IFSM 201 (December 2018) Full Course

Ace your studies with our custom writing services! We've got your back for top grades and timely submissions, so you can say goodbye to the stress. Trust us to get you there!


Order a Similar Paper Order a Different Paper

IFSM 201 Concepts and Applications of Information Technology

Week 1 Discussion

Sampling and Polls

Choose one question to complete your discussion. Students, please note, if there is noted duplication of topics and references you will be asked to rewrite your discussion.  Let’s be original with our work. For GROUP A students, please read the expectations posted in the discussion for week(1) with your name, thank you.)

1. How can you be fooled by data?

2. Why/How does the data collected in polls and studies lead us to incorrect conclusions?

3. What impacts do you think polls have or have had on you?

4. Do you pay attention to polls?

5. Do you think national polls impact peoples’ views on a topic?

Please respond to the discussion with APA references and citations.

 

IFSM 201 Concepts and Applications of Information Technology

Week 2 Discussion

Telecommuting and Teleworking

Choose one or more questions to complete your discussion. Students, please note, if there is noted duplication of topics and references you will be asked to rewrite your discussion.  Let’s be original with our work. Thank you.)

A network is a collection of computers and devices connected together. The internet is the world’s largest computer network.

This rise in telecommunications and both wired and wireless networks has opened up the possibilities for telecommuting.

When working typically at home but tethered to the company’s office is a safe bet you are telecommuting.

Studies have shown that telecommuting can actually increase a company’s productivity.

Teleworking, on the other hand, is working from anywhere using mobile devices and smartphones.

Teleworking, that is, working from anywhere, comes with a potential negative cost – the threat of “always working” and the parallel issue of “always being available or online.”

1. Would you like to have a job for which you telecommute or telework instead of going in to the office? Why or why not?

2. What are some of the advantages and disadvantages for you as the employee and for the business as the employer in having teleworking or telecommuting an accepted policy?

 

IFSM 201 Concepts and Applications of Information Technology

Week 3 Discussion

Your life is somewhere in a database

Choose one question to complete your discussion. Students, please note, if there is noted duplication of topics and references you will be asked to rewrite your discussion.  Let’s be original with our work. Thank you.)

Your life is somewhere in a database

1. Are you comfortable with giving away some of your privacy for increased security? Why or why not?

2. How far would you let the government go in examining people’s private lives?

3. Or how much access should we have to certain aspects of others’ private lives?

4. For example, should States share criminal databases?  Many TV shows depict law enforcement personnel accessing readily accessible databases that contain all types of records about individuals –records about everything from address to telephone records to finances, insurance, and criminal history.

5. Specifically, should a database of people paroled or released for crimes be made public?  Why or why not?

6. What about those who have committed other types of crimes?

7. Who should have access to the database? Why?

 

IFSM 201 Concepts and Applications of Information Technology

Week 4 Discussion

Consumer Protection – Who Can You Trust?

Choose one or more questions to complete your discussion. Students, please note, if there is noted duplication of topics and references you will be asked to rewrite your discussion.  Let’s be original with our work. Thank you.)

1. What is the difference between the Internet and Internet2? Why are there two variations and what is the use of each one? What about Cloud Computing?  Is it a utility which can be useful to both Internet and Internet2?

2.The World Wide Web has tremendous power and a major information resource. Is there a difference between the Internet and the World Wide Web? What are other avenues located on the World Wide Web, other than the Internet; or are these terms in reverse? After you review and understand the difference between the two technologies, name and discuss three specific sources.

3. When using the World Wide Web there is a utility known as ‘Browser’. Please research and reference your responses.  I look forward to seeing them. What did you learn or find interesting from looking at them?

a. http://en.wikipedia.org/wiki/List_of_web_browsers

b. http://en.wikipedia.org/wiki/Comparison_of_web_browsers

c. http://browsershots.org/

4. If you are shopping online, how do you determine whether the merchant is trustworthy?

5 Is it possible to determine trustworthiness when you walk into a store and need to use a credit card for a purchase?

6. Who is better positioned to regulate online transactions and handle irregularities or complaints – consumer advocacy groups or the government?

