Skip to ContentGo to accessibility pageKeyboard shortcuts menu
OpenStax Logo

Table of contents
  1. Preface
  2. 1 Technology in Everyday Life and Business
    1. Chapter Scenario
    2. 1.1 Computing from Inception to Today
    3. 1.2 Computer Hardware and Networks
    4. 1.3 The Internet, Cloud Computing, and the Internet of Things
    5. 1.4 Safety, Security, Privacy, and the Ethical Use of Technology
    6. Chapter Review
      1. Key Terms
      2. Summary
      3. Review Questions
      4. Practice Exercises
      5. Written Questions
      6. Case Exercises
  3. 2 Essentials of Software Applications for Business
    1. Chapter Scenario
    2. 2.1 Software Basics
    3. 2.2 Files and Folders
    4. 2.3 Communication and Calendar Applications
    5. 2.4 Essentials of Microsoft 365
    6. 2.5 Essentials of Google Workspace
    7. 2.6 Collaboration
    8. Chapter Review
      1. Key Terms
      2. Summary
      3. Review Questions
      4. Practice Exercises
      5. Written Questions
      6. Case Exercises
  4. 3 Creating and Working in Documents
    1. Chapter Scenario
    2. 3.1 Navigating Microsoft Word
    3. 3.2 Formatting Document Layout in Microsoft Word
    4. 3.3 Formatting Document Content in Microsoft Word
    5. 3.4 Collaborative Editing and Reviewing in Microsoft Word
    6. 3.5 Document Design
    7. 3.6 Navigating Google Docs
    8. 3.7 Formatting Layout and Content in Google Docs
    9. 3.8 Collaborative Editing and Reviewing in Google Docs
    10. 3.9 Versions and Version History
    11. Chapter Review
      1. Key Terms
      2. Summary
      3. Review Questions
      4. Practice Exercises
      5. Written Questions
      6. Case Exercises
  5. 4 Document Preparation
    1. Chapter Scenario
    2. 4.1 Microsoft Word: Advanced Formatting Features
    3. 4.2 Working with Graphics and Text Tools in Microsoft Word
    4. 4.3 Managing Long Documents in Microsoft Word
    5. 4.4 Google Docs: Enhanced Formatting Features
    6. 4.5 Working with Graphics and Text Tools in Google Docs
    7. 4.6 Managing Long Documents in Google Docs
    8. Chapter Review
      1. Key Terms
      2. Summary
      3. Review Questions
      4. Practice Exercises
      5. Written Questions
      6. Case Exercises
  6. 5 Advanced Document Preparation
    1. Chapter Scenario
    2. 5.1 Creating Different Document Types in Microsoft Word
    3. 5.2 Mail Merge in Microsoft Word
    4. 5.3 Creating Forms in Microsoft Word
    5. 5.4 Creating Different Document Types in Google Docs
    6. 5.5 Creating Forms in Google Docs
    7. 5.6 Advanced Collaboration in Google Docs
    8. Chapter Review
      1. Key Terms
      2. Summary
      3. Review Questions
      4. Practice Exercises
      5. Written Questions
      6. Case Exercises
  7. 6 Preparing Presentations
    1. Chapter Scenario
    2. 6.1 Presentation and Design Essentials
    3. 6.2 Designing a Presentation in Microsoft PowerPoint
    4. 6.3 Formatting Microsoft PowerPoint Slides: Layout and Design Principles
    5. 6.4 Adding Visuals and Features to Microsoft PowerPoint Slides
    6. 6.5 Designing a Presentation in Google Slides
    7. 6.6 Creating Google Slides: Layout and Text
    8. 6.7 Adding Visuals and Features to Google Slides
    9. Chapter Review
      1. Key Terms
      2. Summary
      3. Review Questions
      4. Practice Exercises
      5. Written Questions
      6. Case Exercises
  8. 7 Advanced Presentation Skills
    1. Chapter Scenario
    2. 7.1 Effective Presentation Skills
    3. 7.2 Finalizing a Slide Collection
    4. 7.3 Preparing a Microsoft PowerPoint Collection for Presentation
    5. 7.4 Preparing a Google Slides Collection for Presentation
    6. Chapter Review
      1. Key Terms
      2. Summary
      3. Review Questions
      4. Practice Exercises
      5. Written Questions
      6. Case Exercises
  9. 8 Content Management Systems and Social Media in Business
    1. Chapter Scenario
    2. 8.1 What Are Content Management Systems?
