Module 6- HRIS Flashcards

1
Q

Which of the following measures uses number of incumbents and salary?

A. Weighted average
B. Unweight average
C. Median
D. Mode

A

A. Weighted average

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A project manager is assembling the project team. What should HR advise the manager to look for in project team members?

a) Commitment to the project’s objectives and an understanding of their role
b) Knowledge of the project and a willingness to sponsor activities
c) Commitment to their regular responsibilities and strongnegotiatin skills
d) Knowledge of leadership and the ability to listen

A

a) Commitment to the project’s objectives and an understanding of their role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The budgeting effort in a project’s life cycle occurs during which phase?

a) Conception
b)Selection
c) Planning
d) Evaluation

A

c) Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The PRIMARY priority of a project manager who is exhibiting the interpersonal role is:

a) disseminating information and helping team members.
b) building team norms and fostering harmony.
c) allocating resources.
d) negotiating differences and monitoring project progress.

A

b) building team norms and fostering harmony.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which is the prioritized step to implement HRIS is?

a) Design the required database.
b) Determine the information needs.
c) Construct information security scheme.
d) Choose an appropriate vendor.

A

b) Determine the information needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is an Internet platform designed to link vendors, suppliers, and partners to the global enterprise?
a) Internet
b) Geonet
c) Extranet
d) Intranet

A

c) Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is not an advantage of the Human Resource Information System?
a) a reduction in labor cost.
b) the ability to manage voluminous data.
c) better supervision and control over the human resources.
d) None of the above.

A

d) None of the above.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is the MOST important role HR can play a major change initiative?.
a) Assume responsibility for implementing the change.
b) Communicate regularly with employees.
c) Question whether the change is needed.
d) Counsel people who are upset by the change.

A

b) Communicate regularly with employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You want to show the various steps of interviewing and recruiting the company’s new Chief Operating Officer (COO). Which of the following diagrams would BEST illustrate this
a) Process flow
b) Decision tree
c) Gantt Chart
d) PERT Chart

A

a) Process flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An effort to consciously gather, organize and share information internally is called:
a) HRIS
b) knowledge management
c) workforce analytics
d) HR portal

A

b) knowledge management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can be done to reduce resistance to change to a new HRIS?
a) The use of “Power Users”
b) Hire HRIS experts
c) Big bang implementation
d) Outsourcing

A

a) The use of “Power Users”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Increasingly, the failure to successfully implement HRIS has to do with:
a) the hardware and software of the system
b) the increasingly complex work flow processes
c) the skills of the change leader and the people and organizational issues related to the change
d) the conflict between the HR and IT departments

A

c) the skills of the change leader and the people and organizational issues related to the change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The main purpose of an HRIS project status report is to:
a) Inform the sponsor of the project’s problems
b) Provide information to senior management and the CEO
c) Organize and summarize the information so that all stakeholders are informed
d) Inform the client about the changes that have been completed

A

c) Organize and summarize the information so that all stakeholders are informed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An issues log is a tool for project managers that will

a) Assign blame for an issue
b) Track individual performance
c) Keep issues under control
d) Log all defects

A

c) Keep issues under control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following method that is used for collects qualitative data?
a) Remuneration survey
b) Satisfaction questionnaire
c) Exit interview
d) Data mining

A

c) Exit interview

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the MEAN of the following salaries? 40,000; 50,000; 65,000; 76,000.

a) 40,000.
b) 55,500 .
c) 57,750.
d) 76,000.

A

c) 57,750.
Mean is average, so add up all the numbers and divide by the number in the set.
40 + 50+65+76
The answer divide it by 4 (because they’re 4 numbers in the set)

17
Q

An HR Manager decides to test the theory that a decline in the investment of IT is directly related to a decline in subsequent operational efficiency. The BEST way to test the theory is to:

a) Interview IT people and determine the reasons for declining operational efficiency.
b) Survey operation managers about the importance of IT.
c) Track the correlation between investment of IT and operational efficiency.
d) Identify external events that have an impact on operational efficiency.

A

c) Track the correlation between investment of IT and operational efficiency.

