Technology Management Flashcards

(347 cards)

1
Q

True or False:
The term “big data” became popular in the early 21st century as HR professionals embraced cloud computing.

A

False — It came into use at the end of the 20th century.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False:
One of the features of big data, known as volume, refers to the large size of datasets requiring new storage and analysis tools.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False:
Velocity in big data refers to how quickly data is processed and whether it is updated in real-time or near-real-time.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False:
Variety in big data refers only to different types of numerical formats.

A

False — Variety includes text, images, video, audio, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False:
HR professionals now need to be more technologically knowledgeable due to the era of big data.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the three defining features of big data?
A. Value, Variety, Volume
B. Volume, Velocity, Variety
C. Velocity, Visibility, Value
D. Variety, Visualization, Variance

A

B. Volume, Velocity, Variety

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following best defines the ‘velocity’ feature of big data?
A. The number of different data types that must be managed
B. The need for larger databases
C. The speed at which data flows into and is processed by systems
D. The quality of the data collected from external sources

A

C. The speed at which data flows into and is processed by systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why has cloud computing become popular in the era of big data?
A. It provides real-time decision-making
B. It enhances wireless communication
C. It enables faster hiring processes
D. It allows storage of large datasets on remote servers

A

D. It allows storage of large datasets on remote servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an example of data variety in HR analytics?
A. Monthly sales reports
B. Job applications with text and resume attachments
C. Employee height and weight
D. The number of HR staff in an office

A

B. Job applications with text and resume attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How has big data changed HR professionals’ responsibilities?
A. They now focus more on physical file storage
B. They need to reduce employee data usage
C. They must become more knowledgeable about technology
D. They are expected to outsource all data analysis

A

C. They must become more knowledgeable about technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False:
Big data allows HR professionals to identify patterns and predict outcomes using models based on evidence

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False:
The size of the database is more important than the quality of data analysis in HR decision-making.

A

False — The quality of analysis is more important.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False:
HR professionals can use big data to objectively evaluate the effectiveness of their actions.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False:
To leverage big data, HR should avoid involving IT to prevent unnecessary technical complexity.

A

False — HR must work with IT to access and analyze the right data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a key benefit of big data for HR professionals?
A. Reducing employee benefits costs
B. Eliminating the need for performance evaluations
C. Making evidence-based decisions and predicting outcomes
D. Increasing employee paperwork

A

C. Making evidence-based decisions and predicting outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why must HR systems be scalable when using big data?
A. To support international travel requests
B. To manage growing amounts of data efficiently
C. To avoid data encryption
D. To limit the variety of data types

A

B. To manage growing amounts of data efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following is true about the value of big data in HR?
A. The more data stored, the more valuable the system becomes
B. The value lies in the variety of job titles
C. The value lies in the ability to analyze and act on insights
D. The value comes from the number of employees surveyed

A

C. The value lies in the ability to analyze and act on insights

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is an example of how big data can be applied in HR?
A. Planning corporate holiday events
B. Detecting turnover spikes in specific locations
C. Printing new employee handbooks
D. Organizing company travel rewards

A

B. Detecting turnover spikes in specific locations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What must HR professionals do to fully benefit from big data?
A. Ignore IT and manage data independently
B. Store data on personal devices
C. Work with IT to gather and analyze the right data
D. Limit data collection to annual surveys

A

C. Work with IT to gather and analyze the right data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

According to Alec Levenson, HR professionals should improve their knowledge of both their organizations and business environments.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

True or False:
Levenson believes that collecting new data helps reduce errors and improve business process efficiency.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

True or False:
Better use of existing data can help HR professionals understand employee engagement and motivation.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

True or False:
Better use of existing data can help HR professionals understand employee engagement and motivation.

