Arden University, COM0006NFBNM: Technology in Operations Report
VerifiedAdded on 2022/11/30
|13
|4017
|342
Report
AI Summary
This report delves into the application of technology within organizational operations, focusing on key areas such as big data, IT security, and cellular networks. It begins by defining the concept of big data, exploring its role and benefits for Arden University, including its characteristics like volume, velocity, and variety, and differentiating between structured and unstructured data. The report then examines IT security and data privacy measures organizations must implement, emphasizing the importance of firewalls, intrusion detection systems, and virtual private networks, as well as the key provisions of GDPR. Lastly, the report evaluates cellular networks, outlining their components and advantages to businesses. The report provides a comprehensive overview of how technological advancements impact modern business practices, with a focus on data management, security protocols, and communication infrastructure.

Technology in
operations
operations
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
TASK 1............................................................................................................................................3
Concept and role of big data in Arden University.......................................................................3
TASK 2............................................................................................................................................5
Explain the IT security and data privacy measures that an organisation must implement. And
the key provisions of GDPR........................................................................................................5
TASK 3............................................................................................................................................8
Concept of cellular networks with their principle components...................................................8
Benefits of cellular network to a business...................................................................................9
Command and functions of spreadsheet......................................................................................9
CONCLUSION..............................................................................................................................11
References......................................................................................................................................12
Books and journals:...................................................................................................................12
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
TASK 1............................................................................................................................................3
Concept and role of big data in Arden University.......................................................................3
TASK 2............................................................................................................................................5
Explain the IT security and data privacy measures that an organisation must implement. And
the key provisions of GDPR........................................................................................................5
TASK 3............................................................................................................................................8
Concept of cellular networks with their principle components...................................................8
Benefits of cellular network to a business...................................................................................9
Command and functions of spreadsheet......................................................................................9
CONCLUSION..............................................................................................................................11
References......................................................................................................................................12
Books and journals:...................................................................................................................12

INTRODUCTION
Information technology is taking a lead into Global world. These technologies are
changing day by day and adopting new modification in order to give a new experience to
business and people. By using technologies in to operations it gives a lot of assistance to
organization and help in maintaining large data, record and information in a high amount of
storage (Alshawaaf, and Lee, 2021). This report is going to present the use and benefits of big
data for Arden University. Also there will be a discussion on it measures by adopting GDPR
provisions in order to secure private network. At last, the report will evaluate cellular data and its
principles by showing its benefit to a business.
MAIN BODY
TASK 1
Concept and role of big data in Arden University
Big data term as a large amount of data that is stored and maintain in a large storage
format. These data reflect information in process concept by organization using IT technologies.
These data could be measured and rectified as per the needs. As the IT sector taking large growth
by enabling Technology like computer, mobile and other mechanical upgradation. In this 21st
century computer is become need for every other person in order to complete work in an easy
manner. So that the organisation using these technologies in order to save their big data in a large
format and volume. The information and content generated by Organisation in onto their
websites and applications are all important and term as big data which it essential to carry out
their business. These data are stored in special software’s and tools which are accepted by super
computers (Cardoso, Torriti, and Lorincz, 2020). There are several organisations which using the
data in order to to make profits and money. Face book is a best example of undertaking big data
as people are are using the application for much purpose like communication, sharing and
accepting pictures and videos or posting content and create business pages. So that, Facebook
enable the user information which is need to be stored as they could not get delete without their
permission. For that instance, The Other University is pulling their role in education sector that
Information technology is taking a lead into Global world. These technologies are
changing day by day and adopting new modification in order to give a new experience to
business and people. By using technologies in to operations it gives a lot of assistance to
organization and help in maintaining large data, record and information in a high amount of
storage (Alshawaaf, and Lee, 2021). This report is going to present the use and benefits of big
data for Arden University. Also there will be a discussion on it measures by adopting GDPR
provisions in order to secure private network. At last, the report will evaluate cellular data and its
principles by showing its benefit to a business.
MAIN BODY
TASK 1
Concept and role of big data in Arden University
Big data term as a large amount of data that is stored and maintain in a large storage
format. These data reflect information in process concept by organization using IT technologies.
