Free Essay

Discussion Q Wk 1 Bis/220

In: Computers and Technology

Submitted By crorton150
Words 252
Pages 2
Some of the challenges the entertainment industry faces with internet sharing is loss of money. More people have the ability to download music, movies, and other products illegally because of “sharing” web-sites such as limewire, frostwire, and bear share. The entertainment industry does not have a way to track these illegal downloads and numerous people know that the chances of being prosecuted are extremely small. Some people believe that what they download has little effect of the entertainment industry and no one suffers in the process. If one takes into account that one person downloads a CD that costs $16, that one CD for that one person does make little difference on the larger picture. Take that one person and multiply it by 1 million, which is likely a fraction of the amount of illegal downloads; the entertainment industry will now have lost $16 million. Imagine the ramifications if each person downloaded two or three CDs each. How much less would CDs cost if every piece of music was purchased properly. Education has opened my eyes to see that piracy can harm entertainment companies. I was not aware that not just illegal downloading but copying or uploading friend’s CDs, movies, and other items is also considered piracy and hurts the entertainment industry. Educating the general population, I believe will help reduce piracy and potentially decrease the purchasing cost of movies and music. Creating anti-piracy ads and presenting them at the movie theatres and on television will help increase awareness.…...

Similar Documents

Free Essay

Bis 220 Wk 2 Dq's

...DQs for wk 2 Week 2 - Discussion Question #1 · What does the statement mean: “Hardware is useless without software”? · What are differences between systems software and applications software? Give an example. · What are some of the legal issues involved in acquiring and using software in most business organizations? In my opinion, I think this statement means that hardware is useless without software to run on it because software gives instructions that tell computer hardware what to do. Hardware consist of physical equipments that are used for processing information in various ways, and software consists of the instructions or programs that determine tasks be performed by the hardware and the way these tasks are performed.The differences between systems software and applications software are systems software is a set of programs to control all components of computer and to manage overall operations of computer system. System software is used as a base to install and run all application and the systems software makes the computer work for example operating systems, such as Windows XP and Norton Antivirus. Applications software is the software that you install onto the operating system, for example processing programs, spread sheets, web browser and games. Some of the legal issues involved in acquiring and using software in most business and organizations include software licensing. That is, copying software is illegal and individuals must stop people......

Words: 698 - Pages: 3

Free Essay

Bis 220

...Don’t Call Implementation Act, 2003 And Telephone Consumer Protection Act, 1988 Bryan Allen BIS/220 December 11th, 2012 Jadie Giorgis Has there ever been a time when dinner is just about to start and in the middle of saying prayer the phone rings? Dad gets up to answer the phone and on the other end is a telemarketer. The telemarketer is trying to sell something and dad isn’t interested; its dinner time he says, or maybe it is some voice recording selling something. It has happened to just about everyone. Because there have been advances in information technology; the result has been the creation of Acts of Congress to address the ethical issues which could violate our right to privacy. In this essay two Acts will be discussed: The Telephone Consumer Protection Act of 1991 and The Do Not Call Implementation Act of 2003. Both acts have to deal with our rights to privacy. “In 1991, Congress passed the Telephone Consumer Protection Act (TCPA), the first federal law regulating the actions of legitimate telemarketers. Its purpose is to strike a balance between protecting the rights of consumers and allowing businesses to use telemarketing effectively. Regulated by the Federal Communications Commission (FCC), this law requires telemarketers to formalize their existing policies and, where necessary, create new ones to bring their operations into compliance with the following main restrictions” (code of ethics,......

Words: 665 - Pages: 3

Premium Essay

Hsm/220 Check Point Wk 1

...HSM/220 Check Point Wk 1 Ten characteristics necessary for an effective leader are: 1. Vision *(Knowledge) 2. Ability to motivate *(Value) 3. Efficiency *(Knowledge) 4. Organization *(Knowledge) 5. Control *(Knowledge) 6. Ability to plan *(Knowledge) 7. Positive attitude *(Value) 8. Sense perspective *(Value) 9. Respect *(Value) 10. Trust *(Value) I believe that a manager is very important for many different reasons. All of the characteristics that I listed above will help a company. First it is important to have a personal vision in order to motivate others to work for you and your company. When the vision is to be at the top, you need to have a plan and be very organized. All of your employees need you to help them do their jobs correctly, so a manager has to always be sure that there is a plan to help their employees and help them be successful within the company. Since managers have a lot of responsibilities and not very much time but they need also be efficient. Managers tend to have very little time, and so it is important that they keep their time organized and do as much as they can in the small amount of time that they have. Control is something that is important to many managers, because no one can keep an entire company running if they cannot control what is happening within the company. Someone always has to be in control and it should be the manager otherwise, complete chaos can and will happen. Good managers also keep a sense of understanding...

Words: 351 - Pages: 2

Premium Essay

Bis 220

...Living in a technology savvy world Kristian Agnew BIS/220 University of Phoenix February 16, 2013 3% similarity index The world that we live in and the worlds that our grandparents lived in, are more than likely two completely different worlds. There once was a time when people knew who their neighbors were, children played outside for recreation, when a loved one was missed, a letter was written or a telephone call from a landline was made, and books were read the old fashioned way (in paper form). That world seems like it was centuries ago, but it was only a few decades previous. In today’s society, if you haven’t seen a loved one, they are just a skype call or Facebook status away. Almost everyone has an email address. Due to this, a stamp and letter seems more extinct by the day. We live in a world where we have access to books right at our fingertips via our smart phones or tablets and children prefer video games rather than going outside to play with their friends. The advances in information technology have played a key role in shaping the rights we have and much of our day-to-day activities. An example of this would be HIPAA or the Health Insurance Portability and Accountability Act that was established in 1996. Around this time, medical facilities, including hospitals, and private practices, started implementing the use of digital medical records. To limit the amount of personal information being disclosed to anyone other than the......

Words: 680 - Pages: 3

Premium Essay

It -220 Chapter 5 Page 187-191 Q and a 1-37 Odd.

...IT -220 Chapter 5 page 187-191 Q and A 1-37 odd. 1. What are the four layers of the TCP/IP model?       i. Application – Defines the applications used to process requests and what ports and sockets are used.            I. (This layer is used to process requests from hosts and to make sure a connection is made to an appropriate port.)       ii. Transport – Defines the type of connection established between hosts and how acknowledgements are sent.       iii. Internet – Defines the protocols used for addressing and routing the data packets.       iv. Network Interface – Defines how the host connects to the network.  3. What are well known ports?        Also known as “reserve ports”, which are ports 1 – 1023 that are reserved by ICANN (Internet Corporation for Assigned Names and Numbers).             Port Number Assignments         Port Numbers          Description             1 - 1023          The “well known” ports         1024 – 49,151            Registered ports        49,152 – 65,535        Private Ports  5. Define the purpose of a connection oriented protocol. Give an example.       i. Establishes the network connection, manages the data transfer, and terminates the connection.            I. Connection Oriented Protocol – Establishes a network connection, manages the delivery of data, and terminates the connection.       ii. The TCP (Transport Control Protocol) protocol within the TCP/IP transport layer.            I. TCP protocol establishes......

Words: 891 - Pages: 4

Free Essay

Bis 220

...Proposal for Information Systems Roy L. Tucker BIS/220 October 18, 2012 Kendra Campbell Proposal for Information Systems Table of Contents Table…………………………………………………………………………………….3 Introduction…………………………………………………………………………….4 Challenges………………………………………………………………………………5 Solutions………………………………………………………………………………...5 Benefits.................................................................................................................6 Drawbacks……………………………………………………………………….6 Summary..………………………………………………………………………………6 References………………………………………………………………………………7 Table | Type of System | Function | Example | | | | | |Transaction Processing |Custom business applications including access |Ensures the availability, integrity and | |Systems |of data, inter-computer communications and |security of data. Manages point of sale, | |(TPS) |manage interface |transactions, credit cards, checks, cash | | | ...

Words: 1043 - Pages: 5

Free Essay

Bis 220 Week 1 Information Technology

...Information Technology Acts Liriaxis Marie Gonzalez BIS/220 June 25, 2013 Nnamdi Osakwe Information Technology Acts Technology has advanced greatly in the recent years. The internet has made it is easy for people to get any information they want, which in return presents danger to minors. This advance in technology has opened new issues that need to be addressed. Children depend on adults to protect them from any harm and as a result government passed acts to prevent child abuse on the internet. The two acts being discussed in this paper are the Children’s Internet Protection Act of 2000 and the Children’s Online Protection Act (COPPA) of 1998. Children’s Internet Protection Act, 2000 The Children’s Internet Protection Act (CIPA) is a federal law which was passed by Congress to prevent children from viewing the offensive or harmful content over the Internet ("FCC", 2013). CIPA regulates the schools and all public libraries. It makes it mandatory to filter all its computers to stop children from accessing sites that are not appropriate. ("FCC", 2013). The (CIPA) was passed in December 2000 and its main priority is to protect children’s innocent eyes from child pornography and other dangers of the internet. CIPA does not require a certain kind of filter system, but rather to make sure schools and libraries have some sort of filters to prevent such activities. There are online predators, inappropriate chat rooms, and sexual content that children are at risk for......

Words: 606 - Pages: 3

Free Essay

Bis 220

...Acts Research Paper BIS/220 August 1, 2012 Nik Johnson Acts Research Paper In this paper, we will examine the advances in information technology that has resulted in new ethical changes in implementing the Telephone Consumer Protection Act, 1998, and Do Not Call Implementation Act, 2003. The two acts that I researched go hand in hand with each other because each Act is implemented by the Federal Communications Commission. Also the Do Not Call Implementation Act, 2003 established as a result of the Telephone Consumer Protection Act, 1991. Both acts have been established to protect the consumer and his or her privacy. Thankfully, advances in information technology have assisted in the protection of consumers for unwanted calls and solicitations, but it has also made it easier for the uninvited calls. The Federal Communications Commission established rules and regulations that companies soliciting had to follow. One of the new rules required the companies to provide caller ID that would help with consumers who had caller ID to identify whether or not someone wants to answer the phone. Also they have to identify themselves and the company they are calling on behalf of when calling consumers. One of the original rules of the Telephone Consumer Protection Act, 1998 is that no solicitation phone calls could be made before eight a.m. and after nine p.m.. After many more complaints of unwanted phone calls from telemarketing companies the Federal Communications Commission......

Words: 447 - Pages: 2

Premium Essay

Bis 220 Week 1 Technology Acts

...Information Technology Acts BIS/220 August 5, 2013 Information Technology Acts Before I began working in the banking industry a few years ago I never realized to this how many people still continue to write checks as a means of payment. While many people have steered away from using checks there are so people that just prefer to still use them. Almost all banking needs can be done without even needing to step foot inside a banking center. With the implementations of ATM’s and mobile banking you can do almost any transaction from the comforts of your own home. These advances in information technology have cause regulations such as the Electronic Funds Transfer Act, 1078 to be implemented to keep the customers money safe while offering convenience. With so much added convenience for the customers, financial institutions and other sales driven businesses required that the Do Not Call Implementation Act, 2003 be brought into play. Electronic Funds Transfer (EFT), 1978 The Electronic Funds Transfer (EFT) was passed in 1978 as a result of all of the growth and development of electronic ATM machines and electronic banking. President Jimmy Carter signed the act in order to establish the rights and liabilities of consumers as well as the responsibilities of all participants involved in the electronic funds transfer activities. (Wikipedia, 2013) The Electronic Funds Transfer Act, is a federal law that protects consumers involved in the transfer of funds through......

Words: 318 - Pages: 2

Premium Essay

Acct504 Wk 1 Discussion

...Week 1: Overview of Financial Statements - Discussion Accounting is a way of tracking transactions and organizing them into concise reports to be used by investors, principals of companies, or government agencies to be able to control the financial health of a company, family, or an individual. The book uses the example of a checkbook, which is apropos, as I don't know of anyone who has never "bounced" a check due to careless recording of a transaction.  Accounting involves a level of trust, that the reporting is accurate and true.  Unfortunately, trust is not enough, and it must be standardized and regulated. Accounting is a way to maximize a finite resource (capital) and allocate it in the most efficient way.   Accounting is the bookkeeping methods involved in making a financial record of business transactions. It is also the preparation of statements concerning the assets, liabilities, and operating results of a business.  Accounting is part of every day life for those who pay bills as well.  Honestly in the business community there has to be accounting in place to see where the business stands. What is GAAP?  What is the purpose of GAAP? | | | GAAP are the rules that stop accountants from manipulating numbers and formulas to represent whatever it is they want the numbers to say rather than it being an actual reflection of the company's performance. these principles are put in place to prevent the over valuation of company's and overstating of profits......

Words: 1463 - Pages: 6

Free Essay

Bis 220 Week 1

...The Up and Coming of Technology BIS-220 April 3, 2013 Charles "Page" Waller The Up and Coming of Technology Information technology is one of the most in demand fields in the world, because of the fact it has many influences in government policy that have passed through the years. The Fair Credit Reporting Act of 1970 and the Health Insurance Portability and Accountability Act (HIPAA) of 1996 were just a couple of policies effected by the impact of information technology. The policies were made to protect the American citizens in ways of obtaining free credit reports and the privacy of personal medical records, which individually will be discussed in the essay. "You hear the terminology Fair Credit Reporting Act and you think that's an act that only applies to credit reports," Paul Stephens (Dilworth, 2012). One would think this quote is right, but it is the complete opposite. In 1970, the Fair Credit Reporting Act was established to help citizens from getting ridiculed by massive organizations that wanted to use his or her credit reports against them. The organizations acquired the information that was only available to them and was not intended to be shared. The policy permitted everyone the right to keep track of his or her own credit report. This gives the companies restricted access to credit reports which under F.C.R.A one cannot share information with anyone, cannot affect him or her from getting a job, one needs permission to access information, and one......

Words: 827 - Pages: 4

Free Essay

Acc 220 Wk 1

...Note: All job postings I found in the local paper and can be found online at registerguard.com/jobs Job 1: Banking consumer loan underwriter At least two years’ experience in consumer lending and experience with consumer loan underwriting is preferred. Salary is between $42,937 and $61,922 based on experience. Responsibilities include reviewing and evaluating a high volume of loan applications, using strong, sound loan underwriting principles. Must have strong analytical skills, ability to read and analyze documents such as credit reports and tax documents and the ability make logical decisions based on loan policies and consumer loan underwriting is preferred. Job 2: Financial analyst to analyze financial results BS required/MBA, CPA or CMA a plus. Advanced Excel and experience in ERP system preferred, SAP and Hyperion desired. Salary is between $42,093 and 56,890 based on experience. Responsibilities are analyzing financial results, prepare budgets and forecasts (BS, IS, Cash Flow). Job 3: Pentagon Federal Credit union has several job postings as fallows; Mortgage Loan processor: Three years’ experience in residential mortgage lending or 1st trust mortgage or home equity processing /closing. Base salary is $32,199, and is responsible for reviewing information on residential mortgage loan applications, assemble complete documented file for submission to underwriting. Closer 1st trust: Requires two years related experience in mortgage lending, good math skills and......

Words: 358 - Pages: 2

Premium Essay

Bis 220

...SYLLABUS BIS/220 Introduction to Computer Application and Systems Copyright ©2014 by University of Phoenix. All rights reserved. Course Description This course provides an overview of Business Information Systems. Students learn to apply Microsoft® Office tools including word processing, spreadsheet, database, and presentation software to accomplish business objectives. Other topics include uses of application software and the Internet for effective problem solving, exploration of relevant emerging technologies, and how information is used across different industries. Course Dates 35 days Faculty Information Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents (both located on your student website): • Academic Policies University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Get Ready for Class • Familiarize yourself with the textbooks used in this course. Course Materials All electronic materials are available on your student website. Week1 Information Systems and Word Processing Tools Tasks • Download the new and improved Phoenix Mobile app. • Review the Week One Student Guide. 7 days Objectives/Competencies 1...

Words: 789 - Pages: 4

Premium Essay

Bis/220

...Fair Credit Reporting Act 1970 University Of Phoenix BIS/220 Professor Bob Branch Congress enacted the Fair Credit Reporting Act in 1970 because the improper use of credit records. The reporting agencies put in place procedures for meeting the needs of commerce for consumer credit, personal insurance, and other information in a manner that is fair to the consumer, which is confidential, accurate, relevant, and properly used (Maurer & Thomas, 1997). The fair credit report act even has an impact on how employers conduct outside investigations on employees. The FTC made an amendment to the Fair Credit Report Act making newly expanded disclosures notification and consent requirements to apply to employers who use the Fair Credit Report Act when making employment decisions (Morgan, Owens & Gomes, 2000). Employers are required to provide in writing to employee’s using clear understandable language, stating that a consumer investigative report may be obtained for employment purposes. Employer must give notice to employee separate from any other disclosures. Employer must also give written consent before he or she can investigate further. If an employer decides that an investigation is an appropriate action second notice disclosure must be given to the employee. The employer has three days to request an investigative report for an outside consumer reporting agency. A third notice must be given to the employee of the nature of the investigation only if the employee......

Words: 509 - Pages: 3

Premium Essay

Bis 220 Week 1 Team Reflection Summary

...Reflection Summary BIS 220 Members from Team C reflected on the materials covered during week four discussions. The team members posted their thoughts and reflection on our team forum, stating their opinions related to the systems development life cycle and presentation tools to communicate business objectives. All members concluded that SDLC is system framework system which organizations use for large scale IT projects. This allows for six sequenced processes to occur in order for an effective IT operation. Six process all serve a separate purpose but all go together for the benefit of the project. The six processes are system investigation which is the investigation phase that determines potential problems. The system investigation includes the system analysis, systems designs, programming and testing, implementation, operation, and maintenance. System analysis analyzes how the problem will be solved. System design gives measures of the system and how it works and how to fix potential problems. Programming and testing is programming that allows for the design to be programmed into computer code and testing will test to ensure it does what it is suppose to do. Implementation converts the old system into the new one. Operation and maintenance runs the operation and does preventive maintenance to ensure everything runs smoothly. The team also discussed the use of presentation tools. Presentation tools can include different things such as spreadsheets, PowerPoint,......

Words: 445 - Pages: 2