0% found this document useful (0 votes)
31 views10 pages

Ict - Notes

This document discusses various technologies related to information and communication. It defines ICT as technologies used to communicate, create, disseminate, store, and manage information. ICT includes computers, the internet, and digital communication. The document outlines the evolution of the World Wide Web from static Web 1.0 to dynamic Web 2.0 that allows user interaction and participation. It also briefly introduces Web 3.0, which aims to personalize content based on a user's preferences. The document provides examples of assistive technologies that enable people with disabilities to perform various tasks.

Uploaded by

bheaanne597
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views10 pages

Ict - Notes

This document discusses various technologies related to information and communication. It defines ICT as technologies used to communicate, create, disseminate, store, and manage information. ICT includes computers, the internet, and digital communication. The document outlines the evolution of the World Wide Web from static Web 1.0 to dynamic Web 2.0 that allows user interaction and participation. It also briefly introduces Web 3.0, which aims to personalize content based on a user's preferences. The document provides examples of assistive technologies that enable people with disabilities to perform various tasks.

Uploaded by

bheaanne597
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

● Web 2.

0
Introduction To Information And - It is the evolution of Web 1.0 by adding
Communication Technology dynamic web pages - the user is able to see
The Current State of ICT Technologies a website differently than others.
- Examples of Web 2.0 include social
● ICT (Information and Communication
networking sites, blogs, wikis, video sharing
Technology)
sites, hosted services, and web
- According to Blurton 1999, Information and
applications.
Communication Technology (ICT) is defined
- Web 2.0 allows users to interact with the
as “diverse set of technological tools and
page: instead of just reading a page, the
resources used to communicate, create,
user may be able to comment or create a
disseminate, store, and manage.
user account.
- ICT is the study of computers as tools for
- Web 2.0 also allows users to use web
data processing.
browsers instead of just using their
- It teaches students the fundamentals of
operating system.
operating computer systems in an internet-
- Browsers can now be used for their user
based environment.
interface, application software (or web
applications), and even for file storage.
● Information and Communication
Technology in the Philippines
■ Features of Web 2.0
- The Philippines has been dubbed the “ICT
→ Folksonomy
Hub of Asia” due to the rapid growth of ICT-
- It allows users to categorize and
related jobs, one of which is Business
classify/arrange information using freely
Process Outsourcing (BPO) or call centers.
chosen keywords (tagging).
- The Department of Information and
- Popular social networking sites such as
Communication Technology (DICT) is in
Twitter, Instagram, Facebook, etc. use tags
charge of developing, planning, and
that start with the pound sign (#). This is
promoting the country’s information and
also referred to as a hashtag.
communications technology (ICT) agenda in
→ Rich User Experience
support of national development.
- Content is dynamic and is responsive to
user’s input.
● World Wide Web
- An example would be a website that shows
- An information system on the internet that
local content.
allows documents to be connected to other
- In the case of social networking sites, when
documents by hypertext links, enabling the
logged on, your account is used to modify
user to search for information by moving
what you see on their website.
from one document to another.
→ User Participation
- W3 is an information space where
- The owner of the website is not the only one
documents and other web resources are
who is able to put content.
identified by URLs, interlinked by hypertext
- Others can place a content of their own by
links, and can be accessed via the Internet
means of comments, reviews, and
and invented by Tim-Berners Lee.
evaluation.
- Examples are Lazada, Shopee, and
● Web 1.0
Amazon.
- It refers to the first stage in the World Wide
→ Long Tail
Web, which was entirely made up of the
- Services that are offered on demand rather
Web pages connected by hyperlinks.
than on a one-time purchase.
- Static Web Page is known as flat plage or
- This is synonymous to subscribing to a data
stationary age in the sense that the page is