7. What is the method of filing a consumer complaint with a consumer protection office (government agency). Are consumer groups helpful?

 

IFSM 201 Concepts and Applications of Information Technology

Week 5 Discussion

Planning the Future- Emerging Technologies

This course is based on today’s emerging technologies.

1. What is the difference between the Internet, Intranet and the Extranet?

https://superuser.com/questions/135164/whats-the-difference-between-intranet-extranet-and-internet

2. How the Internet works?

How does it work:

3. Where is technology today as related to the World and the Internet?

Today less than half the world has Internet access:  https://www.youtube.com/watch?v=eOez_Hk80TI

 

IFSM 201 Concepts and Applications of Information Technology

Week 6 Discussion

Wireless convenience and risk

1.What risks and safeguards are associated with wireless communication?

2.What is “war driving” or “war flying”?

3.Are you comfortable (or would you use) a wireless “hot spot” to do computer work?

4.What safeguards might you use in accessing an unprotected (public) wireless communications?

5.Are you more at risk using a wireless connection via laptop or a connection via a smart phone?

Please respond to the discussion with APA references and citations.

 

IFSM 201 Concepts and Applications of Information Technology

Week 7  Discussion

Impacts of Information Technology

The readings this week raise issues that are direct or indirect effects of the use of information technology:

a) the digital divide

b) online addictions

c) online media – fact or fiction

d) positive and negative impacts of information technology on society

Ask or respond to the topics with the following questions.

1. How serious an impact does your chosen problem have on quality of life?

2. What could you do to lessen the impact in your life or the lives of loved ones?

 

IFSM 201 Concepts and Applications of Information Technology

Week 8 Discussion

The Future of Technology

Choose one of the following “developments in technology” and do some research on the current state of this technology.

 

Zero-size intelligence Neurohacking
Dark Networks Universal Translators
Avatars, Surrogates, Robotics DNA Computing
Quantum Computing Nanotechnology
Bendable notebook computers Filter bubbles
Careers in Data Science Best Technology Jobs in IT

 

 

 

IFSM 201 Concepts and Applications of Information Technology

Week 1 Quiz

 

Data 1

Data 2

Question 2

(True/False). Information about a person, place or thing remains the same over time.

 

Question options:

True

False

 

Question 3

(True/False). Data is made up by many pieces of information.

 

Question options:

True

False

 

Question 7

Knowledge flows from the information that has been generated. Which of the following does not necessarily flow from information that has been generated:

 

Question options:

 

The information can provide a better comprehension of a specific problem

 

 

Since information is based on data, and data is just the facts, the knowledge gained from the information is always correct.

 

 

The information can indicate what should be done and how it might be accomplished.

 

 

The information might suggest how one might be personally involved

 

Question 8

The following would be an example of which type of data:

 

Responses posted to an open-ended questionnaire related to religious beliefs

 

Question options:

 

Quantitative

 

 

Qualitative

 

 

Categorical

 

Question 12

Which of the following would be the best way to collect data regarding where your extended family would like to hold the next family reunion.

 

Question options:

 

A survey you design yourself

 

 

Acquire the data from a web site that lists favorite locations for family reunions

 

 

Acquire the data from a source the Open Access Directory’s data repository

 

Question 16

Based on your readings regarding the volume of big data, choose the list that represents the items in the list in terms of general to specific:

 

Question options:

 

Data Set, Data on the Internet, Big Data, Information in a 1,000-page Research Report

 

 

Big Data, Data on the Internet, Data Set, Information in a 1,000-page Research Report

 

 

Data on the Internet, Big Data, Information in a 1,000-page Report, Data Set

 

Question 18

Excel files are called:

 

Question options:

 

Worksheets

 

 

Workbooks

 

 

Pages

 

 

Tabs

 

Question 19

The Excel Ribbon has three modes – Auto Hide, Show Tabs, and Show Tabs and Command.  Which mode would you choose to enable the worksheet itself to take up the entire screen?