    3. 8.2 Common Content Management Systems
    4. 8.3 Creating Content with a Content Management System
    5. 8.4 Search Engine Optimization
    6. 8.5 Social Media in Business
    7. Chapter Review
      1. Key Terms
      2. Summary
      3. Review Questions
      4. Practice Exercises
      5. Written Questions
      6. Case Exercises
  10. 9 Working with Spreadsheets
    1. Chapter Scenario
    2. 9.1 Microsoft Excel Basics
    3. 9.2 Text and Numbers in Microsoft Excel
    4. 9.3 Calculations and Basic Formulas in Microsoft Excel
    5. 9.4 Formatting and Templates in Microsoft Excel
    6. 9.5 Google Sheets Basics
    7. 9.6 Text and Numbers in Google Sheets
    8. 9.7 Calculations and Basic Formulas in Google Sheets
    9. 9.8 Formatting and Templates in Google Sheets
    10. Chapter Review
      1. Key Terms
      2. Summary
      3. Review Questions
      4. Practice Exercises
      5. Written Questions
      6. Case Exercises
  11. 10 Advanced Excel Formulas, Functions, and Techniques
    1. Chapter Scenario
    2. 10.1 Data Tables and Ranges
    3. 10.2 More About Formulas
    4. 10.3 Using Arithmetic, Statistical, and Logical Functions
    5. 10.4 PivotTables
    6. 10.5 Auditing Formulas and Fixing Errors
    7. 10.6 Advanced Formatting Techniques
    8. Chapter Review
      1. Key Terms
      2. Summary
      3. Review Questions
      4. Practice Exercises
      5. Written Questions
      6. Case Exercises
  12. 11 Advanced Excel Spreadsheets: Statistical and Data Analysis
    1. Chapter Scenario
    2. 11.1 Understanding Data, Data Validation, and Data Tables
    3. 11.2 Statistical Functions
    4. 11.3 What-If Analysis
    5. 11.4 PivotTables/Charts
    6. 11.5 Data Analysis Charts
    7. Chapter Review
      1. Key Terms
      2. Summary
      3. Review Questions
      4. Practice Exercises
      5. Written Questions
      6. Case Exercises
  13. 12 Using Excel in Accounting and Financial Reporting
    1. Chapter Scenario
    2. 12.1 Basic Accounting
    3. 12.2 Financial Functions in Microsoft Excel
    4. 12.3 Integrating Microsoft Excel and Accounting Programs
    5. Chapter Review
      1. Key Terms
      2. Summary
      3. Review Questions
      4. Practice Exercises
      5. Written Questions
      6. Case Exercises
  14. 13 Understanding and Using Databases
    1. Chapter Scenario
    2. 13.1 What Is a Database?
    3. 13.2 Microsoft Access: Main Features and Navigation
    4. 13.3 Querying a Database
    5. 13.4 Maintaining Records in a Database
    6. 13.5 Creating Reports in Microsoft Access
    7. 13.6 Creating Forms in Microsoft Access
    8. Chapter Review
      1. Key Terms
      2. Summary
      3. Review Questions
      4. Practice Exercises
      5. Written Questions
      6. Case Exercises
  15. 14 Advanced Database Use
    1. Chapter Scenario
    2. 14.1 Advanced Queries in Microsoft Access
    3. 14.2 Multiple Table Forms
    4. 14.3 Customizing Forms
    5. 14.4 Customizing Reports
    6. 14.5 Using Macros
    7. 14.6 Data Analysis and Integration
    8. Chapter Review
      1. Key Terms
      2. Summary
      3. Review Questions
      4. Practice Exercises
      5. Written Questions
      6. Case Exercises
  16. 15 Integrating Applications
    1. Chapter Scenario
    2. 15.1 Microsoft 365: Collaboration and Integration
    3. 15.2 Microsoft Word: Integration with Microsoft Excel and Microsoft Access
    4. 15.3 Microsoft Word and Microsoft PowerPoint Integration
    5. 15.4 Microsoft Excel and Microsoft PowerPoint Integration
    6. 15.5 Microsoft Excel and Microsoft Access Integration
    7. 15.6 Integrating Data from Other Programs into Google Workspace
    8. 15.7 New Developments: The Role of Artificial Intelligence
    9. 15.8 Mastering Workplace Software Skills: A Project
    10. Chapter Review
      1. Key Terms
      2. Summary
      3. Review Questions
      4. Practice Exercises
      5. Written Questions
  17. Index

