Monday, January 5, 2009

EXERCISE 15

1. Open the document you saved in the Exercise 11.
2. Replace the text:
These customers need to be contacted for information concerning their password violations:
with this text:
Please telephone these users who made log-in errors in weeks 35 and 36. Here is a list of their names and numbers:
3. Indent this paragraph by 1.5 cm from the left margin of the text.
4. Replace the list of users in the table you placed in the document production section with the list of Users for weeks 35 and 36 showing names
and telephone extensions that you saved in the Data Manipulation section.
5. Insert at the end of the document the report you generated in the Data Manipulation section entitled User Error Log
6. Repaginate the document if necessary.
Save and Print the document.
7. Send a message to your tutor with the following subject:
IT Security Report
The message text should be:
Here is the report as requested.
Attach a copy of your report to the e-mail message and send it.
8. Print a copy of the e-mail showing transaction details (Recipient, subject, text, date, attached file).

No comments: