Sie sind auf Seite 1von 10

BIS 220 ENTIRE COURSE

BIS 220 Week 1 Individual Assignment Information Technology Acts Paper

Select two of the following acts to research:


Do Not Call Implementation Act, 2003
Controlling the Assault of Non-solicited Pornography and Marketing (CAN-SPAM) Act, 2003
Federal Information Security Management Act (FISMA), 2002
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and
Obstruct Terrorism Act (US Patriot Act), 2001, renewed 2006
Childrens Internet Protection Act, 2000
Financial Services Modernization Act, 1999
Childrens Online Privacy Protection Act (COPPA), 1998
No Electronic Theft (NET) Act, 1997
Health Insurance Portability and Accountability Act (HIPAA), 1996
Telephone Consumer Protection Act (TCPA), 1991
Video Privacy Protection Act, 1988
Computer Fraud and Abuse Act, 1986
Electronic Communications Privacy Act, 1986
The Cable Communications Policy Act, 1984
Electronic Funds Transfer Act, 1978
Family Educational Rights and Privacy Act, 1974
Fair Credit Reporting Act, 1970
Prepare a 350- to 1,050-word paper that answers the following question:
What were the advances in information technology that resulted in new ethical issues
necessitating the creation of each act?
Format your paper consistent with APA guidelines.

BIS 220 Week 2 Individual Assignment Information Systems Proposal

Resource: Table 2.2 in Introduction to Information Systems


Scenario: Imagine that you and a business partner are considering starting a small, brick &
mortar, nostalgic record store. Your friend does not have much experience with information
systems or technology, and needs a basic understanding of the different types of information
systems available to businesses.
Write a proposal of the types of information systems that would work well for your chosen
business, and their benefits and drawbacks. The summary must outline five types of information
systems. See Table 2.2 in Introduction to Information Systems.
Include the following in your summary using the features of Microsoft Word:
A table of contents
A table
A minimum of two styles
An image
Either a bulleted or numbered list

BIS 220 Week 4 Individual Assignment Social Media and Networking Presentation

Scenario: Imagine that you have been hired as a consultant for a university that wants to
leverage social media and networking technologies to encourage the collaboration of students,
and improve their overall sense of community.
Analyze how the university might integrate at least two social media and networking technologies
to accomplish their goals. Your analysis must cover the advantages and disadvantages of social
networking. The president of the university also needs to know what the system development life
cycle is, and how you intend on bringing social networking tools to life within this cycle.
Translate the critical details of your proposal into a 10- to 15-slide Microsoft PowerPoint
presentation that you will present to the university president.
Include the following in your presentation using the features of Microsoft PowerPoint:

A slide template
Slide layouts
Themes
At least one example of animation
At least one example of a media object
Submit your presentation as instructed by the facilitator

BIS 220 Week 5 Learning Team Assignment Final Submission

Resources: Ch. 1 & 2 of Excel in Microsoft Office 2010.


Scenario: Imagine you are an employee of Party Plates, a company that manufactures decorative
paper plates and napkins for special events. Your team has been assigned a new project. The
president of your company has tasked you with improving the efficiency of the current information
systems used in the sales department, because the current systems are somewhat antiquated.
Your organization is currently using Microsoft Excel to track all personnel data, but would like
to migrate to a relational database like Microsoft Access. You have also been tasked with
identifying potential collaborative software that may improve internal communications and help
streamline some of the work processes for the sales department.
Prepare a 350- to 700-word proposal addressing the potential implementation of new information
systems in your organization.
Explain the usefulness of converting data currently held in Microsoft Excel spreadsheets into
a relational database using Microsoft Access.
Describe the benefits of using Microsoft Access in the work environment.
Include suggestions for the future use of collaborative software and how it can help the sales
department improve communications and streamline work processes.
Format your proposal consistent with APA guidelines.
-------------

Scenario: The president of Party Plates has requested a second proposal from your team. She
would like information on wireless technologies and how they might be used in your
organization.
Write a 350- to 700-word proposal discussing wireless technologies.
Include the following in your proposal:
Your recommendation of at least two wireless technologies that would be beneficial to implement
in the Party Plates organization
The pros and cons for incorporating these two wireless technologies in your organization
A justification for the decision, and the risks of using wireless technologies in your department
A spreadsheet to track hardware or software requirements of your proposed wireless
technologies, including the associated costs
Include the following in your spreadsheet using the features of Microsoft Excel:
Use the SUM function in your spreadsheet to give a cost estimate of equipment needed
The date function
An additional math or statistical function of your choice
Format your proposal consistent with APA guidelines.
Submit your proposal and spreadsheet as instructed by the facilitator.
Present your proposal and spreadsheet as instructed by the facilitator
BIS 220 Week 5 Individual Assignment Final Examination
BIS 220 Final Exam
1) Two information systems that support the entire organization are
A. enterprise resource planning systems and dashboards
B. transaction processing systems and office automation systems
C. enterprise resource planning systems and transaction processing systems
D. expert systems and office automation systems

