Professional Documents
Culture Documents
INFORMATION SECURITY
DETAILED COURSE DESCRIPTION
As technology continues to advance, the Bank, like any other institution, is becoming more reliant on
computers for processing, storing and transmitting business information. If such data are leaked, it could
result in losses, bankruptcy, or even lawsuits against the organization. This course will teach you how to
secure your information from malicious attacks.
This course will teach you how to protect yourself and your computer from malicious attacks.
SKILLS LEVEL
Introductory
PREREQUISITES
None
SKILLS REQUIREMENT
RELATED COURSES
General I.T.
INFORMATION SECURITY
TABLE OF CONTENTS
This manual is designed to document the content of training seminars conducted by the Learning and
Development Team and to provide Bank staff with a reference on how specific software is used within
the Bank context. The topics are arranged in the same way they are presented during seminars and
outlined based on functional tasks.
Manual Conventions
This manual uses special text and design conventions to make it easier for you to find the information
you need.
Item Description
Select Bold Item Indicates an explicit item that you select, click, or type
Keycaps like Key Indicates a key in the keyboard that you must press
Arrow pointer Text Points to and provides a description for a significant part in a figure
Introduction | 3
I. INTRODUCTION
Computers have become the basic tool in processing, storing, and transmitting business information.
The Bank takes extra precaution on securing its electronic assets. This program will teach you how to
secure yourself and your computer from possible intrusion or malicious attacks.
Information Security deals with the protection of vital data, information, and information systems from
any unauthorized access or use. It is a vital element in any business organization that generates,
transmits, and stores data using computers.
Any kind of misuse or damage to any information would not only affect a single user but could
also lead to dire consequences to the entire organization. Information Security is needed to
reduce the business and legal risks, and to protect the reputation of the organization.
The CIA Triad is a widely accepted principle for Information Security models. CIA stands for
Confidentiality, Integrity, and Availability, which are considered the main components of any
Information Security Model. Other models may include Information Quality and Completeness.
1. Confidentiality
It refers to the protection of data and information from unauthorized view or read
operations. This component includes the privacy of information of the individuals in an
organization (i.e. E-mails, documents, etc.).
2. Integrity
It ensures data or information which is authentic and protected from unauthorized and
incorrect modifications. Hackers intercept data during transmission and modify it before
it gets to the original receiver.
3. Availability
It ensures the information is not denied to the authorized user.
Information security systems are composed of three (3) components used to apply the security
policies. Any attack to the security system is targeted to one or more of these components.
1. Hardware
It refers to the tangible parts (devices or appliances) of the security system. The
hardware is usually the most difficult to attack as it is usually physically located in a
secure room or building.
2. Software
It refers to the computer applications or software (including the Operating System) used
for implementing the security policy. Security updates and patches are usually available
every week or month. A number of attacks are done on this part of the security system,
as it is usually the most vulnerable.
3. Communications
It is the medium of transmission of information (i.e. wireless, cable, satellite, Wi-Fi, etc.).
Communication is important to determine which mode of transmission should be used,
and the corresponding disadvantages or vulnerabilities in using such medium. Wireless
communications is regarded as the least secure mode of data transmission.
1. Administrative Layer
This layer consists of approved written policies, procedures, standards, and guidelines.
In the Bank, Rules and Regulations for the use of ICT resources are stated in
Administrative Order 4.05.
2. Logical Layer
It is a layer that controls the use of information and systems by employing mechanisms
like password authentication, firewalls, intrusion detection systems, access control lists,
and encryption.
An important principle employed in the Logical Layer is the principle of least privilege,
which means that a user should not be granted more than enough access privileges
necessary to do his or her job, as these privileges might be misused or abused.
3. Physical Layer
It refers to the environment of the computing facilities. These facilities should not only
be protected from unauthorized access but also from potential damage caused by
accidents or disasters. Common examples include doors and locks, air conditioning,
smoke and fire detection systems, cameras, fences, security guards, etc.
