Exam 15: Dicision Making Models and Knowledge Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags
Match the most appropriate definition with each element below.
Appropriate information is provided for management to operate the entity.
Availability.
Sensitive information is protected from unauthorized disclosure.
Compliance.
The information complies with externally imposed business criteria.
Confidentiality.
Correct Answer:
Verified
Premises:
Responses:
Appropriate information is provided for management to operate the entity.
Availability.
Sensitive information is protected from unauthorized disclosure.
Compliance.
The information complies with externally imposed business criteria.
Confidentiality.
The information is available when required by the business process.
Effectiveness.
The information is delivered in a timely, correct, consistent and usable manner.
Efficiency.
The information is in accordance with business values.
Integrity.
The information is provided through the optimal use of resources
Reliability.
(Matching)
4.8/5
(42)

One step in creating a knowledge management system involves creating an appropriate organizational culture. Learning about the elements of corporate culture would be an activity in which part of Steps for Better Thinking?

(Multiple Choice)
4.9/5
(40)

Matt needed to estimate uncollectible receivables as part of a financial statement audit. According to Steps for Better Thinking, which of the following should Matt do second?

(Multiple Choice)
4.8/5
(40)

Which of the following could be accurately described as a decision model: (i) debit and credit rules, (ii) weighted rating software technique.

(Multiple Choice)
4.7/5
(40)

Which of the following is the least appropriate business goal for a knowledge management system?

(Multiple Choice)
4.8/5
(42)

___ can cause information overload simply by increasing the amount of available information.

(Multiple Choice)
4.9/5
(27)

Phil, a corporate controller, was preparing a comprehensive presentation of his firm's financial statements for the board of directors. He suspected some members of the board would experience information overload, so he wanted to focus on creating value-added information as a strategy for reducing it. Which of the following is the best example of value-added information in this context?

(Multiple Choice)
4.8/5
(35)

Steps for Better Thinking comprise four steps after its foundation level. Which of the following is most representative of Level Two?

(Multiple Choice)
4.9/5
(38)

Working in groups frequently leads to information overload because of:

(Multiple Choice)
4.7/5
(35)

Kay was frustrated. She was auditing a new client for the first time, but the client's accounting information system was in complete disarray. The client, a multi-national corporation, had boxes and filing cabinets full of paper forms in at least three languages. She had been working very long days with her other clients, too. She needed to come up with a plan for making sense of the documents before she could proceed with any of the audit tasks. -Kay has come to you for advice regarding this situation. To help her, explain your personal strategy for making decisions and managing knowledge.

(Essay)
4.8/5
(38)

When a person has to make a decision quickly, ___ may cause information overload.

(Multiple Choice)
5.0/5
(40)
Match the most appropriate item with one item below.
A cashier receives inadequate training and gives a customer too much change.
Denial of service attack.
A corporate spy sells information about new products to a firm's competitors.
Disclosure of confidential information.
A cyber-criminal threatens to disable an air traffic control system unless he is provided with a flight out of the country.
Error.
Correct Answer:
Verified
Premises:
Responses:
A cashier receives inadequate training and gives a customer too much change.
Denial of service attack.
A corporate spy sells information about new products to a firm's competitors.
Disclosure of confidential information.
A cyber-criminal threatens to disable an air traffic control system unless he is provided with a flight out of the country.
Error.
A data entry clerk increases prices by ten percent when inputting invoice data.
Extortion.
A group of hackers bombard an information system with requests for information, preventing other users from accessing the system.
Information manipulation.
A hacker introduces a virus in an information system.
Information theft.
A restaurant waiter sells a customer's credit card number to a friend.
Intrusions.
A systems designer uses a secret password to bypass controls added by the client.
Malicious software.
Because of a power outage, payroll checks are processed two days late.
Service interruptions and delays.
(Matching)
4.8/5
(32)

The first step in creating a knowledge management system is:

(Multiple Choice)
4.8/5
(39)

Marge was creating an Access database to serve as her company's knowledge management system. Which of the following field types is she least likely to use in completing her task?

(Multiple Choice)
4.8/5
(41)

Mike had recently finished his accounting degree, and was considering which professional journals he should subscribe to in his career. He purchased several journals and read all the articles in each one right after finishing the CPA exam, then made his decision. His behavior is an example of:

(Multiple Choice)
4.9/5
(40)

Decision makers can avoid information overload caused by organizational design by:

(Multiple Choice)
4.8/5
(38)

Steps for Better Thinking comprise four steps after its foundation level. Which of the following is most representative of Level One?

(Multiple Choice)
4.8/5
(37)

The organization of intellectual resources and information systems within a business environment is often referred to as:

(Multiple Choice)
4.8/5
(38)

Which of the following statements about technology and knowledge management is most true?

(Multiple Choice)
4.8/5
(40)

Peter created an online database for his company's computer network. If anyone inside the firm can search the database without entering a user name or password, it is fulfilling which objective of knowledge management?

(Multiple Choice)
4.9/5
(52)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)