Cis 500

In: Business and Management

Submitted By kalitn
Words 488
Pages 2
[pic]

Final Project: The Broadway Café
Click on www.cohesioncase.com to view all of your assignments which are located in the content areas of the Cohesion Case Diagram tab. It is recommended that you work on each piece of the final project during the topic week in the course. Simply follow the hyperlink in each component to view your assignment. Please complete parts 1 and 2 during Week 5 and parts 3, 4, and 5 during Week 10.

The Broadway Café Overview
You have recently inherited your grandfather’s coffee shop, The Broadway Cafe, which is conveniently located in downtown (your city). The cafe offers many different kinds of specialized coffees, teas, a full service bakery, and homemade sandwiches, soups, and salads. Your grandfather first opened The Broadway Cafe in 1952 and it was a local hotspot for many years. Unfortunately, business has been steadily declining over the last five years. Although your grandfather was an expert at running the coffee shop, it is outdated. There are no computers in the store and all ordering takes place manually. Your grandfather had a terrific memory and knew all of his customers by name, but unfortunately, none of this information is located anywhere in the store. The family recipes for the baked goods and soups are also stored in your grandfather’s memory. Inventory is tracked in a note pad, along with employee payroll, and marketing coupons. The Cafe does not have a Web site, uses very little marketing except word-of-mouth, and essentially still operates the same as it did in 1952. Throughout this course you will own and operate The Broadway Cafe taking advantage of business practices discussed in this text to increase profits, keep the business running, and bring the cafe into the 21st century. Upon completion of the case students will have performed a vast array of activities including: • Use technology to gain…...

Similar Documents

Cis 500 - Predictive Policing

...Predictive Policing By Gus Finklestein Strayer University Abstract Predictive policing is a relatively new crime-fighting technique that can be used to both deter crime and catch criminals red-handed. Combining computer technology together with area- specific crime data, reports are generated forecasting precisely when and where crimes are most likely to occur. Police departments maintain records, data, and or databases which log huge volumes of information on crimes, criminals, suspects, and much more. Inputting that information into a sophisticated computer program designed to predict crime, to within a 500 by 500 foot location, is proving to have some merit. With technological advances, police no longer radio headquarters to retrieve basic information like license plates. In fact, the majority of police possess internet-connected computers in their cruisers, allowing them access to vast amounts of data. Within an organizational context, when police easily communicate and share knowledge across boundaries, and the entire country, the overall efficiency of crime-fighting and crime- solving greatly improves. Take for example an Amber Alert, the name of a missing persons report when a child vanishes. Once an alert is executed, police forces very quickly mobilize and cast a very wide net using all available resources to locate that child. This paper discusses the uses of technology, in particular predictive policing, to advance the......

Words: 1698 - Pages: 7

Cis 500

...Wireless Networks 4G Wireless Networks Britney Green CIS 500: Information Systems for Decision Making Professor Frank Lazzara November 4, 2012 4G Wireless Networks “Wireless networks use packet switching and wireless networks. Patching switching is when the path of the signal is digital and is neither dedicated nor exclusive. Routers are devices that forward packets from one network to another network. Packets occur when the network breaks a file or e-mail message into smaller blocks of specific size. Wireless routers are actually wired routers with wireless access points (WAP) built in. It provides both wired and wireless at the same time”. (Turban & Volonino, 2011) Third generation also called 3G; of cellular telecommunications technology supports multimedia and broadband services. Broadband means fast transmission speed. It is faster than the 1G and 2G. The third generation networks have far greater ranges because they use large satellite connections that connect to telecommunication towers. The fourth generation is called 4G. 4G mobile network standards enable faster data transfer rates. (Turban & Volonino) Right now 4G is the latest generation of wireless data technologies. It carries average download rates of 3 Mbps or more. “In contrast, today's 3G networks typically deliver average download speeds about one-tenth of that rate. The 2G and 3G started separately with their own purposes; soon both will be converted to the 4G......

