Week of February 8th-20th
Week of February 8th-20th MIS 2223
Popular in Intoduction to computers
Popular in Business, management
This 4 page Class Notes was uploaded by Autumn Hubbard on Friday February 12, 2016. The Class Notes belongs to MIS 2223 at East Carolina University taught by Charles Justice in Winter 2016. Since its upload, it has received 41 views. For similar materials see Intoduction to computers in Business, management at East Carolina University.
Reviews for Week of February 8th-20th
These were really helpful...I'll be checking back regularly for these
-Ms. Abner Armstrong
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 02/12/16
MIS 2223 Autumn’s Notes Professor Charlie Justice th th Week of February 8 – February 12 Notes on Excel; Chapter 4 Programs and Apps; and, Chapter 5 Digital Safety and Security Monday in class notes Today in class, Prof. Justice took us through an Excel sample sheet. If you were in class, you may not need these notes (unless you want to do it again for practice). This is to help people that were not in class. Excel Example: (Mac) Pie Chart: Plug in your data, click insert or chart (Mac), Bar Chart: You can print the entire thing or if you just want to print the bar chart, you can click on the chart and the chart will be the only thing on the page. Freeze: Click the first value, go to view, click freeze pane Sortfilter: Could be a list of names. If you click in a column and go to ‘Data’, tell the column to go A to Z. You can go to ‘Sort’ and change the order of any column. Subtotals: Also found in you Data tab. If you have an older version you may have to go to your toolbar tab ‘Data’. Then you click subtotals. You can you this to add things up or sort things out. You can also click the numbers 1, 2, or 3 to collapse your data and see the more specific information. Function/ Names: Go to C and type ‘=proper(B1)’. This will turn WOOD to Wood. Then you will use the fill handle and pull down for all the names to apply to the entire spread sheet. Pivots: Go to Insert and go to Pivot table. Got to Data and then go to Pivot Table. Once you are in, you can choose which way you want your report to look. Options include sorting by region, sales or product. You use this to move around your data. Knowing how to use Pivot Table makes you a better employee. Like I said, if you didn’t come to class, it may be helpful to practice some of these skills before the Excel Project is due! I got an 100 on my first attempt on my project last time and between these notes and the training, I hope you can get the same! Chapter 4 and Wednesday in class notes Chapter 4 is on Programs and Apps. Discussion Questions: o Discuss 2 or 3 of the coolest apps on your phone. o What kind of app should they make to put out there? Apps and Programs are forever changing! Key Words, words I suggest we know for the test: Programs, Software, Applications (APP), Operating System, Productivity applications, Document Management, Bundle/suite, Free ware, Open source, shareware, web app Programs or software the instructions for the computer Operating System a set of programs such as Windows or iOS Software could be a web app, retail, public domain, freeware, mobile web apps. A web app is any application that you have to be on the internet to use Mobile Apps are made for smaller items such as phones Shareware is when an app lets you use it for free for a limited amount of time but eventually you have to pay. Freeware is a free program, app, or software. Open Source is an app that any one can go see the code and change it. Any one can copy these codes and change them. Firefox is an open source; Safari is not an open source they are owned by Mac. Productivity Applications: they can assist you in you daily living. Examples are word processing, Prezi, PowerPoint, database software, note taking software, calendar and contact management software, personal finance software, etc Legal software could make a contract for you. Document Management can create pdf so you can cut down on paper A bundle or suite is a group of software of related applications that are available as a unit. Any large organization, an enterprise, needs special computing to because they are so large. ECU uses Banner and Pirate Port. Graphics and Media Software CAD, Computeraided design Desktop publishing software Photo editing software Video or audio editing software Multimedia authoring software Website authoring software Communication apps Blogs Social Media Security Tools Personal Firewall monitors your computers transmissions and protects it from dangerous things Spyware is placed on your computer to collect information without you knowing Add ware gets on your computer that creates those pop ups Web Filtering Software Anti spam programs Phishing filters they are trying to get personal information. It makes you think that it is legit but it really is not. A phishing filter can monitor websites that try to get your personal Popup and Popunder blockers Anti virus Image Viewer Uninstaller a tool that removes programs Disk defragment!!! (will be on test) a tool that reorganizes the files and unused space on a computer’s hard disk. The operating system accesses the data more quickly. It’s the same reason you fold clothes and put similar items together! Defragging is organizing your files so it can run faster. Screen Saver were invented to keep the screen moving File compression tools PC Maintenance Back up tool or Restore tool Chapter 5 Digital Safety and Security Friday in class notes Discussion: Have you ever been hacked? Why do we have to have digital security? What happens if you get hacked? What are some examples of things that use the internet and may need protection? We need to be protective over social media because our personal information could be used to get into other accounts. For example, if someone sends you a friend request and you accept it. They can get your dog’s name or mother’s maiden name and hack into your bank account! We watched the video: ‘Top Hacker shows us how it’s done’ on YouTube We literally watched this all class! Conclusion: Everything; toasters, cars, baby monitors, and even key fobs, are PC’s. That being said, we have a lot of digital security concerns. Remember, if you’re reading this today (2/12), Chapter 5 quiz is due today!
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'