• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back

T or F: The goal of early large-scale computers was to automate as much manual processing of business info as possible?

T

Which of these developments account for the trend to decentralized computers in the 1980s and 90s?




A.) increase in the number of knowledge workers


B.) Availability of inexpensive microcomputers


C.) availiability of inexpensive productivity software


D.) All the above

All the above

Computer users can be classified by characteristics such as skill level, frequency of use, ____ and _____

Environment, software use, features used, relationsip

A modern name for the data processing department is __________?

Information technology

Widespread use of the Internet among business and home computer users first occured during which decade?




A. 1960s


B.1970s


C. 1980s


D. 1990s


E. 2000s

1990s

An internal user is an?




A. end user


B. worker in organization


C. retail Customer


D. Client who buys over internet

worker in organization

T or F: Technical support costs are generally included in the purchase price of a technology product, and therefore technical support is free to users?

F

______ is a field that studies how to design a work environment that promotes worker health, safety, and productivity?

Ergonomics

Use of a computer to obtain unauthorized access to information about a customer, student, or patient is:




A. waste of resources


B. ergonomic problem


C. invasion of privacy


D. piracy

Invasion of privacy

A _______ uses pull down menus and screen images that are easier to use than software that requires users to memorize and type lengthy commands?

GUI

T or F: Small companies often meet their need for technology support by combining user support with another position?

T

T or F: A help desk provides a single point of contact for technology users in need of support?

T

Help desk services can be provided via:




A. Physical location where users get help


B. Telephone hotline users can call for help


C. Email address where users send message


D. Any of the above

Any of the above

Which of the following statements is an advantage of using outsourcing to provide user support?


A. is a low cost support method


B. Develops in-house support expertise


C. Uses expertise a company may not have


D. Provides on-site assistance



Uses expertise a company may not have

Over the next ten years, employment in computer and network support occupation is expected to:


A. increase


B. remain the same


C. decrease


D. Depend on number who retire

increase

The process of matching a user's needs with supported technology products is called an _____

needs analysis, needs assessment

_______ are lists of approved and recommended technology products that an organization is committed to support?

support standards

Which of the following job responsibilities would you least expect to find in a position description for a user support specialist?


A. toubleshoot problems


B. Recommends product standards


C. operates a large-scale computer


D. installs hardware or software

Operates a large-scale computer

Printed or online tutorial or reference material for computer users are called ________

Documentation, user manual

A _______ outlines what you need to know or be able to do to perform a job.

knowledge

A web-based communication between two internet users who are online at the same time and alternately type and view messages is called:


A. Peer Support


B. Email


C. Hotline


D. Chat Session

Chat session

T or F: Cloud computing refers to the use of security software on the internet to hide users' workstations from harmful computer viruses

F