Premium Essay

Network Communication

In:

Submitted By snatt01
Words 355
Pages 2
ANSWER 1 :
Macro Benefits
Macros offer many advantages to those who choose to use them. They reduce the possibility of human error that increases with many, repetitive keystrokes and tasks. Macros reduce the amount of time that must be spent performing basic computing tasks, freeing users up for more complex problem-solving and idea-generating activities. They also make complex computations easier to perform.

Using Macros
One of the benefits of macros is that they are easy to create, store and use. Macros record your keystrokes while you work. You can even assign a keyboard button to a macro so that common functions like formatting cells for text, adding formulas to spreadsheets, assigning rows to a target and formatting information into matched columns and rows.

Editing Macros
Making changes to a macro is as easy as setting one up. Macros aren't static. Once you record them, you can easily alter them to more effectively suit your needs. After you record a macro, you can view, change and correct errors in the code Microsoft wrote for it in Microsoft's Visual Basic Editor. Microsoft offers plenty of in-program help to guide beginners through the process of macro code editing. You'll quickly learn how to copy macros from one spreadsheet to another, share macros between workbooks with multiple users and much more. http://ask.brothersoft.com/what-are-the-advantages-of-excel-macros-197305.html
ANSWER 2: T he steps are follows :
1
Make sure you know how to perform each action you want and where to find all the menu options you need to select so you don't have to search for them while recording.
2
Find the macros menu and select the option to record a macro.
3
Name the macro.
4
Perform the actions you want the macro to perform automatically for you.
5
Stop recording.
6
Test the macro by using the keystrokes you assigned

Similar Documents

Premium Essay

Network and Communication

...UNIVERSITY SUBJECT: NETWORK AND COMMUNICATION Presentation Topic: Subnet Masking MBA IN E-GOVERNANCE - Programme III Prepared and Narrated by : KDU/MEG/03/11 – Theshantha Mukirigala Submission Date : 26 November 2015 Subnet Mask • An IP address has 2 parts: – The Network identification. – The Host identification. • Frequently, the Network & Host portions of the address need to be separately extracted. • In most cases, if you know the address class, it’s easy to separate the 2 portions. Subnet Mask (Cont.) • With the rapid growth of the internet & the ever-increasing demand for new addresses, the standard address class structure has been expanded by borrowing bits from the Host portion to allow for more Networks. • Under this addressing scheme, called Subnetting, separating the Network & Host requires a special process called Subnet Masking. Subnet Mask (Cont.) • The subnet masking process was developed to identify & extract the Network part of the address. • A subnet mask, which contains a binary bit pattern of ones & zeros, is applied to an address to determine whether the address is on the local Network. • If it is not, the process of routing it to an outside network begins. Subnet Mask (Cont.) • The function of a subnet mask is to determine whether an IP address exists on the local network or whether it must be routed outside the local network. • It is applied to a message’s destination address to extract the network address. •...

Words: 770 - Pages: 4

Premium Essay

Analysis of Communication Network

...BISE – RESEARCH PAPER Analysis of Informal Communication Networks – A Case Study It is becoming more and more important for knowledge workers to increase their productivity. However, there is a general lack of (semi-)automated, IT-supported data collection and evaluation approaches that allow insights into the processes and structures of an enterprise’s internal networks and the activities of its knowledge workers. The article presents a prototype of an IT-supported instrument (“Social Badges”) that supports automatic collection of informal, personal interaction between (knowledge) workers within an enterprise. The authors’ aim is to introduce a novel approach which improves data quality over legacy methods. The approach uses Social Network Analysis (SNA) to make it easier for executives to analyze and manage informal communications networks. Its practical applicability is demonstrated by a case study. DOI 10.1007/s12599-008-0018-z The Authors Dr. Kai Fischbach Prof. Dr. Detlef Schoder Seminar for Business Informatics and Information Management University of Cologne Pohligstr. 1 50969 Cologne Germany {fischbach | schoder}@ wim.uni-koeln.de 1 Introduction If the formal organization is the skeleton of a company, the informal is the central nervous system driving the collective thought processes, actions, and reactions of its business units. (Krackhardt and Hanson 1993, p. 104) Both the volume and importance of knowledge workers are growing as industrialized countries...

