Deck 1: Information Technology for Management Digital Strategies

ملء الشاشة (f)
exit full mode
سؤال
Which is not a step that companies can take to balance the competing risks of negligent hiring and social discrimination?

A) Choose to ignore social network profiles of candidates.Hire investigation companies to do thorough searches of candidates' backgrounds.
B) Let candidates themselves disclose information found on social media.
C) A consistent and well-documented process is needed to ensure and show compliance if there is an EEO employment investigation.
D) Make sure recruiters do not pressure applicants to disclose protected information via social media by requiring them to disclose passwords or relax privacy settings for purposes of review by the employer.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
How many more things do you check today compared to a year ago? How long can you go without checking your devices without experiencing anxiety? When do you put down your mobiles and concentrate on one thing at a time? Do your answers indicate that you are experiencing digital or connectivity overload?
سؤال
Graphic images like the one below are typically used for ______________. <strong>Graphic images like the one below are typically used for ______________.  </strong> A) Providing links to online content B) Innovative brand logos C) Generating augmented reality images D) Reprogramming mobile devices <div style=padding-top: 35px>

A) Providing links to online content
B) Innovative brand logos
C) Generating augmented reality images
D) Reprogramming mobile devices
سؤال
___________ apps generate graphic images that are superimposed on pictures of real objects, such as rooms and roads. For instance, a mobile phone user might point her phone camera at an office building and activate an app that generates the logos of all food services, such as Starbucks and Pizza Hut, inside the building.

A) Augmented reality
B) Mobile visual search
C) Location based marketing
D) Mobile media
سؤال
The picture below is an example of a QR code.
The picture below is an example of a QR code.  <div style=padding-top: 35px>
سؤال
The picture below is an example of a mobile visual response code.
The picture below is an example of a mobile visual response code.  <div style=padding-top: 35px>
سؤال
Graphic images like the one below are typically used for providing links to online content.
Graphic images like the one below are typically used for providing links to online content.  <div style=padding-top: 35px>
سؤال
The picture below is an example of a(n) ___________.
The picture below is an example of a(n) ___________.  <div style=padding-top: 35px>
سؤال
While the growth of computer networks and mobile computing has resulted in many benefits to both individual users and organizations, it has also generated negative consequences. Which of the following is not a negative ethical or sustainability consequence?

A) Increased energy consumption and carbon emissions
B) Distracted driving
C) Decreasing global mean temperature (GMT).
D) Health risks associated with frequent use of closely-held smartphones.
سؤال
________ networking standards include 802.11b, 802.11a, and 802.11g.
سؤال
One of the federal regulations that require data governance is ______________.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/11
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Information Technology for Management Digital Strategies
1
Which is not a step that companies can take to balance the competing risks of negligent hiring and social discrimination?

A) Choose to ignore social network profiles of candidates.Hire investigation companies to do thorough searches of candidates' backgrounds.
B) Let candidates themselves disclose information found on social media.
C) A consistent and well-documented process is needed to ensure and show compliance if there is an EEO employment investigation.
D) Make sure recruiters do not pressure applicants to disclose protected information via social media by requiring them to disclose passwords or relax privacy settings for purposes of review by the employer.
Choose to ignore social network profiles of candidates.Hire investigation companies to do thorough searches of candidates' backgrounds.
2
How many more things do you check today compared to a year ago? How long can you go without checking your devices without experiencing anxiety? When do you put down your mobiles and concentrate on one thing at a time? Do your answers indicate that you are experiencing digital or connectivity overload?
Answers will vary.
3
Graphic images like the one below are typically used for ______________. <strong>Graphic images like the one below are typically used for ______________.  </strong> A) Providing links to online content B) Innovative brand logos C) Generating augmented reality images D) Reprogramming mobile devices

A) Providing links to online content
B) Innovative brand logos
C) Generating augmented reality images
D) Reprogramming mobile devices
Providing links to online content
4
___________ apps generate graphic images that are superimposed on pictures of real objects, such as rooms and roads. For instance, a mobile phone user might point her phone camera at an office building and activate an app that generates the logos of all food services, such as Starbucks and Pizza Hut, inside the building.

A) Augmented reality
B) Mobile visual search
C) Location based marketing
D) Mobile media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.
فتح الحزمة
k this deck
5
The picture below is an example of a QR code.
The picture below is an example of a QR code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.
فتح الحزمة
k this deck
6
The picture below is an example of a mobile visual response code.
The picture below is an example of a mobile visual response code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.
فتح الحزمة
k this deck
7
Graphic images like the one below are typically used for providing links to online content.
Graphic images like the one below are typically used for providing links to online content.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.
فتح الحزمة
k this deck
8
The picture below is an example of a(n) ___________.
The picture below is an example of a(n) ___________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.
فتح الحزمة
k this deck
9
While the growth of computer networks and mobile computing has resulted in many benefits to both individual users and organizations, it has also generated negative consequences. Which of the following is not a negative ethical or sustainability consequence?

A) Increased energy consumption and carbon emissions
B) Distracted driving
C) Decreasing global mean temperature (GMT).
D) Health risks associated with frequent use of closely-held smartphones.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.
فتح الحزمة
k this deck
10
________ networking standards include 802.11b, 802.11a, and 802.11g.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.
فتح الحزمة
k this deck
11
One of the federal regulations that require data governance is ______________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 11 في هذه المجموعة.