subject
Computers and Technology, 03.12.2021 02:40 Shisuuu

Imagine you are working as a computer support technician for a large company and your boss needs help. He has to create a spreadsheet to present to the Chief Technology Officer showing the financial information for your department and how much you spend on buying new and upgraded software and equipment. He has the data, but does not have time to create the presentation. He sends you the Excel file with all the data and asks you to perform the calculations and make it look good.

Create a file with financial information for each month of one year. Include the following categories:

software expenses
hardware expenses
labor costs (employee salaries)
training costs
office expenses
It is okay to create dummy data for this file.

Format the data using a general format, a number format, an accounting format, and a currency format to see if there are any differences.

Copy the data onto two worksheets, one labeled 2012 and one labeled 2011. Working with either set of data, calculate the following information:

total expenses in each of the five categories
total expenses for each month
expenses in each category for each month
total costs for computer related items for each month
total costs for staff and training for each month
Your boss did not tell you how the CTO wants to see the data. So create one or more charts showing a breakdown of expenses by month. Use colors, shapes, and labels to make the charts. Also create one or more tables showing a breakdown of expenses by month. Use highlighting and formatting to create a readable table. Format each in a way that is visually appealing and tells the proper story of the data.

link the excel sheet here:

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 24.06.2019 14:40
Create a function (prob3_6) that will do the following: input a positive scalar integer x. if x is odd, multiply it by 3 and add 1. if the given x is even, divide it by 2. repeat this rule on the new value until you get 1, if ever. your program will output how many operations it had to perform to get to 1 and the largest number along the way. for example, start with the number 3: because 3 is odd, we multiply by 3 and add 1 giving us 10. 10 is even so we divide it by 2, giving us 5. 5 is odd so we multiply by 3 and add one, giving us 16. we divide 16 (even) by two giving 8. we divide 8 (even) by two giving 4. we divide 4 (even) by two giving 2. we divide 2 (even) by 2 to give us 1. once we have one, we stop. this example took seven operations to get to one. the largest number we had along the way was 16. every value of n that anyone has ever checked eventually leads to 1, but it is an open mathematical problem (known as the collatz conjectureopens in new tab) whether every value of n eventually leads to 1. your program should include a while loop and an if-statement.
Answers: 3
question
Computers and Technology, 24.06.2019 15:20
Local area networks use many of the same network technologies and the internet, only on a smaller scale. devices that access lans are equipped with a network interface that contains circuitry for wireless or wired connections. devices also have a physical address, in addition to the ip addresses acquired from a dhcp server. the most popular wired technology is . the most popular wireless technology is , which can be configured as a(n) or star topology. setting up a lan and configuring its router is fairly easy. the first step is to change the standard to one that is secure. next, create a(n) that uniquely identifies the network by name. it is also important to activate wireless to prevent wireless signals from being intercepted during transmission. a limited-access network can be created for visitors to use. by activating , the router will be able to assign ip addresses to each device that joins the network. to connect to a secure lan that is protected by encryption, an encryption , or password, is required. lans can be used to access data collected by iot devices and the networks that tie these devices together. technologies such as rfid, nfc, bluetooth smart, zigbee, and z-wave offer -power links, essential for battery-powered devices that can’t expend excess amounts of energy transmitting data.
Answers: 1
question
Computers and Technology, 24.06.2019 20:00
Write c++programs for the following problem: let the user enter two numbers and display which is greater. !
Answers: 1
question
Computers and Technology, 24.06.2019 21:30
The hybrid uses 144 to 158 volt batteries.
Answers: 1
You know the right answer?
Imagine you are working as a computer support technician for a large company and your boss needs hel...
Questions
question
History, 22.05.2020 02:01
question
Biology, 22.05.2020 02:01
question
Mathematics, 22.05.2020 02:01