Handbook - 2006 - 2nd Semester

Embed Size (px)

Citation preview

  • 7/27/2019 Handbook - 2006 - 2nd Semester

    1/12

    FACULTY OF BUSINESS

    NZ DIPLOMA IN BUSINESS

    COMPUTER CONCEPTS 444150

    SEMESTER 2, 2006

    PAPER HANDBOOK

    Contents

    1. Length, Aim and Topics

    2. Programme Overview

    3. Learning Outcomes/Assessment Criteria

    4. Student Capabilities

    5. Weekly Programme

    6. Assessments

    7. Prescribed Texts

    8. References

    9. Pre-requisites/Co-requisites

    10. Regulations

    11. Paper Team

    12. Timetable

  • 7/27/2019 Handbook - 2006 - 2nd Semester

    2/12

    Welcometo COMPUTER CONCEPTS 444150Paper of the NEW ZEALAND DIPLOMA IN BUSINESS

    1.0 Length, Aim and Topics

    Length: 56 class contact hours and 144 hours independent study

    The paper runs for 14 weeks and is structured as follows:

    one 2-hour practical session weekly

    one 1-hour tutorial (practical) session weekly

    one 1-hour theory session weekly

    Points: 20

    Aim: To provide students with:

    a working knowledge of information technology and how it relates

    to a business environment

    skills for enhancing personal productivity and problem-solving

    using appropriate business application tools

    Topics: (a) Components of a Business System

    (b) Hardware and Software

    (c) Data Communications Overview(d) Internet Technologies

    (e) System Security and Control

    (f) Ethical Issues

    (g) People Issues

    (h) Generic Computer Skills

    (i) Effective Use of Information Technologies

    2.0 Programme Overview

    The teaching and learning strategies used in this module are designed todevelop such capabilities (skills) as application of knowledge, problem-solvingand technical competence. Students will gain a conceptual view of amicrocomputer system, hardware and software, and be able to demonstrateskills in key programmes, eg, Word Processing, Spreadsheets and Database,to a business environment standard.

    The capabilities (skills) will be practised and then assessed under testconditions. The assessments will be in the form of three tests: one on-line

    theory test, one practical test and one combined practical and theory test.

    175971365.doc 2

  • 7/27/2019 Handbook - 2006 - 2nd Semester

    3/12

    3.0 Learning Outcomes/Assessment Criteria

    3.1 INFORMATION TECHNOLOGY IN BUSINESS

    3.1.1 Components of a Business System

    Learning Outcome Assessment Criteria

    At the completion of this topic, students will beable to describe the five components of abusiness system

    Define and discuss the interrelationshipsbetween the five components of a businesssystem, ie, people, procedures, data,hardware, software

    Utilise the five components as a framework in

    which to evaluate a system (large or small,multi or single-user)

    Explain the relationship between the levels of

    management and the different types ofinformation systems

    3.1.2 Hardware and SoftwareLearning Outcome Assessment Criteria

    At the completion of this topic, students will beable to identify and evaluate the varioushardware and software alternatives availablewhen considering the use of computer technologyin a business system

    Compare personal computer systems and

    select an appropriate system for a prescribedbusiness situation

    Describe different types of software and

    evaluate various software packages

    Explain the basic components of a personal

    computer and their related functions

    3.1.3 Data Communications Overview

    Learning Outcome Assessment Criteria

    At the completion of this topic, students will beable to understand the components of a datacommunications system

    Explain in general terms the working of a

    communication system and identify theequipment required

    Describe the characteristics of:

    Stand alone hardwareNetworked/distributed processingCentralised/multi-user processingRemote/mobile processing

    3.1.4 Internet TechnologiesLearning Outcome Assessment Criteria

    At the completion of this topic, students will haveknowledge and an understanding of internettechnologies

    Explain the uses and potential benefits of the

    Internet

    Describe internet terminology used such as

    URLs, HTTP, HTML, FTP, ElectronicCommerce, etc.

    175971365.doc 3

  • 7/27/2019 Handbook - 2006 - 2nd Semester

    4/12

    3.1.5 System Security and ControlLearning Outcome Assessment Criteria

    At the completion of this topic, students willunderstand the security associated with the useof Information Technology in business

    Identify the overall purpose of security in a

    computing environment

    Explain the procedures for, and the

    importance of, backup and recovery,passwords, disk handling and label checks.

