Computers in Organization

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

IDS, which stands for Intruder _______ System, protects a network from hackers.

Detection

To avoid embarrassment, always ______ your attachment before clicking Send.

Double-check

Examples of management information systems (MIS) include:

ESS TPS DSS

When referring to business information systems, ERP stands for _____ resource planning.

Enterprise

Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?

Top Level Managers

When you're creating a voice mail greeting on your business phone, you should tell the caller:

When they can expect a return call. The voice mail that they've reached. If possible, why you can't take the call.

Along with the "From" line, what is the most important factor in ensuring your message is read?

The subject line

Learning platforms that use algorithms to adjust the content that each student sees in order to maximize learning efficiency is called _____ learning.

Adaptive

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a database ______.

Administrator

What is required to send an instant message from a mobile device?

An Internet connection

Collecting data, interpreting information gleaned from a database, and preparing reports for a senior management are tasks that are typically assigned to a data _______.

Analyst

When creating your voice mail greeting for your business phone, it's important to:

Keep the message short and professional

It's always a good idea to check the ____ before clicking ""Reply all".

List of addresses

The Finger Reader, developed by Fluid Interfaces at _______ can enable the blind to access printed text.

MIT

Select appropriate business email etiquette practices.

Maintain high levels of formality, especially with initial contacts. Consider if email is the appropriate means of communication.

Before opening an Email, make sure you know and trust the sender. Email may contain ________.

Malware

When referring to business information technology, MIS stands for _______ information systems.

Management

AviCenna, developed by IBM, is a smart software that reviews medical images such as CT scans. This technology can reduce the need to have _________.

Radiologists

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ________ desktop software.

Remote

Select the usual tasks of information systems (IS) security managers.

Responsible for keeping an organization's Wi-Fi network secure. Creates and implements an organization's IS security measures.

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

The role's of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the information system _______ manager.

Security

While every election has its losers, one big winner in the 2016 U.S. presidential election was ______ media.

Social

The Da Vinci robot, named after the infamous artist and inventor, has a magnified 3D high-definition vision system and tiny wristed instruments that bend and rotate far greater than the human hand that allow _______ to perform intricate procedures.

Surgeons

Select what's true about 3D crime scene imaging cameras.

Using 3D scanning forensic scientists can analyze line of sight, blood splatter, and bullet trajectories. 3D forensic technology replicates then entire crime scene before it is altered. These cameras allow law enforcement officers to verify witness testimony or evaluate plausible hypotheses.

Before using your employer's network, you'll probably have to read and agree to abide by the network's ______.

AUP's

Business management software that encompasses nearly all business activities in a corporation is called _______ software.

ERP

"Thumb-sucking" refers to stealing information from a network using a ________.

Flash drive

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________.

Information systems technician

When reporting a computer ethics violation of a co-worker to your employer, it's important to:

State only what you witnessed. Be brief and direct.

What category of management information systems (MIS) focuses on tracking sales and inventories?

TPS

Though legal, which one of the following would likely be prohibited by a typical business computer-use policy?

Playing online games.

To assist patients with diabetes to monitor their glucose levels, Google and Novartis International Global Healthcare Company teamed up to create a smart _____ lens.

Contact

Which category of management information systems (MIS) focuses eon providing forecasting capabilities for sales and production?

DSS

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the information system ______ manager.

Program

Visiting pornographic websites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should:

Be brief and direct. Tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.

In the work environment, it is often necessary to have multiple users on the same call. This feature is _______ calling.

Conference

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data _______.

Corruption

Sometimes used in smaller business networks, employee _____ software _______ is impractical for large networks because of the number of users and potential for misuse.

Monitoring

Replacement body parts that interact with a person's nervous system is a technology called ______.

Neuroprosthetics

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. The includes which of the following:

Periodically reviewing computer-use policies. Instructing employees on standards. Enforcing standards by creating firewalls, monitoring protocols, and filters.

If you own a small business, what can you do to ensure your computers and data is kept secure?

Physically secure computers to minimize risk of theft. Keep software updated, particularly antivirus software. Backup your data regularly.

In the body of a professionally formatted business email, where should a request be placed?

In the first sentence of your email


Ensembles d'études connexes

Math Facts - x4, x5, Math Facts Challenge: x2, x3

View Set

SP19: FINANCIAL MANAGEMENT - Exam 2

View Set

Methods of Securing Information Quiz

View Set

CyberCollege TV Production Modules 41 - 45

View Set

Precision nutrition Intro: What is good nutrition (workbook)

View Set

Google Level 1 Certification: Practice Multiple Choice

View Set