Threats to Information Security | 6
Knowing what information security means is not enough to protect data and information. Users must
also be aware of the threats that endanger information security.
A. Classes of Threats
Depending on how information is being accessed, threats can be classified into four main
groups:
1. Disclosure
Confidential information is highly sensitive to disclosure. Hackers gain access to
sensitive data by intercepting transmissions through using wiretapping, or employing
Trojan horses and/or spyware.
2. Deception
An attacker uses one or more techniques to trick an authorized user to divulge sensitive
information to the attacker. A popular example of this is phishing.
3. Disruption
The threat affects the normal system operation of the information system. Users may
encounter a slow-down in the service, or it can become completely unavailable. Viruses
and other malware often cause computer units to lag, affecting user performance.
4. Usurpation
The worst kind of threat, although not common, that could be done to an information
system. The attacker is able to assume a form of control (or even full control) over the
information system.
B. Malware
From the words malicious and software, covers all software that has the intent to infiltrate or
cause damage to a computer system or network. This includes viruses, worms, Trojan horses,
spyware, rootkits, adware, crimeware, etc.
1. Forms of malware
Malwares may come in different forms, depending on how they run or what they do.
Most people refer to malware as viruses, although viruses only refer to a subset of
malware.
Viruses
A form of malware that infects files and replicates itself by attaching to other
host files.
Threats to Information Security | 7
Worms
Similar to viruses, but does not need a host program to replicate. Worms do not
need user intervention to spread; viruses, on the other hand, require the user to
execute the virus-infected file in order to spread.
Trojan horses
Trojans are computer programs that appear harmless but actually perform
undesired code.
Spywares
A program that runs on your computer, and keeps track of your habits (i.e.
surfing habits, keystrokes, etc.) and sends it to the author.
2. Susceptibility to malware
There are various factors that make a computer prone to malware. Some of the factors
are listed below:
Software need to be updated regularly to fix any exploitable bugs or defects.
When a large number of computers use the same software or come from the
same vendor, a hacker who is able to exploit the weaknesses of that software
can break into a larger number of computers than a network running on
different software.
The principle of least privileges states that a user should only have the minimum
amount of privileges to a system required to accomplish his or her task. Giving a
user more permissions to a system than needed can be a threat to information
security.
When you detect a malware in your system or if you think that your computer is
infected, you should update your anti-virus program and then perform a full system
scan/clean.
The default action for detected malware is to clean them, or if cleaning the
malware is not possible, the infected file will be deleted.
Threats to Information Security | 10
C. Phishing
It is a form of deception and criminal fraud by tricking unsuspecting users to divulge sensitive
information, such as usernames and passwords and credit card numbers, to a bogus website
designed to look and feel like a legitimate entity. Phishers usually lure their victims to their
phishing site via e-mail.
1. Phishing example
Below is an example of a phishing e-mail. Take note of the clues listed:
Authentic mails
would address you
by your real name
Details make it
more convincing
Address spoofing
A common trick that is easiest to spot is the misspelled URLs used by the
phisher. Phishers usually change the small letter “L” (“l”) with a capital “i” (“I”)
Phishers also make use of subdomains to trick users to thinking that they are
accessing a legit website.
Also, phishers can also make up an address that might look legit, for example,
http://portal.bank.org or http://login.bank.org, which could be clones of the
actual Bank Portal.
Link Manipulation
Be wary of what links or buttons you click for this might lead you to opening a
fake site. It is possible that the link you click can be renamed to look like the real
site, but actually opens the phisher’s site. You can verify this by moving pointer
onto the link and looking at the actual link on the status bar of your browser, as
in the example below.
Use of images
Phishers make use images and Flash objects to circumvent around spam filters
and anti-phishing tools.
Website forging
Phishing sites are made to look like the real one. One can usually verify the
authenticity of the site by simply looking at the URL in the address bar but some
phishers use script to hide the address bar and replace it with an image or
object displaying a legit URL.
