Computer Networking and Business consulting
Assignment Format - Format Requirements. Use the following format requirements on all submissions.
Margins 1” all sides
Paragraphs The entire document should be double-spaced on standard-sized paper (8.5" x 11")
Type Style and Size Times New Roman, 12 point
Software MS Word
Student/Assignment Information - The following information should be on the first page on the top left side of the page in the format provided below. Do not provide a cover sheet (unless the assignment requires one).
C10v Introduction to Computers
Assignment 8 Title: Business Consulting
Date of Submission
Directions: Be sure to make an electronic copy of your answer before submitting it to Ashworth College for grading. Unless otherwise stated, answer in complete sentences, and be sure to use correct English spelling and grammar. Sources must be cited in APA format. Your response should be four (4) pages in length; refer to the "Assignment Format" page for specific format requirements.
Remember Bill? He was the gentleman that you helped to start up his business in Lesson 4. Well his business is doing well, but he has come to you with some questions and concerns. You discuss each of these with Bill and promise to send him a written report with your suggestions and recommendations. Bill’s questions and concerns are as follows:
Bill has set up a spreadsheet in Excel that will help him keep track of expenses. Please see attachment to this order.
Tell Bill how to do the following tasks:
What formula or function does he put in Column F that will show the total expenses for each day?
What formula or function does he put in columns B through F in Row 13 that will give him the total expenses for the week in each category?
Bill wants the entry in Column G to remind him of expenses that require receipts for the accountant. Tell Bill what to put in Column G to do this:
Print the word “Yes” in any row where the total daily expenses are greater than or equal to $100.00.
If the daily expenses total is less than $100.00, leave the Column G entry for that row blank.
Bill’s business is already expanding. He thinks that in a few weeks he will need to hire one or two employees to help him. He knows that each new employee will need their own computer. He is also making the necessary changes so that the new employees will be working in a spare room in Bill’s house. Explain to Bill what networking options he has. Go through each type or configuration of network possible for him, making sure that you explain the pros and cons of each configuration. Finish with your suggestion for the network that he should set up and explain what new hardware will be required to do this.
With the possibility of three business computers in his home, and all of his business records possibly vulnerable, this would be a good time to advise Bill on how to set up a routine plan to protect and defend his new network. Provide a list of the five most important concerns for safety and security of the network and the computers in the network. For each concern, specify the action to be taken, and if applicable, what software you recommend be added to the system. Justify each of your recommendations.
Your proposal will be evaluated using the rubric below. Make sure you read the rubric and have a clear idea of what is expected. If there are any additional questions that you would have asked Bill be sure to note them as you explain to Bill what networking options he has so that you can explain what additional information could change your suggestion, if any.
Business Consulting: Computer Networking
For any person looking forward to opening a business, computer networking is an essential factor that can help in ensuring that his business is successful. This simply means for the successful running of an organization; there is a particular format computer need to be arranged to communicate with each other. Given that computer networking is meant to help business and individuals share data, it is essential to make it flexible. Also, it is necessary that after setting up computer networking in a business, you set up security measures to protect the system from making errors and even interruptions.
In excel calculation, there are various formulas that individuals can use to solve the problem in place. But before doing it is important to note that the column and row data can be manipulated as that will help you ensure the manipulation is made easier. According to the problem presented to me by Bill, the best formula to apply for this case is the sum formula. Different formulas are used in the excel calculation depending on text position (Cheusheva, 2018). For instance, to get calculate F faster and efficiently, they will need to apply the formula SUM (B5: E5). In the calculation of cell B13, the essential formula that can be used is SUM (B5:B11) which is appropriate. For effective manipulation of data in G5, the formula that should be applied should contain the IF function (Cheusheva, 2018). This is because the IF function formula is used in excel calculation most of the time to give the possible outcomes, more so when you want to show a particular comment. Thus, in cell G5, to get a significant answer, the best function that needs to be applied is IF (F5>100, Yes"). The application of the IF function formula in the cell will help in ensuring that the day that requires receipts will be automatically displayed. An individual in a business-like Bill needs to know how the formula is manipulated based on the position of the text, as that will help make an accurate and suitable calculation. Having accurate calculations in business is essential because it will help in avoiding unnecessary losses.
