Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
205 Cards in this Set
- Front
- Back
- 3rd side (hint)
How many bytes are in a Kilobyte?
|
1 thousand bytes
|
p. 4 4
|
|
How many bytes are in a Megabyte?
|
1 million bytes
|
p. 4 4
|
|
How many bytes are in a Gigabyte?
|
1 billion bytes
|
p. 4 4
|
|
How many bytes are in a Terabyte?
|
1 trillion bytes
|
p. 4 4
|
|
How many bytes are in a Petabyte?
|
1 quadrillion bytes
|
p. 4 4
|
|
In measuring speed of computers, how much of a second is Microseconds?
|
1 millionth
|
p. 4 4
|
|
In measuring speed of computers, how much of a second is Nanoseconds?
|
1 billionth
|
p. 4 4
|
|
In measuring speed of computers, how much of a second is Picoseconds?
|
1 trillionth
|
p. 4 4
|
|
What does TPS represent?
|
Transaction processing systems
|
p. 10 C-1
|
|
What does KWS represent?
|
Knowledge work systems
|
p.10 C-1
|
|
What does OS represent?
|
Office systems
|
p. 10 C-1
|
|
What does MIS represent?
|
Management information systems
|
p. 10 C-1
|
|
What does DSS represent?
|
Decision support systems
|
p. 10 C-1
|
|
What does ESS represent?
|
Executive support systems
|
p. 10 C-1
|
|
Which of the following organizational levels is Transaction Processing Systems (TPS)?
Operational, knowledge, office, management, or strategic? |
Operational
|
p 10 C-1
|
|
Which of the following organizational levels is Knowledge Work Systems (KWS)?
Operational, knowledge, office, management, or strategic? |
Knowledge
|
p. 10 C-1
|
|
Which of the following organizational levels is Office Systems (OS)?
Operational, knowledge, office, management, or strategic? |
Office
|
p. 10 C-1
|
|
Which of the following organizational levels is Management Information Systems (MIS)?
Operational, knowledge, office, management, or strategic. |
Management
|
p. 10 C-1
|
|
Which of the following organizational levels is Executive Support Systems (ESS)?
Operational, knowledge, office, management, or strategic? |
Strategic
|
p. 10 C-1
|
|
Who is considered to be the Father of Computers?
|
Charles Babbage. Charles conceived an analytical engine in 1833. His son constructed it.
|
p. 14 D-1
|
|
Name a computing system that was produced as a joint effort by Harvard Univ. International Business Machines (IBM), and the U.S. Department of War.
|
Mark I (in 1944). This computer was based on Babbage's analytical engine.
|
p. 14 D 2-a
|
|
John Antanasoff & Clifford Berry produced an electronic device called what?
|
The Antanasoff-Berry Computer (ABC).
|
p. 14 D 2-b
|
|
Who did the federal court declare to be the true inventor of the first electronic computer?
|
John Antanasoff
|
p. 14 D 2-b
|
|
What is the name of the first large-scale electronic digital computer?
|
ENIAC (Electronic Numerical Integrator and Calculator). It was completed in 1946
|
p. 14 D 2-c
|
|
What is the name of the first business computer?
|
UNIVAC I
|
p. 15 D 3
|
|
Who sponsored a project to electronically link scientists from two different locations (UCLA & Stanford University)?
|
ARPANET (U.S. Dpt. of Defense's Advanced Research Project Agency)
|
p. 16 10
|
|
What did ARPANET evolve into?
|
The internet
|
p. 16 10
|
|
How are processing speeds for today's microcomputers measured?
|
In microseconds
|
p. 19 Review Q-10
|
|
The microcomputer evolution began after the invention of what?
|
The microprocessor
|
p. 20 Review Q-24
|
|
In 1969, what did the U.S. Dept. of Defense's project called ARPANET evolve into?
|
The internet
|
p. 20 Review Q-25
|
|
What is a two-state binary condition referred to as?
