0% found this document useful (0 votes)
27 views24 pages

NOTES MF0974 - 1

This document describes the basic concepts of Microsoft Word, including the document window, files, keyboard shortcuts, font formatting, indentation, and text enhancements. It explains elements such as characters, lines, paragraphs, headers, footers, and margins. It also covers topics such as page setup, headers and footers, print preview, and printing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views24 pages

NOTES MF0974 - 1

This document describes the basic concepts of Microsoft Word, including the document window, files, keyboard shortcuts, font formatting, indentation, and text enhancements. It explains elements such as characters, lines, paragraphs, headers, footers, and margins. It also covers topics such as page setup, headers and footers, print preview, and printing.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

EXAM MF0974_1

1.3. DOCUMENT WINDOW

Character: a letter, a number, a symbol, a whitespace. In general, a character.


it corresponds with the press of a key, although it is possible to detect characters that
they are not present on the keyboard. It constitutes the smallest writing unit.
Line: a set of characters that goes from one end to the other of the page.
Paragraph: a set of lines, which ends by pressing the Enter or Remote key.
Header: an element located at the top of the page that repeats in several
pages of the document (all of them, the even ones, the odd ones, the pages of a section) and
that contains informative elements such as the page number, the title of the document,
the authors, etc...
Footer: an element located at the bottom of the page that repeats, just like
the header, on several pages of the document.
Footnote: text that serves to introduce issues on the margins of the
reasoning or main flow of the text (a bibliographic citation, a piece of data or information that
supports the text argument). It consists of a reference and a text.
Margins: space between the edge of the paper and the location where the text is placed
printed on the sheet.

1.6. APPLICATION FILES

.Docx is the Word extension since 2007 (it maintains compatibility with previous versions) and
the previous '.doc' (2003 and earlier).

1.12. SHORTCUT TO CLOSE DOCUMENT

To close a Word document we are working on, we use the keyboard shortcut.
CRTL + R

KEY DISPLACEMENT
←,→ One character to the right or left
↓, ↑ One line up or down
Ctrl + ↑, Ctrl + ↓ A paragraph above or below
start Until the beginning of the line
End Until the end of the line
Ctrl + Home Until the beginning of the document
Ctrl+ fin Until the end of the document
RePag Upwards from screen to screen
AvPag Downward from screen to screen
Ctrl+ Page Up Down the PAGE
Ctrl + Page Up Up the PAGE
Shift + F5 To the place where the insertion point was located last.
veins.
A word to the left or right
Ctrl + Right Arrow, Ctrl + Left Arrow

1.13. SHORTCUTS FOR NAVIGATION


1.13. BASIC WRITING RULES

1. To insert an uppercase character, press the combination Shift+character. If


we want to introduce several words in uppercase, there is a simpler alternative:
Press Caps Lock (this will light up an indicator on the keyboard) to enter the text
and press it again to deactivate.
2. Some keys have 2 or 3 different characters associated with them, which we will obtain.
pressing various combinations. Thus, for example, on the key of the image, we will write
the quotation marks by pressing Shift + 2 and the at symbol by pressing AltGr + 2.
3. The place where what we write is inserted is determined by the position of the cursor or
insertion point, a blinking black vertical line. (The cursor should not be confused with
with the mouse pointer, since they can be located in different positions of the
document.

1.18. SELECTION SHORTCUTS

KEY SELECTION
Shift + Left Arrow, Right Arrow A character to the right or left
Shift + Down, Up A line up or down
Shift + Ctrl + Left Arrow One word to the left or right
Shift + Ctrl + →
Shift + Ctrl + ↓ A paragraph up or down
Shift + Ctrl + Up
Home + Shift To the beginning of the line

KEY SELECTION
Caps Lock + End Until the end of the line
Shift + Ctrl + Home Until the beginning of the document
Shift + Ctrl + end Until the end of the document
Page Up Up from screen to screen
Shift + Page Up Down screen by screen
Shift + Ctrl + Page Down Downward on the PAGE
Shift + Ctrl + Page Up Up the page on PAGE

SHORTCUTS UNDO/REDO

Ctrl + C Copy
Ctrl + x Cut
Ctrl + v To stick
Ctrl + z Undo
Ctrl + y Redo
Ctrl + b Search
Ctrl + l Replace
Ctrl + E Select all
2.1.1. MARGINS

The margins delineate the printable area of the page. Typically, we will work with
four margins: left, right, top, and bottom. All pages of the document
they will have the same margins.

When the document we are preparing is going to be bound, on the contrary,


It is advisable to define different margins for even and odd pages, in order to leave a
additional space for binding. And so that, when viewing both PAGES at once
printed, the printed stain of both is symmetrical.

