Why choose us?

We understand the dilemma that you are currently in of whether or not to place your trust on us. Allow us to show you how we can offer you the best and cheap essay writing service and essay review service.

Bill’s Business Counseling

Bill’s Business Counseling

Tell Bill how to do the following tasks:
 What formula or function does he put in Column F that will show the total expenses for
each day?
 What formula or function does he put in columns B through F in Row 13 that will give
him the total expenses for the week in each category?
 Bill wants the entry in Column G to remind him of expenses that require receipts for the
accountant. Tell Bill what to put in Column G to do this:
a. Print the word “Yes” in any row where the total daily expenses are greater than
or equal to $100.00.
b. If the daily expenses total is less than $100.00, leave the Column G entry for that
row blank.

  1. Bill’s business is already expanding. He thinks that in a few weeks, he will need to hire one or
    two employees to help him. He knows that each new employee will need their own computer.
    He is also making the necessary changes so that the new employees will be working in a spare
    room in Bill’s house. Explain to Bill what networking options he has. Go through each type or
    configuration of network possible for him, making sure that you explain the pros and cons of
    each configuration. Finish with your suggestion for the network that he should set up and
    explain what new hardware will be required to do this.
  2. With the possibility of three business computers in his home, and all of his business records
    possibly vulnerable, this would be a good time to advise Bill on how to set up a routine plan to
    protect and defend his new network. Provide a list of the five most important concerns for
    safety and security of the network and the computers in the network. For each concern, specify
    the action to be taken, and if applicable, what software you recommend be added to the
    system. Justify each of your recommendations.

Bill’s Business Counseling 2
Excel features aid in the calculations and arrangement of financial information in the
spreadsheets that make it easier to analyze financial information or any other data that requires
large tabulation of data in form of figures.

  1. a) The formula to be inserted on column f is =SUM (B5:E5)
  2. b) The formula to be inserted in columns B through F in Row 13 is =SUM (B13:E13)
  3. c) The formula to inserted in column G to remind Bill of the receipts whose value is more than
    $100 and require receipts by returning yes or a blank output is =IF(F5>=100,”Yes”,” ”)

Bill’s Restaurant Supply
Weekly Expense journal

          DAILY RECEIPTS  

  • – – $



  • $
  • $

Yes Holiday Inn, San Diego


  • – $

  Lunch & Dinner and Off supplies


  • – – $

  Postage Stamps


  • – $
  • $

Yes Dinner with Susan & Bob, ABC


  • – – $



– – – – $

Total $

(Kaplan and Bruns, 1987)

Bill’s Business Counseling 3

  1. There are many types of networking options that are available in the market that Mr. Bill can
    choose from. ( Stallings , 2004) The different categorizes can be classified by the type of network
    design and the scope of work expected. The designs are referred to as area network in
    networking industry. The following are the common types of network types; LAN (Local Area
    Network), WLAN (Wireless Local Area Network), WAN (Wide Area Network) MAN
    (Metropolitan Area Network), SAN (Storage Area Network, Small Area Network, System Area
    Network, Server Area Network)
    The following networks are the ones that may be applicable to Bill’s business.
    The original network categories were only two, the LAN and the WAN networks. WAN is
    applicable to wide Area Network systems hence not applicable to Bill’s business as it’s still a
    small business with a possibility of having a total of three computers.
    Local Area Network is a system that allows computers to be connected over a short distance. The
    computer networking maybe within a school or in several buildings within a particular locality.
    The major characteristics of a LAN are that they are mostly controlled, owned and managed by
    one person who in most cases is the owner. The technologies applicable to LAN are mostly
    Ethernet and the Token Ring. Computer networking should not be confused by computer
    topologies that include network topologies like bus, star and ring. The local Area Network is the
    best for Bill’s business.
    The Wide Area Network covers a large distance physically. The largest WAN in the world is the
    internet that spans the whole earth. A WAN is made up of several LANS that are interconnected
    using a router that interconnects the LANs to the WAN. Internet providers maintain networkings
    that have routers which have both the LAN as well as the WAN addresses. A WAN is different

Bill’s Business Counseling 4
from a LAN as WANs are not managed or owned by a single organization but are owned by a
collective ownership system which also manages its operations. WAN make use of new
technologies such as the ATM and the Frame Relay systems. (Kurose & Keith, 2005) 
The LAN, WAN and the Home Networking
Most small private companies or residences utilize the LAN which is connected to the Internet
wide Area Network through the use of the ISP (Internet Service Provider) which is enabled by a
broadband modem. The internet service provider an IP WAN address that the modem uses which
connects the home network and links it to the WAN. The computes on the Home LAN
communicate directly to each other by the use of a broadband router which utilizes the ISP
through its own ISP address. (Odom, Healy & Donohue, 2010)
The most recommended network to Bill is the LAN which can be enhanced to use the Wireless
Local Area Network (WLAN) that uses the WIFI wireless technology to access the networks.
The other ones are the Storage Area Network that connects the data servers that act as data
storage devices by utilizing the Fibre channel technology. The system area networks provide
high speed connectivity among a cluster of computers in a Cluster Area Network.

  1. Network Security consists of all those measures that are adopted by the managers or network
    administrators to monitor and also prevent all unauthorized access, modification, misuse of a
    computer network and all the network accessible resources. Network security includes the
    authorization to access data in a particular network which is controlled and monitored by the
    network administrator. Users are assigned a user’s Identification code together with a password
    or some authenticating information that identifies the user and allows access to the controlled

Bill’s Business Counseling 5
The major concern for network security is data security and the prevention of unauthorized
access to confidential company information. Rogue employees or hackers can access confidential
information which can be utilized for other illegal purposes or used by people with ill motives.
Unprotected data can also be destroyed by computer viruses or worms if the network is not
protected by up-to-date antivirus. Computer worms and virus can destroy vital company files that
can lead to huge financial lose. For example destruction of debtor’s files can result in
understatement of the invoices. The other concern is the physical theft of the hardware that has to
be protected from burglars while the final concern is the safety of the network from such hazards
such as fire outbreaks or even floods. Fires are hazards that can occur to any organization and
preventive measures must be taken to avoid huge losses of data. Data files must have backups
which have to be stored in different locations and fire extinguishers must be provided within the
building. Computer hardware and the network systems are also expensive and they can be stolen
preventive measures are not taken to protect them.
Finally, the computer network together with the data should be protected and a safe environment
provided to secure the network and also the hardware.

Bill’s Business Counseling 6
Kurose, J. F and Keith W. R. (2005) Computer Networking: A Top-Down Approach Featuring
the Internet, Pearson Education.
Kaplan, R. S. and Bruns (1987) Accounting and Management: A Field Study Perspective ,
Harvard Business School Press
Odom, W., Healy, R. & Donohue, D. (2010) CCIE Routing and Switching, Indianapolis, IN:
Cisco Press
Stallings , W. (2004) Computer Networking with Internet Protocols and Technology, Pearson
Education 2004

All Rights Reserved, scholarpapers.com
Disclaimer: You will use the product (paper) for legal purposes only and you are not authorized to plagiarize. In addition, neither our website nor any of its affiliates and/or partners shall be liable for any unethical, inappropriate, illegal, or otherwise wrongful use of the Products and/or other written material received from the Website. This includes plagiarism, lawsuits, poor grading, expulsion, academic probation, loss of scholarships / awards / grants/ prizes / titles / positions, failure, suspension, or any other disciplinary or legal actions. Purchasers of Products from the Website are solely responsible for any and all disciplinary actions arising from the improper, unethical, and/or illegal use of such Products.