You are on page 1of 24

BIS/221

INTRODUCTION TO COMPUTER
APPLICATIONS AND SYSTEMS

**********************************************

BIS 221 Entire Course Link


https://uopcourses.com/category/bis-221/
**********************************************

BIS 221 Week 1 Overview of Information Systems Table


Complete the University of Phoenix Overview of Information Systems Table.
For each information systems type identified in the table, include the following in the
appropriate columns:
A description of the information systems type and its benefits

Example of each information systems type, the name of the vendor who built it,
and the vendor's website
Describe how you have seen them used in your organization or in an organization
that you are familiar with

Click the Assignment Files tab to submit your assignment.

Overview of Information Systems Table


Information
Systems Types

1. Databases
2. Networks
3. eBusiness

Description /
Benefits

Example of Each
(Including Vendor
Name / Vendor
Website)

How have you seen them


used in your organization
or an organization that
you are familiar with?

4. Wireless
5. Social Media
6. Customer
Relationship
Management
(CRM)
7. Supply Chain
Management
(SCM)
8. Business
Intelligence

BIS 221 Week 1 Knowledge Check


Week 1 Knowledge Check
The material presented below is not meant to be a comprehensive list of all you need
to know in the content area. Rather it is a starting point for building your knowledge
and skills. Additional study materials are recommended in each area below to help
you master the material.
Personalized Study Guide Results:
Score: 9 / 9
Concepts

Mastery

Questions

Microsoft
Word

100%

Ethical Issues

100%

Ethical Action

100%

Organizational
Influence
Societal
Influence
Business Process

100%
100%
100%

Concept: Microsoft Word

1
2
3

4
5

Mastery : 100% Questions :

1
2
3

Materials on the concept:


Understanding How Word Processors Work
Learn About Word Wrap
Introduction to Word Processing
Add Page Numbers
Format Text into Columns

Show More
1.
____________________ is a feature that enables you to type continuously without
pressing the Enter Key at the end of a line within a paragraph.

A.
Toggle

B.
Word wrap

C.
Print preview

D.
Full-screen mode
2.
What feature adds organization to your documents?

A.
Print preview

B.
Orientation

C.
Page number

D.
Find and replace
3.
If you want to display text in side-by-side sections, what feature should you use to
format the text?

A.
Styles

B.
Borders

C.
Multilevel lists

D.
Columns
Concept: Ethical Issues

Mastery : 100% Questions


:

4
5

Materials on the concept:


3.1. Ethical Issues
3.2. Privacy

4.
Which of the following is not an ethical issue?

A.

Privacy

B.
Business Process Reengineering

C.
Accessibility

D.
Accuracy
5.
Which of the following statements best describes the relationship between ethics and
legality?

A.
If an act is unethical, it is always illegal.

B.
An act can be unethical but still be legal.

C.
An unethical act is always legal.

D.
An unethical act always has legal consequences
Concept: Ethical Action

Mastery : 100% Questions :


Materials on the concept:
3.1. Ethical Issues
3.2. Privacy

6.

The ________________ approach to ethics maintains that an ethical action is the one
that provides the most good or does the least harm.

A.
utilitarian

B.
rights

C.
fairness

D.
common good
Concept: Organizational Influence

Mastery : 100% Questions :

Materials on the concept:


1.3. How Does IT Impact Organizations?
2.3. Business Pressures, Organizational Responses, and Information

Technology Support
7.
IT affects middle managers by ____________.

A.
increasing their opportunities for promotion

B.
reducing the number of people who can report to them

C.
increasing their productivity

D.
increasing the number of managers needed in a department
Concept: Societal Influence

Mastery : 100% Questions :

Materials on the concept:


1.3. How Does IT Impact Organizations?
1.4. Importance of Information Systems to Society

8.
Which of the following is a negative societal effect associated with the increased use
of information technology?

A.
IT can place employees on constant call.

B.
IT can provide opportunities for people with disabilities.

C.
IT can improve health care.

D.
IT can provide flexibility in the workplace
Concept: Business Process

Mastery : 100% Questions :

Materials on the concept:


2.2. Business Process Reengineering and Business Process Management
2.1. Business Processes

9.

______________ is an example of a business process.

A.
Spreadsheets

B.
Processing bills of material

C.
Sarbanes-Oxley

D.
A computer network

BIS 221 Week 2 Information Technology Ethics Issues Article


Summary
Locate a news article based on a recent event on ethical issues related to information
technology. For example, Wikileaks, Snowden, etc...
Summarize your findings of the event/issue in the article in a memo of 350-700 words:
Include the following in your memo using the features of Microsoft Word:

A Microsoft Word memo template


A table
A minimum of two styles
An image
Either a bulleted or numbered list

Format your assignment consistent with APA guidelines.


Click the Assignment Files tab to submit your assignment.

BIS 221 Week 2 Knowledge Check


Week 2 Knowledge Check
The material presented below is not meant to be a comprehensive list of all you need to know
in the content area. Rather it is a starting point for building your knowledge and skills.
Additional study materials are recommended in each area below to help you master the
material.

Personalized Study Guide Results:


Score: 9 / 9

Concepts

Mastery

Questions

Data Management

100%

Big Data

100%

E-Business
E-Commerce

and

IT Security

100%

100%

4
5

7
8

Concept: Data Management

Mastery : 100% Questions :

1
2

Materials on the concept:

1.

5.1. Managing Data

5.2. The Database Approach

7.2. Business-to-Consumer (B2C) Electronic Commerce

For which reason is it difficult to manage data?

A.

Data are scattered throughout organizations.

B.

The decreasing amount of external data needs to be considered.

C.

The amount of data stays about the same over time.

D.

Data security is easy to maintain


2.

When customers access a website and make purchases, they generate

A.

hyperlink data

B.

information

C.

web data

D.

clickstream data

Concept: Big Data

Mastery : 100% Questions :


Materials on the concept:

5.1. Managing Data

5.2. The Database Approach

3.

Big data is a term used to describe

A.

data generated in an accounting system

B.

the superabundance of data available today

C.

the reduction in the amount of data that organizations are interested in

D.

data elements that are too large to fit in database management systems

Concept: E-Business and E-Commerce

Mastery : 100% Questions :

4
5
6

Materials on the concept:

7.1. Overview of E-Business and E-Commerce

7.2. Business-to-Consumer (B2C) Electronic Commerce

4.

In which type of e-commerce are buyers and sellers individuals?

A.

Business-to-consumer

B.

Consumer-to-consumer

C.

Business-to-business

D.

Government-to-citizen
5.

Electronic business does not include which of the following?

A.

Electronically buying and selling

B.

Brick and mortar only retailing

C.

Electronic customer services

D.

Government-to-citizen websites
6.

What is e-commerce called when it is done in a wireless environment?

A.

Mobile commerce

B.

Consumer commerce

C.

Location commerce

D.

Wireless commerce

Concept: IT Security

7
8

Mastery : 100% Questions :

Materials on the concept:

4.5. Information Security Controls

4.3. Deliberate Threats to Information Systems

4.4. What Organizations Are Doing to Protect Information Resources

4.1. Introduction to Information Security

7.

Which type of remote software attack does not require user action?

A.

Worm

B.

Virus

C.

Phishing attack

D.

Denial-of service attack


8.

The threats to information security are

A.

staying about the same

B.

increasing

C.

decreasing

D.

not a concern to organizations


9.

Which type of alien software uses your computer to send e-mails that look like
they came from you to all the people in your address book?

A.

Spamware

B.

Adware

C.

Cookies

D.

Spyware

BIS 221 Week 3 Preventing Security Breaches Collaborative


Summary
Based on your Week Two collaborative learning team discussion:
Write a 350- to 700-word summary of the discussion your team had about preventing
security breaches in businesses in Week Two.
Click the Assignment Files tab to submit your assignment.

BIS 221 Week 3 Types of Electronic Commerce Activity


Complete the Types of Electronics Commerce Activity.
Take a screen shot of the completed activity, and submit it to your instructor in a
Microsoft Word Document.
Click the Assignment Files tab to submit your assignment.

BIS 221 Week 3 Knowledge Check


Week 3 Knowledge Check
The material presented below is not meant to be a comprehensive list of all you need to know
in the content area. Rather it is a starting point for building your knowledge and skills.
Additional study materials are recommended in each area below to help you master the
material.

Personalized Study Guide Results:


Score: 9 / 9

Concepts

Mastery

Questions

Computer Network

100%

Network
Applications

100%

Wireless
Technology

100%

Mobile Computing

100%

Pervasive
Computing

100%

Spreadsheet Design

100%

2
3

7
8
9

Concept: Computer Network

Mastery : 100% Questions :

Materials on the concept:

6.2. Network Fundamentals

6.1. What Is a Computer Network?

1.

A ______________ connects two or more devices in a limited geographical


region.

A.

WAN

B.

LAN

C.

MAN

D.

GAN

Concept: Network Applications

Mastery : 100% Questions :

2
3

Materials on the concept:

2.

6.4. Network Applications

6.3. The Internet and the World Wide Web

__________________ offer a single point of entry to an entire community of


affiliated interests.

A.

Affinity portals

B.

Industry-wide portals

C.

Mobile portals

D.

Corporate portals
Correct :
Affinity portals offer a single point of entry to an entire community of affiliated interests such as
hobby groups or political groups.
Materials

6.4. Network Applications

3.

__________________ is the largest-volume application running over the


Internet.

A.

Electronic bulletin boards

B.

Electronic chat rooms

C.

Web-based call centers

D.

E-mail

Concept: Wireless Technology

Mastery : 100% Questions :

Materials on the concept:

8.2. Wireless Computer Networks and Internet Access

8.1. Wireless Technologies

4.

Which is not a characteristic of GEO telecommunication satellites?

A.

Satellites remain stationary relative to point on earth

B.

Few satellites needed for global coverage

C.

Least expensive to build

D.

Longest orbital life

Concept: Mobile Computing

Mastery : 100% Questions :

Materials on the concept:

5.

8.3. Mobile Computing and Mobile Commerce

8.2. Wireless Computer Networks and Internet Access

Which is not a characteristic of mobile computing and wireless technology?

A.

No need for a PC

B.

Increasing prices

C.

Bandwidth improvement

D.

The cell phone culture

Concept: Pervasive Computing

Mastery : 100% Questions :

Materials on the concept:

8.5. Wireless Security

8.4. Pervasive Computing

6.

Which of the following is not a radio-frequency identification technology?

A.

Java code

B.

RFID

C.

QR code

D.

Barcode

Concept: Spreadsheet Design

7
8

Mastery : 100% Questions :

Materials on the concept:

Introduction to Spreadsheets

Planning for Effective Workbook and Worksheet Design

Exploring the Excel Window

Entering and Editing Cell Data

Identify Columns, Rows, and Cells

Show More
7.

Which is not a step to planning for effective worksheet design?

A.

Determine database security

B.

Format the numerical value in the worksheet

C.

Decide what input values are needed

D.

State the purpose of the worksheet


8.

The intersection of a column and row is a ____.

A.

formula

B.

cell

C.

function

D.

worksheet
9.

If a formula contains a direct or indirect reference to the cell containing the


formula, a __________________ exists.

A.

mixed cell reference

B.

formula cell reference

C.

circular reference

D.

formatted reference

BIS 221 Week 4 Sales Analysis Spreadsheet


Using the ABC Technologies Inc., Q1 2012 Sales spreadsheet, analyze the data on Q1
2012 Sales identifying the following:
Monthly sales by Region

Quarter One sales by Region


Monthly sales by Product
Quarter One sales by Product
Monthly sales by Region, by Sales people
Quarter One sales by Region, by Sales people
Create a graph or chart that compares the data in a meaningful way, i.e. compare
regions by month, compare products by month, etc...

Create a spreadsheet formatted to present your analysis of the sales numbers to


management. In your spreadsheet, use the following:
Use the SUM function

The date function


An additional math or statistical function of your choice
Fill colors to differential areas of your spreadsheet

Border lines to differential area of your spreadsheet

Click the Assignment Files tab to submit your assignment.

BIS 221 Week 4 Wireless Technologies and Networks in the Work


Environment: Collaborative Summary
Based on your Week Three collaborative learning team discussion:
Write a 350- to 700-word summary of the discussion your team had about wireless
technologies and networks in work environments in Week 3.
Include the following in addition to the summary:

What contribution did you bring to the discussion?


How did your portion compare to the rest of your teammates?

Format your assignment consistent with APA guidelines.


Click the Assignment Files tab to submit your assignment.

BIS 221 Week 5 Social Media and Networking Presentation

Scenario: Imagine that you have been hired as a consultant for a university that wants to
leverage social media and networking technologies to encourage the collaboration of
students, and improve their overall sense of community.
Analyze how the university might integrate at least two social media and networking
technologies to accomplish their goals. Your analysis must cover the advantages and
disadvantages of social networking. The president of the university also needs to know
what the system development life cycle is, and how you intend on bringing social
networking tools to life within this cycle.
Translate the critical details of your proposal into a 10- to 15-slide
Microsoft PowerPointpresentation that you will present to the university president.
Include the process of acquiring the correct information systems and applications
needed to effectively run these new pursuits.
Include the following in your presentation using the features of Microsoft PowerPoint:
A slide template

Slide layouts
Themes
At least one example of animation
At least one example of a media object

Format your assignment consistent with APA guidelines.


Click the Assignment Files tab to submit your assignment.

BIS 221 Week 5 The Importance of Measuring Enterprise Impact:


Collaborative Summary

Based on your Week Four collaborative learning team discussion:


Write a 350- to 700-word summary of the discussion your team had about enterprise
impact and measurement of business intelligence in Week 4.
Include the following in addition to the summary:

What contribution did you bring to the discussion?


How did your portion compare to the rest of your teammates?

Format your assignment consistent with APA guidelines.


Click the Assignment Files tab to submit your assignment.

BIS 221 Week 5 IT Roles and Responsibilities Worksheet (Final)


Complete the attached worksheet. This is due by 6pm on week 5. We will discuss this
during class so please bring one copy for me but you should have access to the
completed worksheet. When you print my copy, please make sure all columns print on
one page, rows can span multiple pages. Don't worry I have great eyes. Also, there is no
right and wrong answer just an incomplete one.
Read "Instruction Tab" before you begin
Click the Assignment Files tab to submit your assignment.

You might also like