Beruflich Dokumente
Kultur Dokumente
LEARNER’S GUIDE
PERFORM DATA ENTRY OPERATIONS
Published by
Produced by
This material is protected by copyright. Copying this material or any part of it by any means, including
digital or in any form is prohibited unless prior written permission is obtained from the HEART
Trust/NTA.
*** 2004***
TABLE OF CONTENTS
PAGE
Introduction ................................................................................................................................. 1
Welcome ................................................................................................................... 1
This Competency Unit.................................................................................................... 1
Before You Start ............................................................................................................. 2
Planning Your Learning Programme ............................................................................. 2
Self-Assessment Checklist ............................................................................................. 3
How To Use This Learner’s Guide ................................................................................ 5
Using the Computer and other Resources...................................................................... 6
Method of Assessment.................................................................................................... 6
LG-ITIDAT0011A:
PERFORM DATA ENTRY
OPERATIONS
INTRODUCTION
Welcome
Welcome to the Learner’s Guide for Unit of Competency “Perform Data Entry Operations”.
This is just one of a number of Learner’s Guides produced for the Data Operations skills stream of
the Information Technology and the Information Industry, and it is designed to guide you, the
learner, through a series of learning processes and activities that will enable you to achieve the
specified learning outcomes for the competency unit.
The content of this guide was developed from the Competency Standard ITIDAT1101A, which is
one of the basic building blocks for the National Vocational Qualification of Jamaica (NVQ-J)
certification within the industry. Please refer to your Learner’s Handbook for a thorough
explanation of standards and competencies, and how these relate to the NVQ-J certification.
You are also advised to consult the Competency Standard and assessment instrument for a better
understanding of what is required to master the competency.
“Perform data operations” addresses the knowledge and skills requirements for effectively
performing data entry operations. There are five main areas or elements:
As you go through each element, you will find critical information relating to each one. You are
advised to study them carefully so that you will be able to develop the necessary knowledge,
skills and attitudes for performing data entry operations.
a. Obtain a Learner’s Logbook. You will use it to record evidence of your new skills/competence.
As you demonstrate your new skills, record your activities and have your learning facilitator
sign off on them. This will allow you to provide evidence of your competence when you are
being assessed against the competency standard.
b. Ensure that you have access to the facilities and equipment necessary for learning.
d. Ensure that you are wearing suitable clothing, that tools and equipment are safe, and that the
correct safety equipment is used.
The self-assessment checklist on the following two pages will assist you in planning your
training programme and it will help you to think about the knowledge and skills needed to
demonstrate competency in this unit. As you go through the checklist you will be able to find
out what elements you have already mastered and which ones you will need to pay more
attention to as you go through the learning process.
To complete the self-assessment checklist, simply read the statements and tick the ‘Yes’ or ‘No’
box. You should do this exercise now.
Self-Assessment Checklist
- Perform data entry operations
2. I can select and use the appropriate input devices for intended
operations ( ) ( )
3. I can change and delete data entered using the appropriate input
device ( ) ( )
3. I can identify, access and use the facilities to achieve desired format
and layout ( ) ( )
If you ticked all or most of the ‘Yes’ boxes then you might not need to go through the entire guide.
Ask your learning facilitator to assist you in determining the most appropriate action you should
take.
If you ticked a few of the ‘Yes’ boxes or none at all then you should work through all of the guide,
even though some of the material may be familiar to you.
Plan your learning based on your answers. Be sure to involve your learning facilitator in the
planning process.
This Learner’s Guide is designed to assist you in working and learning at your own pace.
• Check your progress at each checkpoint to ensure that you have understood the material
• Observe the icons and special graphics used throughout this guide to remind you of what you
have to do and to enhance your learning. The icons and their meanings are as follows:
Definition Box
Words/phrases are defined or explained in this box. The
words/phrases being explained are in bold print.
Checkpoint
This denotes a brain teaser and is used to check your
understanding of the materials presented. No answers are
provided for the questions asked.
Activity
This denotes something for you to do either alone or with
the assistance of your trainer/supervisor.
Reference
Points you to the reference materials and other support
documents or resources used in compiling the unit content.
• Ask your learning facilitator for help if you have any problems with the interpretation of the
contents, the procedures, or the availability of resources.
• Complete each activity as you come to it. If the activity requires that you perform an actual
task, be sure to tell your learning facilitator when you get to that activity so that he/she can
make any arrangements, if necessary.
• Get your learning facilitator to sign and date the Learner Logbook when you have completed an
activity.