plan that charges you for the amount of time
“as is” and cannot be manipulated by the
you spend on the internet.
user.
→ Software As a Services
- The content is also the same for all users
- Users will subscribe to a software only
that is referred to as Web 1.0
when needed rather than purchasing them.
- Example: Google docs used to create and
edit word processing and spreadsheet.
➢ Mass Participation ■ Examples:
- Diverse information sharing through → Mobility aids : Such as wheelchairs,
universal web access. scooters, walkers, canes, crutches,
- Web 2.0’s content is based on people from prosthetic devices, and orthodontic devices.
various cultures. → Hearing aids : To help people hear or hear
more clearly
● Web 3.0 → Cognitive aids: Including computer or
- According to the W3C, “The Semantic Web electrical assistive devices, to help people
provides a common framework that allows with memory, attention, or other challenges
data to be shared and reused across in their thinking skills.
application, enterprise, and community → Computer software and hardware: Such
boundaries.” as voice recognition programs, screen
- The aim of Web 3.0 is to have machines (or readers, and screen enlargement
servers) understand the user’s preferences applications, to help people with mobility
to be able to deliver web content specifically and sensory impairments use computers
targeting the user. and mobile devices.
→ Tools: Such as automatic page turners,
■ Several Problems of Web 3.0 book holders, and adapted pencil grips to
→ Compatibility help learners with disabilities participate in
- HTML files and current web browsers could educational activities.
not support Web 3.0. → Closed captioning: To allow people with
→ Security hearing problems to watch movies,
- The user’s security is also in question since television programs, and other digital
the machine is saving their preferences. media.
→ Vastness → Physical modifications in the built
- The World Wide Web already contains environment: Including ramps, grab bars,
billions of web pages. and wider doorways to enable access to
→ Vagueness buildings, businesses, and workplaces.
- Certain words are imprecise. → Lightweight, high-performance mobility
- The words “old” and “small” would depend devices: Enables persons with disabilities
on the user. to play sports and be physically active.
→ Logic → Adaptive switches and utensils: To allow
- Since machines use logic, there are certain those with limited motor skills to eat, play
limitations for a computer to be able to games, and accomplish other activities.
predict what the user is referring to at a → Devices and features of devices: To help
given time. perform tasks such as cooking, dressing,
Online Systems, Functions, and Platforms and grooming; specialized handles and
● Technology Trends Awareness grips, devices that extend reach, and lights
- Refers to being aware of technology that on telephones and doorbells are a few
has lately become popular and is widely examples
recognized in the market or industry.
- Technology trends can influence how ● Collaborative Platforms.
customers reach your ecommerce site or - The goal of a collaborative platform is to
the company’s strategic efforts. facilitate communication and interpersonal
- Technology advancements can signal contact in corporate project work.
market openings or open up new products, - It is a virtual workspace where resources
but they can also present new ways that and tools are centralized
can give you a competitive advantage over
your online competition. ■ Examples:
● Assistive Technology → Video Conferences: Zoom, Skype,
- Piece of equipment, software program, or Discord, Google Meet, Microsoft Teams.
product system, these are equipment that → Office Suites: Google Work Space,
helps people especially those with disability Microsoft Office 365, Adobe Creative Cloud.
to increase, to improve, and to maintain → Online Games: Mobile Legends Bang
their functional capabilities. Bang, League of Legends, DOTA, Genshin
Impact
→ Educations: Canvas, Edmodo, Google → Web OS - Originally used in smartphones,
Classroom. now in smart TVs.
→ Windows Phone OS - A closed source and
● Convergent Technology proprietary operating system developed by
- An extension of the term convergence, Microsoft.
which means “coming together” of two or
more separate technologies / Synergy of ● Social Media
technological advancements to work on a - Are computer-mediated tools that allow
similar goal or task. people or companies to create, share or
- A convergence is when two or more distinct exchange information, career interest, ideas
things come together. and even pictures and videos in virtual
