Thursday, April 14, 2016

Outlook Shortcurts

Outlook Shortcuts

  • Ctrl+R: reply to email
  • Alt+R: reply to all in email or switch to the work week calendar view
  • Alt+W: forward email or switch to the weekly calendar view
  • Ctrl+M: F9 to Send/Receive all
  • Alt+S: Send email
  • Ctrl+G: open the "Go to date" dialog to jump to any date in the calendar

Saturday, March 12, 2016

Create great gallery design for your website quickly using Visual Light Box

Need to create gallery for your website but can't write complex JQuery Code ?
 No Worry, i will tell an easy way to do this. Here i am giving some simple steps where you can easily create beautiful gallery.

Step 1: Download the following software, it is completely free.
            download here Downlaod Here
Step 2: Open the the software and click on images and click "Add images..." to add images which                    you want to use in gallery.

             If you have included the images that you do not wish to be in the website photo album, you                  can easily remove them. Select all images that you wish to remove from web site album, and              select Delete images.. from the Images menu. You can pick and choose pictures by holding                  the CTRL while clicking the pictures you like.
         
Step 3: When you select an image you'll see the various information about it, such as:

Caption - you can enter any comment or text about the image in the website photo gallery. When you add images from Flickr its name will appear in caption automatically. You're able to use some common html tags (such as: <b>, <i>, <u>, <span>, <a>, <img> and so on..) inside your caption to highlight some text or add links.

Step 4: If image are ok, then you can click on publish and click on "General",            
           "Thumbnails","Templates" and "publish" set the parameters as per your need then select your               location file(.html) where you want to display your gallery.
         
        
           now see your page  and you are done.

But one problem this software leaves marks on the images, No worry try the following:
 1. Go to "gallary_files\vlb_images" in your project and remove name using paint.
 2. If not removed goto "gallary_files\vlb_engine" and replace the link with yours one.

Enjoy........


  

[Solved:] Chrome Tab Closes on Click

Chrome tab closes when i click on it:

I really tucked when it happened with me. I googled it but i didn't find exact solution. Then i analysed and found that it is the only problem with the chrome. I was not able to open settings too without "alt+f".
After wasting some time i finally found the solution which is here "it was due to scroll click". Just click on the scroll button and your problem will be solved....Enjoy.

How to import Excel data to MySql Table

How to import Excel data to MySql Table in simple 3 steps

Step 1: Save your excel sheet as a CSV by using “Save As”


Step 2: Delete the header if you have in the CSV file
Step 3: Open PhpMyAdmin and click on the table you want to insert to. Then click import and choose CSV file. Check the file and set  “Format Specific Action”  in the import page like your columns are separated by comma(‘) and click go.


Now you are done Enjoy!!!


Wednesday, March 9, 2016

Networking Devices

HUB

Networks using a Star topology require a central point for the devices to connect. Originally this device was called a concentrator since it consolidated the cable runs from all network devices. The basic form of concentrator is the hub.

As shown in Figure; the hub is a hardware device that contains multiple, independent ports that match the cable type of the network. Most common hubs interconnect Category 3 or 5 twisted-pair cable with RJ-45 ends, although Coax BNC and Fiber Optic BNC hubs also exist. The hub is considered the least common denominator in device concentrators. Hubs offer an inexpensive option for transporting data between devices, but hubs don't offer any form of intelligence. Hubs can be active or passive.
An active hub strengthens and regenerates the incoming signals before sending the data on to its destination.
Passive hubs do nothing with the signal.

Ethernet Hubs

An Ethernet hub is also called a multiport repeater. A repeater is a device that amplifies a signal as it passes through it, to counteract the effects of attenuation. If, for example, you have a thin Ethernet network with a cable segment longer than the prescribed maximum of 185 meters, you can install a repeater at some point in the segment to strengthen the signals and increase the maximum segment length. This type of repeater only has two BNC connectors, and is rarely seen these days.
 
8 Port mini Ethernet Hub
The hubs used on UTP Ethernet networks are repeaters as well, but they can have many RJ45 ports instead of just two BNC connectors. When data enters the hub through any of its ports, the hub amplifies the signal and transmits it out through all of the other ports. This enables a star network to have a shared medium, even though each computer has its own separate cable. The hub relays every packet transmitted by any computer on the network to all of the other computers, and also amplifies the signals.
The maximum segment length for a UTP cable on an Ethernet network is 100 meters. A segment is defined as the distance between two communicating computers. However, because the hub also functions as a repeater, each of the cables connecting a computer to a hub port can be up to 100 meters long, allowing a segment length of up to 200 meters when one hub is inserted in the network.

