Try the fastest way to create flashcards
hello quizlet
Home
Subjects
Expert Solutions
Log in
Sign up
Computers in Business
5.0 (6 reviews)
Flashcards
Learn
Test
Match
Q-Chat
Get a hint
Disgruntled employees who are leaving their jobs sometimes think they have a right to take copyrighted material that they created for the business, even though it doesn't belong to them. This is called ___
Click the card to flip 👆
data theft
Click the card to flip 👆
1 / 84
1 / 84
Flashcards
Learn
Test
Match
Q-Chat
Created by
savvy_tindall
Share
Share
Students also viewed
Computers in Business
84 terms
Computers in Business
22 terms
Computers in business
47 terms
Business Strategy Exam 2
73 terms
MIS
21 terms
intro to business ch 6
15 terms
CIS- Chapter 12 - Computers in Business
83 terms
CGS 2060 Final
128 terms
Fundamentals of Marketing
16 terms
Advantages and Disadvantages of Big Business
Teacher
19 terms
Terms in this set (84)
Disgruntled employees who are leaving their jobs sometimes think they have a right to take copyrighted material that they created for the business, even though it doesn't belong to them. This is called ___
data theft
The appropriate business email etiquette practices
- remember that potentially negative news is best given face-to-face
- keep attachments small
In the work environment, it is often necessary to have multiple users on the same call. This feature is ___ calling
conference
Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called software
remote desktop
SCMS makes lean manufacturing processes such as just-in-time inventory practical. SCMS stands for ___ chain management software
supply
Business owners, copyright holders, and the network administrators publish ___ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software
AUPs
Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) _____, which closes the access point used by the hacker
block
professional
- if possible, states when a return call can be expected
- concise
- states the number or office gat has been reached
Unprofessional
- let's caller know the call is important
- repetitive
- long
While you sometimes find this used in smaller business networks, employee ____ software is impractical for large networks because of the number of users and the potential for misuse
monitoring
Managers and network administrator should
- establish ethic standards
- enforce standards by creating firewalls, setting filters, and establishing monitoring protocols
- periodically reviewing computer ethics policies
- instruct employees on standard
possible consequences of not setting a computer ethics policy
- decreased network speeds
- increased likelihood security breaches
- decreased employee performance
- increased likelihood of data loss
collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___
data analyst
the roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the information system ____ manager.
security
Katie loves istant messaging because she has friends that live overseas. Unlike texting, which requires a cellular connection, all Katie needs to IM is an app a(n) ____ connection
internet