M04 Spreadsheet
M04 Spreadsheet
Level-IV
Aug, 2022
Table of Contents
Acknowledgment......................................................................................................3
Introduction to module............................................................................................5
Acknowledgment
Ministry of Labor and Skills wish to extend thanks and appreciation to the many
representatives of TVET instructors and respective industry experts who donated their
time and expertise to the development of this Teaching, Training and Learning
Materials (TTLM).
PC -Personal computer
Gb–Gigabyte
This module describes the performance outcomes, skills and knowledge required to
operate spreadsheet applications and perform basic operations, including creating and
formatting spreadsheet data, incorporating charts and objects, and customizing and
printing Spreadsheet.
This module is designed to meet the industry requirement under create and use
spreadsheet occupational standard, particularly for the unit of competency: Create and
use spreadsheet
Finalize spreadsheets
Module Instruction
For effective use this module, trainees are expected to read the following module
instruction shown below:
1. Read the information written in each unit
2. Accomplish the Self-checks at the end of each unit
3. Perform Operation Sheets which were provided at the end of units
4. Do the “LAP test” giver at the end of each unit and
5. Read the identified reference book for Examples and exercise
This guide will also assist you to attain the module above in the cover page. Specifically,
upon completion of this module, you will be able to:
Overview of Network System Administration
Providing appropriate privilege for accounts and files
determining access privileges and usage for user accounts
Maintaining System integrity and security
Providing appropriate privileges for accounts and files is a crucial aspect of managing a
secure and efficient computer system. Proper privilege management ensures that users have
the necessary access rights to perform their job functions while preventing unauthorized
access to sensitive information. Here are key considerations and steps for providing
appropriate privileges:
Ensure that user accounts are created only for individuals who require access to the system.
Assign the minimum necessary permissions needed for users to perform their job functions.
2. Access control policies:
Define access control policies that outline who has access to what resources.
Use the principle of least privilege, meaning users should have the minimum level of access
necessary to perform their duties.
3. Role _based access control(RBAC)
Implement RBAC to group users based on their roles within the organization.
Assign permissions to roles rather than individual users, making it easier to manage access
at scale.
4. Regular Audits:
Conduct regular audits of user accounts and their associated privileges.
Identify and remove any unnecessary or outdated accounts.
5. Access Reviews:
Perform periodic access reviews to ensure that users still require the assigned permissions.
Have a process in place to revoke access promptly when an employee changes roles or
leaves the organization.
6. Monitoring and Logging:
Implement monitoring tools to track user activity and access patterns.
Log relevant events, such as login attempts, changes in permissions, and access to sensitive
data.
7. Alerts for Suspicious Activity:
Set up alerts for suspicious or unauthorized activities, such as multiple failed login attempts,
unusual access times, or access to sensitive data by unauthorized users.
8. Authentication Controls:
Use strong authentication mechanisms, such as multi-factor authentication (MFA), to
enhance account security.
Enforce password policies to ensure that users create strong and regularly updated
passwords.
9. Training and awareness:
Provide training to users on security best practices, including the importance of protecting
their login credentials.
Foster a culture of security awareness within the organization.
10. Incident Response Plan:
Develop and maintain an incident response plan to address security incidents promptly.
Clearly define the steps to be taken if unauthorized access or suspicious activity is detected.
11. Compliance Requirements:
Ensure that your access control practices align with industry regulations and compliance
standards relevant to your organization.
By implementing these measures, organizations can better manage user account access
privileges and enhance overall security posture. Regularly reviewing and updating these
practices helps adapt to evolving security threats and organizational changes.
By consistently implementing and updating these practices, organizations can enhance the
integrity and security of their systems, protecting against a wide range of cyber threats.
Regularly reassessing and adapting security measures are essential in the ever-evolving
landscape of cybersecurity.
Test-I Matching
Instruction: select the correct answer for the give choice. You have given 1 Minute for
each question. Each question carries 2 Point.
A B
---------1. Reduce A. converting waste into new products
---------2. Recycle B. minimize resources and energy consumption
---------3. Reuse C. converting new product into waste
D. use a product again
This unit to provide you the necessary information regarding the following content coverage
and topics:
1. Risk Assessment:
Conduct a comprehensive risk assessment to identify potential threats and vulnerabilities to the
organization's IT infrastructure and business operations.
Identify critical assets and functions that must be prioritized in the event of a disaster.