Key Terms

Android operating system
Google software operating system used to run non-iPhone mobile phones such as Samsung’s Galaxy
artificial intelligence (AI)
use of computers, robots, and machines to behave “intelligently,” engaging in autonomous decision making and behaviors
augmented reality (AR)
use of digital objects or elements in a real-life picture or scene
automation
use of computers or machines to do tasks that could be completed by a person
binary digits
sequences of the numbers 0 and 1 used in computer programming
biometrics
authentication that uses a person’s physical characteristics as a form of digital security
cache
type of storage in a computer that operates in the background, holding data that can be quickly retrieved
central processing unit (CPU)
unit that contains the microprocessor, or “brains” of a computer system
client
device that requests and uses resources from other devices on the network
cloud
servers housed in data centers to facilitate remote storage and computer operations
cloud computing
delivering computer resources such as programs and data storage through the internet rather than storing resources directly on a computer
computer
programmable machine that can execute predetermined lists of instructions and respond to new instructions
computer security
protection of computer systems and information that prevents unauthorized use
cookies
small data files that are deposited on user hard disks and internet sites visited
cybercrime
criminal offense that involves a computer and a network
data erasure
process by which information is not only deleted but overwritten as well
data masking
process by which personally identifiable information is removed from data, allowing a company to make decisions without violating customer privacy
data resiliency
ability to recover quickly from a data breach
domain name system (DNS)
phone book for the internet, enabling a user to send a message using their name, the symbol @, and the location of the computer as identified by its domain name
e-commerce
conducting business transactions online
encryption
process of taking information transmitted through the internet and converting it into an unrecognizable code to prevent unauthorized access
ethernet
protocols used to connect computers in a local area network or LAN
external disk drive
hard disk for information storage such as USBs, CDs, DVDs, and flash memory cards
firewall
barrier between a network that is secured and one that is not secured
hackers
individuals who gain unauthorized access to a computer system to steal someone’s information
hard disk
secondary storage areas where users can save files and retrieve data and programs
hardware
computer accessories such as keyboard, mouse, printer, and computer monitor
HTTPS
communication protocol that is more secure than HTTP
hub
device that sends and receives messages to and from all network connections
hyperlink
link on a page or document that, when clicked, navigates the user to that location; a connection between two web pages or documents
hypertext transfer protocol (HTTP)
rules that allow users to access information on the internet and protect confidential data such as credit card numbers
information processing cycle
sequence of events involved in processing information
internal disk drive
storage space within the computer that updates and produces copies of files
Internet of Things (IoT)
extension of internet connectivity beyond computers, enabling the transfer of information between machines and other objects, people, and animals by connecting them to the internet in some way
internet protocol address (IP address)
unique combination of characters used to identify the location of a host computer
internet service provider (ISP)
company that provides individuals or organizations with access to the internet
intranet
private network for internal company use; can be combined with cloud technology
iPhone operating system (iOS)
Apple’s software operating system, used to run iPhones, iPads, and other mobile devices
machine learning
use of software applications to make computations and decisions that can inform predictions without human intervention
mainframe
computer that is capable of great processing speed and data storage for large organizations
malware
software designed to damage the victim’s computer system once it gains access to it
microchip
small microprocessor unit used for programming and computer memory storage
microcomputer
personal computer that was much smaller than earlier computers and operated with microprocessors
microprocessor
consists of a control and an arithmetic-logic unit, which performs math and logical operations within a computer system
minicomputer
computer that is similar in power to a mainframe computer, but much smaller in size; used in mid-size organizations
motherboard
controls communications for an entire computer system
nanotechnology
technology that focuses on changing individual molecules to produce different properties or attributes
network
connection of two or more computer systems or devices, either by a cable or through a wireless connection
operating system
connection between a device’s hardware and its software
packet switching
technology that enabled the development of the internet; computer files are broken up into segments, which are transmitted over the network and reordered into a single file at their destination
password management
set of principles and best practices for storing and managing passwords to prevent unauthorized access to the computer
personal computer (PC)
microcomputer suitable for individual use
phishing
attempts to get users to interact with an email or website that appears to be legitimate but is fake
random access memory (RAM)
computer’s primary, short-term memory
ransomware
malicious software that encrypts computer data, rendering it useless and inaccessible, forcing the owner to exchange something of value to regain access
read-only memory (ROM)
memory not meant for storage but to process information as the computer is being used
robotics
use of robotic machines to perform tasks that no human could perform
router
device that directs data traffic and allows for multiple devices to run on a network
secure sockets layer (SSL)
security protocol that uses encryption to help ensure privacy of information and communications across the internet
server
connects devices and allows for resource sharing across networks
short message service (SMS)
technology for sending text messages through mobile phones
smart space
physical space that incorporates technologies that can be controlled through the internet
social media
digital technology that allows users (individuals and organizations) to share information about themselves such as posts, photos, and videos
software
computer program or set of programs with the end goal of converting data into processes or actions
spoofing
correspondence such as email that appears legitimate but instead is used to obtain your personal information
supercomputer
extremely powerful computer that has the fastest processors available
transmission control protocol/internet protocol (TCP/IP)
communication standard that allows data to be sent and received over a network, most notably the internet
triangulation
research technique whereby information is verified and validated through multiple sources
virtual reality (VR)
simulated environment in which users can interact as if they were physically present
wearable
device that uses computing technology to collect and receive data via the internet
web browser
a program used to find content stored on the WWW
workstation
powerful single-user computer, similar to a personal computer but with more powerful microprocessors
Citation/Attribution

This book may not be used in the training of large language models or otherwise be ingested into large language models or generative AI offerings without OpenStax's permission.

Want to cite, share, or modify this book? This book uses the Creative Commons Attribution License and you must attribute OpenStax.

Attribution information
  • If you are redistributing all or part of this book in a print format, then you must include on every physical page the following attribution:
    Access for free at https://openstax.org/books/workplace-software-skills/pages/1-chapter-scenario
  • If you are redistributing all or part of this book in a digital format, then you must include on every digital page view the following attribution:
    Access for free at https://openstax.org/books/workplace-software-skills/pages/1-chapter-scenario
Citation information

© Jan 3, 2024 OpenStax. Textbook content produced by OpenStax is licensed under a Creative Commons Attribution License . The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo are not subject to the Creative Commons license and may not be reproduced without the prior and express written consent of Rice University.