|
A bit. Either a number one digit (1) for on or a zero digit (0) for off represents the two-state condition. Bit is the acronym for binary (b) digit (it).
|
p. 26 A
|
|
What is the name for a string of bits (0s and 1s) representing a number or character?
|
A byte
|
p. 26 A
|
|
What type of computer memory cannot be changed by business users?
|
Read only memory (ROM). ROM is non-volatile memory where critical system instructions for starting the computer are permanently stored by the computer manufacturer. Also called firmware.
|
p. 27 A 2 a-1
|
|
What are 2 variations of Read Only Memory (ROM)?
|
Programmable read only memory (PROM) and erasable PROM (EPROM) chips.
|
p. 27 A 2 a-1
|
|
What memory is temporarily available for processing business data according to software instructions?
|
Random access memory (RAM)
|
p. 27 A 2 a-2
|
|
What includes the control unit and the arithmetic logic unit mounted on a single silicon chip?
|
A microprocessor
|
p. 28 A 2 d
|
|
What is one of the features of the microprocessor that affects performance?
|
Clock speed of megahertz or gigahertz.
|
p. 28 A 2 d-1
|
|
How many clock cycles per second is one megahertz?
|
One million
|
p. 28 A 2 d-1
|
|
How many clock cycles per second is gigahertz?
|
One billion
|
p. 28 A 2 d-1
|
|
What is the number of bits (digital 0s and 1s) called that the CPU can process at one time?
|
Word length
|
p. 28 A 2 d-2
|
|
What is the size of the internal physical path?
|
Bus width
|
p. 29 A 2 d-3
|
|
During processing operations, where must data and software reside?
|
Random Access Memory (RAM)
|
p. 29 Review Q A-1
|
|
Fetching program instructions, interpreting the instructions, carrying out the operations, and storing results are performed by what?
|
The control unit
|
p. 29 Review Q A-2
|
|
A 32-bit processor is very common in microcomputers. This is referencing the computer's ________.
|
Word length
|
p. 29 Review Q A-3
|
|
What does MIS stand for?
|
Management information systems
|
p. 11 C 1-d
|
|
What does IT stand for?
|
Information Technologies
|
p. 12 C 3
|
|
What does WWW stand for?
|
World wide web
|
p. 16
|
|
What does CPU stand for?
|
Central processing unit
|
p. 26 A 2
|
|
What does RISC stand for?
|
Reduced instruction set computing. RISC enhances the speed of microprocessors by embedding the most frequently used instructions on a chip.
|
p. 31 B 3-a
|
|
What does PDA stand for?
|
Personal digital assistant
|
p. 32 B 3-e
|
|
What does GUI stand for?
|
Graphical user interface. GUI lets the user point and click or point and drag on icons, buttons, or files on the computer monitor to activate software functions.
|
p. 34 C 1-b
|
|
What is a CRT?
|
Another name for the monitor. Cathode-ray tube.
|
p. 38 D 2-a
|
|
What is a SAN?
|
Storage area network - a high fiber channel local area network dedicated to storage that interconnects different storage devices.
|
p. 43 E 2-f
|
|
What type of monitors have a high number of pixels and low number dot pitch.
|
High-resolution monitors
|
p 47 Review Q 22
|
|
What type of telecommunications channel is inexpensive & easy to install, but has very low security.
|
Twisted copper wire ( i.e. telephone service)
|
p. 54 3 (figure 3-2)
|
|
What type of telecommunications channel is higher bandwidth than twisted wire & less susceptible to interference, but is somewhat difficult to install with medium security?
|
Coaxial cable (i.e. T.V. service)
|
p. 54 (figure 3-2)
|
|
What type of telecommunications channel is very high bandwidth, high transmission accuracy, & very difficult to tap?
|
Fiber Optic (i.e. laser technology)
|
p. 54 (figure 3-2)
|
|
What type of telecommunications channel is high bandwidth, lower cost than tethered cable, but is susceptible to interference from the environment?