Multistation Access Unit


A Multistation Access Unit (MAU) is a special type of hub used for token ring networks. The word "hub" is used most often in relation to Ethernet networks, and MAU only refers to token ring networks. On the outside, the MAU looks like a hub. It connects to multiple network devices, each with a separate cable.
Unlike a hub that uses a logical bus topology over a physical star, the MAU uses a logical ring topology over a physical star.

When the MAU detects a problem with a connection, the ring will beacon. Because it uses a physical star topology, the MAU can easily detect which port the problem exists on and close the port, or "wrap" it. The MAU does actively regenerate signals as it transmits data around the ring.

Switches

Switches are a special type of hub that offers an additional layer of intelligence to basic, physical-layer repeater hubs. A switch must be able to read the MAC address of each frame it receives. This information allows switches to repeat incoming data frames only to the computer or computers to which a frame is addressed. This speeds up the network and reduces congestion.

Switches operate at both the physical layer and the data link layer of the OSI Model.
Bridges
A bridge is used to join two network segments together, it allows computers on either segment to access resources on the other. They can also be used to divide large networks into smaller segments. Bridges have all the features of repeaters, but can have more nodes, and since the network is divided, there is fewer computers competing for resources on each segment thus improving network performance.

Bridges can also connect networks that run at different speeds, different topologies, or different protocols. But they cannot, join an Ethernet segment with a Token Ring segment, because these use different networking standards. Bridges operate at both the Physical Layer and the MAC sublayer of the Data Link layer. Bridges read the MAC header of each frame to determine on which side of the bridge the destination device is located, the bridge then repeats the transmission to the segment where the device is located.

Routers
Routers Are networking devices used to extend or segment networks by forwarding packets from one logical network to another. Routers are most often used in large internetworks that use the TCP/IP protocol suite and for connecting TCP/IP hosts and local area networks (LANs) to the Internet using dedicated leased lines.

Routers work at the network layer (layer 3) of the Open Systems Interconnection (OSI) reference model for networking to move packets between networks using their logical addresses (which, in the case of TCP/IP, are the IP addresses of destination hosts on the network). Because routers operate at a higher OSI level than bridges do, they have better packet-routing and filtering capabilities and greater processing power, which results in routers costing more than bridges.

Routing tables
Routers contain internal tables of information called routing tables that keep track of all known network addresses and possible paths throughout the internetwork, along with cost of reaching each network. Routers route packets based on the available paths and their costs, thus taking advantage of redundant paths that can exist in a mesh topology network.
Because routers use destination network addresses of packets, they work only if the configured network protocol is a routable protocol such as TCP/IP or IPX/SPX. This is different from bridges, which are protocol independent. The routing tables are the heart of a router; without them, there's no way for the router to know where to send the packets it receives.
Unlike bridges and switches, routers cannot compile routing tables from the information in the data packets they process. This is because the routing table contains more detailed information than is found in a data packet, and also because the router needs the information in the table to process the first packets it receives after being activated. A router can't forward a packet to all possible destinations in the way that a bridge can.
·         Static routers: These must have their routing tables configured manually with all network addresses and paths in the internetwork.
·         Dynamic routers: These automatically create their routing tables by listening to network traffic.
·         Routing tables are the means by which a router selects the fastest or nearest path to the next "hop" on the way to a data packet's final destination. This process is done through the use of routing metrics.
·         Routing metrics which are the means of determining how much distance or time a packet will require to reach the final destination. Routing metrics are provided in different forms.
·         hop is simply a router that the packet must travel through.
·         Ticks measure the time it takes to traverse a link. Each tick is 1/18 of a second. When the router selects a route based on tick and hop metrics, it chooses the one with the lowest number of ticks first.
You can use routers, to segment a large network, and to connect local area segments to a single network backbone that uses a different physical layer and data link layer standard. They can also be used to connect LAN's to a WAN's.
Brouters
Brouters are a combination of router and bridge. This is a special type of equipment used for networks that can be either bridged or routed, based on the protocols being forwarded. Brouters are complex, fairly expensive pieces of equipment and as such are rarely used.

