Learning Outcome 1 The learner will: Understand the meaning of Information System and related terms. Indicative Content



Similar documents
Learning Outcome 1 The learner will: Understand the functions and operating modes of different business information systems. Indicative Content

Bachelor of Information Technology (Incorporating Diploma in Information Technology (Levels 5 and 6)

NATIONAL CERTIFICATES (VOCATIONAL)

MULTIPLE CHOICE FREE RESPONSE QUESTIONS

Education and National Certifications

Education & Training Plan Computer Technician Professional with CompTIA A+ Certificate Program with Externship

Module 1 Concepts of Infor mation Technology (IT) Module Goals

3 SOFTWARE AND PROGRAMMING LANGUAGES

VCE VET INFORMATION TECHNOLOGY (General)

Professional Development Programme on Enriching Knowledge of the Business, Accounting and Financial Studies (BAFS) Curriculum

Data Security Policy

Unit Title: Personnel Information Systems Unit Reference Number: F/601/7510 Guided Learning Hours: 160 Level: Level 5 Number of Credits: 18

Learning Outcome 1 The learner will: Understand the purposes and benefits of performance and reward management. Indicative Content

G055/IC. APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY Networking Solutions ADVANCED GCE INSTRUCTIONS FOR CANDIDATES JUNE 2011

Model Assignment Issued July 2013 Level 4 Diploma in Business and Administration

OKLAHOMA SUBJECT AREA TESTS (OSAT )

Basic Computer Skills Module 2. Software Concepts

Fundamentals of Programming and Software Development Lesson Objectives

lesson 1 An Overview of the Computer System

K 1 2 K 1 2 K 1 2 K 1 2 K 1 2 K 1 2 K 1 2

The Ministry of Information & Communication Technology MICT

BTEC First Diploma for IT. Scheme of Work for Computer Systems unit 3 (10 credit unit)

Agreed Job Description and Person Specification

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

TYPES OF COMPUTERS AND THEIR PARTS MULTIPLE CHOICE QUESTIONS

Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship

Education & Training Plan IT Network Professional with CompTIA Network+ Certificate Program with Externship

TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX

OCR CAMBRIDGE LEVEL 2

ACCOUNTING TECHNICIAN COMPETENCY PROFILE

Canadian Technology Accreditation Criteria (CTAC) INFORMATION TECHNOLOGY - TECHNOLOGIST Technology Accreditation Canada (TAC)

XXX000YY Certificate IV in Government Security

The National Educational Technology Standards. (Upon which our local standards are based)

Coffeyville Community College COURSE SYLLABUS FOR COMP 161 COMPUTER INFORMATION SYSTEMS. Mrs. Darla Thornburg

Integration of. ERP systems and epages 6. with Web services

MICRO-COMPUTER BASED REAL ESTATE DECISION MAKING AND INFORMATION MANAGEMENT - AN INTEGRATED APPROACH

INFORMATION & COMMUNICATIONS TECHNOLOGY (ICT) PHYSICAL & ENVIRONMENTAL SECURITY POLICY

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Chapter 1. The largest computers, used mainly for research, are called a. microcomputers. b. maxicomputers. c. supercomputers. d. mainframe computers.

Mid-Term #1 Solutions

OPERATING SYSTEM SERVICES

Qualification Specification

N A T O U N C L A S S I F I E D

Customized Efficient Collection of Big Data for Advertising Services

Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time

Table 1: Stage 1, Semester 1

The role of computers in

Information Technology Career Cluster Introduction to Digital Technology Course Number

1 PERSONAL COMPUTERS

Recognition of Prior Learning (RPL) Certificate III in Business Administration

Competences: Specific Outcomes and Embedded Knowledge

University of Liverpool

THROUGH GRADE 12 COMPUTER TECHNOLOGY COMPETENCY STANDARDS FOR STUDENTS

Introduction to Computers & Information Technology

Release: 1. FNSACC407A Produce job costing information

ICAI3020B Install and optimise operating system software

DATA PROTECTION POLICY

How Interview Scheduling Software Simplifies the Hiring Process by Appointment-Plus Online Scheduling Software

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Principles of ICT Systems and Data Security

Test 1 Review Chapter 1 What is a computer? 1. Definition of computer 2. Data and information. Emphasize that data is processed into information. 3.

