Calculate sales tax in cell e36 by multiplying the tax rate

Assignment Help Computer Network Security
Reference no: EM131067059

Project Description:

For this project, you will update a workbook. You will format grouped worksheets, set up validation rules, and create functions. Additionally, you will import a text file and XML data and manipulate the imported text. Finally, you will modify the document properties, insert comments, and mart the workbook as final.

Instructions

1. Open wake-final-Exam1.xlsx and save the workbook as Wake_LastName_FirstName.xlsx (Substituting your first and last name.)Make sure the Invoice sheet is active.

2. Unlock the following cells: E4, B14:E33, E35, E37

3. In cell E4 put in the date: 6/1/2018
Then put in the following:

B14: Insulation in walls and attic
D14: T
E14: 935.25

B15: Labor for
installationE15: 210

B16: Mud for wall texture
D16: T
E16: 57.84

4. Fix the subtotal in cell E34 to calculate sum the above cells (E14:E33)Set the tax
rate to 6.5% in cell E35

Calculate the sales tax in cell E36 by multiplying the tax rate by all items that are taxed. (Use a SUMIF to find all ‘T' items and sum the "Amount" column.)

Have the total amount show up in cell D2 (Make a cell reference to the total.)
Protect the worksheet so locked cells cannot be modified (Set the password to: Wak3Invoice), and make sure that
"Select locked cells" and "Select unlocked cells" is checked.

<hint> Please make sure you put in a ‘3' for the password.

5. Group the following worksheets (Qtr1, Qtr2, Qtr3, Qtr4).
Fill the contents AND formats for cell A1 across the worksheets.

While still grouped, AutoSum the Dept. Totals AND the Monthly Totals at the same time.

Lastly, fill the formatting from A2:E8 across the worksheets and auto adjust the column A width.

6. Ungroup the worksheets and on the Qtr1 worksheet only, and add the following data validations:

B3: D3
- Values need to be a decimal value less than or equal to 300,000

Add a Stop Error AlertTitle: Value Error

Error message: The value you entered was too high. Please check the value and re-enter. If you feel this value is correct, please contact your supervisor.

B6:D6 - Values need to be a whole number between 0 and 200,000Add an Input Message
Title: Enter Value
Input message: Please enter a value that is between 0 and 200,000. (Include the period)
Add a Warning
Error AlertTitle: Invalid Enter
Input message: The value you entered was too high. Are you sure the value is correct?

7. Change the value in cell D6 to 255,235. Accept the value as a correct entry.
Check to see if the values entered are correct. To do this, circle the invalid data.

8. In the Yearly Totals worksheet, create a 3D formula to calculate the totals for the yearChange the formatting to A
ccounting with 0 decimal places.

9. On the Stock Investments worksheet, pull in the current stock prices from finance.google.com.On the right side of the page, you will find the World markets section. Select that data to be imported into the worksheet.

Make sure you place it in the Stock Investments worksheet in cell A2.

10. Modify the connection you just made with the Connection name World_Markets.
Next make the connection update every 2 minutes and when the file opens.

Set the description to: World markets on finance.google.com

11. Download the Names.txt so import all of the customer names.
Import the text file.

Make sure you select that your data has headers, and that you want to start importing at row 2.

Select that you want to separate the data based on the
"Tab" AND "Space" delimitersPlace the data in cell B2 of the existing worksheet.

12. Use the CONCATENATE function to combine the first and last name with a space in-between.(Auto size the column to fit the largest name)

Use the flash fill to show ONLY the first initials for the first and last name.

13. In the properties, add the following:Title: Wake Workbooks
Tags: Invoice, Quarterly Totals, Investments
Add another author: Student

14. Save the workbook

15. Submit it to MyItLab

Reference no: EM131067059

Questions Cloud

Preceding summary for a plot : A cleric, who is also pursuing the carpenter's wife, climbs up to her window to woo her, the boarder farts in the cleric's face, and then the cleric burns the boarder's bottom with a red hot poker. Which of "The Canterbury Tales" has the preceding..
Anonymous middle english lyric poems begins : One of the most well known of the many anonymous Middle English lyric poems begins, "Sumer is icumen in" (or "Summer/Spring is a-coming in") and eventually remarks how the "bucke ferteth" (or the "buck farts").
How much of each ingredient will she need : how much of each ingredient will she need?
Name of the fourteenth-century welsh poet : What is the name of the fourteenth-century Welsh poet who wrote such passionate love poems as "Aubade", which, according to one translation, begins, "'O passing night, have pity', I said; / 'She is most lovely who shares my bed'. / But the brief n..
Calculate sales tax in cell e36 by multiplying the tax rate : On the Stock Investments worksheet, pull in the current stock prices from finance.google.com.On the right side of the page, you will find the World markets section. Select that data to be imported into the worksheet. Make sure you place it in the ..
Explain why the privatized social-services system : What purposes of control was Indiana's privatized social-services system created in the first place - how did the approach of IBM and ACS to bureaucratic control contribute to the col-lapse of the privatized system?
Life of arthur father uther pendragon : Who was the Welsh cleric who lived from ca. 1100 to 1155 and wrote "The Prophecies of Merlin", the poetic "Life of Merlin", and the "History of the Kings of Britain", which contains the earliest full account of King Arthur's life as well as some o..
Focus on disputes and issues that arise from areas of law : Assignment 3 then should focus on disputes and issues that arise from areas of law that are covered in this unit such cases that arise from laws such as tort, contract, consumer protection, business structures, company, property, intellectual prop..
Journalize the adjusting entry for uncollectible accounts : Refer to the Chart of Accounts for exact wording of account titles.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Generates alternative message that has hash value

Generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash."

  Explain two-bit system noninterference-secure

The initial state is not output (in contrast to the example). Is this version of two-bit system noninterference-secure with respect to Lucy? Why or why not?

  Security through obscurity in a computer situation

Give an example of security through obscurity in a computer situation. Give an example of security through obscurity in a situation not involving computers. Is security through obscurity an effective countermeasure in either example?

  How many bits is the encrypted message

Based on the understanding of Q4 of Bart B, use the generated keys of Q2 - Part C to encrypt the message of Q1 - Part C using the Simplified DES algorithm.

  What is the actual running environment of tool

What is the functionality of the tool and what is the actual running environment (software and hardware) of the tool?

  Stuxnet virus and choicepoint data breach

Select a research topic from the list below. After selecting your topic, research the incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from government and industry. Stuxnet virus and ChoiceP..

  Description of the kerberos authentication protocol

Give your general description of the Kerberos authentication protocol and explain the term: Authenticator used in the Kerberos authentication protocol.

  Defects of gsm networks

Security mechanism, threat, GSM networks, DDoS attacks, IPv4, IPv6, IPsec integrity, authentication and privacy, IPsec AH,  ‘single sign-on' in the context of access control, Secure Electronic Transaction (SET) protoco,  Encryption

  Users in your organization are concerned about performance

users in your organization are concerned about performance and network security. after a meeting with your

  Selecting a programming language to develop secure software

The personnel manager asks you to follow up with a short paper to her briefly going over the topics you discussed. She would like the document as a memo, highlighting the subject areas you thought worthy enough to bring to her attention during the di..

  For a typical network environment

For a typical network environment (that includes an Internet-facing Website, a human resources database and application, and development workstations that contain copyrighted material), describe some typical devices or assets and vulnerabilities that..

  Depending on the size of the organization you are asked to

depending on the size of the organization small medium large you are asked to assist in developing a security

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd