1. Each phase of the ____ produces some type of documentation to pass on to the next phase.
2. During the pax mongolica, the mongols _____.
3. A ________ defines the boundaries of a system in a work breakdown structure (wbs).
4. The primary role of the _____ is to ensure proper cellular function.
5. The sales department needs to rely on information from operations to understand ________.
6. Using apa citation, the date you view a page is presented in ____ format.
7. The first step in building a sequence diagram is to _____.
8. The external behavior of a system is described by _____.
9. An analyst depicts the static view of an information system with _____.
10. Interaction diagrams focus on _____ level.
11. ____ also is called looping.
12. ASP stands for _____
13. Web 2. is the second generation of the Web, which utilizes _______ user-generated content, creativity, collaboration, and information sharing
14. Web 2. is the second generation of the Web, which utilizes dynamic user-generated ________ , and information sharing
15. Web 2.0 is the second generation of the Web, which utilizes dynamic ________, creativity, collaboration, and information sharing
16. Web 2.0is the second generation of the Web, which utilizes dynamic user-generated content, creativity, collaboration, and information sharing.
17. A work environment in which the employees of a company work away from company premises and communicate is known as ________.
18. Social networking websites allow people to create and manage content and connect with others.
19. An approach to software development in which the developers make the source code available for anyone to view, adapt, or change is known as _______ .
20. Internet of Things is a network of objects with embedded sensors and other technology that allow the objects to ______ .
21. Gamification is the use of game design elements in nongame contexts.
22. A network topology in which each device has the potential to be connected to any other device on the network without human intervention is known as _____.
23. Cognitive insights is a form of artificial intelligence that utilizes algorithms and machine learning to interpret vast amounts of data.
24. cognitive engagement is a form of artificial intelligence in which the _______ and shares knowledge from a knowledge base with employees
25. A form of artificial intelligence that uses software algorithms to implement decisions with little human intervention is known as _______ .
26. Bring your own device is a workplace use of employee-owned technology devices such as smartphones and tablets.
27. Blockchain is an encrypted, distributed digital ledger of public records that is maintained across ______ linked in a peer-to-peer network
28. Artificial intelligence performs tasks commonly associated with human cognitive processing such as ________ from past experiences.
29. Social recruiting is the act of recruiting candidates using social media platforms.
30. Description of an individual’s social characteristics that identify her or him on social media sites such as LinkedIn and Facebook .This statement is related to ______ .
31. Social networking is an online _______ to find and maintain relationships.
32. Social network websites allow people to create and manage content and connect with others.
33. Social media websites usually contain hyperlinks to each other, made available by an _______ for the purpose of delivering information.
34. The organization’s plan to align social media initiatives with the organization’s strategy is known as ______ .
35. Social media users create online communities to share information, ideas, personal messages, and other content such as videos.
36. Which request made by a manager or supervisor for an employee or applicant to provide the organization access to their social media accounts by entering their password.
37. An individual who is currently employed but who is also open to considering other employment opportunities is known as _____ .
38. The extent to which an employee is emotionally connected and committed to an organization is known as ______ .
39. Worms is a stand-alone _______ that are meant to disrupt computer and network operations
40. According to the U.S. Fair Labor Standards Act workers can work under ______ in a week.
41. The disclosure of employee information to third parties without the permission of the employee is known as ______ .
42. To access employee (or other types) of data without ______ .
43. A type of malware that hides inside email attachments or files and infects a user’s computer when it is opened and/or executed is known as _______ .
44. To regard an individual negatively or with disapproval is known as _____ .
45. The state in which data are currently residing. It can be in storage , in process , or in transmission is known as ______.
46. Spyware is a ______ on a computer that gathers information about a user’s activities on the Web and transmits it to third parties
47. Illegal access to private data, services, networks, or devices by getting around security protections is known as ______ .
48. Which type of virus hides in the operating system and causes viruses to appear as necessary files.
49. Ransomware involves locking and access to a system or files until a ransom is paid to the hacker.
50. Phishing is attempting to acquire, _______ by appearing to look like an authentic source with which the victim does business.
51. A graphical model, or framework, of the architectural approach used when establishing or evaluating organizational security measures is known as ______ .
52. Malware refers to malicious software whose primary purpose is to infiltrate a user’s machine without his/her knowledge.
