Computers in Business

Ace your homework & exams now with Quizwiz!

Body

Succinctly discusses the purpose of the message

Business management software that encompasses nearly all business activities in a corporation is called ___ software.

enterprise Resource Planning (ERP)

Middle managers

Use information systems for communicating policies and performance reports up and down the corporate ladder

First-level managers (supervisors, floor managers)

Use information systems for recording line employee performance

Managers and network administrators should:

instruct employees on standards periodically review computer ethics policies enforce standards by creating firewalls, setting filters, and establishing monitoring protocols establish ethics standards

The role of installing, maintaining, repairing, and replacing information system hardware and software typically falls to the information system

technician

Which of the following are the usual tasks of data analysts?

Interpreting information provided by the database Creating reports for senior management Collecting data

Because it has been so familiar for so long now, some people do not know that email stands for ___ mail.

electronic

When referring to business information systems, ERP stands for ___ resource planning.

enterprise

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called:

remote desktop

When referring to management information systems, ESS stands for:

executive support systems

When referring to management information systems, TPS stands for ___ processing systems.

transaction

Which of the following are appropriate business e-mail etiquette practices?

Keep attachments small. Remember that potentially negative news is best given face-to-face. Maintain high levels of formality, especially with initial contacts. Consider if e-mail is the appropriate means of communication.

Major corporation CEOs often rely on ___ to provide them with a birds-eye view of their entire organizations.

enterprise resource planning (ERP) systems

When referring to management information systems, ESS stands for ___ support systems.

executive

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. This includes which of the following?

instructing employees on standards enforcing standards by creating firewalls, monitoring protocols, and filters periodically reviewing computer-use policies

Business owners, copyright holders, and network administrators publish ___ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

AUPs

What is required to send an instant message from a mobile device?

An Internet connection

Operations

Decision making software such as management information system (MIS)

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

Decision support system (DSS)

IDS, which stands for Intruder ___ System, protects a network from hackers.

Detection

From and/or Subject lines

Determines if the e-mail will be opened.

Which of these should business owners do to help protect their data?

Ensure antivirus software is installed and up-to-date Establish strong firewall protection for their business's network Create strong password protections and protocols

Select the instant messaging sites.

Facebook Messenger Kik Messenger WhatsApp

When you are creating a voice mail greeting on your business phone, you should tell the caller which three of the following?

If possible, why you cannot take the call the voice mail that they have reached when they can expect a return call

Latisha loves instant messaging because she has friends who live overseas. Unlike texting, which requires a cellular connection, all Katie needs to IM is an app and a(n) ___ connection

Internet

Marketing

Online advertising and using social media

Close

Professionally ends the message

Finance

Providing current investment values and opportunities

Accounting

Records keeping and reporting

For which of the following activities would a typical accounting department need a strong information system?

Records keeping and reporting

Which of the following are the usual tasks of information systems (IS) security managers?

Responsible for keeping an organization's Wi-Fi network secure Creates and implements an organization's IS security measures

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

Marketing

Search engine optimization

Which of the following would likely be permitted by a typical business computer-use policy?

Sending an email related to business activities.

Which category of management information systems (MIS) focuses on tracking sales and inventories?

TPS

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You have signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should:

Tell your boss that you have witnessed the co-worker visiting porn sites while using the company computer or network.

Along with the "From" line, what is the most important factor in ensuring your message is read?

The subject line

Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?

Top-level managers

For which of the following activities would a typical marketing department need a strong information system?

Updating the business's social media sites Online advertising Online sales

Top-level management (business executives and presidents)

Use information systems to foresee corporate opportunities and threats

Which of the following are the usual tasks of information systems (IS) program managers?

