logo jpeg

July 20, 2012

In This Issue
2007 - 2010 Word Tips
Ask the Professor
Featured Web 2.0 Sites
Quick Links
__________________

 Combining Chart Types, Adding a Second Axis

From the Microsoft.com blog:

by Diego M. Oppenheimer , on June 21

 

It's often helpful to create charts that compare different types of data. For example, you might want to compare overall revenue with the number of units sold. To do that you need to know how to use different chart types in one chart and how to use a secondary vertical axis to plot values that are in a different value range. 

Excel spreadsheet Select Your Data Set

The first step in building a chart with more than one chart type is to actually set up a chart with just a single chart type. For this scenario, I want a chart with columns and lines, but I'll start with a regular column chart. (Note: It actually doesn't matter which chart type you start with, but if you're working with a multiple data sets, I'd pick the chart type which applies to the majority of your data - it'll mean less work for you later).

  1. Select the data that you would like to use for your chart.
     
  2. Go to the Insert tab, and then choose a type of column to insert. For the sake of this scenario, select one of the 2-D column types.

Selecting A Chart Type

 

Now we have a column chart with two data sets (Units Sold and Total Transactions), both charted using the same chart type.

Chart Tracking Two Different Data Sets

 

To follow the steps, please click the following link:

 

 

 Go to Microsoft.Com to learn this task 

 

 

 

 

 

 

 

Microsoft Windows Logo

PASSWORD
INTERNET ABUSES & HAZARDS
 
 

Beware of Stock Tip Robots

A new variation on bogus investment tip scams involves a so-called "robot" that is supposed to be able to predict share price movements.

 

Investors are lured into paying a regular subscription for such services on the promise that a sophisticated program can pinpoint great share-buying opportunities.

 

Of course, genuine advisers and even some investors do use computer programs to support their investment strategy but in the scam version, crooks either don't have the software or, if they do, it turns out to be useless.

 

Even worse, in a recent incident, two British brothers were alleged to have duped 75,000 American investors into subscribing to their robot service (nicknamed "Marl") that was also being used for a "pump and dump" scheme.

Not only were they charging a subscription for their non-existent robot but they also were allegedly accepting payments to promote particular stocks, pushing up prices (pumping) so the perpetrators could then sell (dump) their own holdings for a fat profit.

 

Federal regulators have recently filed a civil suit against the pair, claiming they took in $1.2 million in subscriptions over four years, and racked up a further $1.9 million from stock promoters.

 

Just remember, if a program could really make accurate predictions, why would we need advisers? Everyone would be making a fortune.

 

That's technically impossible! For every stock market winner, there has to be a loser.

 

Greetings!

 

 

Recently, after installation of a network system our clients commented to us that "we have delivered what we promised". This has not happened by accident.

 

For over 24 years we have worked very hard to establish a system that makes sure we always deliver what we promise. It is called Right Design, Right components and Right Support.

 

To start, our engineers make a thorough analysis of what is the client's current and future needs. Then we make sure it is explained to them in plain English and no "geek" speak. Alternatives are also analyzed and discussed with the clients.

 

As a result our detailed proposals are always itemized with individual pricing that lets the client pick and choose. The most important thing about any successful project, is the attention to the details during the installation plus after sale support. Now days because of the economy everyone is very cost conscience. So this important factor is considered before submitting any proposals.

 

We want to provide an affordable solution without compromising the quality. We stand 100% behind our solutions and strive for 100% customer satisfaction. The way we have achieved 100% satisfaction is to make sure there are no surprises such as mystery charges, additional parts, padded labors, etc.

 

Jamshid Javidi, President, CEO Computers

and

Cecile Bendavid, Newsletter Editor

 

Please call us with any questions.

  

 

 

 

 A few Smartphone Privacy Tips
from SafeGuard
for additional tips go to

1. Lock it up & don't lose it.
Keep your phone with you at all times.  Do not leave your phone on a table in a restaurant or in a shopping card, or on your desk unattended.  

