Exam 1 study guide Flashcards

1
Q

The title of the position that heads the IT

department in most organizations.

A

Chief Information Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

•A supervisor who frequently gives feedback to
the employees who report to her—both to
praise them and to let them know areas
where they can improve—notices that
employee productivity rises. This is known as
what?

A

The Hawthorne Effect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The ITIL term that describes the front‐door,
single point of contact for reporting and
triaging IT related questions and issues.

A

Service Desk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who is quoted as saying “Do what you do best

and outsource the rest”?

A

Peter Drucker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Four components of Information Technology

A

People
• Process
• Technology
• Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This product made by Google in 2012/2013
initially failed due to both cost and privacy
issues.

A

Google Glass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Per our lecture, this computer brand had the
largest market share in North America in 2019,
with 30.81% of the market.

A

Dell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The hypothesis that states that roughly every
two years the number of transistors on an
integrated circuit doubles is known as what?

A

Moore’s Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

• This satellite based service offered by Elon
Musk’s SpaceX provides high speed, low
latency broadband internet to individuals in
locations that do not have a fiber
infrastructure.

A

Starlink

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

UNM’s powerful supercomputing facility that is
used to facilitate high speed processing related
to Research is called what?

A

UNM Center for Advanced Research

Computing (CARC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
This is an example of what programming
language:
SELECT LastName, FirstName, EmployeeID
FROM Employees
WHERE LastName = “Park”
A

Structured Query Language (SQL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The name of the position responsible for
managing, tuning, patching and updating a
database

A

Database Administrator (DBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is the term that addresses the planning
for governance, data stewardship, and data
architecture.

A

Master data management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

• A supplemental system that is prepared by an
individual or department and may contain a
separate version of the truth.

A

Shadow system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

One employee record with multiple job
records is an example of this type of
relationship.

A

One‐to‐many

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Modules such as general ledger, travel and
expense management, and asset management
are typically included in a ________
management system.

A

Financial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is the central element
of the human capital management (HCM)
information system?

A

Employee record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The technology that enables task routing and
automation for things like authorizations,
hiring, etc.

A

Workflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The total of termination costs, hiring costs,
training costs and other costs related to
replacing a worker.

A

Turnover costs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The XML based approach to tagging financial
statements for financial reporting that
involves elements, taxonomies and mapping.

A

eXtensible business reporting language (XBRL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
According to our class lecture, the ratio of
unstructured data versus structured data in
the world today.
A

95% to 5%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The author of the article “IT doesn’t Matter”

and “Does IT Matter”

A

Nicholas Carr

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

• In the analytics maturity model, the most
advanced level of analytics which answers the
question “What should happen”.

A

Prescriptive Analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The URL of UNM’s site where data sets are

shared in XML format.

A

Opendata.unm.edu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In our Tech Bytes, Mihaela shared that this
company was pairing crypto currency with
wireless networks.

A

• Helium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Per our lecture, the frequency that a business

is likely to fall victim to ransomware in 2021.

A

Every 11 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Per our lecture, the most common method of
introducing ransomware is through this
approach.

A

Email Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The security protocol that involves something
you have, such as a smart phone, and
something you know, such as a password.

A

Multifactor Authentication (MFA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A voluntary guide that helps organizations
understand and protect themselves against
cybersecurity risks.

A

National Institute of Standards Technology

(NIST) Cybersecurity Framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

During this event, a system is flooded with
incoming messages. This creates a bandwidth
problem for the system, forcing it to shut
down, making the data inaccessible to those
who legitimately have access to it.

A

Denial‐of‐service attack (DoS attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

• The fast network connection that utilizes light

wavelengths to transfer data.

A

Optical Fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The type of storage that retains data and

information when the power is turned off.

A

Read Only Memory (ROM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

• The type of software that authenticates users
who attempt to access the network before
establishing a secure connection with the
network.

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q
The Cloud Service model that provides end to
end vendor managed services, from
infrastructure to application.  We likened it to
‘dining out’ in our class discussion about ‘Pizza
as a service’.
A

Software as a Service (SaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q
This aggregation site in Albuquerque New
Mexico, run by UNM, provides high speed
network connectivity for many government
and education entities in the State of New
Mexico.
A

Albuquerque Gigapop (ABQG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Data that can be organized into hierarchies.

