preview

Business Level 3 Unit 2 M3

Decent Essays

To get the formula you will need to click the F5 cell and type =SUM(B5:F5) formula. This will give the daily total for each expense. Once you are done with the first row you will need to enter the formula into the remaining rows. As an example you will type in F6 cell =SUM(B6:F6). This calculates each cell B6-F6. As for the formula that allows you to get the total of expenses for each category weekly, you will enter in the B13 cell and type =SUM(B5:B13) continue to do this for each cell. Which in the Hotels column you would type =SUM(C5:C13). This calculates C5-C13 and gives the total. To show which receipts need to be printed out for the accountant I would advise you to type =IF(F5>100,” YES”,”) So Bill can now highlight G5, press copy then …show more content…

As I suggested in the business proposal a wireless connection will allow not only yourself but your employers to access the internet which will help with sending/receiving emails as many other things that the business will need from the internet. This is also a great way to be able to use not only a computer but a phone or a tablet and even your printers, so your employers are not stationed in one spot the whole time. When using the wireless internet, you will need the router which I also suggested in the business proposal to help you connect too. It serves as a router between the home LAN and the ISP, routing the traffic between the computers within your LAN and the …show more content…

This is why I mentioned the above idea of getting a security device on all of your computers. There are multiple popular and free choices all you need to do is google, my personal favorite is McAfee which most of the time already comes on the computer. A popular and free choice is Microsoft Security Essentials. Just go onto the Windows website www.microsoft.Windows.com; protecting yourself from bad internet users can affect your business as they can create viruses and get into the work files. There are two network protocols that are used to manage devices and servers; they are called Secure Shell (SSH) and Telnet. SSH offers protection for users against anyone with bad intentions as it utilizes encryption to protect the traffic stream. Telnet has no security measures as it transmits all the data in plain text, including passwords. This is major security issue as a data sent in plain text can be captured in route and

Get Access