wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Short note on Microsoft office

profile
Pooja Silver
Aug 02, 2022
0 Likes
0 Discussions
186 Reads

Microsoft office is a suit of application designed to help with productivity and completing comman tasks on a computer. You can create and edit documents, containing text and images, work with data in spreadsheets and database and create presentation and posters.

Microsoft office has many softwares mainly we are using Microsoft word, Microsoft Excel, Microsoft PowerPoint, Microsoft access 

Microsoft word is a text processing applications. It allows the user to configure the attributes of a document such as layout and styles of content and to add their content in a variety of ways and format to produce documents

Microsoft Excel is commonly used spreadsheet software Microsoft Excel is an application uses for creating and editing spreadsheet are commonly used to working with sets of data containing text and number and for generating graph and charts 

Microsoft power point is commonly used as a presenting software it is used for creating presentation using slides through often used to makes simple , bullet points presentation it has a range of features that can allow a range of media in your presentation

Microsoft access is commonly used as a database software it is used when working with database using relational data held in table which are then linked according to the relationship between the data access process data using queries and you can use forms and reports to interact with data in a used friendly way.


Comments ()


Sign in

Read Next

Decoding Confusion Matrix

Blog banner

memory cache

Blog banner

How to Grow Your Brand on YouTube Without a Big Budget

Blog banner

GraphQL

Blog banner

Volatile Memory & Non-Volatile Memory Explained

Blog banner

ARTICAL ON MANAGEMENT SYSTEM

Blog banner

MULTITHREADING:ENHANCEING PERFORMANCE AND EFFICIENCY IN COMPUTING

Blog banner

Network Security Risks

Blog banner

What are the different types of E-mail crime and process of email forensic?

Blog banner

OS Assignment 3

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

10 Amazing facts about Tokyo Ghoul

Blog banner

The Role of cryptography in cyber security

Blog banner

Can ChatGPT Answer All My Questions About Life?

Blog banner

Teenagers of Today

Blog banner

Uniprocessor Scheduling

Blog banner

21ST CENTURY PATRIARCHY

Blog banner

Cyber Security Control

Blog banner

M commerce

Blog banner

Getting started with Android Studio

Blog banner

Importance of modern technology era

Blog banner

Emailing the merger document

Blog banner

Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

Blog banner

The Truth Behind Viral DIY Dental Hacks

Blog banner

Memory Management

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

10 Alien Encounters and Abduction Stories

Blog banner

Practical Implementation of Client Server model using TCP/IP.

Blog banner

Big Data

Blog banner

Theads

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Big Data Architecture

Blog banner

Deadlock and Starvation

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

What is thread and alse multithreading

Blog banner

RSA (Rivest-Shamir-Adelman) Algorithm

Blog banner

Threat from Inside: Educating the Employees Against Cyber Threats

Blog banner

OS Evolution Achievements

Blog banner

Modern operating system

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

Atlantis - The Lost Island.........

Blog banner

Linux 94

Blog banner