BIS Practice Problems 8

1) ________ is the use of information technology to support the sharing of content among networks of users.
A) Electronic data interchange
B) Data warehousing
C) Cloud computing
D) Social media
D) Social media
2) Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites.
A) outlets
B) sponsors
C) application providers
D) sectors
B) sponsors
3) Social media ________ are the companies that operate the SM sites.
A) outlets
B) sponsors
C) application providers
D) sectors
C) application providers
4) Social media ________ create the features and functions of the site, and they compete with one another for the attention of user communities and SM sponsors.
A) application providers
B) collaborators
C) sectors
D) outlets
A) application providers
5) ________ data is data and responses to data that are contributed by users and SM sponsors.
A) Connection
B) Capital
C) Content
D) Custom
C) Content
6) ________ data is data about relationships.
A) Connection
B) Capital
C) Content
D) Custom
A) Connection
7) With respect to the five components of SMIS, which of the following is true of community users?
A) They process SM sites using elastic, cloud-based servers.
B) They develop and operate their own custom social networking application software to read and submit data.
C) They need to be trained on both SMIS user procedures as well as on the organization’s social networking policy.
D) Their procedures are informal, evolving, and socially oriented.
D) Their procedures are informal, evolving, and socially oriented.
8) With respect to the five components of SMIS, which of the following is true of application providers?
A) They process SM sites using desktops, laptops, and smartphones.
B) They store and retrieve SM data on behalf of sponsors and user communities.
C) They employ browsers and native mobile applications to read and submit data.
D) Their procedures are informal, evolving, and socially oriented.
B) They store and retrieve SM data on behalf of sponsors and user communities.
9) With respect to the five components of SMIS, which of the following is true of SM sponsors?
A) They process SM sites using elastic, cloud-based servers.
B) They employ browsers and native mobile applications to read and submit data.
C) They need to be trained on both SMIS user procedures as well as on the organization’s social networking policy.
D) Their procedures are informal, evolving, and socially oriented.
C) They need to be trained on both SMIS user procedures as well as on the organization’s social networking policy.
10) Which of the following is true of defenders of belief?
A) They seek conformity and want to convince others of the wisdom of their belief.
B) Their communities do not facilitate activities like sales and marketing.
C) They are effective for activities that involve innovation and problem solving.
D) When confronted with contrary evidence, they change their opinion.
A) They seek conformity and want to convince others of the wisdom of their belief.
11) ________ is the dynamic social media process of employing users to participate in product design or product redesign.
A) Social capitalization
B) User interface designing
C) Crowdsourcing
D) Process reengineering
C) Crowdsourcing
12) ________ is the application of social media to facilitate the cooperative work of people inside organizations.
A) Enterprise architecture
B) Enterprise resource planning
C) Enterprise 2.0
D) Enterprise application integration
C) Enterprise 2.0
13) A ________ is a content structure that has emerged from the processing of many user tags.
A) metalanguage
B) chrome
C) folksonomy
D) bookmark
C) folksonomy
14) According to McAfee’s Enterprise 2.0 model, creating enterprise content via blogs, wikis, discussion groups, and presentations is part of ________.
A) signaling
B) authoring
C) tagging
D) searching
B) authoring
15) According to McAfee, Enterprise 2.0 workers want applications that enable them to rate tagged content and to use the tags to predict content that will be of interest to them. Which of the following characteristics of Enterprise 2.0 does this refer to?
A) search
B) authoring
C) signals
D) extensions
D) extensions
16) According to McAfee’s Enterprise 2.0 model, pushing enterprise content to users based on subscriptions and alerts is part of ________.
A) signaling
B) authoring
C) tagging
D) searching
A) signaling
17) Being linked to a network of highly regarded contacts is a form of ________.
A) social credential
B) personal reinforcement
C) mobility
D) influence
A) social credential
18) Which of the following is true of social capital?
A) Social capital is the investment in human knowledge and skills for future profit.
B) The value of social capital is determined by the number of the relationships in a social network.
C) Social capital can be gained by limiting the number of friends.
D) Being linked into social networks undermines a professional’s image and position in an organization.
B) The value of social capital is determined by the number of the relationships in a social network.
19) A(n) ________ is a statement that delineates employees’ rights and responsibilities.