EUROPASS DIPLOMA SUPPLEMENT

Development of Information and Communication Technology Statistics in Hong Kong, China

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Problems and Measures Regarding Waste 1 Management and 3R Era of public health improvement Situation subsequent to the Meiji Restoration

PRIMARY SCIENCE. Syllabus for Primary Schools. Curriculum Department, Floriana

NETS for Students: Achievement Rubric

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

Sage ERP I White Paper

Cyber security exposure

Level 2 and 3 Award/Certificate/Diploma in Business Administration/Support ( /03/12/13/22/23)

Section 1 Spreadsheet Design

Information Systems: Definitions and Components

BARNET AND SOUTHGATE COLLEGE JOB RESPONSIBILITY PROFILE. Head of Human Resources & Organisational Development

Information Processes and Technology. Stage 6 Syllabus

Overview and History of Software Engineering

Basics of Computer 1.1 INTRODUCTION 1.2 OBJECTIVES

BUSINESS SCHOOL. Finance & Accounting. Build your future the INTEC way

Information Technology Curriculum Framework (TVET)

Computer Literacy. Hardware & Software Classification

SESSION 8 COMPUTER ASSISTED AUDIT TECHNIQUE

Date: December 17, 2010 Code: TECHNICAL LETTER HR/PCOS To: Human Resources Directors Response By: January 28, 2011

INFORMATION TECHNOLOGY

Transcription:

Unit Title: Introduction to Management Information Systems Unit Reference Number: F/505/4045 Guided Learning Hours: 100 Level: Level 4 Number of Credits: 12 Unit purpose and aim(s): This unit aims to give learners a sound understanding of: the meaning of Information System and related terms the purposes of the hardware and software components of a PC how to select a program development environment functions of common office packages data processing stages of computerised business applications the impact of the Internet and other recent technologies on business models and applications IT staffing and skills requirements the importance of adequate security safeguards in the operation of IT Learning Outcome 1 The learner will: Understand the meaning of Information System and related terms. 1.1 Explain the terms information and system. 1.1.1 Explain the meaning of the term system using examples from everyday life. 1.1.2 Distinguish between the terms data and information. 1.2 Explain the types of information needed by management. 1.2.1 Explain the reasons why managers need information in order to perform their varied roles. 1.2.2 Describe the different types of information (such as routine, exception and summary) with examples from the workplace. 1.2.3 Highlight the importance of relevance, timeliness and accuracy in the delivery of information. 1.3 Discuss the concept of an information system. 1.3.1 Explain the concept of an information system using familiar commercial examples. 1.3.2 Identify the common features of information systems in terms of data input, storage, processing and the output of results. 1.3.3 Illustrate the extent to which computer systems partly or wholly support the work of information systems. 1.3.4 Outline the features of computer systems in common use, ranging from laptops to supercomputers and including networked systems.

Learning Outcome 2 The learner will: Understand the major hardware and software components of a PC and their purposes 2.1 Name the major hardware components and describe briefly the function of each. 2.1.1 Distinguish between the central processing unit (CPU) and the peripherals. 2.1.2 Describe the primary function of the CPU. 2.2 Categorise the peripheral devices in common use and identify appropriate applications for them. 2.2.1 Identify the output peripherals in common business use and suggest applications for each one. 2.2.2 Describe the current data entry methods which are in general use. 2.3 Classify the backing store devices employed and summarise their properties and uses. 2.3.1 Explain the need for backing storage and provide examples of devices and their media. 2.3.2 Compare the main properties of fixed and portable backing store devices. 2.4 Distinguish between systems software and applications software, and illustrate typical functions in each group. 2.4.1 Explain the role and importance of software in computer systems. 2.4.2 Distinguish between the functions of systems software and applications software. 2.4.3 Describe the typical appearance of a graphical user interface (GUI) in a modern operating system. Learning Outcome 3 The learner will: Understand the importance of selecting an appropriate development environment for a project.

