Chapter 12- Computer in buisness

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You have signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should:

Tell your boss that you have witnessed the co-worker visiting porn sites while using the company computer or network.

Top-level management (business executives and presidents) Middle managers First-level managers (supervisors, floor managers)

Top-level management (business executives and presidents) -Use information systems to foresee corporate opportunities and threats Middle managers -Use information systems for communicating policies and performance reports up and down the corporate ladder First-level managers (supervisors, floor managers) matches -Use information systems for recording line employee performance

Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?

Top-level managers

In the work environment, it is often necessary to have multiple users on the same call. This feature ________is calling.

conference

A common feature of a business landline (hardwired) telephone services is the ability to have multiple users on the same call. This feature is ___.

conference calling

Errors in data occurring while entering, reading, processing, storing or transmitting are known as data ___.

corruption

Errors in data occurring while entering, reading, processing, storing or transmitting are known as data ______. These come in two categories: 1 - Detected, which usually result in system failures; and 2- Silent, which are much harder to discover and can cause lasting problems.

corruption

Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___. Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ___.

database administrator (DBA)

When referring to management information systems, DSS stands for

decision support systems

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. Failure to set such policies can lead to which of the following?

decreased employee performance increased likelihood of security breaches decreased network speed

IDS, which stands for Intruder________ System, protects a network from hackers.

detection

When referring to business information systems, ERP stands for resource planning.

enterprise

Business management software that encompasses nearly all business activities in a corporation is called ___ software.

enterprise Resource Planning (ERP)

When referring to management information systems, ESS stands for _________support systems.

executive

When referring to management information systems, ESS stands for:

executive support systems

Place the following steps in order to attach a document from your documents folder to an e-mail in Outlook.

go to outlook attach file navigate to file select file insert or attach copy

Network Intruder Detection Systems (IDS) often have areas known as "padded cells" or:

honeypots

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ___

information systems (information technology) program manager

The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the ___.

information systems (information technology) security manager

The role of installing, maintaining, repairing, and replacing information system hardware and software typically falls to the ___.

information systems (information technology) technician

While you sometimes find this used in smaller business networks, employee_______software is impractical for large networks because of the number of users and the potential for misuse.

monitoring

Put the following steps in order for creating a new e-mail message in Microsoft Outlook (first step at the top).

open outllok click new enter recipients address type subject type message send

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the information system ________manager.

program

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called:

remote desktop

The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the information system ________manager.

security

SCMS makes lean manufacturing processes such as just-in-time inventory practical. SCMS stands for:

supply chain management system

The role of installing, maintaining, repairing, and replacing information system hardware and software typically falls to the information system .

technician

When you are creating a voice mail greeting on your business phone, you should tell the caller which three of the following?

the voice mail that they have reached when they can expect a return call If possible, why you cannot take the call

"Thumb-sucking" refers to stealing information from a network using a .

thumb drive, usb drive, flash drive, thumbdrive, flashdrive, usb, or USB

When referring to management information systems, TPS stands for________ processing systems.

transaction

Business owners, copyright holders, and network administrators publish ___ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

AUPs

Which of the following are the usual roles of information systems (IS) technicians?

Installing IS hardware and software Repairing and replacing IS hardware and software Maintaining IS hardware and software

Which of the following are the usual tasks of data analysts?

Interpreting information provided by the database Creating reports for senior management Collecting data

Which of the following are appropriate business e-mail etiquette practices?

Keep attachments small. Remember that potentially negative news is best given face-to-face.

If you own a small business, which of the following can you do to ensure your computers and data are kept secure?

Keep software updated, particularly antivirus software Physically secure computers to minimize risk of theft Backup your data regularly

Marketing Accounting Operations Finance

Marketing -Search engine optimization Accounting -Records keeping and reporting Operations -Decision making software such as management information system (MIS) Finance -Providing current investment values and opportunities

Which of the following would likely be prohibited by a typical business computer-use policy?

Online gaming Online shopping Sending personal e-mail

For which of the following activities would a typical marketing department need a strong information system?

Online sales Online advertising Updating the business's social media sites

Microsoft's Hotmail e-mail service has now transitioned to Microsoft .

Outlook

For which of the following activities would a typical accounting department need a strong information system?

Records keeping and reporting

Which of the following are the usual roles of information systems (IS) technicians?

Repairing and replacing IS hardware and software Maintaining IS hardware and software Installing IS hardware and software

Which of the following are the usual tasks of information systems (IS) program managers?

Supervising IS technicians Working with developers and senior management to procure and implement IS processes Developing training plans and policies for IS

Before you use your employer's computer network, you will probably have to read and sign that you agree to abide by the network's _______user policy.

acceptable

IDS, which stands for Intruder _____System, protects a network from hackers.

detection

Which of the following are appropriate business e-mail etiquette practices?

Maintain high levels of formality, especially with initial contacts. Consider if e-mail is the appropriate means of communication.

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a database

administrator

A data breach can hurt a business's reputation as well as being extremely ___ .

costly

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___.

data analyst

When referring to business information technology, MIS stands for_________ information systems.

management

When referring to management information systems, SCMS stands for supply chain _________software.

management

A form of Email fraud where criminals change the account where money is being transferred is called a ___ scam.

wire-wire

When referring to business information technology, MIS stands for ___.

management information systems

When referring to management information systems, TPS stands for:

transaction processing systems

Which of these should business owners do to help protect their data?

Create strong password protections and protocols Establish strong firewall protection for their business's network Ensure antivirus software is installed and up-to-date

Which of the following are the usual tasks of information systems (IS) security managers?

Creates and implements an organization's IS security measures Responsible for keeping an organization's Wi-Fi network secure


Set pelajaran terkait

logistics ch 10: warehouse management

View Set

Adding fractions with denominators of 10 and 100

View Set