2. Business Impact Analysis (BIA):
Perform a Business Impact Analysis to understand the potential consequences of disruptions to
various business processes.
Determine the acceptable downtime for each critical business function.
3. Identify Critical Systems and Data:
Clearly identify critical systems, applications, and data that are essential for business operations.
Prioritize these components in the disaster recovery plan.
4. Define Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO):
Establish Recovery Time Objectives (RTO) and Recovery Point Objectives (RPO) for critical systems
and functions.
RTO defines the maximum allowable downtime, while RPO defines the maximum acceptable data
loss.
5. Resource Requirements:
Identify the resources (hardware, software, personnel, etc.) required for recovery efforts.
Ensure that the necessary resources are available and accessible during a disaster.
6. Communication Plan:
Develop a communication plan that outlines how information will be disseminated to internal and
external stakeholders during a disaster.
Specify communication channels, roles, and responsibilities.
7. Training and Awareness:
Ensure that employees are trained on their roles and responsibilities during a disaster.
Conduct regular drills and exercises to test the effectiveness of the disaster recovery plan.
8. Offsite Backup and Storage:
Implement secure offsite backup and storage solutions to ensure data can be recovered in case of
physical damage to on-premises systems.
9. Alternative Facilities:
Identify and secure alternative facilities where operations can be temporarily relocated in the event of
a site-wide disaster.
10. Vendor and Partner Coordination:
Coordinate with vendors and external partners to ensure their disaster recovery plans align with the
organization's objectives.
Verify the recovery capabilities of critical third-party services.
11. Regulatory Compliance:
Ensure that the disaster recovery plan aligns with industry regulations and compliance standards
applicable to the organization.
12. Documentation:
Maintain comprehensive documentation of the disaster recovery plan, including procedures, contact
information, and recovery steps.
Keep the documentation up to date and accessible to key personnel.
By providing input to these aspects of the disaster recovery plan, you contribute to building a resilient
and effective framework for responding to and recovering from disasters. Collaboration with key
stakeholders and a proactive approach to risk management are essential components of a successful
disaster recovery strategy.
By following these steps and considerations, organizations can establish a robust and reliable backup
and restore process that aligns with their disaster recovery policy. Regular testing and validation of the
backup strategy contribute to overall data resilience and business continuity.
By carefully planning and executing the dissemination of the disaster recovery plan, organizations can
enhance overall preparedness and increase the likelihood of a swift and effective response in the face
of a disaster or disruption.
1. Ping Test:
Use the ping command to test the connectivity between devices.
Verify that devices can communicate with each other and measure the round-trip time.
2. Traceroute:
Use the traceroute or tracert command to trace the route that packets take from one device to another.
Identify the path and measure the latency at each hop.
3. Bandwidth Testing:
Conduct bandwidth tests to measure the available bandwidth between network devices.
Tools like iPerf or Speedtest can be used to assess network throughput.
4. Packet Loss Testing:
Perform packet loss tests to identify any loss of data packets across the network.
Tools like MTR (My TraceRoute) or pathping can provide insights into packet loss.
5. Network Scanning:
Use network scanning tools to discover devices on the network and identify open ports.
Ensure that only authorized devices and services are accessible.
6. SNMP Monitoring:
Implement Simple Network Management Protocol (SNMP) monitoring to collect and analyze data
from network devices.
Use SNMP-based tools to monitor device performance and health.
7. Syslog Analysis:
Analyze syslog data to identify potential issues or security events on network devices.
Set up centralized syslog servers for efficient log management.
8. DNS Resolution Test:
Test DNS resolution to ensure that domain names are being resolved correctly.
Identify and troubleshoot any DNS-related issues.
9. DHCP Testing:
Verify the functionality of Dynamic Host Configuration Protocol (DHCP) by ensuring that devices
receive IP addresses correctly.
Check for DHCP server responsiveness.
10. Firewall and Security Audits:
Perform regular audits of firewall configurations to ensure proper security policies.
Verify that only necessary ports and services are open.
11. VLAN Testing:
Test Virtual LAN (VLAN) configurations to ensure proper isolation of network segments.
Verify that devices within a VLAN can communicate while maintaining segmentation.
12. Quality of Service (QoS) Testing:
Test Quality of Service configurations to ensure that critical applications receive the necessary priority
and bandwidth.
Verify that QoS policies are effective in managing network traffic.
13. Wireless Network Testing:
Perform wireless network testing to assess signal strength, coverage, and interference.
