CAPP06037 2022 Intermediate Business Technology
The aim of this module is to provide the learner with the essential technology skills required to work in a business environment. Practically, the student will learn how to create a spreadsheet that incorporates fundamental features and learn how to manipulate a database to generate the framework for storing information. The student will acquire an understanding of the theoretical aspects of the business environment.
On completion of this module the learner will/should be able to;
Design a fundamental spreadsheet with formulae, standard functions and charting capabilities.
Manipulate a database that contains tables, forms, reports and queries.
Theoretical Investigation into Modern Computing - Cyber Security, Information Systems, Business Ethics and Legal Issues
Teaching and Learning Strategies
The learner will be provided with direct instruction in a computer lab, to facilitate active and experiential learning. Various strategies will be used to improve student learning via lectures, class discussions, case studies, PowerPoint slides, audio and video clips.
Module Assessment Strategies
Students will be required to partake in two practical assessments, to demonstrate proficiency in the practical components of the module. Theory knowledge will be assessed using either online or offline MCQs.
If the student fails the module overall, he/she will be required to repeat the failed component(s) only, by means of examination(s) during the Autumn examination session.
- Enter, edit and format data,
- Create structured layouts,
- Insert, modify and delete columns and rows,
- Perform calculations using standard formulae and functions,
- Incorporate different types of cell references,
- Represent data visually,
- Protect important information.
- Examine existing relational database designs,
- Create forms and reports,
- Manipulate data using queries,
- Add and amend relationships and tables,
- Enter data via forms and tables.
Computer Theory (LO3):
- Cyber Security - Purpose. Intentional/unintentional threats. Difficulties in protecting systems. Cyber security controls. Social engineering, phishing, ransomware;
- Information Systems – What is data/information/knowledge? What is a computer-based information system? Capabilities of Information Systems. How does IT impact Organisations (reduction of middle managers and the way they do their job. ergonomic products, enabling people with disabilities to work with computers)?. Importance of Information Systems to Society (IT affects our quality of life, Robot Revolution, Improvements in Healthcare);
- Business Ethics - Definitions. What is a code of ethics?. Fundamental tenets of ethics. Four categories of ethical issues involving IT Applications (Privacy, Accuracy Property, Accessibility). What is privacy? Threats to privacy. Ethical analysis using case studies. Acceptable usage policy - IT Sligo;
- Legal Issues - Data protection act, GDPR. Freedom of information act. Intellectual property rights (patent, copyright, trademark). Social networking and the acts that govern the use of these sites.
Coursework & Assessment Breakdown
|Title||Type||Form||Percent||Week||Learning Outcomes Assessed|
|1||Spreadsheet||Continuous Assessment||Practical Evaluation||30 %||Week 6||1|
|2||Database||Continuous Assessment||Practical Evaluation||30 %||Week 12||2|
|3||Theory Assessment||Continuous Assessment||Assessment||40 %||Week 11||3|
Full Time Mode Workload
|Lecture||Not Specified||Formal Lecture||1||Weekly||1.00|
|Independent Learning||Not Specified||Self-Study||4||Weekly||4.00|
Required & Recommended Book List
2019 Management Information Systems Wiley
ISBN 1119588618 ISBN-13 9781119588610
Excel 2019 Bible John Wiley & Sons
ISBN 9781119514787 ISBN-13 1119514789
2021 Microsoft Access Robert Coding
ISBN 1802262989 ISBN-13 9781802262988
McFedries, P. (2019) Microsoft Excel 2019 Formulas & Functions. Microsoft Press 2019.
Support material prepared by lecturers and available to students on the college network or via Moodle.