This essay WordPerfect has a total of 1311 words and 10 pages.
Using Tables in WordPerfect
As most of you know, WordPerfect 6.0A for Windows allows you to do simple word processing pretty easily. My intention in this session is to look at tables fairly comprehensively so that you can see how to use this feature a little more fully. In addition, we\'ll use data from other applications , including text data and a Harvard Presentation graphics chart in WordPerfect.
Seeing how tables are used within WordPerfect templates
As you may already be aware, WordPerfect comes with a number of premade templates. We\'re going to look at one that uses a table within it, the calendar, so you can see how the feature can be used.
Click on file
Click on template
Slide the up arrow up to cal_side
Click on the words: Note description
Click on the opposite facing up/down arrows for month and select July for month
Click on the opposite facing up/down arrows for year and select 1995 for year
The calendar will then auto fill in the appropriate days and dates and then poof! disappear. Click on Window (at the top table, window, help) This will bring up a list of documents. Note: You can have a number of documents open concurrently. This is practically limited by the amount of memory and speed of your machine as it relates to the complexity of documents. On my fairly sophisticated machine I\'ve found six text mostly documents are about as much as I can handle the performance of.
Click on the last numbered document (most likely document 2)
This is a fairly complex table. If you need to make changes in it, you can do so with the table menu.
To make a fairly simple change in the calendar,
Click on any of the squares
Click on table
Click on Lines/Fill
Click on the table radio button
Click on Fill Radio Button
Click on drop down box
Click on the words 10% fill
You\'ll see the changes reflected.
Bringing your own data into a table
Most of the time you\'ll have your own data that you want to bring in, either in the format of a spreadsheet or a ASCII file. A table handles this kind of data especially well.
To bring in a text file (ASCII delimited in this case) and translate it to a table
Click on File
Click on Open
Open File... Automatically it will detect it\'s an ASCII text file
Select entire area of file
Click on table create
Choose tabular format
This will convert your text to a table with strange formatting. There are two ways to change this formatting. If you just want something that looks normal, you can click and drag the column lines easily. We\'ll do this with the day column
Bring your mouse to the line between the two columns... You\'ll see a crosshatch arrow
Click and drag out
Your column will be resized automatically. Note, though, there is a limited width to the page, so you can not size columns larger than they can print.
More frequently, you\'ll want an exact column width. In this case, we\'ll do this with the number columns. To do this:
Select the columns you want to set the width for by clicking and dragging over them
Click on Table
Click on Format
Select the column radio button
Check the check box for fixed width (lower right hand corner)
Select in the lower left hand corner the button for column width
Select .600 in the box
Your columns will be the exact same size now. They will not be aligned completely correctly though. If you want a simple right or left justification:
Select the cells (the numbered cells) you want to justify within the table
Click on the justification icon 8 over from the left
Choose Right justification
This will align your cells automatically to the right.
More frequently with decimal numbers you\'ll want a decimal align, that is for the numbers to line up along the decimal point.
Select the text you want decimal aligned
Click on the justification icon
Choose decimal align
You can do any formatting within a table that you can do with normal text. We\'ll bold, italicize and underline some of our fine text.
Double click on the word Monday. This will select it.
Click on the icon
Topics Related to WordPerfect
Software, User interface techniques, WordPerfect, Double-click, Point and click, Click consonant, Icon
Essays Related to WordPerfect
Net CensorshipNet Censorship Most of us have used it. Most of us find it useful, Some of us find it entertaining. Some of us find it offensive. “It” is the Internet. The Internet has dramatically changed our society. It brings together people and their ideas from all around the world in a short amount of time. It is expanding daily to allow new ideas and thought s to be transmitted quickly and easily with the single click of a button. One can find information on almost any subject there. Yet many people are t
Introduction Bill Gates and his empire command feIntroduction Bill Gates and his empire command fear, respect and curiosity in the world he helped create. Microsoft dominates the software world like no other company in a major consumer industry (Electric 1). Exactly how did Bill Gates and his partner Paul Allen get their company to such a tremendous height? The history of Microsoft is a very fascinating past full of enterprise and excitement. The Dawning of a great company Bill Gates and Paul Allen are the co-founders of Microsoft. The start
CENSORSHIP ON THE INTERNETCENSORSHIP ON THE INTERNET A 43-year-old man from Boston was having a steamy cyber affair with who he thought to be a 23-year-old woman. He later found out the she, to his dismay, was an 80-year-old man living in a Miami nursing home. Things like this happen everyday, people mask their sex and age to avoid or attract attention on the Internet. This is only one of the reasons why the government wants to censor the Internet. They claim they want to ‘protect’ the children by limiting the amount o
Title of Paper : organizational change and resistaTitle of Paper : organizational change and resistance to change Grade Received on Report : 78 Future generations, looking back on the last years of the twentieth century, will see a contradictory picture of great promise and equally at great uncertainty. The 1990\'s have all the symptoms of a turning point in world history, a moment when many of the structural givens of social development themselves become problematic and world society undergoes profound reorganization. These developments oc
Government in India, TodayGovernment in India, Today India\'s present constitution went into effect on Jan. 26, 1950. At that time, the nation changed its status from a dominion to a federal republic, though it remained within the Commonwealth. A president, chosen by an Electoral College replaced the governor-general, appointed by the British Crown. The president is the official chief of state, but the office is largely ceremonial. In parliamentary government, the people in a country elect members of at least one house o
SlaverySlavery Slavery in America stems well back to when the new world was first discovered and was led by the country to start the African Slave Trade- Portugal. The African Slave Trade was first exploited for plantations in that is now called the Caribbean, and eventually reached the southern coasts of America (Slavery Two; Milton Meltzer). The African natives were of all ages and sexes. Women usually worked in the homes, cooking and cleaning, whereas men were sent out into the plantations to farm.
