computers in business

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

examples of MIS

-TPS -DSS -ESS

data analyst

-acquires info through use of databases -interprets the info -creates reports for senior management

IDS terms

-alert -halt -honeypot -block

ESS (Executive Support Systems)

-allow senior management to drill-down into all areas of a business's sales, inventories, production, marketing, and operational databases

remote desktop software

-allows user to control or display any computer on network -allows administrator to provide computer assistance from central location -allows for individual computer activity monitoring in cases of suspected network abuse -common feature of large business computer networks

information systems (IS) technician

-also known as IT -installs, maintains, repairs, and replaces IS hardware and software

information systems (IS) program manager

-also known as IT program manager -directs IS technicians -works with developers and senior management to procure and implement IS processes -develops training plans and policies for IS

Information Systems (IS) security manager

-also known as an IT or upper-security manager -creates and implements IS security measures -keeps sensitive info and networks (including WIFI) secure

ERP (Enterprise Rescue Planning)

-business management software that encompasses nearly all business activities in a corporation -covers supply purchasing, production or service levels, marketing, sales, shipping, human resource management, and finance and accounting -gives corporation leaders tools to manage everything within the organization

SCMS (Supply Chain Management Software)

-combines records keeping of TPS with the forecasting capabilities of DSS to help businesses manage inventories efficiently -focuses on inventory management efficiency and effectiveness

failure of ethical employee computer behavior can lead to

-decreased individual performance -decreased network speed -security breaches -loss of data -charges of harassment

DBA (Database Administrator)

-develops and maintains the database itself -establishes user privileges for database to help protect data -monitor's database's performance

AUP (Acceptable Use Policy)

-established by businesses to provide guidance for how its network should be used -restrict the way networks may be used -attempt to minimize the risk of having to take legal action

disadvantages of employee monitoring software

-impractical for large businesses -easily misused

DSS (Decision Support System)

-provide mid-level and upper-level management with tools to assist them in managing their organizations

TPS (Transaction Processing System)

-tracks sales and inventories for an organization -compiles the gathered info into a database where it can be analyzed or used for decision making or by decision support system software

advantages of employee monitoring software

-useful for small businesses -administrator can physically see each computer's activity

employee monitoring software

allows network administrator to view all computer activity from central location

block

closes the access point used by the hacker

in accounting

computer systems are critical to maintaining records and creating necessary reports

in research and development

computing power is essential

early wire-wire scam version

criminals pretended to be executives from suppliers who told customers to change the account

in operations

decision making software helps ensure best practices

honeypot

easily hacked portion of a network used to catch intruders

wire-wire scams

email fraud where criminal changes the account where money is being transferred/wired

data corruption

errors in data occurring while entering, reading, processing, storing, or transmitting

later wire-wire scam version

malware intercepts outgoing email and changes the recipient's routing and account numbers

top level managers such as executives, presidents, and vice-presidents use IS to

monitor overall business performance and forecast future opportunities and threats

in marketing

online sales and advertising, including the use of social media and techniques such as search engine optimization, have become critical

middle managers use IS to

record and report business performance and to implement the policies set forth from upper management

first level managers such as supervisors use IS to

schedule routine operations and for monitoring employee performance

MIS (Management Information Systems)

software that assists managers by improving efficiency and effectiveness

data theft

stealing confidential materials such as copyrighted material, confidential info, or company emails from a network

halt

stops hacker's activities

in finance

up-to-the-second information can make or break investors and investment decisions

alert

warns network administrators that an intruder has been detected


संबंधित स्टडी सेट्स

Skeletal Muscle: Structure and Contraction II

View Set

OWare- Essentials Of Communication 1-5 and vocab.

View Set

Series 66 - Unit 1 (Session 1, 2 & 3) next 300

View Set

APUSH- Chapter 10 American Pageant Selection Questions

View Set

Diversity, Equity, & Inclusion - 9/4/22

View Set