    Demonstrate an understanding of the concept

    of protection and access control in relation tophysical and other threats, eg, viruses,natural disasters, physical access, firewalls,encryption control

    Discuss the need for systems control with

    respect to auditability, maintenance andrecoverability

    3.2 HUMAN INTERFACE OF INFORMATION TECHNOLOGY

    3.2.1 Ethical Issues

    Learning Outcome Assessment Criteria

    At the completion of this topic, students will ableunderstand ethical issues associated with the useof Information Technology in business

    Explain the concept and importance of ethics

    in a business computer environment anddiscuss the associated cultural issues fromorganisational professional and internationalperspectives

    Discuss the importance of privacy,

    particularly in relation to data stored in andreleased from a business computer system

    Discuss the issues relating to piracy,

    copyright and intellectual property

    3.2.2 People IssuesLearning Outcome Assessment Criteria

    At the completion of this topic, students willunderstand the interrelationship existing betweenthe user and the computer system

    Identify the causes, symptoms and remedies

    for health problems for InformationTechnology user problems

    Explain the importance of an ergonomic

    environment in an office Identify possible health hazards which may

    occur in the office, and be aware of staffwork procedures to prevent InformationTechnology user problems

    175971365.doc 4

  • 7/27/2019 Handbook - 2006 - 2nd Semester

    5/12

    3.3 SOFTWARE INFORMATION TECHNOLOGY TOOLKIT

    3.3.1 Generic Computer SkillsLearning Outcome Assessment Criteria

    At the completion of this topic, students will beexpected to demonstrate generic skills for theuse of computer hardware and software in abusiness environment

    Navigate the computer desktop

    Troubleshoot and solve basic software orhardware problems

    Multi-task and retrieve files between different

    applications

    Use appropriate document design techniques

    Use appropriate file management techniques

    Create, edit, save and print documents

    3.3.2 Effective Use of Information TechnologiesLearning Outcome Assessment Criteria

    At the completion of this topic students will beexpected to demonstrate that they can useInformation Technologies effectively to satisfy arange of outcomes in a business environment

    Students will be expected to use applications

    software effectively to satisfy all of theprescribed outcomes and three selectedelective outcomes identified below:

    Prescribed outcomes:

    Format formal business reports

    Produce charts and graphs

    Use formulae and manipulate data to aid

    decision making

    Use IF logic to perform tests on data

    Create forms for the input of data Edit and manipulate a database

    Extract information from a database and

    prepare ad-hoc reports

    Send and receive documents/messages

    electronically

    Retrieve information using online search

    facilities

    Elective outcomes:

    Customise the personal computer desktop

    Mail merge letters

    Produce overheads for presentations

    Create electronic slide shows

    Produce flyers/newsletters

    Digitise documents/images

    Automate repetitive tasks

    Link and/or embed objects into documents

    175971365.doc 5

  • 7/27/2019 Handbook - 2006 - 2nd Semester

    6/12

    4.0 Student Capabilities

    Successful students will develop practical skills through lecturer demonstrationand prescribed class exercises. Theory concepts will be developed throughlectures, student/lecturer discussion and group work.

    5.0 Weekly Programme

    See attached timetable.

    6.0 Assessments (Please note the assessment dates below. Some dates andtimes as shown in the 2006 Business Diploma and Certificate Handbookare incorrect.)

    Assessment 1 Theory 15%

    Assessment 2 Word Processing

    Spreadsheets

    PowerPoint

    45%

    Assessment 3 Database (20%)

    Theory (20%)

    40%

    All assessments are CLOSED BOOK.

    To obtain a pass in this module a student must:

    (a) sit all tests

    (b) obtain a minimum mark of 50% in the overall theory and practicalcomponents

    Assessment 1 TheoryDate and time Week 7, Friday 1 September, TBATime allowed 1 hr (plus 5 min. reading time)Contribution to final mark 15%

    Assessment 2 Word Processing and SpreadsheetsDate and time Week 11, Friday 13 October, TBATime allowed 2 hr 30 min. (plus 10 min. reading time)Contribution to final mark 45%

    Assessment 3 Database and TheoryDate and time Week 16, Monday 13 November, 1.30 pmTime allowed 2 hr 30 min. (plus 10 min. reading time)

    Contribution to final mark 40%

    175971365.doc 6

  • 7/27/2019 Handbook - 2006 - 2nd Semester

    7/12

    7.0 Prescribed Texts

    OLeary T.J. & OLeary L.I. (2006) Computing Essentials. (Complete ed.).McGraw-Hill/Irwin - available from Bennetts Bookshop on Campus.

