BIS Practice Problems 8

26 December 2022
4.9 (136 reviews)
65 test answers

Unlock all answers in this set

Unlock answers (61)
question
1) ________ is the use of information technology to support the sharing of content among networks of users. A) Electronic data interchange B) Data warehousing C) Cloud computing D) Social media
answer
D) Social media
question
2) Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites. A) outlets B) sponsors C) application providers D) sectors
answer
B) sponsors
question
3) Social media ________ are the companies that operate the SM sites. A) outlets B) sponsors C) application providers D) sectors
answer
C) application providers
question
4) Social media ________ create the features and functions of the site, and they compete with one another for the attention of user communities and SM sponsors. A) application providers B) collaborators C) sectors D) outlets
answer
A) application providers
question
5) ________ data is data and responses to data that are contributed by users and SM sponsors. A) Connection B) Capital C) Content D) Custom
answer
C) Content
question
6) ________ data is data about relationships. A) Connection B) Capital C) Content D) Custom
answer
A) Connection
question
7) With respect to the five components of SMIS, which of the following is true of community users? A) They process SM sites using elastic, cloud-based servers. B) They develop and operate their own custom social networking application software to read and submit data. C) They need to be trained on both SMIS user procedures as well as on the organization's social networking policy. D) Their procedures are informal, evolving, and socially oriented.
answer
D) Their procedures are informal, evolving, and socially oriented.
question
8) With respect to the five components of SMIS, which of the following is true of application providers? A) They process SM sites using desktops, laptops, and smartphones. B) They store and retrieve SM data on behalf of sponsors and user communities. C) They employ browsers and native mobile applications to read and submit data. D) Their procedures are informal, evolving, and socially oriented.
answer
B) They store and retrieve SM data on behalf of sponsors and user communities.
question
9) With respect to the five components of SMIS, which of the following is true of SM sponsors? A) They process SM sites using elastic, cloud-based servers. B) They employ browsers and native mobile applications to read and submit data. C) They need to be trained on both SMIS user procedures as well as on the organization's social networking policy. D) Their procedures are informal, evolving, and socially oriented.
answer
C) They need to be trained on both SMIS user procedures as well as on the organization's social networking policy.
question
10) Which of the following is true of defenders of belief? A) They seek conformity and want to convince others of the wisdom of their belief. B) Their communities do not facilitate activities like sales and marketing. C) They are effective for activities that involve innovation and problem solving. D) When confronted with contrary evidence, they change their opinion.
answer
A) They seek conformity and want to convince others of the wisdom of their belief.
question
11) ________ is the dynamic social media process of employing users to participate in product design or product redesign. A) Social capitalization B) User interface designing C) Crowdsourcing D) Process reengineering
answer
C) Crowdsourcing
question
12) ________ is the application of social media to facilitate the cooperative work of people inside organizations. A) Enterprise architecture B) Enterprise resource planning C) Enterprise 2.0 D) Enterprise application integration
answer
C) Enterprise 2.0
question
13) A ________ is a content structure that has emerged from the processing of many user tags. A) metalanguage B) chrome C) folksonomy D) bookmark
answer
C) folksonomy
question
14) According to McAfee's Enterprise 2.0 model, creating enterprise content via blogs, wikis, discussion groups, and presentations is part of ________. A) signaling B) authoring C) tagging D) searching
answer
B) authoring
question
15) According to McAfee, Enterprise 2.0 workers want applications that enable them to rate tagged content and to use the tags to predict content that will be of interest to them. Which of the following characteristics of Enterprise 2.0 does this refer to? A) search B) authoring C) signals D) extensions
answer
D) extensions
question
16) According to McAfee's Enterprise 2.0 model, pushing enterprise content to users based on subscriptions and alerts is part of ________. A) signaling B) authoring C) tagging D) searching
answer
A) signaling
question
17) Being linked to a network of highly regarded contacts is a form of ________. A) social credential B) personal reinforcement C) mobility D) influence
answer
A) social credential
question
18) Which of the following is true of social capital? A) Social capital is the investment in human knowledge and skills for future profit. B) The value of social capital is determined by the number of the relationships in a social network. C) Social capital can be gained by limiting the number of friends. D) Being linked into social networks undermines a professional's image and position in an organization.
answer
B) The value of social capital is determined by the number of the relationships in a social network.
question
19) A(n) ________ is a statement that delineates employees' rights and responsibilities. A) statement of purpose B) employee relations policy C) social media policy D) corporate datasheet
answer
C) social media policy
question
20) Which of the following is true of social networking problems? A) Responses are best reserved for when the problematic content has caused the organization to do something positive as a result. B) Inappropriate contributions that contain obscene or otherwise inappropriate content should be ignored indefinitely. C) It is unnecessary to communicate the criticism to the product development team. D) If the problematic content represents reasonable criticism of the organization's products, the best response is to delete it.
answer
A) Responses are best reserved for when the problematic content has caused the organization to do something positive as a result.
question
21) In the context of management, ________ means loss of control of employees. A) transcendence B) divergence C) emergence D) dependence
answer
C) emergence
question
Electronic data interchange is the use of information technology to support the sharing of content among networks of users.
answer
False
question
Social media enables people to form hives, which refer to groups of people related by a common interest.
answer
True
question
A social media information system is an information system that supports the sharing of content among networks of users.
answer
True
question
Social media outlets are companies and other organizations that choose to support a presence on one or more SM sites.
answer
False
question
Social media sponsors are the companies that operate the SM sites.
answer
False
question
Google is an example of a social media application provider.
answer
True
question
Social media application providers create the features and functions of the site, and they compete with one another for the attention of user communities and SM sponsors.
answer
True
question
It is not possible for a social media sponsor to develop its own provider.
answer
False
question
Both community users and employees of SM sponsors process SM sites using elastic, cloud-based servers.
answer
False
question
SM sponsors employ browsers and native mobile applications to read and submit data.
answer
False
question
SM application providers develop and operate their own custom, proprietary, social networking application software.
answer
True
question
Content data is data about relationships.
answer
False
question
Connection data differentiates SMIS from Web site applications.
answer
True
question
Both Web sites and social networking sites present user and responder content, but only social networking applications store and process connection data.
answer
True
question
SM application providers store and retrieve SM data on behalf of sponsors and user communities.
answer
True
question
For SM sponsors, social networking procedures are informal, evolving, and socially oriented.
answer
False
question
SM sponsors do what they want to do depending on their goals and their personalities.
answer
False
question
Employees who contribute to and manage social networking sites will generate direct labor costs.
answer
True
question
When confronted with contrary evidence, defenders of belief change their opinion.
answer
False
question
Defenders-of-belief communities facilitate activities like sales and marketing.
answer
True
question
Defenders-of-belief communities are effective for activities that involve innovation or problem solving.
answer
False
question
Seekers of the truth share a common desire to learn something, solve a problem, or make something happen.
answer
True
question
In social CRM, relationships between organizations and customers are predefined.
answer
False
question
Since the relationships between organizations and customers emerge from joint activity, customers have as much control as companies.
answer
True
question
Seekers-of-the-truth communities cannot provide solutions to complex supply chain problems.
answer
False
question
Crowdsourcing is the dynamic social media process of employing users to participate in product design or product redesign.
answer
True
question
Enterprise resource planning is the application of social media to facilitate the cooperative work of people inside organizations.
answer
False
question
According to McAfee, Enterprise 2.0 workers want to be able to navigate content structures such as lists and tables of content.
answer
False
question
According to McAfee's Enterprise 2.0 model, creating enterprise content via blogs, wikis, discussion groups, and presentations is part of authoring.
answer
True
question
Enterprise 2.0 content is tagged differently from the content on the Web.
answer
False
question
A folksonomy is content structure that has emerged from the processing of many user tags.
answer
True
question
According to McAfee's Enterprise 2.0 model, the process in which workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them is called extensions.
answer
True
question
According to McAfee's Enterprise 2.0 model, pushing enterprise content to users based on subscriptions and alerts is part of tagging.
answer
False
question
Since the benefits of Enterprise 2.0 result from emergence, there is no way to control for either effectiveness or efficiency.
answer
True
question
Capital is defined as the investment of resources for future profit.
answer
True
question
Social capital is the investment in human knowledge and skills for future profit.
answer
False
question
Being linked to a network of highly regarded contacts is a form of social credential.
answer
True
question
The value of social capital is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.
answer
True
question
Social capital can be gained by limiting the number of friends.
answer
False
question
The strength of a relationship is the likelihood that the entity in the relationship will do something that benefits the organization.
answer
True
question
A social media policy is a statement that delineates employees' rights and responsibilities.
answer
True
question
If a reasoned, nondefensive response generates continued and unreasonable user-generated content from that same source, it is best for the organization to delete it.
answer
False
question
In the context of CRM, social media means that the vendor loses control of the customer relationship.
answer
True
question
In the context of management, transcendence means loss of control of employees.
answer
False