Free Essay

Bis 220

In:

Submitted By nicole2185
Words 337
Pages 2
Hot Red Nostalgic Record Store

Table of Contents

Intro I

Information Systems Table II

Conclusion III

Intro The Hot Red Record Store offers thousands of music records. The record store sales records written by songwriters from all over the country and we specialize in rare record hits that are hard to find. Consumers come to our store when they are unable to locate a record.
Not only do we offer thousands of music records, but our consumers also have the ability to record and download music to any electronic device such as an Ipod, Iphone, or Laptop. In order for the business to operate in a smooth operating manner, increase profits from record sales, and stay ahead of competitors we utilize different types of information systems that support the record store in the following functional areas: • Management Information System • Office Automation System • Transaction Processing System • Functional Area Information Systems • Increasing and Retaining the record stores’ budge

Information Systems Table
|TYPE |FUNCTION |EXAMPLE |
|Management Information Systems |Produces reports that are summarized from transaction data |Drafts reports on total sales from each |
| | |customer |
|Office Automation System |Support Daily work activities of individuals and groups such|Amazing system to work in any business the |
| |as Microsoft Office. |system will allow us to create many different |
| | |documents using excel, word, access and |
| | |PowerPoint. |
|Transaction processing system |This function processes transaction data from business |This is a great feature to utilize it makes |
| |events, such as a customer check-out system |check out accurate and fast. |
|Functional area Information |Supports the activities within a specific functional area |System for processing payroll |
|Systems | | |

Conclusion The above information system will benefit the store and assist in business operation, as well as assist in the company organization. The only problem I foresee with the information system is the ability to train employees on how to utilize the information system.

References

Rainer, R. K. & Cegielski, C. G. (2011). Introduction to information systems: Supporting and transforming business (3rd ed.). Hoboken, NJ: John Wiley & Sons.

----------------------- [pic]

Business Proposal

Similar Documents

Premium Essay

Bis 220

...SYLLABUS BIS/220 Introduction to Computer Application and Systems Copyright ©2014 by University of Phoenix. All rights reserved. Course Description This course provides an overview of Business Information Systems. Students learn to apply Microsoft® Office tools including word processing, spreadsheet, database, and presentation software to accomplish business objectives. Other topics include uses of application software and the Internet for effective problem solving, exploration of relevant emerging technologies, and how information is used across different industries. Course Dates 35 days Faculty Information Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents (both located on your student website): • Academic Policies University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Get Ready for Class • Familiarize yourself with the textbooks used in this course. Course Materials All electronic materials are available on your student website. Week1 Information Systems and Word Processing Tools Tasks • Download the new and improved Phoenix Mobile app. • Review the Week One Student Guide. 7 days Objectives/Competencies 1...

Words: 789 - Pages: 4

Free Essay

Bis 220

...Acts Research Paper BIS/220 August 1, 2012 Nik Johnson Acts Research Paper In this paper, we will examine the advances in information technology that has resulted in new ethical changes in implementing the Telephone Consumer Protection Act, 1998, and Do Not Call Implementation Act, 2003. The two acts that I researched go hand in hand with each other because each Act is implemented by the Federal Communications Commission. Also the Do Not Call Implementation Act, 2003 established as a result of the Telephone Consumer Protection Act, 1991. Both acts have been established to protect the consumer and his or her privacy. Thankfully, advances in information technology have assisted in the protection of consumers for unwanted calls and solicitations, but it has also made it easier for the uninvited calls. The Federal Communications Commission established rules and regulations that companies soliciting had to follow. One of the new rules required the companies to provide caller ID that would help with consumers who had caller ID to identify whether or not someone wants to answer the phone. Also they have to identify themselves and the company they are calling on behalf of when calling consumers. One of the original rules of the Telephone Consumer Protection Act, 1998 is that no solicitation phone calls could be made before eight a.m. and after nine p.m.. After many more complaints of unwanted phone calls from telemarketing companies the Federal Communications Commission along...

