• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Evalutation of a Spreadsheet

Extracts from this document...


Evaluation of a Spreadsheet Different techniques can be used to make the data on a spreadsheet easier to understand and interpret. This is very useful for the mobile phone shop manager because it will save them time and effort whilst interpreting the data that the mobile phones shop has produced. It is an important task for the manager to analyse the data because he or she will be able to get a general idea of how well the shop is doing. Spreadsheets can be useful for interpreting data because it is possible to use many different features which help aid the display of the data. These could be things such as charts, graphs, IF statements, minimum and maximum, and averages. When these are used it makes it much easier for the manager to analyse the data and it makes it easier to make decisions based on the information. One thing I did was produce a bar chart and a pie chart to show the data as a visual display. When I put this data into a chart or graph it effectively shows a bigger picture of the phone sales. The weekly sales bar chart shows the amount of phones that have been sold in the current week and by using the chart it makes it easier for the manager to see which phones sold the most and which sold the least. ...read more.


It is also very easy for paperwork to get untidy and over time it will begin to take up a lot of space. When using a computerised system it is much easier to keep documents and spreadsheets organised and structured appropriately in folders and directories. Because of this, it would also mean it is easy to find what you are looking for; rather than having to physically search through folders and paperwork. Also, making a copy of a spreadsheet manually would be very time consuming but when using a computerised system, you could immediately produce numerous copies. Another benefit you have with a computerised system is that charts and graphs are very easy to produce from the data. When using a manual system, it would be very difficult and time consuming to produce these. Also, with a computerised system colours can be used to highlight important areas of the spreadsheet to make certain areas stand out. Doing this with a manual system would be an impractical task and the colours could not be removed unlike on a computer. Strengths and weaknesses of a spreadsheet Strengths: * Security - password protection can be added to a spreadsheet to prevent unauthorised access. ...read more.


This is because it makes certain areas stand out opposed to using many different colours which would not highlight key areas or symbolise anything. Minimising the use of colours will mean the user should be able to know what the different colours indicate, and it should help them to get a clearer view of the spreadsheet. * Protect the formulas - this would be a good idea to do so that users at the mobile phone shop cannot change the formulas which would cause wrong results. * Use a password - this would be a good idea because it would mean only authorised users at the mobile phone shop would be allowed to access the spreadsheet. * Use an "IF statement" to show most and least popular phones - an IF statement could be used to highlight which phone has sold the most and which has sold the least in the current week. This could make it easier to decide which phones may need their price adjusting. * Use an "IF statement" to show the busiest day of the week - if this is done and the spreadsheet shows a regular pattern, doing this would help the mobile phone shop decide which days they might need more staff working. ?? ?? ?? ?? Paul Leverseidge Assignment 2 D1 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Programming Techniques

    After the source code has been translated the program is called the object code (or executable form). Translator The object code is normally much bigger than the source code because it takes lots of machine code commands for each of the high-level language commands.

  2. ICT Sample Work India Red

    Erroneous Data (if applicable) Title/ Must be Mr./Mrs. Mr/Mrs Mr (Extreme data not applicable) BLANK First Name/ Field Presence check Anas Anas (Extreme data not applicable) BLANK Surname/ Text length between 1 and 25 characters Patel P (1 char) BLANK E-mail/ Text length between 0 and 50 anaschilli9n@yahoo.co.uk BLANK anaschilli9n@yahoo.co.ukkkkkkkkkkkkkkkkkkkk (51 chars)

  1. Unit 6 - Advanced Spreadsheet Skills

    The range goes from small for �10, medium for �15, large for �20 and luxury for �25. All prices include UK delivery Lesco get a lower price which is small for �8, medium for �10, large for �14 and luxury for �19.

  2. Evaluation of a computerised system

    * Generate a record for product details entered into the database When details of an item are entered into a Products form and the 'Add new record' button is clicked, then a new record is generated for that data that has been input.

  1. Firewall Protection

    allow the saving site to read the text that it saved on your computer. This is called "web cookies" or sometimes simply "cookies". Cookies allow a web site to keep information that it saved some time when you entered it, to be read whenever you enter the site again.

  2. Smart Card System

    The "Java Cryptography Architecture" (JCA) refers to the framework for accessing and developing cryptographic functionality for the Java Platform. It encompasses the parts of the JDK 1.1 Java Security API related to cryptography (currently, nearly the entire API), as well as a set of conventions and specifications provided in this document.

  1. Flexible Architectures in Communication Security Application

    A similar trend can be seen for address aliases. All the algorithms (except RC4) only access memory to update intermediate vectors and read input data, as a result, all loads 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 3DES Mars RC4 Rijndael Twofish Alias Branch Issue Mem Res Window All Figure 5. Cipher Kernel Bottleneck Analysis.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    A spreadsheet is limited to storing data but it is possible to use powerful formula to analyse the data. A range of diagrams can be generated from data, including column and bar graphs, line, pie and scatter graphs. For my system there is however, no need for graphs.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work