communities and networks.
■ Examples:
→ Smartphones ■ Types of Social Media
- Which combines the functionality of a → Social Networks
telephone, a camera, a music player, and a - These are sites that allows you to connect
digital personal assistant (among other with other people with the same interests or
things) into one divide. background.
- A tablet computer is another example of - Once the user creates their account, they
technology convergence. can set up a profile, add people, share
→ Artificial Intelligence content, etc.
- AI is when machines seem to be “intelligent” - Examples: Facebook, Twitter, Instagram,
- What humans really mean by intelligence, and etc.
however, is the ability to perceive your → Bookmarking Sites
environment and take actions that increase - Sites that allow you to store and manage
your chance of success in that environment. links to various websites and resources.
→ The Internet of Things - Most of the sites allow you to create a tag
- IoT is when physical devices, also called for others.
connected devices or smart devices, have - Examples: Pinterest, Google, Reddit etc.
electronics implanted in them that gives → Social News
them the ability to link to the Internet. - Sites that allow users to post their own
- By connecting to the Internet, they can news items or links to other new sources.
collect data, exchange data, make - The user can also comment on the post and
decisions, and control the device. comments may also be ranked.
- Examples: CNN, BBC, Apple News, Google
● Mobile Technology News, and etc.
- The popularity of smartphones and tablets → Media Sharing
has taken a major rise over the years. This - Sites that allow you to upload and share
is largely because of the devices capability media content like images, music, and
to do tasks that were originally found in video.
personal computers - Examples: Tiktok, YouTube, Spotify etc.
→ Blogs and Forums
■ Examples: - Allows users to post their content.
→ Android - Developed by Google. Being an - Other users are able to comment on the
open source means mobile phone said topic.
companies use this OS for free. - Example: Tumblr, WordPress, Evernote,
→ Blackberry OS - Developed by Blackberry and etc.
use in blackberry devices.
→ Firefox OS - Collaborative project by
Firefox for smartphones.
→ KaiOS - For feature phones.
→ iOS - Developed by Apple, used in Apple
devices such as iPhone and iPad.
→ Symbian - The original smartphone OS.
Used by Nokia devices.
Online Safety, Security, and Rules of - Get a sense of what the discussion group is
Netiquette about before you join it.
Online Safety, Security, Ethics, and Etiquette ■ Rule No. 4 : Respect Other People’s
Time and Bandwidth
● Internet Safety
- Remember people have other things to do
- The goal of internet safety, also known as
besides reading your email.
online safety, cyber safety, and E-safety, is
- We are not the center of their world.
to minimize a user’s ignorance of the
- Keep your post and emails to a minimum by
security hazards to their personal safety
saying what you want to say.
and property associated with using the
- Remember everyone won’t answer your
internet as well as to protect themselves
questions.
from computer crime.
■ Rule No. 5 : Make Yourself Look Good
Online
● Netiquette
- Be polite and pleasant to everyone.
- It is a made-up word, netiquette is
- Always check your spelling and grammar
constructed from the words net and
before posting.
etiquette.
- Know what we are talking about and make
- Netiquette refers to the standards of
sense of it.
behavior for polite and appropriate online
■ Rule no. 6 : Share Expert Knowledge
conversation.
- Ask questions online.
- Etiquette for the internet is another name for
- Share what you know online.
netiquette.
- Post the answers to your questions online
- These are suggested politeness guidelines
because someone else may have the same
rather than laws.
question we have.
■ Rule no. 7 : Help Keep Flame Wars
● Information We Must Limit to Share
Under Control
Online
- Netiquette does not forgive flaming.
- Personal Information
- Netiquette does however forbid people who
- Contact Information
are flaming to hurt discussion groups by
- Educational Background
putting the group down.
- Financial Account
■ Rule no. 8 : Respect Other People’s
- Location
Privacy
- Do not read other people’s mail without their
● The 10 Commandments of Netiquette
permission.
- The Core Rules of Netiquette are excerpted
- Going through other people’s things could
from the book “Netiquette” by Virginia Shea.
cost you, your job, or you could even go to
jail.
■ Rule No.1: Remember the Human