2.1.2. PAGE ORIENTATION

The orientation of the PAGE refers to the fact that, in the processing application...
Texts can be written with the page in vertical or horizontal orientation.

2.2.2. PRELIMINARY VIEW

The print command in the file menu shows a preview of the page.
document, which we visualize as it will remain with the printing specifications
selected and page configuration that we have established.

2.3. HEADINGS AND FOOTER

Headers and footers are elements that repeat on all pages of the
document.
Sometimes when the document is going to be printed double-sided and bound, it will be of interest.
specify different headers depending on whether the PAGES are even or odd. You can also
it is necessary to specify a different behavior on the first page of the document,
because on this page, being the one that has the title, a layout is usually preferred
so different.

2.4.2. IMPRESSIONS

In the print panel, we can choose the printer we want to use, the number of
copies, if we want to print only the active sheet or sheets or the entire workbook, the orientation of the
document...

3. TEXT IMPROVEMENTS

One of the most useful and characteristic functions of word processing applications
it is about formatting the documents, that is, providing certain visual characteristics to them
characters and their paragraphs to improve their aesthetics, facilitate their understanding or provide more
expressive force.

3.1. SOURCE

With the character or font format, we control the presentation of the characters.
document.

3.1.1. TYPE, STYLE, SIZE, COLOR, UNDERLINE AND FONT EFFECTS

Among others, we can explore the following properties:

Source font type: with this option we can modify the font type of the text,
we will select one from those installed in the operating system.
Font size: it is normally defined in typographic points.
This is from the source: in the most common typographies, each of the letters and symbols
They come in various representations: normal or round, italic or slanted, and bold.
Each style corresponds, in reality, to a definition of a different character in its form and
thickness.
Effect of the font: various effects can be applied to the characters, such as underlining.
strikethrough, superscript and subscript, small caps (uppercase letters at the same height as the)
lowercase letters).
Font color and highlight color: with the font color we specify the shading of
the letters; with the color of the highlight, the background of the line similar to if we used a
fluorescent marker.

3.1.2. CHANGE FROM UPPERCASE TO LOWERCASE

Sentence type: this option will apply uppercase to the first character after the period.
Lowercase: we will select this option to convert all the selected text to
lowercase.
Uppercase: convert the selected text to uppercase
Convierte En Mayúsculas El Primer Carácter De Cara
word.
Toggle may/minus: it intervenes in the selected text format, so that, if the text
SELECTED IS IN UPPERCASE WHEN THIS OPTION IS SELECTED, THE TEXT WILL BE WRITTEN IN THIS WAY
in lowercase.

3.1.2. SHORTCUTS SOURCE OPERATIONS

KEYS OPERATION
Ctrl + Shift + F Source
Ctrl + N Bold
Ctrl + K Italic
Ctrl + S Underlined
Ctrl + Shift + M Source (size)
Ctrl + * Superscript
Ctrl + Shift + O Subscript
Ctrl + Shift + L Versalita

3.2.2. USE OF DIFFERENT TYPES OF INDENTATION

The indentation is the distance between the margins of the paper and the ends of the paragraph.
distinguish various types:

First-line indent: it is the space between the left end of the first line
of the paragraph and the margin.
French indent: it is the separation of all lines except the first.
Left indent: it is the left separation of all the lines of the paragraph.
Right indent: right separation of all text.

3.2.3. PARAGRAPH AND LINE SPACES


The line spacing is the vertical separation between the lines that make up a paragraph or, more
precisely, between the baseline. They usually use 3 types: single, double, and space and
medium.

On the other hand, paragraphs can have a separation (space between paragraphs) somewhat
greater than that between the lines that make up each paragraph: this facilitates reading and
allows you to quickly visualize its beginning and its end.

3.2.4. SHORTCUTS ALIGN OPERATIONS

KEYS OPERATION
Ctrl + Q Align to the left
Ctrl + T Center
Ctrl +D Align to the right
Ctrl + J Justify
Ctrl + 1 Single line spacing
Ctrl + 2 Double spacing
Ctrl + 5 Line spacing at 1.5
Tabulator Insert first line indent
Ctrl + F Insert hanging indent
Ctrl + H Remove French indentation

3.4. WE HAVE NUMBERED LISTS AND BULLET POINT LISTS

The list is a set of elements whose element visually provides the sensation of
a certain structure. Lists can be numbered or unnumbered, depending on the elements.
they carry some symbol that assigns them an order or a repeated element.

4. CREATION OF SIMPLE TABLES, USE AND MANAGEMENT INTRODUCTION


Tables are a way to visually organize information in a systematic manner.
Tables consist of a series of rows and columns.

The intersection of a row with a column forms a cell, which thus constitutes the unit.
minimum of the table.

4.3. MOVEMENT SHORTCUTS

KEY DISPLACEMENTS
Alt + Home First cell of the row
Alt + End Last cell of the fine
Alt + Page Up First cell of the column
Alt + Page Up Last cell of the column

5. DESIGN, ORGANIZATION, AND ARCHIVE OF GRAPHIC PRESENTATIONS

A graphic presentation is a set of elements with text, images, and, on occasion,


videos and sound, which are displayed on the screen and occur with certain transitions between them
them.

5.1.1. IMPORTANCE

The use of graphic presentations constitutes a highly interesting graphic support for
make an oral presentation. The presentation is a support and not a substitute for the spoken word.
talk. There is nothing more boring and less communicative than a presentation in which a
The speaker reads the content of their graphic presentation.

5.1.2. RESPECT FOR THE ORGANIZATION'S STYLE GUIDELINES

A graphic presentation must align with the graphic identity, the corporate image and the
style norms of the organization in question (public institution, company,
non-profit organization, etc.) in this sense, they will try to include the logos
necessary and to respect the color range and typographies defined for the graphic identity of
said organization.

5.3. DELIVERY OF THE WORK DONE

When preparing a presentation, a sequence of steps must be followed that ensures quality.
of the same and the fulfillment of the objectives:

Study the audience to which the presentation is aimed and the context in which it should be.
to be used.
Establish a design aspect in which consideration must be given to the issues.
previously raised.
Develop the content and subsequently include the graphic and multimedia material, as well as
the possible animations and transitions between them.
Practice the presentation and its accompaniment with the oral exposition.
5.11.3. CONFIGURATION OF THE DIFFERENT PRINT FORMATS

When printing, it is necessary to specify whether we want to print only the slides, the
slides and their associated notes, the presentation outline or multiple slides on the page
of paper.

5.11.4. PRINTING OPERATIONS

The print panel shows us a preview of the current slide, as it will appear.
once printed.
UF0512

HARDWARE

It is the physical part of the computer, those component parts that are tangible. It is the set
of all the interconnected electronic devices that allow tasks to be carried out
of processing, calculation, and user interface. Apart from these elements, there is a need to
include those others that shape it, such as housings, buttons, systems of
lighting, screws, cables... in short, the entire set of elements that make up the
device.

Software: it is the logical part of the computer, literally the soft part, it is the set
of programs and applications that are responsible for operating the machine and performing the
necessary operations to respond to the user's needs.

1.2.CLASSIFICATION OF DEVICES ACCORDING TO THE TASK TO BE PERFORMED


Processing: these are the devices responsible for collecting and the
data processing and the generation of information and orders to the rest of
devices for the proper functioning of the equipment. They are responsible for controlling and
process the tasks to be performed. The highest exponent is the CPU.
Storage: it refers to the devices responsible for storing the
information for later use or generated from processing tasks.
They can be permanent or volatile and external or internal to the device. Among them
there are RAM memory, hard drives, and pendrives.
Inputs allow the entry of data or commands into the system through the ports.
corresponding to the motherboard. Among them we find the keyboard, the mouse or the
scanner.
Output: allows the output of information or its visual representation to the outside.
they connect through the ports of the motherboard. Among them are the screen,
printer.
Input/output: allow for simultaneous input and output of information to/from the system
through the corresponding ports. A sound or network card fulfills this
function.

Currently, the computers we use are digital. That is, they are based on
binary codes that are capable of representing any type of information, with greater
or less accuracy, depending on the number of bits they handle.

In other times, there were machines that we can consider analog computers, which
through mechanical, hydraulic, or electronic systems were able to perform calculations
automatically.
1.5. CPU

The Central Processing Unit (CPU) is the main element of the computer we could say that
It is the brain. It is responsible for the following tasks:

1. Interpret the program instructions and carry out the collection, processing and
return of data in collaboration with memory.
2. It controls all the processes that take place inside the computer, either in a way
directly or delegating to other devices.
3. It meets the needs of the computer's input/output devices.

1.6. PERIPHERALS: INPUT DEVICES Y OUTPUT, DEVICES OF


STORAGE AND MULTIMEDIA DEVICES

A peripheral is called any physical device connected to the computer that allows
route the information inward and/or outward or store it.

According to this definition, a classification of peripherals can be made according to the


path that runs the information regarding the computer. Thus, there will be peripherals of
input, output, input/output, and storage.