These data could be measured and rectified as per the needs. As the IT sector taking large growth
by enabling Technology like computer, mobile and other mechanical upgradation. In this 21st
century computer is become need for every other person in order to complete work in an easy
manner. So that the organisation using these technologies in order to save their big data in a large
format and volume. The information and content generated by Organisation in onto their
websites and applications are all important and term as big data which it essential to carry out
their business. These data are stored in special software’s and tools which are accepted by super
computers (Cardoso, Torriti, and Lorincz, 2020). There are several organisations which using the
data in order to to make profits and money. Face book is a best example of undertaking big data
as people are are using the application for much purpose like communication, sharing and
accepting pictures and videos or posting content and create business pages. So that, Facebook
enable the user information which is need to be stored as they could not get delete without their
permission. For that instance, The Other University is pulling their role in education sector that
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

require high technology and software in order to maintain records comma generate presentations
and project in a large manner that require use storage. So that big data perform a significant role
in Arden University by accepting and collecting website content and student record in a file and
project. characterises of big data includes volume, velocity, variability and other V’s that define
the importance of big data. Volume represents the sixe and capacity that a data consume which is
requires to analyse the storage requirement which comes in megabyte, terabyte and zettabyte.
Velocity and varieties shows the network and authentication of data by acknowledging its
sources so that it keeps secured and away from unauthorised links and networks.
These big data are of specially two kinds which are structured and unstructured. The uses of
these data are described below:
Structure data: this data accept a fixed volume of the whole data processed by a business
organisation. It gets saved in an automatic manner as the software accept get minimum format by
analysing its volume and size. The Arden University mainly use structured data in order to
prepare record of students, employees and other members in order to check the records of
attendance or providing salaries. The structured data remains in a relational database function
within described format.
Unstructured data: is the name save it all that the data are into unstructured manner which
shows file, text, videos and applications into less volume and formats(Cloete, 2017).. In
educational purpose like Arden University they are using mainly unstructured data as their
working criteria depends on PDF and document format which are generated by students and
teachers as well.
B) Discuss the key benefits organizations like Arden University gain after adopting Big
Data.
There are a lot benefits that Arden University make by evaluating big data into the overall
procedure and process of their institution. These benefits are described below:
Reduce competition: As the technology has taken Rapid rise in to its reach and broader
information could be undertake (Reeves, 2019). At the University has an advantage and benefit
to analyse their competition by assessing the data of other University could assure through their
websites or outside protocols which make them more familiar about what is going on in to
and project in a large manner that require use storage. So that big data perform a significant role
in Arden University by accepting and collecting website content and student record in a file and
project. characterises of big data includes volume, velocity, variability and other V’s that define
the importance of big data. Volume represents the sixe and capacity that a data consume which is
requires to analyse the storage requirement which comes in megabyte, terabyte and zettabyte.
Velocity and varieties shows the network and authentication of data by acknowledging its
sources so that it keeps secured and away from unauthorised links and networks.
These big data are of specially two kinds which are structured and unstructured. The uses of
these data are described below:
Structure data: this data accept a fixed volume of the whole data processed by a business
organisation. It gets saved in an automatic manner as the software accept get minimum format by
analysing its volume and size. The Arden University mainly use structured data in order to
prepare record of students, employees and other members in order to check the records of
attendance or providing salaries. The structured data remains in a relational database function
within described format.
Unstructured data: is the name save it all that the data are into unstructured manner which
shows file, text, videos and applications into less volume and formats(Cloete, 2017).. In
educational purpose like Arden University they are using mainly unstructured data as their
working criteria depends on PDF and document format which are generated by students and
teachers as well.
B) Discuss the key benefits organizations like Arden University gain after adopting Big
Data.
There are a lot benefits that Arden University make by evaluating big data into the overall
procedure and process of their institution. These benefits are described below:
Reduce competition: As the technology has taken Rapid rise in to its reach and broader
information could be undertake (Reeves, 2019). At the University has an advantage and benefit
to analyse their competition by assessing the data of other University could assure through their
websites or outside protocols which make them more familiar about what is going on in to
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

educational sector that could undertake by the institution in order to attract students and
professional.
