Demostrate the example of spreadsheet, Computer Engineering

Assignment Help:

Now consider the following spreadsheet:

Formula in cell D2 is = (B2/C2)

Replicating this formula (by highlighting then drag down to D7) gives all the formulas needed in cells D3 to D7

Formula in D8 (to find average) can be done in 3 ways:

= AVERAGE (C2:C7) or

            = SUM (C2:C7)/6 or

            = (C2+C3+C4+C5+C6+C7)/6

Formula in D9 to find out maximum value in column is = MAX (C2:C7)

-  Problems associated with spreadsheets:

- Capacity (that implies maximum number of columns and rows) can be limiting when dealing with large data sets

 - Security issues in some spreadsheets (it implies if you can open a spreadsheet you can also change any part of it; this can lead to fraud  

- lack of concurrency; generally only one person can work on a spreadsheet at any given time (databases are better in this aspect as they can usually be opened by more than one user at a time)  

- Due to their structure it's easy to enter an error (whether on purpose or by mistake) by entering data in the wrong cells or dependencies among cells incorrectly applied.

 

1918_spread sheet.png


Related Discussions:- Demostrate the example of spreadsheet

What are the advantages of using xml over html, What are the advantages of ...

What are the advantages of using XML over HTML?  The root cause of the problem lies in HTML (Hyper Text Mark-up Language), the defacto standard for web publication. The main pr

Fuzzy logic - artificial intelligence, Fuzzy set theory provides a means fo...

Fuzzy set theory provides a means for modeling the kind of uncertainty associated with vagueness, with imprecision, and/or with a lack of information regarding a particular element

Proof by contradiction, Proof by Contradiction: Now for forward chaini...

Proof by Contradiction: Now for forward chaining and backward chaining both have drawbacks. But another approach is to think about proving theorems by contradiction. So we can

Network topology, According to the report, network 1 and network 2 are not ...

According to the report, network 1 and network 2 are not able to reach network 3. As shown on OTBNetwork Topology above, OTB Inc. has 2 routing protocols running due transition iss

Transport protocol you use to call a web service soap, What is the transpor...

What is the transport protocol you use to call a Web service SOAP? Http is preferred for Soap whereas tcp for binary i.e. HTTP is used in web services and tcp works well in rem

INTERRUPT METHOD, interrupt method in keypad operation coding using PIC16

interrupt method in keypad operation coding using PIC16

Illustrate basic strategy used in raid, Q. Illustrate Basic strategy used i...

Q. Illustrate Basic strategy used in RAID? Basic strategy used in RAID is to replace large capacity disk drive with multiple smaller capacity disks. Data on these disks is dist

State about the three-dimensional digitizers, State about the Three-dimensi...

State about the Three-dimensional digitizers Three-dimensional digitizers use sonic or electromagnetic transmissions to record positions. One electromagnet transmission method

Creating a new directory in dos, Q. Creating a New Directory in DOS? Yo...

Q. Creating a New Directory in DOS? You can create any directory under any directory in the hard disk or floppy disk. The command to create a new directory is MKDIR or MD. To c

Basic elements of assembly language, Basic elements of  Assembly language:...

Basic elements of  Assembly language: Any Assembly language which consists 3 types of instruction statements that are used to define the program operations: Data secti

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd