Correct Answer
verified
Multiple Choice
A) using web-based and digital technology only.
B) exploring the potential of its staff.
C) changing how people work and earn an income.
D) aligning its big data activities and knowledge-management strategies with business objectives and people management.
Correct Answer
verified
Multiple Choice
A) variety.
B) value.
C) velocity.
D) volume.
Correct Answer
verified
Multiple Choice
A) Volume
B) Variety
C) Value
D) Veracity
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) cannot be taught to people.
B) cannot be transformed.
C) is taken as personal property.
D) is known only by an individual.
Correct Answer
verified
Multiple Choice
A) A person's digital footprint becoming available
B) The use of recommended engines
C) The occurrence of an eligible data breach
D) The increased prevalence of the Internet of Things
Correct Answer
verified
Multiple Choice
A) managers who carry out knowledge-management programs.
B) individuals in an organisation who are knowledgeable.
C) technologies and organisational strategies that support knowledge-management practices.
D) people outside of the organisation who support and enhance knowledge management practices.
Correct Answer
verified
Multiple Choice
A) Recommendation engines
B) Internet of Things (IoT)
C) Chatbots
D) Privacy impact assessments (PIA)
Correct Answer
verified
Multiple Choice
A) Socialisation
B) Externalisation
C) Combination
D) Internalisation
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) knowledge in processes.
B) organisational memory.
C) customer knowledge.
D) knowledge in people.
Correct Answer
verified
Multiple Choice
A) Knowledge services
B) Knowledge-management programs
C) Effective communication
D) Social networks
Correct Answer
verified
Multiple Choice
A) Socialisation
B) Externalisation
C) Combination
D) Internalisation
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Destroy or de-identify personal information that is no longer needed
B) Collect and hold personal information needed for service and tasks
C) Put into place strategies to protect personal information held
D) Embed privacy protections into personal information handling practices
Correct Answer
verified
Multiple Choice
A) efficiently and effectively acquire access to tacit knowledge.
B) provide consistency in good practice that leads to better customer experiences and a competitive advantage.
C) share the existing knowledge in the organisation.
D) transfer knowledge from inside to outside the organisation.
Correct Answer
verified
Multiple Choice
A) Collecting personal information is challenging and time-consuming.
B) Over-collection of personal information can increase risks of mishandling that information.
C) Organisations often don't have the resources available to do this type of collection well.
D) Collecting personal information can be expensive.
Correct Answer
verified
Showing 21 - 40 of 51
Related Exams