Essential MS Office & Access Commands and Functions
1. Essential Keyboard Shortcuts
- Shift + Ctrl + M: Change font size
- Shift + Ctrl + F: Change font type
- Shift + Ctrl + D: Double underline text
- Shift + Ctrl + L: Convert lowercase to uppercase
- Ctrl + Alt + I: View document in Print Preview
- Ctrl + M: Change font, font style, font size
- Shift + Ctrl + U: Convert uppercase to lowercase
- Ctrl + R: Close the existing document
- F12: Show the “Save As” window
2. Formula for Table of Letters Results
Formula to display results for “PASA YEAR’S LOSE THE YEAR, SUPLETORIO”
Read MoreUnderstanding Microprocessor Architecture: CISC vs RISC
Microprocessor Architecture Explained
Microprocessors: A component that incorporates all the functions of the CPU on a single integrated circuit.
Technological Characteristics
- Instruction set that can run.
- Word size (number of bits) which the microprocessor processes in a single operation.
- The clock speed supported (the rate at which it can work).
- Instruction pipelining (which allows multiple instructions to be processed simultaneously in a chain-like assembly).
- Instruction set architecture.
- Data path or
Data Transmission Networks: Delays, Losses, and Tools
Fiber Types and Distances
Q20. What are the three types of fiber in use? What are the distances they can cover without needing repeaters?
A20.
- Multimode Step-Index Fiber:
- Copper: 2000 meters at 100 Mbps.
- Multimode Graded-Index Fiber: Covers 3000 meters at 100 Mbps.
- Singlemode Fiber: Up to 80km.
Repeaters and Hubs
Q21. What are repeaters and hubs?
A21. Repeaters strengthen the signal by repeating electrical signals, amplifying both the signal and any noise. Hubs distribute the amplified signal across all
Read MoreTech Terms: Definitions of Computer and Mobile Technology
AAC: A music file format of higher quality than MP3.
Accuracy: A GPS’s measurement of correctness; the ability to measure correctly.
Anchor: A word, phrase, or image that includes a hyperlink.
Anti-antivirus virus: A virus that attacks anti-virus software.
Avatar: An image in a computer game that represents a person.
Automation: The use of machines to perform tasks without human assistance.
Backdoor: Part of a program giving undesired access.
Bluetooth: A wireless network that connects your phone with
Read MoreData Science Process, Applications, and Machine Learning Techniques

The Data Science Process

Steps in the Data Science Process
The data science process involves a series of steps that help data scientists analyze and derive insights from data. While different organizations and individuals may have variations in their approach, the following steps provide a general framework for the data science process:
Problem Definition: The first step is to clearly define the problem or question you want to address with data science. This involves understanding the business or research
Medical Records: Evaluation, Digitization, and Outsourcing
5 Evaluation, Selection, and Destruction of Consignment Notes
The process of evaluation, selection, and destruction of the consignment note must be made prior to the migration to another medium. The healthcare world uses two different techniques: microfilming and digitization.
- Microfilming: The support is microfilm.
- Digitization: The supports are magnetic and optical discs.
Before making the change of support, the Health Care Center (HHCC) and having completed the weeding, should check that documents
Read More