Computers in Business Quiz - CGS2100

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Select the usual tasks of a data analyst.

- Collects data - Interprets information provided by the database - Creates reports for senior management

Select the usual roles of information systems (IS) technicians.

- Installing IS hardware and software -Maintaining IS hardware and software - Repairing and replacing IS hardware and software

Select appropriate business e-mail etiquette practices.

- Remember that potentially negative news is best given face-to face - Keep attachments small

Select the usual tasks of information systems (IS) program managers.

- Supervising IS technicians - Working with developers and senior management to procure and implement IS processes - Developing training plans and policies for IS

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

DSS

Business management software that encompasses nearly all business activities in a corporation is called ________ software.

ERP

When referring to business information technology, MIS stands for ________.

management information systems

Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse.

monitoring

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. This includes which of the following?

- Instructing employees on standards - Enforcing standards by creating firewalls, monitoring protocols, and filters - Periodically reviewing computer-use policies

If you own a small business, what can you do to ensure your computers and data is kept secure?

- Keep software updated, particularly antivirus software - Physically secure computers to minimize risk of theft - Backup your data regularly

Select appropriate business e-mail etiquette practices.

- Maintain high levels of formality, especially with initial contacts - Consider if e-mail is the appropriate means of communication

Select the usual tasks of database administrators (DBAs).

- Monitors the database's performance - Develops and maintains the database itself - Creates reports using the information from the database

Examples of management information systems (MIS) include ________.

- TPS - DSS - ESS

For which of the following activities would a typical marketing department need a strong information system?

- online sales - online advertising - updating the business's social media sites

Match the business information systems (IS, sometimes called information technology or IT) activity with the appropriate management level. 1) First Level Managers 2) Middle Managers 3) Top-level management

1) Use IS for scheduling daily and weekly operations 2) Use IS for record keeping and reporting purposes 3) Use IS to monitor overall business performance

Match the business information activity with the appropriate management level. 1) First level managers 2) Top-level management 3) Middle managers

1) Use information systems for recording line employee performance 2) Use information systems to foresee corporate opportunities and threats 3) Use information systems for communicating policies and performance reports up and down the corporate ladder

Business owners, copyright holders, and network administrators publish ________ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

AUPs

In the body of a professionally formatted business e-mail, where should a request be placed?

in the first sentence of the body of your e-mail

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ________.

information systems(information technology) program manager

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________. Multiple Choice

information systems(information technology) technician

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

online personal shopping

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ________ software.

remote desktop

Along with the From line, what is the most important factor in ensuring your business message is read?

the subject line

A form of E-mail fraud where criminals change the account where money is being transferred is called a ________ scam.

wire-wire

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________.

corruption

Stealing confidential materials such as copyrighted material, confidential information, or company e-mails from a network is called ________. Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

Which category of management information systems (MIS) focuses on tracking sales and inventories?

TPS

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a ________, which closes the access point used by the hacker.

block


Ensembles d'études connexes

Unit 8 Lesson 1 The Early Middle Ages

View Set

EXAM 2: Nerve tissue & glial cells

View Set

Radiology: Hand and finger projections

View Set

Chapter 16: Email and Instant Messaging

View Set

AAS Spelling Rules Level 2 and 3

View Set

Unit3 Chapter 24 Heart Failure Drugs

View Set

Enlightenment and the American Revolution Chp. 17 (Mr. Kibs)

View Set