Computer In Business

Ace your homework & exams now with Quizwiz!

Along with the "From" line, what is the most important factor in ensuring your message is read? The close The salutation The body The subject line

The subject line

Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?

Top-level managers

"Thumb-sucking" refers to stealing information from a network using a ___

USB

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt," which stops the hacker from progressing into the network. Another is called a(n) ___, which closes the access point used by the hacker. denial execution block stop

block

Allowing people to share a digital ledger across a network of computers, ___ uses computer code to create concatenated (linked together) blocks of transactions. pulsar blockchain memristor MEM

blockchain

Serving as the technology behind cryptocurrencies such as Bitcoin, ___ provides a level playing field for all users.

blockchain

In the work environment, it is often necessary to have multiple users on the same call. This feature is ___ calling.

conference

Errors in data occurring while entering, reading, processing, storing or transmitting are known as data ___. hacking corruption theft fraud

corruption

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ___. data analyst information systems (information technology) program manager database administrator (DBA) information systems (information technology) technician

database administrator (DBA)

When referring to management information systems, DSS stands for: dedicated support systems. dynamic support systems. decision support systems. delegating support systems.

decision support systems.

IDS, which stands for Intruder ___ System, protects a network from hackers.

detection

When referring to business information systems, ERP stands for ___ resource planning.

enterprise

When referring to management information systems, ESS stands for ___ support systems.

executive

When referring to management information systems, ESS stands for: executive support systems energy support systems. enhanced support systems environmental support systems

executive support systems

The name "Blockchain" refers to how data are stored using this technology. Blockchain stores transaction data in blocks. Each block in the blockchain contains a _____ that is a digital fingerprint or unique identifier that helps to create secure transactions. script tag hash marker

hash

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ___ data analyst information systems (information technology) technician database administrator (DBA) information systems (information technology) program manager

information systems (information technology) program manager

When creating your voice mail greeting for you business phone, it is important to ___. provide as much information as possible in your message Remain anonymous because it is a business number keep the message short and professional remind the caller that their call is very important

keep the message short and professional

Sometimes used in smaller business networks, employee _____ software is used to track employee activities while online. security monitoring safety managing

monitoring

While you sometimes find this used in smaller business networks, employee ____ software is impractical for large networks because of the number of users and the potential for misuse.

monitoring

Microsoft's Hotmail e-mail service has now transitioned to Microsoft ____

outlook

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the information system _____ manager.

program

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ____ desktop software.

remote

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called: screen stealing supervisory software. access remote desktop

remote desktop

The role of installing, maintaining, repairing, and replacing information system hardware and software typically falls to the information system ____

technician

Steps of adding a new block to the blockchain in the correct order.

1. A transaction must take place 2. Transaction verification 3. Transaction storage 4. Adding a hash

Before using your employer's network, you will probably have to read and agree to abide by the network's: CPUs RAMs CPPs AUPs

AUPs

Which category of management information systems (MIS) focuses on corporate database drill-down capabilities? Transaction processing systems (TPS) Executive support systems (ESS) Decision support systems (DSS) Central processing system (CPS)

Executive support systems (ESS)

Which of the following are appropriate business e-mail etiquette practices? Finish your e-mails with a friendly joke. Keep attachments small. Remember that potentially negative news is best given face-to-face. Because it is an e-mail and not a business letter, use a casual writing style.

Keep attachments small. Remember that potentially negative news is best given face-to-face.

Which of the following three are examples of cryptocurrency? Flashcash Litecoin Ethereum Bitcoin

Litecoin Ethereum Bitcoin

For which of the following activities would a typical marketing department need a strong information system? Providing current investment values and opportunities. Online advertising Updating the business's social media sites Online sales

Online advertising Updating the business's social media sites Online sales

If you own a small business, which of the following can you do to ensure your computers and data are kept secure?

Physically secure computers to minimize risk of theft Backup your data regularly Keep software updated, particularly antivirus software

Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level? Top-level managers Middle managers First-level managers Supervisors

Top-level managers

Before you use your employer's computer network, you will probably have to read and sign that you agree to abide by the network's ____ user policy.

acceptable

When reporting a computer ethics violation of a co-worker to your employer, which two of the following guidelines are important to remember? forward any concerns from other co-workers be brief and direct state why the violation hurts the business state only what you witnessed

be brief and direct state only what you witnessed

Business management software that encompasses nearly all business activities in a corporation is called ___ software. global positioning system (GPS) decision support system (DSS) enterprise Resource Planning (ERP) transaction processing system (TPS)

enterprise Resource Planning (ERP)

The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the information system ___ manager.

security

Which of the following are the usual roles of information systems (IS) technicians? Installing IS hardware and software Researching databases to create reports Maintaining IS hardware and software Repairing and replacing IS hardware and software

Installing IS hardware and software Maintaining IS hardware and software Repairing and replacing IS hardware and software

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a database ______

administrator

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a data ___

analyst

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. Failure to set such policies can lead to which of the following? higher employee morale decreased employee performance increased likelihood of security breaches decreased network speed

decreased employee performance increased likelihood of security breaches decreased network speed

The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the ___. information systems (information technology) security manager database administrator (DBA) information systems (information technology) technician data analyst

information systems (information technology) security manager

When referring to management information systems, SCMS stands for supply chain ____ software.

management

When referring to business information technology, MIS stands for ___. motivational, inspiring, spiritual mortgage investment strategies management information systems marketing intellectual systems

management information systems

When referring to management information systems, TPS stands for: troubled processing systems tested processing systems transaction processing systems transfer processing systems.

transaction processing systems

A form of E-mail fraud where criminals change the account where money is being transferred is called a: account-flip wire-wire cross-wire switch scam.

wire-wire

For which of the following activities would a typical accounting department need a strong information system? Determining current investment values Accessing decision-making software Records keeping and reporting Online sales and advertising

Records keeping and reporting

For which of the following activities would a typical accounting department need a strong information system? Online sales and advertising Records keeping and reporting Accessing decision-making software Determining current investment values

Records keeping and reporting

What are two characteristics of cryptocurrency? It makes it easy to track transactions. It is backed by the U.S. government. It has a fluctuating price. It is not portable.

It has a fluctuating price. It is not portable.

Created in 2008, ___ remains the most widely traded and respected cryptocurrency. No one truly knows who created Bitcoin, but the creator of the cryptocurrency goes by the pseudonym Satoshi Nakamoto.

Bitcoin

Which of the following are the usual tasks of data analysts? Collecting data Creating reports for senior management Updating the database software Interpreting information provided by the database

Collecting data Creating reports for senior management Interpreting information provided by the database

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production? Executive information systems (EIS) Executive support systems (ESS) Decision support system (DSS) Transaction processing systems (TPS)

Decision support system (DSS)

Which of the following are the usual tasks of database administrators (DBAs)? Creates reports using information from the database Monitors the database's performance Develops and maintains the database itself Establishes user privileges for the database to help protect the data

Monitors the database's performance Develops and maintains the database itself Establishes user privileges for the database to help protect the data


Related study sets

MAN 4720 Huning Chapter 12: Corporate Governance and Business Ethics

View Set

Assessment and Management of Patients With Hypertension PrepU

View Set

Mineralogy/Petrology Test 3 INFO

View Set

Module 1: Introduction to Amazon Web Services

View Set

Environmental Determinants of Health Lecture 11: Climate Change

View Set