Input: they are those components of the computer that route information from
the outside to the inside. Keyboard, mouse, scanner, microphone...
Output: these are the components of the computer that direct information from the
interior to the exterior. Monitor or screen, speakers, printer...
Input/output: these devices are responsible for directing data from the outside
from the inside, as from the inside to the outside. Sound card, network card, modem…
Storage: they are components that allow information to be stored in format
digital. Hard drive, CD-ROM reader/writer, DVD reader/writer, USB drive of
memory, memory card...
Multimedia: those who use various media jointly and simultaneously, such as
images, sounds, and texts, in the transmission of information.

It is necessary to add the tables of the problems for each peripheral.

Review those from the day 10/20 and 10/21

Arrange the structure of the doc

Arrange the numbers that go in the titles

Adjust the margins

Adjust the font size and type.


Check if anything is missing

Review the tables


NOTES 10/23

PAGE 221

2.1. The active listening attitude in receiving work instructions

We can understand communication as the process through which a


information transmission between two subjects who are capable of interpreting and understanding it from
the same way. For this, a set of elements is necessarily required
presents so that this information can be transmitted:

Sender: is the subject origin of the information, the one who initiates the communication process.
Receiver: it is the recipient of the information, who must receive and interpret it.
Channel: it is the physical element through which the information will travel.
Message: it is the information proper in its entirety, qualified in such a way
that both the sender and the receiver understand each other.

Code: it is the set of letters that allow composing the message encapsulating the
information in a format understandable by both the sender and the receiver.

Therefore, for communication to occur, the sender creates a message according to a


code that both he and his interlocutor (the receiver) know, encapsulating the information
what you want to transmit; and places that message in the channel through which it is transmitted; the
the receptor receives the message, decodes it and interprets it, obtaining in this way the
information that the sender wanted to convey.

PAGE 222

Active listening requires certain conditions to be effective:

Attention: the person receiving the instructions must pay attention to both what the
The interlocutor says how to that which manifests in a non-verbal way, to extract
all possible information regarding the what, how, and when...
Interest: the one who must execute the instructions is obliged to take an interest in them.
the end of allowing to delve into the message and specify as much as possible in that
what is being asked of him.

Feedback: The sender feels that the information is being understood.


for the receiver, simple gestures of agreement will be sufficient. In case of not
understand something or consider that the information is incomplete, the receiver must
to manifest it to the sender in order to find a remedy.
PAGE 223

2.1.1. Communication requirements at the corporate level

At the business level, communication must meet certain important requirements.


intention to be as direct and effective as possible:

Concreteness: the information that is transmitted must be clear and concise, the necessary.
in order to achieve the objectives.
Adaptation: the message must be suitable for the people it is addressed to
both in language and in content.
Precision: the information or instructions must be precise, adjusting to what
it is needed and reaching the necessary level of detail for its complete understanding.

PAGE 223

2.1.2. Types of communication

Depending on the conditions under which communication occurs, it can be identified


different types

Interpersonal: it is a type of close communication. In it, two interlocutors or even


some maintain a dialogue, therefore, communication is bidirectional,
alternating between sender and receivers.
Massive: it is a type of communication in which the closeness between the
interlocutors. It is usually unidirectional, from one sender to many
receptors, without them having the possibility of replication.
Organizational: this esthetic focuses on how to achieve effective communication at a level
corporate among the different departments and at the same time among the different
rankings.
NOTES 24/10

PAGE 224

2.1.3. ASCENDING AND DESCENDING FEEDBACK

Within an organization, there is usually a hierarchy. This ordering corresponds


at different levels of qualification, different decision-making powers, different capabilities of
managers, different levels of responsibility. In a company or organization, there are people who
directs and people who carry out the work. As one rises in the ranks, there is an increase in
responsibilities, in command capacity, in decision-making power and normally in
qualification.

PAGE 225

2.1.4. ELEMENTS THAT ACCOMPANY ORAL COMMUNICATION

When we communicate, information is often transmitted orally, but this is not the
the only way through which the receiver receives information. The rest of the senses to a greater or
smaller measurements also capture information that complements this communication,
completing the message that is transmitted from the sender. So much so that it is estimated that more
90% of communication does not have to be with words according to various studies.

