Office Application Assignment: Word

Assignment overview

Your task for this assignment is to present a report on computer security topics based on the online notes for chapter 14. The online notes contain the information you need in a much more organized and concise format than the text. You have to submit a Word document in .docx format. Files in .rtf or other formats will not be accepted. Files with a .lnk extension are Windows shortcuts and are not usable or gradable.

Grading will be done based on the rubric provided as part of the list of requirements. There are 51 points total available for this assignment. If you want a high grade, it would be wise to read over this document completely, think about what you want to write, ask any questions you have, and check to make sure you complete everything on the requirements list.

There is a Word FAQ available on the course website. That's a good starting place to look for answers to any Word questions you have. The instructor can handle any additional questions by email or in person, and is always looking for new items to add to the Word FAQ on the course web site. There is also a discussion forum available for asking questions about this assignment.

Objectives

  • Create a Word document following specific requirements
  • Create a footnote in Word
  • Create and modify a table in Word
  • Create and use defined styles in Word
  • Modify document properties
  • Create a list in Word
  • Create hyperlinks in Word
  • Create customized headers and footers in Word
  • Use formatting options in Word
  • Explain some of the basic concepts in computer security

Assignment requirements

  1. Start a new Word document. (0)
  2. For the whole document, set the margins to 1.2 inches on the top, right, bottom, and left. (1)
  3. Create a title/cover page with the following attributes: Note: Do not use Insert, Cover Page. This cover page has to be manually generated step-by-step. The automatic page generated when using the Insert tab creates content you have to delete for this assignment and creates a lot more work for you.
    1. Everything on the first page should be automatically centered vertically do NOT use blank lines to center the content. (2)
    2. Everything on the first page should be automatically centered horizontally - do NOT use spaces or tabs to center the content. (1)
    3. Make the paragraph line spacing 1.5 lines for the entire cover sheet. (1)
    4. Use Garamond for the font on the cover sheet. If you don't have that font, use MS Comic Sans. (1)
    5. The first paragraph should be the name of your report (i.e. Computer Security) in 36 point font size. (1)
    6. Find an image on the Internet to use for your report. Insert it after the name of the report and resize it to approximately two inches tall. Remember where you obtained the image since it should be cited later in the report. (2)
    7. The rest of the text on the page should be 18 point font size. (1)
    8. Add a new paragraph under the clip art that displays your name. This paragraph (and only this paragraph) should be made bold, italic, and underlined. (2)
    9. Add a new paragraph with the text "E = m c2 Consulting" (without the quotes), using superscripting to get the digit to look right. (1)
    10. Insert a page break directly after the last paragraph. This is important for being able to vertically center the first page, but not the rest of the report. Make sure there are no blank lines on the page after the last paragraph. (1)
  4. On the second page, make the document from this point forward vertically align to the top of the page. (1)
  5. Add an automatic header and footer to every page except for the first page (cover sheet). (2)
    1. The header should display the name of the report automatically centered at the top of every page (but nothing on the cover sheet/first page). (1)
    2. Add a footer which displays "Page # of #" automatically centered at the bottom of every page (but nothing on the cover sheet/first page). The page numbers must automatically fill in. (1)
  6. Create a new paragraph style with the following requirements:
    1. The name is CIS123Body (.5)
    2. The font is 12 point Calibri (.5)
    3. There should be a .5 inch first line indent (but no other left or right indentation) (1)
    4. Note: No paragraphs within the report should start with a tab. The first line indent setting should handle that automatically when it is appropriate without using a tab.
    5. The alignment should be: justified (1)
    6. The spacing should be set to 12 point before and 10 point after the paragraph (1)
    7. The line spacing should be set to double spaced (.5)
    8. The CIS123Body must be the style that automatically follows this style (.5)
    If you do not know how to create a style, check out the style question on the Word FAQ.
  7. Create a new paragraph style with the following requirements:
    1. The name is CIS123Heading (.5)
    2. The font is 14 point bold Cambria (.5)
    3. There should be no indentation of any kind (1)
    4. The alignment should be: left (.5)
    5. The spacing should be set to 24 point before and 0 point after the paragraph (1)
    6. The line spacing should be set to 1.5 lines (.5)
    7. The CIS123Body must be the style that automatically follows this style (1)
    If you do not know how to create a style, check out the style question on the Word FAQ.
  8. There should be four sections to the report, each with its own heading: risks to hardware, risks to data, security measures, and bibliography.
  9. As you create the report, make sure all four headings get the CIS123Heading style and make sure all the non-heading paragraphs outside of the table get the CIS123Body style. (2)
  10. The risks to hardware section should be five short paragraphs, each one describing a risk from the online notes. The online list also includes definitions for downtime and UPS, but those are not part of the five risks being presented. Each paragraph should include the name of the risk and a short definition. Use your own words and do not just copy text from the notes. Make sure you create proper sentences. The paragraphs are likely to be very short. (2)
  11. The risks to data section needs a footnote (NOT an endnote), so insert a footnote at the end of the heading for that section. The text of this footnote should appear at the bottom of the same page. Make sure it is a proper Word footnote (use the References tab on the ribbon) and not just a superscripted number 1. The footnote should cite the appropriate online notes: http://kermit.kish.edu/~dklick/cis123/notes/L14_RisksSecurityRecovery.html (2)
  12. The risks to data section should contain a table with two columns and at least seven rows. (1)
  13. The first row of the table should have its two cells merged, the background shaded, and contain the text "Some common data security problems" (without the quotes). Make the text bold and centered. For formatting purposes you may modify the paragraph line spacing and the spacing before and after the paragraph. There should be no indentation. (2)
  14. The rest of the cells in the table (after the first row) should be formatted as single spaced with 6 point spacing before and after. The alignment should be set to "left". There should be no indentation. Make sure the text is not bold or italic. (1)
  15. Each of the rows (at least six) in the table after the first row should have the name of a data risk in the first column and a brief description of that risk in the second column. Be concise, be accurate, and use your own words. Change the width of the columns if needed to make the table look nice. (3)
  16. The security measures section should contain a numbered list with at least three items: encryption, firewall, and authentication. The list should have the name of each item and a short description of what each one means. Use your own words for the descriptions. (4)
  17. In the bibliography section of the report, create a bullet list with two items. (1)
    • The first list item should be a working hyperlink to the online image that you used on the cover sheet. (1)
    • The second list item should be a working hyperlink to the online notes:
      http://kermit.kish.edu/~dklick/cis123/notes/L14_RisksSecurityRecovery.html (1)
  18. Change the document properties so that the Title field contains the text: CIS 123 Word Assignment Fall 2017 (1)
  19. Check and correct all spelling and grammar. You may use the spell checker and the grammar checker. Keep in mind that the automated checkers do not catch many errors - such as using an incorrect word, but spelling it correctly. (1)