3.1 Describe, in outline, the typical stages in developing a software product. 3.1.1 Explain the importance of a systematic approach to the creation of effective software. 3.1.2 Describe the typical stages in the development of a software product using a high-level language. 3.1.3 Explain the role of translator programs such as compilers and interpreters. 3.2 Explain the benefits of program development environments as a means of increasing productivity. 3.2.1 Describe the features of a program development environment (PDE). 3.2.2 Justify the use of a PDE when developing a modern software product. Learning Outcome 4 The learner will: Know the common office packages used in business and their main functions. 4.1 Name the packages in common use in business. 4.1.1 Name the packages in common use, including word processing, spreadsheet, database, graphics, presentation, and email. 4.2 Describe the main functions of each package and how they contribute to office efficiency. 4.2.1 Describe the main functions of each individual software package. 4.2.2 Suggest ways in which each package can improve office efficiency. 4.3 Determine the value of integrating the functions of packages in a software suite. 4.3.1 Indicate what additional facilities can arise by integrating functions across packages. 4.3.2 Give examples to show the benefits of using integrated software suites in the business environment. Learning Outcome 5 The learner will: Understand the data processing stages of common business applications which have been implemented on a computer system.

5.1 Identify the data necessary for input to the system. 5.1.1 Identify, for a common application, such as payroll or stock control, the items of data which need to be input to the system. 5.1.2 Describe the checks and procedures which should ensure that data is stored accurately within the computer. 5.2 Suggest suitable file structures for data storage. 5.2.1 Explain the main methods of organising individual data files. 5.2.2 Suggest suitable file structures for common business applications. 5.2.3 Account for the need to relate several data files (tables) to form a database. 5.3 Describe briefly the likely processes applied to the data. 5.3.1 Distinguish between querying and updating processes using examples. 5.3.2 Compare the updating processes achieved by batch and online methods. 5.4 Summarise the results which are output from the system, and compare alternative methods of producing and disseminating the information. 5.4.1 Describe briefly the various media which can be used for issuing results produced by a computer system. Learning Outcome 6 The learner will: Understand the impact of the internet and other recent technologies on business models and commercial activities. 6.1 Distinguish between the internet and the services which it supports. 6.1.1 Explain what is meant by the internet and name the main services which it supports. 6.2 Describe the purpose of the main internet services such as the world wide web, email and file transfer protocol. 6.2.1 Describe the purpose of the main internet services such as the world wide web, email and file transfer protocol.

6.3 Describe well-known e- Commerce applications employed on the internet such as Amazon and ebay. 6.3.1 Explain the potential benefits and drawbacks of e- Commerce to businesses and their customers, including personal financial transactions (Electronic Funds Transfer etc.). 6.3.2 Describe well-known e-commerce applications such as Amazon and ebay. 6.3.3 Outline a typical procedure for obtaining goods or services using an e-commerce application. 6.4 Explain how mobile (wireless) devices can be used to communicate and obtain information. 6.4.1 Name the various media which can be used to obtain a connection to the internet. 6.4.2 Identify the hardware, software and services needed to communicate over the internet. Learning Outcome 7 The learner will: Understand the staff and skills required for effective development, implementation and use of computer systems. 7.1 State the job titles of individuals employed in a computer project. 7.1.1 List the job titles of the staff employed in the development of a computer systems project. 7.1.2 Identify the job titles of staff employed in the long-term support of a working computer system. 7.2 Outline the functions of, and the skills required by, the individuals identified in 7.1. 7.2.1 Outline the functions of the individuals identified in 7.1.1 and 7.1.2, and summarise the skills they require. Learning Outcome 8 The learner will: Understand the importance of adequate security measures in the operation of computer systems. 8.1 Outline the risks and threats to which computer systems are exposed. 8.1.1 Name the components of a computer system which are exposed to risk. 8.1.2 Categorise the threats faced by computer systems under the headings: accidental and deliberate.

8.2 Summarise the security precautions which should be adopted in order to achieve adequate levels of protection. 8.2.1 Explain the meaning of general methods of protection such as physical, technical and procedural. 8.2.2 Suggest practical precautions which should achieve a degree of protection for each of the threats in 8.1.2. 8.3 Describe the importance and the main contents of a business continuity plan. 8.3.1 Justify the need for a business continuity plan in every commercial organisation. 8.3.2 Summarise the main contents of a business continuity plan. Assessment: Assessment method: written examination (unless otherwise stated). Written examinations are of three hours duration. All learning outcomes will be assessed. Recommended Reading: Please refer to the Tuition Resources section of the Members Area of the ABE website (www.abeuk.com) for the recommended reading for this subject.