18
Q

If an HR practitioner developed an economic or statistical model to identify costs and benefits associated with an HR program, this would be called a(n):
a) HR audit.
b) HR accounting.
c) Break-even analysis.
d) Utility analysis

A

d) Utility analysis

19
Q

The following test scores were recorded by job applicants: 65, 68, 70, 75, 88, 90,
90, 91, 92. What is the mode?.
a) 65
b) 88
c) 90
d) 92

A

c) 90

20
Q

The HRIS team selects a contractor and must present its decision to the CHRO for budget approval. The CHRO will want to know if the program is cost-effective. The team can BEST make its case by:

a) Comparing the cost per trainee of this program to that of ot her programs in the company.
b) Developing a charge-back plan that shares costs with participat ing departments.
c) Showing how the anticipated costs are offset by the expected benefits.
d) Comparing the contractor’s price to the cost of developing the training internally.

A

c) Showing how the anticipated costs are offset by the expected benefits.

21
Q

Which of the following is not considered a “best practice” that HR managers should consider to secure information security and privacy?

a) Train users on how to securely use and handle the equipment, data, and
software.
b) Make backup copies of data files and programs.
c) Do not allow passwords to be shared. Change passwords frequently.
d) Require employees to take sensitive material home with t hem so that it is not left at the office.

A

d) Require employees to take sensitive material home with t hem so that it is not left at the office.

22
Q

company requirement that employees show their badges on entering the building would be c onsidered part of which security measure?

a) Investigation
b) Identification and external control systems
c) Theft and fraud
d) Personal employee information security

A

b) Identification and external control systems

23
Q

The economic rationale for most security programs is based on which of t he following cost considerations?

a) Risk containment requirements
b) Lost investment income incurred in a loss
c) Insurance or other indemnity available
d) Protection costs versus cost of losses incurred without t he protection

A

d) Protection costs versus cost of losses incurred without t he protection

24
Q

When speaking with potential investors and potential employees, what is the MOST effective way to protect the organization’s proprietary information?

a) Advise potential investors and employees that discussions will be recorded and kept on file in the event information regarding this drug is leaked.
b) Explain the sensitivity and confidentiality of the information and request that potential investors and employees agree not to discuss the information with anyone except the interviewer.
c) Require that non-disclosure agreements (NDAs) be signed prior to discussions commencing.
d) Have the organization’s lawyers present at all discussions in order to maintain attorney-client privilege.

A

c) Require that non-disclosure agreements (NDAs) be signed prior to discussions commencing.

25
Q

Which of the following common selection techniques is least predictive of workplace violence?

a) Psychological assessments.
b) Behavioral interviews.
c) Reference checks.
d) Criminal records review.

A

a) Psychological assessments.

26
Q

Which of the following is the FIRST step in conducting a security risk analysis?

a) Develop an emergency response plan.
b) Determine the ratio of the cost of protection to the cost of loss.
c) Determine the company’s security risk factors.
d) Determine the cost of replacing lost or damaged assets.

A

c) Determine the company’s security risk factors.

27
Q

Which of the following technologies has the GREATEST impact on policies and procedures concerning privacy?

a) Network monitoring
b) Bluetooth
c) High-speed Internet access
d) Streaming desktop video

A

a) Network monitoring

28
Q

Which type of security breach is more difficult to monitor?

a) Knowledge about key customers
b) Physical property defacement
c) Inventory theft
d) Equipment theft

A

a) Knowledge about key customers

29
Q

With regard to technology security risks, which action would be most helpful?

a) Focus on protecting only the most confidential and proprietary information.
b) Monitor employee use of the company e-mail system.
c) Restrict access to certain computer information to personnel with a need to know.
d) Ensure that information technology personnel have the necessary qualifications.

A

c) Restrict access to certain computer information to personnel with a need to know.

30
Q

Which of the following is not a recommended privacy protection practice?

a) Adopt a comprehensive information security and privacy policy .
b) Store sensitive personal data in secure HRIS and provide appropriate encryption .
c) Dispose of documents properly or restore persistent storage equipment.
d) Require HR employees to change their passwords annually

A

d) Require HR employees to change their passwords annually

31
Q

Which of the following is considered a Threat to information security by human
error?
a) Hacker penetration
b) Entered data incorrectly
c) Lightning strikes
d) Disgruntled employees

A

b) Entered data incorrectly

32
Q

All of the following are important in efforts to protect information in an organization EXCEPT
a) firewalls
b) encryption
c) search engines
d) data backups

A

c) search engines