A

Structured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

• Pieces of data that cannot be linked together

A

Unstructured data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Data about data is known as ______________.

A

Metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

This type of modern database architecture is
most effective in organizing complex data
types such as graphics and multimedia.

A

Object‐oriented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

• This format is useful for managing web
content and web‐based resources, and is
particularly useful for structuring data for
building mobile applications

A

Extensible Markup Language (XML)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The term for individual facts or pieces of

information.

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A major characteristic of this service is that it
enables better accessibility to data in terms of
place and time.

A

Cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Three core characteristics of valuable

information.

A
  • Timeliness
  • Accuracy
  • Completeness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Facts that are assembled and analyzed to add

meaningfulness and usefulness.

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

• ERP stands for this

A

Enterprise Resource Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

According to our lecture, the Charleston Police

Department is using Big Data to do this.

A

Predict Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

The phone number for the UNM IT Support

Desk?

A

277‐5757

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

We learned that this unusual form of crypto

currency leverages art, photos and the like.

A

Non‐Fungible Tokens (NFT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

In Tech Bytes we learned that this car

manufacturer is making color changing cars.

A

BMW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

In Tech Bytes we learned that this telescope
will soon render clearer views of space than
the Hubble telescope

A

James Webb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

We originally learned that the quality of
information could be characterized by
timeliness, accuracy and completeness. We
later learned that there were 4 additional
components to consider in information
quality.

A
  • Precision
  • Consistency
  • Bias
  • Duplication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

In a DDoS attack, network computers that have been infected by a virus from more than one source computer act as zombies and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for

A

Distributed Denial of Service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

As reported by Andrei Ene, one of the worst malware attacks in the last 10 years is the TBT, or

A

Tiny Banker Trojan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A cybercriminal uses spyware to record all actions typed on a keyboard. This type of spyware is called a(n)

A

keystroke logger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which computer experts help an organization ensure that its information system is protected against intrusions by testing the system’s security measures?

A

white-hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

How do breach and attack simulation technologies help white-hat hackers test security?

A

They execute thousands of attack techniques continuously to reveal weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

One version of this type of malware encrypts a victim’s data until a payment is made. Another version threatens to make public a ’victim’s personal data unless a payment is made. This type of malware is called

A

ransomware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

According to our lecture, the average ransom demand in a ransomware situation is what % of a company’s global revenue?

A

1 to 1.5%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A ________ is committed when a computer is the object of the crime or a computer is used to commit a criminal offense.

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What security control is referred to as something you have and something you know?

A

Multifactor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Specialized hardware or software that capture packets transmitted over a network are called packet

A

Sniffers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Sharing infected files and opening an infected email attachment are ways digital device users

A

spread computer viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

what is an example of spear phishing?

A

An email is sent to employees at a specific company, instructing them to click on a link. That link deploys malware to their device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is the purpose of social engineering in conjunction with ransomware?

A

tricks victims into allowing access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is the only way to guarantee that computers and networks are safe from cyberattacks?

A

Take them offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

A program that appears to be legitimate but executes an unwanted activity when activated is called a

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a _________ attack.

A

DOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

According to our lecture, the number 1 cause of malware infections, accounting for an alarming 45% of infections, is what?

A

Email Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

How does a firewall work?

A

It determines what Internet traffic can leave or enter a network or computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is the term that involves a Ransomer releasing private information collected during a ransom attack?

A

Doxing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

According to our lecture, a business will fall victim to ransomware how often in 2021?

A

Every 11 seconds

72
Q

To properly authenticate, or verify, the identity of authorized users and protect assets from unauthorized users, it is essential to

A

keep user logins and passwords confidential.

73
Q

What is a cybersecurity threat?

A

an event that can lead to IT asset loss and the negative consequences

74
Q

“Cybersecurity threat mitigation” includes all of the policies, procedures, and tools that help organizations________

A

anticipate and counter threats from security vulnerabilities or incidents and reduce their impact.

75
Q

This involves the automatic tagging of unusual events in financial transactions and is used to spot mistakes and fraudulent activities.

A

Exception reporting

76
Q

In which situation should the origin of information be authenticated to protect data integrity?

A

when electronic votes are submitted during an election

77
Q

Conrad was disturbed to find evidence of applications he did not download, system configurations unexpectedly altered, and files mysteriously that disappeared and moved. Which cybersecurity threat best explains the problems he was having?

A

a rootkit

78
Q

The name of Google’s project to apply analytics to characteristics of effective management.

A

Oxygen

79
Q

What does the General Data Protection Regulation (GDPR) strive to achieve?

A

to ensure EU companies protect the privacy and personal data of EU citizens

80
Q

What is the definition of a cybersecurity exploit?

A

It is the means by which a hacker capitalizes on a cybersecurity vulnerability to do harm.

81
Q

Spyware’s basic function is to

A

capture the user’s account data, passwords, keystrokes, and more.

82
Q

Adrian and Frank began the online process of applying for a short-term loan for their business. They created an account with a username and password, looked over the privacy statement, reviewed the security policy, and accepted the terms of use. After logging on, however, they became increasingly uncomfortable answering so many detailed questions about income, employment, and more. What specific risk might they have remembered from studying cybersecurity?

A

man-in-the-middle (MitM)

83
Q

What is a keylogger?

A

It is surveillance malware that captures confidential information through keyboard input.

84
Q

What is the meaning of the term “social engineering” in the area of cybersecurity?

A

the act of manipulating or tricking people into sharing confidential, personal information

85
Q

Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users?

A

DDOS attacks

86
Q

Which of the following is a goal of an information technology disaster recovery plan (IT DRP)?

A

outline specific recovery times for information technology to resume after an issue occurs

87
Q

Explain the purpose of the National Institute of Standards Technology (NIST) Cybersecurity Framework.

A

The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.

88
Q

The goal of using eXtensible Business Reporting Language (XBLR) in compliance reporting is to ________.

A

develop a common language for all accounting and business reports

89
Q

Why is a denial-of-service attack (DoS attack) a threat to data availability?

A

By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it.

90
Q

Ransomware basically holds a target hostage because it

A

makes the target’s own data inaccessible

91
Q

A cybersecurity exploit allows a hacker or intruder to

A

remotely access a network, gain privileges, and make unauthorized changes.

92
Q

Calculating reordering points and order quantity levels are key advantages of modern

A

inventory management systems.

93
Q

Of the following statements, choose one that provides the underlying reason a company invests in a customer relationship management system (CRM).

A

It is far less expensive to retain an existing customer than to acquire a new one.

94
Q

Human resource management systems are invaluable to HR managers who lack legal expertise because the systems

A

ensure that HR actions comply with governmental regulations.

95
Q

In a relational database, information is organized into tables in which each row represents a(n) ________.

A

Record

96
Q

Recognizing that inappropriate and inconsistent pay can demotivate the strongest workforce, many firms use

A

compensation management software.

97
Q

Which stage of the project management process involves documenting the lessons learned during the project’s execution?

A

Closure Stage

98
Q

Of these business management systems, which one is focused on how managers can develop a lasting relationship with individual customers that promotes long-term buying?

A

customer relationship management system

99
Q

In our lecture, we learned about this Artificial Intelligence effort by Google through examples of it making appointments and reservations.

A

Duplex

100
Q

In a university database, the student table, with student ID as a primary key, is linked to the university department table through its primary key-department ID. In the student table, department ID is a ________.

A

Foreign Key

101
Q

Recruiting and hiring management software can help HR managers evaluate how their organization’s future staffing needs are influenced by

A

internal factors such as employee turnover and external factors such as public demand for the organization’s products.

102
Q

The holistic, balanced set of measures which reflect the different drivers that contribute to superior performance and the achievement of the enterprise’s strategic goals.

A

Balanced Score Card

103
Q

In the analytics maturity model, the most advanced level of analytics which answers the question “What should happen”, is ______________________.

A

Prescriptive Analytics

104
Q

Payscale.com, Payfactors.com, and Salary.com are sites that offer

A

employee compensation management solutions.