A

False — It includes mapping information flows and work relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False:
Mapping information flows and relationships within organizations is a form of strategic analysis in HR big data.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is one way HR can benefit from collecting new data, according to Alec Levenson? A. Reducing the number of employee surveys B. Improving employee social events C. Gaining insights into business processes and reducing errors D. Creating longer onboarding programs
C. Gaining insights into business processes and reducing errors
26
How does Levenson suggest HR professionals can better use existing data? A. To adjust payroll schedules B. To understand why employees behave the way they do C. To compare HR policies across industries D. To decrease training hours
B. To understand why employees behave the way they do
27
Which of the following is part of better strategic analysis using big data in HR? A. Monitoring employee lunch breaks B. Tracking attendance for virtual meetings C. Mapping how information flows and work relationships D. Auditing financial reimbursements
C. Mapping how information flows and work relationships
28
According to Alec Levenson, what should HR professionals focus on to capitalize on big data? A. Expanding administrative teams B. Improving vendor negotiation tactics C. Enhancing organizational knowledge and strategic analysis D. Cutting HR operating costs
C. Enhancing organizational knowledge and strategic analysis
29
Which of the following is NOT one of Levenson’s three main areas where big data helps HR? A. Collecting new data B. Enhancing travel policy compliance C. Using existing data effectively D. Better strategic analysis
B. Enhancing travel policy compliance
30
True or False: The presentation tier serves as the user interface, allowing input and receiving responses.
TRUE
31
True or False: The logic tier is only responsible for storing data.
False — The logic tier enables operations through system and application software.
32
True or False: Application software must be compatible with system software in the logic tier.
TRUE
33
True or False: The data tier is responsible for collecting user input and displaying information.
False — That’s the presentation tier. The data tier stores information.
34
True or False: A challenge in the data tier is ensuring current and quickly accessible data.
TRUE
35
True or False: The communications tier connects the logic tier to both internal and external network
TRUE
36
What is the main function of the presentation tier? A. Manage hardware components B. Store data in the cloud C. Interface between the user and the system D. Analyze data for reporting
C. Interface between the user and the system
37
Which tier is responsible for enabling operations using system and application software? A. Data tier B. Presentation tier C. Logic tier D. Communications tier
C. Logic tier
38
Which tier is responsible for storing the information used by applications? A. Presentation tier B. Logic tier C. Communication tier D. Data tier
D. Data tier
39
A. Creating user-friendly interfaces B. Updating data frequently without slowing the system C. Managing e-mail communications D. Printing documents quickly
B. Updating data frequently without slowing the system
40
What is the role of the communications tier in an information system? A. Securing user credentials B. Storing audio and video files C. Sharing data across internal and external networks D. Handling graphic recognition
C. Sharing data across internal and external networks
41
Which of the following is a best practice for application software usability? A. Command-line interfaces only B. Drag-and-drop and click-and-paste features C. Manual data transfers D. Print-only reporting
B. Drag-and-drop and click-and-paste features
42
True or False: Integration in information systems refers to the ability of users to share the same data across departments.
TRUE
43
True or False: Enterprise Resource Planning (ERP) systems guarantee integration among all their applications.
TRUE
44
True or False: Best of breed (BOB) systems are designed for general users and always integrate seamlessly with ERP systems.
False — BOB systems may not integrate seamlessly and need compatibility testing.
45
True or False: HR information systems (HRIS) are often part of ERP systems and allow HR to manage and analyze employee data.
TRUE
46
True or False: HR departments should avoid working with IT when evaluating and implementing HR technology.
False — Collaboration with IT is essential for integration, support, and risk assessment.
47
True or False: Using multiple systems like ERP, BOB, and department-specific tools makes achieving consistent and secure integration more difficult.
TRUE
48
What is the main purpose of ERP systems in an organization? A. To automate employee promotions B. To allow departments to share and access centralized data efficiently C. To train new hires on system use D. To reduce communication between departments
B. To allow departments to share and access centralized data efficiently
49
Which of the following is a potential downside of using BOB systems? A. They are too advanced for HR professionals B. They don’t support payroll processing C. They may not integrate well with current ERP systems D. They require cloud-based infrastructure only
C. They may not integrate well with current ERP systems
50
Why is it important for HR to work with IT when choosing and implementing software? A. To avoid hiring outside consultants B. To ensure compatibility, support, and security C. To reduce HR’s role in system maintenance D. To limit system features
B. To ensure compatibility, support, and security
51
What challenge arises when an organization uses an ERP, a BOB system, and individual department tools? A. Higher employee turnover B. Slower internet speeds C. Greater difficulty achieving security and consistent integration D. Less need for data storage
C. Greater difficulty achieving security and consistent integration
52
Which HR function is supported by HRIS within an ERP system? A. Web design B. Social media marketing C. Data gathering, reporting, and analysis D. Employee carpool coordination
C. Data gathering, reporting, and analysis
53
What is a potential result of manually entering data into a BOB system due to poor integration? A. Faster onboarding B. Fewer IT expenses C. Increased errors and resource usage D. Enhanced system security
C. Increased errors and resource usage
54
True or False: Scalability refers to increasing data storage without increasing processing time.
TRUE
55
True or False: Managing scalability involves both technical and economic challenges.
TRUE
56
True or False: Cloud computing requires organizations to buy and maintain their own servers.
False — Cloud providers manage and maintain the hardware.
57
True or False: Cloud computing offers flexibility, cost savings, and easier access for mobile users.
TRUE
58
True or False: One risk of cloud computing is the potential for data loss or unauthorized access.
TRUE
59
True or False: Cloud users pay a flat fee regardless of how much storage or bandwidth they use.
False — Users pay only for what they use.
60
What is the main challenge of scalability in big data systems? A. Hiring more IT staff B. Increasing data without increasing processing time C. Reducing mobile access D. Eliminating user customization
B. Increasing data without increasing processing time
61
Which of the following best describes a benefit of cloud computing? A. Requires more physical space for server rooms B. Offers unlimited bandwidth without any cost C. Provides cost-effective, scalable data solutions D. Limits mobile access to internal users only
C. Provides cost-effective, scalable data solutions
62
What economic advantage does cloud computing offer? A. Fixed pricing regardless of usage B. Free software updates C. Pay-as-you-go model for storage and bandwidth D. Guaranteed integration with all legacy systems
C. Pay-as-you-go model for storage and bandwidth
63
Which question should organizations ask when assessing cloud risks? A. Can the provider secure and back up data properly? B. Can it reduce employee overtime? C.Does it include customizable fonts? D. Is it compatible with social media platforms?
A) Can the provider secure and back up data properly?
64
Why is cloud computing appealing to mobile users? A. It doesn't require passwords B. It provides instant access to organizational data from any location C. It blocks access to internal networks D. It disables device syncing features
B. It provides instant access to organizational data from any location
65
True or False: Security should be considered when designing systems and choosing technology for an organization.
TRUE
66
True or False: Back doors in applications are acceptable as long as vendors are trustworthy.
False — Back doors pose a serious unauthorized access risk.
67
True or False: Assigning different levels of system access to users is a key part of managing security.
TRUE
68
True or False: Security only becomes a concern after the technology has been installed and is in use.
False — Security must be considered from the beginning, including design and selection.
69
True or False: Governance features in technology should track who accessed the system and what actions they performed.
TRUE
70
True or False: Security concerns apply only to software, not to hardware or maintenance process.
False — Security impacts equipment, software, processes, and policies.
