Premium Essay

Pt1420 Unit 3 Data Analysis

Submitted By
Words 824
Pages 4
1. In range of data, data in the cells are not structured, they can be specified by the block of cells. Also the name of the table is manually done and not automatically set. In the structured range data, data is organized in columns and fields. The names of the table can be automatically set, and table headers can also be automatically set with drop down boxes.
2. A field is represented by the columns and a records are represented by rows. A field is single unit of data that is unique within each entry or row whereas a record is a row that contains distinctive data in each of the fields.
3. Freeze Panes buttons are used to freeze rows and columns in the excel sheet. It is helpful when working with a large sheet so that you keep the headers visible as …show more content…
5. The sort command is used to give commands to data. It is used to sort data in two different ways, either by ascending or descending order. Sorting also arranges data in a sequential manner. The subtotal command on the other hand is used to place subtotal values for a specific portion of the worksheet.

QUICK CHECK 5.3
1. In excel, if a table contains large data, it is difficult to understand. A Pivot Table is used to organize and summarize the data in different categories so that it becomes easy to find and understand. A Pivot table groups data into categories and then uses functions such as COUNT, SUM, AVERAGE, MAX and MIN to summarize the data.
2. You add fields to a Pivot Table from the Pivot Table Fields pane. From the exercise, fields can be added in the following steps.
• In the pivot table fields pane, drag the week # from the upper section to the rows area in the lower section.
• In the pivot table fields pane, click amount.
• Click Trn Date
• Click Segment
• All the fields will be

Similar Documents

Premium Essay

Nt1230 Syllabus

...Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...

Words: 1834 - Pages: 8

Premium Essay

Test

...ITT Technical Institute IS3340 Windows Security Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory Hours, 30 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisite: NT2580 Introduction to Information Security or equivalent Course Description: This course examines security implementations for a variety of Windows platforms and applications. Areas of study include analysis of the security architecture of Windows systems. Students will identify and examine security risks and apply tools and methods to address security issues in the Windows environment. Windows Security Syllabus Where Does This Course Belong? This course is required for the Bachelor of Science in Information Systems Security program. This program covers the following core areas:    Foundational Courses Technical Courses BSISS Project The following diagram demonstrates how this course fits in the program:    IS4799 NT2799 IS4670 ISC Capstone Project Capstone ProjectCybercrime Forensics NSA    NT2580 NT2670  Introduction to  Information Security IS4680 IS4560 NT2580 NT2670 Email and Web Services Hacking and Introduction to  Security Auditing for Compliance Countermeasures Information Security Email and Web Services      NT1230 NT1330 Client-Server Client-Server  Networking I Networking II  IS3230 IS3350 NT1230 NT1330  Issues Client-Server Client-Server  SecurityContext in Legal Access Security Networking I Networking II   NT1110...

Words: 2305 - Pages: 10

Premium Essay

Nothing

...interconnection components), networking devices and their specifications and functions. Students will practice designing physical network solutions based on appropriate capacity planning and implementing various installation, testing and troubleshooting techniques for a computer network. Where Does This Course Belong? | | | NT2799 | | | | | | | | NSA Capstone | | | | | | | Project | | | | | NT2580 | | | NT2670 | NT2640 | | PT2520 | | Introduction to | | | | | | | | | | | Email and Web | | | | | Information | | | | IP Networking | | Database Concepts | | | | | Services | | | | | Security | | | | | | | | | | | | | | | | NT1330 | | | NT1230 | NT1430 | | PT1420 | | Client-Server | | | Client-Server | | | Introduction to |...

Words: 10839 - Pages: 44