Free Essay

Excel Test

In:

Submitted By mdowney26
Words 2119
Pages 9
Started on | Thursday, 26 November 2015, 2:14 PM | State | Finished | Completed on | Thursday, 26 November 2015, 2:24 PM | Time taken | 10 mins 11 secs | Marks | 29/30 | Grade | 96 out of 100 | Feedback | Grade A |
-------------------------------------------------
Top of Form
Question 1
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Which one of the following would result in the loss of contact details if it were stolen?
Select one:
a. Mobile phone
b. Modem
c. Printer
d. MP3
Feedback
The correct answer is: Mobile phone
Question 2
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Which of the following describes how a virus can enter a computer?
Select one:
a. By opening email attachments from an unknown source

b. By installing software from a known manufacturer

c. By forwarding email attachments from an unknown source

d. By not downloading files from obscure websites

Feedback
The correct answer is: By opening email attachments from an unknown source

Question 3
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Which one of the following describes why firewalls are used?
Select one:
a. To enable easy downloading of data from web sites

b. To prevent destruction of a computer in the event of a fire

c. To detect and disable viruses already on a computer

d. To prevent unauthorised access by incoming transmissions

Feedback
The correct answer is: To prevent unauthorised access by incoming transmissions

Question 4
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Which statement is true regarding Bluetooth?
Select one:
a. It can be used to transfer files between devises
b. It protects a computer from virus threats
c. It is a process of scrambling data
d. It uses a wired connection
Feedback
The correct answer is: It can be used to transfer files between devises
Question 5
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Which one of the following would prevent the theft of a laptop?
Select one:
a. Security cable

b. Spyware

c. Anti-virus software

d. Anti-virus software

Feedback
The correct answer is: Security cable

Question 6
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Which one of the following is an example of phishing?
Select one:
a. An email directing the recipient to enter personal details on a fake website
b. An email warning the recipient of a computer virus threat
c. An email directing the recipient to download an attachment
d. An email directing the recipient to forward the email to friends
Feedback
The correct answer is: An email directing the recipient to enter personal details on a fake website
Question 7
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Which one of the following describes spam?
Select one:
a. Gathering information about a person or organisation without their knowledge
b. Performing an unauthorised, usually malicious, action such as erasing files

c. Putting unnecessary load on the network by making copies of files

d. Sending unwanted bulk messages

Feedback
The correct answer is: Sending unwanted bulk messages

Question 8
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Place the following storage capacity in ascending order * -------------------------------------------------
1 kilobyte
-------------------------------------------------

* -------------------------------------------------
1 megabyte
-------------------------------------------------

* -------------------------------------------------
1 gigabyte
-------------------------------------------------

I don't know
Feedback
Your answer is correct.
Question 9
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
In order to save an existing document with a different name you need to:
Select one:
a. Copy and paste the original document to a new document and then save

b. Use windows explorer to copy the document to a different location and then rename it

c. Retype the document and give it a different name

d. Use the Save as... command

Feedback
The correct answer is: Use the Save as... command

Question 10
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
What is another name for junk e-mail?
Select one:
a. adware
b. spam
c. phishing
d. spyware
Feedback
The correct answer is: spam
Question 11
Partially correct
Mark 1 out of 1
Flag question
Edit question
Question text
Match the following files to the correct application weekly.accdb | Answer 1 | daily.pdf | Answer 2 | science.pptx | Answer 3 | finance.txt | Answer 4 | education.xlsx | Answer 5 |
Feedback
The correct answer is: weekly.accdb – MS Access, daily.pdf – Adobe Acrobat, science.pptx – MS PowerPoint, finance.txt – Notepad, education.xlsx – MS Excel
Question 12
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
What is the combination of keys required to come back to the top of the worksheet?
Select one:
a. Ctrl and left arrows
b. Ctrl and Home
c. PageUp (PgUp)
d. Alt and PageUp
Feedback
Your answer is correct.
The correct answer is: Ctrl and Home
Question 13
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Which one of the following could be the unexpected outcome of deleting a large group of files?
Select one:
a. The files would be hidden

b. A delete file confirmation window may appear
c. An important file may be accidentally deleted