71
Which of the following is a security risk when integrating new systems? A. Reduced customer engagement B. Increased productivity C. Unauthorized access through back doors D. Faster cloud access
C. Unauthorized access through back doors
72
What is an example of managing user security levels? A. Granting all users full system access B. Assigning access only to areas each user needs C. Limiting access to only senior leadership D. Restricting use of email applications
B. Assigning access only to areas each user needs
73
Why is system governance important in security? A. It automates all data analysis B. It creates a smoother user interface C. It logs who accessed the system and their activity D. It removes the need for user passwords
C. It logs who accessed the system and their activity
74
What is a key concern when vendors access an organization’s system? A. Ensuring fast internet speed B. Allowing them full access to simplify work C. Ensuring they only access authorized system areas D. Providing them with access to employee salaries
C. Ensuring they only access authorized system areas
75
What does a comprehensive security strategy involve? A. Including design, equipment, software, processes, and policies B. Focusing solely on software licensing C. Only encrypting email communications D. Limiting system use to IT staff
A) Including design, equipment, software, processes, and policies
76
True or False: HR technology applications can automate complex processes and free up HR professionals for strategic work.
TRUE
77
True or False: Applicant tracking systems (ATS) can only store applications and résumés but cannot schedule interviews.
False — ATS can also schedule interviews, screen applications, and send responses.
78
True or False: Wearable technology like smartwatches can be used by HR to encourage healthy behaviors and monitor workplace safety.
TRUE
79
True or False: Employee data collected from wearable devices never raises privacy or legal concerns.
False — Privacy and legal issues must be reviewed, especially depending on local laws.
80
True or False: HR technology can support functions such as onboarding, performance management, and compensation planning.
TRUE
81
True or False: HR systems cannot measure legal compliance or generate diversity reports.
False — ATS and HR tech can measure compliance and generate diversity reports.
82
Which of the following is a core HR technology application? A. Applicant tracking system B. Compensation planning C. Time and attendance D. Learning management system
C. Time and attendance
83
What is one use of artificial intelligence in HR technology? A. Hiring security guards B. Analyzing candidate applications for keywords C. Filing tax returns D. Printing company newsletters
B. Analyzing candidate applications for keywords
84
Which HR function is supported by wearable technology? A. Posting jobs on career sites B. Conducting exit interviews C. Monitoring employee safety in physical environments D. Editing performance reviews
C. Monitoring employee safety in physical environments
85
How can HR use data from employee skill profiles? A. To calculate parking availability B. To track time-off requests C. To identify and develop future leadership candidates D. To create email templates
C. To identify and develop future leadership candidates
86
Which of the following is a benefit of using an ATS dashboard? A. Monitors financial statements B. Displays time-to-hire and other hiring metrics C. Provides legal representation D. Tracks office supply usage
B. Displays time-to-hire and other hiring metrics
87
What is one risk associated with wearable technology in the workplace? A. Slower communication B. Employee data privacy concerns C. Lack of smart device availability D. Increased payroll errors
B. Employee data privacy concerns
88
Which HR activity is supported by compliance-related features in HR technology? A. Vacation planning B. Wellness coaching C. Monitoring legal hiring goals and diversity D. Organizing company events
C. Monitoring legal hiring goals and diversity
89
True or False: SaaS applications are installed directly onto a customer’s local computer.
False — SaaS is delivered over the Internet, not installed locally.
90
True or False: SaaS software is usually accessed through a web browser and Internet connection.
TRUE
91
True or False: SaaS providers can apply updates and enhancements without customers needing to install them manually.
TRUE
92
True or False: SaaS is only available to large organizations due to its high cost and complex licensing.
False — SaaS can save time and money, especially for small and medium-sized organizations.
93
True or False: SaaS customers typically pay based on use or a subscription model.
TRUE
94
True or False: SaaS applications cannot be scaled to meet changing organizational needs.
False — SaaS applications are scalable and allow additional capacity or features to be added.
95
What is Software as a Service (SaaS)? A. Software installed on personal laptops only B. Software delivered and managed remotely via the Internet C. Software that cannot be updated D. Software limited to HRIS systems only
B. Software delivered and managed remotely via the Internet
96
Which of the following is required to access a SaaS application? A. A dedicated server B. A software installation CD C. Internet access and a compatible web browser D. A high-level IT certification
C. Internet access and a compatible web browser
97
What is a key benefit of SaaS for small and medium-sized organizations? A. Higher upfront costs B. Long update delays C. On-site hardware maintenance D. Time, money, and resource savings
D) Time, money, and resource savings
98
How do SaaS customers typically pay for the service? A. Flat fee with no updates B. Annual in-person billing C. Subscription or pay-per-use based on usage metrics D. One-time hardware purchase
C. Subscription or pay-per-use based on usage metrics
99
Which of the following best describes SaaS scalability? A. Customers can add features and capacity as needed B. Cannot be modified after purchase C. Limited to five users only D. Requires a permanent license
A) Customers can add features and capacity as needed
100
What is a major benefit of SaaS updates? A. They require the customer to reinstall the software B. They must be done manually on every computer C. They are applied seamlessly by the provider D. They happen only once per year
C. They are applied seamlessly by the provider
101
True or False: Artificial intelligence allows machines to imitate human thought and behavior.
TRUE
102
True or False: Machine learning and artificial intelligence are the same thing and can be used interchangeably.
False — Machine learning is a subset of AI, focused on simulating learning and improving accuracy.
103
True or False: AI has the potential to enhance help lines by adapting to individual responses rather than following preprogrammed paths.
TRUE
104
True or False: AI systems cannot support users with physical disabilities.
False — AI can include optical and speech recognition, improving accessibility.
105
True or False: Virtualization in AI refers to using visual or audio representatives to communicate with users.
TRUE
106
True or False: AI in HR is only about replacing human jobs and eliminate ROLES.
False — AI can also augment human abilities and support existing roles.
107
What does artificial intelligence enable computers to do? A. Store passwords in plain text B. Imitate human thought and behavior C. Remove viruses automatically D. Monitor Wi-Fi signals
B. Imitate human thought and behavior
108
Which of the following best describes machine learning? A. A form of social engineering B. A subset of AI that helps machines learn and improve accuracy over time C. An advanced password management tool D. A replacement for virtualization
B. A subset of AI that helps machines learn and improve accuracy over time
109
How does AI improve accessibility for users with physical limitations? A. By limiting interface choices B. Through voice-only activation C. With optical and speech recognition features D. By disabling certain tools
C. With optical and speech recognition features
110
What is virtualization in the context of AI and HR? A. The conversion of HR files to PDFs B. The simulation of physical movement C.A way to print virtual paychecks D. The creation of visual or aural representatives to interact with users
D) - The creation of visual or aural representatives to interact with users
111
How can AI benefit the human workforce? A. By replacing all team members B. By slowing down workflow C. By augmenting human capabilities and assisting in roles D. By reducing computer usage
C. By augmenting human capabilities and assisting in roles
112
Which of the following describes the role of self-learning AI machines? A. They only follow strict preprogrammed commands B. They delete user input C. They adapt based on feedback and create their own models D. They manage email campaigns
C. They adapt based on feedback and create their own models
113
True or False: Employee self-service (ESS) technologies allow employees to manage their own HR data and complete job-related transactions.
TRUE
114
True or False: ESS systems require HR or IT to be available at all times to process transactions.
False — ESS allows employees to perform tasks independently, often 24/7.
115
True or False: ESS portals can be customized and connected to external vendors like retirement plan providers.
TRUE
116
True or False: Manager self-service (MSS) tools give managers access to real-time employee and budget data.