Incorrect grammar/spelling
Threats to Information Security | 12
D. Other threats
1. Vishing
Similar to phishing, the victim is instructed to dial a phone number where sensitive
information may be gathered. The “visher” often uses an automated recording and
caller ID spoofing to fool the victim into believing he or she is calling a legitimate
company.
2. Pharming
A more sophisticated form of phishing is pharming. Instead of luring victims to a
phishing site, the “pharmer” compromises the victim’s computer and causes their
browsers to redirect to a fraudulent site, thus eliminating the need for e-mail baits.
3. Scams
Scams can be in the form of lottery winnings, free appliances, or other prizes that may
tempt you to click on a link. These will most likely open a malware-infected site.
4. Snooping
Any form of unauthorized interception of information. An entity is able to listen or read
communication or read through confidential files by wiretapping, or by employing
Trojan Horses or spyware. Key loggers can also be used to track keyboard strokes, which
are then used to acquire passwords.
Prevention and Protection | 13
A. Perimeter Security
The Bank uses multiple layers of security to protect its information assets from external access.
DMZs serve as an additional layer of security to protect the internal services and
resources of the Bank from any external attacker. The only way to access the Bank’s
internal network from outside is through the DMZ.
2. Firewalls
As additional layers of security, firewalls are setup between the Bank’s local network
and the DMZ. Servers exposed to the Internet are also protected by another firewall.
Also, as an additional security measure, the Bank firewalls are bought from different
vendors.
To regulate the delivery and application of resources of the Bank, while ensuring the security
and integrity of the Bank systems, the Bank has specified rules and regulations for all authorized
users. Failure to comply with the set rules may result to disciplinary and/or legal action.
Be careful when downloading files from the Internet or opening e-mail attachments
from unknown senders, which may contain malware.
Users are not allowed to visit any gambling, pornographic, phishing, and/or malware
sites. Although there is a system (Bluecoat appliance) that will filter the sites being
visited, it may not be able to completely filter all prohibited sites, take note that the
Bank has the right to record, monitor and log all network, mail, and Internet activities,
and the right to restrict or ban access to the network or mail, which can be used for
investigation.
Below are some guidelines for ensuring the physical security of your data:
Removable storage media must be stored in a locked drawer or cupboard, and
away from heat, liquids, food, and magnetic fields
A Director’s consent is required before taking portable equipment containing
sensitive data out of the Bank
Prevention and Protection | 15
Do not stay logged-in into your computer or e-mail if leaving your workstation
unattended for any prolonged period of time. Lock the door or log off from
Windows, or use locking screen savers.
For mission travelers, laptops should remain with you on board unless the
airport security does not permit it
To help ensure that your e-mail and files can only be viewed by the persons you authorize, you
can use encryption. Encryption is a method of converting data into a format that cannot be read
by another user.
To encrypt e-mail:
1) Create a new memo, and then click Delivery Options.
2) In the Delivery Options dialog box, click the Basic tab.
3) Under Security Options, check the Encrypt checkbox.
4) Click OK.
Encrypted mail cannot be read even by the people whom you have delegated
your mailbox to
Prevention and Protection | 16
To add a digital signature to the e-mail you send, check the Sign checkbox in the
Delivery Options dialog box of your Lotus Notes.
To encrypt a file/folder:
1) Right-click on the file or folder you want to encrypt.
2) In the context menu, click Properties.
3) In the File/Folder Properties dialog box, click Advanced.
4) In the Advanced Attributes dialog box, click Encrypt contents to secure data.
5) Click OK, and then in the Properties dialog box, click Apply or OK.
When you encrypt a file, you will be asked if you want to encrypt the parent folder as
well. Also, when you encrypt a folder, you will be asked if you want to encrypt the files
and subfolders inside it too. Whenever you save a file or move a file into an encrypted
folder, the file will become encrypted. A folder or a file cannot be compressed and
encrypted at the same time.