Working with developers and senior management to procure and implement IS processes Developing training plans and policies for IS Supervising IS technicians

Before you use your employer's computer network, you will probably have to read and sign that you agree to abide by the network's ___ user policy.

acceptable

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a database

administrator

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a data

analyst

When reporting a computer ethics violation of a co-worker to your employer, which two of the following guidelines are important to remember?

be brief and direct state only what you witnessed

It seems that every month another major corporation announces that it suffered a data ___ . These can put customers' and suppliers' data at risk, as well as the data of the corporation itself.

breach

It seems that every month another major corporation announces that it suffered a data ___ . These can put customers' and suppliers' data at risk, as well as the data of the corporation itself. Listen to the complete question

breach

In the work environment, it is often necessary to have multiple users on the same call. This feature is ___ calling.

conference

A common feature of a business landline (hardwired) telephone services is the ability to have multiple users on the same call. This feature is ___.

conference calling

When Wyatt, Kevin, Sally, and Casey are all on the same business phone call, it is referred to as ___ .

conference calling

Errors in data occurring while entering, reading, processing, storing or transmitting are known as data ___ . These come in two categories: 1 - Detected, which usually result in system failures; and 2- Silent, which are much harder to discover and can cause lasting problems.

corruption

Errors in data occurring while entering, reading, processing, storing or transmitting are known as data ___.

corruption

A data breach can hurt a business's reputation as well as being extremely ___

costly

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___.

data analyst

Disgruntled or employees who are leaving their jobs sometimes think they have a right to take copyrighted material that they created for the business, even though it does not belong to them. This is called:

data theft

Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___. Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ___.

database administrator (DBA)

When referring to management information systems, DSS stands for ___ support systems.

decision

To avoid embarrassment, always ___ your attachment before clicking Send.

double-check

Network Intruder Detection Systems (IDS) often have areas known as "padded cells" or:

honeypots

Possible consequences of not setting a computer ethics policy:

increased likelihood of data loss decreased employee performance increased likelihood of security breaches decreased network speeds

The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the ___.

information systems (information technology) security manager

The role of installing, maintaining, repairing, and replacing information system hardware and software typically falls to the ___.

information systems (information technology) technician

Facebook Messenger, Viber, Kik Messenger, Snapchat, and WhatsApp are example of ___ messaging sites.

instant

When creating your voice mail greeting for you business phone, it is important to ___.

keep the message short and professional

It is always a good idea to check the ___ before clicking "Reply all."

list of addressees

Before opening an e-mail, make sure you know and trust the sender. E-mail may contain:

malware

When referring to business information technology, MIS stands for ___ information systems.

management

When referring to management information systems, SCMS stands for supply chain ___ software.

management

When referring to business information technology, MIS stands for ___.

management information systems

Sometimes used in smaller business networks, employee ___ software is impractical for large networks because of the number of users and the potential for misuse.

monitoring

Sometimes used in smaller business networks, employee _____ software is used to track employee activities while online.

monitoring

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the information system ___ manager.

program

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ___ desktop software.

remote

While not a required step in sending an e-mail, it is still wise to always ___ any message before clicking "Send."

spell check

A form of E-mail fraud where criminals change the account where money is being transferred is called a ___ - wire scam.

wire

A form of E-mail fraud where criminals change the account where money is being transferred is called a:

wire-wire

Salutation

Sets the tone of the message

If you own a small business, which of the following can you do to ensure your computers and data are kept secure?

Backup your data regularly Keep software updated, particularly antivirus software Physically secure computers to minimize risk of theft

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You have signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should do which two of the following?

Be brief and direct. Tell your boss that you have witnessed the co-worker visiting porn sites while using the company computer or network.

Opening a message in Outlook is very intuitive. All you need to do is open your Outlook account, login as necessary, scroll to the desired message, and then simply ___.

Click on the message

Even though it is legal, which of the following would likely be prohibited by a typical business computer-use policy?

Online personal shopping

Microsoft's Hotmail e-mail service has now transitioned to Microsoft

Outlook


Related study sets

Ch. 15 Foundations of Organization Structure

View Set

Health Assessment Chapter 22 Prep-U Neurological Assessment, Neurological Assessment PrepU, Neurological Assessment (PrepU), Chapter 25: Assessing Neurologic System, Chapter 25: Assessing Neurologic System, Assessment Ch 25 Neuro System PrepU, PrepU...

View Set

Computer Components (Basic) 1 of 2

View Set

Chapter 7: Benign Disorders of the Female Reproductive Tract

View Set

Thyroid, SAIDH, Diabetes, Graves', Cushing's, Addison's (1 of 2) NCLEX

View Set