The elements that accompany oral communication and intervene decisively in the
information transmission are:
1. The voice: when the transmission is oral, the voice is the instrument through which the message travels.
message. Depending on the characteristics of the voice, the objective of communication is
will be fulfilled to a greater or lesser extent or in different ways.
Volume: it has to do with the intensity of the sound that is emitted. We must adjust it.
the volume of the voice to adjust it to the context in which it is intended to be transmitted
message ensuring its receipt and avoiding coercion and discomfort for the recipient
(unless that is what is intended).
Tone: it has to do with the inflection of the voice and the way we say something.
according to the intention we want to give it or the mood we are in.
Depending on the tone in which the words are conveyed, the message will be perceived in one way or another.
manner, generating acceptance, rejection, persuasion, doubt...
Pronunciation.
Rhythm.
2. Silences: they are equivalent to pauses in speeches. They are used to organize it, to
highlight what has been said or what follows, in order to choose the appropriate words with
those to whom the information is intended to be conveyed, to facilitate feedback... are moments
in which to capture the recipient's attention, allowing the important part of the message
I arrived at that moment. A good speaker must know how to handle both the word and
the silences.
3. The postural and gestural attitude: allows receiving extra information from both the sender and the ...
receiver in the communication process, is part of nonverbal language and allows
to know from the mood of a conversational partner to the level of interest they have.
4. The gaze: it becomes a sign of the attention of the sender to the receiver and vice versa.
When the gazes of one and the other converge, communication becomes more effective.
attention increases and the reception of the message is facilitated. When the sender focuses on the
looking at a single receiver or at a single specific point loses sight of the rest. When the
The receiver does not look at the sender, they can deduce that they are not being given attention.

PAGE 227

2.1.5. EFFECTIVE COMMUNICATION IN INTERPRETING WORK INSTRUCTIONS

Communication must be clear, concise, and precise to avoid misunderstandings.


vagueness in the tasks that are requested to be carried out. A well-defined instruction specifies
perfectly a problem to solve and the way to do it, facilitating at the end of solving it
to take timely actions for its resolution.

The conditions that must be met for the instructions to be perfectly interpreted
son

The sender must give the instructions clearly, concisely, and precisely.
2. You must specify everything necessary for the completion of the task.
3. The receiver must read/listen carefully to each instruction given.
by the sender (comprehension reading / active listening).
4. It should be perfectly clear what to do (task), how to do it (procedure) and
by when to do it (deadline) in case of having any doubts about any of these aspects
He will ask to clarify it and avoid unnecessary errors and delays later.

PAGE 230

2.3. PROTOCOL STEPS

Applied to the transmission of documentation, we could say that the protocol is the set of
norms or rules that establish how communication transmission is carried out
between two subjects, departments or institutions so that both are clear about the course
through which it will be sent and received, as well as the format in which it must be recorded
information. All of this in order to ensure that it is done correctly according to what was agreed.

To this end, organizations are increasingly tending to create management systems for the
documentation, treating it as an important asset of the institution and establishing
rules when creating, reviewing, modifying, transmitting, and storing such information.

PAGE 234

2.5. DELIVERY OF INFORMATION


Aspects that organize and regulate the delivery of information:
1. Standards: the regulation establishes the legal framework in which an activity is governed.
2. Addressee: the addressee is the person or organization to whom the delivery is made.
documentation.
3. Deadlines: when documentation must be submitted, deadlines can be established for
its delivery.
4. Procedures: the individuals or organizations that are expecting to receive the documentation usually
enable various channels for the receipt of documentation, so that those who
choose the one that suits you best.
5. Established delivery formats: sometimes it is required that the documentation be
delivered in a specific format.

PAGE 237

3. COMPUTERIZED INTERNAL DOCUMENT TRANSMISSION


The transmission of documents through electronic means has made it such that more and more,
conventional media take a back seat, limiting themselves to communications for which
they are considered essential. In order to carry out this type of communications, it is
essential that the information to be transmitted is in electronic media, with
what administrations and companies are investing a large amount of efforts in
recording of the data held in conventional media. The digitization of
documentation allows for its instantaneous transmission while also reducing the
space occupied by files and, sometimes, the editing of that documentation.

PAGE 238

3.2. TYPES (EMAIL AND LOCAL NETWORK)

Email: the precursors to email appeared in the 1960s, before


even the emergence of the internet. It is a tool that imitates the functioning of mail
Postal. Allows sending information in electronic format through a network, only
indicating the recipient's address, and free of charge. To be able to communicate through
from the email, it is necessary to have an account registered. Our mailbox is identified by
an address that consists of a user identifier, a symbol created specifically
for the email called at (@) and an identifier of the server machine that contains
our mailbox, which will correspond to an internet domain.

Email is not a guaranteed service, but it is very reliable, rarely does it happen
errors in the delivery of the emails.
NOTES 25/10

PAGE 239
3.2.2. LOCAL NETWORK

Via the local network (LAN), computers or devices can be connected.


direct network storage, achieving the ability to share files,
having access to them from any previously authorized company computer, without
need to go abroad, and transfer speeds being much higher
higher than when you use the internet.