Effective service to student’s: using big data characteristics like volume, velocity and variety
gives many benefit in providing better services to students for Arden University. Through these
data, the institution could indulge with students more appropriately so that they would attract
them to be a part of University. It will help in making effective business Strategies and
techniques to provide service as per educational requirement.
Teaching effectively: Technologies are being helpful in every sector whether it is teaching to a
student (Di Vaio, and Varriale, 2020). Big data gives high velocity and volume storage to
maintain presentations and network that could be helpful for professors and teachers to teach in
an interesting manner so that students will attract toward their teaching method and will bus
stand the concept properly.
Student’s assistance: The information present on various search engines and Website of Arden
University is helpful for the students to take decisions and their way to future. Therefore big data
is helpful for University and their students to make comparison as well as analyse the potential of
University before taking admissions.
Promotion: Big data is helpful in making promotions and marketing about the Institution and
their facilities in a better way. As the software’s and technologies store this data in a structured
manner that it makes the work easy to identify and measure the performance of Institution
through past years(Newman, 2018). Therefore, by using the Data University make an appropriate
approach towards making more effective promotions and showcasing their achievements.
TASK 2
Explain the IT security and data privacy measures that an organisation must implement. And the
key provisions of GDPR
Information technologies are growing rapidly so that all the sources are also undertaking global
market. There are number of cases seen about cybercrime and social misleading. The IT security
and data privacy or not properly measure and Secure into the technological world. The much
professional.
Effective service to student’s: using big data characteristics like volume, velocity and variety
gives many benefit in providing better services to students for Arden University. Through these
data, the institution could indulge with students more appropriately so that they would attract
them to be a part of University. It will help in making effective business Strategies and
techniques to provide service as per educational requirement.
Teaching effectively: Technologies are being helpful in every sector whether it is teaching to a
student (Di Vaio, and Varriale, 2020). Big data gives high velocity and volume storage to
maintain presentations and network that could be helpful for professors and teachers to teach in
an interesting manner so that students will attract toward their teaching method and will bus
stand the concept properly.
Student’s assistance: The information present on various search engines and Website of Arden
University is helpful for the students to take decisions and their way to future. Therefore big data
is helpful for University and their students to make comparison as well as analyse the potential of
University before taking admissions.
Promotion: Big data is helpful in making promotions and marketing about the Institution and
their facilities in a better way. As the software’s and technologies store this data in a structured
manner that it makes the work easy to identify and measure the performance of Institution
through past years(Newman, 2018). Therefore, by using the Data University make an appropriate
approach towards making more effective promotions and showcasing their achievements.
TASK 2
Explain the IT security and data privacy measures that an organisation must implement. And the
key provisions of GDPR
Information technologies are growing rapidly so that all the sources are also undertaking global
market. There are number of cases seen about cybercrime and social misleading. The IT security
and data privacy or not properly measure and Secure into the technological world. The much

technology is growing the more it give rise to crimes and unethical actions which harm many
organisations as well as people who are connected with it (George, and Chandra, 2020). The data
are in danger of getting stall and use it for many personal reasons. The private information of
customers within the organisation is also not safe if not prevented with appropriate measures.
This can affect the organisation profitability and image into market. Those who have working
with Technologies into Global aspect and have large social platforms have fear of data theft and
privacy. The hackers found every another way to access the information and enter into to any
software by using techniques. So that, prevention is always better than cure is a well said phrase
that must be practically implement by Arden University. With evaluation of GDPR is general
data protection regulation Act there are a lot of prevention measures and right of every individual
are directed in order to be aware about data security (Guerrero, and Urbano, 2019). In context
with many organisations, like Face book, Google, Amazon who are working into large
technological world and enable IT system. They need to prevent the data from being theft by
surrounding protective walls around their software and applications. It managers needs to come
up with key solutions in order to protect the future of Business and encourage safety of their
customers. There are many elements which are helpful in preventing the data which are
discussed below:
Firewalls: The firewalls worked as a preventive measure which undertakes the data into their
surroundings by enabling option for permission. In simple terms, a network needs to take
permission from the owner in order to enter or get functioning. There are basically two types of
firewalls based on personal and network based. Firewalls work and get information through the
switch and networks. The big organisations like Google and Facebook use this firewalls in order
to secure their data from unknown sources and allow a permission and password security so that
unfamiliar network will get caught. In educational sector, added University should not allow the
permission to access data to every user in order to protect the information under the firewall.