d. The files would become read-only

Feedback
The correct answer is: An important file may be accidentally deleted

Question 14
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
In Excel match the field codes to the correct function [page] | Answer 1 | [file] | Answer 2 | [date] | Answer 3 | [tab] | Answer 4 | [pages] | Answer 5 |
Feedback
The correct answer is:
[page]
– Page number,
[file]
– File name,
[date]
– Current date,
[tab]
– Sheet name,
[pages]
– Number of pages
Question 15
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
During a slide show in PowerPoint, pressing the Esc key will:
Select one:
a. Displays the last slide
b. Ends the slide show
c. Displays slide 1
d. Displays the previous slide
Feedback
The correct answer is: Ends the slide show
Question 16
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Which one of the following describes why it is important to have a secure off-site backup copy of files?
Select one:
a. To reduce the change of data corruption due to a virus attack
b. To ensure that in the event of a physical disaster backup files are not destroyed

c. To make the files easily accessible to other locations of the organisation

d. To speed up the process of accessing the files at anytime from anywhere

Feedback
The correct answer is: To ensure that in the event of a physical disaster backup files are not destroyed

Question 17
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Which one of the following would not happen if a computer suddenly malfunctions?
Select one:
a. Some software may have to be reinstalled

b. The operating system will fail

c. All off-site backups will be lost
d. Files saved on the hard drive will be lost

Feedback
The correct answer is: All off-site backups will be lost
Question 18
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
In a database a primary key allows a user to:
Select one:
a. Assign each record an unique identity

b. Lock a database application

c. Open individual records

d. Open a database application

Feedback
The correct answer is: Assign each record an unique identity

Question 19
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
In Excel ##### means:
Select one:
a. You have misspelled something
b. The cell is not wide enough
c. You have entered a number wrong
Feedback
The correct answer is: The cell is not wide enough
Question 20
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Which one of the following describes how confidential information should be sent using an unsecured network?
Select one:
a. In a compressed format
b. In an unsigned email
c. In an attachment
d. In an encrypted format
Feedback
The correct answer is: In an encrypted format
Question 21
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Match the file type with the correct description beach.gif | * -------------------------------------------------
Image file | today.docx | * -------------------------------------------------
Word Processing file | duran.mp3 | * -------------------------------------------------
Audio file | finance.exe | * -------------------------------------------------
Executive file | exam.zip | * -------------------------------------------------
Compressed file | * -------------------------------------------------
Compressed file * -------------------------------------------------
Audio file * -------------------------------------------------
Executive file * -------------------------------------------------
Word Processing file * -------------------------------------------------
Image file
Question 22
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Match the correct MS Access term to the correct description A collection of information related to a particular subject | * -------------------------------------------------
A database | An unique identity within a table | * -------------------------------------------------
Primary Key | Prevents bad data being saved in a table | * -------------------------------------------------
Validation Rule | Speeds up searching and sorting of records | * -------------------------------------------------
An Index | Determines the type of information that can be stored in a field | * -------------------------------------------------
Data Type | * -------------------------------------------------
Validation Rule * -------------------------------------------------
Primary Key * -------------------------------------------------
An Index * -------------------------------------------------
A database * -------------------------------------------------
Data Type
Question 23
Incorrect
Mark 0 out of 1
Flag question
Edit question
Question text
What key is used to select multiple ranges of cells?
Select one:
a. Ctrl
b. Alt
c. Shift
d. AltGr
Feedback
Your answer is incorrect.
The correct answer is: Ctrl
Question 24
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Which one of the following should you do to ensure that your USB storage device is kept safe and secure?
Select one:
a. Only use it in private surroundings

b. Use firewall software

c. Never leave it unattended

d. Do not access it using a Bluetooth devise

Feedback
The correct answer is: Never leave it unattended

Question 25
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Match the following security issues with the correct description Encryption | * ------------------------------------------------- the process of scrambling data into a form that can’t be understood by unauthorised persons | Firewall | * ------------------------------------------------- a filter that determines what can pass into and out from a computer system | Authentication | * ------------------------------------------------- the process a computer uses to find out if someone is who they say they are | * ------------------------------------------------- the process a computer uses to find out if someone is who they say they are * ------------------------------------------------- the process of scrambling data into a form that can’t be understood by unauthorised persons * ------------------------------------------------- a filter that determines what can pass into and out from a computer system
Question 26
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Which one of the following should be used to change your password?
Select one:
a. Windows firewall