When you have worked through all elements of the guide, and when you can tick every ‘Yes’ box,
you are ready for assessment and should ask your learning facilitator to assist you in making the
arrangements to have your performance assessed.
Where your activities refer you to the library, computer and/or Internet resources, ask your learning
facilitator to assist you in locating these resources. If you are getting your training in an institution,
there may be a library and a computer laboratory. If this is not the case, visit the local library and
find out what resources are available.
If you are new to the computer and the Internet, someone in the computer room should be able to
show you how to use these resources.
Please note that in many of your activities you have been referred to information on the Internet.
This is because the Internet has a vast amount of information that can help you in acquiring the
particular competencies. We would like to advise you, however, that we cannot guarantee that all
the sites will be available when you need them. If this happens, ask your learning facilitator to
assist you in locating other sites that have the information you require.
Method of Assessment
Competency will be assessed while you are actually performing the tasks related to this
competency. This may be in a real workplace or a simulated situation that accurately relates to the
work situation. You are advised to consult the associated competency standard for further details
relating to the assessment strategies.
You may now start your learning. Have fun while you work!
LEARNING OUTCOMES
As you go through this element, you will acquire the knowledge, skills and attitudes required to
enter data. Your learning facilitator is there to assist you with the various activities, so on
completion you should be able to:
The organized and efficient worker knows that preparation is always the starting point of any
activity, therefore, you must identify and collect the data you will be entering, and this will prevent
you leaving your workstation in the middle of your work to gather data that you need. Check with
your supervisor to ensure that you have the correct data or refer to your objectives or work plan.
Depending on the nature of the document, the data can consist of one or more of the types noted in
the definition above:
Types of Data
• Text
• Numeric
• Graphic
• Audio
Different types of data may be combined in one document
CHECKPOINT
ACTIVITY
• Dear Madam,
• Yours truly,
• Sensational Fashions Inc.
• February 12, 2004
• Regrettably, we no longer carry the style you requested.
However, we invite you to visit our website @
www.sensationalfashions.com to view our current inventory.
• 3245 Avenue of the Americas, NY, NY 34671
• Thank you for your interest
• Mrs. Rose Jobson
• Cheyenne Santos, Inventory Director
• Apt. 5E, Wealthy Lifestyle Mews,
• 16 Affluent Avenue, Michigan, Detroit 67858
APPLICATION SOFTWARE
Application software consists of programmes designed to perform specific tasks. You will be using
particular software to convert your data into information. Some of the more popular application
software packages fall into the following categories:
Most of these softwares cover common business functions and have widespread use in all types of
enterprises.
• Word processing
• Word perfect
• WordStar
• MS Word
• Spreadsheet:
Lotus 1-2-3
Supercede
MS Excel
• Database management:
FoxPro
MS Access
mySQL
Word Processing
Word processing software, sometimes called a word processor, allows you to create and manipulate
documents that contain text and graphics.
Word processing software is used to develop documents such as letters, memos, reports, newsletters
and web pages.
Word processing software has many features to make documents look professional and visually
appealing. You can:
• change the shape and size of characters in headings
• change the color of characters
• organize text into newspaper style columns, incorporate audio clips, video clips, and many types
of graphical images
Spreadsheets
Spreadsheets are designed to capture numeric data. They are easy to use and have many
applications, particularly in accounting, statistics and mathematics. With spreadsheet software you
can organize data in rows and columns and perform calculations on this data. The rows and
columns are called worksheets.
Most spreadsheet softwares have basic features to help you create, edit, and format worksheets.
(See diagram below.)
Spreadsheets - electronic
equipment of an accountant’s
ledger – a large piece of paper
divided by vertical columns and
historical rows into a grid of cells.
Refer to:
Shelly, Cashman Vermaaat, (2001). Discovering Computers, Thomson Learning
(for more information on database and presentation graphics software)
CHECKPOINT
Refer to:
McKeown, P.G. (1995). Living with Computers Version 5, pages 54 – 57, Dryden Press,
Long, N. and Long, L. (2002). Computers Information Technology in Perspective, pages 90 - 114,
Prentice Hall
ACTIVITY
Use spreadsheet software to record the following information in the sheet below and
calculate the count.
Cheque Coins Credit card Voucher Notes Debit Card
$1104.65 $5 (30) $3800.00 $150 (5) $1000 (19) $768.00
$2649.00 $10 (56) $1910.23 $450 (9) $ 500 (25) $$1500
$20 (80) $ 480.00 $ 100 (15)
10c (50) $ 50 (12)
(The following is an example of a counting sheet that may be used in some establishments in the
process of counting cash and calculating non-cash documents.)