53. An internationally agreed-upon set of standards governing information security management is known as ______ .
54. Information security is ensuring the confidentiality, integrity, and availability of information.
55. Hacker is an individual who accesses a computer or computer network unlawfully.
56. GDPR stands for _____ .
57. Employees who have grievances against an employer and who believe that these grievances cannot be resolved is known as ______ .
58. Desired information goals Ensuring that data are kept confidential, have not been manipulated, and are available to those who are authorized to access it.
59. Which technique attempts to make a computer, network, or service unavailable for legitimate users .
60. Define data accuracy .
61. Cyber-terrorism is a politically motivated use of technology to do severe harm or disruption in society
62. Identification of mechanisms that can be used to protect data is known as _______ .
63. Computer virus is a software program that _______ into another program and causes harm to a computer by altering data, erasing files, or other damage.
64. Which technique that attempts to understand how an organization’s human capital needs would change as a function of some expected change.
65. Workforce analytics is a strategy for combining data elements into metrics and for examining relationships or changes in HR metrics.
66. The amount of data that organizations collect and include in a data warehouse is known as ______ .
67. Quality of the data collected by the organization and included in a data warehouse is known as ______ .
68. Velocity is the speed at which an organization captures data and stores it in the data warehouse.
69. ________ is the different forms of data collected by the organization and stored in the data warehouse.
70. Strategic realignment is the realignment of HR practices so that they are in alignment with overall corporate strategic goals.
71. A set of decisions made about what metrics to report, how to report them, and to whom they should be reported is known as _______ .
72. Push systems is a push communications channels, such as e-mail, actively push information and analyses to the attention of managers
73. Pull systems is a procedure of _______ available to managers so that they can access any of it at a point in time when it will be most useful for their decision making.
74. Predictive analysis is a form of data analysis in which _______ data are analyzed to make predictions about the future.
75. Operational experiments is one of the most effective methods for developing the evidence on which to base managerial decisions.
76. Which of the operational practices are of high quality and are designed around best practices ?
77. Machine learning allows systems to learn and improve from experience.
78. HR process efficiency analytics focus on how efficiently HR functionality is being delivered; may support metrics such as cost per hire, days to fill positions .
79. HR metrics used to _______ the functioning of HR programs and as benchmarks for the total HRM department.
80. The sophisticated statistical analysis of large datasets to identify recurring relationships and patterns is known as _____ .
81. Which type of interface for reporting HR data that uses a visual, or graphical, representation of key HR data for view by managers ?
82. A collection of very large and complex data, created by transaction processing systems is known as ______ .
83. A process used in management, and particularly in human resource management is known as _____ .
84. Balanced scorecard measuring strategic organizational performance that gives managers a chance to look at their company from the perspectives of stakeholders.
85. Administrative process efficiency is the type of HR efficiency that refers to the capacity to conduct existing HRM processes accurately and on time while minimizing costs.
86. The communication boundary between the hardware device and the user of that hardware is known as ______.
87. Which type of multinational corporation that tailors business operations and HR management to the local culture?
88. Transfer of training is the transfer of competencies learned in training to the job.
89. Define third-country nationals:
90. “Think global, act local” is the most common advice regarding the management of a multinational enterprise (MNE)
91. The process that occurs as the expatriate and family return to their homeland,this process is called ________
92. Predeparture training is a training program for expatriates prior to taking an international position.
93. Employees of the multinational organization (MNE) who are citizens of the country in which the parent, or headquarters, of the MNE is located IS Known as _______ .
94. The software and hardware configurations in which databases, applications, and other resources are distributed among many different computers around the world is known as ______.
95. The norms, behaviors, beliefs, and customs that exist within a nation are known as ______ .
96. N-tier architecture is the _______ in which databases, applications, and other resources are distributed among many different computers.
97. Multinational enterprises is any organization that has a business presence in ________ .
98. Multinational corporation is a company that has expanded _________ of products or services into multiple countries to capitalize on lower costs.
99. International corporation is a domestic corporation that expands its business into markets ______ of its own country.
100. IHRIM is an organization for specialists in both human resources and human resources technology
Soft Skills
Data Testing
Statutory Compliance
Administrative Assistant
Customer Service
Computer competency
Related MCQ's