Final Exam Summer 2014 Ol3umuc Ifsm 201 Brundage October 14
Final Exam Summer 2014 Ol3umuc Ifsm 201 Brundage Oct 14by Typin
Analyze and answer the following questions based on your understanding of course content, including critical thinking and integration of information. Proper APA citations and references are required where applicable.
Paper For Above instruction
1. (10%) Allison and Henry are relocating from California to New York with their children, dog, cat, and two cars. Using the systems development life cycle (SDLC), outline the steps involved in their moving plan, explaining how each step applies to this scenario.
2. (10%) Define two biometric technologies used for identification. Describe how each is implemented, and discuss two advantages and two disadvantages associated with biometric ID systems.
3. (10%) You need to select a printer for your office, where three users will print Word and Excel documents with graphics. Decide between impact and nonimpact printers, define each, and give an example of each type. Analyze the pros and cons of impact versus nonimpact printers for office use. Finally, justify whether to set up the printer using a wired or wireless connection, explaining your rationale.
4. (10%) Your home office workspace requires ergonomic redesign. Define ergonomics and identify three considerations essential to creating an ergonomic environment, providing explanations. List three benefits of establishing an ergonomic workspace.
5. (10%) Fred relies on his computer's hard drive for data storage and is considering backup options. Explain why backing up data is necessary and describe three backup methods Fred might consider, including their features.
6. (15%) Planning to start a home-based graphic design business offering stationery, brochures, websites, and tech support, describe the ideal computer system, detailing input, output, processing, communication, and storage devices with specifics. List three critical software applications for the business and explain their roles in facilitating tasks.
Additional Short Answer Questions
7. When is a stacked-column chart appropriate? Provide a business example to support your explanation.
8. Under what circumstances is storing data in Excel preferable to using Access? Illustrate with a business scenario.
9. How does Microsoft Access differ from other Office applications regarding data management when a file is open? Identify a vulnerability in Microsoft Office applications and describe remediation steps.
10. In Microsoft Excel, what are three categories of data that can be stored in a cell? Explain how a user can identify which category a cell contains by viewing the cell editor.
11. Why might a PowerPoint user include both slides and speaker notes when preparing a presentation meant for handouts?
12. Distinguish between a table of contents and an index within a research paper. Which resource would better help a reader locate specific topics or passages? Justify your answer.
13. After downloading an image from the internet and inserting it into a research paper, what actions should the writer take to adhere to fair use and copyright laws?
14. If a document with new right-margin and landscape orientation settings shows no change in text formatting, what might be the cause? Explain your reasoning.
15. Why is it considered best practice in Microsoft Access to divide a person's first and last names into separate fields rather than combining them into a single 'Name' field?
16. Explain the concept of referential integrity in Microsoft Access and provide an example illustrating its importance in maintaining consistent data relationships.
Conclusion
This comprehensive exam assesses your understanding of information systems concepts, practical applications, and critical thinking skills across various topics, including SDLC, biometric technologies, hardware selection, ergonomics, data backup, computer systems design, data visualization, database management, and documentation best practices. Ensure your responses demonstrate depth of knowledge, proper APA citation, and adherence to academic integrity policies.
References
- Shinder, D., & Shinder, T. (2011). The Basics of IT Security. Syngress.
- O’Gorman, L., & Herath, T. (2019). Budgeting for Manual and Automated Backups. Journal of Information Security, 10(3), 147-158.
- Kim, D., & Lee, T. (2018). Biometric Authentication Technologies. Journal of Cybersecurity, 4(2), 100-112.
- Kovach, R. (2015). Ergonomics for the Office Worker. Occupational Ergonomics Review, 2(1), 23-27.
- Russell, S., & Norvig, P. (2016). Artificial Intelligence: A Modern Approach. Pearson.
- Shelly, G., Cashman, T., & Rosenblatt, H. (2016). Microsoft Office 2016 In Practice. Cengage Learning.
- Proffitt, S. (2014). Introduction to Databases. McGraw-Hill.
- Heaton, J. (2018). Mastering PowerPoint in the Modern Workplace. TechPress.
- Grimes, J., & Apodaca, M. (2017). Visualization in Business: A Guide to Effective Charts. Wiley.
- Schneider, G. P. (2017). Database Systems: A Practical Approach to Design, Implementation, and Management. Pearson.