Disgruntled employees who are leaving their jobs sometimesthink they have a right to
take copyrighted material that they created for thebusiness, even though it doesn't
belong to them. This is called ___ - data theft
The appropriate business email etiquette practices- - remember that potentially
negative news is best given face-to-face
- keep attachments small
In the work environment, it is often necessary tohave multiple users on the same call.
This feature is ___ calling - conference
Software that gives network administrators the abilityto provide computer assistance
from a central location by allowing them to displayand control any computer on the
network is called software - remote desktop
SCMS makes lean manufacturing processes such as just-in-timeinventory practical.
SCMS stands for ___ chain management software - supply
Business owners, copyright holders, and the networkadministrators publish ___ so that
users understand what is expected and permissiblewhen they use the network,
computer equipment, and/or software - AUPs
Intrusion Detection Systems (IDS) use several techniquesto protect networks. One is
called a "halt", which stops the hacker from progressinginto the network. Another is
called a(n) _____, which closes the access point usedby the hacker - block
professional - - if possible, states when a returncall can be expected
- concise
- states the number or office gat has been reached
Unprofessional - - let's caller know the call is important