Intrusion detection prevention system: Under the prevention system, intervention system
allow the managers to identify the network and traffic came across without any permission
granted. These are kind of software which are built to protect the data and software from virus
and fake interruptions. So that in order to prevent the data from theft, the Arden University could
use this system by enabling password control and not allow any user interference without its
organisations as well as people who are connected with it (George, and Chandra, 2020). The data
are in danger of getting stall and use it for many personal reasons. The private information of
customers within the organisation is also not safe if not prevented with appropriate measures.
This can affect the organisation profitability and image into market. Those who have working
with Technologies into Global aspect and have large social platforms have fear of data theft and
privacy. The hackers found every another way to access the information and enter into to any
software by using techniques. So that, prevention is always better than cure is a well said phrase
that must be practically implement by Arden University. With evaluation of GDPR is general
data protection regulation Act there are a lot of prevention measures and right of every individual
are directed in order to be aware about data security (Guerrero, and Urbano, 2019). In context
with many organisations, like Face book, Google, Amazon who are working into large
technological world and enable IT system. They need to prevent the data from being theft by
surrounding protective walls around their software and applications. It managers needs to come
up with key solutions in order to protect the future of Business and encourage safety of their
customers. There are many elements which are helpful in preventing the data which are
discussed below:
Firewalls: The firewalls worked as a preventive measure which undertakes the data into their
surroundings by enabling option for permission. In simple terms, a network needs to take
permission from the owner in order to enter or get functioning. There are basically two types of
firewalls based on personal and network based. Firewalls work and get information through the
switch and networks. The big organisations like Google and Facebook use this firewalls in order
to secure their data from unknown sources and allow a permission and password security so that
unfamiliar network will get caught. In educational sector, added University should not allow the
permission to access data to every user in order to protect the information under the firewall.
Intrusion detection prevention system: Under the prevention system, intervention system
allow the managers to identify the network and traffic came across without any permission
granted. These are kind of software which are built to protect the data and software from virus
and fake interruptions. So that in order to prevent the data from theft, the Arden University could
use this system by enabling password control and not allow any user interference without its
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

acceptance. Organisations like Amazon and other applications have customer information which
needs to be secured and safe that could be done by eliminating hackers attack. Also the data
needs to be preventing from the internal environment of the organisation (Han, Wang, and Naim,
2017). Except from it managers and a professional expert no one could have right to access
critical information. It is not necessary that it could only done through outside sources but
internal act could also affect its relevance.
Virtual private network: under this prevention measure, this network provide communication
and enable its transfer through virtual connections. This virtual connection prevents the data
from unauthorised sources and Technology. It is mainly used by Global organisations who work
ok and communicate through virtual networks which also required prevention as there are many
hackers who could get interfere in between assessing information and take advantage of it
(Kuhlmann, Stegmaier, and Konrad, 2019). The Arden University could restrict list private
network as they have to take classes on zoom applications or other virtual networks that must be
strictly secure.
By undertaking and evaluating the need of high prevention measures, the government
took necessary actions by formulating key guidelines in terms of GDPR acts. This reflect that not
only organisation but general people need to get awake and aware about their rights and duties if
any misleading act would happens. Also this acts present actions and performance that are
required to done in order to refuse hackers involvement.
Extra territorial effect: Under the effect of GDP are coma the business needs to identify the
act and behaviour of customers so that they could find the actual culprit and does not allowed
their permissions to access their application for any e social handling.
Data protection officer: The business organisation need to appoint a data protection officer
which is mentioned into GDP at as a mandatory guidelines. These offices are assigned with their
responsibility to manage all the accounts and network of organisation so that no misconduct and
any conflicts get arise (Jideani, 2018). This officer would enable practice of public authorities
and control on GDP guideline if not exercise it the business get and titles with the penalty of
paying 20 million dollars.
needs to be secured and safe that could be done by eliminating hackers attack. Also the data
needs to be preventing from the internal environment of the organisation (Han, Wang, and Naim,
2017). Except from it managers and a professional expert no one could have right to access
critical information. It is not necessary that it could only done through outside sources but
internal act could also affect its relevance.
