× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
j
3
s
3
j
2
J
2
e
2
n
2
t
2
d
2
b
2
t
2
J
2
b
2
New Topic  
cb2015 cb2015
wrote...
Posts: 513
Rep: 0 0
6 years ago
Which of the following knowledge management strategies should be used with strategically valuable information?
 
  A) develop plans of action to experiment with and invest in this information
  B) systematically collect and organize, making it widely available throughout the organization
  C) create backup copies to be stored remotely and delete information from the system
  D) automate collection and archiving to achieve cost-effectiveness

 Q. 2

Which type of database architecture does Oracle use?
 
  A) network database
  B) relational database
  C) hierarchical database
  D) object-oriented database

 Q. 3

Executive support systems are information systems that support the
 
  A) long-range planning activities of senior management.
  B) knowledge and data workers in an organization.
  C) decision making and administrative activities of middle managers.
  D) day-to-day processes of production.
  E) transactional needs of the organization.

 Q. 4

Which of the following types of testing involves both end users and IT staff testing the functionality of an entire IS?
 
  A) system testing
  B) parallel testing
  C) unit testing
  D) acceptance testing

 Q. 5

What is biometric authentication? What are its advantages and disadvantages?
 
  What will be an ideal response?

 Q. 6

Which of the following is a key attribute of the low-cost leadership strategy?
 
  A) providing unique add-ons to supplement the products or services
  B) focusing on a specific market segment
  C) optimizing the value chain by eliminating unwanted expenditures
  D) offering products and services with superior qualities
Read 37 times
2 Replies

Related Topics

Replies
wrote...
6 years ago
Ans. to #1

A

Ans. to #2

B

Ans. to #3

A

Ans. to #4

A

Ans. to #5

Biometric authentication uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users. Biometric authentication provides strong authentication, but the required equipment is expensive. Often, too, users resist biometric identification because they feel it is invasive.

Ans. to #6

C
cb2015 Author
wrote...
6 years ago
Genius!!!!!!
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  824 People Browsing
Related Images
  
 276
  
 397
  
 399
Your Opinion
What's your favorite coffee beverage?
Votes: 304