management ch 8 practice test

________ is the use of information technology to support the sharing of content among networks of users.
social media
A(n) ________ is an IS that supports the sharing of content among networks of users.
SM communities differ from communities in the past because they are ________.
formed based on mutual interests
A ________ is an inducement for passing the message along through the tiers.
viral hook
Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites.
________ are the companies that operate the SM sites.
SM application providers
Which of the following is an SM application provider?
Most SM applications earn revenue through ________.
a type of advertising model
________ is data and responses to data that are contributed by users and SM sponsors.
Content Data
________ differentiates SMIS from Web site applications.
Connection data
A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, this is an example of a ________ community.
Defenders-of-belief communities facilitate activities like ________.
sales and marketing
Which of the following statements is true of defenders-of-belief communities?
They seek conformity and want to convince others of the wisdom of their belief.
According to Gossieaux and Moran, ________ share a common desire to learn something, solve a problem, or make something happen.
seekers of the truth
Which of the following activities would seekers of the truth facilitate?
Which of the following statements is true of social CRM?
Each customer crafts his or her own relationship with the company.
The primary risk of peer-to-peer support is ________.
loss of control
Which of the following is a significant risk of using social media for inbound and outbound logistics?
loss of privacy
________ is the dynamic social media process of employing users to participate in product design or product redesign.
crowd sourcing
________ is the application of social media to facilitate the cooperative work of people inside organizations.
enterprise 2.0
In McAfee’s SLATES Enterprise 2.0 model, “L” is for ________.
In McAfee’s SLATES Enterprise 2.0 model, “A” is for ________.
A ________ is content structure that has emerged from the processing of many user tags.
According to McAfee, pushing enterprise content to users based on subscriptions and alerts is part of ________.
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.
Which of the following is a risk associated with human resources using social media to form conclusions about employees?
possibility of error
A student invests money and time in taking a business administration course. In this example, the student invests in ________.
human capital
When a student attends a business function for the purpose of meeting people and reinforcing relationships, he is investing in ________ capital.
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?
social capital
Being linked to a network of highly regarded contacts is a form of ________.
social credential
According to Henk Flap, the ________ is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.
value of social capital
To an organization, the ________ is the likelihood that an entity in the relationship will do something that benefits the organization.
strength of a relationship
Social capital depreciates, but such depreciation can be ameliorated by ________.
adding something of value of the interaction
Which of the following best represents the value of social capital?
Number of Relationships * Relationship Strength * Entity Resources
Which of the following observations is true?
Most organizations today ignore the value of entity assets and simply try to connect to more people with stronger relationships.
Which of the following is true of the model of social media developed by Gossieaux and Moran?
It advocates using social media to interact with customers, employees, and partners in a more humane, relationship-oriented way.
A(n) ________ organization is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.
Which of the following observations is true about a hyper-social organization?
It creates relationships in which both parties perceive and gain value.
Which of the following describes the meaning of ‘sense’ activity, in the SEAMS dynamic process?
the communities which are important to a person
A(n) ________ is a person who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium.
active lurker
Which one of the following characteristics is true for companies such as Google,, and eBay that exemplify Web 2.0?
viral marketing
The Web 2.0 business model relies on ________.
Which of the following major companies is a traditional software vendor?
Traditional software vendors depend on ________.
software license fees
Web 2.0 companies provide software ________.
as a free service
In the Web 2.0 world, new features are released and vendors wait for users to spread the news to one another in a process called ________.
viral marketing
A characteristic of Web 2.0 is that the value of a Web site increases ________.
with users and use
Web 2.0 encourages ________, which occur(s) when the output from two or more Web sites is combined into a single user experience.
Who pioneered Web 2.0 advertising?
With Google’s ________ software, vendors pay a certain amount for particular search words
With ________, Google searches an organization’s Web site and inserts ads that match content on that site. When users click those ads, Google pays the organization a fee.
The first step that any hyper-organization should take is to develop and publicize a(n) ________ policy.
social media
A social media policy is a statement ________.
that delineates employees’ rights and responsibilities
________ is the essence of SM relationships.
user-generated content
If the problematic content posted on a social networking site represents reasonable criticism of the organization’s products or services, the best response would be to ________.
leave it
Responding to problematic content on social networking sites is best reserved for when ________.
the problematic content has caused the organization to do something positive as a result
Deleting problematic content on social networking sites is best reserved for when ________.
the content is obscene and inappropriate
Emergence in the context of management means loss of control of ________.