| 4220 Syllabus | 4220 Class schedule | 4220 Project 1| 4220 Tests, Quizzes, Exams and Homework  |

PROJECTS ISM 4220

Last updated: Thursday December 01, 2005 11:55 AM

Project should include

  1. Page 1

    1. Title of paper

    2. Student Name

    3. Student course number and course name

    4. Semester and year

    5. Name of University

    6. Name of Professor - correctly spelled

    7. Visible digital color photo of yourself

  2. Page 2 Table of contents

  3. Page 3 Introduction

  4. Pages 3-15 Main body guideline - which means your paper can be from 3 pages to 15 pages or even longer.

  5. Include diagrams, photos, sketches , other visual

  6. Page last but one - References - all references from both books, library and of course the web.

  7. Last page - A one page executive Summary which should summarize your paper in one page.

 

Paper should be

  1. Double spaced,

  2. Fonts: Times Roman or Ariel

  3. Font size: 12

  4. Font color : black

  5. Margins should be 1" either side

  6. Spell checked

  7. MS Word 2000 or XP

  8. Any other applications should be from the MS family

  9. CBA does not support Visio or WordPerfect

  10. emailed by class time - and if necessary win zipped.

  11. Hard copy should be brought to class. 

  12. Project 1 needs to be presented in CD format

  13. Project 1 must be presented in ONE file and saved as "yourname.doc"

  14. Project 1 must have a color digital and visible photo of yourself

 MLA Check list

The bibliography or list of sources  is referred to as Works Cited under MLA rules.

  1. Direct quotations

    Quote directly from your source if the original words are unique and distinctive or if they add authority to your point.

  2. Ideas that are summarized or paraphrased

    Paraphrasing or summarizing a source is often preferable to quoting, for it allows you as the author to use your own style and voice in your research paper. Always remember to use parenthetical citations for such sources. just as you would if you were quoting them.

  3. Ideas and opinions associated with a particular person 

    If you refer to specific concepts adhered to by one person, you must include a reference to this person.

  4. Data that, in context of your paper, may be open to dispute

    If you cite statistics you need to include a reference to your source.

  5. Results of surveys you have conducted as part of your research

    If interviews are personal, you may mark them "personal communication" in your bibliography.

  6. Avoiding plagiarism

    Plagiarism is a serious violation of academic ethics and is grounds for severe penalty. To avoid plagiarism you must cite work that is not your own. For example, a student taking class notes, might omit to add quotation marks to a direct quote. Weeks later when they are working on their paper they may forget which words and phrases are their own and which come directly from the original source. Check with your professors which as to whether or not to cite them as sources for ideas. The individual professor might consider his ideas as part of the public domain of the class, in which case you could cite them without attribution.

  7. Works cited: Books The order is Author, Title, Publication Information:
  8. Arrange the entries alphabetically by the author's last name or, when there is no author name, by the first significant word in the title.

    One author

    McDonald, David Francis. Cyber crime on the net. New York: Harper 2002

    Two authors

    Cranley, Janet F., Shamika M. Brown. Freedom on the Internet. Miami, Uinversity of Miami Press, 2001

     

  9. Works cited: Article in a magazine or newspaper

    Mrad, Grace. "Cyber crime - Miami second in the nation" El Nuevo Herald 28 January 2002  

  10. When citing internet sources, be sure to give credit;  

The University of Florida's IT department has developed a Website that provides information about Cyber crime ( "Cyber crime is constantly increasing")

 Good luck

Last updated: Thursday December 01, 2005 11:55 AM

3G Third Generation cell phones   Alex S 38
Antennas      
ZZ Any other suggestions?      
Artificial Intelligence      
Bandwidth What do we mean by it?      
Biometrics - Facial      
Biometrics - Fingerprinting   Alison E 21
Biometrics - In general to include a little of all      
Biometrics - Palms      
Biometrics - Retinal   Aisha L 29
Biometrics - Signatures      
Biometrics - Voice      
BlueTooth   Carmen Ll 32
BPR Business Process Reengineering      
Broadband   Marcia W 19
CD-ROMs - How do they work?      
CD-RW - How do they work , how do they Burn?   Marlene B 14
Cellular Telephone Systems   Anamaria Z 30
CENTREX What is it , where is it used today?      
Circuit vs. packet switching Old and new technology      
Client/Server Networks -  Is this the future?   Jules D 34
Computer Crime Awareness Survey      
Computer Crime Laws USA Do they exist - which ones?   Ray E 35
Computer Crime Laws Florida vs USA Do they exist - which ones?   Doretha H-P 23
Computer Crime Laws International  - Do they exist - Where?      
Computer Crime Laws WIPO Protecting the copyright   Alexandria W 25
Contacting Miami Companies - The IT departments      
CPUs - Latest and how do they work      
CRM - Customer Relations Management   Audrey J 26
CTI - Computer Telephony Integration      
Data compression Why do we need it?      
Data Mining - Useful or a nuisance?      
Databases - relational databases - where do we use them today?      
Decision Support Systems - An introduction   Ivonne D 22
Digital Signatures   Yolande S 31
DVD - How do they work? Can we copy a DVD?      
DVD burning - What is the latest technology?   Faiyaz H 23
eCommerce - Problems faced today when putting up a web page   Dimitry S 6
eCommerce - Requirements of setting up a company for eCommerce      
EDI Electronic Data Interchange- Where is it used? - How useful?      
email - How does an email  travel the digital lines?      
Encryption Symmetric and Asymmetric   Marcus F 4
ERP - Enterprise Resource Management - Major players      
Fiber optic technology - For Voice and Data   Lizzie A 18
Fiber optic technology - For Lighting      
File formats BMP, GIF, JPEG, PCX, PNG, TIFF, other      
FMD - ROM A new optical storage device Fluorescent Multilayer Disk - A clear disk using multiple layers , 20 or more as opposed to the DVD which uses up to two layers. The layers give off light, the presence or absence of light tells the drive whether information is stored or not     
GIS - Government Information Systems      
GPS Global Positioning System   Rodrigo J 8
Hacking Exposed      
How to build a PC   Carlos M 12
HTML   Chantal F 2
Intelligent Systems      
INTELSAT INMARSAT      
ISDN Integrated Services Digital Network      
KM - Knowledge Management      
Microsoft's IntelliMouse      
MIDI Musical Instrument Digital Interface      
MIS decisions Performance, Feasibility and Cost   Debora M 10
MIS tools      
MP3 Watermarking      
MPEG3/MP3/Jpeg/TIFF      
Networks - Designing a large network   Jimmy A 35
Networks - Designing a small network   George O 17
Networks - Designing a small wireless network   Anthony W 36
Networks - Which is the slowest part of a network?   Mark H 37
NPX Network Branch Exchange (VoIP)      
Open Source Operating Systems      
Organizational Chart of departments with IT      
PBX Private Branch Exchange      
Printers How do dot matrix printers work      
Printers How do inkjet printers work   Laura P 20
Printers How do laser jet printers work   Olgine B 11
RAID Redundant Array of inexpensive/interdependent Disks Hard drives fail due to temperature changes, head crashes, motor or controller failure and power spikes or changes. RAID links groups of drives and they appear as one. By storing data and mirroring redundantly they protect against failure of any one drive       
Satellite constellations GLOBALSTAR      
Satellite constellations IRIDIUM      
Satellite constellations NAVSTAR      
Satellite constellations TELEDESIC      
Satellite Telephones Iridium      
Satellite Telephones GLOBALSTAR      
Satellite Telephones Present day phones      
Satellites - LEOS, MEOs, GEOS   Jimmy A 33
Scanners - How do scanners work?   Sylvia C 27
SCM/SCO Supply Chain Management/Optimization      
Security of Networks - Cryptography      
Security of Networks - System Security      
Security of Networks- Applications      
Setting up an IT department      
SMART Cards      
Sniffers - What is it - Good or Bad?      
SONET Synchronous Optical Network      
Spamming - What do we mean by it? Is it legal?      
Speech Recognition   Opal C 3
T1, T3, OC-3-768      
TCP/IP Transmission Control Protocol/Internet Protocol      
Telecom Act 1996 and its implications      
Telemetry      
Telephone Co in US/Locally - An introduction to the top companies      
The role of the CIO   Keler G 16
Tools for Networking - Trace route, Ping, WINIPCONFIG      
Transmission media UTP, coaxial, Fiber and Wireless      
Viruses - What are they ? Trojan Horses, Worms, Logic bombs, Trap doors   Clifford B 13
Viruses - How can we protect ourselves from them?   Johanna L 15
VoIP  Voice over Internet Protocol   Edson de A 9
WAP Wireless Application Protocol   Adolfo M 5
WEP Wired Equivalent Privacy      
Web design software      
Web page; From designing to publishing   Andre S 1
Web pages; What happens behind the scenes?      
Wireless satellite transmission   Jacqueline L 21
Wireless terrestrial transmission   Alexander T 28
Wireless 802.11b 2.4 GHz      
xDSL Digital Subscriber Lines      
XML Extensible Markup Language      
Please submit your 3  choices 1st come 1st served  
First Name
Last Name
email
Choice 1 (Copy and paste from above)
Choice 2
Choice 3
   

 

| 4220 Syllabus | 4220 Class schedule | 4220 Project 1| 4220 Tests, Quizzes, Exams and Homework  |