Words: 447 - Pages: 2

Premium Essay

Bis 220

...Living in a technology savvy world Kristian Agnew BIS/220 University of Phoenix February 16, 2013 3% similarity index The world that we live in and the worlds that our grandparents lived in, are more than likely two completely different worlds. There once was a time when people knew who their neighbors were, children played outside for recreation, when a loved one was missed, a letter was written or a telephone call from a landline was made, and books were read the old fashioned way (in paper form). That world seems like it was centuries ago, but it was only a few decades previous. In today’s society, if you haven’t seen a loved one, they are just a skype call or Facebook status away. Almost everyone has an email address. Due to this, a stamp and letter seems more extinct by the day. We live in a world where we have access to books right at our fingertips via our smart phones or tablets and children prefer video games rather than going outside to play with their friends. The advances in information technology have played a key role in shaping the rights we have and much of our day-to-day activities. An example of this would be HIPAA or the Health Insurance Portability and Accountability Act that was established in 1996. Around this time, medical facilities, including hospitals, and private practices, started implementing the use of digital medical records. To limit the amount of personal information being disclosed to anyone other than the patient...

Words: 680 - Pages: 3

Premium Essay

Bis/220

...Fair Credit Reporting Act 1970 University Of Phoenix BIS/220 Professor Bob Branch Congress enacted the Fair Credit Reporting Act in 1970 because the improper use of credit records. The reporting agencies put in place procedures for meeting the needs of commerce for consumer credit, personal insurance, and other information in a manner that is fair to the consumer, which is confidential, accurate, relevant, and properly used (Maurer & Thomas, 1997). The fair credit report act even has an impact on how employers conduct outside investigations on employees. The FTC made an amendment to the Fair Credit Report Act making newly expanded disclosures notification and consent requirements to apply to employers who use the Fair Credit Report Act when making employment decisions (Morgan, Owens & Gomes, 2000). Employers are required to provide in writing to employee’s using clear understandable language, stating that a consumer investigative report may be obtained for employment purposes. Employer must give notice to employee separate from any other disclosures. Employer must also give written consent before he or she can investigate further. If an employer decides that an investigation is an appropriate action second notice disclosure must be given to the employee. The employer has three days to request an investigative report for an outside consumer reporting agency. A third notice must be given to the employee of the nature of the investigation only if the employee requests...

Words: 509 - Pages: 3

Free Essay

Bis 220

...Don’t Call Implementation Act, 2003 And Telephone Consumer Protection Act, 1988 Bryan Allen BIS/220 December 11th, 2012 Jadie Giorgis Has there ever been a time when dinner is just about to start and in the middle of saying prayer the phone rings? Dad gets up to answer the phone and on the other end is a telemarketer. The telemarketer is trying to sell something and dad isn’t interested; its dinner time he says, or maybe it is some voice recording selling something. It has happened to just about everyone. Because there have been advances in information technology; the result has been the creation of Acts of Congress to address the ethical issues which could violate our right to privacy. In this essay two Acts will be discussed: The Telephone Consumer Protection Act of 1991 and The Do Not Call Implementation Act of 2003. Both acts have to deal with our rights to privacy. “In 1991, Congress passed the Telephone Consumer Protection Act (TCPA), the first federal law regulating the actions of legitimate telemarketers. Its purpose is to strike a balance between protecting the rights of consumers and allowing businesses to use telemarketing effectively. Regulated by the Federal Communications Commission (FCC), this law requires telemarketers to formalize their existing policies and, where necessary, create new ones to bring their operations into compliance with the following main restrictions” (code of ethics, 2005)...