Title of Paper : CASE toolsTitle of Paper : CASE tools Grade Received on Report : 95% CASE Tools What are CASE Tools ? Computer Aided Software Engineering (CASE) tools provide automated support for many of the systems analysis and design methods available to the information systems developer. CASE tools provide an environment which automates many time-consuming aspects of the systems development process, including: drawing and redrawing diagrams cross checking usage of elements across the system model generation of system
Computer VirusesComputer Viruses A computer virus is an illegal and potentially damaging computer program designed to infect other software by attaching itself to any software it contacts. In many cases, virus programs are designed to damage computer systems maliciously by destroying or corrupting data. If the infected software is transferred to or accessed by another computer system, the virus spreads to the other system. Viruses have become a serious problem in recent years, and currently, thousands of known
Ethics in the Age of InformationEthics in the Age of Information The information age is the age we live in today, and with the information age comes an age of ethics. When we deal with the new technologies introduced every day, we need to decide what we must consider ethical and unethical. We must consider all factors so that the use of the information readily available to many persons is not abused. Information technology will be the most fundamental area of ethical concern for business in the next decade (Houston 2). The m
Canada's Copyright LawsCanada\'s Copyright Laws Canada\'s copyright law is one of our hardest laws to enforce. The reason the police have so much trouble enforcing this law, is due to technology. This law is very easy to break, and once broken, it is very hard to track down violators. So although some form of a copyright law is needed, the one we have has, too many holes to be effective. There are three main ways in which the copyright law is broken in everyday life. They is audio/video tape copying, plagiarism, and s
Computer Crimes on the InternetComputer Crimes on the Internet Thesis: Emerging with the Internet, a group of elite cyber-surfers have turned into todayís computer hackers. Software piracy is a major crime on the Net. $7.5 billion of American Software is stolen each year. Industrial Espionage is gaining access to remote sites illegally. Stealing of information from corporate sites is extremely illegal. Password Sniffers are used to get someoneís password. IP spoofers changes your identity. Many things can be stolen from compa
Nuclear Weapons and DefenseNuclear Weapons and Defense A third world country is producing nuclear weapons. The country is the same that has given the United States trouble in the past. It is Iraq. Shortly after the U.S finds this out, we are being attacked by a nuclear strike from Iraq. U.S. cities are being destroyed one by one. We declare a full scale nuclear retaliation against Iraq. Huge devastation occurs throughout the world as allies join into the war. Nuclear winter starts to develop. Over half of the world’s popu
The InternetThe Internet Abstract The Internet is a source of more information then most of us know. In this report I highlight some of my favorite things. Also, I highlight some of the things that we as users and buyers need to be cautious of before using. What is the Internet? What comes to a your mind when they think of the Internet? Well, I will tell you what used to come to my mind. When I thought of the Internet, I thought of x-rated Web pages and chat rooms. I envisioned a medium that was so full of
Greed Greed is a selfish desire for more than oneGreed Greed is a selfish desire for more than one needs or deserves. Greed can make honest men murderers. It has made countries with rich valuable resources into the poorest countries in the world. We are taught it is bad and not to practice it. But consider a world without greed, where everyone is as sharing as Mother Theresa was. The progress of humankind would be at a standstill. Greed has given our society faster travel, better service, more convenience, and most importantly, progress. Greed
The Technological Revolution The Technological Revolution Technological Changes of the Past and Present The technology which surrounds almost everyone in the modern society, affects both work and leisure activities. Technology contains information that many would rather it did not have. It influences minds in good and bad ways, and it allows people to share information which they would otherwise not be able to attain. Even if a person does not own a computer or have credit cards, there is information on a computer somewher
Computer Based SystemsComputer Based Systems The system Development Cycle What is it? The system development cycle is a method used to create a system where none has existed before and/or modify an existing system. It is sometimes simply called System Development. It involves a number of stages representing a standard strategy for taking a problem from start to finish. Two approaches: 1. Conservative-working systematically through the steps. 2. Radical-Cycling through the cycle several times until the final result is
How Technology Effects Modern AmericaHow Technology Effects Modern America U.S. Wage Trends The microeconomic picture of the U.S. has changed immensely since 1973, and the trends are proving to be consistently downward for the nation’s high school graduates and high school drop-outs. “Of all the reasons given for the wage squeeze – international competition, technology, deregulation, the decline of unions and defense cuts – technology is probably the most critical. It has favored the educated and the skilled,” says M. B. Zuckerman,
Due to the competition between Mac and PC, inventiDue to the competition between Mac and PC, inventions of computers has been more rapid than at any other period of time. Microsoft’s Windows has monopolized the entire personal computer industry with their operating system and that goes same for the Mac OS 8.5. Since Mac couldn’t attract customers to buy their computer systems through their optimum operating system they just put out another computer named iMac to help improve their sales performance in the computer industry. “Let\'s state the ob
IS 490 IS 490 SPECIAL TOPICS Computer Graphics May 6, 1996 Table of Contents Introduction 3 How It Was 3 How It All Began 4 Times Were Changing 6 Industry\'s First Attempts 7 The Second Wave 10 How the Magic is Made 11 Modeling 12 Animation 13 Rendering 13 Conclusion 15 Bibliography 16 Introduction Hollywood has gone digital, and the old ways of doing things are dying. Animation and special effects created with computers have been embraced by television networks, advertisers, and movie studios alike.