TRUE
117
True or False: Using MSS portals can eliminate email chains and manual approvals by allowing direct action.
TRUE
118
True or False: Self-service technologies have no impact on HR staffing levels or cost efficiency.
False — They reduce HR head count and increase cost efficiency.
119
True or False: MSS systems can improve internal client relationships and help position HR as a strategic partner.
TRUE
120
What is a benefit of employee self-service (ESS) systems for employees? A. Increased physical paperwork B. Limited access to their data C. Greater convenience and visibility into personal and organizational information D. Mandatory in-person meetings with HR
C. Greater convenience and visibility into personal and
121
How do organizations benefit from ESS portals? A. Increased need for HR staff B. Delayed communications C. Reduced security D. Cost savings and improved efficiency
D) Cost savings and improved efficiency
122
Which of the following tasks can be handled by ESS systems? A. Filing tax returns B. Scheduling employee training C. Updating personal information and logging time D. Conducting company audits
C. Updating personal information and logging timE
123
What can managers do with MSS portals? A. Purchase office supplies B. Authorize pay raises and approve leave requests C. Design marketing campaigns D. Assign parking spots
B. Authorize pay raises and approve leave requests
124
Why is MSS beneficial for data security? A. It allows managers to export spreadsheets freely B. It eliminates the need for passwords C. Data stays within secure systems instead of being shared by email D. It encrypts data using manager-written code
C. Data stays within secure systems instead of being shared by email
125
What is one effect of MSS on manager-HR relationships? A. Managers rely more heavily on HR for routine tasks B. HR is seen more as a strategic partner than a transactional service C. Managers avoid using HR systems entirely D. Communication between HR and managers decreases significantly
B. HR is seen more as a strategic partner than a transactional service
126
True or False: The process for purchasing HR technology should be the same regardless of the technology’s complexity or size.
False — The process should be customized based on the situation and scope.
127
True or False: HR should understand and follow the organization's procurement process when acquiring technology.
TRUE
128
True or False: HR should ignore IT requirements during the technology purchasing process.
False — HR must work with IT to ensure requirements are met.
129
True or False: Evaluating the readiness of users to accept new technology is an important part of the purchasing process.
TRUE
130
True or False: A systematic approach to purchasing technology helps reduce mistakes and waste.
TRUE
131
True or False: Developing a business case is not necessary for purchasing simple HR tools.
False — A business case should be developed regardless of complexity.
132
Which of the following factors should influence the HR technology purchasing process? A. The number of open job positions B. The complexity and scope of the product C. The location of HR offices D. The total number of managers in the company
B. The complexity and scope of the product
133
Why should HR collaborate with IT during the technology acquisition process? A. To allow IT to fully control the decision B. To avoid using company funds C. To understand technical requirements and system compatibility D. To reduce employee communication
C. To understand technical requirements and system compatibility
134
What is one benefit of using a systematic approach to acquiring HR technology? A. It slows down decision-making B. It prevents employees from accessing the system C. It minimizes mistakes and waste D. It eliminates the need for vendor support
C. It minimizes mistakes and waste
135
What is the purpose of evaluating a new HR technology after implementation? A. To restart the procurement process B. To assess whether it meets the original criteria and needs C. To reduce access to users D. To delete unnecessary files
B. To assess whether it meets the original criteria and needs
136
What should HR consider before purchasing new technology? A. Whether employees will use paper forms instead B. If vendors offer extended vacations C. The readiness of users to accept the change D. The color theme of the application
C. The readiness of users to accept the change
137
True or False: The IT function is a valuable partner during the HR technology acquisition process.
TRUE
138
True or False: IT’s only role is to install software after HR has made the purchase decision.
False — IT should be involved early and contributes to research, security, and support.
139
True or False: IT can help HR understand how new technology will affect the organization’s overall information system.
TRUE
140
True or False: Involving IT early in the process can improve efficiency and lead to better technology choices.
TRUE
141
True or False: HR technology choices never impact IT operations like server load or system security.
False — New technology can affect IT operations, including security and server performance.
142
True or False: IT support is only needed during the final stage of technology implementation.
False — IT provides support before, during, and after implementation.
143
Why should HR involve IT early in the technology acquisition process? A. To reduce the amount of training required B. To avoid involving finance C. To improve the process and ensure system compatibility D. To eliminate the need for business cases
C. To improve the process and ensure system compatibility
144
Which of the following is a concern IT might have with new HR technology? A. If the technology will overburden servers or create security risks B. Whether the product uses two-factor authentication C. How much vacation time employees will get D. How many employees will be promoted
A) If the technology will overburden servers or create security risks
145
What is one reason IT is considered a key partner in technology purchases? A. IT writes employee reviews B. IT owns the HR budget C. IT understands current systems and product compatibility D. IT manages benefits enrollment
C. IT understands current systems and product compatibility
146
What role does IT play after HR technology is selected? A. Conducting legal compliance audits B. Providing ongoing technical support and maintenance C. Monitoring employee lunch breaks D. Running recruitment interviews
B. Providing ongoing technical support and maintenance
147
How does involving IT benefit HR during the technology selection process? A. It allows HR to skip product testing B. It improves vendor negotiation C. It ensures smoother implementation and better-quality technology decisions D. It reduces employee engagement
C. It ensures smoother implementation and better-quality technology decisions
148
True or False: The first step in selecting HR technology is to assess what solutions are available on the market.
False — The first step is to define internal needs, not start with what's available.
149
True or False: Technology should be chosen based on HR’s goals and problems it helps solve—not just because it exists.
TRUE
150
True or False: An acquisition team should include stakeholders like HR staff, IT, users, and compliance experts.
TRUE
151
True or False: Assessing user needs involves considering access limitations like literacy or fear of technology.
TRUE
152
True or False: A proper needs assessment ignores organizational strategy and risk tolerance.
False — The assessment should consider strategic alignment and risk appetite.
153
True or False: Involving stakeholders early in the assessment process improves decision-making.
TRUE
154
What is the first step in selecting new HR technology? A. Browsing vendor catalogs B. Conducting a user survey C. Performing an internal needs assessment D. Asking IT for recommendations
C. Performing an internal needs assessment
155
Why is it important to involve stakeholders in the needs assessment process? A. To assign blame if it fails B. To ensure they take the training C. To reduce product features D. To support informed, effective decisions
D) To support informed, effective decisions
156
Which of the following is a question HR should ask when assessing organizational needs? A. How much do users like their current software? B. What colors should the interface be? C. How does the technology align with current and future strategy? D. Who will train the legal team?
C. How does the technology align with current and future strategy?
157
Which of the following could restrict users' ability to use the technology? A. High employee turnover B. Availability of cloud backups C. Literacy, hearing, and comfort with technology D. Interest in social media
C. Literacy, hearing, and comfort with technology
158
What should HR avoid when selecting technology? A. Checking for user needs B. Choosing solutions based solely on market availability C. Involving IT and compliance early D. Creating a business case
B. Choosing solutions based solely on market availability
159
Which of the following should be considered during the compliance portion of the assessment? A. Screen size preferences B. IT department's brand loyalty C. Legal or regulatory issues the technology might affect D. Manager vacation schedules
C. Legal or regulatory issues the technology might affect
160
True or False: Owning hardware and software provides more control but less flexibility.
