首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
图书馆每年组织读者采书活动以增加图书购进工作的针对性,采书活动中,通过Excel软件对数据整理录入,活动结束后,需对这些数据进行统计。用ASP.NET技术实现了对Excel文件数据的统计,为图书的购进工作提供了有效依据。  相似文献   

2.
刘荣 《电脑爱好者》1997,(10):27-27
当我们用Excel 5.0对产品的销售数据进行管理时,常常需要知道各类产品的当前销售情况以及当前库存情况,尽管Excel 5.0中的“分类汇总”命令(“数据”菜单)可以帮助我们方便地统计出各类产品的销售情况,但对于当前库存情况,用该命令统计就显得有些力不从心了。其实只需用Excel 5.0中的SUMIF函数,就可以实现当前库存情况的自动动态统计。  相似文献   

3.
Excel就是一个用于办公的电子图表软件,和它相对应的还有文档word。Excel主要是用于数据的统计和复杂的数据计算,通过数据整理分析能够得到很多的信息,然后用信息来完善管理。Excel在学校教育教学管理工作中的作用非常重要,学校的管理工作中的数据录入、统计、计算等很多工作,通过良好的应用Excel都能准确无误的表示出来。下面本文就对Excel在学校教育教学管理中的作用进行简要的总结。  相似文献   

4.
CGX 《电脑迷》2008,(7):80-81
在打印输出财会、税务和统计之类的报表时常碰到这样的问题:要求使用统一的报表纸,不能用一般的打印纸直接打印,必须把Excel中的数据套印到专用的报表纸上。考虑到报表数据多是在Excel中整理的,套印设置最好也能在Excel中实现,  相似文献   

5.
在统计学生大学四年的各科成绩的过程中,虽然教务系统可以导出Excel格式的原始成绩数据,但无法满足个性化的数据处理需求。为此,该文利用Excel VBA强大的数据处理功能,在对成绩统计及评定需求梳理的基础上,编程实现了学生成绩统计及评定方法,涵盖打开目标Excel文件、数据筛选、数据统计和综合评定等功能。结果表明,基于Excel VBA的数据处理能够满足个性化的需求,极大地提高了工作效率。  相似文献   

6.
Excel广泛应用于数据统计、电子表格处理等,如何有效地解决Excel和数据库间的数据交换是一个关键问题。分析了Excel XML表格文件的格式,研究了异构数据交换的基本原理,Excel数据和MySQL数据库之间互相交换数据的方法,以及采用PHP实现了交换数据。  相似文献   

7.
分段统计是最常用、最基本的统计方法,利用Excel的COUNTIF函数、FREQUENCY函数、数据透视表能轻松实现数据分段统计,提高数据处理效率。本文通过对成绩表中语文成绩的统计为例,详细分析了Excel中分段统计的实现方法以及各种方法的特点。  相似文献   

8.
数据分类汇总是经常要用到的数据统计方式,但Excel中的分类汇总命令执行结果并不是完整的数据统计汇总表,分类汇总结果也不直观。通过Excel宏程序可以很方便地进行完整意义的数据分类汇总统计。  相似文献   

9.
Excel是功能强大的工具,给我们的工作带来了太多方便,但要想实现复杂的数据计算与分析,如我们在国家助学金管理中要搞一些统计的话,用常规的方法费时费力,并且容易出错,而我们灵活运用Excel函数功能可以轻松地进行编辑与统计。  相似文献   

10.
随着学校教育信息化的不断发展,教育教学工作中的许多数据往往都是用Excel电子表格来处理,如学生成绩记载表、教师每月考核情况表和图书馆书目统计表等等。Excel电子表格不仅具有数据的统计功能,还具有数据的计算与分析功能.即使是学校会计部门使用的一些财务软件,也能最终把选定的数据导出转化为Excel数据。而在这些数据中,  相似文献   

11.
VB是大家较熟悉的计算机编程语言,而在不少的应用软件中已嵌套了面向对象的VBA,如果能掌握了VBA的使用将会使工作效率达到事半功倍的效果,这对工程技术人员非常重要,该文简要介绍了VBA的使用方法。  相似文献   

12.
Web上的数据挖掘技术和工具设计   总被引:27,自引:0,他引:27  
电子商务网站的网上业务量巨大,在每天的大量业务中蕴涵了许多用户的隐藏信息。每个顾客在WEB上的行为都会产生相关数据,这不只是包括购买的信息,而且还有利用搜索引擎和在站点内浏览的相关数据。所有的交互数据都可以被网站后台的数据库记录下来,这些大量的数据集合包含了对历史记录的市场分析以及数据驱动的市场预测非常有益的潜在信息。利用完善的数据库技术,现在的公司能够比较容易地搜集到大量的客户信息。而通过把数据挖掘在WEB上的应用,即WEB MINING技术,公司可以利用有效的顾客信息,发掘潜在的市场,提高竞争力。  相似文献   

