Power Tools for Technical Communication:
Formatting Lists


In this lab, you study unformatted text and then follow instructions to add lists to that text using your preferred word-processing software:
  1. For each item, copy the text, and paste it into your preferred word-processing software.
  2. Follow the directions for adding lists, and then reformat the text accordingly.
  3. Don't forget that reformatting with lists enables you to cut words.
  4. Put your name, List Formatting: Print, and the date on this document, and either print it out or show it on screen to your instructor, or send it be e-mail attachment to your instructor.


  1. For the following, create a lead-in punctuated with a colon and followed by four bulleted-list items; do not use end punctuation on any of the list items:

    The major symptoms of asthma include shortness of breath accompanied by wheezing, whistling and labored breathing, particularly following exercise or exposure to allergens; coughing that lingers for weeks; night-time wakening with a cough or shortness of breath; constriction or a feeling of tightness in the chest.

  2. For the following, create a lead-in punctuated with a colon and followed by at least three numbered-list items:

    The following steps need to be considered before you begin taping. Make a list of songs you wish to record onto a cassette tape from up to six different compact discs. Reference the songs in the order in which you want them to appear on the tape. Label each CD from 1 to 6. Label each song with its corresponding number. (For example, CD 1, song 5.) Estimate the length of all the songs. If the length of each song is not noted on the CD, use 3.50 minutes as the average length of a song. (For example, a 60-minute cassette can hold approximately 16 songs.) Adjust your song list accordingly. Make sure you have a cassette tape long enough to hold your song list. There are 30-minute, 60-minute, and 90-minute tapes.

  3. For the following, create a lead-in punctuated with a colon and followed by four bulleted-list items:

    Compact discs are quite sturdy, however, the following precautions should be taken when handling discs. Fingerprints or smudges on the CD can reduce the brightness of the light reflected from the signal surfaces, causing degradation of sound quality. Keep discs clean by gently wiping with a soft cloth from the inside of the CD out. If a CD becomes very dirty, use a slightly damp, soft cloth and gently wipe away the dirt, removing any water drops with a dry, soft cloth. Do not use any solvents, cleaning sprays, or other related products. These might damage the surface of the disc. Always store discs in their cases in a vertical position avoiding high heat and humidity.

  4. For the following, create a lead-in punctuated with a colon and followed by four bulleted-list items; create two sub-bullets following the second bulleted item:

    The following items should be checked before loading a cassette. Make sure the tape in the cassette is not loose or hanging out of the cassette. To remove slack in tape, place pencil in the reel hole and turn until slack is removed. To prepare tape for recording, you must: make sure erasure prevention tabs are intact; make sure the clear leader tape is bypassed by allowing the tape to run for 5 seconds before recording. To avoid dust and dirt buildup, keep tapes in their cases. To prevent important recordings from being erased, remove the erasure prevention tabs with a screwdriver. The erasure tab for each side is located on the top left when the side that you want to protect is facing you.

  5. Using the following text, create a lead-in punctuated with a colon and four bulleted items. Experiment with bold and italics for the label and colon at the beginning of each list item. End each list item with a period.

    Generally, all cryptographic processes have four basic parts. Plaintext: Unscrambled information to be transmitted. It could be a simple text document, a credit card number, a password, a bank account number, or sensitive information such as payroll data, personnel information, or a secret formula being transmitted between organizations. Ciphertext: Plain text rendered unintelligible by the application of a mathematical algorithm. Ciphertext is the encrypted plain text that is transmitted to the receiver. Cryptographic algorithm: Mathematical formula used to scramble the plain text to yield ciphertext. Converting plain text to ciphertext using the cryptographic algorithm is called encryption, and converting ciphertext back to plain text using the same cryptographic algorithm is called decryption. Key: Mathematical value, formula, or process that determines how a plaintext message is encrypted or decrypted. The key is the only way to decipher the scrambled information.

  6. Using the following text, create a lead-in punctuated with a colon, two main bulleted-list items then a two-item numbered list after both the bulleted items:

    Page layout determines how content will appear on your page. You may wish to customize your document's page layout or use the Wizard's preset layout options. To customize your layout, select Layout Guides in the Arrange menu and then use the arrows provided to adjust Margins, Columns and Rows. To use the Wizard, click on Layout in the Quick Publication Wizard and select a layout from the list that appears.


Information and programs provided by hcexres@prismnet.com.