Computers in Business Quiz

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Business management software that encompasses nearly all business activities in a corporation is called ___ software.

ERP

Examples of management information systems (MIS) include _____ .

ESS TPS DSS

When reporting a computer ethics violation of a co-worker to your employer, it's important to ______.

be brief and direct state only what you witnessed

Select the usual tasks of a data analyst.

collects data creates reports for senior management interprets information provided by the database

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___. These come in 2 categories, detected, which usually result in system failures, and silent, which are much harder to discover and can cause lasting problems.

corruption

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___ .

data analyst

When referring to business information systems, ERP stands for ___ resource planning.

enterprise

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___ .

information systems (information technology) technician

When referring to business information technology, MIS stands for ___ information systems.

management

When referring to management information systems, SCMS stands for supply chain ___ software.

management

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ___ software.

remote desktop

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss.You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation.You should

tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network. tell your employer that visiting porn sites while using computer can hurt the company's business if potential customers see this activity. tell you boss that others have told you that this co-worker frequently visits porn sites at work.

Place the following in order if you were opening and reading a message in Outlook.

1. Go to Outlook (log in if necessary). 2. Click Inbox. 3. Click on the message you wish to open. 4. After reading the message, click X to close or Delete to remove the message from your inbox.

Select appropriate business email etiquette practices.

Remember that potentially negative news is best given face-to-face. Keep attachments small.

Which category of management information systems (MIS) focuses on tracking sales and inventories?

TPS

IDS, which stands for Intruder ___ System, protects a network from hackers.

detection

Put the following steps in order for creating a new email message in Microsoft Outlook.

1. Open Outlook (log in if necessary). 2. Click New. 3. Enter the recipient's address in the To area. 4. Type the subject in the Subject area. 5. Type your message in the area beneath the formatting buttons. 6. Click Send.

Match the business information systems (IS, sometimes called information technology or IT) activity with the appropriate management level: 1. Middle managers 2. Top level management (business executives and presidents) 3. First level managers (supervisors, floor managers)

1. Use IS for record keeping and reporting purposes. 2. Use IS to monitor overall business performance. 3. Use IS for scheduling daily and weekly operations.

Match the component of a business email with its characteristics. 1. From and/or Subject lines 2. Body 3. Salutation 4. Close

1. determines if the email will be opened 2. succinctly discusses the purpose of the message 3. sets the tone of the message 4. professionally ends the message

Along with the From line, what is the most important factor in ensuring your business message is read?

the subject line


Ensembles d'études connexes

Chem 1310, Some Common Polyatomic Ions

View Set

Life Insurance Policies- Provisions, Options and Riders Chapter exam 1

View Set

PSYCH 104 - CH5 Probability Test

View Set

Past Multiple Choice Questions on Quizzes - Semester Test Edition

View Set

DIAMANTE - poema de Rubén Darío - Diamond - a poem by Ruben Dario

View Set

Exam #1 Topic: Analyzing Business Processes

View Set

Health and Life Insurance Exam, Questions

View Set