Computers in Organization
IDS, which stands for Intruder _______ System, protects a network from hackers.
Detection
To avoid embarrassment, always ______ your attachment before clicking Send.
Double-check
Examples of management information systems (MIS) include:
ESS TPS DSS
When referring to business information systems, ERP stands for _____ resource planning.
Enterprise
Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?
Top Level Managers
When you're creating a voice mail greeting on your business phone, you should tell the caller:
When they can expect a return call. The voice mail that they've reached. If possible, why you can't take the call.
Along with the "From" line, what is the most important factor in ensuring your message is read?
The subject line
Learning platforms that use algorithms to adjust the content that each student sees in order to maximize learning efficiency is called _____ learning.
Adaptive
Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a database ______.
Administrator
What is required to send an instant message from a mobile device?
An Internet connection
Collecting data, interpreting information gleaned from a database, and preparing reports for a senior management are tasks that are typically assigned to a data _______.
Analyst
When creating your voice mail greeting for your business phone, it's important to:
Keep the message short and professional
It's always a good idea to check the ____ before clicking ""Reply all".
List of addresses
The Finger Reader, developed by Fluid Interfaces at _______ can enable the blind to access printed text.
MIT
Select appropriate business email etiquette practices.
Maintain high levels of formality, especially with initial contacts. Consider if email is the appropriate means of communication.
Before opening an Email, make sure you know and trust the sender. Email may contain ________.
Malware
When referring to business information technology, MIS stands for _______ information systems.
Management
AviCenna, developed by IBM, is a smart software that reviews medical images such as CT scans. This technology can reduce the need to have _________.
Radiologists
Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ________ desktop software.
Remote
Select the usual tasks of information systems (IS) security managers.
Responsible for keeping an organization's Wi-Fi network secure. Creates and implements an organization's IS security measures.
Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?
SCMS
The role's of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the information system _______ manager.
Security
While every election has its losers, one big winner in the 2016 U.S. presidential election was ______ media.
Social
The Da Vinci robot, named after the infamous artist and inventor, has a magnified 3D high-definition vision system and tiny wristed instruments that bend and rotate far greater than the human hand that allow _______ to perform intricate procedures.
Surgeons
Select what's true about 3D crime scene imaging cameras.
Using 3D scanning forensic scientists can analyze line of sight, blood splatter, and bullet trajectories. 3D forensic technology replicates then entire crime scene before it is altered. These cameras allow law enforcement officers to verify witness testimony or evaluate plausible hypotheses.
Before using your employer's network, you'll probably have to read and agree to abide by the network's ______.
AUP's
Business management software that encompasses nearly all business activities in a corporation is called _______ software.
ERP
"Thumb-sucking" refers to stealing information from a network using a ________.
Flash drive
The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________.
Information systems technician
When reporting a computer ethics violation of a co-worker to your employer, it's important to:
State only what you witnessed. Be brief and direct.
What category of management information systems (MIS) focuses on tracking sales and inventories?
TPS
Though legal, which one of the following would likely be prohibited by a typical business computer-use policy?
Playing online games.
To assist patients with diabetes to monitor their glucose levels, Google and Novartis International Global Healthcare Company teamed up to create a smart _____ lens.
Contact
Which category of management information systems (MIS) focuses eon providing forecasting capabilities for sales and production?
DSS
The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the information system ______ manager.
Program
Visiting pornographic websites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should:
Be brief and direct. Tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.
In the work environment, it is often necessary to have multiple users on the same call. This feature is _______ calling.
Conference
Errors in data occurring while entering, reading, processing, storing or transmitting is known as data _______.
Corruption
Sometimes used in smaller business networks, employee _____ software _______ is impractical for large networks because of the number of users and potential for misuse.
Monitoring
Replacement body parts that interact with a person's nervous system is a technology called ______.
Neuroprosthetics
In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. The includes which of the following:
Periodically reviewing computer-use policies. Instructing employees on standards. Enforcing standards by creating firewalls, monitoring protocols, and filters.
If you own a small business, what can you do to ensure your computers and data is kept secure?
Physically secure computers to minimize risk of theft. Keep software updated, particularly antivirus software. Backup your data regularly.
In the body of a professionally formatted business email, where should a request be placed?
In the first sentence of your email