Identify and address any issues affecting Wi-Fi performance.
14. Network Traffic Analysis:
Use network traffic analysis tools to monitor and analyze the flow of data across the network.
Identify patterns, anomalies, and potential security threats.
By regularly performing these diagnostic tests, network administrators can proactively identify and
address issues, optimize network performance, and enhance overall network reliability and security.
Regular monitoring is essential for preventing downtime and ensuring the smooth operation of critical
business processes.
By actively monitoring performance indicators, organizations can proactively address issues, optimize
resource usage, and ensure a reliable and efficient IT environment. Regular reviews and adjustments
to monitoring strategies contribute to ongoing improvements in system performance and overall
operational excellence.
1. Network Optimization:
Analyze network traffic and identify bottlenecks.
Optimize network configurations, such as adjusting Quality of Service (QoS) settings, to prioritize
critical traffic.
Implement network segmentation to improve performance and security.
2. Bandwidth Management:
Implement bandwidth management strategies to allocate resources based on priority and demand.
Utilize traffic shaping and bandwidth throttling to ensure fair usage and prevent network congestion.
3. Update and Patch Systems:
Regularly update and patch operating systems, applications, and firmware to address vulnerabilities
and improve system performance.
Enable automatic updates where possible to ensure timely patching.
4. Server Virtualization:
Implement server virtualization to optimize resource utilization and improve scalability.
Use virtual machines (VMs) to consolidate workloads on fewer physical servers.
By implementing these strategies and practices, organizations can optimize the performance and
efficiency of their networks and systems. Continuous monitoring, regular assessments, and a proactive
approach to optimization contribute to a resilient and high-performing IT environment.
Test-II Matching
Instruction: select the correct answer for the give choice. You have given 1 Minute for each
question. Each question carries 3 Point.
A B
---------1. Pie chart A. 2-dimensional chart
---------2. Column chart B. Shows the proportions of individual components
compared with a whole
---------3. Bar chart C. Useful for comparison3-dimensional
---------4. Line Chart D. Used for comparing separate sets of data
E. To display data visual
Step 2. Select cells A4 to G11. This range includes the branch names, the months,
the sales figures and the branch totals (a deliberate mistake which we’ll fix
later).
Step 3. Click the Chart Wizard button (on the Standard toolbar). (The Chart Wizard
button might be in a different place in your spreadsheet program. If you
can’t find it, ask your trainer for help.)
A dialogue box will appear, showing a range of chart types. Clicking on one
of these reveals several sub-types. The first sub-type will already be
highlighted.
Step 4. Press the ‘Press and hold to view sample’ button, and a preview of what the
chart would look like using that sub-type appears.
Step 5. Experiment with various chart types and sub-types. Some chart types will be
inappropriate for the type of data to be used. For our current spreadsheet, the
‘Clustered Column’sub-type will be best. Select this, then press the Next
button.
Step 6. Press the Next button again, then next again, then the Finish button.
Step 7. Save the file with the ‘Save as’ command, and give it the name ‘Rows and
columns with chart’, but don’t close the file.
The Value axis at the left-hand side of the chart shows dollar
amounts.
You can move the chart around or resize it, just like any other
graphic.
Because we selected data in column G (the branch totals), the chart is skewed (the
Totals data is forcing the monthly data to appear too small).
Note: You may need to shift the chart if it’s in the way of the spreadsheet data.
Step 8. On the spreadsheet, ‘grab’ the bottom right-hand handle on the blue box and
move it to the left so that only columns A to F are selected.
The chart automatically updates, and now shows the data more meaningfully.
You can now see how useful charts can be. We can see at a glance which branch had
the most sales, and in which month, etc. We can also see that some
branches’ January figure was their highest, while for some it was their
lowest. Very interesting to the general manager!
Step 9. Try right-clicking on various parts of the chart – pop-up menus for those
parts will appear.
Step 10. Right-click on the Legend at the right-hand side. Choose Format Legend
and, from the choices available, change the border colour and line weight
and the font size and font.Click OK. The legend now looks different.
Step 11. Do something similar to the Category axis (across the bottom of the chart).
Step 12. Right-click and select Format Axis for the Value axis at the right-hand side
Step 13. Select the Number tab, then Currency from the category. Choose the $
symbol and reduce the decimal places to zero. Change the font, font colour
and alignment if you want. Then click OK.
Step 14. Right-click in a blank area just inside the chart border, and select Format
Chart Area.
