MIS Chapter 8 Practice Test – Flashcards

Unlock all answers in this set

Unlock answers
question
c
answer
Social media ________ create the features and functions of the site, and they compete with one another for the attention of user communities and SM sponsors. Select one: a. outlets b. sectors c. application providers d. collaborators
question
c
answer
In the context of management, ________ means loss of control of employees. Select one: a. transcendence b. dependence c. emergence d. divergence
question
a
answer
Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites. Select one: a. sponsors b. outlets c. application providers d. sectors
question
b
answer
With respect to the five components of SMIS, which of the following is true of application providers? Select one: a. Their procedures are informal, evolving, and socially oriented. b. They store and retrieve SM data on behalf of sponsors and user communities. c. They employ browsers and native mobile applications to read and submit data. d. They process SM sites using desktops, laptops, and smartphones.
question
d
answer
Social media ________ create the features and functions of the site, and they compete with one another for the attention of user communities and SM sponsors. Select one: a. outlets b. collaborators c. sectors d. application providers
question
c
answer
________ is the dynamic social media process of employing users to participate in product design or product redesign. Select one: a. Social capitalization b. User interface designing c. Crowdsourcing d. Process reengineering
question
d
answer
With respect to the five components of SMIS, which of the following is true of community users? Select one: a. They process SM sites using elastic, cloud-based servers. b. They develop and operate their own custom social networking application software to read and submit data. c. They need to be trained on both SMIS user procedures as well as on the organization's social networking policy. d. Their procedures are informal, evolving, and socially oriented.
question
d
answer
________ data is data about relationships. Select one: a. Content b. Capital c. Custom d. Connection
question
d
answer
Which of the following is true of social networking problems? Select one: a. Inappropriate contributions that contain obscene or otherwise inappropriate content should be ignored indefinitely. b. It is unnecessary to communicate the criticism to the product development team. c. If the problematic content represents reasonable criticism of the organization's products, the best response is to delete it. d. Responses are best reserved for when the problematic content has caused the organization to do something positive as a result.
question
d
answer
________ data is data and responses to data that are contributed by users and SM sponsors. Select one: a. Connection b. Capital c. Custom d. Content
question
b
answer
According to McAfee's Enterprise 2.0 model, pushing enterprise content to users based on subscriptions and alerts is part of ________. Select one: a. searching b. signaling c. authoring d. tagging
question
b
answer
Social media ________ are the companies that operate the SM sites. Select one: a. sectors b. application providers c. outlets d. sponsors
question
a
answer
A(n) ________ is a statement that delineates employees' rights and responsibilities. Select one: a. social media policy b. statement of purpose c. corporate datasheet d. employee relations policy
question
a
answer
________ is the use of information technology to support the sharing of content among networks of users. Select one: a. Social media b. Cloud computing c. Data warehousing d. Electronic data interchange
question
d
answer
According to McAfee, Enterprise 2.0 workers want applications that enable them to rate tagged content and to use the tags to predict content that will be of interest to them. Which of the following characteristics of Enterprise 2.0 does this refer to? Select one: a. signals b. authoring c. search d. extensions
question
d
answer
Which of the following is true of social capital? Select one: a. Social capital can be gained by limiting the number of friends. b. Being linked into social networks undermines a professional's image and position in an organization. c. Social capital is the investment in human knowledge and skills for future profit. d. The value of social capital is determined by the number of the relationships in a social network.
question
a
answer
Being linked to a network of highly regarded contacts is a form of ________. Select one: a. social credential b. mobility c. influence d. personal reinforcement
question
a
answer
Which of the following is true of defenders of belief? Select one: a. They seek conformity and want to convince others of the wisdom of their belief. b. When confronted with contrary evidence, they change their opinion. c. Their communities do not facilitate activities like sales and marketing. d. They are effective for activities that involve innovation and problem solving.
question
a
answer
________ is the application of social media to facilitate the cooperative work of people inside organizations. Select one: a. Enterprise 2.0 b. Enterprise resource planning c. Enterprise application integration d. Enterprise architecture
question
d
answer
A ________ is a content structure that has emerged from the processing of many user tags. Select one: a. chrome b. metalanguage c. bookmark d. folksonomy
question
d
answer
With respect to the five components of SMIS, which of the following is true of SM sponsors? Select one: a. They process SM sites using elastic, cloud-based servers. b. They employ browsers and native mobile applications to read and submit data. c. Their procedures are informal, evolving, and socially oriented. d. They need to be trained on both SMIS user procedures as well as on the organization's social networking policy.
question
a
answer
________ is the use of information technology to support the sharing of content among networks of users. Select one: a. social media b. cloud computing c. electronic data interchange d. data warehousing
question
d
answer
According to McAfee's Enterprise 2.0 model, creating enterprise content via blogs, wikis, discussion groups and presentations is part of: Select one: a. searching b. signaling c. tagging d. authoring
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New