 

Question options:

 

Show Tabs

 

 

Auto-hide

 

 

Show Tabs and Commands

 

 

IFSM 201 Concepts and Applications of Information Technology

Week 2 Quiz  

 

Question 1

Chat messages are an example of:

 

Question options:

 

Information shared by individuals

 

 

Information shared by organizations

 

 

Information shared by firmware/software.

 

Question 6

If your home network has more than one computer computer or laptop or tablet or other internet enabled device that requires internet access or to use wifi, the component needed to support this is the:

 

Question options:

 

modem.

 

 

router.

 

 

fax machine

 

 

mouse.

 

Question 8

If you are connecting only one device (computer or laptop or tablet or other internet enabled device) to the network from a single location in your home and do not need wifi, the component needed is:

 

Question options:

 

a modem.

 

 

a router.

 

 

a fax machine.

 

 

a mouse.

 

Question 10

When discussing home networks, a server or a host is:

 

Question options:

 

the modem.

 

 

the router

 

 

One device that is physically connected to the router and through the router to the internet

 

 

Another computer in the home that needs to be connected

 

 

Question 13

(True or False). The Internet of Things means web pages with descriptions of devices that can connect through the Internet.

 

Question options:

True

False

 

Question 18

Which of the following would not be considered an example of a pre-defined function?

 

Question options:

 

MIN(A1:A8)

 

 

(A1 + A2)

 

 

SUM (A1 + A2)

 

 

COUNTA (A1:A8)

 

 

Question 20

Before you use the subtotal command, your data must be:

Question options:

 

filtered.

 

 

sorted.

 

 

summarized

 

IFSM 201 Concepts and Applications of Information Technology

Week 3 Quiz

 

Question 1

Which of the following would not be counted in a list of goals for having and using a knowledge management system (KMS):

 

Question options:

 

Facilitating better, more informed decisions

 

 

Stimulating cultural change and innovation

 

 

Utilizing information technology to manage data and information

 

 

Impacting performance across an organization

 

 

Building knowledge that can be used to streamline operations and improve processes.

 

 

Question 5

What are procedures that help keep a database current?

 

Question options:

 

A)

 

Database query procedures

 

 

B)

 

Report generation procedures

 

 

C)

 

File maintenance procedures

 

 

D)

 

Data entry procedures

 

Question 7

Does a database report allow the user to enter or modify data in the records? Select Yes or No.

 

Question options:

 

A)

 

Yes

 

 

B)

 

No

 

Question 9

Which of the following would be an example of a loss of record confidentiality in a database?

 

Question options:

 

A)

 

You make all your personal information on the Facebook site “public” and available to everyone.

 

 

B)

 

Although you clicked the option to “Do not share information with any other companies or sites” on an online bookstore’s website, you are getting unsolicited e-mail messages from some of the companies that post ads on that site.

 

 

C)

 

Your favorite online shopping site suddenly begins displaying a different mailing address than the one you use. You know you have not made any changes to your account profile.

 

 

D)

 

Your credit card company issued you a new card when your old one was about to expire.

 

Question 11

Your network administrator finds a virus in the network software. Fortunately, she was able to eliminate it before it resulted in a denial-of-service attack, which would have prevented legitimate users of the networked database from gaining access to the records needed. It turns out that the network software did not have adequate security protections in place. The fact that this virus was successfully inserted into the network software points to a ______ the network software.

 

Question options:

 

A)

 

threat to

 

 

B)

 

vulnerability of

 

Question 12

A staff/faculty member uses proprietary (owned and protected by the university) data from the university’s student financial records database in a graph that is part of a presentation at a computer education conference. Which of the following best describes the data issue?

 

Question options:

 

A)

 

Malicious data loss

 

 

B)

 

Intentional data leak

 

 

C)

 

Accidental data loss

 

 

D)

 

Malicious data leak

 

Question 13

Joachim is frustrated at a lack of job advancement opportunities at his current job. Before resigning, he deletes a set of data records that cannot be restored because there is no database backup procedure in place. Which of the following best describes this data issue?