A Brouter transmits two types of traffic at the exact same time: bridged traffic and routed traffic. For bridged traffic, the Brouter handles the traffic the same way a bridge or switch would, forwarding data based on the physical address of the packet. This makes the bridged traffic fairly fast, but slower than if it were sent directly through a bridge because the Brouter has to determine whether the data packet should be bridged or routed.
Gateways
A gateway is a device used to connect networks using different protocols. Gateways operate at the network layer of the OSI model. In order to communicate with a host on another network, an IP host must be configured with a route to the destination network. If a configuration route is not found, the host uses the gateway (default IP router) to transmit the traffic to the destination host. The default t gateway is where the IP sends packets that are destined for remote networks. If no default gateway is specified, communication is limited to the local network. Gateways receive data from a network using one type of protocol stack, removes that protocol stack and repackages it with the protocol stack that the other network can use.
Examples
·         E-mail gateways-for example, a gateway that receives Simple Mail Transfer Protocol (SMTP) e-mail, translates it into a standard X.400 format, and forwards it to its destination
·         Gateway Service for NetWare (GSNW), which enables a machine running Microsoft Windows NT Server or Windows Server to be a gateway for Windows clients so that they can access file and print resources on a NetWare server
·         Gateways between a Systems Network Architecture (SNA) host and computers on a TCP/IP network, such as the one provided by Microsoft SNA Server
·         A packet assembler/disassembler (PAD) that provides connectivity between a local area network (LAN) and an X.25 packet-switching network
CSU / DSU (Channel Service Unit / Data Service Unit)
A CSU/DSU is a device that combines the functionality of a channel service unit (CSU) and a data service unit (DSU). These devices are used to connect a LAN to a WAN, and they take care of all the translation required to convert a data stream between these two methods of communication.

A DSU provides all the handshaking and error correction required to maintain a connection across a wide area link, similar to a modem. The DSU will accept a serial data stream from a device on the LAN and translate this into a useable data stream for the digital WAN network. It will also take care of converting any inbound data streams from the WAN back to a serial communication.
A CSU is similar to a DSU except it does not have the ability to provide handshaking or error correction. It is strictly an interface between the LAN and the WAN and relies on some other device to provide handshaking and error correction.
NICs (Network Interface Card)
Network Interface Card, or NIC is a hardware card installed in a computer so it can communicate on a network. The network adapter provides one or more ports for the network cable to connect to, and it transmits and receives data onto the network cable.
Wireless Lan card

Every networked computer must also have a network adapter driver, which controls the network adapter. Each network adapter driver is configured to run with a certain type of network adapter.
Network card

Network Interface Adapter Functions 
Network interface adapters perform a variety of functions that are crucial to getting data to and from the computer over the network.
These functions are as follows:
Data encapsulation
The network interface adapter and its driver are responsible for building the frame around the data generated by the network layer protocol, in preparation for transmission. The network interface adapter also reads the contents of incoming frames and passes the data to the appropriate network layer protocol.
Signal encoding and decoding
The network interface adapter implements the physical layer encoding scheme that converts the binary data generated by the network layer-now encapsulated in the frame-into electrical voltages, light pulses, or whatever other signal type the network medium uses, and converts received signals to binary data for use by the network layer.
transmission and reception
The primary function of the network interface adapter is to generate and transmit signals of the appropriate type over the network and to receive incoming signals. The nature of the signals depends on the network medium and the data-link layer protocol. On a typical LAN, every computer receives all of the packets transmitted over the network, and the network interface adapter examines the destination address in each packet, to see if it is intended for that computer. If so, the network interface adapter passes the packet to the computer for processing by the next layer in the protocol stack; if not, the network interface adapter discards the packet.
Data buffering 
Network interface adapters transmit and receive data one frame at a time, so they have built-in buffers that enable them to store data arriving either from the computer or from the network until a frame is complete and ready for processing.
Serial/parallel conversion
The communication between the computer and the network interface adapter runs in parallel, that is, either 16 or 32 bits at a time, depending on the bus the adapter uses. Network communications, however, are serial (running one bit at a time), so the network interface adapter is responsible for performing the conversion between the two types of transmissions.
Media access control
The network interface adapter also implements the MAC mechanism that the data-link layer protocol uses to regulate access to the network medium. The nature of the MAC mechanism depends on the protocol used.
Network protocols
A networked computer must also have one or more protocol drivers (sometimes called a transport protocol or just a protocol). The protocol driver works between the upper-level network software and the network adapter to package data to be sent on the network.
In most cases, for two computers to communicate on a network, they must use identical protocols. Sometimes, a computer is configured to use multiple protocols. In this case, two computers need only one protocol in common to communicate. For example, a computer running File and Printer Sharing for Microsoft Networks that uses both NetBEUI and TCP/IP can communicate with computers using only NetBEUI or TCP/IP.
ISDN (Integrated Services Digital Network) adapters
Integrated Services Digital Network adapters can be used to send voice, data, audio, or video over standard telephone cabling. ISDN adapters must be connected directly to a digital telephone network. ISDN adapters are not actually modems, since they neither modulate nor demodulate the digital ISDN signal.
Like standard modems, ISDN adapters are available both as internal devices that connect directly to a computer's expansion bus and as external devices that connect to one of a computer's serial or parallel ports. ISDN can provide data throughput rates from 56 Kbps to 1.544 Mbps (using a T1 carrier service).