Photography is a technique of producing permanentPhotography is a technique of producing permanent images on sensitized surfaces by means of the photochemical action of light or other forms of radiant energy. In today\'s society, photography plays important roles as an information medium, as a tool in science and technology, and as an art form, and it is also a popular hobby. It is essential at every level of business and industry, being used in advertising, documentation, photojournalism, and many other ways. Scientific research, ranging from
Computer EthicsComputer Ethics Abstract The computer is considered one of the most technological advances of the twentieth century. As the general public becomes increasingly ‘computer literate,\' the gap between technology and peoples\' intellect notably shrinks. The readily available computers, software, and assorted output devices have enlightened many but, in turn, have increased the using of computers for unethical activities, privacy invasion and illegal purposes. Legal sanctions against abusive use of c
Frito-LayFrito-Lay 1 This paper\'s intent is to answer the questions found at the end of the case study IT Helps Keep Frito-Lay in the Chips. We plan to identify the key input and output devices used in Frito-Lay\'s information system. Also, the steps that the IT professionals at Frito-Lay took to create a system that would be easy to use as well as what steps we would take as managers to introduce the employees to the information system that will be discussed. The question of how will Frito-Lay\'s in
Internet HistoryInternet History Starting out as a small military experiment some 35 years ago, the Internet is quickly becoming one of the most popular forms of communication. With a present population of about 40 million users world wide, it seems to have a very promising future. Uncensored and almost impossible to monitor, it\'s a breeding ground for all sorts of offensive and derogatory information. On the other hand, it is probably the biggest single source of data in the world brought home into your perso
SOUNDOFF--A Computer for All Students--Revisited SOUNDOFF--A Computer for All Students--Revisited The introduction of the graphing calculator has changed the structure of teaching and learning mathematics. This made it possible for everybody to receive the benefits of a computer-generated visualization without the high cost of a computer. These graphing calculators over the years have lowered in cost, became easier to use, and are more portable. The next generation of graphing computers has arrived with the recent introduction of the Texas In
TechnologyTechnology Background The Technology Needs Survey (TNS) software program developed at HSC/XRE was originally intended to provide a convenient vehicle by which the office’s engineers and scientists could enter and edit environmental, safety and occupational health (ESOH) needs data into a database. The program provided an interface that allowed the user to answer, or revise answers, to questions regarding the nature of the ESOH technology needs of the customer. The database was originally install
Computer CrimeComputer Crime It\'s the weekend, you have nothing to do so you decide to play around on your computer. You turn it on and then start up, you start calling people with your modem, connecting to another world, with people just like you at a button press away. This is all fine but what happens when you start getting into other peoples computer files. Then it becomes a crime, but what is a computer crime really, obviously it involves the use of a computer but what are these crimes. Well they are: H
CensorshipCensorship During the last decade, our society has become based on the sole ability to move large amounts of information across great distances quickly. Computerization has influenced everyone\'s life in numerous ways. The natural evolution of computer technology and this need for ultra-fast communications has caused a global network of interconnected computers to develop. This global network allows a person to send E-mail across the world in mere fractions of a second, and allows a common perso
Computer CrimesComputer Crimes Computer crime started in the early 1970’s and has become more and more prevalent. Some computer crime are committed by outside individuals that hack into a computer system. These are the people that usually steal data and cause data loss by vandalism. The most common kind of computer crime is espionage committed by people who work for a company, but this is also the one that you rarely hear about. They usually enter false data that will end up making money for them. Hackers are
Title of Paper : Software Piracy : A Worldwide ProTitle of Paper : Software Piracy : A Worldwide Problem Grade Received on Report : 98 Software Piracy: A Worldwide Problem Software piracy is defined as the illegal copying of software for commercial or personal gain. Software companies have tried many methods to prevent piracy, with varying degrees of success. Several agencies like the Software Publishers Association and the Business Software Alliance have been formed to combat both worldwide and domestic piracy. Software piracy is an unresolved