2) _______ is the direct use of information systems by employees in their work


A. Transaction processing systems
B. End-user computing
C. Decision support systems
D. Management information systems

3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities
A. Expert systems
B. Dashboards
C. Business intelligence systems
D. Decision support systems

4) _______ issues involve who may obtain information and how much they should pay for this
information
A. Privacy
B. Accessibility
C. Property
D. Transferability

5) _____ issues involve collecting, storing, and disseminating information about individuals.
A. Privacy
B. Accuracy
C. Property
D. Accessibility

6) Your companys computers have been taken over by an attacker and used to attack another
organizations information systems. Your problem is which of the following?
A. Poor security policies and procedures
B. Lack of due diligence
C. Downstream liability
D. Poor service-level agreements

7) You are the only person in your office to upgrade to Microsoft Word 2010. Before you share

documents with coworkers, you should do which of the following?


A. Print out a backup copy of documents
B. Run the Compatibility Checker
C. Burn all documents to CD
D. Create a document summary

8) Which of the following is detected by the contextual spelling checker?


A. Duplicate words
B. Irregular capitalization
C. Use of their when you should use there
D. Improper use of commas and other punctuation

9) If your cursor is near the bottom of a page and you want to display the next paragraph you
type at the top of a new page, you should use which of the following?
A. Enter
B. Ctrl+PageDown
C. Ctrl+Enter
D. Page Layout, Breaks, Line Numbers

10) Your ______ is the collection of traceable data that is captured when you use various
information technologies such as credit cards or the Internet
A. data profile
B. data shadow
C. database file
D. database record

11) No alphabetic characters in a social security number field is an example of


A. data isolation
B. data consistency
C. data integrity
D. data redundancy

12) In a database, the primary key field is used to


A. specify an entity
B. uniquely identify an attribute

C. identify duplicated data


D. uniquely identify a record

13) Search engines and metasearch engines are examples of which network application?
A. Communication
B. Discovery
C. Collaboration
D. Web services

14) ______ portals coordinate content within relatively narrow organizational and partners
communities
A. Personal
B. Affinity
C. Corporate
D. Commercial

15) Workflow, groupware, and telepresence systems are examples of which network application?
A. Discovery
B. Collaboration
C. Web services
D. Communications

16) Which type of e-commerce does an organization provide information and services to its
workers?
A. Business-to-employee
B. Consumer-to-business
C. Government-to-business
D. Business-to-consumer

17) _______ auctions are the most common auction model for large purchases.
A. Forward
B. Static
C. Reverse
D. Simple

18) ______ collect data from many points over an extended space.
A. Bluetooth networks
B. Ultra-wideband networks
C. Wireless sensor networks
D. Wi-Fi networks

19) Which type of satellite has the largest footprint?


A. Low earth orbit
B. Geostationary
C. Medium earth orbit
D. Equatorial orbit

20) Which of the following is the most appropriate wireless networking standard for creating
personal area networks?
A. Wi-Fi
B. Cellular radio
C. Microwave
D. Bluetooth

21) If cell D15 contains the formula =$C$5*D15, what is the D15 in the formula?
A. Mixed reference
B. Absolute reference
C. Circular reference
D. Range name
22) What should you do if you see a column of pound signs (###) instead of values or results of
formulas?
A. Increase the zoom percentage
B. Delete the column
C. Adjust the row height
D. Increase the column width

23) ______ feasibility determines if the project is an bis 220 final exam acceptable financial risk
and if the organization can afford the expense and time needed to complete the project
A. technical
B. economic

C. organizational
D. behavioral

24) In the traditional systems development life cycle, users


A. have no input
B. are important only in the testing phases of the project
C. are important only in the maintenance phase of the project
D. are limited to providing information requirements

25) To create a Microsoft PowerPoint presentation based on an installed template, click the
A. File tab, and then click New
B. File tab, and then click Open
C. Insert tab, and then select Add Template
D. Design tab, and then select New

26) Which of the following demotes a bullet point from the first level to the second level in Outline
view in Microsoft PowerPoint?
A. Shift+Tab
B. Tab
C. Decrease List Level
D. Ctrl+Tab

27) ________ connects parts of the intranets of different organizations and allows secure
communications among business partners
A. A global network
B. An intranet
C. An extranet
D. The Internet

28) ______ is a system with universally accepted standards for storing, retrieving, formatting, and
displaying information via a client/server architecture
A. FTP
B. World Wide Web
C. Newsgroups
D. The Internet

29) A process that allows users to place information in multiple, overlapping associations is
called
A. AJAX
B. tagging
C. a Wiki
D. blogging

30) ________ are websites that provide collections of content from all over the World Wide Web
A. Aggregators
B. Social networks
C. Mashups
D. Really simple syndications

Das könnte Ihnen auch gefallen