ISDN hardware requires a NT (network termination) device, which converts network data signals into the signaling protocols used by ISDN. Some times, the NT interface is included, or integrated, with ISDN adapters and ISDN-compatible routers. In other cases, an NT device separate from the adapter or router must be implemented. ISDN works at the physical, data link, network, and transport layers of the OSI Model.
WAPs (Wireless Access Point)
A wireless network adapter card with a transceiver sometimes called an access point, broadcasts and receives signals to and from the surrounding computers and passes back and forth between the wireless computers and the cabled network.

Access points act as wireless hubs to link multiple wireless NICs into a single subnet. Access points also have at least one fixed Ethernet port to allow the wireless network to be bridged to a traditional wired Ethernet network.
Modems
A modem is a device that makes it possible for computers to communicate over telephone lines. The word modem comes from Modulate and Demodulate. Because standard telephone lines use analog signals, and computers digital signals, a sending modem must modulate its digital signals into analog signals. The computers modem on the receiving end must then demodulate the analog signals into digital signals.

Modems can be external, connected to the computers serial port by an RS-232 cable or internal in one of the computers expansion slots. Modems connect to the phone line using standard telephone RJ-11 connectors.
Transceivers (media converters)
Transceiver short for transmitter-receiver, a device that both transmits and receives analog or digital signals. The term is used most frequently to describe the component in local-area networks (LANs) that actually applies signals onto the network wire and detects signals passing through the wire. For many LANs, the transceiver is built into the network interface card (NIC). Some types of networks, however, require an external transceiver.

In Ethernet networks, a transceiver is also called a Medium Access Unit (MAU). Media converters interconnect different cable types twisted pair, fiber, and Thin or thick coax, within an existing network. They are often used to connect newer 100-Mbps, Gigabit Ethernet, or ATM equipment to existing networks, which are generally 10BASE-T, 100BASE-T, or a mixture of both. They can also be used in pairs to insert a fiber segment into copper networks to increase cabling distances and enhance immunity to electromagnetic interference (EMI).
Firewalls
In computing, a firewall is a piece of hardware and/or software which functions in a networked environment to prevent some communications forbidden by the security policy, analogous to the function of firewalls in building construction.

A firewall has the basic task of controlling traffic between different zones of trust. Typical zones of trust include the Internet (a zone with no trust) and an internal network (a zone with high trust). The ultimate goal is to provide controlled connectivity between zones of differing trust levels through the enforcement of a security policy and connectivity model based on the least privilege principle.
There are three basic types of firewalls depending on:
·         whether the communication is being done between a single node and the network, or between two or more networks
·         whether the communication is intercepted at the network layer, or at the application layer
·         whether the communication state is being tracked at the firewall or not
With regard to the scope of filtered communication these firewalls are exist:
·         Personal firewalls, a software application which normally filters traffic entering or leaving a single computer through the Internet.
·         Network firewalls, normally running on a dedicated network device or computer positioned on the boundary of two or more networks or DMZs (demilitarized zones). Such a firewall filters all traffic entering or leaving the connected networks.
In reference to the layers where the traffic can be intercepted, three main categories of firewalls exist:
·         network layer firewalls An example would be iptables.
·         application layer firewalls An example would be TCP Wrapper.
·         application firewalls An example would be restricting ftp services through /etc/ftpaccess file
These network-layer and application-layer types of firewall may overlap, even though the personal firewall does not serve a network; indeed, single systems have implemented both together.
There's also the notion of application firewalls which are sometimes used during wide area network (WAN) networking on the world-wide web and govern the system software. An extended description would place them lower than application layer firewalls, indeed at the Operating System layer, and could alternately be called operating system firewalls.
Lastly, depending on whether the firewalls track packet states, two additional categories of firewalls exist:
·         stateful firewalls
·         stateless firewalls
Network layer firewalls
Network layer firewalls operate at a (relatively low) level of the TCP/IP protocol stack as IP-packet filters, not allowing packets to pass through the firewall unless they match the rules. The firewall administrator may define the rules; or default built-in rules may apply (as in some inflexible firewall systems).
A more permissive setup could allow any packet to pass the filter as long as it does not match one or more "negative-rules", or "deny rules". Today network firewalls are built into most computer operating system and network appliances.
Modern firewalls can filter traffic based on many packet attributes like source IP address, source port, destination IP address or port, destination service like WWW or FTP. They can filter based on protocols, TTL values, netblock of originator, domain name of the source, and many other attributes.
Application-layer firewalls
Application-layer firewalls work on the application level of the TCP/IP stack (i.e., all browser traffic, or all telnet or ftp traffic), and may intercept all packets traveling to or from an application. They block other packets (usually dropping them without acknowledgement to the sender). In principle, application firewalls can prevent all unwanted outside traffic from reaching protected machines.
By inspecting all packets for improper content, firewalls can even prevent the spread of the likes of viruses. In practice, however, this becomes so complex and so difficult to attempt (given the variety of applications and the diversity of content each may allow in its packet traffic) that comprehensive firewall design does not generally attempt this approach.
Proxies
A proxy device (running either on dedicated hardware or as software on a general-purpose machine) may act as a firewall by responding to input packets (connection requests, for example) in the manner of an application, whilst blocking other packets.

