Computers in Business - MANY programming shortcuts for excel and access and helpful hints and review PDF

Title Computers in Business - MANY programming shortcuts for excel and access and helpful hints and review
Course Intro Computers & Programming
Institution Indiana University Bloomington
Pages 8
File Size 52.6 KB
File Type PDF
Total Downloads 105
Total Views 142

Summary

MANY programming shortcuts for excel and access and helpful hints and review for the final exam...


Description

When referring to business information technology, MIS stands for - management information systems The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___ - technician Though legal, which of the following would likely be prohibited by a typical business computer-use policy? - playing online games Select the usual tasks of database administrators (DBAs). - Monitors the database's performance

Develops and maintains the database itself

Establishes user privileges for the database to help protect the data Managers and network administrators should:

Possible consequences of not setting a computer ethics policy - Periodically revieing computer ethics policies

Establish ethics standards

Enforce standards

Instruct employees on standards Select the usual tasks of a data analyst. - Creates report for senior management

Collects data

Interprets information provided by the database The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an orgasnization's IS typically falls to the - Information systems (information technology) security manager IDS, which stands for intruder - detection system Katie - Internet connection 1.Illegal computer activity 2.Legal, but often violate business computer use policies - 1.Software piracy Copyright Infringement Computer scams Child pornography Bomb threats 2.Visiting personal social mmedia sites Sending/opening personal email Online shopping Playing online games Even though it is legal, which of the following would likely be prohibited by a typical business computer-use-policy - Online personal shopping

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the information system - program manager Disgruntled - data theft Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___. - corruption If you own a small business, what can you do to ensure your computers and data is kept secure? - Keep software updated

Physically secure computers to minimize risk of theft

Backup your data regularly Select the usual tasks of information systems (IS) program managers. - Creates and implements an organization's IS security measures

Responsible for keeping an organization's Wi-Fi network secure Before using your empolyer's network, you'll probably have to read and agree to abide by the networks - AUPs Network Intruder Detection Systems(IDS) often have areas known as "padded cells" or honeypots When reporting a computer ethics violation of co-worker to your employer, it's important to: - State only what you witnessed Be brief and direct

When referring to management information systems, TPS stands for - transaction processing systems A form of Email fraud where criminals change the account where money is being transferred is called a - wire-wire scam While you sometimes find this used in smaller business network employee - monitoring software Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called - remote desktop sfotware Select the usual tasks of information system program managers - Supervising IS technicians

Developing training plans and policies for IS

Working with developers and senior management to procure and implement IS processes Before you use your employer's computer network, you'll probably have to read and sign that you agree to abide by the network's - acceptable user policy Business owners, copyright holders, and network administrators publish - AUPs Sometimes used in smaller business networks, employee - monitoring software is impractical for large networks because of the number of users and potential for misuse Which pf these should business owners do to help protect their data - Establish strong firewall protection for their business's network

Create strong password protections and protocols

Ensure antivirus software is installed and up to date Collecting data, interpreting information gleaned from a data and preparing reports for senior management are tasks that are typically assigned to a data - analyst When referring to management information systems, TPS stands for - transaction processing systems Visiting pornography - Tell your boss that you've witnessed the co-worker visiting porn

Be brief and direct Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production - DSS When referring to management information systems, SCMS stands for supply chain management software Match the business information activity - Top level: Uses information systems for foresee corporate opportunities and threats. monitor

Middle managers: Uses information systems for communication policies and performance reports up and down the corporate ladder. reporting purpose

Uses information systems for recording line employee performance. scheduling daily and weekly

For which of the following activities would a typical accounting department need a strong information system? - records keeping and reporting Select appropriate business email etiquette practices - Keep attachments small Remember that potentially negative news is best given face-to-face When referring to management information systems, ESS stands - executive support systems Business management software that encompasses nearly all business activities in a corporation is called - ERP software Place the following steps in order to attach a document from your documents folder to an email in outlook - 1. Go to outlook 2. Click attach 3. Select computer 4. Select documents 5. Double click 1. Pro 2. Unpro - 1. states the number or office that has been reached

If possible, states when a return call can be expected

Concise

2. Let's caller know the call is important

Long

Repetitive When referring to management information systems, DSS stand - decision support systems Put the following steps in order for creating a new email message in Microsoft outlook 1.Open outlook 2. Click new 3. enter 4. Type subject 5. your message 6. send Along with the From line, what is the most important factor in ensuring your message is read? - The subject line In the work environment, it is often necessary have multiple users on the same call. This feature is - conference calling When you're creating a voice mail greeting on your business phone, you should tell the caller: - If possible, why you can't take the call

When they can expect a return call

The voice mail they they've reached

When creating your voice mail greeting for you business phone, it's important to: - Keep the message short and professional Before opening an Email, make sure you know and trust the sender. Email may contain - malware...


Similar Free PDFs