- Not respecting other people’s privacy is a
- We need to remember that we are talking to
bad netiquette.
a real person when we are online.
■ Rule No. 9 : Don’t Abuse your Power
- The internet brings people together who
- Do not take advantage of other people just
would otherwise never meet.
because you have more knowledge or
■ Rule No. 2: Adhere to the Same
power than them.
Standards Online that you Follow in Real
- Treat others as you would want them to
Life
treat you if the roles were reversed.
- We need to behave the same way online
■ Rule No. 10 : Be Forgiving of Other
that we do in real life.
People’s Mistake
- We need to remember that we can get
- Do not point out mistakes to people online.
caught doing things we should not be doing
- Remember that you were once the new kid
online just like we can in real life.
on the block.
- We are still talking to a real person with
- You still need to have good manners even
feelings even though we can’t see them.
though you are online and cannot see the
■ Rule No. 3: Know Where We are in
person face to face.
Cyberspace
- Always take a look around when you enter
a new domain when surfing the web.
Internet Threats - Since 2008, malicious security software has
● Internet Threats posed a significant security risk to desktop
- Web-based threats, or online threats, are a computers.
category of cybersecurity risks that may - SpySheriff and its clones were a primitive
cause an undesirable event or action via the example that became infamous.
internet. → Worm
- Web threats are made possible by end-user - After infiltrating a system, a computer worm
vulnerabilities, web service is a subset of Trojan Horse Malware that
developers/operators, or web services may spread or self-replicate from one
themselves. computer to another without human
activation.
● Malware Vs. Virus - Your Internet or LAN (Local Area Network)
- Malware is a catch-all term for any type of connection is often how worms spread
malicious software, regardless of how it throughout a network.
works, its intent, or how it’s distributed. → Spyware
- A virus is a specific type of malware that - Malicious software, often known as
self-replicates by inserting its code into malware, such as spyware, is placed on a
other programs. computer without the end user’s knowledge.
- Malware, or malicious software, is an - It intrudes, takes private information and
overarching term used to describe any internet usage data, and then passes it to
program or code that is created with the third parties like advertising, data
intent to do harm to a computer, network, or companies, or other users.
server. - This type of malware is hard to detect.
- A virus is a type of malware. → Keylogger
- The act of secretly recording the keys
● Malware pressed on a keyboard such that the person
- Malware is any software that is consciously using it is unaware that their actions are
created to disrupt a computer, server, client, being watched is known as keystroke
or computer network, leak sensitive data, logging, also known as keylogging or
obtain unauthorized access to data or keyboard capture.
systems, deny users access to information, - The person running the logging program
or unintentionally compromise a user’s can then get the data.
computer security and privacy. → Adware
- It is commonly referred to as advertising-
■ Types of Malware supported software, making money for its
→ Trojan creators by displaying banner ads on your
- A Trojan Horse Virus is a form of malware screen, typically inside of a web browser.
that installs into a computer pretending to - Although it is frequently made for desktops,
be a reliable application. adware can also be discovered on mobile
- In order to try and access consumers’ devices.
systems, an attacker will frequently utilize - Some types of adware are extremely
social engineering to conceal malicious manipulative and provide a backdoor for
malware in genuine applications. dangerous software.
→ Rogue Security Software → Spam
- Rogue Security Software is a type of - Malspam is an abbreviation for “malware
malicious software and online fraud that spam” or “malicious spam”, which refers to
tricks consumers into thinking their spam messages that include malware.
computer has a virus and tries to persuade - When readers open an email attachment or
them to pay for a phony malware removal click on a link, they often download malware
program that in fact installs malware on such as keyloggers, ransomware, Trojan
their computer. horses, bots, info-stealers, cryptominers,
- It is a type of ransomware as well as spyware, and Trojans.
scareware, which uses fear to control users.

