MIS

Ace your homework & exams now with Quizwiz!

Wire-Wire Fraud

A form of Email fraud where criminals change the account where money is being transferred is called a ---- scam.

Enterprise Resource Planning Software

Business management software that encompasses nearly all business activities in a corporation is called ----

Acceptable Use Policies

Business owners, copyright holders, and network admins publish ---- so that users understand what is expected and permissible when they use the network, comp equipment, and or software.

Data Analyst

Collecting data, interpreting info gleaned from the database, and preparing reports for senior management are tasks that are typically assigned to a -----

First level managers/supervisors and floor managers

Communications

Operations

Decision making is equal to ___

Data Corruption

Errors in data occurring while entering, reading, processing, storing, or transmitting is known as data ----.

Top level managers/Business executives and presidents

Foresee/Predict

Intrusion Detection System

Intrusion Detection Systems use several techniques to protect networks. One is called "halt", which stops the hacker from progressing into the network. Another is called a(n) --- which closes the access point used by the hacker.

Finance

Investment is equal to ____

Online Advertisement

Marketing is equal to ___

Database Administration

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of ----

Middle managers

Performance

Accounting

Records is equal to ____

Remote Desktop Software

Software that gives network admins the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ----

Employee Monitoring Software

Sometimes used in smaller business networks, employee ---- software is impractical for large networks because of the number of users and the potential for misuse.

Data Theft

Stealing confidential materials such as copyrighted material, confidential info, or company emails from a network is called ----. Most often this crime is committed by employees inside the company rather than outside hackers.

Information Systems Technicians

The role of installing, maintaining, repairing, and replacing IS hardware and software typically falls to the _____

IS Program Managing

The roles of directing Information System Technicians working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ----

Decision Support Software

Which Category of MIS focuses on providing forecasting capabilities for sales and production? ---

Supply Chain Management Software

Which category of management information systems combines forecasting capability of decision support software with the records keeping capability of transaction processing support system to help businesses manage inventories efficiently? ----


Related study sets

неправильные глаголы eyes open 2 2 часть

View Set

Ch. 3 Income Statement LearnSmart

View Set

chapter 49: immunizing drugs and biochemical terrorism

View Set

INFINITI INTOUCH™ ENHANCEMENTS, PART 1

View Set

CCNA 1 v7 Modules 11 - 13: IP Addressing Exam Answers Full

View Set

Chapters 13-18 Ricci 2nd edition

View Set