IS Class

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Before using your employer's network, you will probably have to read and agree to abide by the network's

AUPs

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a data ___

Analyst

In the body of a professionally formatted business e-mail, where should a request be placed?

In the first sentence of your e-mail

In the work environment, it is often necessary to have multiple users on the same call. This feature is

conference calling

Errors in data occurring while entering, reading, processing, storing or transmitting are known as data ___ . These come in two categories: 1 - Detected, which usually result in system failures; and 2- Silent, which are much harder to discover and can cause lasting problems.

corruption

Errors in data occurring while entering, reading, processing, storing or transmitting are known as data ___.

corruption

When referring to business information systems, ERP stands for______ resource planning

enterprise

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

Decision support system (DSS)

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You have signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should

Tell your boss that you have witnessed the co-worker visiting porn sites while using the company computer or network.

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a database

administrator

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt," which stops the hacker from progressing into the network. Another is called a(n) ___, which closes the access point used by the hacker. Multiple choice question.

block

A data breach can hurt a business's reputation as well as being extremely ___

costly

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. Failure to set such policies can lead to which of the following?

decreased employee performance increased likelihood of security breaches decreased network speed

To avoid embarrassment, always ___ your attachment before clicking Send.

double check

Along with the "From" line, what is the most important factor in ensuring your message is read?

The subject line

Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?

Top-level managers

"Thumb-sucking" refers to stealing information from a network using a

USB

Before you use your employer's computer network, you will probably have to read and sign that you agree to abide by the network's______ user policy

acceptable

Disgruntled or employees who are leaving their jobs sometimes think they have a right to take copyrighted material that they created for the business, even though it does not belong to them. This is called:

data theft

When referring to management information systems, DSS stands for

decision support systems.

Facebook Messenger, Viber, Kik Messenger, Snapchat, and WhatsApp are example of ____ messaging (IM) sites.

instant

When creating your voice mail greeting for you business phone, it is important to ___.

keep the message short and professional

When referring to management information systems, SCMS stands for supply chain ______ software

management

When referring to business information technology, MIS stands for

management information systems

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the_______

program manager

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ___ software.

remote desktop

When you are creating a voice mail greeting on your business phone, you should tell the caller which three of the following?

the voice mail that they have reached when they can expect a return call If possible, why you cannot take the call

A form of E-mail fraud where criminals change the account where money is being transferred is called a

wire-wire

A form of Email fraud where criminals change the account where money is being transferred is called a ___ scam.

wire-wire

Which of the following are the usual tasks of data analysts?

- Interpreting information provided by the database - Creating reports for senior management - Collecting data

Be careful to only open e-mail from senders you know and trust. ___ may be contained in e-mail messages.

Malware

Which of the following are the usual tasks of information systems (IS) security managers?

Responsible for keeping an organization's Wi-Fi network secure Creates and implements an organization's IS security measures

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

Which of the following would likely be permitted by a typical business computer-use policy?

Sending an email related to business activities.

Because it has been so familiar for so long now, some people do not know that email stands for ___ mail.

electronic

The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the

information systems (information technology) security manager

Sometimes used in smaller business networks, employee_____ software is impractical for large networks because of the number of users and the potential for misuse.

monitoring

When referring to management information systems, TPS stands for _____ processing systems.

transaction

Business management software that encompasses nearly all business activities in a corporation is called_____ software

ERP (enterprise Resource Planning)

Information and information systems are important in all areas of business. Match the computer activity that would correspond with the business activity 1. Finance 2. Accounting 3. Operations 4. Marketing

1. providing current investment values and opportunities 2. records keeping and reporting 3. decision making software such as MIS 4. online advertising and social media

It seems that every month another major corporation announces that it suffered a data ______. These can put customers' and suppliers' data at risk, as well as the data of the corporation itself.

breach

A common feature of a business landline (hardwired) telephone services is the ability to have multiple users on the same call. This feature is ___.

conference calling

When referring to management information systems, ESS stands for:

executive support systems

Network Intruder Detection Systems (IDS) often have areas known as "padded cells" or:

honeypots

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called _____ desktop software

remote

When reporting a computer ethics violation of a co-worker to your employer, which two of the following guidelines are important to remember?

state only what you witnessed be brief and direct

Examples of management information systems (MIS) include which of the following?

transaction processing systems (TPS) decision support systems (DSS) executive support systems (ESS)

For which of the following activities would a typical marketing department need a strong information system?

- online sales - online advertising - updating the business's social media sites

Complete the following by placing each statement in either the appropriate action category or risks associated with failing to set policy category. Managers and network administrators should: Possible consequences of not setting a computer ethics policy:

1) establish ethics standards instruct employees on standards enforce standards by creating firewalls, setting filters, and establishing monitoring protocols periodically review computer ethics policies 2) decreased employee performance decreased network speeds increased likelihood of security breaches increased likelihood of data loss

Which of these should business owners do to help protect their data?

Ensure antivirus software is installed and up-to-date Establish strong firewall protection for their business's network Create strong password protections and protocols

Which of the following are the usual roles of information systems (IS) technicians?

Installing IS hardware and software Repairing and replacing IS hardware and software Maintaining IS hardware and software

Which category of management information systems (MIS) focuses on tracking sales and inventories?

TPS

When referring to management information systems, ESS stands for ______ support systems

executive

What is required to send an instant message from a mobile device?

an internet connection

Which of the following are the usual tasks of database administrators (DBAs)?

- Develops and maintains the database itself - Monitors the database's performance - Establishes user privileges for the database to help protect the data

Match the business information activity with the appropriate management level. Top-level management (business executives and presidents) Middle managers First-level managers (supervisors, floor managers)

- Use information systems to monitor overall business performance , Use information systems to foresee corporate opportunities and threats - Use information systems for record keeping and reporting purposes, Use information systems for communicating policies and performance reports up and down the corporate ladder - Use information systems for scheduling daily and weekly operations, Use information systems for recording line employee performance

If you own a small business, which of the following can you do to ensure your computers and data are kept secure?

Backup your data regularly Physically secure computers to minimize risk of theft Keep software updated, particularly antivirus software

Opening a message in Outlook is very intuitive. All you need to do is open your Outlook account, login as necessary, scroll to the desired message, and then simply ___.

Click on the message

Even though it is legal, which of the following would likely be prohibited by a typical business computer-use policy?

Online personal shopping

Microsoft's Hotmail e-mail service has now transitioned to Microsoft

Outlook

Which of the following are the usual tasks of information systems (IS) program managers?

- Working with developers and senior management to procure and implement IS processes - Developing training plans and policies for IS - Supervising IS technicians

Which of the following are appropriate business e-mail etiquette practices?

Keep attachments small. Remember that potentially negative news is best given face-to-face.

Which of the following are appropriate business e-mail etiquette practices?

Maintain high levels of formality, especially with initial contacts. Consider if e-mail is the appropriate means of communication.

The role of installing, maintaining, repairing, and replacing information system hardware and software typically falls to the

Technicians

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You have signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should do which two of the following?

Be brief and direct. Tell your boss that you have witnessed the co-worker visiting porn sites while using the company computer or network.


Set pelajaran terkait

Subjunctive, indicative, infinitive, and past subjunctive examples

View Set

Pharmacology Chapter 20 study set

View Set

APW Unit 6--Topic 6.7 & 6.8 Impact of Migration

View Set