Total Notes
Total Coins
Total Cash
NON-CASH DOCUMENT: AMOUNT
TYPE
• Document readers
• Scanners
• Cameras
• Keyboards
• Direct input from other instruments
• Bar codes
• Light pens
• Tags
• Badges
• Key to storage systems
ACTIVITY
Refer to:
McKeown, P.G. (1995). Living with Computers Version 5, pages 327 –341, Dryden Press,
Long N., Long L., (2002) Computers Information Technology in Perspective, pages 182 - 197,
Prentice Hall, New Jersey
http://shop.store.yahoo.com/wholesalers-direct/computers-input-devices.html
ACTIVITY
ACTIVITY
Create a chart to reflect, from the list given, the devices or source
documents associated with the data entry methods you researched:
• Visual Display Units (VDU)
• Light Pens
• Voice Input and Shop-Floor Data Collection Devices
• Order Forms
• Time Sheets
• Specially marked or printed documents (e.g. questionnaires, bank
cheques)
• Tags attached to clothing and collected at the point of sale
Associate the following input devices with the data entry methods
mentioned above. The data entry devices are:
• Keyboard
• Mouse
• Scanner
• Camera
• Microphone
Discuss your work with your learning facilitator.
ACTIVITY
As you move the mouse, the pointer on the screen also moves. Note the movement of the pointer on
the computer screen as you move the mouse. Do you observe synchronization between them?
For example, you will note that when you move the mouse to the left, the pointer also moves left on
the screen.
When you move the mouse to the right, the pointer moves right on the screen and so on.
You use the mouse to move the pointer on the screen to an object such as a button, menu, an icon, a
link, text or picture. Then you press or click the mouse button to perform a certain action on that
object.
In addition to clicking, you can perform other operations using the mouse. These include:
• Point
• Click
• Right click
• Double click
• Drag
• Right- drag
• Click and drag or drag and drop
ACTIVITY
Double click
Right click
CHECKPOINT
Toggle keys—keys that switch between two different states. The NUM LOCK key, for example,
is a toggle key. When you press it once it locks the numeric keypad. (TRY IT).
Most keyboards also contain keys such as HOME, END, PAGE UP, and PAGE DOWN that you
can press to move the insertion point to the beginning or end of a line, page, or document.
Windows key – displays the start menu.
Application key – displays an item’s shortcut menu.
CHECKPOINT
CHECKPOINT
Directory – An organizational unit, or container, used to organize folders and files into a
hierarchical structure. You can think of a directory as a file cabinet that contains folders that contain
files. Many graphical user interfaces use the term folder instead of directory.
File – A collection of data or information that has a name, called the filename. Almost all
information stored in a computer must be in a file. Examples of various files are (i) data files, (ii)text
files,(iii) program files, and (iv) directory files.
Create a file
Creating a file involves developing the document by entering text or numbers, inserting graphical
images, and performing other tasks using an input device such as keyboard, mouse or microphone.
When you use a word processing package to produce a letter or memo, you need to be able to give
the document a name. Most people develop their own naming conventions, but if you are using a
computer at work, then you should find out if there are any rules or standards in use for naming
files. It is always very useful to develop a logical approach to the organization of files. Here are
some guidelines to observe:
• Free up disk space by backing-up
• Create subdirectories on the hard drive or given network drive
• Give files appropriate names
• Maintain a commitment to organization
• Compress your data
• Use color-coded floppy disks
ACTIVITY
ACTIVITY
refer to:
http://classweb.gmu.edu/sslayden/Chem350/manual/docs/file-direc.doc
When you give the command to save, you will first be asked to give your document a filename
(unless it has one already). Then the filename that you have typed in will now become your means
of contact with that particular document. You may copy, move, drag, and rename this document by
means of the filename.
There are a number of ways to save a document – by selecting the “Save” or “Save As” option on
the File menu bar or by clicking the “Save” icon on the Standard Toolbar. These methods have
become almost universal in most application software.
It is advisable to save your document(s) as you proceed to develop them. This will prevent possible
loss due to computer malfunction or loss of electricity.
ACTIVITY
Windows offers a number of ways to find files and folders that you are unable to locate:
• History Folder – This folder is accessible by clicking on the Open Dialog Box. This folder will list
the most recently worked on files within a particular application, Word, Excel, etc. This is most
useful if you remember most of the file’s name and the application that you were working in.
