Computers in Business

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.

corruption

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___ .

data analyst

Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___ . Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ___ .

database administrator (DBA)

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___ .

information systems (information technology) technician

It's always a good idea to check the ___ before clicking Reply to All.

list of addresses

Sometimes used in smaller business networks, employee ___ software is impractical for large networks because of the number of users and the potential for misuse.

monitoring

Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?

top level managers

Select the email services.

- Gmail - Outlook - iCloud

Select the usual roles of information systems (IS) technicians.

- Installing IS hardware and software. - Maintaining IS hardware and software. - Repairing and replacing IS hardware and software. - Researching databases to create reports.

Select appropriate business email etiquette practices.

- Maintain high levels of formality, especially with initial contacts - Consider if email is the appropriate means of communication

Select appropriate business email etiquette practices.

- Remember that potentially negative news is best given face-to-face - Keep attachments small. - Because it's an email and not a business letter, use a casual writing style.

When reporting a computer ethics violation of a co-worker to your employer, it's important to ______.

- be brief and direct - state only what you witnessed

For which of the following activities would a typical marketing department need a strong information system?

- online sales - online advertising - updating the business's social media sites - providing current investment values and opportunities

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should?

- tell your boss that you've witnessed the co-worker visiting porn sites while using company computer or network - be brief and direct - tell your employer that visiting porn sites while using computer can hurt the company's business if potential customers see this activity - tell your boss that others have told you that this co-worker frequently visits porn sites at work

Be careful to only open email from senders you know and trust. ___ may be contained in email messages.

Malware

Which of the following is an email program?

Outlook

Match the component of a business email with its characteristics. 1. Body 2. Salutation 3. Close 4. From and/or Subject lines

1. succinctly discusses the purpose of the message 2. sets the tone of the message 3. professionally ends the message 4. determines if the email will be opened

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. Failure to set such policies can lead to which of the following?

- decreased employee performance - decreased network speed - increased likelihood of security breaches - higher employee morale

Select the usual tasks of database administrators (DBAs).

- monitors the database's performance - develops and maintains the database itself - establishes user privileged for the database to help protect the data - creates reports using information from the database

Match the business information activity with the appropriate management level: 1. Middle managers 2. Top level management (business executives and presidents) 3. First level managers (supervisors, floor managers)

1. Use information systems to foresee corporate opportunities and threats. 2. Use information systems for communicating policies and performance reports up and down the corporate ladder. 3. Use information systems for recording line employee performance.

Information and information systems are important in all areas of business. Match the computer activity that would correspond with the business activity: 1. Finance 2. Accounting 3. Operations 4. Marketing

1. providing current investment values and opportunities 2. records keeping and reporting 3. decision making software such as MIS 4. online advertising and social media


संबंधित स्टडी सेट्स

Pathway of blood flow through the heart

View Set

Chapter 6 (Somatic Symptom Disorders)

View Set

Anatomy - Chapter 11: The Cardiovascular System

View Set

operating systems chp 6 practice questions

View Set