Prevention and Protection | 17
D. Passwords
The more popular method of user authentication is through the use of passwords. To access the
different information systems in the Bank, a password is required. Examples of systems that
require password authentication are your e-mail, mainframe, oracle self-service, and your
Windows operating system.
An account will be locked out after three (3) unsuccessful login attempts.
Although this feature is not available in Blackberries, it still has the security
feature of wiping out all the data after 10 failed login attempts.
Do not use personal information like your nickname, given name, phone
numbers, or address as basis for passwords.
Do not use dictionary words.
Combine letters and numbers, and if possible, some special characters like
dollar signs ($), or sharp signs (#).
Do not use generic passwords like “password”, “P@$$w0rd”, “123456”,
“abc123”, “opensesame”, etc.
3. Single Sign-On
The Bank has acquired software that allows users to log-in only once thus removing the
need to memorize all passwords used for the different Bank information systems.
Single Sign-On (SSO) stores all your passwords with your Windows password, and
whenever you log into a Bank system, SSO will automatically type your username and
password for you. It is important that your Windows password remains secret because
this serves as the master key for all your other passwords.
4. Changing passwords
As part of the Bank’s password policy, passwords need to be changed once every 90
days. Below are guides on how to change your Lotus Notes and Windows passwords.
E. IT Security-related Incidents
IT-related incidents should immediately be reported to the HelpDesk at local 335. Responses to
these incidents shall be reviewed by the Computer Systems Crisis Response Team (CSCRT),
chaired by the Principal Director of the IT Department.
Incidents caused by misconduct or gross negligence of a staff shall be subject to the provisions
of Administrative Order 4.05. Investigations shall be carried out by the HR Department or by
other departments/offices that may be concerned.
Officials are allowed access to all ICT resources and data (i.e. e-mail, documents, network logs,
Internet access records etc.) that may be needed for the investigation.
The Internet | 21
V. THE INTERNET
The Internet, or the Net, is a worldwide system of interconnected networks. Most people use the terms
Internet and the World Wide Web (WWW or Web) interchangeably, but these two are actually different.
The Web is a system of documents and files linked together by hyperlinks and URLS, accessed using the
Internet. In short, the Web is a subset of the Internet.
Common methods of connecting to the Internet include dial-up, broadband, Wi-Fi, and 3G.
1. Dial-Up
The most common and inexpensive method of connecting to the Internet is via dial-up,
where the computer literally dials the phone number of the Internet Service Provider
(ISP) to connect to the Internet.
Dial-up connections are also the slowest type of Internet connection, which has at most
a transfer rate of 56 kilobits per second (kbps).
2. Broadband
This mode of Internet connection uses multiple bands or channels for transmitting
information, thus providing a faster transmission rate than dial-up. This also allows users
to connect to the Internet and still have the telephone available to receive and make
calls.
Most cable and telephone companies offer broadband (commonly DSL) services to their
customers.
3. Wireless Internet
Wi-Fi is the new wireless technology available for connecting to networks and other
devices. In order to connect, the Wi-Fi enabled device must be in close proximity with
an access point, or hotspot. The Wi-Fi provider may require authentication.
Another emerging technology for wireless connections is the 3G, referring to the 3rd
generation of mobile communications. This provides great enhancements to
multimedia, video calls, telephony, and broadband wireless data transmission.
3G provides a wider area scope than Wi-Fi networks and are designed to provide
internet access and video calls. Wi-Fi are short-range but with higher bandwidth,
designed for data transmission.
The problem with wireless technologies is their relative insecurity. A technique, called
evil twin phishing, is used by scammers to steal private information using wireless
technologies. The attacker simply sets up a bogus hotspot posing as a legitimate
provider. Once a victim connects his or her laptop or mobile device to the network, the
attacker can then access and steal information from their computers or phones.
The Internet | 22
The Internet is a great source of useful information for any researcher, student, or just for
someone browsing. However, simple existence of a Web page does not guarantee the reliability
of its contents. Also, the thousands of pages returned from a search can sometimes be
overwhelming, and yet you will find nothing significant.