A local network is basically formed by a set of computers or other devices.


that connect to a private network to share information and resources within that network
There are users connected through their computers and with certain privileges that limit what they can access.
and what they cannot access, what can be modified and what cannot.

PAGE 248

3.4. INTRANET
The intranet is a communication system that, for all intents and purposes, works like the internet.
but its use is limited to a specific environment, normally to an organization therefore
its scope is well defined and limited to a certain number of users.

The services offered to workers can be:

1. Email with internal messaging between users.


2. Public communication spaces, such as bulletin boards, announcements.
3. Access to company information and documents for use and completion.
4. Communication between the different departments or work centers, independent of
the distance that separates you.
5. Use of specific software for group work.
6. Interconnection with the extranet intended for customers, suppliers...
7. Connection to the internet from anywhere in the world.

PAGE 254

4. SECURITY STANDARDS THAT GUARANTEE CONFIDENTIALITY IN TRANSMISSION


When managing and transmitting information, it is important to take into account that such data
they can be attractive to people outside our organization, which is why it is done
It is necessary to take appropriate security measures to protect them from unauthorized inquiries.
authorized, theft, manipulation. The information security management systems are
increasingly present in the institutional world, as the information is also
protected by law, is one of the most important assets owned by organizations. It
It seeks to preserve both its integrity, its confidentiality, and its availability.

PAGE 254

4.1.INFORMATION SECURITY MANAGEMENT

Information is one of the most important assets for an organization.


for their customer data, inventory in stock, invoices, their data
workers... It becomes essential for any company or institution to manage
proper way your own information.

PAGE 255

4.1. INFORMATION SECURITY MANAGEMENT

The ISMS are responsible for the existence of sufficient security controls tailored to each
organizations that protect information and provide the necessary trust to the parties
interested parties.

They are based on a process model: 'Plan – Do – Check – Act.' Which starts from
about the security requirements to be met and the expectations that are to be achieved
Establishing those requirements, develop a set of actions and processes that comply with them.
they cover the others.

The management of information security is developed by addressing 3 dimensions.


main

1. Integrity: it is the maintenance or preservation of information in a complete manner.


exact.
2. Availability: access to information must be guaranteed at the moment it is needed.
needs.
3. Confidentiality: access to the information must be guaranteed only to authorized individuals.
or authorized entities.
NOTES 27/10

PAGE 257

4.2. ORGANIZATION'S SECURITY POLICY

Information is one of the most important assets for an organization. When it


causes an irreparable loss of information, the damages that this institution suffers
they are amazingly important. The information security policy becomes
a fundamental importance to protect the business areas of an organization.

In the end, it is about developing actions that allow for minimizing risks.
Once these have been identified and studied. To quantify that containment of risks
they establish controls that allow knowing the degree of compliance with the objectives
initially proposed. The risks are thus analyzed in several dimensions:

Confidentiality
Integrity
Availability
Authenticity
Traceability. The traceability of documentation during its stay in the company is vital.
in order to control who has access to it and thus be able to ask
responsibilities in case of leaks. The company must take care of granting access to the
information only and exclusively to authorized persons.
Therefore, the 'quid' of the matter is not so much the absence of incidents (something on the other hand
impossible to assure) like the confidence that they are under control: it is known that it can happen and
it is known what to do when it happens.

PAGE 258
4.3. IDENTIFICATION AND CLASSIFICATION OF ASSETS TO BE PROTECTED

Within the framework of an information security management system, it is necessary to identify.


those vital parts for the organization that need to be protected. To do this, they will be identified,
the risk will be measured, possible threats will be assessed, and actions will be taken to reduce that risk.
so that, if a security incident occurs, it is not serious and can be
to resolve in a straightforward way with hardly any consequences for the organization.

PAGE 260

4.4.PERSONAL RESPONSIBILITY FOR HANDLED DOCUMENTS


As qualified workers, employees of any organization must perform
their work according to their training and assuming responsibility for their work, since this
It impacts the company's productivity, its growth, as well as its image.
what is projected towards the clients. This means that certain requirements are demanded in their work.
for a proper performance.

Confidentiality of the data processed. The traceability of the documentation in its


staying in the company is vital to be able to control who has access to it and from that
way to hold accountable in case of leakage. The company must take care of
to grant access to information only and exclusively to authorized persons.
Rigorousness in the data processed. Every person who handles information in a
the organization has the responsibility to handle it with the utmost rigor possible, not only for
imposition but also by personal ethics.
Exclusive use of data. The use of data requested by third parties must
to be limited exclusively to the purpose for which they were supplied, so that any use
Improper use of the same may lead to a request for accountability from the one who does it.
bypassing that exclusivity. Likewise, the data of an organization can only be
to be used by authorized persons and in the activities specific to that organization,
regardless of whether one has access to them when not working. Any
any other improper or fraudulent use will be the responsibility of the company that holds them,
as well as the people who carry it out, under the protection of current legislation.
Response and responsibility for errors or infractions committed in the handling of
data.