In addition, be careful to whom you loan your cell phone.There is a new scam: Someone asks to borrow your phone to make a quick,
urgent call. You think they are tapping out a phone number, but they are actually installing a malicious application (app) that allows them complete remote access to the contents of the phone, even after they've handed it back to you. The entire process takes about 45 seconds.
 
In case you do lose your smartphone, make sure that you have a recent backup or sync of the phone's contents so that you don't lose
that as well.
 
2. Turn on password protection and the auto-lock feature.
 
Make sure that you set the auto-lock feature (the amount of inactive time before the passcode kicks in) to no more than 2 or 3 minutes.
 
3. Enable remote tracking & wiping capabilities.
Remote tracking allows you to physically track the location of the phone as long as the GPS (Global Positioning System) function is turned on and the phone is not powered down. If your phone disappears, you simply log on to the tracking software from your computer and locate the phone.
 
Remote wiping takes protection one step further.
If your phone goes missing, you can remotely
clear all of your data - including email, contacts, photos, videos, texts, and documents - off of the phone, immediately eliminating the risk posed by loss or theft. If your password is strong, you should have at least an hour to log in to your remote software and wipe the contents of the phone.
 
4. Utilize Password-Protection Software.
If you store passwords in an unencrypted file (i.e.,address book, spreadsheet or note-taking program), you are begging data thieves to break into all of your accounts, not just one. If you use the same password for multiple sites, you are
putting all of your valuable financial accounts at risk.
 
Download a reputable password-protection
app for your mobile phone. Password-protection software gives you the tools to manage and protect sensitive passwords, financial data, credit card numbers, online identities, software
licenses, etc., behind a single, secure password that you memorize.

5. Minimize unnecessary application spying.
Some of the most popular and legitimate apps are spying on you as well. They don't intend to steal from you, but they are collecting, aggregating and selling your private
information for a profit. After examining over
100 popular apps, the Wall Street Journal found
that 56 of them transmit the phone's unique
device ID to companies without the user's
knowledge.
 
There is no perfect solution to prevent malicious apps from infecting your smartphone. However, here are a series of suggestions to minimize your chances of installing an application that shares or steals your information.

 
* Never open email, text, video, photo, social networking or other unknown documents or attachments from untrusted sources.
 
* Never click on shortened links unless you are highly confident they are from a trusted source.
 
* Apps, even legitimate ones, often capture and transmit a variety of your personal information. If you are using smartphone apps, face it, your information is being transmitted. If you want to
understand the extent to which your information is being shared, read the privacy policy for that application.
 
* Get your apps from a trusted source; don't just install the latest fad. Stick with app stores that are monitored and written up in journals, and only download apps that have been out for more
than six months.
 
* Paid apps tend to transmit less personal data than free apps.
After all, the free apps have to make money somehow!
* If an app gives you the option to opt out of information sharing, ake it.
* When downloading applications, do your research first. Has the app been reviewed by a reputable source (Macworld, PC Magazine,
PC World, WSJ, NYT)? This doesn't guarantee security, but it does ower your chances of downloading malicious software.
* If an app requests permission to access your personal data (text messages, cell number, current location, etc.), make absolutely
certain you want to share that information before agreeing.
* If you no longer use an app, or are suspicious about it, remove it from your phone.

 

Ask the Professor - Cecile Bendavid

Professor of Computer Science - California State University Northridge and Director of New Business Development for CEO Computers. 
Cecile Bendavid 
We are happy to answer all your computer questions.  Just email cecile@ceocomputers.com

 

web 2.0 graphic

 




Try these sites and email us to let us know how you used them.  Send your comments to cecile@ceocomputers.com

 

_________________________________________

I hope you enoy reading the newsletter and will contribute to future issues. 

 

Sincerely,

 

Cecile Bendavid  

CEO Computers, Inc.