Deck 1: Information Technology for Management Digital Strategies

Full screen (f)
exit full mode
Question
Which is not a step that companies can take to balance the competing risks of negligent hiring and social discrimination?

A) Choose to ignore social network profiles of candidates.Hire investigation companies to do thorough searches of candidates' backgrounds.
B) Let candidates themselves disclose information found on social media.
C) A consistent and well-documented process is needed to ensure and show compliance if there is an EEO employment investigation.
D) Make sure recruiters do not pressure applicants to disclose protected information via social media by requiring them to disclose passwords or relax privacy settings for purposes of review by the employer.
Use Space or
up arrow
down arrow
to flip the card.
Question
How many more things do you check today compared to a year ago? How long can you go without checking your devices without experiencing anxiety? When do you put down your mobiles and concentrate on one thing at a time? Do your answers indicate that you are experiencing digital or connectivity overload?
Question
Graphic images like the one below are typically used for ______________. <strong>Graphic images like the one below are typically used for ______________.  </strong> A) Providing links to online content B) Innovative brand logos C) Generating augmented reality images D) Reprogramming mobile devices <div style=padding-top: 35px>

A) Providing links to online content
B) Innovative brand logos
C) Generating augmented reality images
D) Reprogramming mobile devices
Question
___________ apps generate graphic images that are superimposed on pictures of real objects, such as rooms and roads. For instance, a mobile phone user might point her phone camera at an office building and activate an app that generates the logos of all food services, such as Starbucks and Pizza Hut, inside the building.

A) Augmented reality
B) Mobile visual search
C) Location based marketing
D) Mobile media
Question
The picture below is an example of a QR code.
The picture below is an example of a QR code.  <div style=padding-top: 35px>
Question
The picture below is an example of a mobile visual response code.
The picture below is an example of a mobile visual response code.  <div style=padding-top: 35px>
Question
Graphic images like the one below are typically used for providing links to online content.
Graphic images like the one below are typically used for providing links to online content.  <div style=padding-top: 35px>
Question
The picture below is an example of a(n) ___________.
The picture below is an example of a(n) ___________.  <div style=padding-top: 35px>
Question
While the growth of computer networks and mobile computing has resulted in many benefits to both individual users and organizations, it has also generated negative consequences. Which of the following is not a negative ethical or sustainability consequence?

A) Increased energy consumption and carbon emissions
B) Distracted driving
C) Decreasing global mean temperature (GMT).
D) Health risks associated with frequent use of closely-held smartphones.
Question
________ networking standards include 802.11b, 802.11a, and 802.11g.
Question
One of the federal regulations that require data governance is ______________.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/11
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Information Technology for Management Digital Strategies
1
Which is not a step that companies can take to balance the competing risks of negligent hiring and social discrimination?

A) Choose to ignore social network profiles of candidates.Hire investigation companies to do thorough searches of candidates' backgrounds.
B) Let candidates themselves disclose information found on social media.
C) A consistent and well-documented process is needed to ensure and show compliance if there is an EEO employment investigation.
D) Make sure recruiters do not pressure applicants to disclose protected information via social media by requiring them to disclose passwords or relax privacy settings for purposes of review by the employer.
Choose to ignore social network profiles of candidates.Hire investigation companies to do thorough searches of candidates' backgrounds.
2
How many more things do you check today compared to a year ago? How long can you go without checking your devices without experiencing anxiety? When do you put down your mobiles and concentrate on one thing at a time? Do your answers indicate that you are experiencing digital or connectivity overload?
Answers will vary.
3
Graphic images like the one below are typically used for ______________. <strong>Graphic images like the one below are typically used for ______________.  </strong> A) Providing links to online content B) Innovative brand logos C) Generating augmented reality images D) Reprogramming mobile devices

A) Providing links to online content
B) Innovative brand logos
C) Generating augmented reality images
D) Reprogramming mobile devices
Providing links to online content
4
___________ apps generate graphic images that are superimposed on pictures of real objects, such as rooms and roads. For instance, a mobile phone user might point her phone camera at an office building and activate an app that generates the logos of all food services, such as Starbucks and Pizza Hut, inside the building.

A) Augmented reality
B) Mobile visual search
C) Location based marketing
D) Mobile media
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
5
The picture below is an example of a QR code.
The picture below is an example of a QR code.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
6
The picture below is an example of a mobile visual response code.
The picture below is an example of a mobile visual response code.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
7
Graphic images like the one below are typically used for providing links to online content.
Graphic images like the one below are typically used for providing links to online content.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
8
The picture below is an example of a(n) ___________.
The picture below is an example of a(n) ___________.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
9
While the growth of computer networks and mobile computing has resulted in many benefits to both individual users and organizations, it has also generated negative consequences. Which of the following is not a negative ethical or sustainability consequence?

A) Increased energy consumption and carbon emissions
B) Distracted driving
C) Decreasing global mean temperature (GMT).
D) Health risks associated with frequent use of closely-held smartphones.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
10
________ networking standards include 802.11b, 802.11a, and 802.11g.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
11
One of the federal regulations that require data governance is ______________.
Unlock Deck
Unlock for access to all 11 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 11 flashcards in this deck.