TRUE
161
True or False: SaaS solutions offer increased control but limit an organization’s ability to adapt quickly.
False — SaaS offers greater flexibility, not more control.
162
True or False: Organizations with high operational risk may prefer owning technology to ensure control and security.
TRUE
163
True or False: The needs assessment helps prioritize which tech features are most important when evaluating solutions.
TRUE
164
True or False: Customization and compatibility are not important when considering SaaS solutions.
False — SaaS must often be customized and integrated with other platforms.
165
True or False: Choosing cloud-based software hosted off-premises usually offers more flexibility than on-premises
TRUE
166
Which of the following is a tradeoff of owning hardware and software? A. Lower control, higher flexibility B. Higher cost, lower compatibility C. More control, less flexibility D. Less security, more features
C. More control, less flexibility
167
Why might an organization choose a SaaS solution? A. To avoid the internet B. Because it provides maximum hardware control C. For greater agility and lower upfront costs D. Because it requires proprietary licensing
C. For greater agility and lower upfront costs
168
What is a key consideration when choosing a SaaS product? A. Whether it’s included in Microsoft Office B. If it has a customizable interface and integrates with current systems C. If it comes in physical packaging D. Whether it reduces employee salaries
B. If it has a customizable interface and integrates with current systems
169
According to Exhibit 3-40, where does the organization have the least direct control? A. On-premises hardware B. Public cloud C. Proprietary software D. Internal database
B. Public cloud
170
Which of the following is a benefit of subscribing to software via the cloud? A. Full control over software code B. Elimination of all compatibility concerns C. Faster updates and improved flexibility D. Permanent ownership of the platform
C. Faster updates and improved flexibility
171
True or False: Integrated HR systems offer a consistent user interface across all applications.
TRUE
172
True or False: Best-of-breed systems provide the most robust integration and lowest vendor management complexity.
False — Integrated solutions offer easier integration and simpler vendor management.
173
True or False: Customization is often limited and expensive in integrated systems.
TRUE
174
True or False: BOB systems allow organizations to select the best tool for each HR function.
TRUE
175
True or False: Interoperability is the ability of different systems or applications to work together effectively.
TRUE
176
True or False: Upgrading an integrated system can be complex because changes in one area may impact others.
TRUE
177
True or False: With BOB systems, the lack of a consistent user interface can lead to increased training time.
TRUE
178
True or False: Before implementing a BOB system, HR should ignore ERP compatibility and integration requirements.
False — ERP compatibility and integration should be thoroughly discussed with IT.
179
What is one major advantage of an integrated HR solution? A. Greater customization across all modules B. Faster updates from multiple vendors C. Easier data integration and consistent user interface D. Ability to use offline paper backups
C. Easier data integration and consistent user interface
180
Which of the following is a disadvantage of an integrated solution? A. High vendor diversity B. Excessive customization options C. Limited customization and upgrade complexity D. Lack of centralized data
C. Limited customization and upgrade complexity
181
What is a key benefit of best-of-breed solutions? A. Lower training time due to consistent interface B. Better solutions tailored to specific HR functions C. Reduced need for IT support D. Complete control over ERP systems
B. Better solutions tailored to specific HR functions
182
Which challenge is most associated with best-of-breed systems? A. Unified interface B. Simpler vendor communication C. Interoperability and data integration D. One-time installation
C. Interoperability and data integration
183
Why should HR consult IT before implementing a BOB solution? A. To reduce HR responsibilities B. To determine marketing plans C. To avoid procurement documentation D. To ensure compatibility with ERP and plan integration
D) To ensure compatibility with ERP and plan integration
184
Which of the following describes interoperability? A. Data that remains in spreadsheets B. Systems that operate independently C. The ability of different systems to exchange and use information D. A backup system in case of failure
C. The ability of different systems to exchange and use information
185
True or False: On-premises solutions require the organization to purchase and install hardware and software internally.
TRUE
186
True or False: In a hosted solution, the organization accesses software through the public cloud without purchasing or installing it.
False — That describes SaaS, not hosted.
187
True or False: SaaS is a subscription-based model where software runs on the vendor’s hardware and is accessed through the cloud.
TRUE
188
True or False: With the hosted model, software is installed for the organization but located and supported by the vendor.
TRUE
189
True or False: Organizations using on-premises solutions should ensure that their internal IT team can support the system.
TRUE
190
True or False: SaaS requires local installation and frequent manual updates.
False — SaaS requires no local installation, and updates are typically automatic.
191
Which technology delivery method requires internal hardware and software installation? A. SaaS B. Hosted C. On-premises D. Cloud-native
C. On-premises
192
In the hosted model, where is the software located and who supports it? A. On a public server, supported by HR B. At the vendor's site, supported by external IT C. On the organization's servers, supported by HR D. In a mobile app, supported by the user
B. At the vendor's site, supported by external IT
193
What distinguishes SaaS from hosted and on-premises models? A. It must be installed on a local server B. It is installed by the organization and supported by internal IT C. It requires a licensing agreement and annual renewal D. It runs on the vendor’s hardware and is accessed via the cloud as a subscription
D. It runs on the vendor’s hardware and is accessed via the cloud as a subscription
194
Which technology delivery method typically involves the least internal IT burden? A. On-premises B. Hosted C. SaaS D. Manual system
C. SaaS
195
Why is it important to consult IT when considering on-premises delivery? A. To identify software branding B. To confirm IT's ability to support and maintain the system C. To approve travel expenses D. To rename the platform
B. To confirm IT's ability to support and maintain the system
196
True or False: Performance objectives help measure whether a technology acquisition meets expectations.
TRUE
197
True or False: The targeted budget and launch date are examples of performance objectives.
TRUE
198
True or False: Navigation parameters refer to how quickly a vendor responds to tech support requests.
False — Navigation parameters refer to ease of use, like the number of clicks to reach information.
199
True or False: Performance objectives are final and should not be revised once the process starts.
False — Objectives may be revised based on findings during the selection process.
200
True or False: Determining the responsibilities of HR, the vendor, and the organization is part of defining performance objectives.
TRUE
201
True or False: Performance objectives should include technical capacity, such as how much traffic the system can handle.
TRUE
202
Which of the following is an example of a performance objective? A. The vendor's office location B. The number of training sessions per month C. The targeted launch date for the technology D. The vendor’s stock performance
C. The targeted launch date for the technology
203
What does "navigation parameters" refer to in a performance objective? A. The number of clicks to access desired information B. The cost of IT labor C. The number of users licensed to access the system D. The number of training modules
A) - The number of clicks to access desired information
204
Which of the following should be included when defining performance objectives? A. Office decor options for HR B. Daily snack preferences of the IT team C. Responsibilities of HR, the organization, and the vendor D. Length of vacation time for users
C. Responsibilities of HR, the organization, and the vendor
205
Why might performance objectives be revised during the selection process? A. To improve employee morale B. Because initial objectives are always wrong C. To meet unrelated departmental goals D. Because new information may change priorities or feasibility
D) Because new information may change priorities or feasibility
206
Which of the following capabilities might be defined in a performance objective? A. The system's branding color B. The number of vacation days per employee C. Integration with other systems and speed of transactions D. Preferred lunch vendors
C. Integration with other systems and speed of transactions
207
True or False: Reviewing analyst reports like those from Gartner can help HR assess potential technology providers.
TRUE
208
True or False: HR should only consider vendors recommended by internal IT staff.
