Quick Links
__________________ |
Information about Excel
Formulas are equations that perform calculations on values in your worksheet. A formula always starts with an equal sign (=).
You can create a simple formula by using constants and calculation operators. For example, the formula =5+2*3 multiplies two numbers and then adds a number to the result. Microsoft Office Excel follows the standard order of mathematical operations. In the preceding example, the multiplication operation (2*3) is performed first, and then 5 is added to its result.
You can also create a formula by using a function. For example, the formulas =SUM(A1:A2) and SUM(A1,A2) both use the SUM function to add the values in cells A1 and A2.
Depending on the type of formula that you create, a formula can contain any or all of the following parts.
-------------------------------------------------
Functions-- A function, such as PI(), starts with an equal sign (=). For many functions, such as SUM(), you can enter arguments within its parentheses. Each function has a specific argument syntax. Some arguments require exactly one argument, others require or allow several arguments (that is, some arguments might be optional), and some other functions allow no arguments at all - such as PI().
Cell references You can refer to data in worksheet cells by including cell references in the formula. For example, the cell reference A2 returns the value of that cell or uses that value in the calculation.
Constants You can also enter constants, such as numbers (such as 2) or text values, directly into a formula.
Operators Operators are the symbols that are used to specify the type of calculation that you want the formula to perform. For example, the ^ (caret) operator raises a number to a power, and the * (asterisk) operator multiplies numbers.
-------------------------------------------------
To achieve the calculation result that you want, you can use a single function, nested functions, or arrays that calculate single or multiple results.
--------------------------------------------------Create a simple formula by using constants and calculation operators
1.Click the cell in which you want to enter the formula.
2.Type = (equal sign).
3.To enter the formula, do one of the following:
Type the constants and operators that you want to use in the calculation.
Example formula
=5+2 (Adds 5 and 2)
=5-2 (Subtracts 2 from 5)
=5/2 (Divides 5 by 2)
=5*2 (Multiplies 5 times 2)
=5^2 (Raises 5 to the 2nd power)
Note: For the next few months there will be additional information about Excel
|
|

|

INTERNET ABUSES & HAZARDS
The growing ranks of Internet crooks are using new tricks called "phishing" and "spoofing" to steal your identity.
"Spoofing," or "phishing," frauds attempt to make Internet users believe that they are receiving e-mail from a specific, trusted source, or that they are securely connected to a trusted web site, when that is not the case.
Phishing (also known as "carding" or "brand-spoofing") is hacker-speak for "link alteration", -a "verification scam" where criminals (the "phishers") imitate legitimate companies in e-mails to entice people to share passwords or credit-card numbers.
For several years, individuals have bought Internet domain names that are similar to those of real, legitimate companies - for example: "change-ebay.com", where the real company website is "ebay.com".
The "phisher" (scammer) sends out millions of E-mail messages asking consumers to "verify account information" by providing key personal data -even SSN. This is the "phishing" (fishing) part -the bait (bogus email) is thrown out with the hope that, while most will ignore the bait, some "phish" (victims) will be tempted into biting.
When you get an email talking about an account you don't have, or from a company/vendor you don't use, you probably just ignore it as "junk mail". But, when customers of a real company get a cleverly-forged email, and presume it's from the legitimate company they do business with, they often respond.
The three most common ways the phisher hooks a phish (victim/consumer) is when-
- the victim responds, by return email, to a fraudulent "account verification" or "account update" request letter from the phisher.
- the victim fills out an email form (an HTML-based submission form, in the phisher's email message), which forwards the victim's input to the criminal's email/website address.
- the victim clicks on a website "link" in an email, that leads to the phisher's website, rather than the legitimate site.
When an unsuspecting phish (victm) receives a believeable looking (but actually fraudulent) e-mail, requesting him/her to "click here to update" their account information, they are redirected to a site that looks exactly like their ISP, auction site, online store, or other commercial site where they have an account. Most phishing (link-alteration) sites are so sophisticated that there's a significant chance that any consumer that makes it that far (In for a dime, in for a dollar!) will follow through, (unwittingly submitting their personal and/or credit information to the criminal) thinking it's a legitimate, routine transaction.
Recent "phishing expeditions" (scams) used the look-alike site names "ebay-verification.net", "change-ebay.com" and "http://ebayservices-cancelorder.cjb.net" -to scam eBay (ebay.com) customers. Similarly, a scam site with a URL starting with "paypalsys.com" was used to scam customers of PayPal (paypal.com). Companies that have been known to be victims of this scam include: AOL, MSN, Earthlink, Yahoo, PayPal, eBay, Best Buy, Discover Card, Bank of America, Providian, and even the IRS. __________________________
|
|
|
Greetings!
