CSIS 100 Quiz 7

Set 1

  1. Self‐paced learning programs are especially useful for gaining structural knowledge, such as how to use a company’s enterprise resource planning software.
  2. Negotiating strategies, mentoring, and coaching are all part of the ________ that one adds to the company.
  3. comprises knowledge stored as documentation about business processes, patents, policies, and other aspects of an organization’s operations, often stored electronically.
  4. The subject matter expert in an e‐learning learning program is one who pays the project bills, coordinates activities of writers, programmers, technicians, videographers and graphic artists, and tracks progress from kickoff to completion.
  5. Which of the following knowledge management strategies should be used with strategically valuable information?
  6. Asynchronous interaction in e‐learning programs is achieved through virtual classrooms and chat sessions.
  7. Which of the following is an accurate definition of RDF?
  8. Sally Frost is a public engagement coordinator at Wildlife Foundation. What kind of capital does she contribute to the organization when she successfully interacts with volunteers, builds contacts with corporate houses and long‐term relations with government bodies over the years?
  9. A function of an expert location system is to
  10. Kate Anderson is taking over from Barry Brown as the Regional Sales Manager for Florida state at 99, a large chain of retail stores in Florida. She is assigned to work side‐by‐side with Barry until he retires and to learn about procurement processes, supplier preferences, etc. through observation. Which of the following mentoring techniques is employed in this case?
  11. Which of the following authentication strategies is the most difficult to forge, crack, or copy and is hence used for physical security?
  12. Plagiarism refers to borrowing the words of another and crediting the source.
  13. Which of the laws stipulates how financial institutions are required to protect the privacy of consumers’ personal financial information and notify them of their privacy policies annually?
  14. A(n) ________ lists out and rates the vulnerabilities of an organization.
  15. Which of the following is an accurate definition of a keylogger?
  16. Laws always result from the pushes and pulls of lobbying efforts and political pressures and have nothing to do with ethics.
  17. Enforcing intellectual property laws becomes difficult when
  18. Which of the following administrative control actions helps enforce access controls in an organization?
  19. Which of the following principles is consistent with the natural laws and rights ethical framework?
  20. Which of the following is a feature of public key encryption?

Set 2

  1. Operational information should be systematically collected and organized to ensure wide availability throughout an organization.
  2. Knowledge that is elusive in nature and encompasses insights, judgment, creative processes, and wisdom that come with long experience in a field, as well as many trials and errors is known as
  3. Which of the following knowledge management strategies should be used with compliance information?
  4. Which of the following functions does a project sponsor perform in an e‐learning program?
  5. The process which reads typed text and helps document management systems index, tag, and decipher document identifiers quickly is known as
  6. A collection of online tools that organizes and collects a variety of activities for a group of people working together, such as calendars, document and multimedia repositories, blogs, announcements, chat, and discussion boards, is known as a
  7. A(n) ________ is a self‐contained digital resource embedded in an e‐learning course that can be edited and reused for other purposes.
  8. A majority of retail companies in Arizona are increasingly using a certain strategy to capture tacit knowledge which is helping them to successfully handle knowledge management. Which of the following processes would help such users add and edit articles about specific topics and discuss the contents of each article with other editors?
  9. Increasing Internet bandwidth has led to synchronous e‐learning events no longer being limited to specially constructed interactive video classrooms and networks.
  10. crawl through databases, websites, emails, project summaries, and other electronic documents to refine their expertise ratings.
  11. Liability is a powerful driver for surveillance as employers are held responsible for employees’ offensive emails or web‐surfing habits.
  12. The downside of using surveillance techniques at work is that it pits management against staff.
  13. A ________ is a self‐replicating program that sends copies to other nodes on a computer network and may contain malicious code intended to cause damage.
  14. Which of the following statements is true of honeypots?
  15. Which of the following authentication strategies is the easiest to compromise or crack?
  16. is a widely accepted ethical system that considers the greatest good for the greatest number and considers the consequences of an action, weighing its positive effects against its harmful ones.
  17. Digitization of intellectual property (IP) results in better enforcement of IP laws.
  18. Which of the following is a reason why employers adopt surveillance technologies to track online communications?
  19. Which of the following is true of the European Union’s Data Protection Directive?
  20. For which of the following purposes are botnets most likely to be used?
Purchase the answer key
$2.99
Add to Cart
  • Find by class