Virtual private network: under this prevention measure, this network provide communication
and enable its transfer through virtual connections. This virtual connection prevents the data
from unauthorised sources and Technology. It is mainly used by Global organisations who work
ok and communicate through virtual networks which also required prevention as there are many
hackers who could get interfere in between assessing information and take advantage of it
(Kuhlmann, Stegmaier, and Konrad, 2019). The Arden University could restrict list private
network as they have to take classes on zoom applications or other virtual networks that must be
strictly secure.
By undertaking and evaluating the need of high prevention measures, the government
took necessary actions by formulating key guidelines in terms of GDPR acts. This reflect that not
only organisation but general people need to get awake and aware about their rights and duties if
any misleading act would happens. Also this acts present actions and performance that are
required to done in order to refuse hackers involvement.
Extra territorial effect: Under the effect of GDP are coma the business needs to identify the
act and behaviour of customers so that they could find the actual culprit and does not allowed
their permissions to access their application for any e social handling.
Data protection officer: The business organisation need to appoint a data protection officer
which is mentioned into GDP at as a mandatory guidelines. These offices are assigned with their
responsibility to manage all the accounts and network of organisation so that no misconduct and
any conflicts get arise (Jideani, 2018). This officer would enable practice of public authorities
and control on GDP guideline if not exercise it the business get and titles with the penalty of
paying 20 million dollars.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Consent: Every customer or individual have their own rights over their own information and
data with their share with the organisation. Nowadays it is become a usual activity but needs to
be very protected. As per the GDP are guidelines, no organisation would refuse to provide
customer data to them without asking any question (Mushtaq, and Rizwan, 2018). If any person
would feel unsafe and not sure about the data prevention they could get consent of taking it back.
TASK 3
Concept of cellular networks with their principle components
Cellular network is defined as wireless connection of a contact network. It becomes very
important for every individual as it assist individual or a group of person to communicate with
other persons from different location (Rinta-Möykky, 2020). That means two person or more
than two people are able to communicate with the cell phones from different locations. To make
the process easy, network is categorised into cells so that everyone can able to contact with other
person. Each cell gets one chance fever station that is fixed on a location. With the help of
transceiver stations cells are connected with network which able to send voice, data or any other
types of information within few seconds. In simple words, it is known as a mobile network. In
former days every person has cellular phones which they thought it is luxurious for them. But at
this time, it becomes necessity more than luxury for individuals. For connection with other
person, cellular phones are very necessary as it is portable and able to communicate from
anywhere. Cellular phone becomes necessity of business because they have many persons which
should be connected to each other in order to make the business transactions easier. In today's
business, without cell phones no one organisation is able to perform their jobs because it needs
instructions and information which easily get from cell phones.
There are some important principle components of cellular network:
Base transceiver stations: It is the acronym of BTS. Base transceiver stations are
important part of cell phones as every subscriber is linked with cellular network which is
only possible through BTS (Rovalo, McCardle, Smith, and Hooker, 2020). Cell phones
are run through antennas which provide by base transceiver stations.
Basic station controller: This station is the acronym of BSC. It acts like interfaces
between mobile switching centre and basic station controllers. That means it helps in
data with their share with the organisation. Nowadays it is become a usual activity but needs to
be very protected. As per the GDP are guidelines, no organisation would refuse to provide
customer data to them without asking any question (Mushtaq, and Rizwan, 2018). If any person
would feel unsafe and not sure about the data prevention they could get consent of taking it back.
TASK 3
Concept of cellular networks with their principle components
Cellular network is defined as wireless connection of a contact network. It becomes very
important for every individual as it assist individual or a group of person to communicate with
other persons from different location (Rinta-Möykky, 2020). That means two person or more
than two people are able to communicate with the cell phones from different locations. To make
the process easy, network is categorised into cells so that everyone can able to contact with other
person. Each cell gets one chance fever station that is fixed on a location. With the help of
transceiver stations cells are connected with network which able to send voice, data or any other
types of information within few seconds. In simple words, it is known as a mobile network. In
former days every person has cellular phones which they thought it is luxurious for them. But at
this time, it becomes necessity more than luxury for individuals. For connection with other
person, cellular phones are very necessary as it is portable and able to communicate from
anywhere. Cellular phone becomes necessity of business because they have many persons which
should be connected to each other in order to make the business transactions easier. In today's
business, without cell phones no one organisation is able to perform their jobs because it needs
instructions and information which easily get from cell phones.
