Skip to content

Bis 220 Week 3 Learning Team Assignments

BIS/221 Week 2

Everything listed for Week 2 is included in this purchase!


Charter:Individual Assignment


Resources: Week 2 Learning Team Collaborative Discussion and the Learning Team Charter for Collaborative Learning Activities.

Write a 150- to 200-word individual response to the following:

    • Consider the multiple definitions of collaboration.
    • Define collaboration and how you will apply it in this course based upon the

        discussion with your Learning Team. Be sure to reference and cite your sources.
    • Answer the questions individually.


How often should team members meet to discuss an assignment deliverable?


How will we work with others to achieve our assignment goals and work through conflict?


What modes of communication will we use? Where will we communicate?

Team contributions

What are the expectations for equitable contributions from each team member?

Assignment deadlines

Identify the dates in which team collaborative activities should be completed in order to complete the individual assignments

Other Considerations

Include any other special considerations for this team

Click the Assignment Files tab to submit your assignment and be sure to attach a copy of your Learning Team Charter for Collaborative Learning Activities.



Individual: Business Value of Software Applications

Option #1-Part I & Part II / Summary and Memo / Word Count: 1,929 words!

Option #2-Part I & Part II / Summary and Memo / Word Count: 1,532 words!


Security in the work place is a major concern businesses must address to protect company data. In addition, to automated security, it is also the company's responsibility to implement policies and procedures for the handling of data by company personnel. Students will research risks and threats to digital data and develop security policies all company personnel must be trained on and be held accountable to protect company data.
Part 1
Develop a 1,400-word summary describing the challenges businesses have in securing data in today's technological environment:
      • Include risks and threats of company data.
      • What policies/procedures should be implemented for the handling of data

          ensure data protection and business continuity?
Use the following features of Microsoft Word in your summary:
      • A Microsoft Word memo template.
      • Either a bulleted or numbered list of the new security policies/procedures, and

          bold or changed font color so this list is highly visible.
      • Highlight the effective date so it stands out.
      • Insert an image that is relevant to the memo content. Images must also be

          cited and referenced.
Save as a Microsoft Word document saved under the following format:
Format your assignment consistent with APA guidelines.
Part 2
Develop a 175-word memo announcing the new security policies to all employees taking effect in one month following mandatory training.
Search online for a Microsoft memo template.
Create an eye-catching memo that is clear and to the point concerning the new security policies. APA formatting is not required for this part of the assignment.
Save as a Microsoft Word document saved under the following format:
Format your assignment consistent with APA guidelines.
Click the Assignment Files tab to submit both parts of your assignments.


Learning Team Charter for Collaborative Learning Activities
Complete the Learning Team Charter for Collaborative Learning Activities with your Learning Team.
Each student must submit their own copy of the Learning Team Charter highlighting their input.


BIS/221 Week 2 Discussion Questions

Three Answer Choices included with each Discussion Question.


Supporting Activity:  Document Management Information Systems

What is a "Document Management Information System" and how valuable is it to organizations?


Supporting Activity: PDF Documents

What is a PDF and how is it used - is it secure?


Supporting Activity: Viruses

Class, Why do you think we are seeing so many top company's being hacked? Is it due to poor security measures?


Supporting Activity:Malware

Class, How do you protect your devices from malicious malware? Do you see the value of antivirus software?


Supporting Activity:Controls

Class. Identify the three major types of controls that organizations can use to protect their information resources, and provide an example of each one.




BUSINESS MODEL AND STRATEGIC PLAN PART II: SWOTT ANALYSIS 2 Business Model and Strategic Plan Part II: SWOTT Analysis Paper A SWOTT analysis is a critical examination used to evaluate both internal and external elements of a company and the influence they have over the company. A SWOTT analysis provides a company with information about achieved and achievable strengths and weaknesses, threats and risks as well as current business trends. For existing businesses it allows them to assess their market standing and can help them gain a better understanding for what they can do to have a competitive edge for the future. With a growing trend in health, people are continuously looking for alternatives to achieve a healthy lifestyle. Juicing is growing in popularity and is replacing the once favored sweet breakfast treat. Studies support that “juicing can reduce your risk of cancer, boost your immune system, help you remove toxins from your body, aid digestion and help you manage and lose weight” (Jennifer K. Nelson, 2014). Introducing juicing into Dunkin Donuts stores can give them the competitive edge they need to maintain their current lead in the market. However, before implementing a plan to add this new division it’s critical to complete a SWOTT analysis to determine how Dunkin’ Donuts is doing. The SWOTT analysis will also include an evaluation of economic, legal and regulatory forces and trends, critiques on how well they adapt to change and an explanation of the supply chain of the new division of the existing business. Strengths Dunkin’ Donuts is known for their variety of baked goods and coffees and have expanded across America with more than 10,000 restaurants across 38 states and 32 countries since first opening in 1950—making for a well-developed brand (Altmann, 2007). Dunkin’ Donuts stores are adorned with their brightly colored logo and the freshly brewed coffee and sweet donut aroma are unmistakable. They have mastered the art of opening locations in highly trafficked areas