Proxies make tampering with an internal system from the external network more difficult, and misuse of one internal system would not necessarily cause a security breach exploitable from outside the firewall (as long as the application proxy remains intact and properly configured). Conversely, intruders may hijack a publicly-reachable system and use it as a proxy for their own purposes; the proxy then masquerades as that system to other internal machines. While use of internal address spaces enhances security, crackers may still employ methods such as IP spoofing to attempt to pass packets to a target network.


Monday, March 7, 2016

Microsoft Excel 2007: Advanced Topics


1.     Importing

a.      What is it?
Opening a file that was saved as another file format other than Excel, such as in a database (.mdbx) or text file (.txt). Typically the data will be delimited In Excel, you can format the data or use it in calculations as you would any other data
b.      Create a file that Excel can import
                                                              i.      Open the application, Adobe Reader
1.      On the Menu Toolbar click, File > Open
2.      Choose a file to open
a.      Starting from the Desktop, open the Course folder, look inside the Excel III folder, and finally open history_101.pdf
3.      Convert the .pdf file to a file format Excel will recognize
4.      On the Menu Toolbar click, File > Save as Text
5.      Save the file as history_101.txt on the desktop
6.      Close Adobe Reader
c.       Open Excel and import the data
                                                              i.      Select the file to Import
1.      Select the Office button > Open
2.      In the Open window, to the right of the Files of type:, choose All Files (*.*) from the drop down list
3.      At the top of the window, to the right of Look In:, select desktop
4.      From the list of files available select and open, history_101.txt
                                                            ii.      Setup the Import Wizard
1.      In the new Import Wizard window, under Original data type, select Delimited
2.      Click Next
3.      In the Step 2 window, under Delimiters, only check Space
4.      Click Next
5.      In the Step 3 window, under Column data format, select General
6.      Click Finish
7.      Note: the data imported contains no formulas or functions and any cell formatting is now General
                                                          iii.      Class Challenge
1.      Change the column headers to match the data below
2.      Adjust the headers to match the data
                                                           iv.      Delete row 7
1.      It is no longer setup to run functions or formulas
d.      Save the Excel file
                                                              i.      Select the Office button > choose Save As > Excel Workbook
                                                            ii.      Save on the desktop
                                                          iii.      Name the file history_101.xlsx

2.     AutoFilter

a.      What is it?
Filtered data displays only the rows that meet criteria (criteria: Conditions you specify to limit which records are included in the result set of a query or filter.) that you specify and hides rows that you do not want displayed. After you filter data, you can copy, find, edit, format, chart, and print the subset of filtered data without rearranging or moving it
b.      Apply AutoFilter
                                                              i.      Select cells A2 through J2
                                                            ii.      On the Ribbon, select Home tab, in the Editing group, select Sort & Filter, in the menu select Filter
                                                          iii.      The row of cells previously selected should now have drop down arrows
c.       View records by criteria
                                                              i.      Movie your mouse pointer to the Pass/Fail column header and select the down arrow
                                                            ii.      In the new window, uncheck the value Fail (this is the value of the records you do not want to view)
                                                          iii.      Click OK
                                                           iv.      You should now only see the students who passed the class
                                                             v.      Potentially you could continue to narrow the field of records viewed by deselecting criteria from other headings
d.      To “Clear” the criteria you set for one or more columns
                                                              i.      Select cells A2 through J2
                                                            ii.      On the Ribbon, select Home tab, in the Editing group, select Sort & Filter, in the menu select Clear
e.      Remove AutoFilter
                                                              i.      Select cells A2 through J2
                                                            ii.      On the Ribbon, select Home tab, in the Editing group, select Sort & Filter, in the menu select Filter
                                                          iii.      The row of cells previously using AutoFilter should no longer have drop down arrows

3.     Tables

a.      What are they?
A table is made of columns and rows. Where they intersect a cell is created. When you create a table in Excel, you can manage and analyze the data in that table independently of data outside of the table. For example, you can filter table columns, add a row for totals, apply table formatting, and Apply a style to a word, line, or paragraph
b.      Insert a table
                                                              i.      Select the cell range from A2 to J6
                                                            ii.      On the Ribbon, select the Insert tab > in the Tables group > click Table
                                                          iii.      In the new window under Where is the data for your table? Make sure the range is the same as the one you selected
                                                           iv.      Check the box to the right of My table has headers
                                                             v.      Click OK
c.       Table design
                                                              i.      The Design tab is now showing on the Ribbon and it gives you similar choices as we have seen before with styles, options, and properties
d.      Filtering
                                                              i.      You now have the exact same filtering and sorting options as you once did using AutoFilter
                                                            ii.      Try using one
e.      Table expansion
                                                              i.      One of the great options with using a table format is that you can expand the table
1.      Move your mouse pointer to the bottom right corner of the table and use the Fill Handle to click and drag to the right and down
2.      Notice how the added cells change their look and feel to match the table?