Words: 665 - Pages: 3

Free Essay

Bis 220

...Proposal for Information Systems Roy L. Tucker BIS/220 October 18, 2012 Kendra Campbell Proposal for Information Systems Table of Contents Table…………………………………………………………………………………….3 Introduction…………………………………………………………………………….4 Challenges………………………………………………………………………………5 Solutions………………………………………………………………………………...5 Benefits.................................................................................................................6 Drawbacks……………………………………………………………………….6 Summary..………………………………………………………………………………6 References………………………………………………………………………………7 Table | Type of System | Function | Example | | | | | |Transaction Processing |Custom business applications including access |Ensures the availability, integrity and | |Systems |of data, inter-computer communications and |security of data. Manages point of sale, | |(TPS) |manage interface |transactions, credit cards, checks, cash | | | ...

Words: 1043 - Pages: 5

Premium Essay

Week 3 Bis 220

...Efficiency and Collaboration Proposal James M. McCarver, Jill Brogan, Judy Vilayphone, Lashunda Wallace, Laura Silberman, Mem Sanders BIS 220 May 13, 2013 Lars Vesterberg Efficiency and Collaboration Proposal The purpose of this proposal is to show you the potential implementation of new information systems at Party Plates. We are excited to introduce all the new changes taking place. The sales department is currently using Microsoft Excel but after looking around for something that would suit our needs better we found Microsoft Access. As technology and our business grow we are always looking for ways to improve. We will tell you how switching over to Access will benefit the company. We will also include suggestions for future use of collaborative software and how it can help the sales department improve communications. Stated below are the changes being made. Microsoft Access is a program that is used to store large data. Microsoft Access is very beneficial in the work environment, because of the different features that it offers, and it is easy to learn. The program is user friendly which incorporates other features offered through Microsoft Office. Without sacrificing performance, large amounts of data can be stored into the database. It is very easy to store available information into the database. If your office environment is large , Access may be programmed to retrieve information from the enterprise software. This short document will illustrate...

Words: 807 - Pages: 4

Premium Essay

Bis 220 Final Paper

...Wireless Technologies Proposal Keshia Smith, Joshua Crouch, Amber Kelly, JaLynn Coombs BIS 220 January 16, 2012 Michael Chu Wireless Technologies Proposal Mobile computing and mobile commerce in addition to a traditional computer system is what Party Plates will use to house information for the company at one location that could be accessible by a wireless device as well. If Party Plates want their services readily available, convenient to their customers, and to remain productive; then they may consider the use of wireless devices to compete with other businesses that supply the same services. Mobile services allow Party Plates as well as their customers to access information real-time while connecting from mobile devices and other computing environments. Whether Party Plates use mobile devices or remain in its current position, we are recommending mobile computing and mobile commerce as wireless services to move Party Plates into the future. The pros and cons of each service are listed within this proposal. Mobile computing refers to real-time wireless connection between a mobile device and other computing environments, such as the Internet. These days it is spreading everywhere, at work, at home, in education, health care, entertainment, and in so many other areas. The pros of mobile computing is its mobility to take a small hand held device and go anywhere and its broad reach to just about anywhere instantly [ (Rainer & Cegielski, 2011) ]. Mobile commerce...

Words: 619 - Pages: 3

Premium Essay

Bis 220 Week 2

...Information Systems Proposal Vince Wainwright BIS/220 2/16/2014 Instructor Alizadeh Scenario: Imagine that you and a business partner are considering starting a small, brick & mortar, nostalgic record store. Your friend does not have much experience with information systems or technology, and needs a basic understanding of the different types of information systems available to businesses. Write a 350 to 700 word proposal of the types of information systems that would work well for your chosen business, and their benefits and drawbacks. A brick and mortar record store must rely on its information systems for the smooth operation of daily operations. The types of information systems that are critical to a record store are Office Information System (employee tasking and email), Transaction Processing System (buying), and a Management Office System (tracking). These three systems are the key components for day to day operation of a successfully ran record store. Employees run the store thereby communication and work hours are important to log on a daily basis. An Office Information System will enable the managers and employees to engage in communications of daily activities, send emails, create reminders, maintain work hours and schedules. Communications of daily activities range from tasking to weekly schedules. Emails are used for fast communication and storing a paper trial of previous conversations and tasking. The maintenance of a weekly schedule...

