breaking the Monotony: Revolutionizing Business Presentations and Task

    Im getting old! People who grew up in the early 1990s, before computers were common in homes, remember doing things that are now usually done on computers in other ways. Both manual and electric typewriters were utilized extensively for the purpose of word processing. Keeping financial records and performing calculations required the use of ledger sheets, paper-based worksheets, and calculators in addition to the tasks performed on spreadsheets. When it came to dat
abases, card index systems and record-keeping systems that relied on paper were used to organize and store information. Overhead projectors, transparencies, and hand-drawn charts and graphs were the standard presentation tools. Microsoft Word, Excel, PowerPoint, and Access are among the most widely used office software packages. They are used all over the world by people who create content, edit content, and present content. However, despite which piece of software's helpful features, there are also drawbacks to using each program.

    Microsoft Office software has long been used to create and edit media by users all over the world. The most popular word processing software is Microsoft Word. The benefits of Microsoft Word include its popular and widespread use, a large selection of formatting options, and a simple and user-friendly interface. In the days before word processing software, it was very easy for a user to make a mistake in either their grammar or spelling, which would require them to rewrite the entire paper with a typewriter. Excel excels at creating graphs and charts as well as organizing and analyzing large amounts of data. Access makes it easier to manage huge data sets and retrieve information quickly, whereas PowerPoint is useful for designing aesthetically pleasing presentations. It is amusing to reflect that in the 1990s, libraries utilized many book cards and other materials to organize their printed works. The works were accessible based on title, author, and subject and were maintained in separate catalogs. An individual's name would be written on the card, and a librarian was paid to track them manually. This was the prevalent method of organizing printed works in libraries during that period, and it is entertaining to consider now. Furthermore, think could anything be worse than death by PowerPoint? Transparencies and overhead projectors, for instance, needed manual adjustment and could cause errors or misalignment during presentations. Hand-drawn graphs and charts took much time to create and needed more design options. In contrast, PowerPoint offers much more dynamic and flexible presentations, with a variety of design options, multimedia integration, and the ability to quickly update and make changes on the fly.


I experimented with using the various features of Microsoft Office by writing about a typical day in my life. The following is a few pictures from my experience. "Click to enlarge image"

PowerPoint presentation converted to a GIF image:




My routine in Excel (PNG)



Data input into MS Word

My days are hectic and monotonous. Normal day start and end:

1. I wake up at 5:30, shower, and get ready for work 15 minutes before my shift.

2. I present my briefing and receive mid-shift updates on all events and essential information while quickly reviewing Jet Fuel paperwork.

3. I check email after dismissing my subordinates.

4. When fuel demands start, subordinates handle requests throughout the day.

5. While answering a variety of agency phone calls, Excel is used to correct account errors and double-check information.

6. Subordinate appointments, hardware issue calls to outside organizations, and other requirements to ensure mission completion and ancillary training are met.

7. I may eat lunch around 1100 or 1200, but usually not.

8. I leave between 1500 and 1700 after managing the day's operations and meeting with several people about their problems.

9. After work, I rest for an hour or start my college work.

10. I'll take a shower and get ready for bed if I didn't get a break. I usually sleep from 23:00 to 05:30, waking up at 03:00 to think for an hour.

My typical day may seem extreme when I'm in a different time zone or deployed abroad.


Comments

Popular posts from this blog

Compendium Article 9: A Newbie's Introduction to Object-Oriented Programming, Java, and tutorial links to keep you motivated

            Hello fellow Java noobs! As my journey continues further into the world computing and specifically programming, we’ve now arrived at Object-Oriented Programming (OOP) and Java. The names alone sound intimidating, but don’t worry! I'm here to explain what Ive learn to your ------from one beginner to another. Getting Started 1.       Go to the Oracle website or OpenJDK to get the Java Development Kit (JDK). 2.       Pick the JDK version that matches your computer (Windows, macOS, Linux) and download it. 3.       Open the downloaded file and follow the on-screen setup instructions. 4.       To check if Java is installed, type java -version in your command prompt or terminal. If you see a version number, you're all set! 5.       For writing Java code, you'll need an IDE (a program where you’ll write the code)....

Compendium Article 4: Roots to Routes - Understanding How Your Requests are Traced and Analyzed

Tracing Your Requests: A Journey Through Ping and Trace Commands      For many years, network hops and latency have been measured by ping and traceroute. Network engineers and administrators have benefited from using these tools to analyze and track network performance. Information is now more accurate and current thanks to modern tools. Because both experts and everyday users use these tools to identify and resolve network problems, they are crucial to the infrastructure of the modern internet. What is Ping Routing and Trace Routing? Ping      A Ping measures packet round-trip time and IP host reachability. It sends the target host a request and waits for a reply. If the host responds, the round-trip time is determined. You can analyze internet connectivity (Hoffman, 2017). Traceroute      Traceroute shows how IP packets travel. A request is also sent from the host. When hosts send the message, IP addresses between the host and destination ...

Compendium Article 6: The Digital Guardian - Securing Information and Systems in the 21st Century

  Network Protection    Safeguarding confidential and sensitive information      Information and system security are vital for the success of any business or organization. To maintain a competitive edge as technology advances and the digital world becomes more interconnected, it is essential to safeguard private and sensitive information against unauthorized access and theft. Businesses must take a proactive approach to increase information and system security by developing a customized information security policy, developing secure and manageable passwords, remaining current on the latest technology security threats and vulnerabilities, configuring network security measures to prevent unauthorized access, infiltration, and data theft, and installing anti-virus software and other malware protection on all company-owned devices. This paper will present basic information on the importance of information and system security in today's digital age, as well as p...