4.     Proofing

a.      What is this?
Checking a document for spelling and grammar mistakes. Excel provides tools that can help you correct these mistakes. Excel also gives you the opportunity to research words, use a thesaurus, and it will translate languages!
b.      Spell check
                                                              i.      Create a misspelling
1.      In the Grade Sheet worksheet, in cell A1, change History to Hostory
2.      Tap the Enter key
                                                            ii.      Correct the misspelling
1.      On the Ribbon > in the Review section > select the Proofing tab > click Spelling
2.      In the window that asks, “Do you want to continue...” click the Yes button
3.      In the Spelling window
a.      Select History under Suggestions:
b.      Click on Change button to the right
c.       You should now see, “The spelling check is complete for the entire sheet”
                                                                                                                                      i.      If not, then change or ignore the other words that Excel believes you misspelled
c.       Research, Thesaurus, and translate
                                                              i.      Research
Reference material such as dictionaries and encyclopedias
                                                            ii.      Thesaurus
Find synonyms
                                                          iii.      Translate
Language translation when working with multilingual files

5.     Create a chart

Charts and graphs are visual representations of the data. Excel supports many kinds of charts and graphs to help you display data in ways that are meaningful to your audience
b.      Create a column chart
Used to compare values across categories
                                                              i.      Select the student’s Pass/Fail data range – cells A2 to E6
                                                            ii.      On the Ribbon, select the Insert tab > in the Charts group > click Column (down arrow) > under 2-D Pie click Clustered Column
c.       Elements of the chart
                                                              i.      A chart is one object made up of smaller objects
                                                            ii.      When you hover your mouse pointer inside any part of the chart a box will appear indicating the location or object
                                                          iii.      You can select any smaller chart object to modify it
                                                           iv.      To move the chart, move your mouse pointer into the chart area, click and drag
                                                             v.      To resize the chart move your mouse pointer into any one of the sizing handles on the border of the chart, click and drag
d.      Chart Tools
                                                              i.      Once you create a chart a Chart Tools section will appear in the Ribbon and includes
1.      Design, Layout, and Format
2.      Click in any worksheet cell and you will lose the Chart Tools section
3.      Simply click once on the chart to bring the section back and work with your chart

6.     Chart location and type

a.      What are these?
Charts can either be embedded into a worksheet so you can see the values used and the chart at the same time, or as a separate worksheet. The type of a chart is how the data is displayed visually: averages = pie chart, numbers = bar/column, change over time = line chart
b.      Change the location of the chart
                                                              i.      On the Ribbon > in the Chart Tools section > select the Design tab > in the Location group > click Move Chart
                                                            ii.      In the Move Chart window
1.      Since the chart is already embedded in the worksheet, select the radio button next to New Sheet
2.      In the text box, type: Chart – Quiz Scores
3.      Click OK
                                                          iii.      The chart is now moved into its own worksheet
c.       Change the chart type
                                                              i.      On the Ribbon > in the Chart Tools section > select the Design tab > in the Type group > click Change Chart Type
                                                            ii.      In the Change Chart Type window choose Bar
                                                          iii.      In the main section in the middle right, select Clustered Bar
                                                           iv.      Click OK

7.     Chart layout

a.      What is this?
After you create a chart, you can instantly change its look. Instead of manually adding or changing chart elements or formatting the chart, you can quickly apply a predefined layout to your chart. Excel provides a variety of useful predefined layouts or quick layouts that you can choose from, but you can customize a layout further if needed by manually changing the layout’s individual chart elements.
b.      Change the layout
                                                              i.      On the Ribbon > in the Chart Tools section > select the Design tab > in the Chart Layouts group > click any one of the layouts
                                                            ii.      Choose one with a title
1.      Click inside the title text box and type, Student Quiz Scores
c.       Modify the layout
                                                              i.      Move the Legend
1.      On the Ribbon > in the Chart Tools section > select the Layout tab > in the Labels group > click Legend
2.      Select Legend on Bottom
                                                            ii.      Move Data Labels
1.      On the Ribbon > in the Chart Tools section > select the Layout tab > in the Labels group > click Data Labels
2.      Select Inside Base
                                                          iii.      Other areas
1.      Discuss the other areas: Current Selection, Insert, Axes, Background, Analysis, and Properties
2.      Same if not more options than in the Chart Wizard of Excel past versions

