MIS
Wire-Wire Fraud
A form of Email fraud where criminals change the account where money is being transferred is called a ---- scam.
Enterprise Resource Planning Software
Business management software that encompasses nearly all business activities in a corporation is called ----
Acceptable Use Policies
Business owners, copyright holders, and network admins publish ---- so that users understand what is expected and permissible when they use the network, comp equipment, and or software.
Data Analyst
Collecting data, interpreting info gleaned from the database, and preparing reports for senior management are tasks that are typically assigned to a -----
First level managers/supervisors and floor managers
Communications
Operations
Decision making is equal to ___
Data Corruption
Errors in data occurring while entering, reading, processing, storing, or transmitting is known as data ----.
Top level managers/Business executives and presidents
Foresee/Predict
Intrusion Detection System
Intrusion Detection Systems use several techniques to protect networks. One is called "halt", which stops the hacker from progressing into the network. Another is called a(n) --- which closes the access point used by the hacker.
Finance
Investment is equal to ____
Online Advertisement
Marketing is equal to ___
Database Administration
Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of ----
Middle managers
Performance
Accounting
Records is equal to ____
Remote Desktop Software
Software that gives network admins the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ----
Employee Monitoring Software
Sometimes used in smaller business networks, employee ---- software is impractical for large networks because of the number of users and the potential for misuse.
Data Theft
Stealing confidential materials such as copyrighted material, confidential info, or company emails from a network is called ----. Most often this crime is committed by employees inside the company rather than outside hackers.
Information Systems Technicians
The role of installing, maintaining, repairing, and replacing IS hardware and software typically falls to the _____
IS Program Managing
The roles of directing Information System Technicians working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ----
Decision Support Software
Which Category of MIS focuses on providing forecasting capabilities for sales and production? ---
Supply Chain Management Software
Which category of management information systems combines forecasting capability of decision support software with the records keeping capability of transaction processing support system to help businesses manage inventories efficiently? ----