● Ways a Computer Malware Spread


→ Phishing - Literary Works Such as Novels, Poems,
- Fraudulent emails that look authentic can Plays, Reference Works, Newspaper
carry worms in corrupt attachments. Articles;
- Such emails may also invite users to click - Computer Programs, Databases;
malicious links or visit websites designed to - Films, Musical Compositions, and
infect users with worms. Choreography;
→ Spear-Phishing - Artistic Works such as Paintings, Drawings,
- Target phishing attempts can carry Photographs, and Sculpture;
dangerous malware like ransomware crypto - Architecture; and
worms. - Advertisements, Maps, and Technical
→ Networks Drawings
- Worms can self-replicate across networks
via shared access. ■ How Long Does a Copyright Last?
→ Security Holes - The time limit should be equal to or longer
- Some worm variants can infiltrate a system than 50 years after the creator’s death.
by exploiting software vulnerabilities. - Longer periods of protection may however
→ File Sharing be provided at the national level.
- P2P file networks can carry malware like
worms. → Trade Secret
→ Social Networks - Trade secrets are intellectual property (IP)
- Social platforms like MySpace have been rights on confidential information which may
affected by certain types of worms. be sold or licensed.
→ Instant Messengers (IMs)
- All types of malware, including worms, can ■ To Qualify as a Trade Secret, the
spread through text messages and IM Information Must Be:
platforms such as Internet Relay Chat (IRC) - Commercially valuable because it is a
→ External Devices secret.
- Worms can infect USB sticks and external - Be known only to a limited group of
hard drives. persons, and
- Be subject to reasonable steps taken by the
Intellectual Property Rights rightful holder of the information to keep it a
● Intellectual Property Rights secret, including the use of confidentiality
- Intellectual Property (IP) is a category of agreements for business partners and
property that includes intangible creations of employees.
the human intellect.
- There are many types of intellectual ■ How Long Does a Trade Secret Last?
property, and some countries recognize - Trade secret protection is not limited in time
more than others. (patents last in general for up to 20 years).
- The most well-known types are copyrights, It may continue indefinitely as long as the
patents, trademarks, and trade secrets. secret is not revealed to the public.
- Intellectual property rights are the rights
granted to individuals over their creative → Trademark
works. They often grant the inventor - A trademark is a sign capable of
exclusive rights to utilize their creation for a distinguishing the goods or services of one
set length of time. enterprise from those of other enterprises.
- Trademarks are protected by intellectual
● 4 Types of Intellectual Property property rights.
→ Copyright
- Copyright (also known as author’s right) is a ■ What kinds of Trademarks can be
legal phrase that describes the rights that Registered?
authors and artists have over their literary - A word or a combination of words, letters,
and artistic creations. and numerals can perfectly constitute a
trademark. But trademarks may also consist
of drawings, symbols, three-dimensional
■ What can be protected using copyright? features such as the shape and packaging
of goods, non-visible signs such as sounds
or fragrances, or color shades used as without first getting permission from both
distinguishing features – the possibilities are professors.
almost limitless. Mosaic Plagiarism
- When a student uses terms from a source
■ How long does a Trademark last? without putting them in quotes or finds
- The term of trademark registration can vary, synonyms for the author’s words while
but is usually ten years. It can be renewed adhering to the general format and content
indefinitely on payment of additional fees. of the original.
Trademark rights are private rights and Accidental Plagiarism
protection if enforced through court orders. - This occurs when a person fails to mention
their sources, incorrectly paraphrases them,
→ Patent or unintentionally uses similar terms, word
- A patent is an exclusive right granted for an groupings, or sentence structures without
invention, which is a product or a process giving due credit to the original author.
that provides, in general, a new way of
doing something, or offers a new technical ■ Examples of Plagiarism from Jamie
solution to a problem. Dendy
- To get a patent, technical information about - Quoting someone's words from the Internet,
the invention must be disclosed to the a printed article, or an interview, without
public in a patent applications acknowledging the author.
- Copying part of the content of a work into
one's own paper without citing the source.
■ How long does a Patent last? - Copying or buying a paper and handing it in
- The protection is granted for a limited as one's own.
period, generally 20 years from the filing - Falsely creating a citation that doesn't exist.
date of the application. - Failing to credit and cite someone else's
thoughts or ideas when paraphrasing.
● Copyright Infringement - Paraphrasing in a way that relies too heavily