False — HR should use multiple research methods, including peer recommendations, trade shows, and analyst reports.
209
True or False: HR should have open and honest conversations with vendors about requirements and limitations.
TRUE
210
True or False: Performance criteria must remain fixed throughout the selection process
False — Performance criteria may change, as long as they still align with organizational needs.
211
True or False: New features should only be added to the requirements list if they meet a real business need.
TRUE
212
True or False: Technology trade shows can provide presentations and direct access to vendor
TRUE
213
Which of the following is a valid method for identifying potential HR technology providers? A. Reviewing vacation policy trends B. Searching the Internet and reading vendor websites C. Conducting internal HR surveys D. Reading employee handbooks
B. Searching the Internet and reading vendor websites
214
Why is it important to speak openly with vendors about your organization’s needs? A. To keep them from raising prices B. So they can recommend compatible, effective products C. To ensure they don’t market to competitors D. To learn about their hiring practices
B. So they can recommend compatible, effective products
215
What might prompt a change in performance criteria during vendor evaluation? A. New trends in office design B. A desire to spend more money C. A better understanding of organizational needs D. An increase in vacation days
C. A better understanding of organizational needs
216
Which of the following is NOT a recommended way to find technology providers? A. Ask HR colleagues in other organizations B. Contact reliable existing vendors C. Attend HR tech trade shows D. Rely solely on employee suggestions
D. Rely solely on employee suggestions
217
Why should new features only be added to the requirements list when necessary? A. To impress senior leadership B. To avoid overcomplicating the product and adding unnecessary costs C. To make the system more difficult to use D. To allow unlimited vendor options
B. To avoid overcomplicating the product and adding unnecessary costs
218
True or False: A request for proposal (RFP) helps providers understand HR’s specific technology requirements.
TRUE
219
True or False: Product cost should be the only factor considered when selecting a technology provider.
False — Support, features, and alignment with goals are also critical.
220
True or False: Providers should demonstrate how their product will work specifically for HR use cases.
TRUE
221
True or False: The provider’s willingness to offer implementation support is an important selection criterion.
TRUE
222
True or False: A business case is only needed if the product is under budget.
False — A business case is especially important for significant investments.
223
True or False: Management is most interested in how a tech purchase aligns with strategy and offers return on investment (ROI).
TRUE
224
What is the purpose of issuing a request for proposal (RFP) to vendors? A. To gather internal HR feedback B. To evaluate legal risk C. To describe HR’s needs and request tailored vendor solutions D. To assess employee performance
C. To describe HR’s needs and request tailored vendor solutions
225
When evaluating technology providers, what should be considered besides cost? A. The vendor’s office location B. The number of sales staff C. Product features and implementation support D. How many products the vendor has sold
C. Product features and implementation support
226
Why is it important for providers to demonstrate their products using HR-specific examples? A. To prove their pricing model B. To illustrate how the product meets HR’s specific operational needs C. To promote their stock performance D. To explain industry trends
B. To illustrate how the product meets HR’s specific operational needs
227
What must a business case include to secure leadership approval? A. Product packaging details B. Recruitment history C. Strategic alignment, ROI, added capabilities, and risk impact D. Competitor pricing
C. Strategic alignment, ROI, added capabilities, and risk impact
228
How are providers typically evaluated in the selection process? A. Based on appearance B. Through random selection C. By scoring weighted criteria D. By employee vote
C. By scoring weighted criteria
229
True or False: Testing new technology in a small part of the organization can help identify issues before a full rollout.
TRUE
230
True or False: Gathering feedback after implementation is optional and typically not useful.
True or False: Gathering feedback after implementation is optional and typically not useful.
231
True or False: HR professionals should use change management skills to help users adopt new technology.
TRUE
232
True or False: Assessment should only occur at the time of implementation and not afterward.
False — Assessment should be ongoing, including long-term system performance and value.
233
True or False: Stakeholder surveys and vendor performance reviews are part of the post-implementation assessment.
TRUE
234
True or False: The projected life span and operating costs of a system should be included in the technology assessment.
TRUE
235
What is one benefit of testing new technology in one area before full implementation? A. Avoiding the need for vendor contracts B. Building a group of influencers and detecting problems early C. Ensuring the system is never updated D. Lowering the total number of users
B. Building a group of influencers and detecting problems early
236
Which of the following helps reduce initial resistance to new technology? A. Limiting access to the system B. Showing benefits and providing training and support C. Delaying implementation indefinitely D. Outsourcing all training responsibilities
B. Showing benefits and providing training and suppor
237
Why should HR assess technology after implementation? A. To determine if users prefer the old system B. To cancel the contract quickly C. To compare outcomes to original performance criteria D. To limit system upgrades
C. To compare outcomes to original performance criteria
238
What should be included in post-implementation evaluations? A. Total number of PowerPoint presentations B. Cost of maintenance, life span, and vendor performance C. Number of social events related to the launch D. Color scheme of the new software
B. Cost of maintenance, life span, and vendor performance
239
How can HR ensure technology continues to meet organizational needs over time? A. Ignore feedback B. Schedule vendor reviews annually C. Retire systems on appropriate timelines and reassess technical capabilities D. Disable user customization
C. Retire systems on appropriate timelines and reassess technical capabilities
240
Which of the following is a data and system security risk? A. Employees misunderstanding job roles B. Unauthorized access to sensitive data C. Delayed product shipping D. Employee complaints about vacation policies
B. Unauthorized access to sensitive data
241
Which area of technology risk focuses on compliance with laws for storing and using employee data? A. Social ethics B. Cyberbullying C. Data privacy D. Marketing automation
C. Data privacy
242
What is a social or ethical risk of using data technology in the workplace? A. Decreased use of mobile devices B. Increased utility bills C. Inequitable treatment based on collected data D. Longer lunch breaks
C. Inequitable treatment based on collected data
243
Why must data privacy policies be transparent? A. To increase app usage B. To comply with government regulations and build trust C. To reduce software licensing fees D. To improve social media engagement
B. To comply with government regulations and build trust
244
Which of the following best summarizes the three broad categories of technology risk? A. Cost, compatibility, and complexity B. Security, privacy, and ethical impact C. Appearance, navigation, and usability D. Advertising, data sharing, and cloud storage
B. Security, privacy, and ethical impact
245
True or False: Security is a top priority for any Human Resource Information System (HRIS).
TRUE
246
True or False: Only external sources pose threats to data security in HR systems
False — Threats can come from internal or external sources.
247
True or False: Encryption protects data by converting it into a format that hides its meaning.
TRUE
248
True or False: A firewall is a physical device only, used to prevent water damage to servers.
False — A firewall can be hardware or software, used to filter data traffic.
249
True or False: Hacking includes actions like data theft, ransomware, and denial-of-service attacks.
TRUE
250
True or False: An “https” website indicates a secure site using encryption.
TRUE
251
True or False: Training employees on password safety and locking screens can help prevent data breaches.
TRUE
252
What is the purpose of a firewall in data security? A. To cool down overheated systems B. To allow social media access at work C. To filter data traffic based on security rules D. To back up payroll systems
C. To filter data traffic based on security rules
253
Which of the following is an example of a data security breach? A. Employee promotion B. Unsecured access to payroll by unauthorized staff C. Scheduled system maintenance D. Adding employees to a training program
B. Unsecured access to payroll by unauthorized staff
254
What is encryption used for? A. Improving Wi-Fi signal strength B. Converting data to protect its content during storage or transmission C. Organizing files alphabetically D. Creating system backups
B. Converting data to protect its content during storage or transmission
255
What should HR managers discuss with IT regarding encryption? A. Website branding B. Password hints for users C. Data protection for stored and transmitted information D. Performance appraisal systems
C. Data protection for stored and transmitted information
256
Which of the following is NOT a general protection method for data security? A. Encrypting transmitted data B. Limiting logical and physical access C. Regularly updating employee birthdays D. Protecting against hacking and social engineering
C. Regularly updating employee birthdays
257
What is a denial-of-service (DoS) attack? A. Flooding a system with service requests to disable it B. A form of social engineering C.A way to back up data D. Encrypting email attachments
A)- Flooding a system with service requests to disable it
258
True or False: Outdated firewalls can be a point of vulnerability in an organization’s system.
TRUE
259
True or False: Social engineering refers to the use of malware to bypass system authentication protocols.
False — Social engineering tricks users into revealing sensitive information.
260
True or False: Phishing attacks often appear to come from trusted source
TRUE
261
True or False: “Click this link” scams may lead users to malicious websites or download harmful software.
TRUE
262
True or False: Surveillance software cannot capture usernames or passwords.
False — It can capture sensitive credentials like passwords.
263
True or False: Fake security alerts are a type of social engineering tactic.
TRUE
264
What is social engineering in a cybersecurity context? A. A method for building workplace morale B. A strategy for restructuring organizations C. A tactic to trick users into sharing confidential information D. A technique for encrypting sensitive files
C. A tactic to trick users into sharing confidential information
265
What is spear phishing? A. A random attempt to crash a server B. A phishing attack that uses personalized information to seem legitimate C. A tool to filter e-mails D. A technique to reset user passwords
B. A phishing attack that uses personalized information to seem legitimate
266
Which of the following is a sign of a phishing attempt? A. An email from IT asking you to complete annual training B. An email from an unknown sender requesting login credentials C. An internal newsletter from HR D. A calendar reminder for a meeting
B. An email from an unknown sender requesting login credentials
267
What could happen if a user clicks a fake link in a “click this link” scam? A. They receive a company award B. Their computer performs faster C. Their device could be infected with malware D. They gain access to secure files
C. Their device could be infected with malware
268
Which tactic involves sending a fake greeting card or job opportunity that actually contains malware? A. Phony password reset B. Spear phishing C. Fake e-cards or job offers D. Whaling
C. Fake e-cards or job offers
269
True or False: User education is a key defense against cybersecurity threats like phishing.
TRUE
270
True or False: If an e-mail looks like it’s from your CEO, it’s safe to assume it’s legitimate without verifying.
False — Always assess and verify unusual requests, even from trusted names.
271
True or False: Some cybersecurity training programs include simulated phishing emails followed by feedback.
TRUE
272
True or False: Clicking on links from unknown sources is safe as long as your antivirus software is updated.
False — You should never click unknown links unless independently verified.
273
True or False: You should never give out your password, even to someone who appears legitimate.
TRUE
274
True or False: Reporting suspected phishing emails correctly should be positively reinforced in training.
TRUE
275
Which of the following is a best practice for cybersecurity awareness? A. Forward suspicious emails to coworkers for feedback B. Give out passwords to managers upon request C. Verify strange requests even if they appear to come from someone you trust D. Use the same password across multiple platforms
C. Verify strange requests even if they appear to come from someone you trust
276
What is one benefit of simulated phishing email training? A. It teaches users how to send phishing emails B. It encourages users to create stronger passwords C. It provides immediate feedback to reinforce good habits D. It updates your computer’s antivirus software
C. It provides immediate feedback to reinforce good habits
277
Which action is NOT recommended in response to an unsolicited email? A. Deleting it without clicking anything B. Opening and replying to ask who they are C. Avoiding clicking on attachments or links D. Reporting it to IT or a security contact
B. Opening and replying to ask who they are
278
Why is it important to independently verify unexpected email requests? A. To improve inbox organization B. To avoid embarrassing your supervisor C. To prevent falling for spoofed or phishing messages D. To earn cybersecurity certifications
C. To prevent falling for spoofed or phishing messages
279
What should a user do if they receive a phishing email? A. Respond and ask for clarification B. Click the link to test it C. Report it and delete the message D. Forward it to friends as a warning
C. Report it and delete the message
280
True or False: The General Data Protection Regulation (GDPR) applies only to companies headquartered in the EU.
False — It applies to any organization processing data in the EU, regardless of where they’re headquartered.
281
True or False: Noncompliance with GDPR can result in fines of up to 4% of annual revenue or 20 million euros.
TRUE
282
True or False: HR should conduct compliance audits of all processes that use employee or applicant data
TRUE
283
True or False: Under GDPR, using employee consent as the sole legal basis for processing data is acceptable.
False — Data processing must be based on legal grounds, not just employee consent.
284
True or False: HR must be able to respond to employee data access or correction requests in a timely manner.
TRUE
285
True or False: Data breach policies under GDPR require incidents to be reported within 72 hours.
TRUE
286
True or False: Privacy notices should explain how data will be used and request explicit consent.
TRUE
287
Which regulation is considered a global benchmark for data privacy practices? A. HIPAA B. Sarbanes-Oxley C. GDPR D. FMLA
C. GDPR
288
What is one of the most important actions HR can take to ensure GDPR compliance? A. Increase password lengths B. Conduct data compliance audits of employee data processes C. Install more printers in the HR department D. Delete all employee data over 5 years old
B. Conduct data compliance audits of employee data processes
289
Which of the following must be included in data sharing practices under GDPR? A. Free access to personal social media B. Handwritten consent for emails C. Data sharing agreements with vendors and internal departments D. Public employee data lists
C. Data sharing agreements with vendors and internal departments
290
How should HR handle data retention under GDPR? A. Retain all data indefinitely for future use B. Minimize and formalize retention limits for internal and vendor-held data C. Rely on paper files only D. Keep no records at all
B. Minimize and formalize retention limits for internal and vendor-held data
291
What GDPR requirement applies to data breaches? A. Breaches must be reported only if financial data is lost B. All breaches must be reported within 30 days C. No reporting is necessary for internal mistakes D. Breaches must be reported within 72 hours
D) Breaches must be reported within 72 hours
292
Which of the following supports GDPR accountability in HR? A. Giving unlimited data access to HR vendors B. Delegating data responsibility to line managers C. Implementing audits, governance structures, and training D. Storing all data on spreadsheets
C. Implementing audits, governance structures, and training
293
True or False: Recruiting solely through online platforms may disadvantage applicants without reliable Internet access.
TRUE
294
True or False: AI in HR applications is always fair and unbiased because it uses math and algorithms.
False — Algorithms can contain bias, whether intentional or unintentional.
295
True or False: Self-service portals may create inequity for remote workers with slow Internet connections.
TRUE
296
True or False: Social media searches always provide complete and accurate information for evaluating job applicants.
False — Social media data may be incomplete, biased, or inaccurate.
297
True or False: Historical employee data could lead to discrimination if not used ethically.
TRUE
298
True or False: Applicants should be given the opportunity to explain or respond to information found on social media.
TRUE
299
What is one concern with relying only on Internet-based recruiting strategies? A. Disadvantage to those with housing or Internet access challenges B. Unfair advantage for rural applicants C. Too many job applications D. Reduced job descriptions
A) Disadvantage to those with housing or Internet access challenges
300
Why can algorithms used in HR decision-making still be biased? A. They are written in complex coding languages B. They rely on outdated hardware C. They may be based on incomplete or biased data D. They only use public information
C. They may be based on incomplete or biased data
301
