CV10 Intro to Computers
Assignment #8 Business Consulting
May 24, 2015
What formula or function does he put in Column F that will show the total expenses for each day?
In the parenthesis enter the cell letter and number to find total expenses per day. (i.e.) =sum(b5:e5)
What formula or function does he put in columns B through F in Row 13 that will give him the total expenses for the week in each category?
In the parenthesis enter the cell number and letter to find total expenses per week. (i.e.) =sum(b5:b11)
Bill wants the entry in Column G to remind him of expenses that require receipts for the accountant. Tell Bill what to put in Column G to do this:
A. Print the word “Yes” in any row where the total daily expenses are greater than or equal to $100.00.
Click on the cell in Column G that reflects amounts over $100.00 and enter the word “Yes”.
B. If the daily expenses total are less than $100.00, leave the Column G entry for that row blank.
1. Bill’s business is already expanding. He thinks that in a few weeks, he will need to hire one or two employees to help him. He knows that new employees will need their own computer. He is also making the necessary changes so that the new employees will be working in a spare room in Bill’s house. Explain to Bill what networking options he has. Go through each type or configuration of network possible for him, making sure that you explain the pros and cons of each configuration. Finish with your suggestion for the network that he should set up and explain what new hardware will be required to do this.
Workgroup, Domain, and Home groups represent different methods for organizing computers in networks. The main difference among them is how the computers and other resources on the networks are managed. Computers running Windows on a network must be part of a workgroup or a domain. Computers running Windows on home
References: Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., ... & Vigneron, L. (2005, January). The AVISPA tool for the automated validation of internet security protocols and applications. In Computer Aided Verification (pp. 281-285). Springer Berlin Heidelberg. Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7. Lin, D. D. H., Shaheen, A. A., & Yellepeddy, K. K. (2000). U.S. Patent No. 6,052,785. Washington, DC: U.S. Patent and Trademark Office. Stallings, W. (1998). High speed networks. TCP/IP and ATM Design Principles, Upper SaddleRiver, NJ, PrenticeHall, Inc.