Computers in Business - CGS 2100 Midterm

Ace your homework & exams now with Quizwiz!

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________

corruption

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ________

data analyst

Business management software that encompasses nearly all business activities in a corporation is called ________ software

ERP

Which of these should business owners do to help protect their data

Establish strong firewall protection for their business's network, Ensure antivirus software is installed and up-to-date, Create strong password protections and protocols

When referring to business information technology, MIS stands for ________

Management information systems

Use IS to monitor overall business performance

Top-level management (business executives and presidents)

When reporting a computer ethics violation of a co-worker to your employer, it's important to ________

be brief and direct, state only what you witnessed

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a ________, which closes the access point used by the hacker

block

Select the usual tasks of a data analyst

collects data, interprets information provided by the database, creates reports for senior management

Stealing confidential materials such as copyrighted material, confidential information, or company e-mails from a network is called ________. Most often, this crime is committed by employees inside the company rather than outside hackers

data theft

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ________

database administrator (DBA)

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. Failure to set such policies can lead to which of the following?

decreased employee performance, decreased network speed, increased likelihood of security breaches

In the body of a professionally formatted business e-mail, where should a request be placed?

in the first sentence of the body of your e-mail

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________

information systems (information technology) technician

Be careful to only open e-mail from senders you know and trust. ________ may be contained in e-mail messages

malware

For which of the following activities would a typical marketing department need a strong information system?

online sales, online advertising, updating the business's social media sites

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ________ software

remote desktop

While not a required step in sending an e-mail, it's wise to ________ any message before clicking Send

spell-check

Business owners, copyright holders, and network administrators publish ________ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software

AUPs

Use IS for scheduling daily and weekly operations

First level managers (supervisors, floor managers)

Select the usual roles of information systems (IS) technicians

Installing IS hardware and software, Maintaining IS hardware and software, Repairing and replacing IS hardware and software

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. This includes which of the following?

Instructing employees on standards, Enforcing standards by creating firewalls, monitoring protocols, and filters, Periodically reviewing computer-use policies

Select appropriate business e-mail etiquette practices

Maintain high levels of formality, especially with initial contacts, Consider if e-mail is the appropriate means of communication

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

Select the usual tasks of information systems (IS) program managers

Supervising IS technicians, Working with developers and senior management to procure and implement IS processes, Developing training plans and policies for IS

Examples of management information systems (MIS) include ________

TPS, DSS, ESS

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ________

information systems (information technology) program manager

Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse

monitoring

Which category of management information systems (MIS) focuses on tracking sales and inventories?

TPS

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should

tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network, be brief and direct

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

DSS

Use IS for record keeping and reporting purposes

Middle managers

Select the usual tasks of database administrators (DBAs)

Monitors the database's performance, Develops and maintains the database itself, Establishes user privileges for the database to help protect the data

Along with the From line, what is the most important factor in ensuring your business message is read?

the Subject line

Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it is most important for which management level?

top-level managers

A form of E-mail fraud where criminals change the account where money is being transferred is called a ________ scam

wire-wire


Related study sets

Chapter 11: Estimation Theory and Statistics

View Set

Information Systems Analysis and Design Midterm #3

View Set