Computers in Business Flashcards
25 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Disgruntled employees who are leaving their jobs sometimes think they have a right to take copyrighted material that they created for the business, even though it doesn't belong to them. This is called ___

data theft

What are the appropriate business email etiquette practices?

  • Remember that potentially negative news is best given face-to-face. - Keep attachments small.

In the work environment, it is often necessary to have multiple users on the same call. This feature is ___ calling.

conference

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ___ software.

<p>remote desktop</p> Signup and view all the answers

SCMS makes lean manufacturing processes such as just-in-time inventory practical. SCMS stands for ___ chain management software.

<p>supply</p> Signup and view all the answers

Business owners, copyright holders, and the network administrators publish ___ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

<p>AUPs</p> Signup and view all the answers

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a 'halt', which stops the hacker from progressing into the network. Another is called a(n) _____, which closes the access point used by the hacker.

<p>block</p> Signup and view all the answers

What are key characteristics of a professional email?

<ul> <li>If possible, states when a return call can be expected. - Concise. - States the number or office that has been reached.</li> </ul> Signup and view all the answers

What defines an unprofessional email?

<ul> <li>Lets the caller know the call is important. - Repetitive. - Long.</li> </ul> Signup and view all the answers

While you sometimes find this used in smaller business networks, employee ____ software is impractical for large networks because of the number of users and the potential for misuse.

<p>monitoring</p> Signup and view all the answers

What should managers and network administrators establish?

<ul> <li>Establish ethic standards. - Enforce standards by creating firewalls, setting filters, and establishing monitoring protocols. - Periodically reviewing computer ethics policies. - Instruct employees on standards.</li> </ul> Signup and view all the answers

What are possible consequences of not setting a computer ethics policy?

<ul> <li>Decreased network speeds. - Increased likelihood of security breaches. - Decreased employee performance. - Increased likelihood of data loss.</li> </ul> Signup and view all the answers

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___.

<p>data analyst</p> Signup and view all the answers

The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the information system ____ manager.

<p>security</p> Signup and view all the answers

Katie loves instant messaging because she has friends that live overseas. Unlike texting, which requires a cellular connection, all Katie needs to IM is an app and a(n) ____ connection.

<p>internet</p> Signup and view all the answers

A form of email fraud where criminals change the account where money is being transferred is called a ___ scam.

<p>wire-wire</p> Signup and view all the answers

If you own a small business, what can you do to ensure your computers and data are kept secure?

<ul> <li>Keep software updated, particularly antivirus software. - Backup your data regularly. - Physically secure computers to minimize risk of theft.</li> </ul> Signup and view all the answers

Sometimes used in smaller business networks, employee ___ software is impractical for large networks because of the number of users and the potential for misuse.

<p>monitoring</p> Signup and view all the answers

A common feature of a business landline (hardwire) telephone services is the ability to have multiple users on the same call. This feature is ____.

<p>conference calling</p> Signup and view all the answers

What is the importance of the From and/or Subject lines in an email?

<p>They determine if the email will be opened.</p> Signup and view all the answers

What does the Salutation in an email do?

<p>Sets the tone of the message.</p> Signup and view all the answers

What does the Body of an email do?

<p>Succinctly discusses the purpose of the message.</p> Signup and view all the answers

What does the Close of an email do?

<p>Professionally ends the message.</p> Signup and view all the answers

Before you use your employer's computer network, you'll probably have to read and sign that you agree to abide by the network's ___ user policy.

<p>acceptable</p> Signup and view all the answers

Executives rely on ___ software because it provides tools to run an entire corporation.

<p>Enterprise Resource Planning</p> Signup and view all the answers

Study Notes

Data Theft and Ethics

  • Disgruntled employees may incorrectly believe they can take copyrighted material created for the business, known as data theft.
  • Establishing computer ethics policies and enforcing them is crucial for managers and network administrators.

Business Communication

  • Negative news is best communicated face-to-face rather than through email.
  • Professional email etiquette includes being concise, stating when a return call can be expected, and keeping attachments small.
  • Salutation in emails sets the tone, while the body succinctly discusses the purpose of the message.

Conference Calling

  • Conference calling allows multiple participants to join the same call, a common feature in business communication.

Remote Management

  • Remote desktop software enables network administrators to assist and control computers from a central location.

Supply Chain Management Software

  • Supply Chain Management Software (SCMS) supports lean manufacturing processes, such as just-in-time inventory.

Acceptable Use Policies (AUPs)

  • AUPs are published by business owners and administrators to outline user expectations when interacting with network, computer equipment, and software.

Intrusion Detection Systems

  • IDS employ techniques like "halt" to stop hackers and "block" to close access points used by intruders.

Email Fraud

  • Wire-wire scams target email users by altering the account information for fund transfers.

Data Security for Small Businesses

  • To maintain security, small business owners should keep software updated, back up data regularly, and physically secure their computers.

Data Analysis

  • Data analysts are responsible for collecting data, interpreting information, and preparing reports for management.

Information System Security

  • The role of managing the security of an organization’s sensitive information and networks typically falls to the information system security manager.

Communication Software

  • Instant messaging requires an internet connection, distinguishing it from text messaging, which relies on cellular service.

Monitoring Software

  • Monitoring software may be impractical in large networks due to the high number of users and risk of misuse.

Email Structure

  • The From and Subject lines of an email significantly influence the likelihood of the email being opened.
  • The closing of an email should profess a professional tone to conclude the message effectively.

Acceptable User Policies

  • Users usually must read and agree to the network's acceptable user policy before accessing the employer's computer network.

Enterprise Resource Planning Software

  • Executives rely on Enterprise Resource Planning (ERP) software for comprehensive tools to manage corporate operations.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge with these flashcards on computers in business. Covering key concepts such as data theft and email etiquette, this quiz will help you understand important practices in a business environment. Perfect for students and professionals alike.

More Like This

Workplace Investigation Ethics Quiz
10 questions
Cybersecurity Threats and Data Theft
18 questions
Cybersecurity: Angriffsarten und Phishing
41 questions
Use Quizgecko on...
Browser
Browser