b. Anti-virus software

c. Control panel

d. Internet Explorer

Feedback
The correct answer is: Control panel

Question 27
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Match the following malware to the correct description Spyware | * ------------------------------------------------- software installed without a user’s knowledge and interferes with their interaction with their computer | Worm | * ------------------------------------------------- a computer program that copies itself within a system to other computers on a network | Virus | * ------------------------------------------------- a malicious software code that gets into a PC and can cause damage | * ------------------------------------------------- software installed without a user’s knowledge and interferes with their interaction with their computer * ------------------------------------------------- a malicious software code that gets into a PC and can cause damage * ------------------------------------------------- a computer program that copies itself within a system to other computers on a network
Question 28
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Which one of the following describe why users should lock their computer when leaving their desk?
Select one:
a. To prevent a waste of electricity

b. To prevent unauthorised access to data

c. To prevent the computer from malfunctioning

d. To prevent data from getting corrupted

Feedback
The correct answer is: To prevent unauthorised access to data

Question 29
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
What is the function that would calculate the sum of the cell range D7 to D11?
Select one:
a. SUM(D7:D11)
b. =D7+D8+D9+D10+D11
c. =D7:D11
d. =SUM(D7:D11)
Feedback
The correct answer is: =SUM(D7:D11)
Question 30
Correct
Mark 1 out of 1
Flag question
Edit question
Question text
Match the following network terms HTML | * ------------------------------------------------- the language of the web | ISP | * ------------------------------------------------- the connection between a local network and the Internet | Website | * ------------------------------------------------- a vast collection of interconnected files | Internet | * ------------------------------------------------- a global computer network of linked ICT devices that allow people from all over the world to communicate and share information | * ------------------------------------------------- the connection between a local network and the Internet * ------------------------------------------------- a global computer network of linked ICT devices that allow people from all over the world to communicate and share information * ------------------------------------------------- the language of the web * ------------------------------------------------- a vast collection of interconnected files
Feedback
Your answer is correct.
Bottom of Form
Finish review

Similar Documents

Free Essay

Solution

...Edition by Spiro ISBN 007352977X 9780073529776   ISBN-10:007352977X ISBN-13:9780073529776 THIS IS NOT THE ACTUAL BOOK. YOU ARE BUYING the Official Test Bank in e-version INSTANT DOWNLOAD - The test bank is what most professors use as a template when making exams for their students, which means there’s a very high chance that you will see the exact questions in the tests! - The file is either in .doc, .pdf, excel, or zipped in the package and can easily be read on PCs and Macs. - Delivery is INSTANT. You can download the files IMMEDIATELY once payment is done. If you have any questions, please feel free to contact us. Our response is the fastest. All questions will always be answered in 6 hours, most of the time within 30mins. We also faced similar difficulties when we were students, and we understand how you feel. But now, with the Official Test Bank, you will be able to * Anticipate the type of the questions that will appear in your exam. * Know the correct answers to those questions. * Reduce the hassle and stress of your student life. * Improve your studying and get a better grade! * Get prepared for examination questions. * Save you time and help you understand the material. This is the authentic testbank that is designed for your specific textbook. Delivery is made immediately via digital download so there is no waiting. Test Bank is guaranteed accurate....

Words: 262 - Pages: 2

Free Essay

Issue138

...Some people believe that competition for high grades motivates students to excel in the classroom. Others believe that such competition seriously limits the quality of real learning. Attitude: high grades 优秀 提纲: (+):竞争好(运动比赛)有利于激发同学们的潜能,制造压力,使同学们认真去学习所要求的知识,grades提供了一个竞争的标准。比赛排名。排名的意义。 (-)如果没有分数上的竞争压力,有些同学甚至都不会花时间在学习上,而沉浸于完了荒废学业。(中国的大学,不求分数只求及格,错失了access to 自己有用的知识) (-):但是这个grades的评分系统和依据不能是单一的(中国的高考),如果单一标准,会产生应试的效果,而不是真正地掌握和体会知识的应用。这样是绝对会limits the quality of real learning。 (+):当系统有了完善的评分标准(包括了实践技能,平常课堂表现,考试分数,课外活动的参与),那么,这就的确能完善地评价出学生的学习程度,避免了很多偶然的可能性,保证了公平。(考前突击,考试作弊)。如此在分数上的竞争就能让同学们的水平的到提高。 Competition is the initial motivation to the improvements of every career. As we all know, nowadays, competition is one of the vital components of modern society, which exist in our daily life. When people study or work in a competitive atmosphere, he or she is under pressure. This kind of pressure will stimulates people’s potential which phenomenon could be well explained in sports games. Almost every world record was broken in formal match(运动比赛的话要用哪个词game match competition?), and it is proved in metabolism career that when putting people under tension of physical or psychic, people will have different body environment, which will accelerates their speed of thinking or acting, even it’s easier to focus their attention. so it is necessary to exerting pressure on students, one of the efficient approach is encourage the competition for higher grades, which is a useful standard...

