Lymaris Dalian Santiago
CV10 Intro to Computers
Assignment #8 Business Consulting
May 24, 2015
What formula or function does he put in Column F that will show the total expenses for each day? =SUM()
In the parenthesis enter the cell letter and number to find total expenses per day. (i.e.) =sum(b5:e5) What formula or function does he put in columns B through F in Row 13 that will give him the total expenses for the week in each category? =SUM()
In the parenthesis enter the cell number and letter to find total expenses per week. (i.e.) =sum(b5:b11) Bill wants the entry in Column G to remind him of expenses that require receipts for the accountant. Tell Bill what to put in Column G to do this: A. Print the word “Yes” in any row where the total daily expenses are greater than or equal to $100.00. Click on the cell in Column G that reflects amounts over $100.00 and enter the word “Yes”. B. If the daily expenses total are less than $100.00, leave the Column G entry for that row blank.
1. Bill’s business is already expanding. He thinks that in a few weeks, he will need to hire one or two employees to help him. He knows that new employees will need their own computer. He is also making the necessary changes so that the new employees will be working in a spare room in Bill’s house. Explain to Bill what networking options he has. Go through each type or configuration of network possible for him, making sure that you explain the pros and cons of each configuration. Finish with your suggestion for the network that he should set up and explain what new hardware will be required to do this.
Workgroup, Domain, and Home groups represent different methods for organizing computers in networks. The main difference among them is how the computers and other resources on the networks are managed. Computers running Windows on a network must be part of a workgroup or a domain. Computers running Windows on home networks can also be part of a home group, but it's not required. Computers on home networks are usually part of a workgroup and possibly a homegroup, and computers on workplace networks are usually part of a domain.
In a workgroup:
All computers are peers; no computer has control over another computer. Each computer has a set of user accounts. To log on to any computer in the workgroup, you must have an account on that computer. There are typically no more than twenty computers.
A workgroup is not protected by a password.
All computers must be on the same local network or subnet.
In a Domain:
One or more computers are servers. Network administrators use servers to control the security and permissions for all computers on the domain. This makes it easy to make changes because the changes are automatically made to all computers. Domain users must provide a password or other credentials each time they access the domain. If you have a user account on the domain, you can log on to any computer on the domain without needing an account on that computer. You probably can make only limited changes to a computer's settings because network administrators often want to ensure consistency among computers. There can be thousands of computers in a domain.
The computers can be on different local networks.
In a Homegroup:
A group of Windows computers and devices that share content and devices with each other. What is shared with the Homegroup is not available to other computers that are on the same network but are not part of the Homegroup. The computers that are part of the Homegroup are not required to enter a username and password each time they connect to something that's shared with the Homegroup, as was the case with older operating systems. Windows 7 and Windows 8 computers and devices can join the Homegroup. There's no limit to the number of computers that can join a Homegroup. I suggest that Bill gets the Workgroup mainly because regardless...
References: Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., ... & Vigneron, L. (2005, January). The AVISPA tool for the automated validation of internet security protocols and applications. In Computer Aided Verification (pp. 281-285). Springer Berlin Heidelberg.
Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.
Lin, D. D. H., Shaheen, A. A., & Yellepeddy, K. K. (2000). U.S. Patent No. 6,052,785. Washington, DC: U.S. Patent and Trademark Office.
Stallings, W. (1998). High speed networks. TCP/IP and ATM Design Principles, Upper SaddleRiver, NJ, PrenticeHall, Inc.
Please join StudyMode to read the full document