Computer In Business
Along with the "From" line, what is the most important factor in ensuring your message is read? The close The salutation The body The subject line
The subject line
Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?
Top-level managers
"Thumb-sucking" refers to stealing information from a network using a ___
USB
Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt," which stops the hacker from progressing into the network. Another is called a(n) ___, which closes the access point used by the hacker. denial execution block stop
block
Allowing people to share a digital ledger across a network of computers, ___ uses computer code to create concatenated (linked together) blocks of transactions. pulsar blockchain memristor MEM
blockchain
Serving as the technology behind cryptocurrencies such as Bitcoin, ___ provides a level playing field for all users.
blockchain
In the work environment, it is often necessary to have multiple users on the same call. This feature is ___ calling.
conference
Errors in data occurring while entering, reading, processing, storing or transmitting are known as data ___. hacking corruption theft fraud
corruption
Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ___. data analyst information systems (information technology) program manager database administrator (DBA) information systems (information technology) technician
database administrator (DBA)
When referring to management information systems, DSS stands for: dedicated support systems. dynamic support systems. decision support systems. delegating support systems.
decision support systems.
IDS, which stands for Intruder ___ System, protects a network from hackers.
detection
When referring to business information systems, ERP stands for ___ resource planning.
enterprise
When referring to management information systems, ESS stands for ___ support systems.
executive
When referring to management information systems, ESS stands for: executive support systems energy support systems. enhanced support systems environmental support systems
executive support systems
The name "Blockchain" refers to how data are stored using this technology. Blockchain stores transaction data in blocks. Each block in the blockchain contains a _____ that is a digital fingerprint or unique identifier that helps to create secure transactions. script tag hash marker
hash
The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ___ data analyst information systems (information technology) technician database administrator (DBA) information systems (information technology) program manager
information systems (information technology) program manager
When creating your voice mail greeting for you business phone, it is important to ___. provide as much information as possible in your message Remain anonymous because it is a business number keep the message short and professional remind the caller that their call is very important
keep the message short and professional
Sometimes used in smaller business networks, employee _____ software is used to track employee activities while online. security monitoring safety managing
monitoring
While you sometimes find this used in smaller business networks, employee ____ software is impractical for large networks because of the number of users and the potential for misuse.
monitoring
Microsoft's Hotmail e-mail service has now transitioned to Microsoft ____
outlook
The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the information system _____ manager.
program
Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ____ desktop software.
remote
Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called: screen stealing supervisory software. access remote desktop
remote desktop
The role of installing, maintaining, repairing, and replacing information system hardware and software typically falls to the information system ____
technician
Steps of adding a new block to the blockchain in the correct order.
1. A transaction must take place 2. Transaction verification 3. Transaction storage 4. Adding a hash
Before using your employer's network, you will probably have to read and agree to abide by the network's: CPUs RAMs CPPs AUPs
AUPs
Which category of management information systems (MIS) focuses on corporate database drill-down capabilities? Transaction processing systems (TPS) Executive support systems (ESS) Decision support systems (DSS) Central processing system (CPS)
Executive support systems (ESS)
Which of the following are appropriate business e-mail etiquette practices? Finish your e-mails with a friendly joke. Keep attachments small. Remember that potentially negative news is best given face-to-face. Because it is an e-mail and not a business letter, use a casual writing style.
Keep attachments small. Remember that potentially negative news is best given face-to-face.
Which of the following three are examples of cryptocurrency? Flashcash Litecoin Ethereum Bitcoin
Litecoin Ethereum Bitcoin
For which of the following activities would a typical marketing department need a strong information system? Providing current investment values and opportunities. Online advertising Updating the business's social media sites Online sales
Online advertising Updating the business's social media sites Online sales
If you own a small business, which of the following can you do to ensure your computers and data are kept secure?
Physically secure computers to minimize risk of theft Backup your data regularly Keep software updated, particularly antivirus software
Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level? Top-level managers Middle managers First-level managers Supervisors
Top-level managers
Before you use your employer's computer network, you will probably have to read and sign that you agree to abide by the network's ____ user policy.
acceptable
When reporting a computer ethics violation of a co-worker to your employer, which two of the following guidelines are important to remember? forward any concerns from other co-workers be brief and direct state why the violation hurts the business state only what you witnessed
be brief and direct state only what you witnessed
Business management software that encompasses nearly all business activities in a corporation is called ___ software. global positioning system (GPS) decision support system (DSS) enterprise Resource Planning (ERP) transaction processing system (TPS)
enterprise Resource Planning (ERP)
The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the information system ___ manager.
security
Which of the following are the usual roles of information systems (IS) technicians? Installing IS hardware and software Researching databases to create reports Maintaining IS hardware and software Repairing and replacing IS hardware and software
Installing IS hardware and software Maintaining IS hardware and software Repairing and replacing IS hardware and software
Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a database ______
administrator
Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a data ___
analyst
In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. Failure to set such policies can lead to which of the following? higher employee morale decreased employee performance increased likelihood of security breaches decreased network speed
decreased employee performance increased likelihood of security breaches decreased network speed
The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the ___. information systems (information technology) security manager database administrator (DBA) information systems (information technology) technician data analyst
information systems (information technology) security manager
When referring to management information systems, SCMS stands for supply chain ____ software.
management
When referring to business information technology, MIS stands for ___. motivational, inspiring, spiritual mortgage investment strategies management information systems marketing intellectual systems
management information systems
When referring to management information systems, TPS stands for: troubled processing systems tested processing systems transaction processing systems transfer processing systems.
transaction processing systems
A form of E-mail fraud where criminals change the account where money is being transferred is called a: account-flip wire-wire cross-wire switch scam.
wire-wire
For which of the following activities would a typical accounting department need a strong information system? Determining current investment values Accessing decision-making software Records keeping and reporting Online sales and advertising
Records keeping and reporting
For which of the following activities would a typical accounting department need a strong information system? Online sales and advertising Records keeping and reporting Accessing decision-making software Determining current investment values
Records keeping and reporting
What are two characteristics of cryptocurrency? It makes it easy to track transactions. It is backed by the U.S. government. It has a fluctuating price. It is not portable.
It has a fluctuating price. It is not portable.
Created in 2008, ___ remains the most widely traded and respected cryptocurrency. No one truly knows who created Bitcoin, but the creator of the cryptocurrency goes by the pseudonym Satoshi Nakamoto.
Bitcoin
Which of the following are the usual tasks of data analysts? Collecting data Creating reports for senior management Updating the database software Interpreting information provided by the database
Collecting data Creating reports for senior management Interpreting information provided by the database
Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production? Executive information systems (EIS) Executive support systems (ESS) Decision support system (DSS) Transaction processing systems (TPS)
Decision support system (DSS)
Which of the following are the usual tasks of database administrators (DBAs)? Creates reports using information from the database Monitors the database's performance Develops and maintains the database itself Establishes user privileges for the database to help protect the data
Monitors the database's performance Develops and maintains the database itself Establishes user privileges for the database to help protect the data