Bill’s Business Counseling
Tell Bill how to do the following tasks:
What formula or function does he put in Column F that will show the total expenses for
each day?
What formula or function does he put in columns B through F in Row 13 that will give
him the total expenses for the week in each category?
Bill wants the entry in Column G to remind him of expenses that require receipts for the
accountant. Tell Bill what to put in Column G to do this:
a. Print the word “Yes” in any row where the total daily expenses are greater than
or equal to $100.00.
b. If the daily expenses total is less than $100.00, leave the Column G entry for that
row blank.
- Bill’s business is already expanding. He thinks that in a few weeks, he will need to hire one or
two employees to help him. He knows that each new employee will need their own computer.
He is also making the necessary changes so that the new employees will be working in a spare
room in Bill’s house. Explain to Bill what networking options he has. Go through each type or
configuration of network possible for him, making sure that you explain the pros and cons of
each configuration. Finish with your suggestion for the network that he should set up and
explain what new hardware will be required to do this. - With the possibility of three business computers in his home, and all of his business records
possibly vulnerable, this would be a good time to advise Bill on how to set up a routine plan to
protect and defend his new network. Provide a list of the five most important concerns for
safety and security of the network and the computers in the network. For each concern, specify
the action to be taken, and if applicable, what software you recommend be added to the
system. Justify each of your recommendations.
Bill’s Business Counseling 2
Introduction
Excel features aid in the calculations and arrangement of financial information in the
spreadsheets that make it easier to analyze financial information or any other data that requires
large tabulation of data in form of figures.
- a) The formula to be inserted on column f is =SUM (B5:E5)
- b) The formula to be inserted in columns B through F in Row 13 is =SUM (B13:E13)
- c) The formula to inserted in column G to remind Bill of the receipts whose value is more than
$100 and require receipts by returning yes or a blank output is =IF(F5>=100,”Yes”,” ”)
Bill’s Restaurant Supply
Weekly Expense journal
DAILY RECEIPTS
DATE AUTO/GAS HOTELS MEALS OTHER TOTAL REQUIRED DESCRIPTION
14-
Sep
$
27.00
- – – $
27.00
Gas
15-
Sep
- $
120.00
$
46.00 - $
166.00
Yes Holiday Inn, San Diego
16-
Sep
- – $
23.00
$
14.00
$
37.00
Lunch & Dinner and Off supplies
17-
Sep
- – – $
24.00
$
24.00
Postage Stamps
18-
Sep
- – $
135.00 - $
135.00
Yes Dinner with Susan & Bob, ABC
Inc
19-
Sep
$
32.00
- – – $
32.00
Gas
20-
Sep
– – – – $
Total $
59.00
$
120.00
$
204.00
$
38.00
$
421.00
(Kaplan and Bruns, 1987)
Bill’s Business Counseling 3
- There are many types of networking options that are available in the market that Mr. Bill can
choose from. ( Stallings , 2004) The different categorizes can be classified by the type of network
design and the scope of work expected. The designs are referred to as area network in
networking industry. The following are the common types of network types; LAN (Local Area
Network), WLAN (Wireless Local Area Network), WAN (Wide Area Network) MAN
(Metropolitan Area Network), SAN (Storage Area Network, Small Area Network, System Area
Network, Server Area Network)
The following networks are the ones that may be applicable to Bill’s business.
The original network categories were only two, the LAN and the WAN networks. WAN is
applicable to wide Area Network systems hence not applicable to Bill’s business as it’s still a
small business with a possibility of having a total of three computers.
Local Area Network is a system that allows computers to be connected over a short distance. The
computer networking maybe within a school or in several buildings within a particular locality.
The major characteristics of a LAN are that they are mostly controlled, owned and managed by
one person who in most cases is the owner. The technologies applicable to LAN are mostly
Ethernet and the Token Ring. Computer networking should not be confused by computer
topologies that include network topologies like bus, star and ring. The local Area Network is the
best for Bill’s business.
The Wide Area Network covers a large distance physically. The largest WAN in the world is the
internet that spans the whole earth. A WAN is made up of several LANS that are interconnected
using a router that interconnects the LANs to the WAN. Internet providers maintain networkings
that have routers which have both the LAN as well as the WAN addresses. A WAN is different
Bill’s Business Counseling 4
from a LAN as WANs are not managed or owned by a single organization but are owned by a
collective ownership system which also manages its operations. WAN make use of new
technologies such as the ATM and the Frame Relay systems. (Kurose & Keith, 2005)
The LAN, WAN and the Home Networking
Most small private companies or residences utilize the LAN which is connected to the Internet
wide Area Network through the use of the ISP (Internet Service Provider) which is enabled by a
broadband modem. The internet service provider an IP WAN address that the modem uses which
connects the home network and links it to the WAN. The computes on the Home LAN
communicate directly to each other by the use of a broadband router which utilizes the ISP
through its own ISP address. (Odom, Healy & Donohue, 2010)
The most recommended network to Bill is the LAN which can be enhanced to use the Wireless
Local Area Network (WLAN) that uses the WIFI wireless technology to access the networks.
The other ones are the Storage Area Network that connects the data servers that act as data
storage devices by utilizing the Fibre channel technology. The system area networks provide
high speed connectivity among a cluster of computers in a Cluster Area Network.
- Network Security consists of all those measures that are adopted by the managers or network
administrators to monitor and also prevent all unauthorized access, modification, misuse of a
computer network and all the network accessible resources. Network security includes the
authorization to access data in a particular network which is controlled and monitored by the
network administrator. Users are assigned a user’s Identification code together with a password
or some authenticating information that identifies the user and allows access to the controlled
information.
Bill’s Business Counseling 5
The major concern for network security is data security and the prevention of unauthorized
access to confidential company information. Rogue employees or hackers can access confidential
information which can be utilized for other illegal purposes or used by people with ill motives.
Unprotected data can also be destroyed by computer viruses or worms if the network is not
protected by up-to-date antivirus. Computer worms and virus can destroy vital company files that
can lead to huge financial lose. For example destruction of debtor’s files can result in
understatement of the invoices. The other concern is the physical theft of the hardware that has to
be protected from burglars while the final concern is the safety of the network from such hazards
such as fire outbreaks or even floods. Fires are hazards that can occur to any organization and
preventive measures must be taken to avoid huge losses of data. Data files must have backups
which have to be stored in different locations and fire extinguishers must be provided within the
building. Computer hardware and the network systems are also expensive and they can be stolen
preventive measures are not taken to protect them.
Finally, the computer network together with the data should be protected and a safe environment
provided to secure the network and also the hardware.
Bill’s Business Counseling 6
Reference
Kurose, J. F and Keith W. R. (2005) Computer Networking: A Top-Down Approach Featuring
the Internet, Pearson Education.
Kaplan, R. S. and Bruns (1987) Accounting and Management: A Field Study Perspective ,
Harvard Business School Press
Odom, W., Healy, R. & Donohue, D. (2010) CCIE Routing and Switching, Indianapolis, IN:
Cisco Press
Stallings , W. (2004) Computer Networking with Internet Protocols and Technology, Pearson
Education 2004