Words: 3796 - Pages: 16

Free Essay

Networks / Data Communications

...Version attached for better viewing and printing) Networks / Data Communications NTC 360 Lecture Week Three INTRODUCTION Now that we have covered most of the media types available for our networks Protocols that run over the top of the media and the standards they follow, the final topic here is choosing a design of a network by choosing media types and infrastructure that will best suit the needs of the business. INFRASTRUCTURE When to use hubs verses routers and switches is not always a clear-cut decision. In many cases the decision is made due to cost not necessarily best choice. For most office environments a hierarchical design with 10/100/1000 Mbps Ethernet hub/repeaters are adequate. However, there are times when high-speed transfer is worth the cost of installing switches. A good example may be in the motion picture industry where large full motion video clips are developed and edited on computer screens. Due to the size of these kinds of files and the critical nature of time in the industry full duplex switching in the LAN environment may be called for along with Gigabit Ethernet or higher = ). There is an old saying out there that was “route when you can, bridge if you must” This saying still holds true through time. However, switching has for the most part replaced most bridges today. Routing is the best means of isolating and reducing network traffic, which in the end equates to better network performance, however the speeds of the new switches...

Words: 3575 - Pages: 15

Premium Essay

Avaya Unified Communications: a Call Center Communication Network

...Running head: AVAYA UNIFIED COMMUNICATIONS Avaya Unified Communications: A Call Center Communication Network Effective Communication in a call center is vital for success. Yet today there are too many communication devices which seem to be adversely challenging and confusing to today’s employees. The need for electronic business and communication technologies are growing as call centers grow to keep up with competition, develop e-business, and to go global. Office phones, cell phones, lap tops, smart phones, text messing, instant messaging, voice mail, and email are some of the ways to communicate and to stay constantly connected. However, if all of these devices are not directly connected there could be a delay in response. Avaya Unified Communications simplifies interaction with employees and customers resulting in a decrease in the delay time and creating a Unified Business. A Unified Businesses is a business that has mastered today’s diverse communications technology. Improving business operations and processes with Avaya Unified Communications is beneficial to our business and increases productivity by improving the customer service experience. Avaya, Inc. has been privately own company since 2007. Kevin Kennedy, the President and CEO, Avaya Inc. stated that our purpose is “To keep business communications, and society, constantly moving forward, to be the Futuremakers of communications” (Avaya, 2009). Avaya Uniform Communication All Inclusive will enables...

Words: 1016 - Pages: 5

Premium Essay

Nt1310 Unit 3 Network Communication

...b. Network communication protocols 1) Protocols, or official standards, have been designed for networks in order to control the movement of data exchanged between components, what the content of data is composed of, and how communication starts and stops. 2) Two connection types (Transmission Control Protocol [TCP]/Internet Protocol [IP] connections and Common Industrial Protocol [CIP] connections) are layered over each other each time data is transferred. 3) The TCP connection is the first connection established. It is used for all Ethernet/IP communication and is required for all CIP connection use. A single TCP/IP connection supports multiple CIP connections. 4) CIP a) Established over TCP connections, Ethernet/IP CIP connections transfer...

Words: 785 - Pages: 4

Premium Essay

Security Issues and Procedures in Communication Networks

...PROCEDURES OF COMMUNICATION NETWORKS Student’s Name Institutional Affiliation Currently prompt evolution in computer communications linked to terminal-based, multi-operator systems, and in computer networks. Almost all these arrangements interconnect process, keep important data that is consider reserved or patented by their possessors and managers, or that should be protected from illegal access as a requisite of the law. Additionally, telecommunication systems, connected terminals, communication processors, and computers should be safeguarded from invaders who may strive to modify programs or files in the system, or to interrupt the facilities offered. The above threats are existent, as it is not challenging to interrupt communications in telecommunication systems, and the probability of connecting illegitimate terminals or computers into the scheme with the aim of “managing" the usual terminal-computer network, or making the system inaccessible to others. The security of such systems against the several dangers encompasses identification, and verification of the individuality, organized right to use to computers and their databases, and shelter of the information being carried in the telecommunication system. Related to every threat is various conceptual, along with technical challenges and a diversity of solutions. Local area network (LAN) refers to an assembly of PCs and other devices spread over a reasonably limited area and linked by a communications connection that...