You must be specific when searching for particular information on the Web. List down the
specific terms, keywords, and names that can help you look for the information you need.
Synonyms can also help.
1. Search Engines
The most popular avenue for people to start looking for information is with the use of a
search engine. Leading search engines are Google, Yahoo, and MSN Live. Search engines
use keywords to search through millions of Internet sources stored in their databases.
Search engines also allow advanced searches to narrow down the results to a specific
domain or URL, or to a specific language or file type.
2. Meta-search engines
Meta-search engines work in the same way as a normal search engine. The difference is
that meta-search engines query results using multiple search engines.
3. Directories
Directories are compilations of Internet sources organized by topic and categories. This
is useful when you are looking for information regarding a broad topic. These pages
have been categorized by people, not computers, so you can be sure of results that are
more relevant.
A third party refers to any person, or entity, that is not a Bank Personnel. Every third party with a
contract to the Bank must be sponsored by a Bank Business Sponsor. Third parties include consultants
and contractors. Third parties are also subject to the Security Rules and Regulations of the Bank.
A. Access Control
Access to information by third parties is limited to those systems they need to accomplish their
work. For example, a consultant or a contractor may be able to access files in network drives
and given e-mail access, but may not have access to the Bank Mainframe.
B. Non-disclosure
Third parties working directly for the Bank must sign a Bank Non-Disclosure Agreement before
he or she is given access to the Bank network. Signing this agreement serves as an
acknowledgement that he or she will comply with the Bank Security Rules and Regulations.
C. Sanitization
Third parties come into the Bank with their own computing equipment (i.e. laptops, CDs and
DVDs, and Flash drives). They are responsible in ensuring that their equipment is free from
malicious software. Any equipment by third parties should be compliant to the Bank Rules and
Regulations before it is allowed to enter the Bank network.
INFORMATION SECURITY
QUICK REFERENCE GUIDE
This course will teach you how to work with functions and formulas. You will learn how to use the new
MS Excel 2007 user interface, insert functions faster using the AutoComplete tool, AutoCalculate cell
values, and apply AutoFill. The course also covers inserting basic mathematical, data, text, logical and
statistical functions.
This course will enable you to use the new features of MS Excel 2007 in inserting basic functions and
formula to compute for values in an Excel workbook.
SKILLS LEVEL
Intermediate
PRE-REQUISITES
SKILLS REQUIREMENT
RELATED COURSES
MS EXCEL 2007:
INTRODUCTION TO FUNCTIONS AND FORMULA
This manual is designed to document the content of training seminars conducted by the IT Learning and
Development Team and to provide the staff with a reference on how specific software is used within the
Bank context. The topics are arranged in pretty much the way they are presented during seminars and
outlined based on functional tasks.
A. Manual Conventions
This manual uses special text and design conventions to make it easier for you to find the information
you need.
Item Description
Select Bold Item Indicates an explicit item that you select, click, or type
Keycaps like Key Indicates a key in the keyboard that you must press
Text
Arrow pointer Points to and provides a description for a significant part in a figure
Introduction| 1
I. INTRODUCTION
This course will teach you how to work with functions and formulas. You will learn how to use the new
MS Excel 2007 user interface, insert functions faster using the AutoComplete tool, AutoCalculate cell
values, and apply AutoFill. The course also covers inserting basic mathematical, data, text, logical and
statistical functions.
Excel automates mathematical, logical and comparative operations using formulas. Whether it’s
numeric or date calculations, data or text manipulations Excel can be set to perform these tasks.
Formulas can compute for values using mathematical, logical and comparative operations. Aside from
computing numeric values, a formula allows you to compute for dates, join text data and even perform
title case change.
A. Creating Formulas
A Formula allows you to perform operations, such as addition, subtraction, multiplication, division
of numbers; or compare values.
When you create a formula in a cell, you start by typing the equal sign (=). It is then followed by a
series of arguments and operators.