Words: 368 - Pages: 2

Free Essay

Bis 220 Week 1

...The Up and Coming of Technology BIS-220 April 3, 2013 Charles "Page" Waller The Up and Coming of Technology Information technology is one of the most in demand fields in the world, because of the fact it has many influences in government policy that have passed through the years. The Fair Credit Reporting Act of 1970 and the Health Insurance Portability and Accountability Act (HIPAA) of 1996 were just a couple of policies effected by the impact of information technology. The policies were made to protect the American citizens in ways of obtaining free credit reports and the privacy of personal medical records, which individually will be discussed in the essay. "You hear the terminology Fair Credit Reporting Act and you think that's an act that only applies to credit reports," Paul Stephens (Dilworth, 2012). One would think this quote is right, but it is the complete opposite. In 1970, the Fair Credit Reporting Act was established to help citizens from getting ridiculed by massive organizations that wanted to use his or her credit reports against them. The organizations acquired the information that was only available to them and was not intended to be shared. The policy permitted everyone the right to keep track of his or her own credit report. This gives the companies restricted access to credit reports which under F.C.R.A one cannot share information with anyone, cannot affect him or her from getting a job, one needs permission to access information, and one can...

Words: 827 - Pages: 4

Premium Essay

Information Technology Bis 220

...Information Technology Acts     The act that first comes to mind when thinking about the advances in information technology that resulted in ethical issues would be the Patriot Act,2001, renewed 2006. The patriot Act opened so many door in the technology field that legally were not allowed to be opened in the first place. Shortly after 9/11 happened the Patriot Act came into affect and it stripped citizens of their privacy. The act allowed the government to put camera up at every traffic light, side walk, outside of buildings. As far as technology goes the act used every single piece that was available to use. With the new act in place people felt that there constitutional rights were being taken away and no one can take away American's constitutional rights. Ethically the government was filming and recording people without their consent and people were and still are feeling invaded. The use of this technology was to help America stop terrorists and yet just this year 2013 a terrorist act happened in Boston, a heavily filled area with technology and the government got the whole incident on tape and still was not fast enough or aware enough to stop it. The Patriot Act is still holding ethical issues with citizens and there freedom and privacy being taken. I know a lot of people who feel in between with the issue and I am one of them. I do like the fact that if I get into an accident in a city, there is probably a camera somewhere close that caught the entire thing on tape...

Words: 785 - Pages: 4

Free Essay

Bis 220 Tech Acts Paper

...Regulations: An Integral Part in the technology process Jake Barron BIS 220: Introduction to Computer Applications Abstract: Technology is an essential part of everyday life, but with the advances in technology problems with how to regulate certain aspects have arisen. Through certain laws, technology advances but remains safe and regulated. Technology is one of the fastest growing sectors in the business world. From the 1970’s to now, the advancements in this sector have been staggering. Innovation in the area of technology has brought us many amazing things that have made our lives easier and more productive. Through the integration of technology and business the world has become somewhat reliant on these advances. The more reliant we have become, the more susceptible we are to a rapidly growing issue. This issue is crime involving technological advances. There have been laws passed to protect ourselves and these are a couple of examples. Technology has not only played a vital role in communication but it has also played a vital role in commerce and the sharing of information. Digital Data such as music and movies can be purchased at the click of a button, but along with this freedom there lies an internal issue. As easy as it is to purchase, it was just as easy to find the same files free from users who are willing to share. This process of file sharing causes billions of dollars in loss for such intellectual properties. The No Electronic Theft Act (NET Act) was...