Words: 3002 - Pages: 13

Premium Essay

Illustrate the Significance and Relevance of Communication Networks in Your Organization

...Illustrate the significance and relevance of communication networks in your organization By Sylvia Zvavamwe Communication maintains and sustains relationships in an organization regardless of the type of the organization. How people in an organization communicate with each other determines or shows how satisfied they are with each other’s work. An organizational communication address how information circulates among employees and this circulation of information occurs through formal and informal communication networks. According to Fielding (1993), networks are “the interconnecting lines of communication used to pass information from one person or one section to another”. Networks ensure that information in an organization does not flow randomly, but, follow set up channels. Formal communication network include vertical, lateral and diagonal communication whereas, informal communication includes grapevine and bypassing networks. This essay is going to illustrate the significance and relevance of these formal and informal communication networks at the University of Zimbabwe. Formal communication network is whereby communication follows the hierarchical structure of the organization or the chain of command (Richmond 2005). According to Evans (1984) formal communication is applied to those communications which are routed through what have been called ‘official channels’. These definitions imply that formal communication is observed through formal organizational structures...

Words: 1848 - Pages: 8

Premium Essay

Network and Communication

...Network and communication Network: A computer network is a collection of computers and hardware components interconnected by communication channels that allow sharing of resources and information Types of Network: Local Area Network(LAN) Metropolitan Area Network(MAN) Wide Area Network(WAN) LAN: When computers located within a small geographical area such as office or a University Campus are connected together we call it a Local Area Network. MAN: The geographical range of MAN is bigger than LAN. It covers a small city. WAN: Wide area network span broad geographical distances, ranging from several miles to across entire continents. WAN may consist of a combination of switched and dedicated Lines, microwaves, and satellite communication. Types of LAN Client-server: A client server LAN consists of the requesting microcomputers, called clients, and the supplying devices that provides the services, called servers. The server is a powerful computer that manages shared devices and software. Example file server, database server. Peer-to-peer: In a peer-to-peer LAN all microcomputers on the network communicate directly with one another without the help of a server. This is less expensive than a client-server LAN and works effectively with up to 25 computers and thus appropriate for small groups. Components of a LAN • LANs are made up of the following components: • Connection or cabling system • Microcomputers with interface cards ...

Words: 3635 - Pages: 15

Premium Essay

Nt1310 Unit 3 Assignment 3 Data Communication And Networks

...ASSIGNMENT # 03 (DATA COMMUNICATION AND NETWORKS) ANS 1: WIRESHARK:- As we all know well that networking and communication of computers happens worldwide in the terms of packets. Data divides into the packets like IP packets and then these packets travels over a network and then reaches its end point where packets then reassembled and the data or information is delivered to the destination. But there is a requirement of packet analyzers to analyze and captures the packet which reaches to the machine. Wireshark is the best open source packet analyzers available in market now a days. Wireshark is the best GUI based open source packet analyzer. Wireshark provides some following features: • It is available for windows and UNIX operating system. • It...

Words: 579 - Pages: 3

Free Essay

Tele Communication Network

...|Sandeep Kumar | | |[pic] | | |sandeep_sidhwani@yahoo.com | | | | | | | | |[pic] | | |+92 333 717 3723 (preferred) | | | | | | | | |[pic] ...

Words: 448 - Pages: 2

Free Essay

It System

...R17. What is the difference between a permanent address and a care-of address? Who assigns a care-of address? Answer: A permanent address is the home address and care of address is the given address of the device such as mobile. Permanent address is where mobile devices live. Care of address is given to the mobile device by the foreign agent when a device entire to another network area. Permanent address will get all the derive data and then the home agent forward data/messages onto the other network via the care of address. After that mobile device directly responds to the correspondent. R1. What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity? Can you have integrity without confidentiality? Justify your answer. Answer: Confidentiality is the property that the original plaintext message cannot be determined by an attacker who intercepts the cipher text-encryption of the original plaintext message. Message integrity is the property that the receiver can detect whether the message sent (whether encrypted or not) was altered in transit. The two are thus different concepts, and one can have one without the other. An encrypted message that is altered in transmit may still be confidential but will not have message integrity if the error is undetected. Similarly, a message that is altered in transit (and detected) could have been sent in plaintext and thus would not be confidential Message confidentiality...

Words: 528 - Pages: 3

Free Essay

Wlan

...Having a secure WLAN is very important, I would even go to say more important than a normal LAN. One way to secure a WLAN is to use encryption. This uses a key that will encrypt and decrypt data on the WLAN so only people what the key would be able to connect to the network. The encryption needs to be strong or a sniffer will crack the key so using a WPA2 would be best. Another way would be to simple change the SSID or ESSID. The reason this is a good way to secure a WLAN is because in most cases if you didn’t change the SSID a hack would think that you didn’t do anything to your network, making it easier to hack. “Though knowing the SSID does not allow anyone to break into your network, it usually indicates that the person hasn't taken any steps to protect their network, thus these networks are the most common targets” ("How to secure," 2007). The ramification of your WLAN being breached could be many things. The first thing I can think of is data theft and by that personal or secret information if someone can get on your WLAN. Also they could be trying to disrupt your network to cause damage or just want to ride on your wireless to gain access to the Internet. I think that stolen information would be the biggest threat. Reference: How to secure a wlan. (2007, February 15). Retrieved from...