Step 15. Change the border of the chart, and select a pale colour in the Area options
section. Click OK. Now our chart’s looking quite good, but it still lacks a
title!
Step 17. Give the chart a title (perhaps ‘Sales figures’) and try other options,
including selecting the two options on the data table tag.
Step 18. Move the chart across so that it’s under the data in the spreadsheet, then
resize it so it fits on the page.
Step 19. Click anywhere in row 1 and click Print Preview. Your chart would be
printed on top of your spreadsheet.
Step 20. Press the Escape key, then select the chart. Press Print Preview and you
will see that just your chart would be printed.
Task 1 Shown here is some data for the 10 house contracts your company has carried out
this year. Create a spreadsheet containing the headings, names and Figures shown.
Task 3 Save your spreadsheet with the name ‘Lap Test 2’.
header to have your company name in 18pt bold italics and ‘2009 Profits’ in14pt
bold
Chart
Task 6 Select the ‘Contract’ data (including the heading), the ‘Contract price’ data and
the‘Actual profit’ data (use the Ctrl key to select the additional data).
• Add the chart title ‘By actual profit’, and your name.
Task 7 Print, review, adjust, print and save the chart only. (Tip: Select the chart first.)
Task 8 Repeat actions of 1.6–1.7 and modify your existing chart to be a bar graph.
Adjusting content
On occasion, you may need to make small adjustments from the Print pane to fit your
workbook content neatly onto a printed page. The Print pane includes several tools to help fit and
scale your content, such as scaling and page margins.
Types of page orientation:
Excel offers two page orientation options: landscape and portrait. Landscape orients the
page horizontally, while portrait orients the page vertically. In our example, we'll set the page
orientation to landscape.
Navigate to the Print pane.
Select the desired orientation from the Page Orientation drop-down menu. I we'll
select Landscape Orientation.
Navigate to the Print pane. In our example, we can see in the Preview pane that our content will
be cut off when printed.
Keep in mind that worksheets will become more difficult to read as they are scaled down, so
you may not want to use this option when printing a worksheet with a lot of information. In our
example, we'll change the scaling setting back to No Scaling.
I. Click the Page Layout tab on the Ribbon, then select the Print Titles command.
IV. The cursor will become a small selection arrow, and the Page Setup dialog box will be
collapsed. Select the row(s) you want to repeat at the top of each printed page. In our
example, we'll select row 1.
V. Row 1 will be added to the Rows to repeat at top: field. Click the Collapse
Dialog button again.
In our example, row 1 appears at the top of every page, and column A appears at the left of every
page.
Vertical and horizontal blue dotted lines denote the page breaks. Click and drag one of these
lines to adjust that page break.
A margin is the space between your content and the edge of the page. Sometimes you may need
to adjust the margins to make your data fit more comfortably. You can modify page margins
from the Print pane.
Navigate to the Print pane.
Select the desired margin size from the Page Margins drop-down menu. In our example, we'll
select Narrow Margins.
Printing
As we’ve already seen, clicking the Print Preview button lets you to see what yourprinted
spreadsheet will look like. This allows you to check and adjust the format, etc,without wasting
paper.
Once you’re ready to select the Print function (shortcut Ctrl+P), you’ll be presented witha
dialogue box that allows you to choose various options, including:
which printer to use (if there is more than one available printer)
The Properties button opens another dialogue box with options for the printer youselected.
2. Press Ctrl+Home to move to cell A1, and then zoom out. This will give you an idea of howbig
the spreadsheet is.
3. Click Print Preview. You’ll see that this spreadsheet would actually run across severalpages if
it was printed (but don’t worry about that for now).
5. Go to the View menu. This will give you some choices in a drop-down box.
6. Select Page Break Preview. This will show you where the page breaks are (the way you
7. Click and drag the blue lines around a bit (don’t worry – you can’t break anything!), then
click on Print Preview again. You’ll see that the data on the spreadsheet will be spread
around the various pages differently. In other words, you can tell the program how much
Reference
https://www.tutorialspoint.com/
https://www.myamcat.com/samplePapers/SP_MS-EXCEL.pdf
https://edu.gcfglobal.org/en/topics/excel/
https://www.dtwd.wa.gov.au/sites
https://aspire-solidus-production.s3-ap-southeast-2.amazonaws.com
2
3
4
5
6
7
Page 51 of 51 Ministry of Labour and Create and use Version -1
Skills spreadsheet
Aug, 2022
Author/Copyright