Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Free Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
According to Lin, Geng, and Whinston, depending on the completeness or incompleteness of the sender’s and the receiver’s information sets and there are four representative types of information structure in knowledge transfer, which of these does not belong to the four representative types of information structure?
Correct
Receiver-Advantage Asymmetric Information is also one of the four representative types of information structure in knowledge transfer.
Incorrect
Receiver-Advantage Asymmetric Information is also one of the four representative types of information structure in knowledge transfer.
-
Question 2 of 10
2. Question
A way to reduce problems stemming from paper workflow is to employ document-imaging systems, What is a Document Imaging System?
Correct
Document Imaging System helps in immediately retrieving and sharing data with others once the document has been stored electronically.
Incorrect
Document Imaging System helps in immediately retrieving and sharing data with others once the document has been stored electronically.
-
Question 3 of 10
3. Question
What is an Audit Expert System?
Correct
This audit expert system has its advantage and disadvantages according to some public accounting firms since it they have been quite active in developing such systems, but for some, these tools and technologies will have an impact of the survival as the firms strive to enhance their competitive position and to reduce their legal and business risk.
Incorrect
This audit expert system has its advantage and disadvantages according to some public accounting firms since it they have been quite active in developing such systems, but for some, these tools and technologies will have an impact of the survival as the firms strive to enhance their competitive position and to reduce their legal and business risk.
-
Question 4 of 10
4. Question
Which of the following is the correct definition of SPIKE?
Correct
SPIKE stands for (Surrey Police Information and Knowledge Environment) an information management system that enables real-time knowledge sharing and has become a catalyst for a quantum change.
Incorrect
SPIKE stands for (Surrey Police Information and Knowledge Environment) an information management system that enables real-time knowledge sharing and has become a catalyst for a quantum change.
-
Question 5 of 10
5. Question
What kind of technology played an important role in the management of information for a police department according to Chen et al.?
Correct
The use of database systems for crime-specific cases such as gang-related incidents, and
serious crimes such as homicide have been very effective and played an important role in the management of information for a police department.Incorrect
The use of database systems for crime-specific cases such as gang-related incidents, and
serious crimes such as homicide have been very effective and played an important role in the management of information for a police department. -
Question 6 of 10
6. Question
According to Chen et al, Use of expert systems includes an expert system for police investigators of economic crimes, Which of these AICAMS Stands for?
Correct
AICAMS stands for Artificial Intelligence Crime Analysis and Management System and is a collaboration between the Chinese University of Hong Kong and the Hong Kong Police Force that attempts to help in information retrieval by drawing upon human heuristics, or rules and procedures, to investigate tasks.
Incorrect
AICAMS stands for Artificial Intelligence Crime Analysis and Management System and is a collaboration between the Chinese University of Hong Kong and the Hong Kong Police Force that attempts to help in information retrieval by drawing upon human heuristics, or rules and procedures, to investigate tasks.
-
Question 7 of 10
7. Question
According to Ashby and Longley, there is another interesting example of information technology in police investigations, which of these best define Geodemographics?
Correct
Geodemographic is an interesting example of information technology that helps in profiles of the characteristics of individuals and small areas and helps in the efficiency and effectiveness deployment of resources by public services.
Incorrect
Geodemographic is an interesting example of information technology that helps in profiles of the characteristics of individuals and small areas and helps in the efficiency and effectiveness deployment of resources by public services.
-
Question 8 of 10
8. Question
According to Manning, there are five types of technology with salient features, which of the following best define Mobility technology?
Correct
Mobility technology this technology became popular with the recent emphases on satisfying citizen demand, presence, and availability.
Incorrect
Mobility technology this technology became popular with the recent emphases on satisfying citizen demand, presence, and availability.
-
Question 9 of 10
9. Question
Which of the following does AFIS stand for?
Correct
Comparing fingerprints via computer is only taking minutes because of the AFIS (Automated Fingerprint Identification System) vs. the visual comparison of fingerprint cards that in the past could take weeks if not months.
Incorrect
Comparing fingerprints via computer is only taking minutes because of the AFIS (Automated Fingerprint Identification System) vs. the visual comparison of fingerprint cards that in the past could take weeks if not months.
-
Question 10 of 10
10. Question
Which of the following best define Cybercrime?
Correct
The activity mentioned in the definition of cybercrime consists of traditional crimes like fraud, theft or extortion, or new types of criminal activity such as denial-of-service attacks, malware.
Incorrect
The activity mentioned in the definition of cybercrime consists of traditional crimes like fraud, theft or extortion, or new types of criminal activity such as denial-of-service attacks, malware.