Demostrate the example of spreadsheet, Computer Engineering

Assignment Help:

Now consider the following spreadsheet:

Formula in cell D2 is = (B2/C2)

Replicating this formula (by highlighting then drag down to D7) gives all the formulas needed in cells D3 to D7

Formula in D8 (to find average) can be done in 3 ways:

= AVERAGE (C2:C7) or

            = SUM (C2:C7)/6 or

            = (C2+C3+C4+C5+C6+C7)/6

Formula in D9 to find out maximum value in column is = MAX (C2:C7)

-  Problems associated with spreadsheets:

- Capacity (that implies maximum number of columns and rows) can be limiting when dealing with large data sets

 - Security issues in some spreadsheets (it implies if you can open a spreadsheet you can also change any part of it; this can lead to fraud  

- lack of concurrency; generally only one person can work on a spreadsheet at any given time (databases are better in this aspect as they can usually be opened by more than one user at a time)  

- Due to their structure it's easy to enter an error (whether on purpose or by mistake) by entering data in the wrong cells or dependencies among cells incorrectly applied.

 

1918_spread sheet.png


Related Discussions:- Demostrate the example of spreadsheet

Fundamental building block of main memory, Q. Fundamental building block of...

Q. Fundamental building block of main memory? The fundamental building block of main memory remains DRAM chip as it has for decades. Till recently there had been no important c

Define local area network, LAN is a privately - owned computer networks con...

LAN is a privately - owned computer networks confined to small geographical area, like a factory or an office widely used to connect office PCs to share resources and information.

Udp, udp connection establishment and termintion

udp connection establishment and termintion

What are the features of the hardwired control, What are the features of th...

What are the features of the hardwired control? A controller that uses this approach can function at high speed. It has little flexibility and the complexity of the instruction

State in brief about the proxy server, State in brief about the proxy serve...

State in brief about the proxy server A proxy server also helps a lot since it hides the real IP addresses of users requesting resources outside the firewall. Finally, the

.image forgery detection, what is the code to detect image forgery using Ma...

what is the code to detect image forgery using Matlab..??

Vector processing, Vector Processing  A vector is an ordered set of the...

Vector Processing  A vector is an ordered set of the similar type of scalar data items. The scalar item can be a floating point number, a logical value or an integer. Vector pr

Vector-vector instructions-vector processing, Vector-Vector Instructions ...

Vector-Vector Instructions In this type, vector operands are fetched by the vector register and saved in another vector register. These instructions are indicated with the foll

Illustrate about fifth generation electronic computers, Fifth Generation (1...

Fifth Generation (1984-1990) The advancement of the next generation of computer systems is characterized majorly by the acceptance of parallel processing.  Until this time para

Sap system configuration, SAP system configuration includes It include...

SAP system configuration includes It includes :- a) Dialog tasks b) Update tasks.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd