0% found this document useful (0 votes)
186 views4 pages

Bim II Syllabus

Uploaded by

api-219666681
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
186 views4 pages

Bim II Syllabus

Uploaded by

api-219666681
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Business Information Management II Course Syllabus J.M.

Hanks High School 2013-2014 Instructor: E-Mail: Classroom: Teresa Bailey [email protected] 506 Phone: 915-434-5000 Website: tbailey1.weebly.com

This course develops intermediate level technology skills along with applications to personal or business situations focusing on word processing, spreadsheets, databases, desktop publishing, presentation management, operation systems and emerging technologies Course Objectives Students implement personal and interpersonal skills to strengthen individual performance in the workplace and in society and make a successful transition to the workforce and postsecondary education; Interact in the Windows interface; Familiarize students with a variety of Microsoft Office 2010 applications; Create and revise word processing documents; Prepare spreadsheets for problem solving; Develop creative desktop publications; Understand the use of database management software to organize and present information. Obtain knowledge of essential computer concepts related to use of hardware, software, and operating systems; Design and communicate information using presentation management technology; Students analyze the social responsibility of business and industry regarding the significant issues relating to the environment, ethics, health, safety, and diversity in society and in the workplace; Students develop a foundation in the economic, financial, technological, international, social and ethical aspects of business to become competent consumers, employees, and entrepreneurs; Students enhance reading, writing, computing, communications and reasoning skills and apply them to the business environment Units of Study Soft Skills o Verbal & Non-verbal communication o Written communication o Attitude o Problem Solving & Critical Thinking o Diversity o Conflict Resolution Advanced Technical Skills o Excel Public Relations o Internal & External Communication o Presentation Management Report Writing o Memo o Proposal o Feasibility Study

o Marketing Plan Project Management o Creating & Planning a Business Project o Managing & Implementing a Business Project o Analyzing & Evaluating a Business Project

Supplies needed EVERY DAY 1 Three ring binder (1-2) Subject dividers Pen (black or blue) Thumb/Flash drive Notebook paper

Make-up Work Procedures Daily work will be posted on a calendar located in a prominent place in the classroom. It is the students responsibility to check the calendar and/or ask the teacher about making up any missed work. Most students will be able to complete their work in the classroom, however when a student misses a class or falls behind they must come in to tutorials complete to missing assignments. Absences Students have three class days after an absence to make up missed work for full credit. On the fourth day following an absence, students may turn in work for a maximum grade of 50. Students who turn in after the fourth day will not receive credit. Late Work When a student has been present in class and does not turn work in on the due date; they have three additional days to make up their work for partial credit. Ten points will be deducted for each day late and work turned in after the third day late will not receive credit. Grading System Daily Work = 25% Quizzes= 25% Tests/Major Projects = 50%

Students are expected to complete all assigned work successfully and punctually. Grade Check Procedures Parents and students may check grades via PowerParent. On completion of grading of each assignment, grades will be posted in a prominent place in the classroom. It is each students responsibility to check their own grade for each assignment. Binder Students may determine how to organize the class work in the way that best suits them. I strongly suggest that students keep all notes and handouts. Students will not have an issued textbook, so preparation for tests and semester exams will need to come from their own collection of papers. Any graded work needs to be kept for grade verification reasons.

Academic Integrity Any test, paper or report submitted by you and that bears your name is presumed to be your own original work that has not previously been submitted for credit in another course unless you obtain prior written approval to do so from your instructor. In all of your assignments, including your homework or drafts of papers, you may use words or ideas written by other individuals in publications, web sites, or other sources, but only with proper attribution. "Proper attribution" means that you have fully identified the original source and extent of your use of the words or ideas of others that you reproduce in your work for this course, usually in the form of a footnote or parenthesis. As a general rule, if you are citing from a published source or from a web site and the quotation is short (up to a sentence or two) place it in quotation marks; if you employ a longer passage from a publication or web site, please indent it and use single spacing. In both cases, be sure to cite the original source in a footnote or in parentheses. If you are not clear about the expectations for completing an assignment or taking a test or examination, be sure to seek clarification from your instructor. In fairness to students who put in an honest effort, cheaters will be harshly treated. Any evidence of cheating will result in a score of zero (0) on that assignment or examination. Cheating on the final exam results in an "F" for the course. Cheating includes but is not limited to bringing notes or written or electronic materials into an exam or quiz, using notes or written or electronic materials during an exam or quiz, copying off another person's exam or quiz, allowing someone to copy off of your exam or quiz, and having someone take an exam or quiz for you. Incidences of cheating will be reported to J.M. Hanks administration. Finally, you should keep in mind that as a member of the campus community, you are expected to demonstrate integrity in all of your academic endeavors and will be evaluated on your own merits. So be proud of your academic accomplishments and help to protect and promote academic integrity at J.M. Hanks High School. The consequences of cheating and academic dishonestyincluding a formal discipline file, possible loss of future internship, scholarship, or employment opportunities, are simply not worth it. Cell Phone Policy 1. Students are permitted to bring their cell phone to school. I embrace the potential that cell phones can be used as a technological learning tool in the classroom and will implement the use of cell phones when appropriate into students lessons. 2. Students will be trained at the beginning of the year as to what proper cell phone etiquette is within the confines of this classroom. Students may use their cell phones for personal use during transition periods or at lunch. Students are expected to turn their cell phones off when entering my classroom. Any student who abuses this privilege will be required to attend a cell phone etiquette refresher course. 3. Cell phones will be confiscated if they are being used for any reason outside of the learning environment. The following actions will apply: a. Confiscation of the device; b. Notification of parent/guardian; c. Conference with parent/guardian;

d. Referral to law enforcement if violation involves illegal activity; e. Additional options as determined appropriate by an administrator. Classroom Expectations 1. 2. 3. 4. 5. Please be seated and log in to your computer when the bell rings; Students must wear their IDs in class at all times; Be polite, respectful and positive; Students will request permission from the teacher, in an emergency, to use the restroom; Students will remain at their own desks (tables) in their seats at the end of the period. I will dismiss the class not the bell 6. Students will raise their hands and wait for permission to speak during the class period; 7. Students will keep workstations clean by throwing away any unnecessary papers and pushing chairs in before leaving. Procedures: Log in to computer and start bell work immediately; If you must leave the room during class for any reason, please sign out. Sign back in upon re-entering the classroom. This is necessary for student accountability and safety. Return materials you utilize to their proper place before leaving the room;

Bell Ringer Procedures As students enter the classroom, the activity begins. The bell ringer activity is on teachers website; tbailey1.weebly.com. Students immediately begin working on the assigned task. Monday & Wednesday - Blogging Tuesday & Thursday Typing Friday Cartoon Creation Rules Specific to the Computers: 1. All students must adhere to the YISD Student Technology Acceptable Use Policy and Internet Safety Policy located in the YISD Student Handbook. 2. Computers are the property of the school district; therefore no changing of settings or downloading of any kind will be permitted. No misuse or mistreatment of any of the equipment will be tolerated; 3. No unauthorized games may be played on the computers; 4. No outside software or any other electronic equipment is allowed in the lab; 5. Log off the computer at the end of class. Ten Commandments of Computer Ethics 1. Do not use a computer to harm other people; 2. Do not interfere with other peoples computer work; 3. Do not snoop around in other peoples files; 4. Do not use computers to steal information (assignments, etc.) that do not belong to you; 5. Do not use a computer to bear false witness (lie about someone); 6. Do not use or copy software for which you have not paid; 7. Do not use other peoples computer resources without authorization; 8. Do not plagiarize other peoples intellectual output; 9. Think about the consequences of the program or information you write; Use a computer in ways that show consideration and respect.

You might also like