There are some important principle components of cellular network:
Base transceiver stations: It is the acronym of BTS. Base transceiver stations are
important part of cell phones as every subscriber is linked with cellular network which is
only possible through BTS (Rovalo, McCardle, Smith, and Hooker, 2020). Cell phones
are run through antennas which provide by base transceiver stations.
Basic station controller: This station is the acronym of BSC. It acts like interfaces
between mobile switching centre and basic station controllers. That means it helps in

maintaining a link between the centres. With the help of link they are able to connect
with each cell phone. In addition to this, basic station controller can be e connected with
the help of microwave cables.
Mobile switching centre: MSC becomes very important for cellular network as its
supervise each basic station and link with basic station controllers. Mobile switching
centre has a capability to connect with other network. They are connected with the help
of fibre optics, copper cable and microwave cable.
From the discussion of cellular network, it is identified that they are very important for
every business and that's why company should understand that how they work. Cellular network
work with the help of SIM cards. SIM cards are available at each cell phone which connects with
antenna. Antenna has a capability to translate radiations which come from transmitters in the
form of electromagnetic waves. It is similar get back to return the feedback.
Benefits of cellular network to a business
In daily life, cellular network becomes very important for individual as well as
organisations because it provides flexibility (STORY, 2017) (Yang, 2019). That means if
organisation want to contact with their clients and employees then they can communicate with
the help of cell phones from anywhere at any time.
It is identifying that cell phones are substitute of computers. In simple words, cell phone
also perform all those works which performed by computers. Organisations found that
they are better from computer because cell phones of portable.
To connect with all over the world cell phone plays a very important role. Due to
globalisation, there are many organisations which have operations in other countries also.
For example, Amazon which is the large organisation that operates their business practice
in all over the world. To connect with their delivery person, they need networks in the
form of cell phones so that they can communicate their message.
Command and functions of spreadsheet
The spreadsheet shows calculation of sum, median, maximum and minimum value of
gross salary, taxes and net salary. It covers all employees of Weaning Entertainment Ltd. Below
are the formulas which help to calculate:
with each cell phone. In addition to this, basic station controller can be e connected with
the help of microwave cables.
Mobile switching centre: MSC becomes very important for cellular network as its
supervise each basic station and link with basic station controllers. Mobile switching
centre has a capability to connect with other network. They are connected with the help
of fibre optics, copper cable and microwave cable.
From the discussion of cellular network, it is identified that they are very important for
every business and that's why company should understand that how they work. Cellular network
work with the help of SIM cards. SIM cards are available at each cell phone which connects with
antenna. Antenna has a capability to translate radiations which come from transmitters in the
form of electromagnetic waves. It is similar get back to return the feedback.
Benefits of cellular network to a business
In daily life, cellular network becomes very important for individual as well as
organisations because it provides flexibility (STORY, 2017) (Yang, 2019). That means if
organisation want to contact with their clients and employees then they can communicate with
the help of cell phones from anywhere at any time.
It is identifying that cell phones are substitute of computers. In simple words, cell phone
also perform all those works which performed by computers. Organisations found that
they are better from computer because cell phones of portable.
To connect with all over the world cell phone plays a very important role. Due to
globalisation, there are many organisations which have operations in other countries also.
For example, Amazon which is the large organisation that operates their business practice
in all over the world. To connect with their delivery person, they need networks in the
form of cell phones so that they can communicate their message.