First Argument
Second Argument
If you want to alter the order, use parentheses to group expressions in your formula. Excel first
calculates the expressions in parentheses, and then uses this result to calculate the formula. For
example, to add 3 + 5 first before multiplying the sum with 2, type the formula =(3 + 5) * 2.
Since the first two arguments are enclosed within the parentheses, Excel will first compute their
sum before multiplying the result by 2. If the parentheses are omitted, Excel will follow the
order of priority of operators and thus compute first for the product of 5 and 2 before adding it
to the value of the first argument.
Performing Calculations| 2
Result is 13
Result is 16
If you combine several operators in a single formula, Excel performs the operations in the order
shown in the following table. If a formula contains operators with the same precedence — for
example, if a formula contains both a multiplication and division operator — Excel evaluates the
operators from left to right.
Operand Operation
() Parentheses
- (negation) Negation (e.g. –1)
% Percentage
^ Exponentiation
* and / Multiplication, Division
+ and - Addition, Subtraction
& Concatenation
= < > <= >= <> Comparison
2. Parts of a Formula
Depending on the type of formula that you create, a formula can contain any or all of the
following parts:
Table II-2. Parts of a Formula
3. Using a Formula
To use a formula in a cell:
1) Select the cell where you want to enter a formula
2) Type = (an equal sign)
3) Enter the first argument
4) Enter an arithmetic operator
5) Enter the next argument
6) Repeat steps 4 and 5 as needed to complete the formula
Enter
7) On the Formula bar, click , or press
1
3 4 5
Figure II-3. Writing a Formula
B. Editing a Formula
You can edit a formula the same way you edit any cell content. You can edit either inside the cell or
in the formula bar
To edit a formula:
Select the cell that contains the formula you want to edit and do any of the following:
F2
Press
Click on the Formula bar
Performing Calculations| 4
Use Home, End or arrow keys to position the insertion point within the cells. The
Backspace and Delete key is used to erase unwanted characters.
C. Copying a Formula
You can paste the copied cells several times as long as the marquee line is visible. You
can copy this information to other worksheets or workbooks without losing your copy
area marquee.
ESC
The marquee line is visible until you press or perform any other editing action.
3. Using the Clipboard Group
Office applications contain a special location for storing copied information, called the
Office Clipboard. The Office Clipboard can hold any type of data. Items placed on the
Clipboard can be pasted one at a time or all at once and you can copy up to 24 items to
it.
┼ 3
2
Figure II-5. Using the AutoFill handle
You can populate empty cells by double clicking the AutoFill handle as long as
the column to the left of these cells contains data.
D. Deleting a Formula
Understanding Error Values| 6
To delete a formula:
1) Click on the cell that contains the formula
Delete
2) Press .
When you select two or more cells that contain values, Excel displays the average, count and sum of
the selected cells on the status bar. This is the AutoCalculate feature.
Selected Cells
When you right-click on the Status bar, the AutoCalculate area displays other options that are
available on the AutoCalculate feature.
The AutoCalculate area of the status bar displays information about the
selected values depending on the data type of the selected cells. The
AutoCalculate feature ignores selected cells that are blank.
Sometimes a formula returns an error value rather than your desired result. An error value is the result
of a formula that Excel can’t resolve. You can easily spot an error when you come across any of the
following:
#### The column is too narrow to display the value for Adjust the column size
the result of the calculation.
#VALUE You entered a mathematical formula that refers Check operands and arguments
to a text entry.
#DIV/0! You attempted to divide a number by zero. This Change the value or the cell
error may occur when you create a formula with reference
a divisor that refers to a blank cell.
#NAME? You entered a name in a formula that is not Be sure the name exists or
defined, mistyped or deleted correct the misspelling
#REF! You deleted a range of cells whose references are Change the formula reference
included in a formula.
