Computers in business
Put the following steps in order for creating a new email message in Microsoft outlook
1.Open outlook 2. Click new 3. enter 4. Type subject 5. your message 6. send
1.Illegal computer activity 2.Legal, but often violate business computer use policies
1.Software piracy Copyright Infringement Computer scams Child pornography Bomb threats 2.Visiting personal social mmedia sites Sending/opening personal email Online shopping Playing online games
Before using your empolyer's network, you'll probably have to read and agree to abide by the networks
AUPs
Business owners, copyright holders, and network administrators publish
AUPs
When you're creating a voice mail greeting on your business phone, you should tell the caller:
If possible, why you can't take the call When they can expect a return call The voice mail they they've reached
Select the usual tasks of information system program managers
Supervising IS technicians Developing training plans and policies for IS Working with developers and senior management to procure and implement IS processes
Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.
corruption
Visiting pornography
Tell your boss that you've witnessed the co-worker visiting porn Be brief and direct
Before you use your employer's computer network, you'll probably have to read and sign that you agree to abide by the network's
acceptable user policy
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
playing online games
The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___
technician
Collecting data, interpreting information gleaned from a data and preparing reports for senior management are tasks that are typically assigned to a data
analyst
Disgruntled
data theft
When referring to management information systems, DSS stand
decision support systems
IDS, which stands for intruder
detection system
Before opening an Email, make sure you know and trust the sender. Email may contain
malware
When referring to business information technology, MIS stands for
management information systems
The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the information system
program manager
1. Pro 2. Unpro
1. states the number or office that has been reached If possible, states when a return call can be expected Concise 2. Let's caller know the call is important Long Repetitive
The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an orgasnization's IS typically falls to the
Information systems (information technology) security manager
Katie
Internet connection
If you own a small business, what can you do to ensure your computers and data is kept secure?
Keep software updated Physically secure computers to minimize risk of theft Backup your data regularly
When creating your voice mail greeting for you business phone, it's important to:
Keep the message short and professional
Select the usual tasks of database administrators (DBAs).
Monitors the database's performance Develops and maintains the database itself Establishes user privileges for the database to help protect the data
Managers and network administrators should: Possible consequences of not setting a computer ethics policy
Periodically revieing computer ethics policies Establish ethics standards Enforce standards Instruct employees on standards
When reporting a computer ethics violation of co-worker to your employer, it's important to:
State only what you witnessed Be brief and direct
Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called
remote desktop sfotware
Place the following steps in order to attach a document from your documents folder to an email in outlook
1. Go to outlook 2. Click attach 3. Select computer 4. Select documents 5. Double click
Select the usual tasks of a data analyst.
Creates report for senior management Collects data Interprets information provided by the database
Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production
DSS
In the work environment, it is often necessary have multiple users on the same call. This feature is
conference calling
When referring to management information systems, ESS stands
executive support systems
Network Intruder Detection Systems(IDS) often have areas known as "padded cells" or
honeypots
When referring to management information systems, SCMS stands for supply chain
management software
While you sometimes find this used in smaller business network employee
monitoring software
Sometimes used in smaller business networks, employee
monitoring software is impractical for large networks because of the number of users and potential for misuse
For which of the following activities would a typical accounting department need a strong information system?
records keeping and reporting
When referring to management information systems, TPS stands for
transaction processing systems
A form of Email fraud where criminals change the account where money is being transferred is called a
wire-wire scam
Which pf these should business owners do to help protect their data
Establish strong firewall protection for their business's network Create strong password protections and protocols Ensure antivirus software is installed and up to date
Select appropriate business email etiquette practices
Keep attachments small Remember that potentially negative news is best given face-to-face
Along with the From line, what is the most important factor in ensuring your message is read?
The subject line
Match the business information activity
Top level: Uses information systems for foresee corporate opportunities and threats. monitor Middle managers: Uses information systems for communication policies and performance reports up and down the corporate ladder. reporting purpose Uses information systems for recording line employee performance. scheduling daily and weekly
Select the usual tasks of information systems (IS) program managers.
Creates and implements an organization's IS security measures Responsible for keeping an organization's Wi-Fi network secure
Even though it is legal, which of the following would likely be prohibited by a typical business computer-use-policy
Online personal shopping
Business management software that encompasses nearly all business activities in a corporation is called
ERP software