on another's language or syntax.
- A copyrighted work is generally considered
to have been violated when it is copied,
distributed, performed, publicly displayed, or ● Fair Use
transformed into a derivative work without - It means that an intellectual property may
the owner’s consent. be used without consent as long as it is
used in Fair Uses of Copyrighted Material
● Plagiarism
- Plagiarism is using someone else’s work or ■ Examples:
ideas without giving proper credit. - Criticism
- Comment
■ The Common Types of Plagiarism - News Reporting
- Teaching, includes making copies for use in
→ Direct Plagiarism
the classroom;
- Is the unattributed, unmarked transcription - Scholarship and research;
of a passage from another person’s work - Parody
word for word.
- The intentional theft of another person’s
work is unethical, intellectually dishonest, Contextualized Online Search and Research
Skills
and punishable by disciplinary measures,
● What are Contextualized Online Search
up to and including expulsion.
and Research Skills?
→ Self Plagiarism
- Utilize the internet as a tool for reliable
- Occurs when a student submits their own
information gathering and research to best
prior work or combines portions of prior
meet particular class objectives or solve a
works without getting permission from all
situation.
the teachers concerned.
- Students will use search engines more
- For instance, it would be improper to use
effectively. They can have a deeper
sections of a term paper from high school in
understanding of search strategies, in
a work for a college course.
particular, that will produce results that are
Self-plagiarism also includes turning in the
same homework for a separate class
helpful for their academic work and career → Title Bar
of choice. - This displays the document name followed
by a program name.
● Evaluating Information → The Ribbon
→ Accuracy: Content is grammatically - The ribbon constraints all the commands
correct, verifiable and cited when you will need to perform common tasks in
necessary. Word.
→ Author: Defines who created the content, - It has multiple tabs (menu bar) each with
the individual or group’s credential/expertise several groups of commands.
and provides contact information. → Command Group
→ Currency: Information is current & updated - Each group contains a series of different
frequently. commands. Simply click any command to
→ Fairness: Content is balanced, presenting apply it.
all sides of an issue and multiple points of - Some groups also have a command arrow
view. in the bottom-right corner, which you can
→ Use of Search Engines: Search Engines click to see even more commands.
are programs that look for documents → Ruler
based on specified keywords and return - The ruler is located at the top and to the left
these documents where the keywords were of the document.
found. Major Search Engine: Google, - It makes it easier to make indentation
Yahoo, AltaVista, Bing, Lycos alignment and spacing adjustments.
→ Relevance: Content is relevant to your → Scroll Bar
topic or research. - Click, hold, and drag the scroll bar to scroll
up and down through the pages of your
● How to Google like a Pro document.
→ Site: Using site: to search within a specific → Zoom Control
website. - Click, hold, and drag the slider to use the
→ Asterisk: Using * to fill the missing word or zoom control.
phrases. - The number to the right of the slider bar
→ Hyphen: Using - to exclude words or reflects the zoom percentage.
phrases. → Document Views
→ Quotation: Using “” to search for exact - There are three ways to view a document.
words or phrases. Simply click to select the desired view:
→ Range: Use … to search within a range of ○ Read Mode - Displays the document in full-
numbers. screen mode.
→ Plus: Use + to search pages that contain ○ Print Layout - It is selected by default. It
both words. shows the document as it would appear if it
→ Link: Use a link to search for a page that is were printed.
linked to another page. ○ Web Page Layout - It shows how the
document would look as a web page.
Advanced Word Processing Skills → Word Count
● Microsoft Word - Words count displays the number of words
- It is a word processor developed by in the document.
Microsoft. - Click word count to open the word count
- It was first released on October 25, 1983. dialog box. Here users can quickly view the
document’s statistics, like the number of
● Microsoft Word Parts pages, paragraphs, and lines.
→ Quick Access Toolbar → Page Number Indicator
- The quick access toolbar lets you access - The page number indicator helps you keep
common commands no matter which tab is track of the number of pages your
selected. document contains.
- By default, it includes the Save, Undo, and - Click the page number indicator to open the
Redo commands. document navigation pane. Here, you can
- You can add other commands depending search the document by headings or scroll
on your preference. quickly through its pages.
→ Backstage View
- It gives users various options for saving,
Ctrl + M Indent the paragraph.
opening a file, printing, and sharing the
document. Ctrl + N Opens a new, blank
document window.