#NULL Reference is made up of two areas that do not Check the reference and
intersect. For example, you inserted a space typographical error
instead of a comma (the union operator) to
indicate a range of cells
#NUM! Non-numeric values are used in the formula Make sure the arguments used
are numbers and not or text
values
#N/A A value is not available to a function or formula Enter the appropriate value in
or if you omit a required argument the cell referred to in the
formula or enter the required
value for an argument
Using Cell References| 8
When inserting a formula or function, you refer to the value in the cell using references. Cell reference
is denoted by a letter and a number combination which point the column and row of a cell, example
“C4” means column “C” row “4”. With cell references, Excel looks into the cells containing the data used
in a formula or function.
Relative Reference
2. Absolute Reference
An absolute reference is used when the cell reference must remain the same when
copied. In the example below, if you require a formula that always gets the sum of cells
A1 and A2 regardless of where it is moved or copied, your formula will look something
like this: =$A$1+$A$2.
An absolute reference is designated by two dollar signs ($) placed before the row and
column coordinates of the cell address. If the formula containing an absolute reference
is copied to other cells, the copied formula is the same cells in the original formula. Thus
the results of the original and copied formulas are the same.
Absolute Reference
3. Mixed Reference
If you need to use a formula containing values from a specific cell and a cell that
changes as the formula is copied, you can use a Mixed Reference. This type of cell
reference contains Relative and Absolute Reference.
Mixed Reference
Pressing the F4 key repeatedly will cycle through all the possible
placements of the dollar sign ($) in the formula.
V. NAMING TECHNIQUES
You can specify a name for a cell on range of cells and use it in defining a formula which will make the
formula more understandable. For example, if you refer to a range of cells in a formula as Unit Price and
another range as Quantity, you can create a formula for Total Price: = Unit Price + Quantity.
A. Naming Cells
3) From the Paste Name dialog box, click the name of the cell or range you want to
insert
4) Click OK button.
3 4
The Name Manager lets you keep track of named ranges in use together with their scope and any
comment you entered on the worksheet.
1. Using the Name Manager
To use the name manager:
1) Select the range of cells to be referenced by the name
2) Click the Formulas tab
3) Click Name Manager
4) Click the New button, the New Name dialog box appears
Naming Techniques| 12
2 3
5
6
12
13
3
Figure V-5. Cell name in the Name Manager
You can directly edit a cell range, constant or formula by click on the Refer to:
field then apply the necessary changes. Once finished, you can choose to click on
the Accept button which will apply the revision or click on the Reject button
to cancel the revision.
Figure V-7. Edit cell range using the Edit Name dialog box
An Array is a collection of items consisting of a group of elements that are accessed by indexing. Items
that comprise an array can be individually or collectively addressed in simple mathematical terms. Each
array argument must have the same number of rows (or columns).
You create array formulas in the same way that you create other formulas, except you press
CTRL+SHIFT+ENTER to enter the formula.
Array Formula
Array 1 Array 2
Figure VI-1. Sample Array Formula
A prompt will appear every time you attempt to modify any cell with an array
formula applied to it. This warning will inform you that you cannot change part
of an array.
6) Use the array formula by highlighting the range of cells where you want to apply the
formula; these include the cell where your formula was created
7) Press F2 to switch to the formula edit mode
8) Then press Ctrl + Shift + Enter to apply your array formula to the range
of cells.
Using an Array| 18
A function is a prewritten formula that takes in values, performs an operation and returns a defined
result. You use functions to simplify and shorten formulas on a worksheet, especially those that perform
lengthy or complex calculations. Excel supports worksheet functions in performing calculations. The
following are the different categories of Excel functions:
Cube
Database
Date and Time
Engineering
Text
Financial
Information
Logical
Math and trigonometry
Statistical
Lookup and Reference
A. Parts of a Function
1 3
Item Description
Function name The name of the function which is descriptive of the type of
operation to be performed
Applying Functions in a Formula| 20
1. Arguments of a Function
An argument is a reference to a cell or range of cells containing values. The table below
shows the different types of arguments:
Argument Example
Numbers 1,2,3
2. Operators
An operator is a symbol that can perform a function on any number of operands or
arguments. In Excel, operators are divided into categories, as shown in the table below:
- Subtraction 5-1
* Multiplication 7*3
/ Division 7/2
% Percent 90%
^ Exponentiation 7^2
, Separates arguments in a
(B3, B20)
(comma) function
The Formula AutoComplete feature guides you on how to define a formula with a screen tip that
comes out when you type the equal sign followed by the first letters of the function name. It comes
handy in complicated functions. It produces a list of functions and the corresponding arguments for
the chosen function.