|
Microwave (i.e. wireless phones)
|
p. 54 (figure 3-2)
|
|
What type of telecommunications channel is high bandwidth, serves large areas, but has transmission time delays?
|
Satellite
|
p. 54 (figure 3-2)
|
|
What type of telecommunications channel is easy to install, but is used for short-distance transmission, & is very easy to tap.
|
Wireless Networks (i.e. local area networks-LANs)
|
p. 54 (figure 3-2)
|
|
What type of telecommunications channel is convenient, but has a range of service & is easy to tap.
|
Cellular Radio and Mobile Computing (i.e., PDAs)
|
p. 54 (figure 3-2)
|
|
What does DSL represent?
|
Digital subscriber line
|
p. 54 3 a.
|
|
What does IDDD represent?
|
International direct-distance dialing. A call placed overseas uses IDDD.
|
p. 59 B 8
|
|
What does WATS represent?
|
Wide area telephone service
|
p. 59 B 9
|
|
What does INWATS represent?
|
Inward wide area telephone service. INWATS is used if a numerous amt. of calls are expected from customers and the firm wishes to pay for the calls.
|
p. 59 B 10
|
|
What does PBX represent?
|
Private branch exchange. It's a special purpose computer originally designed for handling business calls for an organization.
|
p. 61 4-a
|
|
What does CBX represent?
|
Computerized branch exchange. It's a computer-based telephone communication system for automated telephone switching & management.
|
p. 61 4-b
|
|
What does CENTREX stand for?
|
Central exchange system. It's leased from the regional company, eliminating the need for large capital expenditures for a telephone system.
|
p. 61 4-c
|
|
In a computer environment, data needs to be converted into digital information called bits; this process is called what?
|
Digitizing
|
p. 64 C
|
|
The server may handle all functions with the client having only an interface to the server. Such a client is referred to as a ____________?
|
Thin client
|
p. 64 C 1 b-2
|
|
An _____ _____ connects distributed networks as of a single organization into one single network.
|
Enterprise network
|
p. 66 C 2 b-1
|
|
A_______ ______ ______ is limited to a small geographic area.
|
Metropolitan area network (MAN)
|
p. 66 C 2 b-2
|
|
A _____ _____ includes the networks of several organizations internationally.
|
Global network
|
p. 66 C 2 b-3
|
|
A _____ _____ _____ is used by many organizations for intranet & extranet security.
|
Virtual private network (VPN)
|
p. 66 C 2 b-4
|
|
What does MAN stand for?
|
Metropolitan area network
|
p. 66 C 2 b-3
|
|
What does VPN stand for?
|
Virtual private network
|
p. 66 C 2 b-4
|
|
A ____-____ _____ is a private, multimedia, multipath, third-party managed, medium-speed WAN.
|
Value-added network (VAN)
|
p. 66 C 2 b-5
|
|
In 1990, ARPANET evolved into the _____?
|
Internet
|
p. 81 B 1
|
|
The _____ _____ identifies the host or network that services the e-mail and contains subdomains separated by a period.
|
Domain Name - Individual/company/function/country
|
p. 82 B 1 b
|
|
What is the domain function that represents a commercial organization?
|
.com
|
p. 82 B 1 b
|
|
What is the domain function that represents educational institutions?
|
.edu
|
p. 82 B 1 b-2
|
|
What is the domain function that represents government organizations?
|
.gov
|
p. 82 B 1 b-2
|
|
What is the domain function that represents military organizations?
|
.mil
|
p. 82 B 1 b-2
|
|
What is the domain function that represents networking organizations?
|
.net
|
p. 82 B 1 b-2
|
|
What is the domain function that represents general organizations?
|
.org
|
p. 82 B 1 b-2
|
|
What is push technology?
|
An internet forum - information that is automatically sent to all subscribers on the listserv.
