1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
3 years ago
8

Which approach to knowledge management capitalizes on tacit knowledge and requires heavy IT investment?

Computers and Technology
1 answer:
eduard3 years ago
3 0

Answer:

The process approach

Explanation:

In knowledge management, <em>three approaches</em> exist. They are:

  1. The Process Approach
  2. The Practice Approach
  3. The best practices Approach.

  1. <em>The Process Approach</em>: In this approach technologies, processes, controls are formalized to systematize organizational knowledge. This implies that heavy IT investments (such as groupware, support tools, repositories, etc.) are made to optimize the speed and quality of knowledge creation and distribution within the organization.
  2. <em>The Practice Approach:</em> This approach considers organizational knowledge as tacit, which means that knowledge that is passed is difficult to document. The use of technology, processes, and controls does not apply to this approach, unlike the process approach. Knowledge moves through the organization through a person-to-person contact manner.
  3. <em>The Best Practices Approach:</em> This is a dynamic approach to adopt the best methods and activities necessary for meeting organizational goals.

The Process approach is the knowledge management approach that capitalizes on tacit knowledge and requires heavy IT investment.

You might be interested in
How has the internet improved business communication worldwide
emmasim [6.3K]

Answer:

One of the biggest changes for businesses is the communication technology enabled by the internet. The way people communicate with one another, share files, make purchases, and collaborate has completely shifted since the internet became widespread.

Explanation:

4 0
2 years ago
Mation about which osi layers of connected cisco devices can be verified with the show cdp neighbors comm
fgiga [73]
The show CDP neighbor command operates at the Data link layer (Layer 2)

Cisco Discovery Protocol (CDP) is a proprietary Data Link Layer protocol developed by Cisco Systems. It is used to share information about other directly connected Cisco equipment, such as the operating system version and IP address.

6 0
3 years ago
Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
Alla [95]

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

8 0
3 years ago
This project involves writing a java program to simulate a blackjack card game. You will use a simple console-based user interfa
coldgirl [10]

Answer:i dont know sorry

Explanation:

8 0
4 years ago
You want to allow members of the users group to use fdisk on the /dev/sda drive (and only that drive) and to use the yum command
masya89 [10]

Answer:

su ,sg and sudo command.

Explanation:

Whenever the user needs to enable workgroup mates should use fdisk including just that disk on both the /dev / sda disk, using the following command to update and configure the following packages. Thus he uses the command su, sg, and sudo.

So, the following commands are required according to the following statement.

6 0
3 years ago
Other questions:
  • Sushant is a new manager and he wants to share his ideas and working protocol with his team.Compare the advantages and disadvant
    13·1 answer
  • Name some of the file extensions for images and provide more information about one or two of them.
    12·1 answer
  • A way to minimize technical problems with your computer
    14·1 answer
  • Naseer has inserted an image into his document but needs the image to appear on its own line.
    14·2 answers
  • How to build an arch bridge​
    5·1 answer
  • Which language is the most popular language for writing apple os x?
    9·1 answer
  • Enter the number 2568 into the box below
    14·1 answer
  • You're an administrator for a large corporation and you are responsible for deploying computers often and quickly. What server d
    10·1 answer
  • Assuming that each of the resistors in the circuit shown in the figure above has a resistance value of 100 k ohms, what will be
    11·2 answers
  • Click on the _____ tab on the ribbon to open the backstage view.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!