New technology for 2012 is an interesting topic - we hope you enjoy the introduction story and will look for future columns as 2012 progresses.
In our Microsoft column, for the next few months we will include information about using Excel We hope you will find this helpful.
Jamshid Javidi, President, CEO Computers
and
Cecile Bendavid, Newsletter Editor
Please call us with any questions. |
|
New Technology 2012
Internet Advances - Internet of Things
The Internet of Things (IoT) is a concept that describes how the Internet will expand as sensors and intelligence are added to physical items such as consumer devices or physical assets and these objects are connected to the Internet.
The vision and concept have existed for years, however, there has been an acceleration in the number and types of things that are being connected and in the technologies for identifying, sensing and communicating. These technologies are reaching critical mass and an economic tipping point over the next few years. Key elements of the IoT include:
Embedded sensors: Sensors that detect and communicate changes are being embedded, not just in mobile devices, but in an increasing number of places and objects.
Image Recognition: Image recognition technologies strive to identify objects, people, buildings, places logos, and anything else that has value to consumers and enterprises. Smartphones and tablets equipped with cameras have pushed this technology from mainly industrial applications to broad consumer and enterprise applications.
Near Field Communication (NFC) payment: NFC allows users to make payments by waving their mobile phone in front of a compatible reader. Once NFC is embedded in a critical mass of phones for payment, industries such as public transportation, airlines, retail and healthcare can explore other areas in which NFC technology can improve efficiency and customer service. |
|
Note: |
Ask the Professor - Cecile Bendavid | Professor of Computer Science - California State University Northridge and Director of New Business Development for CEO Computers.
Q. How do I avoid common errors when creating formulas
A, The following table summarizes some of the the most common errors that you can make when entering a formula and how to correct those errors:
Make sure that you... | More information |
---|
Match all open and close parentheses | Make sure that all parentheses are part of a matching pair. When you create a formula, Excel displays parentheses in color as they are entered. | Use a colon to indicate a range | When you refer to a range of cells, use a colon (:) to separate the reference to the first cell in the range and the reference to the last cell in the range. For example, A1:A5. | Enter all required arguments | Some functions have required arguments. Also, make sure that you have not entered too many arguments. | Nest no more than 64 functions | You can enter, or nest, no more than 64 levels of functions within a function. | Enclose other sheet names in single quotation marks | If the formula refers to values or cells on other worksheets or workbooks, and the name of the other workbook or worksheet contains a nonalphabetical character, you must enclose its name within single quotation marks ( ' ). | Include the path to external workbooks | Make sure that each external reference (external reference: A reference to a cell or range on a sheet in another Excel workbook, or a reference to a defined name in another workbook.) contains a workbook name and the path to the workbook. | Enter numbers without formatting |
Do not format numbers as you enter them in formulas. For example, even if the value that you want to enter is $1,000, enter 1000 in the formula.
Note: Information supplied by Microsoft |
|
|
Fuelly.com |
Fuelly - Track, Share, and Compare your Gas MileageBy recording and analyzing your mileage, you can see how much money you can save with small driving changes. You can also see how your mileage compares with EPA estimates and the mileage of other drivers using Fuelly. Tips and a discussion forum also offer ways to save.
TabSite - Add Tabs to your Facebook Fan Page - EasilyTabSite was developed as an easy way to create a website underneath a Facebook Tab called ''TabSite''. This is an easy-to-use solution to manage your content. There is no need for Static FBML when you use the TabSite editor.
TabSite - Add Tabs to your Facebook Fan Page - EasilyTabSite was developed as an easy way to create a website underneath a Facebook Tab called ''TabSite''. This is an easy-to-use solution to manage your content. There is no need for Static FBML when you use the TabSite editor.
|
Try these sites and email us to let us know how you used them. Send your comments to cecile@ceocomputers.com
|
 It's all about you, our clients! In these challenging times, we believe that any kind of exposure is helpful to your business. We have therefore decided to dedicate this portion of our newsletter to serve as a platform to help promote our clients. |
_________________________________________ I hope you enoy reading the newsletter and will contribute to future issues. Sincerely,
Cecile Bendavid
CEO Computers, Inc.
|
|
|