1
2 3 4
Aside from typing the function directly into the cell, you can also insert a function using the Insert
Function Wizard.
Insert
Function
button
Function Library
AutoSum
button
Insert
Function
button
If you want to view detailed information about the function, click the
Help on the function link
Applying Functions in a Formula| 24
Field
Description
Result
Preview
Writing a formula and inserting functions can be a lot easier with a cell name. It also reduces errors
when referring to specific names rather than a cell address. Cell names are commonly used in formulas,
functions and print ranges.
You can insert cell names or name ranges into a formula by doing any of the following:
Press F3 on the keyboard. The Paste Name list appears
Select
Cell Name or
Range
from list
Figure VIII-1. Inserting Cell Name from the Paste Name dialog box
Figure VIII-2. Inserting a Cell Name using the Use in Formula button
If you cannot remember the exact name of the cell range activating the
Past Name list will allow you to immediately use cell name or range
created in the worksheet.
Using Cell names in Formulas| 26
You can easily view the available cell names applied on a workbook or worksheet by clicking on the
dropdown arrow located on the name box. From there you can view and select the cell names or
ranges.
Name Box
View available
Cell Name
or Range
Excel offers different categories of functions that can be used in financial, statistical, time, date, logical
tasks. These functions make it easy for you to create complicated formulas, listed below are some of the
most commonly used functions.
Math and Trigonometric functions allow you perform arithmetic operations such as add up values,
multiply numbers, calculate for factorial of a number, return the square root of a number, and even
display the smallest or largest values in a range.
B. Statistical
Statistical functions are used to calculate statistical or economic values, such as projected sales,
variance or standard deviation of a data sample, mean, median or mode of a set of values. Listed
below are some statistical functions you can use:
C. Financial
Financial functions perform common business calculations, such as determining the number of
years a loan can be paid, or calculating the interest rate of return given the investment costs.
Common financial functions are as follows:
=PMT(rate, nper, pv, fv, type) Produces the payment amount for each period of an
annuity
=PV(rate, nper, pmt, fv, type) Returns the present value (starting value) of a loan
=NPER(rate, pmt, fv, type) Computes the number of periods for an investment
based on periodic, constant payments and a constant
interest rate
D. Date
Date functions can be used to manipulate date and time, perform calculations on them, such as
computing for the number of days between two given dates or extracting the month, day or year
value of a given date. You can also use a date function to return the current date and time or insert
a date or time that automatically updates every time the workbook is opened.
E. Text
Text functions allow you to manipulate text values, with these functions you can join separate text
together in one cell, change character cases, or even extract a portion of a text. Listed below are
some of the text functions that you can use:
X. LINKING DATA
Linking enables you to consolidate data across several worksheets or workbook. It is the easiest and
most accurate way of creating summary sheets or pulling required information from different locations
without re-typing. Linking helps ensuring data accuracy with automatic update and recalculation
features. For example, you have reports that represent quarterly worksheets and a separate summary
worksheet on another workbook containing the total values in the quarterly sheets. Instead of copying
all the values in the quarter reports to the summary workbook, you can link them together with a
formula or function on the summary sheet. With linked data, any change made to the source
worksheet(s) will automatically update the related information to the destination worksheet.
4 6
First Argument
Second Argument
Enter
A. To Insert a Function
1. Select the cell where you want to enter a
function
2. Click the Formulas tab
3. In the Function Library group, click the Insert
Function button
4. In the Insert Function dialog box, in the Search
for a function:, specify the details of the
function your looking for then click GO