IT exam 3 ╯︿╰

¡Supera tus tareas y exámenes ahora con Quizwiz!

Business management software that encompasses nearly all business activities in a corporation is called ________ software.

ERP

Select the e-mail services

Gmail, Outlook, iCloud

Select the usual roles of information systems (IS) technicians.

Installing IS hardware and software, maintaining IS hardware and software, repairing and replacing IS hardware and software.

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. This includes which of the following?

Instructing employees on standards, enforcing standards by creating firewalls, monitoring protocols, and filters, periodically reviewing computer-use policies.

If you own a small business, what can you do to ensure your computers and data is kept secure?

Keep software updated, particularly antivirus software, physically secure computers to minimize risk of theft, backup your data regularly.

Select appropriate business e-mail etiquette practices.

Maintain high levels of formality, especially with initial contacts, Consider if e-mail is the appropriate means of communication.

Be careful to only open e-mail from senders you know and trust. ________ may be contained in e-mail messages.

Malware

When referring to business information technology, MIS stands for ________.

Management information systems

Select appropriate business e-mail etiquette practices.

Remember that potentially negative news is best given face-to-face, Keep attachments small.

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

Which category of management information systems (MIS) focuses on tracking sales and inventories?

TPS

When reporting a computer ethics violation of a co-worker to your employer, it's important to ________.

be brief and direct, state only what you witnessed

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a ________, which closes the access point used by the hacker.

block

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________.

corruption

Stealing confidential materials such as copyrighted material, confidential information, or company e-mails from a network is called ________. Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. Failure to set such policies can lead to which of the following?

decreased employee performance, decreased employee performance, increased likelihood of security breaches

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________.

information systems (information technology) technician

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

online personal shopping

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

playing online games

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ________ software.

remote desktop

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ________.

database administrator (DBA)

Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse.

monitoring

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should

tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network, be brief and direct.

Business owners, copyright holders, and network administrators publish ________ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

AUPs

Select the usual tasks of a data analyst.

Collects data, interprets information provided by the database, creates reports for senior management.

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production? Multiple Choice

DSS

Select the usual tasks of database administrators (DBAs).

Monitors the database's performance, develops and maintains the database itself, establishes user privileges for the database to help protect the data.

Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it is most important for which management level?

top-level managers

A form of E-mail fraud where criminals change the account where money is being transferred is called a ________ scam.

wire-wire

Examples of management information systems (MIS) include ________.

TPS, DSS, ESS


Conjuntos de estudio relacionados

EC 201 Chapter 10: Externalities and Public Goods

View Set

Krueger, Explorations in Economics 1e, Module 35

View Set

First Americans to a New Nation ( Exam Number: 700752RR ) Penn Foster

View Set

Fundamentals of Nursing-Chapter 39-Activity & Exercise

View Set

COM 100 exam Pearsons Chapter 1-8

View Set