wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Short note on Microsoft office

profile
Pooja Silver
Aug 02, 2022
0 Likes
0 Discussions
186 Reads

Microsoft office is a suit of application designed to help with productivity and completing comman tasks on a computer. You can create and edit documents, containing text and images, work with data in spreadsheets and database and create presentation and posters.

Microsoft office has many softwares mainly we are using Microsoft word, Microsoft Excel, Microsoft PowerPoint, Microsoft access 

Microsoft word is a text processing applications. It allows the user to configure the attributes of a document such as layout and styles of content and to add their content in a variety of ways and format to produce documents

Microsoft Excel is commonly used spreadsheet software Microsoft Excel is an application uses for creating and editing spreadsheet are commonly used to working with sets of data containing text and number and for generating graph and charts 

Microsoft power point is commonly used as a presenting software it is used for creating presentation using slides through often used to makes simple , bullet points presentation it has a range of features that can allow a range of media in your presentation

Microsoft access is commonly used as a database software it is used when working with database using relational data held in table which are then linked according to the relationship between the data access process data using queries and you can use forms and reports to interact with data in a used friendly way.


Comments ()


Sign in

Read Next

Network Footprinting in Cybersecurity

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

Android Flashlight Application

Blog banner

Vikrant’s first blog

Blog banner

Memory Management in an Operating System

Blog banner

Technical Challenges and Directions for Digital Forensics

Blog banner

Memory Management in Operating System

Blog banner

Deadlock and Starvation

Blog banner

ASANA- A Management System.

Blog banner

Design Considerations for Disk Cache Management

Blog banner

Mutual exclusion

Blog banner

R Programming

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Hypothesis Testing in Data Science

Blog banner

File and File System Structure

Blog banner

Service transition principles

Blog banner

INTERNET SECURITY

Blog banner

The Memory Hierarchy

Blog banner

I/O Buffering

Blog banner

Financial Fraud Detection

Blog banner

Friendship

Blog banner

What is M-commerce and how it's work

Blog banner

PODIO

Blog banner

Carrot Pickle With Raisins (lagan Nu Achar)

Blog banner

Os(Computer security threats)

Blog banner

Deadlock and starvation in operating system

Blog banner

DATA VAULT

Blog banner

Memory management

Blog banner

Why is ITSM important in IT organization?

Blog banner

Os Virtual Memory

Blog banner

Starting Android Activity Using Intent

Blog banner

Virtual Memory

Blog banner

GIS Bharat Maps

Blog banner

ZOHO

Blog banner

How to use open SSL for web server - browser communication

Blog banner

INTRANET

Blog banner

Elements and Principles of Photography

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

Virtual memory in Operating System

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

 " Healing of Yoga "

Blog banner