Thursday, March 1, 2018

Excel Case Exam

Please review ALL the skill topics on this Study Guide (also in Canvas, Files) for the Excel Case Exam before you come to class to take the Exam. You will see these topics on the exam!

Your SAM Project Cases (especially Tutorials 5-10), your book (extra cases at the end of the Tutorials as well as the example tutorials we did in class) - are great study resources! 
Also attached and in Canvas, FIles are a PowerPoint presentation, and a SimpleFunctionExample workbook, to help you be prepared for the Excel Case Exam.  Enjoy!
Remember the Excel Case Exam is LIVE in Excel, worth 50 points, and will be hand graded with a rubric.  It will be more like your SAM Projects homework cases than the Excel SAM exam you previously took.

Excel SAM Exam

To prepare for the Access SAM Exam you should complete the Excel SAM Training before class (the Training is worth 10 homework points plus is the best way to study for the exam). There will be 50 skill based questions on the Exam and you will have up to five attempts at each question during the Exam (without the help or hints available in the Training).  The skills on the Training will be the same in a different scenario. On the Training complete the Apply instructions to earn the green check mark (credit) per task.
Remember you can do this Training repeatedly at your own pace.  Goto Canvas, Modules, SAM to see the Training link.
You also have your Excel SAM Project Case 5 due before class.  The Excel SAM Exam covers Excel Modules 1-5.

Sunday, February 25, 2018

Understanding Computers Concepts Exam 2

In addition to reading the chapters, completing the EOC Review Activities (Key Term Matching & Self-Quiz), and taking the Canvas Understanding Computers Chapter quizzes, please study the UC Exam 2 Keyword list over Chapters 5-9 and 12 in Canvas Files.

Friday, January 5, 2018

K201 FREE Tutoring

The department paid FREE K201 Tutoring is in UL 2135 D  (MAC STAT lab located in the IUPUI Library 2nd floor near the Writing Center.)

The MAC Stat tutoring lab is open with tutors ready to help, but they will not ALL have had our K201 course.  Our eight K201 content experts (the Tutors that have successfully taken K201) will be available as listed below.
Monday: 9am-9pm
Tuesday: 9am-9pm
Wednesday: 9am-9pm
Thursday: 9am-6pm
Friday: 9am-6pm
Saturday: CLOSED
Sunday: Noon-5pm

Please check in with your JagTag/Crimson card upon arrival.

Thursday, January 4, 2018

Welcome to K201 The Computer in Business!!

Required Textbooks

There is ONE Cengage bundle for K201 Spring 2018.

The Cengage Bundle (ISBN 9781337804561) is available at the bookstores and contains FOUR items.  Note:  The 3 printed texts are LOOSE LEAF, so you will likely want to put them in binders. We will use ONE book at a time rotating books throughout the semester according to the daily schedule.
           
1.         SAM (Skills Assessment Manager) LMS Integrated SAM 365 & 2016 Assessments, Trainings, and Projects with 1 MindTap Reader Printed Access Card (access code card)

The three hard copy paper 3-hole punched textbooks
                                                                         
2.         Custom Understanding Computers Today & Tomorrow 16th ed Comprehensive by Morley & Parker
3.         Custom New Perspectives Excel 2016 (MS Office 365) Comprehensive by Parsons, Oja, Carey, & Desjardins
4.         Custom New Perspectives Access 2016 (MS Office 365) Intermediate by Shellman & Vodnik

The course kits are available at the campus JAGS Bookstore (http://www.bookstore.iupui.edu), Indy`s College Bookstore (www.indys.bkstr.com), and Textbook Alternatives (http://textalt.com/) please price shop for the best deal. 

You may purchase SAM access separately from the SAM URL below.
Your Instructor looks forward to meeting you!

Tuesday, September 12, 2017

K201 - Word of the Day


Fill Handle: Fill Handle is the square at the bottom-right corner of the active cell. Drag the fill handle Fill handle to copy data or to fill adjacent cells with a series of data.

Monday, September 11, 2017

SAM Excel Projects 1-5 Tips

Posted by instructor Mrs. Musick

Remember that you start with 5 submits for each case.   If you need additional submits, simply send me a message requesting more.   Allow time to fix any errors and resubmit the case, to ensure the highest grade possible on each case.
ON ALL CASES:
DO NOT SHARE files!
(1) USE CARE when changing the file name - only change the 1 to a 2 and nothing else!  If your file won’t submit, it is most likely a problem with the file name, so review it carefully.    Sometimes attaching the file to an email will allow you to see the entire file (including extensions) and you might see a problem.

(2) Number formatting - be careful that you set all parameters given; the format, the thousands separator, the decimal places, how to display negative numbers, etc.

(3) Background color IS Fill Color

(4) If a Theme, font, color, etc does not exist that you are asked to select CHECK YOUR VERSION OF THE SOFTWARE!   Also, verify that you have the correct theme selected (as the theme can affect these options).

(5) HINTS NEED TO BE READ!   These are there to help you make the correct choices, so pay attention to them!

(6) SAVE your work PERIODICALLY!

(7) Typing errors can lead to significant point reductions, so be careful that you are typing exactly what is given to you in the instructions.

(8) Read the instructions carefully, do the steps exactly as they are stated, do not skip any tasks (sometimes multiple tasks will be given in one step), and do not change anything in the file that you are not instructed to change.

(9) The order that you complete some tasks can make a difference.   For example, if you change the theme, it can affect many items such as fonts, colors, etc.   So you should perform the tasks in the order given.

SAM Excel Case 01:
(1) #3 & #12 - Use the dialog box approach to setting the column width or row height
(2) #8 - Flash Fill - if this doesn't work - check the version of the software you are using - NEW FEATURE IN EXCEL 2013!  To get Flash Fill to work, you must type your pattern in enough cells for Excel to “see the pattern”; then it will fill in the cells in the column and you can tab to accept them.  The pattern used in this problem begins with the employees first and last initials and is followed by their birthdate (no zeros in the date). 
(3) #17 - Zoom Percentages - click on the percentage and use the dialog box to set this to the value desired.

SAM Excel Case 04:
(1) When placing charts in the locations specified; make sure that you can see the cell border lines outside the chart box.    The Cell border lines should make an outline for the chart box.  You do not want to completely cover the cell or it will be marked wrong.
(2) #1 – If you do not have a Histogram chart, check your version of the software.   This is only in the Excel 2016 and is not an option in the Mac version of the software.
(2) #2– You are being asked to change the Sparkline color; make sure you choose the color button and choose from the color gallery not the style options.
(3) When creating charts be careful to select the exact range of data given in the assignment.   If you don’t use the correct range, you may want to delete the chart and try again.
(4) #7 – Use the Select Data button for this; use the Axes Label information by editing the right column box.

SAM Excel Case 05:
(1) #3 – Leave the total in the 2020 field (you aren’t told to remove it, so do not)
(2) #4 – Number formatting in Pivot Tables must be set using the Value Field Settings option and not the Home Tab of the Ribbon.  
 (3) #15 - When placing the slicer box in the locations specified; make sure that you can see the cell border lines outside the slicer box.    The Cell border lines should make an outline for the slicer box.  The same concept used when placing charts in Module 4.
(5) #16 - When placing charts in the locations specified; make sure that you can see the cell border lines outside the chart box.    The Cell border lines should make an outline for the chart box.  The same concept used when placing charts in Module 4.

Tuesday, March 28, 2017

MAC Users Beware!

Mac security facts and fallacies

Posted March 8, 2017 by Thomas Reed

There are many Mac security myths circulating among users. So how can you tell if the advice you’re reading is fact or fallacy? Read on to find out!
Fallacy: Macs don’t get viruses

The idea that there are no viruses for the Mac goes back to the beginning of Mac OS X, at the very beginning of this millennium. Most people associate this idea most strongly with the “I’m a Mac/I’m a PC” commercials from a decade ago, such as this one that ran in 2006:

Unfortunately, this is a myth. As with most good myths, though, there’s a slight element of truth.
Technically speaking, a virus is malware that spreads by itself, by attaching itself to other files. By this strict definition, there are no Mac viruses. However, by that token, there also aren’t very many Windows viruses these days, either. Viruses have mostly disappeared from the threat landscape.
The average person, though, understands a virus to be any kind of malicious software. (A better term for this is “malware.”) Since there definitely is malware for the Mac, as well as a plethora of other threat types, the spirit of the “there are no Mac viruses” claim is completely false. Don’t allow yourself to be misled!

True malware is malicious in nature—thus the name, malicious software— with the goal of stealing or scamming data or money from the user. Examples of malware are backdoors that provide access to the computer, spyware that logs keystrokes and captures pictures with the webcam, ransomware that encrypts the user’s files in order to hold them for ransom, and other such nefarious programs.
On the Mac, true malware is rare. A “big spike” of new Mac malware happened in 2012, when 11 new pieces of malware appeared. The average Mac user has never seen any malware.

So why should Mac users be concerned? Because other threats are a rapidly growing problem on the Mac. Over the last several years, there has been an increasing amount of adware and Potentially Unwanted Programs (PUPs) for the Mac.

Adware is software that injects ads into websites where they don’t belong and changes your search engine to a different one. Adware is designed to scam advertisers and search engines. The infected Macs are no more than a vehicle for generating revenue fraudulently from advertisers and search engines, who pay these adware-producing “affiliates” for referrals.

PUPs are programs that are generally unwanted by users. These can include so-called “legitimate” keyloggers (marketed as a means for monitoring your kids or employees), scammy “cleaning” apps (Macs don’t need that kind of cleaning), supposed “antivirus” or “anti-adware” apps that don’t actually detect anything, and so on.

Adware and PUPs are a serious problem on the Mac right now. Although these things are not malware, they are a huge nuisance. Worse, they can create security vulnerabilities that make it more likely for you to get infected with actual malware. For example, in 2015, a vulnerability in a common PUP (MacKeeper) was used to install malware on Macs that had MacKeeper installed.
Fallacy: Macs are more secure than Windows

Many years ago, Apple abandoned the old “classic” Mac system in favor of one based on Unix, a mature and security-oriented system. Apple has made some great security improvements to macOS in recent years, and as a result, Macs are more secure today than they ever have been.
Of course, nothing is ever perfect, and macOS security is certainly far from it. There are plenty of ways to circumvent Mac security. Add to this the fact that security of Windows has improved over the years as well and it becomes difficult to say which system is more secure.

As with other such myths, there’s an element of truth here, though. Macs certainly suffer under a far smaller burden of threats than Windows. Many thousands of new Windows malware variants appear every day, while it’s a busy month in the Mac world if more than one new piece of malware appears. This means that, although there may not be any explicit, major security differences between the two systems, Macs do tend to be statistically safer simply due to the smaller number of threats.

Fact: macOS has built-in anti-malware software
Although this feature is well-hidden from the user, and cannot be turned off, this is true. Apple’s anti-malware software is called XProtect, and it consists of some basic signatures for identifying known malicious apps.
When you try to open an app for the first time, the system will check it against the XProtect signatures. If the app matches one of those signatures, the system won’t allow it to open.

Of course, there are a couple problems with XProtect. First, of course, as with any signature-based detection, it can only detect and block malware that Apple has seen before.
More importantly, though, it only detects malware. Since the vast majority of the threats for Macs are adware and PUPs, that leaves a lot that it doesn’t protect against. You shouldn’t rely on XProtect as your sole protection against threats, but nonetheless, this is very good layer of protection to have as an integral part of the system.

Fallacy: Macs don’t need security software
Antivirus software has gotten a bad rap on the Mac over the years. Thanks to historically low incidence of Mac malware, coupled with the system problems that some antivirus programs have been known to cause, Mac users are skittish about installing security software. Making matters worse, Mac “experts” will tell people that they don’t need security software, because macOS contains all the protection they need.

However, the number of Mac users infected by malware and other Mac threats has had exponential growth since 2010, when adware and PUPs weren’t really a thing on the Mac yet and when new malware sightings were few and far between. We’re seeing large numbers of people infected with Mac threats every day, on a much larger scale than even just a few years ago.

Clearly, there is an epidemic problem with threats—mostly adware and PUPs—on the Mac, and also clearly, the built-in security in macOS is not adequate to deal with this problem. It is becoming increasingly necessary for Mac users to have an additional layer of security, and in particular, to have something that is effective against adware and PUPs, which are the biggest problem. If you’re a Mac user, you might consider downloading software such as Malwarebytes Anti-Malware for Mac, which removes adware, PUPs, and malware for free.

Tuesday, February 28, 2017

BACK Door to SAM if Canvas is unavailable



When students initially registered for SAM via Canvas, they were prompted to create a Cengage account.

Using that same Cengage account, you can access SAM directly at https://login.cengagebrain.com/cb/

After logging in, you can click the “open” button next to your course title.

Students will be taken to SAM calendar page but can also switch to the SAM assignments tab to explore their assignments.  Everything else is the same from here.

Profs may need to click the sync button once Canvas comes back online to ensure grades sync from SAM to Canvas.

Click here for SAM Backdoor access instructions with images