Words: 606 - Pages: 3

Premium Essay

It Analyst

...Spreadsheet Modeling Assignment 1. Objectives The purpose of this assignment is to use some of the more advanced tools that Excel provides to develop a model of a complex business problem. In particular, you will use the following Excel features: 1. Importing data from text files 2. Sorting data 3. Database functions 4. Pivot Tables 5. Data Tables 6. Goal Seeking 2. What You Will Need 1. Access to a computer with a printer and Excel 2007. 2. Note that the instructions in this handout are written for Excel 2007. There are significant differences in user interface between Excel 2007 and 2003. 3. Download the following three files: Mymodel.xls, labor.txt, and demand.txt. 3. What You Will Hand In 1. a CD containing the model your group develops - on the outer label, write the course number, group number, the name of each group member 2. two full-page charts (with your course number and group number as a footer) 3. four worksheet printouts (with your course number and group number as a footer) 4. Make sure your CD is free of any computer virus. A contaminated CD will result in a 50% penalty in grade! 4. Due Date Check the course syllabus for assignment due date. A penalty will be assessed against assignments handed in late (including during class). 5. Background You work for the NOVA Corporation, a mid-tier supplier of hoses and hose assemblies...

Words: 4251 - Pages: 18

Premium Essay

Mktas Business

...while using Microsoft Excel. PHStat2 allows you to perform many common types of statistical analyses while using the familiar Microsoft Excel interface. The rest of this document is organized into sections that will assist you in setting up and using PHStat2. Note: In this document, the symbol è means “on the next submenu, select.” Table of Contents 1 PHStat2 Technical Requirements 2a Configuring Excel 2007/Excel 2010 Security for PHStat2 2b Configuring Excel 2003 Security for PHStat2 3 Setting up PHStat2 4 Using PHStat2 5 Updating PHStat2 6 Troubleshooting PHStat2 7 What's New in PHStat2? 1 PHStat2 Technical Requirements There are separate requirements for using PHStat2 and running the PHStat2 setup program. The requirements for running the setup program are more exclusive.. Requirements for using PHStat2: Windows XP, Windows Vista, Windows 7, or Windows 8. Microsoft Excel 2003, Excel 2007 or Excel 2010 (32-bit version), with the latest Microsoft-supplied patches and service packs applied. (Visit office.microsoft.com/officeupdate for latest Excel updates.) PHStat2 is not compatible with the 64-bit versions of Microsoft Excel. PHStat2 no longer fully supports Excel versions earlier than Excel 2003. Users of earlier Excel versions discover that the new procedures discussed in Section 7 will not function properly. For Excel 2007 or Excel 2010, Trust Center Macro Settings set to Disable all macros with notification (see Topic 2a “Configuring Excel 2007/2010 Security...

Words: 2005 - Pages: 9

Free Essay

General

...Rate Schedule 11 Complete Mileage Expense Type Definition in Payables 12 SA: Define Profile Options 13 System Administration Integration 18 Customize the Internet Expenses Workflow 19 Define a new OIEADMIN Role 19 Define Workflow Notification Performers 20 Change the Find Approver Method 21 Personalize Expense Report Submission Instructions 22 Integrating with Oracle Projects Summary 23 7. Enable the Display of Project and Task. Use the Region Items window to enable the display of project and task information. You need to perform this step in order to view projects and tasks in View Expense Report History. 24 Set Up Offline Expense Spreadsheet Template 25 Configure the Expense Report Sheet 25 Testing a New Custom Microsoft Excel Template 28 Save the spreadsheet to the database 29 Other Configuration Considerations 30 Open and Closed Issues 31 Enable Project Expenditure Types for Expense Report Entry Project...

