Essay on Instructions SC Word 2a

Submitted By sakuriri
Words: 1055
Pages: 5

Shelly cashman word chapter 2: In The lab 1
Preparing a Short Research Paper
Skills
Use Save As
Adjust line spacing
Change paragraph line spacing
Create a document header
Insert page numbers
Insert text
Center a paragraph
Indent the first line of a paragraph
Create a Quick Style set
Change bibliographic style
Insert a citation
Create a source
Edit a citation
Insert a page break
Insert a bibliography
Create a hanging indent
Project overview
You are a college student currently enrolled in an introductory business class. Your assignment is to prepare a short research paper (300-350 words) about a computer-related job. The requirements are that the paper be presented according to the MLA documentation style and have three references. One of the three references must be from the Web. You prepare the paper shown in Figures 2–83a, 2-83b, and 2-83c, which discusses the computer forensics specialist.
STUDENT start FILE
SC_Word_2a_FirstLastName_1.docx (Note: Download your personalized start file from sam2007.course.com)
Instructions
1. Open the file SC_Word_2a_FirstLastName_1.docx and save the file as SC_Word_2a_FirstLastName_2.docx before you move to the next step. Verify that your name appears at the bottom of the document, in the footer. If it does not, please download a new copy of the start file from the SAM Web site. (Note: Do not edit the footer at the bottom of the document.)
2. Adjust line spacing to double.
3. Remove space below (after) paragraphs.
4. Create a header that includes the page number.
5. Using the information in Figure 2-83a, type the name and course information at the left margin, then center and type the title.
FIGURE 2-83a Hankins 1
Mary Hankins
Mr. Habib
Business 102
14 March 2008
Computer Forensics Specialist
Computer forensics, also called digital forensics, network forensics, or cyberforensics, is a rapidly growing field that involves gathering and analyzing evidence from computers and networks. Because computers and the Internet are the fastest growing technology used for criminal activity, the need for computer forensics specialists will increase in years to come.
A computer forensics specialist examines computer media, programs, data, and log files on computers, servers, and networks. According to Shelly and Cashman (Computer Careers), many areas employ computer forensics specialists, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector. A computer forensics specialist must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, a willingness to learn and update skills, and a knack for problem solving.
When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required (Reinman 52-58).
A computer forensics specialist must have knowledge of all aspects of the computer, from the operating system to computer architecture and hardware design. In the past, many computer forensics specialists were self-taught computer users. Today, extensive training, usually from several different
6. Set first-line indent for paragraphs in the body of the research paper.
7. Create a Quick Style for the research paper paragraphs.
8. Type the first body paragraph of the research paper as shown in Figure 2–83a. (Hint: Before you begin typing, you should carefully review the three citations in Figure 2–83c. Keep these citations in mind and handle them appropriately when entering the body of the research paper.