Command and functions of spreadsheet
The spreadsheet shows calculation of sum, median, maximum and minimum value of
gross salary, taxes and net salary. It covers all employees of Weaning Entertainment Ltd. Below
are the formulas which help to calculate:
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

The Sum, Median, Max and Min value of the Gross salary, taxes and Net salary of all the
employees of this organisation.
a) Sum: Sum is the total of all given numbers. The formula of Sum in a spreadsheet is =
SUM (A1:A10). The answer get through enter key. In case of Weaning Entertainment
Ltd., they are calculating their gross salary, taxes, and net salary through these formulae =
SUM (E4:E10), = SUM (F4:F10), and = SUM (G4:G10) respectively.
b) Mean: It is calculated by= AVERAGE (A1:A10). Gross salary, taxes and net salary are
calculated by = AVERAGE (E4:E10), = AVERAGE (F4:F10), and = AVERAGE
(G4:G10) respectively.
c) Median: It can be calculated with the help of this formula = MEDIAN (A1:A10). Gross
salary, taxes and net salary are calculated by = MEDIAN (E4:E10), = MEDIAN
(F4:F10), and = MEDIAN (G4:G10) respectively.
d) Maximum value: With the help of this formula = MAX (A1:A10) can be calculated.
Gross salary, taxes and net salary are calculated by = MAX (E4:E10), = MAX (F4:F10),
and = MAX (G4:G10) respectively.
e) Minimum value: With the help of this formula = MIN (A1:A10) can be calculated.
Gross salary, taxes and net salary are calculated by = MIN (E4:E10), = MIN (F4:F10),
and = MIN (G4:G10) respectively.
There are four employees who have gross salary more than £79900.00 that is Rexford,
Morgan, Kara, and Rizwan.
There are six employees who have net salary less than £67499.99 that is Rexford, Kara,
Kevin, Rizwan, Whitney, and Billy.
employees of this organisation.
a) Sum: Sum is the total of all given numbers. The formula of Sum in a spreadsheet is =
SUM (A1:A10). The answer get through enter key. In case of Weaning Entertainment
Ltd., they are calculating their gross salary, taxes, and net salary through these formulae =
SUM (E4:E10), = SUM (F4:F10), and = SUM (G4:G10) respectively.
b) Mean: It is calculated by= AVERAGE (A1:A10). Gross salary, taxes and net salary are
calculated by = AVERAGE (E4:E10), = AVERAGE (F4:F10), and = AVERAGE
(G4:G10) respectively.
c) Median: It can be calculated with the help of this formula = MEDIAN (A1:A10). Gross
salary, taxes and net salary are calculated by = MEDIAN (E4:E10), = MEDIAN
(F4:F10), and = MEDIAN (G4:G10) respectively.
d) Maximum value: With the help of this formula = MAX (A1:A10) can be calculated.
Gross salary, taxes and net salary are calculated by = MAX (E4:E10), = MAX (F4:F10),
and = MAX (G4:G10) respectively.
e) Minimum value: With the help of this formula = MIN (A1:A10) can be calculated.
Gross salary, taxes and net salary are calculated by = MIN (E4:E10), = MIN (F4:F10),
and = MIN (G4:G10) respectively.
There are four employees who have gross salary more than £79900.00 that is Rexford,
Morgan, Kara, and Rizwan.
There are six employees who have net salary less than £67499.99 that is Rexford, Kara,
Kevin, Rizwan, Whitney, and Billy.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

CONCLUSION
It is concluded that technology becomes necessary component of an organisation and
that's why they should understand the importance of technology. For that purpose, they need to
look forward towards the use of technology in organisations as it has been taking competitive
advantage. In organisations, big data is also used for understanding the customer’s needs and
wants. Due to increasing in technology, Cyber crimes are also increasing and that's why
measures should be taken. In addition to this, cellular network becomes the necessity of
organisation.
It is concluded that technology becomes necessary component of an organisation and
that's why they should understand the importance of technology. For that purpose, they need to
look forward towards the use of technology in organisations as it has been taking competitive
advantage. In organisations, big data is also used for understanding the customer’s needs and
wants. Due to increasing in technology, Cyber crimes are also increasing and that's why
measures should be taken. In addition to this, cellular network becomes the necessity of
organisation.

References
Books and journals:
Alshawaaf, N. and Lee, S.H., 2021. Business model innovation through digitisation in social
purpose organisations: A comparative analysis of Tate Modern and Pompidou
Centre. Journal of Business Research, 125, pp.597-608.
