C10; Introduction to Computers

Assignment 8;
Business Consulting
Remember Bill?

He was the gentleman that you helped to start up his business in week 4. Well his business is doing well, but he has come to you with some questions and concerns. You discuss each of these with Bill and promise to send him a written report with your suggestions and recommendations. Submit your written response to Bill’s questions and concerns below.
Bill has set up a spreadsheet in Excel that will help him keep track of expenses. So far, he has this:

Tell Bill how to do the following tasks:
What formula or function does he put in Column F that will show the total expenses for each day?

What formula or function does he put in columns B through F in Row 13 that will give him the total expenses for the week in each category?

Bill wants the entry in Column G to remind him of expenses that require receipts for the accountant. Tell Bill what to put in Column G to do this:

Print the word “Yes” in any row where the total daily expenses are greater than or equal to $100.00.

If the daily expenses total is less than $100.00, leave the Column G entry for that row blank.

Bill’s business is already expanding. He thinks that in a few weeks, he will need to hire one or two employees to help him. He knows that each new employee will need their own computer. He is also making the necessary changes so that the new employees will be working in a spare room in Bill’s house. Explain to Bill what networking options he has. Go through each type or configuration of network possible for him, making sure that you explain the pros and cons of each configuration. Finish with your suggestion for the network that he should set up and explain what new hardware will be required to do this.
With the possibility of three business computers in his home, and all of his business records possibly vulnerable, this would be a good time to advise Bill on how to set up a routine plan to protect and defend his new network. Provide a list of the five most important concerns for safety and security of the network and the computers in the network. For each concern, specify the action to be taken, and if applicable, what software you recommend be added to the system. Justify each of your recommendations.

Hmm...It would be nice if you start working on the problem, show some thoughts and work of your own, identify the difficulties, so that we can help you.

i need help with this one

Response to Bill’s Questions and Concerns:

1. To calculate the total expenses for each day in Column F, Bill should use the SUM function. In the first cell of Column F, he can enter the formula "=SUM(B2:E2)" and then drag the formula down to the rest of the cells in Column F.

2. To calculate the total expenses for the week in each category in Row 13, Bill can use the SUM function again. In cell B13, he can enter the formula "=SUM(B2:B12)" to calculate the total of expenses in Category A. He can copy this formula to cells C13, D13, E13, and F13 to calculate the totals for the other categories.

3. In Column G, Bill can use an IF function to remind him of expenses that require receipts for the accountant. He can enter the formula "=IF(F2>=100, "Yes", "")" in cell G2 and then copy it down to the rest of the cells in Column G. This formula will print "Yes" if the total daily expenses are greater than or equal to $100, and leave the cell blank if the total daily expenses are less than $100.

4. Networking Options: Bill has a few options for networking the computers in his home. The configurations he can consider are:

a. Peer-to-Peer Network: This type of network involves connecting computers directly to each other without a central server. Pros: Easy to set up and cost-effective. Cons: Limited scalability and security.

b. Client-Server Network: This network configuration involves a central server that controls the network and resources. Pros: Better security, centralized management, and scalability. Cons: Higher initial cost and more complex setup.

c. Wireless Network: This allows for wireless connectivity between computers and devices. Pros: Provides flexibility and mobility. Cons: Potential for security vulnerabilities and lower data transfer speeds compared to wired networks.

d. Virtual Private Network (VPN): This is a secure network connection over the internet, often used for remote access to a private network. Pros: Secure access from anywhere, cost-effective for small businesses. Cons: Requires reliable internet connection and VPN software.

Based on Bill's needs, it is recommended to set up a Client-Server Network. This will provide better security and centralized management as his business expands. To set up this network, Bill will need a dedicated server computer and networking hardware such as a router and Ethernet switches.