|
p. 83 B 4
|
|
_____ _____ _____ is used to download and upload files.
|
File transfer protocol (FTP)
|
p. 82 B 6
|
|
A system of universally accepted standards for storing, retrieving, formatting, & displaying information in cyberspace is the _____ _____ _____.
|
World Wide Web (WWW)
|
p. 92 Review Q-15
|
|
_____ _____ are attached to e-mail messages spreading from computer to computer that have Microsoft operating systems & software.
|
Worm viruses.
|
p. 103 Figure 5-1
|
|
_____ _____ are executable functions inside programs such as Microsoft Word or Excel which duplicates through e-mail attachments and can delete files.
|
Macro viruses
|
p. 103 Figure 5-1
|
|
_____ _____ viruses erase a computer's hard drive.
|
File infecting (viruses).
|
p. 103 Figure 5-3
|
|
____ viruses overwrite .jpg & .mp3 files, & spread to other systems through Microsoft Outlook & Internet Relay Chat.
|
Script (viruses)
|
p. 103 Figure 5-3
|
|
A _____ is a person who gains unauthorized access to a computer network for mischief.
|
Hacker
|
p. 103 B 1 b-1
|
|
A _____ is a malicious hacker for profit or one who attempts to disable the system.
|
Cracker
|
p. 103 B 1 b-1
|
|
A _____ _____ is a destructive program that masquerades as a benign application.
|
Trogan horse
|
p. 103 B 1 b-3
|
|
What is unsolicited junk e-mail called?
|
Spam
|
p. 103 B 1 b-4
|
|
_____ _____ identify an individual based on physiological or behavioral characteristics.
|
Biometric controls
|
p. 105 B 2 2-b
|
|
Name 4 biometric controls.
|
Iris, fingerprints, signature, & keystroke.
|
p. 105 B 2 2-b
|
|
What is the process of changing from the old computer system to the new one called?
|
Conversion
|
p. 106 B 3 b
|
|
The old computer system is replaced with the new system on a specific date. What conversion range is this called?
|
Direct
|
p. 106 B 3 b
|
|
Both the old computer system & the new system are used until everyone is assured that the new system functions correctly. What conversion range is this called?
|
Parallel
|
p. 106 2 3-b
|
|
A selected area (dpt. or div.) of the organization uses a test version of the system. What conversion range is this called?
|
Pilot
|
p. 106 2 3-b
|
|
When a new system has been adopted, sometimes it is beneficial to introduce it to the organization in stages. What conversion range is this called?
|
Phased
|
p. 106 2 3-b
|
|
The ___ format is a compression technique that supports 16 million colors.
|
JPEG/JPG format
|
p. 124 A 4 1-a
|
|
_____ is the number of dots per inch (dpi).
|
Resolution
|
p. 125 A 6
|
|
What does dpi stand for?
|
Dots per inch
|
p. 125 A 6
|
|
_____ is the overall arrangement & appearance of printed matter on a paper.
|
Typography
|
p. 127 B
|
|
_____ occurs when 2 elements are noticeably different.
|
Contrast
|
p. 131 B-4
|
|
______ is when 2 elements are 'somewhat' different but not different enough.
|
Conflict
|
p. 131 B-4
|
|
_____ & _____ emphasizes the important information.
|
Contrast & proximity
|
p. 131 B-4
|
|
_____ & _____ tie together the visual units.
|
Alignment & repetition
|
p. 131 4
|
|
When discussing typeface, the portion of a lowercase letter that falls below the baseline is called the _____.
|
Descender
|
p. 131 5
|
|
The portion of a lowercase letter that is above the main body of a letter is called the _____.
|
Ascender
|
p. 131 5
|
|
_____ is the vertical space between lines in the text.
|
Leading
|
p. 134 5 a
|
|
_____ is the spacing of words & characters on a line.
|
Kerning
|
p. 134 5 b
|
|
_____ _____ adjust the number of words on a line by squeezing or expanding text & adding or removing space from character combinations on a line.
|
Track spacing
|
p. 134 5 c
|
|
What are the primary colors of pigment?