Ctrl + O Open the dialog box or


page for selecting a file
to open.

Ctrl + P Open the print window.

Ctrl + R Aligns the line or


selected text to the
right of the screen.

Ctrl + S Save the open


document. Just like
Shift F12.

● Microsoft Versions Ctrl + T Create a hanging


indent.

Ctrl + U Underline the selected


text.

Ctrl + V Paste.

Ctrl + W Close the currently


open document.

Ctrl + X Cut selected text.


● Microsoft Word Shortcut Keys Ctrl + Y Redo the last action
Shortcut Description performed.

Ctrl + A Select all contents of Ctrl + Z Undo last action.


the page.

Ctrl + B Bold highlighted Advanced Spreadsheet Skills


selection. ● Microsoft Excel
- Microsoft Excel is a spreadsheet developed
Ctrl + C Copy selected text. by Microsoft for Windows, Mac OS, Android
Ctrl + D Open the font and iOS.
preferences window. - It features calculation, graphing tools, pivot
tables, and a macro programming language
Ctrl + E Alights the line or called Visual Basic for Applications.
selected text to the
center of the screen.
● Microsoft Excel Parts
Ctrl + F Open the find box. → Title Bar
- This displays the workbook name followed
Ctrl + I Italic highlighted by a program name.
selection. → The Ribbon
Ctrl + J Alights the selected - The Ribbon contains all of the commands
text or line to justify the users will need to perform common tasks in
screen. Word. It has multiple tabs (menu bar) each
with several groups of commands.
Ctrl + K Insert a hyperlink. → The Name Box
Ctrl + L Alights the line or - This shows the address of the current
selected text to the left selection or active cell.
of the screen. → The Formula Bar
- The formula bar displays information
entered or being entered as you type - in
the current or active cell.
- The contents of a cell can also be edited in
the formula bar.
→ The Column Headings
- In the modern versions of Excel this is
column XFD, which is 16, 384 columns.
- Each column is named by a letter or
combination of letters.
→ The Row Headings
- In the modern versions of Excel there are
1,048,576 rows.
- Each row is named by a number.
→ The Cell
- A cell is an intersection of a column and
row.
- Each cell has a unique cell address.
- The heavy border around a selected cell is
called the cell pointer.
- Each cell has a unique cell address
composed of a cell’s column and row.
- The active cell is the
→ The Navigation Buttons and Sheet Tabs
- Navigation buttons allow you to move to
another worksheet in an Excel workbook.
- They are used to display the first, previous,
next, and last worksheets in the workbook.
- A workbook is made up of three
worksheets. The worksheets are labeled
Sheet 1, Sheet 2, and Sheet 3. Each Excel
worksheet is made up of columns and rows.
- To access a worksheet, click that tab that
says Sheet #.
→ Worksheet Views
- There are three ways to view a worksheet.
Simply click to select the desired view:
- Normal View, Page Layout View,Page
Break Preview.

● Microsoft Versions

You might also like