5. Safety and Security Concerns: To protect and defend Bill's new network, the following are the five most important concerns and recommendations:

a. Install Firewall: A firewall helps protect against unauthorized access to the network. Bill should install a hardware firewall (such as a router with built-in firewall) or a software firewall on each computer. Recommended software: Windows Firewall or third-party firewall software.

b. Use Strong Passwords: Bill should ensure that all network devices and computers have strong, unique passwords. Passwords should include a combination of uppercase and lowercase letters, numbers, and special characters.

c. Regularly Update Software: Bill should regularly update the operating system and applications on all computers to patch security vulnerabilities. Automatic updates should be enabled whenever possible.

d. Install Antivirus Software: Antivirus software is essential to protect against malware and viruses. Bill should install reputable antivirus software on all computers and keep it up to date. Recommended software: Norton, McAfee, or Avast.

e. Backup Data: Bill should create regular backups of his business data to protect against data loss. He can use cloud storage services or external hard drives to back up important files. Recommended software: Dropbox, Google Drive, or Acronis True Image.

These recommendations will help safeguard Bill's network and computers, ensuring the safety and security of his business records and sensitive information.

To calculate the total expenses for each day in Column F, Bill can use the SUM function. Here's how he can do it:

1. In cell F2, type the formula "=SUM(B2:E2)".
2. Press Enter or return, and the total expenses for that day will be displayed in cell F2.
3. Drag the formula down to apply it to the rest of the cells in Column F.

To calculate the total expenses for the week in each category, Bill can use the SUM function again. Here's how he can do it for columns B to F in Row 13:

1. In cell B13, type the formula "=SUM(B2:B12)".
2. Press Enter or return, and the total expenses for that category for the week will be displayed in cell B13.
3. Repeat the above steps for cells C13 to F13, but adjust the reference to the corresponding column range.

To remind Bill of expenses that require receipts for the accountant in Column G, he can use an IF function. Here's how he can do it:

1. In cell G2, type the formula "=IF(F2>=100, "Yes", "")".
2. Press Enter or return, and if the total expenses for that day are equal to or greater than $100.00, "Yes" will be displayed in cell G2. Otherwise, the cell will remain blank.
3. Drag the formula down to apply it to the rest of the cells in Column G.

Regarding networking options for Bill's expanding business, there are a few configurations he can consider:

1. Local Area Network (LAN): This involves connecting all the computers in Bill's house using Ethernet cables or Wi-Fi. Pros: Fast and secure connection, easy file sharing, and centralized device management. Cons: Requires additional hardware (router/switch), may have limited range.

2. Wireless Local Area Network (WLAN): This is similar to a LAN but uses Wi-Fi instead of physical cables. Pros: No need for cables, allows flexibility in device placement. Cons: May have lower speed and range compared to wired connections, potential security risks.

3. Virtual Private Network (VPN): This allows remote employees to securely access the company's network from their own locations. Pros: Provides secure access and allows remote collaboration. Cons: Requires additional configuration and may have slower connection speeds.

Based on Bill's needs and considering the setup in his house, I would recommend setting up a Local Area Network (LAN). Bill will need a router or switch to connect the computers together. If he prefers a wireless setup, he can also consider a Wi-Fi router to provide wireless connectivity to the devices. This will allow for fast and secure communication between the computers in his home office.

To ensure the safety and security of Bill's network and computers, here are five important concerns:

1. Firewall Protection: Install a firewall on the network router to block unauthorized access and protect against external threats. Recommended software: Enable the built-in firewall on the router or consider using third-party firewall software for added security.

2. Strong Passwords: Encourage the use of strong, unique passwords for each computer and network device. Regularly update passwords, and consider using a password manager software to securely store and manage them.

3. Antivirus Software: Install reputable antivirus software on all computers to detect and remove malware and viruses. Regularly update the antivirus software and perform full system scans to ensure the computers are protected.

4. Regular Updates and Patches: Enable automatic updates on all computers and network devices to ensure they receive the latest security patches and bug fixes. Regularly check for updates from the software and hardware manufacturers and apply them promptly.

5. Data Backup: Establish a regular backup routine to safeguard business records and important data. Use cloud storage or external hard drives to create regular backups of crucial files. Also, consider online backup services for added protection against data loss due to hardware failures or disasters.

These recommendations are crucial to protect the network and computers from potential threats and ensure the continuity of Bill's business operations. Regularly review and update security measures to adapt to evolving threats and technology advancements.