Words: 1202 - Pages: 5

Cis 500 Assignment 4

...Assignment 4: Data Mining CIS 500 Dr. Besharatian Submitted by: Eric Spurbeck December 7, 2013 Abstract This paper will discuss the process of data mining, how it is used, for what purpose it is used and what information can be gathered from the data, which is compiled from data mining. Assignment 4: Data Mining Webopedia (2013) defines data mining as, "A class of database applications that look for hidden patterns in a group of data that can be used to predict future behavior. For example, data mining software can help retail companies find customers with common interests." This means that large groups of data that is derived by information obtained through customers, customer purchases and customer buying habits. Businesses use this information for a variety of reasons; it is used for purchasing merchandise, tracking how certain merchandise is selling and even customers buying habits. Webopedia goes on to state that "data mining is popular in the science and mathematical fields but also is utilized increasingly by marketers trying to distill useful consumer data from Web sites." Predictive analytics are used to understand customer's behaviors, according to the article Predictive Analytics with Data Mining: How It Works (Siegel, Feb. 2005) it describes how this method has a predictor. This is "a single value measured for each customer" this is based on the customers purchased over a period and sets higher values for the most recent customer purchases. ......

Words: 1808 - Pages: 8

Cis 500

...Rahkon A. Ross Dr. Edwin Otto Strayer University CIS 500 Assignment #1: Predictive Policing Compare and contrast the application of information technology (IT) to optimize police departments’ performance to reduce crime versus random patrols of the streets. Over the last decade, computer and telecommunications technologies have developed at a surprising rate. Increased computing power, advances in data transmission, smart and user-friendly graphic interfaces present law enforcement agencies with unprecedented capacity to collect, store, analyze and share data with stakeholders inside and outside of government. Ultimately, information technology represents a tool to help local law enforcement achieve its broadened and increasingly complex missions. (Reichert, 2001) There are many advantages associated with using information technology in policing. Comparative analysis shows that using information technology (IT) to combat crime has save lot of resources and time in the police department. There are a number of other advantages that can be associated with the use of information technology in the police department. For instance they use of Automated Field Reporting System by the police department has eradicated the use of hand writing of reports at the field by the Police Officers. Officers completed handwritten incident reports in the field and submitted them at the end of a shift to a field supervisor. After reviewing and approving reports, field supervisors would...

Words: 1431 - Pages: 6

Cis 500

...Assignment 2: 3G wireless networks and 4G networks sweetie Professor: CLIFTON HOWELL CIS 500 February 03, 2014 INTRODUCTION For one to compare and contrast 3g versus a 4g network, we first have to define what a wireless network is. Radios are considered to be the most popular for wireless technologies. Wireless communication is transferred between multiple points which are not connected to an electrical conductor. Wireless is playing a big part in the cellular network communication field. Literally, on all the channels on TV it’s impossible to go 3 minutes without seeing advertisements from Verizon, AT&T, T-Mobile, and Sprint claiming to be the best network provider. Each cell phone provider promote their own version of 3g and 4g networks. Carriers do this to draw the attention to endorse their services and to bring in new customers. As a result, it makes it very difficult for consumes to make a choice between the competitors. Consumers make their choice between providers based upon the price and coverage which are both vital to most consumers. With all the promotions and dramatic advertising it can be hard to know the truths about each wireless company. In this paper 3G and 4G networks will be compared and contrasted, 4G LTE, 4G WiMAX and 4G WiBro networks and competition will be identified. Lastly, this paper will identify why the competition between the 4G LTE carriers has been so fierce. 3G and 4G Networks Technology has allowed advance speed......

Words: 1092 - Pages: 5

The Broadway Cafe' Cis 500

...Final Project 1 Final Project The Broadway Cafe' Part I and II CIS 500 Strayer University Elizabeth Bethel Final Project 2 The Broadway cafe is a family inherited coffee shop located in downtown Atlanta, Georgia. The cafe' has been in business for 58 years. The business offers specialized coffees, teas, a full service bakery, homemade sandwiches, soups, and salads. It was once a hotspot but for the past five years business has been declining. Although my grandfather was very adroit at managing the business, Starbucks will be coming to the area. Grandfather had a terrific memory and stored everything such as customers names, family recipes, and soups in his brain. His record keeping system was tracked...

