Podcast
Questions and Answers
Disgruntled employees who are leaving their jobs sometimes think they have a right to take copyrighted material that they created for the business, even though it doesn't belong to them. This is called ___
Disgruntled employees who are leaving their jobs sometimes think they have a right to take copyrighted material that they created for the business, even though it doesn't belong to them. This is called ___
data theft
What are the appropriate business email etiquette practices?
What are the appropriate business email etiquette practices?
- Remember that potentially negative news is best given face-to-face. - Keep attachments small.
In the work environment, it is often necessary to have multiple users on the same call. This feature is ___ calling.
In the work environment, it is often necessary to have multiple users on the same call. This feature is ___ calling.
conference
Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ___ software.
Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ___ software.
Signup and view all the answers
SCMS makes lean manufacturing processes such as just-in-time inventory practical. SCMS stands for ___ chain management software.
SCMS makes lean manufacturing processes such as just-in-time inventory practical. SCMS stands for ___ chain management software.
Signup and view all the answers
Business owners, copyright holders, and the network administrators publish ___ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.
Business owners, copyright holders, and the network administrators publish ___ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.
Signup and view all the answers
Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a 'halt', which stops the hacker from progressing into the network. Another is called a(n) _____, which closes the access point used by the hacker.
Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a 'halt', which stops the hacker from progressing into the network. Another is called a(n) _____, which closes the access point used by the hacker.
Signup and view all the answers
What are key characteristics of a professional email?
What are key characteristics of a professional email?
Signup and view all the answers
What defines an unprofessional email?
What defines an unprofessional email?
Signup and view all the answers
While you sometimes find this used in smaller business networks, employee ____ software is impractical for large networks because of the number of users and the potential for misuse.
While you sometimes find this used in smaller business networks, employee ____ software is impractical for large networks because of the number of users and the potential for misuse.
Signup and view all the answers
What should managers and network administrators establish?
What should managers and network administrators establish?
Signup and view all the answers
What are possible consequences of not setting a computer ethics policy?
What are possible consequences of not setting a computer ethics policy?
Signup and view all the answers
Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___.
Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___.
Signup and view all the answers
The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the information system ____ manager.
The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the information system ____ manager.
Signup and view all the answers
Katie loves instant messaging because she has friends that live overseas. Unlike texting, which requires a cellular connection, all Katie needs to IM is an app and a(n) ____ connection.
Katie loves instant messaging because she has friends that live overseas. Unlike texting, which requires a cellular connection, all Katie needs to IM is an app and a(n) ____ connection.
Signup and view all the answers
A form of email fraud where criminals change the account where money is being transferred is called a ___ scam.
A form of email fraud where criminals change the account where money is being transferred is called a ___ scam.
Signup and view all the answers
If you own a small business, what can you do to ensure your computers and data are kept secure?
If you own a small business, what can you do to ensure your computers and data are kept secure?
Signup and view all the answers
Sometimes used in smaller business networks, employee ___ software is impractical for large networks because of the number of users and the potential for misuse.
Sometimes used in smaller business networks, employee ___ software is impractical for large networks because of the number of users and the potential for misuse.
Signup and view all the answers
A common feature of a business landline (hardwire) telephone services is the ability to have multiple users on the same call. This feature is ____.
A common feature of a business landline (hardwire) telephone services is the ability to have multiple users on the same call. This feature is ____.
Signup and view all the answers
What is the importance of the From and/or Subject lines in an email?
What is the importance of the From and/or Subject lines in an email?
Signup and view all the answers
What does the Salutation in an email do?
What does the Salutation in an email do?
Signup and view all the answers
What does the Body of an email do?
What does the Body of an email do?
Signup and view all the answers
What does the Close of an email do?
What does the Close of an email do?
Signup and view all the answers
Before you use your employer's computer network, you'll probably have to read and sign that you agree to abide by the network's ___ user policy.
Before you use your employer's computer network, you'll probably have to read and sign that you agree to abide by the network's ___ user policy.
Signup and view all the answers
Executives rely on ___ software because it provides tools to run an entire corporation.
Executives rely on ___ software because it provides tools to run an entire corporation.
Signup and view all the answers
Study Notes
Data Theft and Ethics
- Disgruntled employees may incorrectly believe they can take copyrighted material created for the business, known as data theft.
- Establishing computer ethics policies and enforcing them is crucial for managers and network administrators.
Business Communication
- Negative news is best communicated face-to-face rather than through email.
- Professional email etiquette includes being concise, stating when a return call can be expected, and keeping attachments small.
- Salutation in emails sets the tone, while the body succinctly discusses the purpose of the message.
Conference Calling
- Conference calling allows multiple participants to join the same call, a common feature in business communication.
Remote Management
- Remote desktop software enables network administrators to assist and control computers from a central location.
Supply Chain Management Software
- Supply Chain Management Software (SCMS) supports lean manufacturing processes, such as just-in-time inventory.
Acceptable Use Policies (AUPs)
- AUPs are published by business owners and administrators to outline user expectations when interacting with network, computer equipment, and software.
Intrusion Detection Systems
- IDS employ techniques like "halt" to stop hackers and "block" to close access points used by intruders.
Email Fraud
- Wire-wire scams target email users by altering the account information for fund transfers.
Data Security for Small Businesses
- To maintain security, small business owners should keep software updated, back up data regularly, and physically secure their computers.
Data Analysis
- Data analysts are responsible for collecting data, interpreting information, and preparing reports for management.
Information System Security
- The role of managing the security of an organization’s sensitive information and networks typically falls to the information system security manager.
Communication Software
- Instant messaging requires an internet connection, distinguishing it from text messaging, which relies on cellular service.
Monitoring Software
- Monitoring software may be impractical in large networks due to the high number of users and risk of misuse.
Email Structure
- The From and Subject lines of an email significantly influence the likelihood of the email being opened.
- The closing of an email should profess a professional tone to conclude the message effectively.
Acceptable User Policies
- Users usually must read and agree to the network's acceptable user policy before accessing the employer's computer network.
Enterprise Resource Planning Software
- Executives rely on Enterprise Resource Planning (ERP) software for comprehensive tools to manage corporate operations.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge with these flashcards on computers in business. Covering key concepts such as data theft and email etiquette, this quiz will help you understand important practices in a business environment. Perfect for students and professionals alike.