Cardoso, C.A., Torriti, J. and Lorincz, M., 2020. Making demand side response happen: A review
of barriers in commercial and public organisations. Energy Research & Social
Science, 64, p.101443.
Cloete, A.L., 2017. Technology and education: Challenges and opportunities. HTS Theological
Studies, 73(4), pp.1-7.
Di Vaio, A. and Varriale, L., 2020. Blockchain technology in supply chain management for
sustainable performance: Evidence from the airport industry. International Journal of
Information Management, 52, p.102014.
George, J.P. and Chandra, K.S., 2020, May. Asset Productivity in Organisations at the
Intersection of Big Data Analytics and Supply Chain Management. In International
Conference on Image Processing and Capsule Networks (pp. 319-330). Springer,
Cham.
Guerrero, M. and Urbano, D., 2019. Effectiveness of technology transfer policies and legislation
in fostering entrepreneurial innovations across continents: an overview. The Journal of
Technology Transfer, 44(5), pp.1347-1366.
Han, J.H., Wang, Y. and Naim, M., 2017. Reconceptualization of information technology
flexibility for supply chain management: An empirical study. International Journal of
Production Economics, 187, pp.196-215.
Jideani, P.C., 2018. Towards a cybersecurity framework for South African e-retail
organisations (Doctoral dissertation, Cape Peninsula University of Technology).
Kuhlmann, S., Stegmaier, P. and Konrad, K., 2019. The tentative governance of emerging science
and technology—A conceptual introduction. Research Policy, 48(5), pp.1091-1097.
Mushtaq, I. and Rizwan, A., 2018. Obstacles to knowledge sharing in engineering organisations: a
quantitative approach. International Journal of Knowledge Management Studies, 9(3),
pp.293-307.
Newman, N., 2018. Journalism, media and technology trends and predictions 2018.
Reeves, T., 2019. A postdigital perspective on organisations. Postdigital Science and
Education, 1(1), pp.146-162.
Books and journals:
Alshawaaf, N. and Lee, S.H., 2021. Business model innovation through digitisation in social
purpose organisations: A comparative analysis of Tate Modern and Pompidou
Centre. Journal of Business Research, 125, pp.597-608.
Cardoso, C.A., Torriti, J. and Lorincz, M., 2020. Making demand side response happen: A review
of barriers in commercial and public organisations. Energy Research & Social
Science, 64, p.101443.
Cloete, A.L., 2017. Technology and education: Challenges and opportunities. HTS Theological
Studies, 73(4), pp.1-7.
Di Vaio, A. and Varriale, L., 2020. Blockchain technology in supply chain management for
sustainable performance: Evidence from the airport industry. International Journal of
Information Management, 52, p.102014.
George, J.P. and Chandra, K.S., 2020, May. Asset Productivity in Organisations at the
Intersection of Big Data Analytics and Supply Chain Management. In International
Conference on Image Processing and Capsule Networks (pp. 319-330). Springer,
Cham.
Guerrero, M. and Urbano, D., 2019. Effectiveness of technology transfer policies and legislation
in fostering entrepreneurial innovations across continents: an overview. The Journal of
Technology Transfer, 44(5), pp.1347-1366.
Han, J.H., Wang, Y. and Naim, M., 2017. Reconceptualization of information technology
flexibility for supply chain management: An empirical study. International Journal of
Production Economics, 187, pp.196-215.
Jideani, P.C., 2018. Towards a cybersecurity framework for South African e-retail
organisations (Doctoral dissertation, Cape Peninsula University of Technology).
Kuhlmann, S., Stegmaier, P. and Konrad, K., 2019. The tentative governance of emerging science
and technology—A conceptual introduction. Research Policy, 48(5), pp.1091-1097.
Mushtaq, I. and Rizwan, A., 2018. Obstacles to knowledge sharing in engineering organisations: a
quantitative approach. International Journal of Knowledge Management Studies, 9(3),
pp.293-307.
Newman, N., 2018. Journalism, media and technology trends and predictions 2018.
Reeves, T., 2019. A postdigital perspective on organisations. Postdigital Science and
Education, 1(1), pp.146-162.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