8.     Chart style

a.      What is this?
After you create a chart, you can instantly change its look. Instead of manually adding or changing chart elements or formatting the chart, you can quickly apply a predefined style to your chart. Excel provides a variety of useful predefined styles or quick styles that you can choose from, but you can customize a style further if needed by manually changing the style of individual chart elements.
b.      Color scheme
                                                              i.      On the Ribbon > in the Chart Tools section > select the Design tab > in the Chart Styles group > click any one of the color schemes
c.       Custom Styles
                                                              i.      On the Ribbon > in the Chart Tools section > select the Format tab > in the Current Selection group > click on the top option in the group list (drop down arrow to the right)
                                                            ii.      Click on Chart Area
                                                          iii.      On the Ribbon > in the Chart Tools section > select the Format tab > in the Shape Style group > click on any one of the preformatted styles or choose the down arrow to open up a menu of styles
                                                           iv.      On the Ribbon > in the Chart Tools section > select the Format tab > in the Current Selection group > click on the top option in the group list (drop down arrow to the right)
                                                             v.      Click on Series “Quiz 1”
                                                           vi.      On the Ribbon > in the Chart Tools section > select the Format tab > in the Shape Style group > click on any one of the preformatted styles or choose the down arrow to open up a menu of styles

9.     Chart source data

a.      What is this?
After you create a chart you can easily change the data used for the chart. The source data used are the data points (data series) / or data range in the worksheet
b.      On the Ribbon > in the Chart Tools section > select the Design tab > in the Data group > click Select Data
c.       In the Select Data Source window
                                                              i.      To the right of the textbox for Chart Data Rage, click the square button with the red arrow
                                                            ii.      Select cells A2 to E4
                                                          iii.      Click the square button with the red arrow again to use the information
d.      To switch from row to column
                                                              i.      Click the Switch Row/Column
                                                            ii.      The results will display as you will see the chart change automatically
e.      Edit series or category
                                                              i.      Although we won’t that here, you could easily select any one of the button options under Legend Entries or Horizontal Axis Labels
                                                            ii.      Click OK

10.                         Chart class challenge

a.      What is this?
Challenges exist to help the learner retain knowledge by reusing newly learned information
b.      Challenge the class to create a new chart
                                                              i.      Create a 2D line chart with markers for John and Sierra’s quiz scores with the following look (they will need to modify the chart once created

11.                         Trim function

a.      What is this?
Removes all spaces from text except for single spaces between words. Use TRIM on text that you have received from another application that may have irregular spacing
b.      Work with a new file
                                                              i.      On the desktop, in the Course Folder directory > Excel III > open New Students.xlsx
                                                            ii.      Select cells A1 through B6
                                                          iii.      Copy the cells
c.       Bring the information into history_101.xlsx
                                                              i.      Go back into the history_101.xlsx file
                                                            ii.      Create a new worksheet
                                                          iii.      Click once on cell A1
                                                           iv.      Paste the data from New Students.xlsx
d.      Use the Trim function to get rid of the unnecessary spaces before the first names
                                                              i.      Select cell B3
                                                            ii.      On the Ribbon > select the Formulas tab > in the Function Library group > click Text > in the menu choose Trim
                                                          iii.      You should now see a new Function Arguments window
                                                           iv.      To input the cell reference to trim, select cell A3
                                                             v.      Click the OK button
                                                           vi.      The text in cell B3 is now without the space before
                                                         vii.      Use the fill handle to carry the function down and trim the other student names

12.                         Paste special and Text to columns

a.      What is this?
Using the Cut, Copy, and Paste commands in Excel, you can move or copy entire cells or their contents. You can also copy specific contents or attributes from the cells. For example, using Paste Special you can copy the resulting value of a formula without copying the formula itself, or you can copy only the formula.

b.      Paste special
                                                              i.      Copy the names from cell B3 to B6
1.      These cells have a function as well as the value inside
                                                            ii.      Paste only the values
1.      Select cell A3
2.      On the Ribbon > select the Home tab > in the Clipboard group > click the Paste down arrow > in the menu choose Paste Values
3.      Clear the information in cells B3 to B6
c.       Text to columns
                                                              i.      Select cells A3 to A6
                                                            ii.      On the Ribbon > select the Data tab > in the Data Tools group > click Text to Columns
                                                          iii.      In the Convert text to columns wizard window
1.      Select the radio button next to Delimited
2.      Choose the Next > button
3.      Under Delimiters check ü only the Space box
4.      Choose the Next > button
5.      Choose the Finish button