• Search – This allows you to broaden your search to include all drives, directories and files. This
can be accessed from the desktop by clicking on the Start button. It offers the most direct way to
locate a file. Use Search Companion if you are looking for common file types, if you remember all
or part of the name of the file or folder you want to find, or if you know when you last changed a
file. If you know only part of the name, you can use wildcard characters (See below), to locate all
files or folders that include that part in the name.
• Windows Explorer - provides a quick way to see all the files and folders on your computer. Use
Windows Explorer if you know where the file or folder is located.
• My Computer - provides a simpler view of the folders on your computer. Use my computer if you
want to work with a number of files in one folder, or if you want to reorganize the contents of a
folder by creating new sub-folders or renaming sub-folders.
• My Network Places provides a view of all the shared computers, files and folders, printers, and
other resources on the network to which your computer is connected. My Network Places presents
a view of the network similar to the view of your computer presented by Windows Explorer. Use
my Network places when you want to see all the resources available on the network, when you
know where the resource you want is located, or when you want to copy files and folders from one
network location to another.
• Wildcard - Located within the Search companion is this very powerful tool. It is a character such as
an asterisk (*) or a question mark (?) that is used to represent one or more characters when you are
searching for files, folders, printers, printers, computers, computers or people. Wildcard characters
are often used in place of one or more characters when you do not know all the characters (or do
not want to type the entire name).
Wildcard Uses
character
Use the asterisk as a substitute for zero or more characters. If you are looking for
a file that you know starts with “germ” but you cannot remember the rest of the
file name, type the following:
germ*
Asterisk (*) This locates all files of any file type that begin with “germ” including German,
txt, German.doc, and germane.doc. To narrow the search to a specific type of
file, type:
germ*doc
This locates all files that begin with “germ” but have file name extension.doc,
such as German.doc and Germane.doc.
Question mark Use the question mark as a substitute for a single character in a name. For
(?) example, if you type germ? doc, you will locate the file German.doc or
German1.but not Germane.doc
ACTIVITY
ACTIVITY
VALIDATE DATA
This is the process of checking data for input errors before being passed on for further processing. It
compares data to a set of rules or values to find out if data is correct. Any errors will be printed out
on to an error report. Errors can then be checked, corrected and re-entered.
Many programs perform a validity check that analyzes entered data to help ensure that it is correct.
If the entered data fails a validity check, the computer usually displays an error message and asks
you to enter the data again.
Validating data enhances its integrity before the program writes the data on disk. Various types of
validity checks include alphabetical checks, numerical checks, range checks.
CHECKPOINT
ACTIVITY
BACK UP PROCEDURES
To prevent against data loss caused by a system failure, computer users should back up files
regularly.
Back-up – a duplicate of a
file, program, or disk that
can be used if the original
is lost, damaged or
destroyed.
If you are going to make major changes to a document it is important to keep a back-up copy. The
best way to do this is to call it a slightly different name. If you do make mistakes it means that you
can get the original back.
For example, if you have a document called NCCLET.doc and you want to make changes you
would:
• Load the file NCCLET.doc
• Save it as NCCLET2.doc
• Make your changes to NCCLET2 doc leaving NCCLET.doc as it was when you started
Save your backup copies on media such as tapes, disks and/or CD-ROM
ACTIVITY
Refer to:
Long N., Long L., (2002). Computers Information Technology in Perspective, pages
168 - 170, Prentice Hall.
Website - http://cybercoyote.org/computer/backup.htm
Now that you have completed this element, check to see whether you have fully grasped all the
components by doing the following self-assessment.
Checklist 1 Yes No
2. I can select and use the appropriate input devices for intended
operations ( ) ( )
Checklist 2 Yes No
2. Input devices are selected and used appropriately for the intended
operations ( ) ( )
LEARNING OUTCOMES
As you go through this element, you will acquire with the knowledge, skills and attitudes required
to enable you to retrieve data. Your learning facilitator is there to assist you with the various
activities, so that on completion you should be able to:
When documents are saved, Word offers several options for them to be protected from prying eyes
and fingers:
• Protection (full)
• Write reservation/read only
• Recommended read only
Documents with highly classified information are the likely candidates for (full) protection. In this
case, only those persons who know the password that a document was given can open the file.
Identifying the nature of the document that you want to retrieve will indicate to you whether you
need permission and access information in order to retrieve the file. Your supervisor or manager
will be able to advise you.
Sometimes, users accidentally delete the data from a database, others misuse the data intentionally.
It is for these reasons, among others, that the Database Management System (DBMS) makes
provision for authorized users only to have access to data at permitted times.
Most Database Management System (DBMS) allow you to identify different levels of access
privileges for each field in the database. These access privileges define the activities that a specific
user or group of users can perform.
Access privileges for data involve establishing who can enter new data, change existing data, delete
unwanted data and retrieve data.
For example, in the movie database, a checkout clerk might have read-only-privileges for movie
rating. The clerk could retrieve the movie rating data, but cannot change it. The store manager by
contrast would have full-update privileges to movie data, meaning he/she can retrieve and change
the data.
ACTIVITY
Data Integrity
For a computer to produce correct information, the data that is inputted into a database must have
integrity. Data integrity is the degree to which data is correct. A misspelled movie title in a movie
database is an example of incorrect data. When a data contains these types of errors, it loses
integrity.
Garbage in, garbage out (GIGO) is a computer phrase that states you cannot create information from
data that is incorrect. If you enter incorrect data into a computer (Garbage in), the computer will
produce incorrect information (garbage out). Data integrity is important because computers
generate the information that people use to make decisions and take actions.
A good database system includes validation rules and validation text that will alert the user to
incorrect data, as well as prevent the addition of such data.
Confidentiality
To some extent, protection of data will always be dependent on the trustworthiness of the
employees, and therefore companies need to be as careful as possible about whom they employ. It
is important to be informed about laws relating to confidentiality, so that you do not unintentionally
disclose information that is confidential.
CHECKPOINT
Refer to:
McKeown, P.G. (1995). Living with Computers, Version 5, pages 521 - 523; Dryden
Press
Long, N., Long L., (2002). Computers Information Technology in Perspective, pages 346 - 348,
Prentice Hall
Wischhusen, M. Scales A. (1996). Intermediate Information Technology, pages 118 - 126, Bath
Press Ltd.
RETRIEVE REPORTS
TIP: Ensure that the format of the report/information generated conforms to that which is
required
Printing data
Printing is the process of sending a file to a printer to generate output on a medium such as paper or
transparency and requires both hardware and software. Element 5 addresses the issue of printing
data in greater detail.
CHECKPOINT
ACTIVITY
Now that you have completed this element , check to see whether you have fully grasped all the
components by doing the following self-assessment.
Checklist 1 Yes No
3. I can explain how to correctly locate and access files and data ( ) ( )
Checklist 2 Yes No
LEARNING OUTCOMES
As you go through this element, you will acquire the knowledge, skills and attitudes required to
enable you to amend data. Your learning facilitator is there to assist you through the various
activities so on completion you should be able to:
Quite often the details of one or more fields in a database record need to be amended (changed).
The procedures for amending data follow the objectives of this element as outlined above.
You would have to:
For example, if you are using the database to store names for your birthday party you will want to
alter the names periodically. You will need to locate the data and make the appropriate alterations.
Similarly, someone on the list may change his/her address or telephone number and these
amendments would also have to be made.
TIP: Remember to save any changes made and to ensure that the integrity of your data is
maintained.
CHECKPOINT
ACTIVITY
With assistance of your learning facilitator:
• Create a list of the names of persons you would invite
to your birthday party, including address and
telephone numbers and nicknames if any. You also
have friends named ‘Rachel’ and ‘Frank.’
• Add ‘Mark A. Barker’ to the list of invitees
• Make up the details for the address, parents, birthday,
nickname records
• Change ‘Rachel’ to ‘Racquel’
• Delete FRANK
Refer to:
McKeown, P.G. (1995). Living with Computers Version 5, pages 213 - 230; Dryden
Press
Websiehttp://www.microsoft.com/education/DOWNLOADS/tutorials/classroom/office2k/acc2000.
doc
Long, N. and Long, L., (2002). Computers Information Technology in Perspective, pages 107 - 111,
Prentice Hall
Now that you have completed this element check to see whether you have fully grasped all the
components by doing the following self-assessment.
Checklist 1 Yes No
Checklist 2 Yes No
LEARNING OUTCOMES
As you go through this element, you will acquire the knowledge, skills and attitudes required to use
document layout and data format facilities. Your learning facilitator is there to assist you with the
various activities, so that on completion you should be able to:
As you refine your document, you’ll want to enhance its appearance. Formatting is the term used to
describe the changes made to a document. Formatting is important because the overall look of a
document plays an extremely important role in its ability to communicate effectively.