|
Red, yellow, and blue
|
p. 136 7 a
|
|
What is the # of copies typically produced each month from a low-volume copier?
|
No more than 20,000 copies
|
p. 148 A 1 a
|
|
What is the # of copies typically produced each month from a medium-volume copier?
|
Between 20,000-125,000 copies
|
p. 149 2 a
|
|
What is the # of copies typically produced each month from a high-volume copier?
|
From 200,000 to 750,000 copies
|
p. 149 3 a
|
|
When an operator is interrupted while making copies, the copier will "remember" the point where the original job has been stopped & continue the process to do a "rush" job for someone & then continue the previous job. What is this process called?
|
Job recovery
|
p. 150 3 c
|
|
Copies of engineering & architectural drawings are often made through the _____ _____.
|
Diazo process
|
p. 151 5
|
|
Character size is measured in points, from 6 points to 96 points. One inch equals __ points.
|
72
|
p. 154 B 1 a
|
|
_____ is the measurement used for the width & length of a line.
|
Pica
|
p. 154 B 1 b
|
|
What type of binding has paper punched with 3 holes along the left side & inserted into a notebook?
|
Three-ring binder
|
p. 159 D 3 a
|
|
____ _____ binding inserts a strip of plastic with teeth into rectangular holes along the edge of the paper.
|
Plastic comb
|
p. 159 D 3 b
|
|
____ binding is used when a metal or plastic coil is inserted through the holes along the edge of the paper.
|
Spiral
|
p. 159 D 3 c
|
|
For sturdier binding, ___-_ binding inserts two wire teeth through the rectangular holes along the edge of the paper.
|
Wir-O
|
p. 159 D 3 d
|
|
_____ binding uses two plastic strips along the edge (one at the top of the document, & one at the bottom of the document); heat binds the pins and plastic strips.
|
Velo
|
p. 159 D 3 e
|
|
What are the most common types of folds for booklets or pamphlets?
|
Single fold, letter fold (6 panel fold), accordian fold (6 panel fold), or French fold (8 panel fold).
|
p. 160 D 4
|
|
The operating system allocates primary memory (RAM) for data, application programs, & system programs during processing. What is this process called?
|
Stored program concept.
|
p. 169 A 3 a 1
|
|
A ___ adds all the #s for a range of cells.
|
Sum
|
p. 207
|
|
An _____ calculates the arithmetric mean for the argument.
|
Avg.
|
p. 207
|
|
A _____ calculates the middle number for the argument.
|
Median
|
p. 207
|
|
A _____ calculates the smallest # for the argument.
|
Min
|
p. 207
|
|
A _____ calculates the largest number for the argument.
|
Max
|
p. 207
|
|
A _____ calculates the loan payments for the argument (interest rate, length of the loan, & principal amount of the loan).
|
Pmt
|
p. 207
|
|
A _____ _____ changes the cell reference in the formula relative to where it is copied.
|
Relative reference
|
p. 208 8 a
|
|
An _____ _____ holds the cell (row & column) reference in the formula constant (absolute).
|
Absolute reference
|
p. 208 8 b
|
|
A _____ graph shows a comparison from one time period to another.
|
Bar
|
p. 219 7 a 1
|
|
The _____ graph consists of a series of connected lines showing a particular trend in business date for equal time intervals.
|
Line
|
p. 219 7 a 2
|
|
The _____ graph represents the parts that make up a whole. The circle represents 100%; the sections represent parts of the whole.
|
Pie
|
p. 221 3
|
|
The _____ graph is similar to the pie graph & shows the relationship of parts to a whole for 2 or more data series.
|
Doughnut
|
p. 221 3
|
|
_____ is the space between the lines
|
Leading
|
p. 226 1 a
|
|
_____ is the spacing of words & characters on a line to justify copy.
|
Kerning
|
p. 226 1 b
|
|
_____ _____ is adjusting the number of words per line, squeezing or expanding text, & adding or removing space from character combinations on a line.