    Future Track Workbook (2005) New Zealand Diploma in Business Computer

    Concepts. AUT available from Printsprint, 5 Wakefield Street.

    8.0 References

    Suggested reading/reference:

    Computing Essentials Online Learning Centre:www.olearyseries.com/ce06

    Computer Concepts paper information and materialautonline.ac.nz

    New Zealand PC World monthly magazine

    NZ NetGuide monthly magazine

    9.0 Pre-requisites/Co-requisites

    Nil

    10.0 Regulations

    Students should read the Faculty Business Diploma and Certificate Handbook (2006) and be familiar with theAssessment Policies and Guidelines, p 83. Inparticular, students should note the regulations with respect to:

    Integrity in Assessment

    Faculty Assessment Procedures

    Dishonesty in Assessment

    Special Consideration Applications and Procedures

    NOTE: Cell phones are not permitted in the classroom

    175971365.doc 7

  • 7/27/2019 Handbook - 2006 - 2nd Semester

    8/12

    11.0 Paper Team

    Judy Rowe

    Computing Business Applications

    Room WX, Level 4, Wakefield Street, AucklandPhone: 09 921 9999, Extension 5004

    Email: [email protected]

    Office Hours: by appointment

    Mary Hill

    Computing Business Applications

    Room WT410, Level 4, 1 Rutland Street, Auckland

    Phone: 09 921 9999, Extension 5745

    Email: [email protected]

    Office Hours: by appointment

    Evelyn Pedersen

    Computing Business Applications

    Room WX, Level 4, Wakefield Street, Auckland

    Phone: 09 921 9999, Extension 5021

    Email: [email protected]

    Office Hours: by appointment

    175971365.doc 8

  • 7/27/2019 Handbook - 2006 - 2nd Semester

    9/12

    12.0 Timetable, Semester 2, 2006: NZ Dip. Bus. 150 Computer Concepts

    Week Dates PracticalClass

    Theory Class TutorialClass

    StudentTasks

    Practical

    Assessment

    Type %

    1 Jul 17-21 Log in/File

    Management

    Components ofan information

    system

    Introductionto

    PowerPoint

    FileManagement/

    PowerPoint

    2 Jul 24-28 Email/IntroductiontoSpreadsheets

    Hardware andSoftware

    PowerPoint Future Track(FT) self-paced SS

    3 Jul 31-Aug 4 Spreadsheets

    Hardware andSoftware(contd)

    Intro toSpreadsheets

    FT self-pacedSS

    4 Aug 7-11 Spreadsheets

    Hardware andSoftware

    (contd)

    Spreadsheets

    FT self-pacedSS

    5 Aug 14-18 Spreadsheets

    DataCommunications Overview

    Spreadsheets

    FT self-pacedSS

    6 Aug 21-25 Spreadsheets

    DataCommunications Overview(contd)

    Spreadsheets

    FT self-pacedSS

    7 Aug 28 Sep1

    Introductionto

    WordProcessi

    ng

    Theory Revision WordProcessing

    FT self-pacedWP

    Theory written only

    15%

    8 Sep 4-8 WordProcessing

    InternetTechnologies

    WordProcessing

    InternetBrowsing/ FTself-paced WP

    AUT mid semester break

    9 Sep 25-29 WordProcessing

    InternetTechnologies(contd)

    WordProcessing

    FT self-pacedWP

    10 Oct 2-6 WordProcessing

    System Securityand Control

    WordProcessing

    FT self-pacedWP

    11 Oct 9-13 WordProcessingandSpreadsheetrevision

    System Securityand Control(contd)

    WordProcessingandSpreadsheetrevision

    FT self-pacedDB

    WordProcessingandSpreadsheets

    45%

    12 Oct 16-20 Introductionto Database

    Ethical Issues Database FT self-pacedDB

    13 Oct 23-27 Database People Issues Database FT self-pacedDB

    14 Oct 30 Nov 3 Database Theory Revision Database FT self-pacedDB

    15-16 Nov 6 17FinalAssessment

    Assessment weeksDatabase andTheory

    40%

    175971365.doc 9

  • 7/27/2019 Handbook - 2006 - 2nd Semester

    10/12

    NZ Dip. Bus. 150 Computer Concepts Theory Semester 1, 2006Textbook: Computing Essentials (OLeary & OLeary) 2006

    Week Learning Outcome Assessment Criteria Chapter andPage

    Referenc

    e

    LearningOutcome/s

    Reference

    1 Components of aBusiness System

    At the completion of thistopic, students will beable to describe the fivecomponents of abusiness system.