Words: 6272 - Pages: 26

Free Essay

Interview Questions

...INTERVIEW QUESTIONS & TECHNIQUES Collected by MBA Dept General Advice Before you go for your interview you need to find out everything you can about the company. Reread your application/CV/covering letter, so that you can think about your skills and qualifications, and also questions that you might be asked. In order to do well in the interview you need to be able to convince the interviewer that you have the right skills for the job, this will include your motivation towards the job, how well you will fit into the company, along with meeting their academic and skills requirements. You should dress smartly and appropriately and should leave in plenty of time allowing for possible delays, so that you are not late. Remember first impressions last! Tips It's a good idea to ask for a glass of water, as you will be doing a lot of talking, but it’s also good to take a sip if you want a few seconds to think about the question asked. • Ensure that you are sitting comfortably in a position where you can address all the interviewers. • Make sure that you remember the names of the interviewers, and take note of their various roles. First Impressions Most people make an initial opinion of a stranger within the first five minutes of meeting them. According to research employers' impressions are made up of the following: Body Language and image (70%) Tone of voice (20%) What you say (10%) As soon as you enter the building you need to be polite to everyone...

Words: 2656 - Pages: 11

Premium Essay

Project

...NT1310 : Project Page 1 PROJECT DESCRIPTION As the project manager for the Cable Planning team, you will manage the creation of the cable plan for the new building that will be built, with construction set to begin in six weeks. The deliverables for the entire Cable Plan will consist of an Executive Summary, a PowerPoint Presentation and an Excel Spreadsheet. You will develop different parts of each of these in three parts. The final organization should contain these elements: The Executive Summary: o Project Introduction o Standa rds and Codes  Cable Standards and Codes  Building Standards and Codes o Project Materials o Copper Cable, Tools, and Test Equipment o Fiber - Optic Cable, Tools, and Test Equipment o Fiber - Optic Design Considerations o Basement Server Complex Design o First Floor Design o Security and Safety o Component Cost, Picture, and source The Excel Spreadsheet: Component Names Component Descriptions Component Costs Total Project Costs The PowerPoint Presentation: Introductory Slide Component Slides with Component Name, Quantity Needed, Description, Price, Picture, and Reference (where to buy the component) Description of the Basement Telecommunications and Network Server Space Network Equipment Required for the Server Farm Cable Plant Design for the Basement NT1310 : Project Page 2 Standard Floor Desig n for Computers and Network Equipment Cable Plant for the Standard Floor Course Objectives Tested: ...

Words: 1510 - Pages: 7

Premium Essay

Lec2 Material

...construct that encodes business rules, assumptions, and calculations enabling information, analysis, and insight to be drawn out and supported by quantitative facts.” “A system of spreadsheets and formulas to achieve the level of record keeping and reporting required to be informed, up-to-date, and able to track finances accurately and plan for the future.” Some philosophical: n “A numerical story.” Some incorrect: n n n “Forecasting wealth by putting money away now/investing.” “It is all about putting data into a nice format.” “It is just a mega huge spreadsheet with fancy formulas that are streamlined to make your life easier.” Some ridiculous: n “Something to do with money and fashion?” 1 2 Some honest: n USING EXCEL FOR BUSINESS ANALYSIS “I really...

Words: 17366 - Pages: 70

Free Essay

Economy

...ACE2006 Agricultural Economics Guidelines for poster assessment You must decide on a research hypothesis and then extract the data you need to test that hypothesis from the Farm Business Service (FBS) dataset. This dataset contains a large number of variables, including measurements of farm income, farm size, total costs, fixed and variable costs, total revenue, revenue from farming, subsidies, farm diversification and agri-environment payments. It also contains details of farm location, enterprise revenue and variable costs (and gross margins), farm type. It is up to you to decide what data you need to test your research hypothesis. For example, you might wish to examine the economies/diseconomies of scale theory, or you may wish to show how farm business income varies with region and within region by farm type (or size). You may wish to determine which farm types earn what % of total revenue from agri-environment payments or from diversification payments. You could examine the labour used on different farms, and correlate this with a measure of farm income. There are endless possibilities. You are asked to decide on a research hypothesis yourself and to work alone this is individual work so DO NOT work in groups. The poster that you will present your research hypothesis and data analysis is described below, this exercise is assessed and is worth 20% of the module mark. This document contains guidelines for extracting data, and the pro-forma which you...