|
Track spacing
|
p. 226 1 c
|
|
The Administrative Professional is responsible for managing what life cycle?
|
The organization's information system life cycle.
|
p. 229 2
|
|
What is the name of changing from the old system to the new system?
|
Conversion
|
p. 229 2 a 2
|
|
The human resource employee database table has 8 fields: first name, last name, street address, city, state, ZIP code, telephone, & employee #. Which one must be the primary key?
|
Employee number
|
p. 232 Review 13
|
|
What is the science of bettering employee conditions by improving the work environment?
|
Euthenics
|
p. 240 3
|
|
What is the scientific study of the relationship of employees to their physical environment, including the workspace & the tools that enhance the workspace.
|
Ergonomics
|
p. 263
|
|
A person who is quick to change, study a new system, & try to implement is called an _____ adapter.
|
Early
|
p. 265 g 1
|
|
A person who waits for others to implement a new system, then tries to "catch up" with the technology, is referred to as a _____ adapter.
|
Late
|
p. 265 g 2
|
|
The person who prefers the status quo & does not typically accept change easily may resist & also encourage others to resist change is called what?
|
A nonadapter
|
p. 265 g 3
|
|
_____ is the study of human body measurements in order to design furniture accurately.
|
Anthropometry
|
p. 267 b 1
|
|
The study of musculoskeletal effort of human beings is known as _____.
|
Biometrics
|
p. 267 b 2
|
|
_____ _____ _____ is the compression of a nerve leading into the wrist that results in debilitating pain & muscle weakness.
|
Carpal tunnel syndrome
|
p. 271 B 1 c
|
|
_____ is the inflammation of muscles at the point where they insert into the bones of the shoulders, arms, & wrists.
|
Tendinitis
|
p. 272 B 1 c
|
|
A _____ _____ is the amount of light produced by a standard candle at a distance of 1 foot.
|
Foot candle
|
p. 275 C. 1 a
|
|
Indirect light that illuminates the area surrounding the work surface is called _____ lighting.
|
Ambient
|
p. 275 C 1 b
|
|
The most commonly used light source in office buildings is _____ lighting; its illumination resembles natural light.
|
Fluorescent
|
p. 275 C 1 d
|
|
This type of lighting can produce more glare & shadowing on work surfaces, but is less expensive.
|
Incandescent
|
p. 275 C 1 e
|
|
The engulfing of sound waves by environmental materials is called _____.
|
Absorption
|
p. 276 3 a
|
|
The bouncing of sound waves off a material and back into space is known as _____.
|
Reflection
|
p. 276 3 b
|
|
The prevention of sound waves from passing through environmental materials is referred to as _____.
|
Isolation
|
p. 276 3 c
|
|
The _____ is the unit measure of the intensity of sound.
|
Decibel
|
p. 276 3 c
|
|
When there is frequent interchange between the user at the data entry terminal & the processor unit during execution of a program, an _____ mode is in effect.
|
Interactive
|
p. 9
|
|
What does MICR stand for?
|
Magnetic-Ink Character Recognition
|
p. 34
|
|
What is Magnetic-Ink Character Recognition?
|
It's used primarily in the banking industry, magnetic-ink characters are formed with magnetized particles of iron oxide on the bottom of the check.
|
p. 34
|
|
What does RAID stand for?
|
Redundant arrays of independent disks
|
p. 43
|
|
What function does RAID have?
|
It provides large storage capacities & high access speeds.
|
p. 43
|
|
What is telecommunications?
|
It's the exchange of voice, data, text, graphics, or audio & video information over computer-based networks.
|
p. 51
|
|
What does TIFF stand for?
|
Tagged image file format
|
p. 124
|
|
What function does TIFF have?
|
It's the recommended image format for reproduction purposes.
|
p. 124
|
|
What does GIF stand for?
|
Graphical interchange format
|
p. 124
|
|
What files should be opened and saved in TIFF format for hard-copy document reproduction?