 

Question options:

 

A)

 

Intentional malicious data loss

 

 

B)

 

Intentional malicious data leak

 

 

C)

 

Accidental malicious data loss

 

 

D)

 

Accidental malicious data leak

 

 

Question 14

(True/False). In terms of database access, risk assessments should address those who have legitimate credentials for viewing, entering, updating, or removing data from the database and those who are restricted from accessing the database or who have limited rights.

 

Question options:

A) True

B) False

 

Question 19

When creating a named range in Excel, which of the following rules apply:

 

Question options:

 

The first character of a name can be any character.

 

 

A named range can consist of any single character.

 

 

The name may include spaces.

 

 

The length of name is restricted to 255 characters.

 

 

Question 20

Which of the following is a valid named range in Excel:

 

Question options:

 

%ABCE

 

 

C

 

 

My Named Range

 

 

AVGCosts

 

 

IFSM 201 Concepts and Applications of Information Technology

Week 4 Quiz

Question 2

All other issues aside, a customer is __________ to do business or increase business with a company if a customer perceives that a service issue is not dealt with fairly.

 

Question options:

 

A)

 

likely

 

 

B)

 

not likely

 

Question 3

(True/False). The primary financial impact of a robust CRM system results from retaining current customers versus obtaining new customers.

 

Question options:

A) True

B) False

 

Question 11

(True/False). Whether the focus is acquisition, loyalty, retention, or service, a company’s use of CRM results in greater profits for the company.

 

Question options:

A) True

B) False

 

Question 12

Is the following an example of increasing brand awareness through groups or fans? Select Yes or No

 

When you sign on to your favorite social media website, a number of sponsored ads appear on your home page.

 

Question options:

 

A)

 

Yes

 

 

B)

 

No

 

Question 15

Is the following an example of increasing brand awareness through groups or fans? Select Yes or No.

 

Your instant messaging service attaches a message to the bottom of each message inviting the recipient to sign up for this same service provider.

 

Question options:

 

A)

 

Yes

 

 

B)

 

No

 

Question 17

When you sign on to your favorite social media website, a number of sponsored ads appear on your home page. Which category of social media advertising does this represent?

 

Question options:

 

A)

 

Direct advertising.

 

 

B)

 

Sending ads to a person’s network of friends.

 

 

C)

 

Increasing brand awareness through groups or fans.

 

 

D)

 

Using the company’s own social networking site.

 

 

E)

 

Viral marketing

 

Question 19

(True/False). Goal Seek allows to you put various parts together to calculate a result.

 

Question options:

True

False

Question 20

(True/False). To create a Pivot Chart, you would first select the Design tab from the PivotTable Tools.

 

Question options:

True

False

 

 

 

IFSM 201 Concepts and Applications of Information Technology

Week 5 Quiz

Question 1

(True/False). If the definition of an IS is the medium for recording and storing data, and disseminating information, this would be an IS from a functional perspective.

 

Question options:

True

False

 

Question 6

A decision support information system is which type of system?

 

Question options:

 

Operational

 

 

Tactical

 

 

Strategic

 

Question 7

Which of the following is an example of a tactical information system?

 

Question options:

 

TPS

 

 

MIS

 

 

DSS

 

 

IFSM 201 Concepts and Applications of Information Technology

Week 6 Quiz

 

Question 1

Which of the following statements would be most likely to appear in a professional association’s code of ethics for its members?

 

Question options:

 

A)

 

I will be use organizational supplies for official purposes only.

 

 

B)

 

I will maintain the confidentiality of my username and password.

 

 

C)

 

I will use my network account only for the purpose specified in my job description.

 

 

D)

 

I will keep my personal knowledge up-to-date and insure that proper expertise is available when needed.

 

Question 2

(Yes/No). Is this statement correct: Professional associations develop a code of conduct for members in order to guide and govern the professional behaviors of the members.

 

Question options:

 

A)

 

Yes

 

 

B)

 

No

 

Question 13

What is the typical relationship between a user access agreement and an employee code of conduct?