Words: 2450 - Pages: 10

Cis-500 Final Exam

...CIS 500 Final Exam Chapter 6-14 Chapter: Chapter 06: E-Business and E-Commerce Multiple Choice 1. When a user clicks on a malvertisement on a Web site, the ad will __________. a) release the latest malware to launch attacks on government agencies b) redirect to and load a malicious Web site, which is a replica of the site the user was expecting c) download a cookie that tracks the user’s purchases and credit cards d) all of the above Ans: b Difficulty: Easy Section Ref: Quick Look at Chapter 6 AACSB: 2. A service level agreement (SLA) is a legal written contract between a vendor and client in which the vendor guarantees __________. a) a maximum service charge b) free upgrades for the length of the contract c) no defects and/or no risk d) a minimal level of service Ans: d Difficulty: Easy Section Ref: Chapter 6 opening case AACSB: 3. Effective e-business models and competitive strategies are developed by __________. a) vendors and service providers b) senior marketing managers c) managers from various functional areas, including marketing, IT, operations, logistics, and accounting d) Web site designers Ans: c Difficulty: Medium Section Ref: 6.1 E-Business Challenges and Strategies AACSB: 4. Online channels and connectivity support __________, which minimizes the limitations of having to be physically present in a single location to collaborate or train. a) the e-business process b) telepresence c) community d)......

Words: 37693 - Pages: 151

Cis 500 Midterm Exam Answers

...CIS 500 Midterm Exam Answers To Download This Tutorial Visit below Link http://www.studentsoffortunes.com/downloads/cis-500-midterm-exam-answers/ (Product Type) : Instant Downloadable We invite you to browse through our store and shop with confidence. We invite you to create an account with us if you like, or shop as a guest. Either way, your shopping cart will be active until you leave the store. All Tutorials will be E-mailed immediately after the Payment, Please Check your inbox or Spam Folder and can also be downloaded by clicking on Tutorial Bucket. For Any Other Inquiry Feel Free to Contact us: studentsoffortunes@gmail.com For More Tutorials Visit: ( http://www.studentsoffortunes.com/ ) (Product Description) Question 1 Because Wal-Mart has thousands of suppliers to manage and is constantly looking for new ones worldwide, they invested in a new __________ strategy. • Question 2 Which of the following is an advantage of batch processing over online transaction processing? • Question 3 Wal-Mart’s global sourcing strategy is designed: • Question 4 Which of the following statements about virtualization is false? • Question 5 The number of hours an employee worked in a certain week is an example of: • Question 6 Why would organizations use cloud computing during tough economic times? • Question 7 What is the most cost-effective approach to managing fraud? • Question 8 Prior to 2002, what was the common perspective on infosec...

Words: 611 - Pages: 3

Cis 500 Midterm Exam Answers

...CIS 500 Midterm Exam Answers To Download This Tutorial Visit below Link http://www.studentsoffortunes.com/downloads/cis-500-midterm-exam-answers/ (Product Type) : Instant Downloadable We invite you to browse through our store and shop with confidence. We invite you to create an account with us if you like, or shop as a guest. Either way, your shopping cart will be active until you leave the store. All Tutorials will be E-mailed immediately after the Payment, Please Check your inbox or Spam Folder and can also be downloaded by clicking on Tutorial Bucket. For Any Other Inquiry Feel Free to Contact us: studentsoffortunes@gmail.com For More Tutorials Visit: ( http://www.studentsoffortunes.com/ ) (Product Description) Question 1 Because Wal-Mart has thousands of suppliers to manage and is constantly looking for new ones worldwide, they invested in a new __________ strategy. • Question 2 Which of the following is an advantage of batch processing over online transaction processing? • Question 3 Wal-Mart’s global sourcing strategy is designed: • Question 4 Which of the following statements about virtualization is false? • Question 5 The number of hours an employee worked in a certain week is an example of: • Question 6 Why would organizations use cloud computing during tough economic times? • Question 7 What is the most cost-effective approach to managing fraud? • Question 8 Prior to 2002, what was the common perspective on infosec...

Words: 2444 - Pages: 10

Cis 500

...CIS 500 Weeks 6, 7, 8,9,11 Discussion Questions Week 6 * Mobile banking features have added several advantages for customers however; there are security risks that come with them. Determine the security risks with respect to phishing, smishing, vishing, cloning, and a lost or stolen smartphone that have been experienced by the financial services industry as a result of mobile banking. Phishig – Is when malware is downloaded on to a device and it attempts to obtain personal information. It lies in wait and gathers information from apps such as a mobile banking app to gain your login and password. If you bank does not have proper security in place this can lead to your account getting hacked and loss of money. Smishing- This is where fraudulent communication occurs in the form of a text message in order to obtain personal information. Vishing – This is similar to smishing instead of getting information through text it is obtained through phone calls or voicemails. Cloning- The transfer of information from one device to another device including the electronic serial number When a smartphone is lost or stolen this can lead to a compromise to a person’s personal information since it may be on the phone. I bank with Bank of America and use the mobile app to manage my account transfer funds, pay bills, deposit checks and so on. The app does not store the password but it does store the user login. You are unable to just log in to it from a new device or location without......

Words: 2846 - Pages: 12

Cis 500

...implementing Big Data into their inventions and designs. The voluminous amount of data may have been overwhelming and costly to store but the cost to purchase high volume storage has earned them tremendous respect in the auto industry. They have very safe vehicles and amazing features. The real time data processing gives them the edge needed to produce safe vehicles and remain competitive. References Blanco, B (September 2007). Volvo's fuel cell Alcoguard breathalyzer says "Blow 5 seconds". Retrieved from http://green.autoblog.com/2007/09/03/volvos-fuel-cell-alcoguard-breathalyzer-says-blow-5-seconds/ Strader, R (January 2011). Converting data into business value at Volvo. Retrieved from http://blackboard.strayer.edu/bbcswebdav/institution/CIS/500/1124/Week3-1124/CIS500CaseStudy1-Volvo.pdf Teradata case study: A car company powered by data. (2012, May 16). Retrieved from http://www.thebigdatainsightgroup.com/site/article/teradata-case-study-car-company-powered-data “Volvo. In a demonstration of continued leadership in the field of safety, Volvo Car Corporation establishes new test facility for active car safety” (n.d.). Retrieved from http://www.autoalliance.org/index.cfm?objectid=02000880-B49C-11E1-B12B000C296BA163...

Words: 989 - Pages: 4

Cis 500 Midterm Exam Answers

...CIS 500 Midterm Exam Answers http://www.projbid.com/downloads/cis-500-midterm-exam-answers/ Question 1 Because Wal-Mart has thousands of suppliers to manage and is constantly looking for new ones worldwide, they invested in a new __________ strategy. • Question 2 Which of the following is an advantage of batch processing over online transaction processing? • Question 3 Wal-Mart’s global sourcing strategy is designed: • Question 4 Which of the following statements about virtualization is false? • Question 5 The number of hours an employee worked in a certain week is an example of: • Question 6 Why would organizations use cloud computing during tough economic times? • Question 7 What is the most cost-effective approach to managing fraud? • Question 8 Prior to 2002, what was the common perspective on infosec? • Question 9 Which of the following is not one of the essential defenses against botnets and malware? • Question 10 A majority of data breaches involve: • Question 11 Protecting data and business operations involves all of the following efforts except: • Question 12 Explain how data and documents are transferred over a packet-switched network. In your explanation, identify the format, protocol and transfer method. Compare and contrast how data/documents are transferred to how voice is transferred over a circuit-switched network. • Question 13 What are three of the major data functions performed by a DBMS? Briefly explain the functions. •......

