Software

A:

As of 2014, some disadvantages of Microsoft Word include the unfamiliar new Ribbon interface, too many options that can be very confusing, cost, vulnerability to virus attacks, and large files due to meta information getting saved alongside Word files. Microsoft Word is the most popular word processing program globally. However, it has some weaknesses that drive users to alternative word processors.

See Full Answer
Filed Under:
  • What is data integrity testing?

    Q: What is data integrity testing?

    A: Data integrity testing refers to a manual or automated process used by database administrators to verify the accuracy, quality and functionality of data stored in databases or data warehouses. This test is regularly done by administrators to ensure that stored data has remained unaltered and to discover system design bugs that could compromise the files in a database.
    See Full Answer
    Filed Under:
  • When was the first computer virus created?

    Q: When was the first computer virus created?

    A: The first computer virus was created on an Apple II computer in 1981, by a 9th grader. Richard Skrenta was that smart and mischievous 9th grader who knew a lot about computers. He first wrote code on his friends’ pirated computer games (on floppy disks, well before the unified internet) to prank them. He would alter copies of the games to self destruct after a certain number of plays.
    See Full Answer
    Filed Under:
  • What is application software?

    Q: What is application software?

    A: Application software are computer programs that allow users to perform specific tasks. These programs are commonly referred to as "apps," and are usually completely self-contained and commercially produced.
    See Full Answer
    Filed Under:
  • What is iris scanning used for?

    Q: What is iris scanning used for?

    A: Iris scanning technology is a security measure used to identify individuals with respect to high-security applications, such as government buildings, airports, computer access, ultra-secure locations and cellphone access. Hospitals use iris scanning technology to pair mothers with infants in maternity wards. Border crossing agents match the identities of people on government watch lists with iris scans.
    See Full Answer
    Filed Under:
  • When using a database, what is a field?

    Q: When using a database, what is a field?

    A: In a database, the field is the smallest source of input for users to enter data. For example, a field in a database may ask for a company's name, tax identification number or income. A group of many fields is called a record, and a field in a spreadsheet is known as a cell.
    See Full Answer
    Filed Under:
  • What are the most current computer viruses?

    Q: What are the most current computer viruses?

    A: New viruses, worms and Trojan horse programs are identified daily. As of October 2014, McAfee and Bitdefender are two companies, of many, that maintain online virus databases. Three of McAfee's top-tracked viruses originated in 2008, 2009 and 2010. Its website has detailed, up-to-date information on the viruses that are current threats and provides instructions on how to remove them.
    See Full Answer
    Filed Under:
  • What is the FBI locked computer virus?

    Q: What is the FBI locked computer virus?

    A: The FBI locked computer virus, more commonly known as the FBI Virus or FBI Moneypak Virus, is a dangerous class of malware titled "ransomware," which impedes a user from accessing different parts of his computer. It locks his computer screen and displays a message, seemingly sanctioned by the FBI, that demands payment of a fine set at varying amounts. It is capable of infecting Windows and Apple computers alike.
    See Full Answer
    Filed Under:
  • How do you calculate square root in Excel?

    Q: How do you calculate square root in Excel?

    A: To calculate the square root of a number in Microsoft Excel, enter "=SQRT(number)" into a blank cell. You can also set up side-by-side columns using the Excel worksheet function, where you can enter a number in one column and the square root appears in the column next to it.
    See Full Answer
    Filed Under:
  • What is computer sabotage?

    Q: What is computer sabotage?

    A: Computer sabotage involves deliberate attacks intended to disable computers or networks for the purpose of disrupting commerce, education and recreation for personal gain, committing espionage, or facilitating criminal conspiracies, such as drug and human trafficking. According to the Federal Bureau of Investigation, computer sabotage costs billions of dollars in legal fees to recover damages such as identity theft and to repair vital infrastructure that serves hospitals, banks and 911 services.
    See Full Answer
    Filed Under:
  • What are the types of database software?