 

Question options:

 

A)

 

An employee code of conduct is a legally binding version of a user access agreement.

 

 

B)

 

An employee code of conduct is usually one part of a user access agreement.

 

 

C)

 

A user access agreement is usually one part of an employee code of conduct.

 

 

D)

 

A user access agreement specifies what penalties will be imposed when an employee violates the employee code of conduct.

 

Question 15

(Yes/No). Would the following be considered a violation of user access agreement?

 

Visiting social networking sites during lunch breaks.

 

Question options:

 

A)

 

Yes

 

 

B)

 

No

 

 

C)

 

Maybe

 

Question 23

A computer is completely compromised when it won’t turn on or operate. What is the best way to fix it?

 

Question options:

 

A)

 

Change all of your passwords in your online accounts

 

 

B)

 

Have it fixed by a computer professional

 

IFSM 201 Concepts and Applications of Information Technology

Research Paper

Research Paper Using Word

This assignment has two goals: 1) have students increase their understanding of

ethical issues related to the use of information technology through research, and 2)

learn to correctly use the tools and techniques within Word to format a research paper,

including use of available References and citation tools. These skills will be valuable

throughout a student’s academic career. The paper will require a title page, NO

abstract, three to five full pages of content with incorporation of a minimum of 3 external

resources from credible sources and a Works Cited/References page. Wikipedia and

similar general information sites, blogs or discussion groups are not considered

creditable sources for a research project. No more than 10% of the paper may be in the

form of a direct citation from an external source.

A list of topics from which students can choose is provided below.

Topics for Research Paper

The focus of the paper should be on the following:

1. how information technology supports or makes possible biometrics and its

various implementations, and potential ethical and privacy issues related to the

use of biometrics.

2. how information technology supports or makes possible the development of

artificial intelligence (AI) and intelligent agents (such as Siri, Cortana, etc.) and

potential ethical and privacy issues related to AI.

3. how information technology supports or makes possible the development of

robots as intelligent as humans, smart machines and the IoT, What potential

benefits and risks can/will robots introduce?

4. how information technology supports or makes possible genome-based

treatments for curing diseases, and potential ethical and privacy issues that

might result from use of such treatments.

5. how information technology impacts family, eldercare, and parenting issues, and

potential ethical and privacy issues introduced by the use of information

technology and information systems in this area

6. how information technology has enhanced the use of computer-assisted

education in the elementary school classroom, and the possible positive and

negative impacts this enhancement provides.

7. issues facing the IT Manager or Security professional (e.g., privacy, ownership,

control, accuracy, and security) in an environment where information technology

is constantly expanding and changing.

8. how information technology plays a role in the era of Edward Snowden, Chelsea

Manning, WikiLeaks, et and the impact on defense information systems

9. how information technology plays a role in the rise (and fall) of cryptocurrency

and the positive and negatives of switching to the bitcoin environment.

If there is another topic that addresses ethical issues as related to information

technology that is of special interest to you but one that is not in the list above, request

permission from your instructor before selecting this alternate topic.

Writing Quality for the Research Paper

* All Grammar, Verb Tenses, Pronouns, Spelling, Punctuation, and Writing Competency

should be without error.

* Be particularly careful about mis-matching a noun and pronoun. For example, if you

say “A person does this…” then do not use “their” or “they” when referring to that

person. “Person” is singular; “their” or “they” is plural.

* Remember: there is not their, your is not you’re, its is not it’s, too is not to or two, site

is not cite, and who should be used after an individual, not that. For example, “the

person WHO made the speech” not “the person THAT made the speech.”

* In a professional paper one does not use contractions (doesn’t, don’t, etc.) and one

does not use the personal I, you or your. Use the impersonal as in the previous

sentence. It is more business-like to say “In a professional paper one should not use

contractions,” rather than saying, “In a professional paper you don’t use contractions.”

*Remember: spell-check, then proofread. Better yet, have a friend or colleague read it

before submitting it. Read it out loud to yourself. Read it as if you are submitting it to

your boss.