Your first step will be to verify where necessary, the formatting requirement for the document you
are preparing. While formatting allows you to experiment with your creativity, always ensure that
you follow the formatting guidelines established by your organization.
The format and layout of a given document is dependent upon the specifications that should be met.
You may use a host of tools, features and templates in one or a number of applications to prepare a
document. Common formatting features include:
• Tabs
• Columns
• Bullets and numbering
• Text indents
Most application software provides a number of templates that may also be used to format
documents. Desktop publishing software usually carries the greatest number of templates designed
for formatting purposes.
Once you have determined how the document should be formatted the next step is to apply the
formatting details as required. This could involve a combination of any of the features noted above.
It also involves the correct manipulation of your input devices if you have not selected the auto
format feature.
Always ensure that your completed document has a polished and professional look.
CHECKPOINT
ACTIVITY
ACTIVITY
Proficiency in formatting documents will increase over time and so it requires you to practice, learn
about the features of the software, researching formatting work done by others and applying your
creativity.
Refer to
Long, N. and Long, L., (2002). Computers Information Technology in Perspective,
pages 90 - 97, Prentice Hall
Wischhusen, M. and Scales, A.,(1996). Intermediate Information Technology, pages 47 - 72, Bath
Press Ltd
http://www.depts.drew.edu/acadtech/docs/desktop/microsoft/Office/Word/XP/editing.htm
http://casweb.ou.edu/casit/training/files/WordTimeFormat.pdf
Now that you have completed this element, check to see whether you have fully grasped all the
components by doing the following self-assessment.
Checklist 1 Yes No
Checklist 2 Yes No
LEARNING OUTCOMES
As you go through this element, you will acquire the necessary knowledge, skills and attitudes to
enable you to print information. Your learning facilitator is there to assist you with the various
activities, so that on completion you should be able to:
PRINTING
Impact Printers
An impact printer forms characteristics and graphics on a piece of paper by striking a mechanism
against an ink ribbon that physically contacts the paper. Many impact printers do not produce
letter quality print, that is, a quality that is acceptable for business letters.
Impact printers are ideal for printing mail labels, envelopes, invoice and multipart forms.
Impact printers are used in many factories and retail counters because they can withstand dusty
environments, vibrations and extreme temperatures. Two commonly used types of impact
printers are:
• Dot-matrix printers
• Line printers
Non-impact Printers
A non-impact printer forms characters and graphics on paper or transparency film without
actually striking it. Some spray ink, while others use heat and pressure to create images.
Three commonly used non-impact printers are:
• Ink-jet printers
• Laser printers
• Thermal printers
Refer to:
Shelley, Cashman Vermaat, (2001). Discovering Computers, Course Technology,
Cambridge
CHECKPOINT
Before you can print, your printer must be set up and ready. This process involves both
hardware and software: the printer hardware, the printer’s connections to your computer and the
printing software. After your printer is physically set up and connected, you need to be sure that
the software is correctly set to print – that is, that the right printer is chosen for the document you
want to print and the right printing options are selected.
When you choose the File Print command, the Print dialog box will show you the printer you are
currently set up to use. Clicking on the down arrow at the right end of the Printer box shows you
all the printers you have available to use in Windows. Make your selection from those options.
Click on OK to start printing.
Note: Many organizations printers are on a network which may limit your choice of printers.
The computer laboratory in which you do your work is an example on a printer on a network.
Ask your learning facilitator to explain how it works.
Printing information
Printing your document is an easy task when your printer is ready to use. You can print parts of a
document and additional special information – such as summary information – either along with
or instead of the document subject matter.
ACTIVITY
It is a good practice to preview your document before printing. This allows you to see exactly how
the document will look when printed; you will thus be able to make any formatting adjustments that
may be necessary.
Once the printing has begun review a page to see if it is printing correctly. In the event something
has gone wrong you have the option of canceling the print job, making the necessary adjustments
and restarting the printing process.
Refer to:
Shelly, Cashman Vermatt (2002). Microsoft Word.-.Project WD3.24-26, Course
Technology, Cambridge
ACTIVITY
Understanding how to change from the default printer is important, because it gives you the
option of deciding which printer you want to use. The procedure is similar to selecting an
installed printer discussed earlier in this element. Note, however, that if you change printer
the font may change. This means that you must re-check your document before printing and re-
format as necessary.
CHECKPOINT
ACTIVITY
Now that you have completed this element, check to see whether you have fully grasped all the
components by doing the following self-assessment.
Checklist 1 Yes No
Checklist 2 Yes No