Computers in business

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Put the following steps in order for creating a new email message in Microsoft outlook

1.Open outlook 2. Click new 3. enter 4. Type subject 5. your message 6. send

1.Illegal computer activity 2.Legal, but often violate business computer use policies

1.Software piracy Copyright Infringement Computer scams Child pornography Bomb threats 2.Visiting personal social mmedia sites Sending/opening personal email Online shopping Playing online games

Before using your empolyer's network, you'll probably have to read and agree to abide by the networks

AUPs

Business owners, copyright holders, and network administrators publish

AUPs

When you're creating a voice mail greeting on your business phone, you should tell the caller:

If possible, why you can't take the call When they can expect a return call The voice mail they they've reached

Select the usual tasks of information system program managers

Supervising IS technicians Developing training plans and policies for IS Working with developers and senior management to procure and implement IS processes

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.

corruption

Visiting pornography

Tell your boss that you've witnessed the co-worker visiting porn Be brief and direct

Before you use your employer's computer network, you'll probably have to read and sign that you agree to abide by the network's

acceptable user policy

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

playing online games

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___

technician

Collecting data, interpreting information gleaned from a data and preparing reports for senior management are tasks that are typically assigned to a data

analyst

Disgruntled

data theft

When referring to management information systems, DSS stand

decision support systems

IDS, which stands for intruder

detection system

Before opening an Email, make sure you know and trust the sender. Email may contain

malware

When referring to business information technology, MIS stands for

management information systems

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the information system

program manager

1. Pro 2. Unpro

1. states the number or office that has been reached If possible, states when a return call can be expected Concise 2. Let's caller know the call is important Long Repetitive

The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an orgasnization's IS typically falls to the

Information systems (information technology) security manager

Katie

Internet connection

If you own a small business, what can you do to ensure your computers and data is kept secure?

Keep software updated Physically secure computers to minimize risk of theft Backup your data regularly

When creating your voice mail greeting for you business phone, it's important to:

Keep the message short and professional

Select the usual tasks of database administrators (DBAs).

Monitors the database's performance Develops and maintains the database itself Establishes user privileges for the database to help protect the data

Managers and network administrators should: Possible consequences of not setting a computer ethics policy

Periodically revieing computer ethics policies Establish ethics standards Enforce standards Instruct employees on standards

When reporting a computer ethics violation of co-worker to your employer, it's important to:

State only what you witnessed Be brief and direct

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called

remote desktop sfotware

Place the following steps in order to attach a document from your documents folder to an email in outlook

1. Go to outlook 2. Click attach 3. Select computer 4. Select documents 5. Double click

Select the usual tasks of a data analyst.

Creates report for senior management Collects data Interprets information provided by the database

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production

DSS

In the work environment, it is often necessary have multiple users on the same call. This feature is

conference calling

When referring to management information systems, ESS stands

executive support systems

Network Intruder Detection Systems(IDS) often have areas known as "padded cells" or

honeypots

When referring to management information systems, SCMS stands for supply chain

management software

While you sometimes find this used in smaller business network employee

monitoring software

Sometimes used in smaller business networks, employee

monitoring software is impractical for large networks because of the number of users and potential for misuse

For which of the following activities would a typical accounting department need a strong information system?

records keeping and reporting

When referring to management information systems, TPS stands for

transaction processing systems

A form of Email fraud where criminals change the account where money is being transferred is called a

wire-wire scam

Which pf these should business owners do to help protect their data

Establish strong firewall protection for their business's network Create strong password protections and protocols Ensure antivirus software is installed and up to date

Select appropriate business email etiquette practices

Keep attachments small Remember that potentially negative news is best given face-to-face

Along with the From line, what is the most important factor in ensuring your message is read?

The subject line

Match the business information activity

Top level: Uses information systems for foresee corporate opportunities and threats. monitor Middle managers: Uses information systems for communication policies and performance reports up and down the corporate ladder. reporting purpose Uses information systems for recording line employee performance. scheduling daily and weekly

Select the usual tasks of information systems (IS) program managers.

Creates and implements an organization's IS security measures Responsible for keeping an organization's Wi-Fi network secure

Even though it is legal, which of the following would likely be prohibited by a typical business computer-use-policy

Online personal shopping

Business management software that encompasses nearly all business activities in a corporation is called

ERP software


Set pelajaran terkait

PrepU Newborn Assessment (Ch 18)

View Set

Chapter 57: Care of Patients with Inflammatory Intestinal Disorders

View Set

Solving Systems of Linear Equations: Graphing

View Set

Chapter 6: Inventor and Cost of Goods Sold

View Set

Sociology Lesson 1: What is Sociology?

View Set