|
GIF & JPG files
|
p. 124
|
|
A _____ is a small decorative stroke that is added to the end of a letter's main strokes.
|
Serif
|
p. 131
|
|
_____ _____ means no decorative stroke is added to the end of a letter's main stroke.
|
Sans Serif (Sans means without in French)
|
p. 131
|
|
What is a pull quote?
|
It's a small amount of text that is enlarged within an article to catch the reader's attention.
|
p. 133
|
|
What function does performance monitors have?
|
They watch & adjust the usage & performance of the system.
|
p. 178
|
|
What is a foot lambert?
|
It's a measure of brightness; it is a unit of measure approximating 1 footcandle of light transmitted or reflected.
|
p. 275
|
|
What type of chart illustrates distances & delays involved in the entire process or procedure from start to finish?
|
Process Chart
|
p. 239
|
|
The transmission of information, as related to a specific process, through either face-to-face or electronic communication is called _____.
|
Workflow
|
p. 239
|
|
What type of diagram graphically illustrates the computer-based information system's component processes & the flow of data between the processes?
|
Data flow diagram
|
p. 239
|
|
What type of chart identifies personnel or departments that frequently work together?
|
Office layout chart
|
p. 239
|
|
_____ refers to the information flow resulting from the communications systems being used.
|
Cybernetics
|
p. 239
|
|
_____ refers to the information flow resulting from the communications systems being used.
|
Cybernetics
|
p. 239
|
|
The _____ _____ illustrates distances & delays involved in the entire process or procedure from start to finish.
|
Process chart
|
p. 239
|
|
The _____ _____ diagram graphically illustrates the computer-based information system's component processes & the flow of data between the processes.
|
Data flow diagram
|
p. 239
|
|
An _____ _____ chart is important to identify personnel or departments that frequently work together.
|
Office layout chart
|
p. 239
|
|
The _____-office design is known as the traditional (closed) design or the bull-pen approach.
|
Private-office
|
p. 240
|
|
The _____-office design situates business professionals & functions in relatively open areas to accommodate the workflow & communication required.
|
Open-office
|
p. 241
|
|
The _____ office focuses on planning & arranging the individual workspace to allow for a variety of interchangeable components to meet individual needs & to serve as a basis for expandable office systems.
|
Modular office
|
p. 241
|
|
_____ is an open-office design with unassigned desks. A business professional needs to call in advance to pre-book a workspace for a specified period of time.
|
Hotelling
|
p. 242
|
|
_____ is similar to hotelling, but does not require pre-booking.
|
Motelling
|
p. 243
|
|
_____ _____ means that one division manages the combined related functions of purchasing, inventory control, receiving, & storage.
|
Materials management (i.e. Central Inventory)
|
p. 249
|
|
_____ equipment includes office furniture, computers, printers, copiers, & other office equipment.
|
Capital (equipment)
|
p. 249
|
|
What does MRO stand for?
|
Maintenance, repair, & operating supplies
|
p. 250
|
|
A _____ _____ system is one way to recognize that departmental office supplies need to be ordered.
|
Reorder point (system)
|
p. 251
|
|
_____ are internal documents often available on the organization's intranet.
|
Purchase orders
|
P. 251
|
|
What is an RFP?
|
Request for Proposal
|
p. 252
|
|
What does EDI stand for?
|
Electronic data interchange
|
p. 254
|
|
Stress related to the job, workload, pace of work, & poor inadequate supervision have been linked to some chronic ailments. These work environment concerns are referred to as _____ disturbances.
|
Psychosocial
|
p. 272
|
|
Some computer users have been afflicted with gastrointestinal disturbances, muscle tension, psychic tension, heart palpitations, & frequent perspiration. These ailments may be the result of _____ disorders.
|
Psychosomatic
|
p. 272
|
|
What does NIOSH stand for?
|
The National Institute for Occupational Safety Health
|
p. 273
|