CGS Computers in Business

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of these should business owners do to help protect their data.

- Establish strong firewall protection for their business's network. - Ensure antivirus software is installed and up-to-date. - Create strong password protections and protocols.

Select the usual roles of information systems (IS) technicians.

- Installing IS hardware and software. - Maintaining IS hardware and software. - Repairing and replacing IS hardware and software.

Select the usual tasks of database administrators (DBAs).

- Monitors the database's performance. - Develops and maintains the database itself. - Establishes user privileges for the database to help protect the data.

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

- Playing online games - Online personal shopping

Select appropriate business e-mail etiquette practices.

- Remember that potentially negative news is best given face-to-face. - Keep attachments small.

Select the usual tasks of information systems (IS) program managers.

- Supervising IS technicians. - Working with developers and senior management to procure and implement IS processes. - Developing training plans and policies for IS.

Examples of management information systems (MIS) include ________.

- TPS - DSS - ESS

Select the usual tasks of a data analyst.

- collects data - interprets information provided by the database - creates reports for senior management

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. Failure to set such policies can lead to which of the following?

- decreased employee performance - decreased network speed - increased likelihood of security breaches

When reporting a computer ethics violation of a co-worker to your employer, it's important to ________.

-Be brief and direct -State only what you witnessed

Professionally ends the message

Close

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________.

Corruption

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

DSS

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________.

Information systems (information technology) technician

Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse.

monitoring

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ________ software.

remote desktop

It's always a good idea to check the ________ before clicking Reply to All.

list of addresses

Be careful to only open e-mail from senders you know and trust. ________ may be contained in e-mail messages.

malware

While not a required step in sending an e-mail, it's wise to ________ any message before clicking Send.

spell-check

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. This includes which of the following?

- Instructing employees on standards. - Enforcing standards by creating firewalls, monitoring protocols, and filters. - Periodically reviewing computer-use policies.

For which of the following activities would a typical marketing department need a strong information system?

- Online sales - Online advertising - Updating the business's social media sites

Select the e-mail services.

-Gmail -Outlook -iCloud

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. This includes which of the following?

-Instructing employees on standards -Enforcing standards by creating firewalls, monitoring protocols, and filters -Periodically reviewing computer-use policies

If you own a small business, what can you do to ensure your computers and data is kept secure?

-Keep software updated, particularly antivirus software -Physically secure computers to minimize risk of theft -Backup your data regularly

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should

-Tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network -Be brief and direct

Place the following in order if you were opening and reading a message in Outlook.

1. Go to Outlook (log in if necessary) 2. Click Inbox 3. Click on the message you wish to open 4. After reading the message, click X to close or Delete to remove the message from your Inbox

Place the following steps in order to attach a Document from your documents folder to an e-mail in Outlook.

1. Go to Outlook (log in if necessary) and create your message. 2. Click Attach (also indicated by a paper clip symbol). 3. Select Computer. 4. Select Documents. 5. Double-click the desired file and select Attach as a copy.

Place the following steps in the correct order if you want to reply only to the sender of an Outlook message.

1. Go to Outlook (log in if necessary). 2. Click Inbox to see your messages. 3. Click the message you wish to reply to. 4. Click Reply or Reply to All. 5. Type your response and click Send.

Put the following steps in order for creating a new e-mail message in Microsoft Outlook.

1. Open Outlook 2. Click New 3. Enter the recipient's address in the To area 4. Type the subject in the Subject area 5. Type your message in the area beneath the formatting buttons 6. Click send

Business owners, copyright holders, and network administrators publish ________ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

AUPs

Records keeping and reporting

Accounting

Succinctly discusses the purpose of the message

Body

Business management software that encompasses nearly all business activities in a corporation is called ________ software.

ERP

Providing current investment values and opportunities

Finance

Use IS for scheduling daily and weekly operations.

First level managers (supervisors, floor managers)

Use information systems for recording line employee performance.

First level managers (supervisors, floor managers)

Determines if the e-mail will be opened

From and/or Subject lines

In the body of a professionally formatted business e-mail, where should a request be placed?

In the first sentence of the body of your e-mail

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ________.

Information systems (information technology) program manager

When referring to business information technology, MIS stands for ________.

Management information systems

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ________.

database administrator (DBA)

Online advertising and social media

Marketing

Use IS for record keeping and reporting purposes.

Middle managers

Use information systems for communicating policies and performance reports up and down the corporate ladder.

Middle managers

Decision-making software such as MIS

Operations

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

Sets the tone of the message

Salutation

Which category of management information systems (MIS) focuses on tracking sales and inventories?

TPS

Along with the From line, what is the most important factor in ensuring your business message is read?

The Subject line

Use IS to monitor overall business performance.

Top-level management (business executives and presidents)

Use information systems to foresee corporate opportunities and threats.

Top-level management (business executives and presidents)

Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it is most important for which management level?

Top-level managers

A form of E-mail fraud where criminals change the account where money is being transferred is called a ________ scam.

Wire-wire

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a ________, which closes the access point used by the hacker.

block


Set pelajaran terkait

MASON ANDREWS BASIC ENGLISH LESSON 1 1 THOUGH 12

View Set

Key General Chemistry Skills Properties of Solutions Dynamic Study Module

View Set

CBG.17 - Bacterial genetics 1 (Transformation)

View Set

Quiz 1: Choice in a world of scarcity

View Set