Documenting a Day
Spreadsheets, also referred to as worksheets, are used to calculate mathematical-statistical data (Broman & Woo, 2018). I have interacted with Microsoft Excel. Through the software, I calculated percentages and compared data on an average day in my life by assigning different periods to various activities that define my 24 hours. Furthermore, I was able to present that data in the form of a pie chart, and this was made possible by the spreadsheet application I was working with. Essentially, spreadsheets are equipped with various formulas, which make calculations easier than performing them manually. However, spreadsheet applications need a lot of education to work around multiple features, especially on calculating data ((Broman & Woo, 2018)).
Computer applications are also inclusive of Presentation software. One such software application is Microsoft PowerPoint (Bartsch & Cobern, 2003). I have practiced a lot of PowerPoint skills in an attempt to develop good presentations. The focus is primarily on developing presentations that are precise, clear, and readable by everyone in the target audience. The applications enable the development of output in various formats depending on the presentation's needs and the audience. However, as with other software applications, presentation applications are prone to virus attacks and require computers to function (Aycock, 2006).
Database software applications are used to store, organize and manipulate numerical and text data (Viescas & Conrad, 2009). I have interacted with Microsoft Access to organize and prepare materials for my journal entry. The database management software uses multiple tables to manage data. The main advantage of database management systems such as Microsoft Access is that it can merge with other word formatting applications. Moreover, the applications help quickly retrieve information, time management, and reduce data redundancy and errors. However, databases are related to various access issues and require that data stored be secure from unauthorized access since most database management systems hold sensitive information (Viescas & Conrad, 2009).
References
Aycock, J. (2006). Computer
viruses and malware (Vol. 22). Springer Science & Business Media.
Bartsch, R. A., &
Cobern, K. M. (2003). Effectiveness of PowerPoint presentations in
lectures. Computers & education, 41(1), 77-86.
Broman, K. W., & Woo,
K. H. (2018). Data organization in spreadsheets. The American
Statistician, 72(1), 2-10.
Snyder, I. (1993). Writing with word processors: a research overview. Educational Research, 35(1), 49-68.
Viescas, J., & Conrad, J. (2009). Microsoft® Office Access™ 2007 Inside Out. O'Reilly Media, Inc.
Comments
Post a Comment