    Define and discuss the interrelationships between the fivecomponents of a business system, iepeople, procedures, data, hardware andsoftware.

    Utilise the five components as aframework in which to evaluate asystem (large or small, multi or singleuser).

    Explain the relationship between thelevels of management and the differenttypes of information systems.

    Ch 1

    Ch 11 p 322-323

    3.1.1

    2 Hardware and Software

    At the completion of thistopic, students will beable to identify andevaluate the varioushardware and softwarealternatives availablewhen considering theuse of computer

    technology in a businesssystem.

    Compare personal computer systemsand select an appropriate system for aprescribed business situation.

    Ch 1, p 11-14

    The BuyersGuide, p 465-469

    3.1.2

    3 Hardware and Software(continued)

    Describe different types of software andevaluate various software packages.

    Ch 1, p 9-10

    Ch 3,

    Ch 5

    3.1.2

    4 Hardware and Software(continued)

    Explain basic components of a personalcomputer and their related functions.

    Ch 6, p 150-159

    Ch 7, p 180-187,190-198

    Ch 8, p 212-226

    Ch 9, p 240-241,244-245

    3.1.2

    5 Data CommunicationsOverview

    At the completion of thistopic, students will beable to understand thecomponents of a datacommunications system.

    Explain in general terms the working ofa communication system and identifythe equipment required.

    Ch 9, p 241-245 3.1.3

    6 Data CommunicationsOverview(continued)

    Describe the characteristics of:

    Stand alone hardware

    Networked/distributed

    processing

    Ch 9, p 242-243,246-251, 254-

    258

    3.1.3

    175971365.doc 10

  • 7/27/2019 Handbook - 2006 - 2nd Semester

    11/12

    Centralised/multi-user

    processing

    Remote/mobile processing.

    7 Theory Revision

    175971365.doc 11

  • 7/27/2019 Handbook - 2006 - 2nd Semester

    12/12

    8 Internet Technologies

    At the completion of thistopic, students will haveknowledge and anunderstanding ofInternet Technologies.

    Explain the uses and potential benefitsof the Internet.

    Ch 2, p 30-37 3.1.4

    9 Internet Technologies(continued)

    Describe the terminology used such asURLs, HTTP, HTML, FTP, ElectronicCommerce etc.

    Ch 2, p 42-46 3.1.4

    10 System Security andControl

    At the completion of thistopic, students willunderstand the securityassociated with the useof InformationTechnology in Business.

    Identify the overall purpose of securityin a computing environment.

    Explain the procedures for and theimportance of, backup and recovery,passwords, disk handling, and labelchecks.

    Ch 10, 282-287 3.1.5

    11 System Security andControl(continued)

    Demonstrate an understanding of theconcept of protection and access controlin relation to physical and other threats,eg viruses, natural disasters, physicalaccess, firewalls, encryption control.

    Discuss the need for systems controlwith respect to auditability,maintainability and recoverability.

    Ch 10, p 287-289

    3.1.5

    12 Ethical Issues

    At the completion of this

    topic, students willunderstand ethicalissues associated withthe use of InformationTechnology in business.

    Explain the concept and importance ofethics in a business computer

    environment and discuss the associatedcultural issues from organisational,professional and internationalperspectives.

    Discuss the importance of privacy,particularly in relation to data stored inand released from a business computersystem.

    Discuss the issues relating to piracy,copyright and intellectual property.

    Ch 10, p 273-279

    3.2.1

    13 People Issues

    At the completion of thistopic, students willunderstand theinterrelationship existingbetween the user and thecomputer system.

    Identify the causes, symptoms andremedies for Information Technology

    user problems.Explain the importance of an ergonomicenvironment in an office.

    Identify possible health hazards whichmay occur in the office, and be aware ofstaff work procedures to preventInformation Technology user problems.

    Ch 10, 290-294 3.2.2

    14 Theory Revision

    175971365.doc 12