PAGE 266

AUTHENTICATION

Authentication is a security procedure that allows verifying the identity of the


individual accessing a venue, a resource or a service through electronic means.
When working with sensitive information in an organization, it is vital to control who
have access to it or to the equipment that manages it, which makes the presence of necessary.
access controls both physical and electronic.

PAGE 271

4.9. PROTECTION OF INFORMATION SUPPORTS AND BACKUP COPIES

The goal pursued by making backups of information or copies of


backup is to maintain the integrity and availability of information and the means of
processing. It involves making periodic backups of the information for its restoration in
in case it is necessary.

UF0510 (WORD, POWERPOINT)


UF0511 (EXCEL)

UF0512 (CONFIDENTIALITY)

UF0511 – EXCEL - 10/28/2022


PAGE 98

1.4.3. FREEZING AREAS OF THE SPREADSHEET

Excel allows you to freeze the first row and/or column of a sheet. To always have them
visible while we navigate through it. We can find in the "view" tab in the
immobilize menu.

• Arrow keys
• Tab key
• Shift + Tab
• Home key
• Ctrl + Home

TABLE OF PAGE 98

PAGE 100

1.6.DATA ENTRY

In a spreadsheet, the information we input must have a certain structure.


Before starting to input data, (therefore, especially in spreadsheets of a certain
size and complexity) it is advisable to design the information distribution beforehand. Sometimes
It is very useful to prepare a schematic diagram on paper to get a graphic idea of where
The diverse information that we will introduce in the document will be located.

To enter data into a specific cell, we simply move to it and do so.


we type on the keyboard. For entering numerical data, the fastest method is the use of
numeric keyboard. When entering the data, it fills the cell and displays itself in the box
text located above the table.

PAGE 103

1.7.DATA TYPES

In the data sheet we can enter different types of data:

Texts: texts are generally used as titles and headings of rows or


columns; any set of characters that are not identified as a number or
some of the other data types described below will be classified as
texts.
Values or numbers: they are numerical inputs to which various can be applied.
formats (for example, the number of decimal places that should be expressed
the number).
Dates: dates are combinations of numbers and, at times, texts (the names of
the months or the days) that specify a certain day of the calendar.
Time: it is a numerical input that specifies a specific hour of the day.
Boolean values / logical values: this type of input has two possible values:
true or false.
Formulas: a formula is a set of operations that, carried out with data, said
data can be constants or references to the cells that contain the data. When
enter a formula in the data sheet in the cell, the result of the formula is displayed.
Functions: functions are abbreviated formulas that perform a mathematical operation.

PAGE 105

1.8.2. EXCEL BOOK

The file where the data is stored is referred to by Excel as a workbook. Each workbook
The work may contain several sheets.

PAGE 108

2.1.1. RANGE OF CELLS

A range is a set of contiguous cells, shaped like a rectangle, that can span from
a single cell for the entire sheet.

TABLE OF PAGE 108

PAGE 109

2.1.2. ROWS, COLUMNS, AND SHEETS

Cell selection operations using the mouse are summarized as follows


table:

TABLE OF PAGE 110

PAGE 110

2.2. MODIFICATION OF DATA

The data is stored in the cells considering that their width cannot exceed
255 characters and a cell can only store one type of data at a time.

Excel supports the following types of data:

Excel considers text the data that includes any character. The text appears in
the default cells, aligned to the left. If you want it to appear centered or aligned to
The right side can click on the corresponding icon in the toolbar.
Format.
Numbers: they are all the digits from 0 to 9 and special characters.
Dates / Times: in Excel, you can directly enter any date and time and the
the program will consider it as such. We can enter a value of such type in the same cell
date and one time type, both separated and with a blank space.
Formulas.

PAGE 113

2.2.2 DELETION OF CONTENTS OF A CELL

Clear all: removes content, format, and notes from the selected cells.
Clear formats: only clear the format, for example: background color, border, symbol
monetary, etc.
Clear content: that clears the content without modifying the format or the notes.
Delete comments: delete the selected notes, we do not delete the content of the cells.
Remove hyperlinks: you remove the hyperlinks contained in the cells.