Words: 6430 - Pages: 26

Premium Essay

Art of Modeling

...Source: S. G. Powell and K. R. Baker, 2004. The Art of Modeling with Spreadsheets. New York: Wiley & Sons. Copyright © 2004 by John Wiley & Sons, Inc CHAPTER 1 INTRODUCTION MODELS AND MODELING Modeling is the process of creating a simplified representation of reality and working with this representation in order to understand or control some aspect of the world. While this book is devoted to mathematical models, modeling itself is a ubiquitous human activity. In fact, it seems to be one of just a few fundamental ways in which humans understand the world. As an example, a map is one of the most common models we encounter. Maps are models because they simplify reality by leaving out most geographic details in order to highlight the important features we need. A state road map, for example, shows major roads but not minor ones, gives rough locations of cities but not individual addresses, and so on. The map we choose must be appropriate for the need we have: a long trip home across several states requires a regional map, while a trip across town to find a new doctor’s office requires a detailed street map. In the same way, a good model must be appropriate for the specific uses intended for it. A complex model of the economy is probably not appropriate for pricing an individual product. Likewise, a back-of-the-envelope calculation may be inappropriate for acquiring a multibillion-dollar company. Models take many different forms: mental, visual, physical, mathematical...

Words: 4929 - Pages: 20

Free Essay

Energy Drink

...Welcome to Financial Models in Excel Situation report 1 / 17 • Peter Raahauge Department of Finance Office: A 5.21, Solbjerg plads Background: ˚ – PhD in economics (Arhus) 1999 – System developer (Simcorp) 1999-2000 – Assisting/Associate Professor/Lecturer (CBS) 2000-2012 2 / 17 • Goal The overall goal • Practical implementation of financial theory How to get there? • Exercise-based (solving “real world” problems) • IT-based, everything based on Excel (and VBA) • Professional data source: Datastream Results • • • • Better understanding of (known) financial theory Better Excel-skills Better feeling with real world data All in all: Easier to get started (at your thesis/job) 3 / 17 1 Examples of skills after the course In half a work-day (or 4 hours exam :-) you will be able to solve one of these problems: • • • • Form a reasonable stock portfolio. Price an option, (Eur, Amr, Ber, Asian) Estimation of the term structure, (cubic spline). Predict the standard deviation of stock returns for next week, (basis for risk management). - You know the theories, but it will take you half a “term paper” to get an answer if you have not tried it before. 4 / 17 Structure of the Lessons 15 lessons (2 hours lecture and exercises) 14 has the following structure: 1. 2. 3. 4. E-lec: Review of last weeks exercise E-lec: Financial theory and Excel for next exercise You solve the exercises (guiding solution available) Physical lecture: Your questions / problems...

Words: 851 - Pages: 4

Premium Essay

Business

...while using Microsoft Excel. PHStat2 allows you to perform many common types of statistical analyses while using the familiar Microsoft Excel interface. The rest of this document is organized into sections that will assist you in setting up and using PHStat2. Note: In this document, the symbol è means “on the next submenu, select.” Table of Contents 1 PHStat2 Technical Requirements 2a Configuring Excel 2007/Excel 2010 Security for PHStat2 2b Configuring Excel 2003 Security for PHStat2 3 Setting up PHStat2 4 Using PHStat2 5 Updating PHStat2 6 Troubleshooting PHStat2 7 What's New in PHStat2? 1 PHStat2 Technical Requirements There are separate requirements for using PHStat2 and running the PHStat2 setup program. The requirements for running the setup program are more exclusive.. Requirements for using PHStat2: Windows XP, Windows Vista, Windows 7, or Windows 8. Microsoft Excel 2003, Excel 2007 or Excel 2010 (32-bit version), with the latest Microsoft-supplied patches and service packs applied. (Visit office.microsoft.com/officeupdate for latest Excel updates.) PHStat2 is not compatible with the 64-bit versions of Microsoft Excel. PHStat2 no longer fully supports Excel versions earlier than Excel 2003. Users of earlier Excel versions discover that the new procedures discussed in Section 7 will not function properly. For Excel 2007 or Excel 2010, Trust Center Macro Settings set to Disable all macros with notification (see Topic 2a “Configuring Excel 2007/2010 Security...

