Computers in Business

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

An acceptable use policy is a written statement that documents the best practices, rules, and limitations that a user must agree to when accessing a organization's network

what are AUPs, and why are they established?

2
New cards

Allows another device to control or view any computer on a network

what does remote desktop software allow the administrator to do?

3
New cards

Key components: subject line (most important), salutation, body, close

re key components of an email message: which line is the most important factor in ensuring that your message is read?

4
New cards

IDS (Intrusion Detection System)

strives to protect networks from hackers attempting to gain access

5
New cards

attack halting

stops the attack

6
New cards

attack blocking

closes the point through which the hacker attempted to gain access

7
New cards

data theft

Occurs when someone steals information from a company's network

8
New cards

wire-wire scam

Essential email frauds that often target small businesses

9
New cards

IS security manager

ensures the security of an organization's Information Systems, specifically its network

10
New cards

IS data analyst

use data to gain information; collects data for entry into a database interprets the information provided by the database and creates reports for senior management

11
New cards

IS database administrator

keeps an organization's information accessible by monitoring database performance

12
New cards

TPS: transaction processing systems

collect, store, track and retrieve sales and inventory data for an organization

13
New cards

DSS: decision support systems

provide a mid-level and upper-level managers with tools to assist them in managing their businesses and organizations

14
New cards

ERP:enterprise resource planning:

refers to business management software that encompasses nearly all business activities in a corporation

15
New cards

VPN- Virtual Private Network

a service that secures internet connections and provides added security when online. Create secure tunnels upon which data travels

16
New cards

automated

with deep learning, portions of the learning process are ___________, eliminating some of the need for human intervention

17
New cards

repurposing

the use of data outside the scope of the original purpose of the data

18
New cards

spillover

the use of data from individuals who were not the original targets of the data collection

19
New cards

data security

includes taking proper security measures to protect all types of data