Computers in a network have various ways to be connected depending on various factors. For instance, computers can be connected to each other through many nodes. This type of computer connection is called mesh type because wires intersect with each to form a mesh. The advantage of this connection is that its setup is easy for the business individual. But on the other hand, the type of network topology is expensive to set up because of the numerous wires that are used during configuration. There are two types of mesh connections that include the partial and full mesh (Advantages and disadvantages, 2018). Each of the two types has a significant way it is connected; for example, in a partial mesh topology, one node is connected to two or more nodes. On the other hand, a full mesh is a connection where every node has a circuit connecting it to every other node in a network.
Another significant type of connection is Star typology, which involves a central computer in most instances. For this case, the central computer is referred to as a hub because all other computers in the network system are connected to it. It is the most preferred network arrangement because of its stability and effectiveness that any cause of any leakage at one point does not affect other computers. Although it is effective for business use, its connection is very expensive because of the many cables required for a network connection. Also, Bus typology is another essential form of network connection that uses the main cable to connect all other computers. For this case, the main cable is centrally located with other computers located along with it. The advantage of this topology is that it is cheaper to configure because less cables are required to enhance its connection (Advantages and disadvantages, 2018). But its disadvantage is that in case of error to the main computer the whole network will crash this case make it less efficient.
From the analysis of the different topology I have discussed, the most appropriate network configuration that Bill can use is indeed the star network connection. For Bill to enhance this connection in his business, he will need to have some hardware and common devices such as switches, cables, and hubs. The three devices are essential for the star typology because the hub is a central device to connect cables to allow the data to reach the computer. Given the advantage of this topology, I think it is the most appropriate method of connection for Bill to use.
But to ensure the network is stable throughout, there is a significant thing that needs to be put in place. For instance, I think it will be important to ensure that the antivirus programs are always updated within the computer so that to ensure possible viral attacks are dealt with. It is also essential to ensure that the employees are well trained on how to use the network as that will help ensure employees only access good sites that cannot spread the virus to other computers.
After ensuring that the computer networking is well connected, the company has the task to ensure that they are safe from the attack. Because in case of infection to the computer networking at long last it may corrupt the whole system thus bring it down. For this reason, it is important for Bill to put down strategies that are effective in ensuring his system is kept safe from the virus. For instance, the first thing Bill should have to ensure is safe is information because in case it falls into the hand of his competitors, they will use it to improve their businesses.
Also, the computer network faces the problem of security, which can make the system weak. The most common security errors that affect computer networking include DOS, which is most common in computer networking. But to solve this kind of problem, it is essential for Bill to constantly run his server as that will help reduce the problem related to DOS. Eavesdropping is also a common safety issue that always affects many organizations. This issue is most of the time related to spying on the organization by other firms to get vital information. The most significant way the organization can prevent the Eavesdropping crisis is to encrypt data so that the sender and receiver can only understand the data shared by the organization. Another dangerous threat to the company's computer networking that Bill will have to take care of is IP spoofing, which involves creating fake IP addresses (Honan, 2020). Given the effect of IP spoofing, the company needs to solve it earlier. Thus, the significant way to solve the issue is use of filter packets method. Therefore, for Bill to maintain the safety and security of his computer networking, he must remain strategical in dealing with every attack on his network connection.
Advantages and disadvantages, A. (2018, October 24). Advantages and disadvantages of different network topologies. Retrieved April 7, 2022, from https://techspirited.com/advantages-disadvantages-of-different-network-topologies
Cheusheva, S. (2018). Basic excel formulas & functions with examples. Retrieved April 7, 2022, from https://www.ablebits.com/office-addins-blog/2017/06/14/basic-excel-formulas-functions-examples
Honan, B. (2020, June 22). Computer security - threats & solutions. Retrieved April 7, 2022, from https://bhconsulting.ie/computer-security-threats-solutions
Tough Essay Due? Hire Tough Essay Writers!
We have subject matter experts ready 24/7 to tackle your specific tasks and deliver them ON TIME, ready to hand in. Our writers have advanced degrees, and they know exactly what’s required to get you the best possible grade.