Which of the following is a potential ethical concern with AI in HR? A. Better formatting of résumés B. Different job opportunities shown based on background or age C. Automation of time tracking D. Faster Internet speeds
B. Different job opportunities shown based on background or age
302
What is a possible downside of using social media in hiring decisions? A. It’s too expensive B. It violates copyright laws C. The information may be misleading or interpreted unfairly D. Candidates may use emojis inappropriately
C. The information may be misleading or interpreted unfairly
303
Which group may be disadvantaged by inaccessible digital content? A. Applicants with resumes over two pages B. Employees who prefer in-person meetings C. Individuals with hearing or vision difficulties D. Contractors working part-time
C. Individuals with hearing or vision difficulties
304
True or False: Many organizations delay creating specific policies for new workplace technologies, assuming older policies still apply.
TRUE
305
True or False: Delaying the creation of technology policies can expose organizations to legal and security r
TRUE
306
True or False: Meeting hosts should not have control over the technological tools being used during collaboration.
False — The host should have full control to manage collaboration effectively.
307
True or False: Including passcodes for virtual meetings is a best practice for limiting access to only invited participants.
TRUE
308
True or False: Balancing security and accessibility is key to creating effective technology collaboration policies.
TRUE
309
True or False: All collaboration tools must be used separately to avoid security risks.
False — Overlapping tools can increase accessibility and efficiency.
310
Why is it risky for organizations to delay creating workplace technology policies? A. It leads to employee turnover B. It causes Wi-Fi issues C. It exposes the organization to legal and security risks D. It slows down internal promotions
C. It exposes the organization to legal and security risks
311
Which of the following is a recommended practice for managing collaboration risks? A. Allowing open access to all documents B. Scheduling meetings without agendas C. Limiting virtual meetings to 10 minutes D. Using passcodes and assigning access levels to documents
D) Using passcodes and assigning access levels to documents
312
What is the purpose of recording virtual meetings and discussions? A. To reduce employee training costs B. To analyze participant behavior C. To allow stakeholders who couldn’t attend to access outcomes D. To promote passive engagement
C. To allow stakeholders who couldn’t attend to access outcomes
313
What type of network is often used to securely allow remote access to company systems? A. Bluetooth B. VPN (Virtual Private Network) C. LAN cable D. USB tethering
B. VPN (Virtual Private Network
314
Why should legal disclaimers be included in collaborative documents? A. To make the document look official B. To promote marketing efforts C. To define participant rights and responsibilities D. To comply with branding guidelines
C. To define participant rights and responsibilities
315
True or False: A well-crafted BYOD policy can help balance employee convenience and organizational security.
TRUE
316
True or False: Organizations are encouraged to ignore BYOD activity because most employees follow device policies strictly.
False — Many experts believe that realistic policies are necessary, as BYOD often happens regardless of bans.
317
True or False: BYOD increases productivity but also raises security and legal concerns.
TRUE
318
True or False: A BYOD policy should outline acceptable and prohibited uses of personal devices.
TRUE
319
True or False: Organizations must reimburse all personal device expenses by law under any BYOD policy.
False — Financial arrangements should be clarified, but reimbursement is not always required.
320
True or False: HR should coordinate with legal counsel to ensure BYOD policies comply with relevant laws.
TRUE
321
Why have some organizations resisted BYOD policies? A. Security threats and drain on IT support B. They reduce IT workloads C. They encourage better employee attendance D. BYOD devices have longer battery life
A) Security threats and drain on IT support
322
Which of the following should be included in a BYOD policy? A. Employee birthdates and IT staff names B. Passwords for all personal accounts C. Approved devices, IT support levels, and security requirements D. Weekly performance reviews
C. Approved devices, IT support levels, and security requirements
323
What legal concern may arise from BYOD use? A. Employees may accidentally order supplies B. Employers may have to compensate for off-hours work or protect proprietary data C. Workers may buy new devices too frequently D. Employees may request longer breaks
B. Employers may have to compensate for off-hours work or protect proprietary data
324
What should HR do when an employee with BYOD access exits the organization? A. Issue a new personal device B. Retrieve all text messages sent C. Remove network access from the employee’s personal devices D. Reimburse their last phone bill
C. Remove network access from the employee’s personal devices
325
Which of the following is a security measure commonly found in BYOD policies? A. Requiring social media activity tracking B. Allowing access to the VPN without approval C. Prohibiting unapproved downloads and requiring password protection D. Giving employees shared access to all servers
C. Prohibiting unapproved downloads and requiring password protection
326
True or False: Social networks can be valuable for employee engagement, collaboration, and brand building.
TRUE
327
True or False: Organizations should avoid having a formal social network policy to promote openness.
False — A clear and well-communicated policy is essential to balance openness and protection.
328
True or False: Social media use may expose organizations to legal risks if confidential or proprietary information is disclosed.
TRUE
329
True or False: Monitoring employee social media use without prior notice is legally risk-free.
False — Employees must be notified in advance to reduce legal challenges related to privacy expectations.
330
True or False: A social media content reviewer can help enforce company policy and route valuable feedback internally.
TRUE
331
True or False: Employees have a legal right to absolute privacy when using company-provided devices.
False — Privacy is limited, especially when the organization provides advance notice of monitoring.
332
Which of the following is a valid business use of social networks in HR? A. Sharing confidential salaries B. Broadcasting employee write-ups C. Promoting employee terminations D. Advertising job opportunities and building employer brand
D) Advertising job opportunities and building employer brand
333
Why should organizations develop social network use policies? A. To limit employee productivity B. To punish employee behavior C. To balance employee rights with organizational security and compliance D. To eliminate remote work options
C. To balance employee rights with organizational security and compliance
334
What should a social network policy prohibit? A. Use of emojis in company emails B. Sharing or disclosing confidential, proprietary, or intellectual property information C. Liking coworkers’ posts D. Posting team-building activities
B. Sharing or disclosing confidential, proprietary, or intellectual property information
335
Which step helps reduce employees’ legal expectation of communication privacy? A. Allowing unrestricted use of company Wi-Fi B. Providing private laptops C. Notifying employees in writing that communications may be monitored D. Encrypting email messages
C. Notifying employees in writing that communications may be monitored
336
What should organizations do to enforce social media policies fairly? A. Enforce only for new hires B. Apply policies inconsistently to management and staff C. Require signed acknowledgments and update policies regularly D. Let employees monitor each other
C. Require signed acknowledgments and update policies regularly
337
Which role is responsible for monitoring and filtering social media content within an organization? A. Chief Marketing Officer B. Legal Counsel C. Social Media Content Reviewer D. Performance Manager
C. Social Media Content Reviewer
338
Artificial intelligence (AI)
Ability of a computer to imitate human thought and behavior.
339
Encryption
Conversion of data into a format that protects or hides its natural presentation or intended meaning.
340
Social engineering
In a computer context, tricking a user into sharing information that can then be used to access systems.
341
Hacking
Act of deliberately accessing computer data without permission.
342
Software as a service (SaaS)
Software that is owned, delivered, and managed remotely and delivered over the Internet to contracted customers on a pay-for-use basis or as a subscription based on use metrics.
343
Social networks
Online clustering of individuals in groups with common or shared interests.
344
Human resource information system (HRIS)
Information technology framework and tools for gathering, storing, maintaining, retrieving, revising, and reporting HR data.
345
Information system (IS)
Way to collect, organize, store, analyze, and share data.
346
Enterprise resource planning (ERP)
Business management software, usually a suite of integrated applications, that a company can use to collect, store, manage, and interpret data from many business activities.
347