A) statement of purpose
B) employee relations policy
C) social media policy
D) corporate datasheet
C) social media policy
20) Which of the following is true of social networking problems?
A) Responses are best reserved for when the problematic content has caused the organization to do something positive as a result.
B) Inappropriate contributions that contain obscene or otherwise inappropriate content should be ignored indefinitely.
C) It is unnecessary to communicate the criticism to the product development team.
D) If the problematic content represents reasonable criticism of the organization’s products, the best response is to delete it.
A) Responses are best reserved for when the problematic content has caused the organization to do something positive as a result.
21) In the context of management, ________ means loss of control of employees.
A) transcendence
B) divergence
C) emergence
D) dependence
C) emergence
Electronic data interchange is the use of information technology to support the sharing of content among networks of users.
False
Social media enables people to form hives, which refer to groups of people related by a common interest.
True
A social media information system is an information system that supports the sharing of content among networks of users.
True
Social media outlets are companies and other organizations that choose to support a presence on one or more SM sites.
False
Social media sponsors are the companies that operate the SM sites.
False
Google is an example of a social media application provider.
True
Social media application providers create the features and functions of the site, and they compete with one another for the attention of user communities and SM sponsors.
True
It is not possible for a social media sponsor to develop its own provider.
False
Both community users and employees of SM sponsors process SM sites using elastic, cloud-based servers.
False
SM sponsors employ browsers and native mobile applications to read and submit data.
False
SM application providers develop and operate their own custom, proprietary, social networking application software.
True
Content data is data about relationships.
False
Connection data differentiates SMIS from Web site applications.
True
Both Web sites and social networking sites present user and responder content, but only social networking applications store and process connection data.
True
SM application providers store and retrieve SM data on behalf of sponsors and user communities.
True
For SM sponsors, social networking procedures are informal, evolving, and socially oriented.
False
SM sponsors do what they want to do depending on their goals and their personalities.
False
Employees who contribute to and manage social networking sites will generate direct labor costs.
True
When confronted with contrary evidence, defenders of belief change their opinion.
False
Defenders-of-belief communities facilitate activities like sales and marketing.
True
Defenders-of-belief communities are effective for activities that involve innovation or problem solving.
False
Seekers of the truth share a common desire to learn something, solve a problem, or make something happen.
True
In social CRM, relationships between organizations and customers are predefined.
False
Since the relationships between organizations and customers emerge from joint activity, customers have as much control as companies.
True
Seekers-of-the-truth communities cannot provide solutions to complex supply chain problems.
False
Crowdsourcing is the dynamic social media process of employing users to participate in product design or product redesign.
True
Enterprise resource planning is the application of social media to facilitate the cooperative work of people inside organizations.
False
According to McAfee, Enterprise 2.0 workers want to be able to navigate content structures such as lists and tables of content.
False
According to McAfee’s Enterprise 2.0 model, creating enterprise content via blogs, wikis, discussion groups, and presentations is part of authoring.
True
Enterprise 2.0 content is tagged differently from the content on the Web.
False
A folksonomy is content structure that has emerged from the processing of many user tags.
True
According to McAfee’s Enterprise 2.0 model, the process in which workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them is called extensions.
True
According to McAfee’s Enterprise 2.0 model, pushing enterprise content to users based on subscriptions and alerts is part of tagging.
False
Since the benefits of Enterprise 2.0 result from emergence, there is no way to control for either effectiveness or efficiency.
True
Capital is defined as the investment of resources for future profit.
True
Social capital is the investment in human knowledge and skills for future profit.
False
Being linked to a network of highly regarded contacts is a form of social credential.
True
The value of social capital is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.
True
Social capital can be gained by limiting the number of friends.
False
The strength of a relationship is the likelihood that the entity in the relationship will do something that benefits the organization.
True
A social media policy is a statement that delineates employees’ rights and responsibilities.
True
If a reasoned, nondefensive response generates continued and unreasonable user-generated content from that same source, it is best for the organization to delete it.
False
In the context of CRM, social media means that the vendor loses control of the customer relationship.
True
In the context of management, transcendence means loss of control of employees.
False
×
Sarah
Danielle
Wilson
Hi there, would you like to get such a paper?
How about receiving a customized one?
Check it out
HAVEN'T FOUND THE ESSAY YOU WANT?
For Only $13.90/page