105
Q

A key component, and major advantage, of an ERP is its

A

centralized database.

106
Q

What occurs during the process optimization step of business process management?

A

Managers adapt (modify) the process to enhance process performance.

107
Q

How is metadata related to information?

A

It helps clarify the nature of the information.

108
Q

Which of the following is a tool commonly used by project managers and accessed using project management software?

A

Gantt charts

109
Q

What business management system seeks to streamline an organization’s activities to prevent backlogs and inefficiencies?

A

Business Process Management (BPM)

110
Q

What must be integrated into an organization’s enterprise resource management solution to allow it to create and maintain regulatory and compliance information from a centralized location?

A

financial management systems software

111
Q

The amount of time that passes between when a device is asked to perform and when it completes the task is known as

A

latency.

112
Q

___________ is a federal law mandating all electronic and information technology developed, procured, maintained or used by the federal government be accessible to people with disabilities.

A

Section 508

113
Q

Data mining is a means of ________ data that can help organizations find patterns and relationships within data sets.

A

analyzing

114
Q

While using her phone’s GPS to drive to her vacation destination, Siena needs to find a gas station. She enters into her phone’s GPS that she is looking for a gas station that is no more than five miles away from the route she is currently on. What is this an example of?

A

proximity location

115
Q

Which type of collaboration software could best help an organization increase engagement between remote employees and those who are “in-house” or organization-based?

A

cloud-based forums, messaging, and meeting apps

116
Q

In addition to overall digital flexibility, technological savings, and increased collaboration, computing in the cloud provides organizations with

A

disaster recovery.

117
Q

What is the key reason to implement cloud computing into one’s personal and/or business data and information processing?

A

Cloud computing diminishes the need to store files and software on a local drive.

118
Q

The main advantage of the IPv6 format for IP addresses is that

A

it can accommodate many more addresses than the IPv4 format.

119
Q

The purpose of the application protocol layer of TCP/IP is to

A

define how email programs and other software communicate within and across networks.

120
Q

When creating a database field, we set ________ for each field to decrease data input mistakes.

A

data types

121
Q

UNM manages this aggregation site for high speed, low cost network services that takes advantage of peering services in the state, and with consortiums such as WRN and Internet 2.

A

Albuquerque Gigapop

122
Q

The organization that makes best practice recommendations to make the web “available to all people, whatever their hardware, software, network infrastructure, native language, culture, geographical location, or physical or mental ability” is

A

World Wide Web Consortium (W3C)

123
Q

A ________ is also known as a question. A request for information from a database.

A

query

124
Q

Amazon, Kamatera, Salesforce, and Google are all examples of

A

cloud service providers.

125
Q

Data redundancy is the ________ of data.

A

duplication

126
Q

A cloud database infrastructure integrates computer hardware and operating system in an internet-based ________.

A

datacenter

127
Q

Kokopelli University, a public institute of higher education, decides to create a web site to provide prospective students information about their college. While selecting a domain name, which of the following top-level domains would best suit their goals?

A

.edu

128
Q

_________________ relationship is a(n) e-commerce relationship in which organizations buy and sell products or services online from or to one another.

A

business to business (B2B)

129
Q

The essential RDBMS functions; create, read, update, and delete data is collectively referred to as which acronym?

A

CRUD

130
Q

The unique global address for a web page or other resource on the Internet is called the ________.

A

uniform resource locator

131
Q

Data flows between different computer parts via ________.

A

buses

132
Q

The smallest image element is a(n) ________.

A

pixel

133
Q

Binary language consists of two digits, ________ and ________.

A

0; 1

134
Q

Which of the following is NOT primarily associated with working from home?

A

Office Densification

135
Q

The SSD cost is ________ than the traditional hard drive cost.

A

higher

136
Q

A wireless short-range transmission protocol is called ________.

A

Bluetooth

137
Q

The ________ speed of the processor dictates the number of instructions that CPU can process per second.

A

clock

138
Q

The ________ is a separate processor (computer) on your computer that enhances your video.

A

Graphic processor (GPU)

139
Q

Which chip and manufacturing company is the largest in the world?

A

Intel

140
Q

According to the TED talk we viewed on Quantum computing, the basic building block of a Quantum Computer is

A

A qubit

141
Q

SCCM and JAMF help in the enterprise management of computers connected to a business network in all of these ways ACCEPT

A

Replacing a broken harddrive

142
Q

The type of storage that retains data and information when the power is turned off is called ________.

A

ROM (Read Only Memory)

143
Q

The information in the memory (the RAM, the caches, the registers) is ________ when a computer is shut down.

A

not saved

144
Q

This type of connector is the most common type of connection to a Windows computer for peripherals (printers, monitors, storage devices etc.).

A

USB

145
Q

According to Gartner Research, which computer manufacturer had the largest market share in the US in 2019?

A

Dell

146
Q

UNM’s Center for Advanced Research Computing is this type of a computer resource:

A

Super Computer

147
Q

The type of storage that retains data and information when the power is turned off is called ________.

A

ROM (Read Only Memory)

148
Q

What is the software solution that we discussed as an example of a comprehensive suite of tools that largely addresses two major role of information systems, to include collaborating on a team and improving individual productivity?

A

Microsoft M365

149
Q

A multi-core processor has two or more ________; and is capable of ________.

A

cores, hyperthreading

150
Q

The correct way to measure the screen size of a computer monitor is?

A

diagonally from one corner to the other

151
Q

The ________ speed of the processor dictates the number of instructions that CPU can process per second.

A

clock

152
Q

The ________ is a separate processor (computer) on your computer that enhances your video.

A

Graphic processor (GPU)

153
Q

The information in the memory (the RAM, the caches, the registers) is ________ when a computer is shut down.

A

Not saved

154
Q

The boot process consists of how many steps.

A

4

155
Q

ITIL is a best practice service management framework for delivering information technology services. The ITIL term that describes the front-door, single point of contact for reporting and triaging IT related questions and issues is:

A

Service Desk

156
Q

What type of system is used to assist with processes that rely on a large number of inputs that frequently change?

A

Decision support system

157
Q

Which statement best describes the impact of management information systems (MIS) for communication?

A

They have vastly improved organizations’ ability to communicate effectively and efficiently.

158
Q

The chief information security officer heads the IT department in most organizations.

A

False

159
Q

How does supply chain visibility provided by a supply chain management system reduce the bullwhip effect?

A

Accurately predicting how many units of an item are expected to sell allows manufacturers to accurately source for the correct amount of raw materials and avoid overreacting to fluctuations in consumer demand.

160
Q

The four components of Information Technology: are People, Process, Technology and Data.

A

true

161
Q

A common, basic condition for most flextime policies is the requirement that employees must

A

be able to fulfill their work responsibilities, including attending certain meetings or events in-person.

162
Q

What did Peter Drucker mean by “decentralization”?

A

Organizations work at what they do best and have a comparative advantage and outsource the work at which they have no advantage.

163
Q

How are managers’ jobs expected to change as management information system (MIS) technology and tools improve?

A

Managers will be freed from tasks performed by online services or staff using collaboration tools.

164
Q

Mary Parker Follett’s theory of management is based on the principle that

A

success depends on the flow of ideas from all levels of an organization.

165
Q

What is the key role of a client-server network in business?

A

To provide personal computer users secured access to shared data.

166
Q

A videoconference may be a better choice than a voice conference call because it allows

A

better communication through nonverbal cues.

167
Q

What are piolits experiencing?

A

5g potientially interfereing with systems.

168
Q

What is helium

A

pairing cyptro currency with hotspots

169
Q

How has APD been using GIS?

A

Using cell towers to track criminals

170
Q

What is sony working on?

A

satelite that takes pictures from sapce that oyu can rent

171
Q

What are the oscars using for their trophies?

A

same gold used on NASA high powered satelites

172
Q

What is apple working on?

A

Face id through mask

173
Q

what is fitbit working on

A

magentic sensor for mask

174
Q

a space x rocket may be hitting what?

A

the moon

175
Q

What is nasa newest venture

A

telescope that can see into darkness