Words: 254 - Pages: 2

Premium Essay

Compsec

...Source Address | Destination | Payload | Week 3 The Network Intrusion Detection Engine Network based IDS engines process a stream of time sequential TCP/IP packets to determine a sequence of patterns. Patterns are also known as signatures. Most network signatures are based on the contents of the packets (Packet Content Signature = Payload of a packet). Patterns are also detectable in the header and flow of the traffic, relieving the need for looking into packets. Operational Concept Two primary operational modes 1. Tip off - Look for something new, something not previously classified. 2. Surveillance - Look for patterns from "targets" Forensic work bench * Same tool as in surveillance * Monitor online transactions * track network growth - PCs; mobile devices * System services usage * Identify unexpected changes in the network Benefits of a Network IDS 1. Outsider Deterrence - Make life hard for the hackers 2. Detection - Deterministic; Stochastic 3. Automated Response and Notification - Notifications(email, SNMP, pager, onscreen, audible) Response: Reconfigure router/firewalls; Doing a counter attack is not smart; Lose the connection. Challenges for network based technologies 1. Packet reassembly - Broken packets might not be enough detection. Pattern broken into different packets. 2. High Speed Networks - Flooding and dropping of packets 3. Anti Sniff (Sniffer Detection) - Designed by hackers to detect IDS. Find...

Words: 360 - Pages: 2

Free Essay

Ntc411 Week 4 Vulnerabilities

...you will determine what areas of Riordan’s network and services are critical to their business operations and where they are specifically located at, and how better to protect them to ensure operationally ability in case of physical disaster’s such as. Physical Vulnerabilities * Weather * Environmental disaster – Earthquake, flood, tornado * Fire or other preventable disasters * Political instability in foreign countries * Satellite used for communication between China and San Jose, satellite could fail, be destroyed, or lose communication based on orbit and location Once these physical vulnerabilities have been assessed and determined Riordan can then start the process of providing a continuity plan in case of one of these situations arise. By identifying and planning for this emergency’s Riordan will be better prepared to handle these vulnerabilities and protect against them so to minimize their threat to continued communications. Another aspect of assessing Riordan’s vulnerabilities and weaknesses is to conduct a security assessment. “The network is examined from within by professionals, trained in the vulnerabilities exploited by network invaders.” (Oppenheimer, 2011, p. 13) This process would provide an exceptional technical vulnerabilities/weakness assessment. That Riordan could have, some examples of what they could find are. Technical Vulnerabilities * San Jose used as central location for network, to access other sites data must travel through...

Words: 422 - Pages: 2

Free Essay

Home Work 1 - Oppenheimer

...1. A network design customer has a goal of 99.80 percent uptime. How much downtime will be permitted in hours per week? How much downtime will be permitted in minutes per day and seconds per hour? Which values are acceptable in which circumstances? Ans: To compute the uptime/downtime is to take in concern merely the number of minutes before now passed for up-to-date month and existing year which is possibly what we need to find. A typical MTBF goal for a network that's extremely relied upon is 4000 hours. In different words, the network mustn't fail additional typically than once each 4000 hours or 166.67 days. A usual MTTR aim is one hour. In another sense the network failure ought to be fastened among one hour. I calculated downtime ratio by dividing occupied time into quantity of downtime. The summation of that number would be the ratio of downtime. Downtime for 99.8 percentile would be: Availability = MTBF / (MTBF + MTTR) SLA level of 99.8 % uptime/availability gives following periods of potential downtime/unavailability: * Daily: 2m 52.8s * Weekly: 20m 9.6s * Monthly: 1h 27m 39.5s 2. Assume you are in New York City in the United States and you are downloading a 100-KB web page from a server in Cape Town, South Africa. Assume that the bandwidth between the two cities is 1 Gbps. Which type of delay will be more significant, propagation delay or transmission delay? Defend your answer. Ans: Delay is pertinent for every data transmission expertise but...

Words: 1445 - Pages: 6