Words: 2005 - Pages: 9

Premium Essay

Atit

...Module number: U51001 Module title: Key Business Competences Contents Module introduction 1 Semester plan synopsis 2 Module syllabus 3 Week 1 – Module Introduction 7 Week 2: Operations with numbers 8 Week 3: Understanding Data 16 Week 4 – Charts and Graphing in Excel 31 Week 5 – Summarising data 45 Week 6 Reading Week 57 Week 7 & 8 – Principles of elementary modelling 58 Week 9 & 10 – Financial Modelling (1) 69 Week 11 & 12 – Financial Modelling (2) 81 Week 13 – Modelling and Data handling in business 97 Week 14 – Revision Week 107 Week 15 – In-class Test 108 Assessment details 109 Regulations 110 A note on equal opportunities and diversity 114 Module introduction Introduction This module ensures that all students have the necessary numerical skills to proceed with the rest of their degree in Business and related fields. As a compulsory module it must be passed and a maximum of three attempts can be made to pass it, with a resit opportunity for each attempt. Past student comments on the module “Yes it is really enjoyable – I liked the course” “The lecturers are very helpful and friendly” “The handbook is really informative” “Very clear and well explained” “It is very interesting but at the same time very complex” “Maybe make the lectures and seminars more interactive” “Quickly go over the initial mathematics and spend more time on the more complex parts of the module” ...

Words: 27701 - Pages: 111

Premium Essay

Business

...AC556 Week 1 Problem ABC Costing NOTE: It is expected that this problem will be completed using an Excel spreadsheet using formulas. Please see the Excel Tutorial that is available under the course home tab. The new president of the Wernecke Company was stumped. Why had profits gone down? He had directed the sales department to push the product with the highest contribution margin, and the sales department had come through with flying colors. The percent of flams sold had increased from 25% of units sold to 37.5% of units sold. So what happened? | Flims | Flams | Sales Price per Unit | $150 | $500 | Direct Materials per Unit | $75 | $200 | Direct Labor Cost per Hour | $25 | $25 | Direct Labor Hours per Unit | 1 hour per unit | 5 hours per unit | Number of Units Produced | 25,000 | 15,000 | The variable overhead for the coming year is estimated to be $3,000,000. Required: 1. Calculate the Wernecke Company’s estimated direct labor hours to produce flims and flams. 2. Calculate the predetermined variable overhead rate that will be used in the coming year using a traditional costing system based upon direct labor hours. 3. Using a traditional costing system based upon direct labor hours, compute the unit product costs for flims and flams as well as contribution margin per unit. 4. It has been suggested to the president to consider the use of an ABC costing system to allocate manufacturing overhead. Engineering studies have revealed...

Words: 473 - Pages: 2

Premium Essay

Information System

...AACS1733 Information Technology and Systems ASSIGNMENT 2010/2011 Objective This coursework aims to provide students an opportunity to explore the use of Microsoft Excel and PowerPoint so as to enhance their understanding of the application software features in spreadsheet and presentation. Grouping This is a group-based assignment. Student may form a group of minimum 4 students and maximum 5 per group (ACCORDING TO ATTENDANCE LIST NAME SEQUENCE). A group leader is to be selected to ensure equal allocation of tasks among each student in the group before assembling a complete assignment report. Plagiarism All work is to be the result of the student's own individual and group effort. Assignment contents are not allowed to be copied from the Internet or from other students. A student who plagiarizes will receive zero point credit on the assignment. Late Policy The assignment should be submitted on the due date stated below unless there is any legitimate reason as to why it is impossible for the student to complete the assignment. As a general rule, no extension of time will be granted. Assignment received after the due date without legitimate reason will be penalized. Submission date: 6/12/2010 (Monday) (Week 11) Assignment return week: Week 14 Assessment This assignment is worth 40% of the overall course assessment. The marks allocations are divided into 2 categories. The first category is an individual mark which is awarded based on each...

Words: 2098 - Pages: 9