Describe how you incorporated each of the design principles into your spreadsheet model

What will be an ideal response?


• Accuracy: Every value entered is correct and every formula has been checked for correctness.
• Clarity: Monetary values are formatted as Currency, APR and estimated growth rates are formatted as percent, and units are provided when applicable.
• Flexibility: Cell references or named ranges are used in formulas.
• Efficiency: Appropriate Excel functions are used to calculate the total cost of the loan and other calculations.
• Documentation: Appropriate labels are used for each value along with a title at the top of the model as well as comments to identify the inputs, decision/uncertain variables, and outputs.

Computer Science & Information Technology

You might also like to view...

Modify the TelephoneNumber class described in Exercise 6 so that it is serializable. Write a program that creates an array whose base type is TelephoneNumber by reading data from the keyboard. Write the array to a binary file using the method writeObject. Then read the data from the file using the method readObject and display the information to the screen. Allow the user to change, add, or delete any telephone number until he or she indicates that all changes are complete. Then write the modified telephone numbers to the file, replacing its original contents.

One difficulty in the solution to this project is that we have not yet seen the collection classes. We will read the telephone numbers into an array. We either need to determine the number of objects in the file or expand the array as we read the objects. This solution reads the file twice, once to determine the number of objects and then to read the objects into an appropriately sized array. Once this is done, we make a single change and then write the file back out.

Computer Science & Information Technology

Display student names, their faculty advisors names, and faculty’s office location.

Use the Indo–US (IU) College database tables to design the following queries. (Use the spooling method to capture all queries and results in the CHAP7SP2.LST file)

Computer Science & Information Technology

Using __________________ security, administrators define fine-grained control over the actions a user can perform on a virtual machine.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The target attribute of the anchor element is deprecated in the HTML 5 specification.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology