Suny Old Westbury Business & Human Resources Management Practice Quiz
Question 1
What are the most common transaction processing functions of the human resources department? Select all that apply.
A |
Managing employee records |
B |
Managing customer satisfaction concerns |
C |
Managing employee payroll |
D |
Managing sales orders |
E |
Managing the process of credits and debits associated with an account |
Question 2
With technology advancements redefining possibilities and accessibility for consumers and organizations alike, there are diverse arguments presented in regard to potential consequences, risks, and dangers associated with certain technologies. As detailed through the case study of Google Glass, which of the following are some of the consequences discussed? Select all that apply.
A |
Liability |
B |
Health problems |
C |
Poor eyesight |
D |
Social risks |
E |
Car maintenance |
Question 3
A number of tools and techniques can be utilized by organizational decision makers. One method is to graphically represent options that are under consideration, including their outcomes and probability of occurrence. Which of the following is the name of this popular method/tool used for decision making? Select one:
A |
Cost-benefit analysis |
B |
Decision tree |
C |
Decision matrix |
D |
Multivoting |
E |
T-chart |
Question 4
In systems planning, to begin the system development life cycle (SDLC), a systems request is submitted that describes a problem or desired changes. Next, a feasibility study is done to determine the probability of success of the proposed system. The two feasibility analyses conducted include which of the following? Select all that apply.
A |
Technical feasibility |
B |
Expense feasibility |
C |
Management feasibility |
D |
Transactional feasibility |
E |
Economic feasibility |
F |
Organizational feasibility |
Question 5
Which of the following refers to the right to make a determination as to what personal information is made accessible or not? Select one.
A |
Privacy |
B |
Ethics |
C |
Responsibility |
D |
Risk |
Question 6
During what step of the risk management process do companies assess their highest ranked risks in order to develop a plan using risk controls? Select one.
A |
Risk evaluation |
B |
Risk mitigation |
C |
Risk monitoring |
D |
Risk identification |
E |
Risk analysis |
Question 7
The information systems territory can extend to four separate levels, including which of the following? Select all that apply.
A |
Informational content |
B |
Closure |
C |
Technical structure |
D |
Software structure |
E |
Implementation |
F |
Structural process |
G |
Functions |
Question 8
It is important to be cautious when using an organization’s internet-based and e-commerce services on your mobile device.
True |
|
False |
Question 9
A successfully designed risk program provides management with the ability to do which of the following in regard to risk? Select all that apply.
A |
Respond to risk |
B |
Condense risk |
C |
Regulate risk |
D |
Desensitize risk |
E |
Define risk |
F |
Analyze risk |
G |
Evaluate risk |
Question 10
Improving management’s understanding of IT opportunities and limitations, assessing current performance, identifying capacity and human resource requirements, and clarifying the level of investment required are all objectives of which of the following? Select one.
A |
IT strategic plan |
B |
Sequencing plan |
C |
Investment plan |
D |
Project plan |