Words: 724 - Pages: 3

Free Essay

Bis 220 Information Systems Proposal

...Information Technology Raymond Hintz BIS/220 January 21, 2014 Oswald Angst Information Technology The phone rings, your in the middle of a project. Your monthly plan is almost out of minutes, you do not recognize the number but you are expecting an important call. You answer the call only to hear a recorded message asking, “If I could teach you how to make $1000.00 dollars a week would you be interested?” great another telemarketing call. Wasted time, wasted minutes on your phone plan and aggravation at the interruption of your day. There should be a law about this! Wait, there is. Advances in information technology have led to a huge increase in telemarketing calls to consumers. Calls come in from every avenue, marketing questions; solicitation for sales, investment opportunities, and political outreach, if you can talk about it a telemarketer is calling consumers to get their opinion, their vote or their money. Call centers have expanded from office buildings with employees making one call at a time calls to computers mass dialing consumers. Robo-calling has decreased the cost to telemarketers while increasing the volume of calls consumers receive. The per minute fees incurred by consumers for telemarketing calls to cellular phones led to many complaints and an increase in the need for a “Do Not Call” law. Consumers had for many years been irritated at telemarketers however the increase in volume of calls along with the new charges paid by consumers for calls to cellular...

Words: 820 - Pages: 4

Premium Essay

Bis 220 Helps Absolute Tutors / Bis220Helps.Com

...BIS 220 Entire Course FOR MORE CLASSES VISIT www.bis220helps.com BIS 220 Week 1 Individual Assignment Information Technology Acts Paper BIS 220 Week 1 DQ 1 BIS 220 Week 1 DQ 2 BIS 220 Week 2 LT Reflection Summary BIS 220 Week 2 Individual Assignment Information Systems Proposal BIS 220 Week 2 DQ 1 BIS 220 Week 2 DQ 2 BIS 220 Week 3 Individual Assignment Types of Electronic Commerce Activity BIS 220 Week 3 LT Reflection Summary BIS 220 Week 3 Team Assignment Efficiency and Collaboration Proposal BIS 220 Week 3 DQ 1 BIS 220 Week 3 DQ 2 BIS 220 Week 4 Team Assignment Wireless Technologies Proposal BIS 220 Week 4 DQ 1 BIS 220 Week 4 DQ 2 BIS 220 Week 5 LT Reflection Summary BIS 220 Week 5 Individual Assignment Social Media and Networking Presentation ********************************************************** BIS 220 Final Exam Guide FOR MORE CLASSES VISIT www.bis220helps.com 1) Two information systems that support the entire organization are 2) _______ is the direct use of information systems by employees in their work 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities 4) ______ issues involve who may obtain information and how much they should pay for this information 5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems. Your...

Words: 693 - Pages: 3

Free Essay

Bis 220 Helps Learn by Doing/ Bis220Helps.Com

...BIS 220 Entire Course FOR MORE CLASSES VISIT www.bis220helps.com BIS 220 Week 1 Individual Assignment Information Technology Acts Paper BIS 220 Week 1 DQ 1 BIS 220 Week 1 DQ 2 BIS 220 Week 2 LT Reflection Summary BIS 220 Week 2 Individual Assignment Information Systems Proposal BIS 220 Week 2 DQ 1 BIS 220 Week 2 DQ 2 BIS 220 Week 3 Individual Assignment Types of Electronic Commerce Activity BIS 220 Week 3 LT Reflection Summary BIS 220 Week 3 Team Assignment Efficiency and Collaboration Proposal BIS 220 Week 3 DQ 1 BIS 220 Week 3 DQ 2 BIS 220 Week 4 Team Assignment Wireless Technologies Proposal BIS 220 Week 4 DQ 1 BIS 220 Week 4 DQ 2 BIS 220 Week 5 LT Reflection Summary BIS 220 Week 5 Individual Assignment Social Media and Networking Presentation ========================================= BIS 220 Final Exam Guide FOR MORE CLASSES VISIT www.bis220helps.com 1) Two information systems that support the entire organization are 2) _______ is the direct use of information systems by employees in their work 3) ______ attempt to duplicate the work of human experts by applying reasoning capabilities 4) ______ issues involve who may obtain information and how much they should pay for this information 5) _____ issues involve collecting, storing, and disseminating information about individuals. 6) Your company’s computers have been taken over by an attacker and used to attack another organization’s information systems....

Words: 1222 - Pages: 5