An organization has just released a new. completely redesigned website. The website bounce rate has increased by 20 percent over the previous site's. The website manager suspects the issue results from confusion caused by the new website's structure, layout and/or visual cues. The best recommendation is to start investigating by doing
A. A/B testing.
B. Multivariate testing.
C. Usability testing,
D. Conversion testing.
Vital records are defined as records that are fundamental to the functioning of an organization and are necessary to continue operations during
A. Normal circumstances.
B. An external audit.
C. Extraordinary conditions.
D. Litigation.
Which of the following are examples of asynchronous collaboration? (Choose 2)
A. Online meetings
B. Shared workspaces
C. Wikis
D. Instant messaging (IM)
Characteristic elements of case management include (Choose 2)
A. Investigation.
B. Incident management.
C. Extraction.
D. Knowledge management.
Which of the following are elements of an effective email management strategy? (Choose 2)
A. Accommodation of some individual preferences for organization of information
B. A retention policy that ensures email messages are retained indefinitely
C. A policy that focuses on preserving the emails of employees with access to financial information
D. Automation of actions that would otherwise be required of users
Three organizations are collaborating on a project, using a distributed information architecture. Each organization has its own procedure for giving privileges to information, resulting in inconsistent access to information. The project manager asks the information manager to recommend a solution that gives team members consistent access to information. The information manager's recommendation is to
A. Develop a standard checklist for all administrators to use.
B. Route all access requests to one administrator.
C. Control user privileges based on the user's organization,
D. Control user privileges based on the user's role.
The difference between authentication and authorization when accessing information in a system is that
A. Authorization identifies the user and authentication identifies what the user can do.
B. A user name is used to authenticate a user and a password is used to authorize a user.
C. Authentication identifies the user and authorization identifies what the user can do.
D. Read permissions are based on a user's authorization and edit permissions are based on a user's authentication.
An organization wants to classify a large collection of images, videos, and presentations used by a large, distributed group. Which of the following techniques offers a low-cost, decentralized approach to classification?
A. Controlled vocabulary
B. Corporate taxonomy
C. Folksonomy
D. Enterprise wiki
An authoritative record has which of the following characteristics?
A. Authenticity,Integrity,Reliability,Usability
B. Auditability,Reliability, Accuracy,Usability
C. Trustworthiness,Consistency,Usability,Dependability
D. Integrity,Consistency, Usability, Accuracy
Which type of organizational search technique crawls directories, disparate repositories and websites, and extracts content to form a searchable index?
A. Enterprise
B. Boolean
C. Vertical
D. Faceted