    Q: What are the types of database software?

    A: The different types of databases include desktop, Web enabled and server. The type of database a person or company needs ultimately depends on size requirements.
    See Full Answer
    Filed Under:
  • Why does the toolbar keep disappearing?

    Q: Why does the toolbar keep disappearing?

    A: There are a few reasons why the taskbar or toolbar in a Windows computer can disappear. The most common reasons are that the taskbar was moved or minimized or that the explorer.exe program stopped running. The latter problem is something fairly common that occurs in older operating systems and might be only fully solved by a fresh install.
    See Full Answer
    Filed Under:
  • What software is used to remix a song?

    Q: What software is used to remix a song?

    A: Many music-remixing programs are available, but some of the most popular include Mixxx, Kramixer and Ultramixer 2. All these programs offer many features and allow users to remix music files from their computers.
    See Full Answer
    Filed Under:
  • How do I remove tracking cookies from my computer?

    Q: How do I remove tracking cookies from my computer?

    A: Removing tracking cookies is a straightforward process that varies based on the Internet browser you are using. Most major programs let you manipulate the settings so that existing cookies are deleted and future cookies are blocked. Explore the Tools and Settings options for your specific program in order to delete your cookies. Then use a browser that supports Do Not Track technology and enable the DNT option.
    See Full Answer
    Filed Under:
  • How does one get rid of hackers?

    Q: How does one get rid of hackers?

    A: Hackers can be avoided by taking necessary measures like having up-to-date antivirus software, strong passwords and a good firewall. There are other ways to avoid hackers as well, like avoiding phishing scams.
    See Full Answer
    Filed Under:
  • What are the similarities between a typewriter and a word processor?

    Q: What are the similarities between a typewriter and a word processor?

    A: Both typewriters and word processors create texts with characteristics of print (as opposed to handwriting). They also share some mechanics for doing so, such as a similar keyboard with "return" and "enter" keys, shift keys, a space bar and, ultimately, some error correction.
    See Full Answer
    Filed Under:
  • What free software can I use to make party invitations?

    Q: What free software can I use to make party invitations?

    A: SmileBox.com, PunchBowl.com and EZtoCreate.com all offer free software for creating party invitations for numerous and various occasions. Free word processing software such as Apache OpenOffice can also be used to make invitations.
    See Full Answer
    Filed Under:
  • What is the purpose of a database?

    Q: What is the purpose of a database?

    A: A database is used to collect and organize data. Although an electronic version such as one created in Microsoft Access may be the first that comes to mind, there are many non-automated database versions as well, such as a personal phone and address book.
    See Full Answer
    Filed Under:
  • What is an identity theft shield?

    Q: What is an identity theft shield?

    A: Identity Theft Shield is a third party consumer credit-monitoring service. The service provides three continuous services to help consumers combat against identity theft. Credit card merchants, credit unions and banks all offer this service.
    See Full Answer
    Filed Under:
  • How can I tell if my computer is being monitored?

    Q: How can I tell if my computer is being monitored?

    A: Software designed to monitor computer activity can be found under Processes in the Task Manager on a PC. Simply press Ctrl-Alt-Del to bring up the Task Manager. On a Mac, open up Gadgets and Gizmos, and then click Utilities and Activity Monitor to pull up the running processes.
    See Full Answer
    Filed Under:
  • How do fingerprint scanners work?

    Q: How do fingerprint scanners work?

    A: Fingerprint scanners capture digital images of fingerprints and compare them to other fingerprint images on file. There are two main types of fingerprint scanners: optical scanners and capacitive scanners.
    See Full Answer
    Filed Under:
  • What is the purpose of a firewall?

    Q: What is the purpose of a firewall?

    A: Firewall software is commonly installed on computers in order to monitor incoming and outgoing packet requests and to block any that may be from an untrustworthy source. Firewalls and antivirus programs are the two most basic forms of computer protection.
    See Full Answer
    Filed Under: