subject
Computers and Technology, 03.12.2021 02:40 Shisuuu

Imagine you are working as a computer support technician for a large company and your boss needs help. He has to create a spreadsheet to present to the Chief Technology Officer showing the financial information for your department and how much you spend on buying new and upgraded software and equipment. He has the data, but does not have time to create the presentation. He sends you the Excel file with all the data and asks you to perform the calculations and make it look good.

Create a file with financial information for each month of one year. Include the following categories:

software expenses
hardware expenses
labor costs (employee salaries)
training costs
office expenses
It is okay to create dummy data for this file.

Format the data using a general format, a number format, an accounting format, and a currency format to see if there are any differences.

Copy the data onto two worksheets, one labeled 2012 and one labeled 2011. Working with either set of data, calculate the following information:

total expenses in each of the five categories
total expenses for each month
expenses in each category for each month
total costs for computer related items for each month
total costs for staff and training for each month
Your boss did not tell you how the CTO wants to see the data. So create one or more charts showing a breakdown of expenses by month. Use colors, shapes, and labels to make the charts. Also create one or more tables showing a breakdown of expenses by month. Use highlighting and formatting to create a readable table. Format each in a way that is visually appealing and tells the proper story of the data.

link the excel sheet here:

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 23:30
Step 1: choose your topics review the project milestone reflections you submitted for modules 1 through 4. choose the one major idea or concept from each module that you feel most applies to your life. in addition, choose an important concept from module 5 that applies to your life. step 2: write your guidebook for each module: write a catchy headline that clearly and concisely sums up your chosen idea or concept write a brief explanation that includes a description of the concept, why it is important, and how it can be applied to your life to make a positive impact choose an exciting, powerful, or engaging image that illustrates your concept remember, you are writing one for each module, so you will have a total of five headlines, five descriptions, and five images. step 3: design your guidebook choose a format to present your digital guidebook. there are many 21st century tools available for creating and submitting your work in the online environment. for more information on tools your school uses, contact your instructor or visit the web 2.0 tools area.
Answers: 3
question
Computers and Technology, 22.06.2019 16:10
Drag each label to the correct location on the imagelist the do’s and don’ts of safeguarding your password.keep yourself loggedin when you leave your computer.don’t write your password down and leave it whereothers can find it.share your password with your friends.each time you visit a website,retain the cookies on your computer.use a long password with mixed characters.
Answers: 1
question
Computers and Technology, 22.06.2019 17:00
The two main ways in which marketers address the competition with their strategies are by satisfying a need better than a competition and by
Answers: 2
question
Computers and Technology, 24.06.2019 16:30
What is the item which could be matched with a statement below? software installed on a computer that produces pop-up ads using your browser an example of social engineering malware loads itself before the os boot is complete type of spyware that tracks your keystrokes, including passwords windows key + l the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer when someone who is unauthorized follows the employee through a secured entrance to a room or building a type of malware that tricks you into opening it by substituting itself for a legitimate program a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge an infestation designed to copy itself repeatedly to memory, on drive space, or on a network
Answers: 1
You know the right answer?
Imagine you are working as a computer support technician for a large company and your boss needs hel...
Questions
question
Mathematics, 09.12.2020 04:30
question
Mathematics, 09.12.2020 04:30
question
Mathematics, 09.12.2020 04:30
Questions on the website: 13722361