Computers in Business

¡Supera tus tareas y exámenes ahora con Quizwiz!

Visting pornography sites while using and/or network violates your company's computer-use policy. you've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting prom sites at work and determine that you should report this activity. other co-workers also noticed this violation. you should

Tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network

True or false? iCloud is a form of mail?

True

Top level management (business executive and presidents)

Use information systems to monitor overall business performance

before you use your employer's computer network, you'll probably have to read and sign that you agree to abide by the network's ___ user policy

acceptable

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) _____, which closes the access point used by the hacker

block

In the work environment, it is often necessary to have multiple users on the same call. This feature is ___ calling

conference

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___

corruption

Because a data breach can hurt a business's reputation as well as being extremely ___ most business owners take data security very seriously

costly

collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___

data analyst

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ___

database administrator (DBA)

Before clicking send, be sure to ___ your email's attachment

double check

To avoid embarrassment, always ___ your attachment before clicking send

double check

The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the ___

information systems (information technology) security manager

Facebook messenger, viber, kik messenger, snapchat, and WhatsApp are examples of ____ messaging sites

instant

Katie loves istant messaging because she has friends that live overseas. Unlike texting, which requires a cellular connection, all Katie needs to IM is an app a(n) ____ connection

internet

When referring to business information technology, MIS stands for ___ information systems

manger

Sometimes used in smaller business networks, employee ___ software is impractical for large networks because of the number of users and the potential for misuse

monitoring

the roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the information system ____ manager.

security

Salutation

sets the tone of the message

While not a required step in sending an email, it's still wise to always ___ any message before clicking "send"

spell check

body

succinctly discusses the purpose of the message

when referring to management information systems, TPS stands for ___ processing systems

transaction

Top level management (business executive and presidents)

use information systems to foresee corporate opportunities and threats

From and/or Subject lines

Determines if the email will be opened

Business management software that encompasses nearly all business activities in a corporation is called ___ software

ERP

close

professionally ends the message

Middle mangers

use information systems for communicating polices and performance reports up and down the corporate ladder

Middle managers

use information systems for record keeping and reporting purposes

first level managers (supervisors, flood managers)

use information systems for recording the employee performance

First level mangers (supervisors, floor managers)

use information systems for scheduling daily and weekly operations

The usual tasks of data analysts

- creates reports for senior management - interprets information provided by the database - collects data

possible consequences of not setting a computer ethics policy

- decreased network speeds - increased likelihood security breaches - decreased employee performance - increased likelihood of data loss

Network intruder Detection systems (IDS) often have areas known as "padded cells" or ____ are easy to hack into and are used to catch hackers

honeypots

finance

providing current investment values and opportunities

The usual tasks of information systems (IS) program managers

- developing training plans and polices for IS - Supervising IS technicians - Working with developers and senior management to procure and implement IS processes

Which of these should business owners do to help protect their data

- ensure antivirus software is installed and up-to-date - establish strong firewall protection for their business's network - create strong password protections and protocols

Managers and network administrator should

- establish ethic standards - enforce standards by creating firewalls, setting filters, and establishing monitoring protocols - periodically reviewing computer ethics policies - instruct employees on standard

professional

- if possible, states when a return call can be expected - concise - states the number or office gat has been reached

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. This includes which of the following

- instructing employees on standards - periodically reviewing computer-use polices - enforcing standards by creating firewalls, monitoring protocols, and filters

If you own a small business, what can you do to ensure your computers and data is kept secure?

- keep software updated, particularly antivirus software - backup your data regularly - physically secure computers to minimize risk of theft

Select appropriate business email etiquette practices

- maintain high levels of formality, especially with initial contacts - consider if email is the appropriate means of communication

which category of management information systems (MIS) focuses on providing forecasting capabilities for sale and production?

DSS

A common feature of a business landline (hardwire) telephone services is the ability to have multiple users on the same call. This feature is _____

conference calling

Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___. most often, this crime is committed by employees inside the company rather than outside hackers

data theft

When referring to management information systems, DSS stands for ___ support systems

decision

operations

decision making software such as MIS

When referring to management information systems, ESS stands for ___ support systems

executive

It's always a good idea to check the _____ before clicking "replay

list of addressees

Before opening an Email, make sure you know and trust the send. Email may contain

malware

When referring to business information technology, MIS stands for

management information systems

along with the "from" line, what is the most important factor in ensuring your message is read?

the subject line

For which of the following activities would a typical marketing department need a strong information system?

- online sales - online advertising - updating business's social media

The appropriate business email etiquette practices

- remember that potentially negative news is best given face-to-face - keep attachments small

when you're creating a voice mail greeting on your business phone, you should tell the caller

- the voice mail that they've reached - when they can expect a return call - if possible, why you can't take the call

Business owners, copyright holders, and the network administrators publish ___ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software

AUPs

before using your employer's network, you'll probably have to read and agree to abide by the network ___

AUPs

executive rely on ___ software because it provides tools to run an entire corporation

Enterprise Resource Planning

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___

Information systems (information technology) technician

The role of installing, maintaining, repairing, and replacing information system hardware and software typically falls to the information system ____

technicians

When referring to management information systems, SCMS stands for supply chain ___ software

management

While you sometimes find this used in smaller business networks, employee ____ software is impractical for large networks because of the number of users and the potential for misuse

monitoring

though legal, which of the following would likely be prohibited by a typical business computer-use policy?

playing online games

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing polices for corporate IS typically falls to the information system __ manager

program

Accounting

records keeping and reporting

For which of the following activities would a typical accounting department need a strong information system?

records keeping and reporting

software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is ___ desktop software

remote

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called software

remote desktop

SCMS makes lean manufacturing processes such as just-in-time inventory practical. SCMS stands for ___ chain management software

supply

A form of email fraud where criminals change the account where money is being transferred is called a ___ -wire scam

wire

A form of email fraud where criminals change the account where money is being transferred is called a ___ scam

wire-wire

Marketing

-online advertising and using social media - search engine optimization

Disgruntled employees who are leaving their jobs sometimes think they have a right to take copyrighted material that they created for the business, even though it doesn't belong to them. This is called ___

data theft

A form of email fraud where criminals charge the account where money is being transferred is called a ___ scam

wire-wire

Unprofessional

- let's caller know the call is important - repetitive - long

Examples of management information systems (MIS) include

- ESS - DSS -TPS

Select the usual task of database administrators (DBAs)

- Monitors the database's performance - develops and maintains the database itself - establishes user privileges for the database to help protect the data

When reporting a computer ethics violation of a co-worker to your employer, it's important to:

- be brief and direct - state only what you witnessed

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a database ___

administrator

What is required to send an instant message from a mobile device?

an internet connection

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a data ___

analyst

"Thumb-sucking" refers to stealing information from a network using a ___

thumb drive

using information systems to help foresee corporate business opportunities and threats might be done all the level of management but it was most important for which management level?

top level managers


Conjuntos de estudio relacionados

Series 66 Investment Adviser act of 1940

View Set

Chapter 3 Quiz: Application Software

View Set

celebraciones tradicionales de venezuela

View Set

A & P Assignment 7 Study Guide Chapter 6

View Set

Įžymybių industrija - Egzaminas

View Set

Lecture 12 - Exam 2 - Thoracic Spine Evaluation and Treatment

View Set