You can find instructions on how to use the References tool in Word on a PC or

on a Mac in the separate file attached here.

Complete rubrics for this paper are found in the table on the next page.

 

IFSM 201 Concepts and Applications of Information Technology

Week 1 Assignment

Excel Project 1 – MS Excel

(Fall 2018)

Use the following project description to complete this activity (all the details are included in this document, in the 22 steps below). For a review of the rubric used in grading this exercise, click on the Assignments tab, then on the title “Excel Project 1.” Click on Show Rubrics if the rubric is not already displayed.

Summary

Create a Microsoft Excel workbook with four worksheets that provides extensive use of Excel capabilities including charting, and written analysis and recommendations in support of a business enterprise.

A large rental car company has two metropolitan locations, one at the airport and another centrally located in downtown. It has been operating since 2015 and each location summarizes its car rental revenue quarterly. Both locations rent four classes of cars: economy, premium, hybrid, SUV. Rental revenue is maintained separately for the four classes of rental vehicles.

The data for this case resides in the file fall2018rentalcars.txt and can be downloaded by clicking on the Assignments tab, then on the data file name. It is a text file (with the file type .txt).

Do not create your own data. You must use the data provided and only the data provided.

Default Formatting. All labels, text, and numbers will be Arial 10, There will be $ and comma and decimal point variations for numeric data, but Arial 10 will be the default font and font size.

 

IFSM 201 Concepts and Applications of Information Technology

Week 2 Assignment

Use the project description below to complete this activity (all the details are included in this document). For a

review of the complete rubric used in grading this exercise, click on the Assignments tab, then on the title

“Excel Project 2.” Click on Show Rubrics if the rubric is not already displayed.

Summary

Create a Microsoft Excel workbook with four worksheets that provides extensive use of Excel capabilities

including charting, and written analysis and recommendations in support of a business enterprise.

A large rental car company has two metropolitan locations, one at the airport and another centrally located in

downtown. It has been operating since 2015 and each location summarizes its car rental revenue

quarterly. Both locations rent four classes of cars: economy, premium, hybrid, SUV. Rental revenue is

maintained separately for the four classes of rental vehicles.

The data for this case resides in the file fall2018rentalcars.txt and can be downloaded by clicking on the

Assignments tab, then on the data file name. It is a text file (with the file type .txt).

Do not create your own data. You must use the data provided and only the data provided.

Default Formatting. All labels, text, and numbers will be Arial 10, There will be $ and comma and

decimal point variations for numeric data, but Arial 10 will be the default font and font size.

 

 

IFSM 201 Concepts and Applications of Information Technology

Week 3 Assignment

Excel Project 3 – MS Excel

Use the project description HERE to complete this activity. For a review of the complete rubric used in grading

this exercise, click on the Assignments tab, then on the title Excel Project #3. Click on Show Rubrics if the

rubric is not already displayed.

Summary

Create a Microsoft Excel file with four worksheets that provides extensive use of Excel capabilities for charting.

The charts will be copied into a Microsoft PowerPoint file and the student will develop appropriate findings and

recommendations based on analysis of the data.

A large rental car company has two metropolitan locations, one at the airport and another centrally located in

downtown. It has been operating since 2015 and each location summarizes its car rental revenue quarterly.

Both locations rent four classes of cars: economy, premium, hybrid, SUV. Rental revenue is maintained

separately for the four classes of rental vehicles.

The data for this case resides in the file fall2018rentalcars.txt and can be downloaded by clicking on the

Assignments tab, then on the data tile name. It is a text file (with the file type .txt).

Do not create your own data, you must use the data provided and only the data provided.

Default Formatting. All labels, text, and numbers will be Arial 10, There will be $ and comma and

decimal point variations for numeric data, but Arial 10 will be the default font and font size.

Writerbay.net

Looking for top-notch essay writing services? We've got you covered! Connect with our writing experts today. Placing your order is easy, taking less than 5 minutes. Click below to get started.


Order a Similar Paper Order a Different Paper