13.
Cable & Wireless Plc acquired Exodus on the 1st February 2002.You think you’ve got BCP covered because you take regular backups and store them safely off site and perhaps even encrypt them … Think again. There is a whole plethora of devices and programs that facilitate your users accessing that data after you have dutifully restored it from your backup medium of choice. These facilitators contain secondary data and this data needs backing up and security measures as well, otherwise your primary data will resemble a newly restored vintage car: great looks, but no leaded gasoline available to run on.  相似文献   

14.
通过介绍U盘介质存储数据的原理,对不同文件系统(FAT、FAT32和NTFS)在U盘上逻辑和物理存储共性的分析,巧妙地将U盘数据进行全面清除,并且可以根据用户需要自行设定填充数据,以检验清除标识。  相似文献   

15.
Too often in the software industry, organizations approach project management in the same way a desperate gambler approaches the tables at Las Vegas or Monaco-with only one thought in mind: roll the dice. In a dice-tossing project, there is nothing you can do to improve your odds. Of course, that is not true for your software projects, but nothing you can do will make your risks go away completely. You can ignore them or you can deal with them explicitly. If you ignore your project's risks, all your other efforts will be for naught. Your project's success is based on opportunity and benefit, on cost and risk. Opportunity and benefit address the value of the delivered software. Cost and risk address the minimum and variable costs-in units of money, time and effort-that are necessary to deliver that product. Any form of risk management is better than none. If you have project management responsibilities, who should be dealing with the inherent risks of your project if not you?  相似文献   

16.
A firm grasp of metrics and how to implement them can prove vital to the health of your organization-and your career. To gain support from senior management, you must link technical metrics to business metrics-you must show how increases in productivity and quality translate into a better bottom line. So your business and strategy determine the metrics you track. Select measures that are obtainable and that truly matter to your organization's work. You also must be able to collect or derive the metrics data without undue burden. Remember that it's not the measures themselves that matter, but the decisions that will be based upon them. Measures that are expensive or cumbersome to collect will detract from the measurement program's perceived value. Overly intrusive or complex data collection can turn people off and encourage them to invent numbers. The best measures are those that are a natural outcome of people's work, like the number of batch jobs processed in a day or the amount of downtime a system records  相似文献   

17.
Peter StephensonThe concept of link analysis is fundamental in the tracing of various types of fraud. However, it also is quite useful for working out the suspected path of an attack. For link analysis to work well you will need a lot of data. The more data points you have that you know you can depend upon the better your chances of getting a reasonable back trace. In this month’s column we will discuss some techniques that you can use to perform a trace back to a suspected attacker. The reader should take note that there are reasons why this won’t work in some cases (we’ll cover those) and why you will need corroboration in any event.  相似文献   

18.
During the time around New Year, many pause to reflect what was and what will be. ‘What was’ is out of your control and a fond or sad memory. ‘What will be’ is where you will spend the rest of your life. The good news is you have sufficient control to make a fond memory for yourself and a sad one for your competition. Isn’t that a happy thought to ring in the New Year?  相似文献   

19.
Projected imagery in your "office of the future"   总被引:1,自引:0,他引:1  
Some day, high-resolution projected imagery will surround you in your office. The walls, your desk, and even the floor will serve as your computer desktop.  相似文献   

20.
Gray  W.D. 《Software, IEEE》1997,14(4):26-28
The issue here is not whether discount techniques should be used; they are inevitable. The issue is, in trying to do the best job you can with the ridiculously limited resources provided you, what should you do? How confident should you be in the techniques you are using? A bad design may come back and bite you. When you choose a technique to use in a hurry, you are placing your professional reputation and perhaps your job on the line. You deserve to know four things about any technique that you apply. The hit rate: How many real problems will this technique uncover? The false-alarm rate: How many (and what sorts) of things will it falsely identify as problems (that may not exist, but are costly and time consuming to “fix”)? What does it miss? What types of problems (and how many) does this technique not discover? The correct rejections: How confident are you in your discount technique's ability to flag problems? Discount techniques are not a substitute for the potent combination of analytic and empirical methodologies that usability professionals can bring to bear in designing and evaluating an interface  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号