Words: 509 - Pages: 3

Cis 500 Empower Learning/ Indigohelp

...CIS 500 Assignment 1 Predictive Policing (STR Course) For more classes visit www.indigohelp.com In 1994, the New York City Police Department adopted a law enforcement crime fighting strategy known as COMPSTAT (COMPuterSTATistics). COMPSTAT uses Geographic Information Systems (GIS) to map the locations of where crimes occur, identify “hotspots”, and map problem areas. COMPSTAT has amassed a wealth of historical crime data. Mathematicians have designed and developed algorithms that run against the historical data to predict future crimes for police departments. This is known as predictive policing. Predictive policing has led to a drop in burglaries, automobile thefts, and other crimes in some cities. ………………………………………………………. CIS 500 Assignment 2 4G Wireless Networks (STR Course) For more classes visit www.indigohelp.com The 3rd Generation Partnership Project (3GPP) developed the 3GPP LongTerm Evolution (LTE) standard for wireless communications technology. It is regarded as an evolution of the Global System for Mobile Communication (GSM), the Universal Mobile Telecommunications Systems (UMTS), and other standards. It is also known as the 4G LTE. The competition among the carriers to support 4G LTE networks has been very fierce as evidenced by TV commercials targeting smartphone users. Many smartphones run on 3G networks. ………………………………………………………. CIS 500 Assignment 3 Mobile Computing and Social NetworkingGraded (STR Course) ...

Words: 926 - Pages: 4

Cis 500 - Wireless and Mobile Technologies

...Case Study #2 Wireless and Mobile Technologies CIS 500: Information Systems for Decision-Making Wireless and Mobile Technologies Wireless technologies make use of radio waves, to connect with other devices or networks in order, to transmit/receive data. A wireless technology can be as simple as using a garage door opener or as complex running applications on Enterprise Resource Planning software. Wireless technologies make use of various types of hardware, from Bluetooth™ capable devices (printers, keyboards, earpieces, etc.) to offsite data warehouses to satellites, all of which communicate through networks, via radio waves. Wireless technologies are used by fixed/stationary items such as a desktop computer, as well as various mobile devices, tablets, cell/smart phones, laptops, GPS and others. Mobile technologies are, as the name implies, mobile. These devices are portable and can be used in route, from one place to the next, by accessing and using wireless networks. Mobile technologies are not just hardware but include special platforms in which these devices and the users interface. The combination of the wireless and mobile technologies has opened new methods for businesses to improve productivity.  Wireless and Mobile technologies allow staff members to have real-time communication with the business and operations, from relatively anywhere in the world.  Wireless and Mobile technologies provide a faster connectivity to vendors and customers......

Words: 1916 - Pages: 8

Cis 500 Learning Consultant / Tutorialrank.Com

...CIS 500 Assignment 1 Predictive Policing (STR Course) For more course tutorials visit www.tutorialrank.com In 1994, the New York City Police Department adopted a law enforcement crime fighting strategy known as COMPSTAT (COMPuterSTATistics). COMPSTAT uses Geographic Information Systems (GIS) to map the locations of where crimes occur, identify “hotspots”, and map problem areas. COMPSTAT has amassed a wealth of historical crime data. Mathematicians have designed and developed algorithms that run against the historical data to predict future crimes for police departments. This is known as predictive policing. Predictive policing has led to a drop in burglaries, automobile thefts, and other crimes in some cities. Write a four to five (45) page paper in which you 1. Compare and contrast the application of information technology (IT) to optimize police departments’ performance to reduce crime versus random patrols of the streets. 2. Describe how COMPSTAT, as an information system (IS), implements the four (4) basic IS functions 1. Input 2. Processing 3. Output 4. Feedback 5. Determine how information systems have allowed police departments that implement tools such as COMPSTAT to respond to crime faster. 6. Apply the strengths, weaknesses, opportunities, and threats analysis (SWOT analysis) on behalf of police departments that intend to implement predictive policing. 7. Use at least three (3) quality resources in this assignment. Note Wikipedia......

Words: 2070 - Pages: 9

Historical | Leprechaun Returns | Darkwing Duck (89)