PAGE 114

2.2.3. USE OF THE SPELL CHECKER

Excel's spell checker reviews each word in the sheet one by one.
of calculation and compares them with those contained in its dictionary, if it finds a word that
it is unknown, please inform us about it. In case you find a word that is not included in your
dictionary, will make a suggestion, that is, will propose words from its dictionary similar to the
what has been found.

PAGE 119 - 134

2.3. MODIFICATION OF APPEARANCE (AT A PRACTICAL LEVEL)

PAGE 134 - 136

AUTOFORMATS AND PREDEFINED STYLES (PRACTICAL LEVEL)

PAGE 137 - 141

INSERTION AND DELETION (AT A PRACTICAL LEVEL)

PAGE 144

3. BASIC FORMULAS / FUNCTIONS


Formulas are the combination of values, operators, range names, or references.
cells with a numerical content written in a logical sequence that will produce a
result.

Excel inserts the result of these operations into the active cell, that is, in the one in which
the cursor is located.

There are three types of formulas:

Numerical: operate with numbers, using arithmetic operators.


Logics: evaluate if one or several conditions are true and false, using operators.
logical.
They concatenate strings using the 'ampersand' operator.

A formula is composed of two distinctly differentiated parts, the data and the
operators. The data can be:

Numbers: digits from 0 to 9.


Cell references: the address of the cell within a sheet.
Rank names: previously defined whose content are values.
Functions: pre-written formulas by Excel.

The operators can be:

Mathematics: addition, subtraction, multiplication, division, exponentiation, percentage.


Lógicos: igual, menor, menor o igual que, mayor, mayor o igual que

When combining a formula with several operators, we must take into account the priority that
Excel assigns to each of them.

PAGE 145

3.2. WRITINGS

All formulas in Excel start with the sign "=" followed by a combination of
operators and data (operands).

TABLE ON PAGE 145

When we enter a formula in a cell, Excel will automatically display the highlighting.
in her.

PAGE 147

3.4. ABSOLUTE, RELATIVE AND MIXED REFERENCES


The reference type used in cell or range addresses is important for
write the formulas that will be copied or extended (auto-filled) later in others
cells.

Cell references or ranges of cells can be used:

Relatives
Absolutes
Mixed

PAGE 149

3.5. PREDEFINED ELEMENTARY MATHEMATICAL FUNCTIONS IN THE SPREADSHEET APPLICATION


OF CALCULATION

The functions of the spreadsheet are formulas pre-written by Excel that allow you to perform
Complex calculations in a simple and fast way. A function will always return a result.
in the cell that has been entered.

PAGE 157

3.7.2. STATISTICAL FUNCTIONS

This group of functions operates on groups of numbers that can be defined


individually, specifying in range or in matrix form.

Count: count the number of cells in a range that contain numbers, dates, and formulas
whose result is a numerical value. Error values, text, or blank cells are
ignored.
MAX: determines the largest number from a range or a list of arguments.
MIN: the MIN function returns the smallest number from the contents of a range or
a list of numbers.
Average: determine the arithmetic mean of the specified values in a range or a
list of arguments.

PAGE 161

3.7.3. LOGICAL FUNCTIONS

The IF function is used to perform actions conditioned on the result of evaluating one or more
conditions.

PAGE 164

4. INSERTION OF ELEMENTARY GRAPHS

One of the most useful and interesting features of spreadsheets is that they allow
Create extremely simple: graphs from the data entered in the sheet.
Graphs generally have different elements that need to be distinguished. For each one
We can customize many of their characteristics: font types, sizes, styles.
line, colors, data scale, etc.

Graph area: it is the total area that the graph contains.


Drawing area: the shape of the graphic itself, limited by the axes of
coordinates.
X Axis - Y Axis: category axis and value axis, respectively, it serves to frame the
graphic and show the categories and the divisions of the value scale. In the graphics
In three-dimensional, the Z Axis also appears, showing the various data series.
Data series: these are the values represented in the graph.
Division lines: they are a visual aid to locate the position of values in the
graphic.

The most important point in the process of creating a graphic is to determine what data from
Our spreadsheet will be represented. It is necessary to clearly understand two concepts:

Data series: it is a set of one or more related values. Each section


The expenses of a company can represent a series of data. A graph can
contain one or more series of data.
Data point: these are the different values that make up a data series. Example: a series
of data that represents the expenses for a period of six years, will have six points of
data.

PAGE 197

5.10. PROTECTION OF A BOOK

Excel allows you to protect both the workbook and its worksheets. Protecting the workbook.
we prevent the user from adding or deleting sheets, changing their name and making other changes
structural modifications. In the protection of the sheet we can allow or deny a
a quite broad set of permissions.

REVIEW THE FIRST POINT OF THIS UF

You might also like