13.                         Create a PivotTable

a.      What is this?
Use a PivotTable report to summarize, analyze, explore, and present summary data. Use a PivotChart report to visualize this summary data in a PivotTable report, and to easily see comparisons, patterns, and trends. Both a PivotTable report and a PivotChart report enable you to make informed decisions about critical data in your enterprise. The following sections provide an overview of PivotTable reports and PivotChart reports
b.      Get the data to use for the PivotTable
                                                              i.      Open the New Students.xlsx file
                                                            ii.      Select and copy cells C2 through G6
                                                          iii.      In the history_101.xlsx file select cell C2 and paste the data (with all information)
                                                           iv.      Resize the columns to fit the data pasted
c.       Create a PivotTable
                                                              i.      On the Ribbon > select the Insert tab > in the Tables group > click PivotTable
                                                            ii.      In the Create PivotTable window make sure the range selected is from A2 to G6
                                                          iii.      Choose the radio button to the left New Worksheet
                                                           iv.      Click the OK button
d.      View fields and data
                                                              i.      To the right of the worksheet you should now see a PivotTable Field List column
                                                            ii.      Check ü the box next to First Name
1.      The students first names should now appear in the worksheet
                                                          iii.      Check ü the box next to Last Name
1.      Their last names now appear in the same column
2.      To show or hide their last names click on the + or next to their first names
                                                           iv.      To view any of the others simply check ü the box next to the field
e.      Give your PivotTable a name
                                                              i.      In the new PivotTable Tools section on the Ribbon > select the Options tab > in the PivotTable group > click inside the text box under PivotTable Name:
                                                            ii.      Name it, Fall Semester
                                                          iii.      Tap the Enter (return) key

14.                         Modify a PivotTable

a.       What is this?
You can change the values, fields, or any other attributes of a PivotTable easily in Excel
b.      Change field settings
                                                              i.      Show all fields
                                                            ii.      Select cell B4 (sum of Age)
                                                          iii.      In the new PivotTable Tools section on the Ribbon > select the Options tab > in the Active Field group > click Field Settings
                                                           iv.      In the Value field settings window, discuss Summarize by and Show values as tabs
                                                             v.      Average Age
1.      Select the Summarize by tab
2.      In the list below choose Average
3.      Click the OK button
                                                           vi.      Point out other options for PivotTable Tools > Ribbon > Options
c.       Styles
                                                              i.      In the new PivotTable Tools section on the Ribbon > select the Design tab > in the PivotTable Styles group > click on any style
                                                            ii.      In the new PivotTable Tools section on the Ribbon > select the Design tab > in the PivotTable Style Options group > check ü the box next to Banded Rows
d.      Filter a field
                                                              i.      In the PivotTable Field List column, In the bottom right under values
1.      Click and drag Average of Age into the box under Report Filter
2.      The field should now be simply Age
                                                            ii.      Filter the records
1.      You should now see a drop down menu option in cell B1
2.      Click the down arrow and check ü the box next to Select Multiple Items
3.      Check ü the boxes next to 32 and 45
4.      Click the OK button
5.      You now should only see only two students, Anna and Jackson
e.      Save the file

15.                         Protecting your work

a.      What is this?
Create a password that only allows certain users to change the worksheet or the entire workbook.
b.      Cell protection format
                                                              i.      The default protection for every cell is a locked cell
                                                            ii.      To see this, right click inside any cell
                                                          iii.      From the menu click on Format Cells...
                                                           iv.      In the Custom Lists window, select the Protection tab
                                                             v.      Locked is check as a default
1.      This will allow us to password protect our worksheet
                                                           vi.      Click the cancel button in the bottom right of the window
c.       Protect your worksheet
                                                              i.      On the Ribbon > select the Review tab > in the Changes group > click Protect Sheet
                                                            ii.      Check ü the box next to Protect worksheet and contents of locked cells
                                                          iii.      In the text box under Password to unprotect sheet:, type : training
                                                           iv.      Check ü the box next to both Select locked cells and Select unlocked cells
                                                             v.       Discuss the other options
                                                           vi.      Click the OK button
d.      Changing any of the data in your worksheet
                                                              i.      Once you try to change something a window will open explaining how the sheet is protected from change
                                                            ii.      To change the data you need to unprotect the worksheet
                                                          iii.      On the Ribbon > select the Review tab > in the Changes group > click Unprotect Sheet
                                                           iv.      The password is now gone and you can edit the file
e.      Protect workbook
                                                              i.      It is the same thing as protecting the worksheet except this time you protect the entire file
f.        Save the file

16.                         Open floor for Q&A