SmartExpert

(118)

$30/per page/Negotiable

About SmartExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Business & Finance See all
Accounting,Business & Finance,Economics,English,HR Management,Math Hide all
Teaching Since: Apr 2017
Last Sign in: 56 Weeks Ago, 4 Days Ago
Questions Answered: 7570
Tutorials Posted: 7352

Education

  • BS,MBA, PHD
    Adelphi University/Devry
    Apr-2000 - Mar-2005

Experience

  • HOD ,Professor
    Adelphi University
    Sep-2007 - Apr-2017

Category > Information Systems Posted 16 Oct 2017 My Price 14.00

ISM- 3011 Info Systems in Organizations (Chapter 5-8)

 

Chapter 5:

1.    To represent relationships, ________ are added to tables.

 

A.

entity keys

 

B.

normalized keys

 

C.

foreign keys

 

D.

locking keys

 

E.

value keys

 

2.    If a student is allowed to have multiple majors, and advisors for each major are assigned to multiple students, this would be an example of a(n) ________ relationship.

 

A.

1:N

 

B.

N:M

 

C.

1:1

 

D.

one-of-a-kind

 

E.

0:M

 

3.    Prior to implementing a database in a DBMS, the developers perform _________ in order to improve the structure of the database tables.

 

A.   structuring

 

B.   normalization

 

C.   transformation

 

D.   data analysis

 

E.    modeling

 

4.    If Falcon Security chooses to use a SQL DBMS such as Access, it will be able to __________.

 

A.

store the video footage in the same database as the metadata

 

B.

face some risk and uncertainty while developing the database with

 

C.

use a new, unfamiliar product to create the database

 

D.

gain knowledge and experience with a new form of database

 

E.

store only the metadata about each video in the database

 

5.    The elements that make up a database application are: forms, application programs, reports, and __________.

 

A.

backups

 

B.

queries

 

C.

data views

 

D.

relationships

 

E.

performance monitors

 

6.    The following are all processing operations of a DBMS except _________.

 

A.

insert data

 

B.

autocorrect data

 

C.

delete data

 

D.

read data

 

E.

modify data

 

7.    In the context of a database, _________ is data that describes the content of the database.

 

A.

meta-elements

 

B.

key data

 

C.

metadata

 

D.

megadata

 

E.

predictive data

 

8.    Which of the following is NOT a purpose of a database management system (DBMS)?

 

A.

Establish relationships between tables.

 

B.

Port the data to the Internet.

 

C.

Enable the data to be backed up.

 

D.

Enable data to be added and modified.

 

E.

Create tables.

 

9.    In data modeling, a(n) ________ is something that the users want to store data about.

 

A.

primary key

 

B.

attribute

 

C.

relationship

 

D.

entity

 

E.

foreign key

 

10. The three essential elements of the definition of a database are ________.

 

A.

fields; relationship among fields in tables; metadata

 

B.

tables; metadata; validation rules

 

C.

tables; relationship among rows in tables; metadata

 

D.

validation rules; data; tables

 

E.

tables; relationship among rows in tables; validation rules

 

11. The purpose of a database is to __________.

 

A.

keep track of things that share a single theme

 

B.

keep track of things that involve multiple themes

 

C.

eliminate the need to learn about spreadsheets

 

D.

make the use of the cloud more straightforwardly

 

F.    eliminate the need to learn programming

12.  Every normalized table has ________.

 

A.

repeating fields

 

B.

multiple topics

 

C.

duplicated data

 

D.

a single theme

 

E.

data integrity problems

 

13. With today's focus on Internet applications, it is far less necessary that database systems impose ________ restrictions on transaction processing.

 

A.

ELITE

 

B.

ACID

 

C.

ELAC

 

D.

EPIC

 

E.

AVID

 

14. Which of the following statements is correct?

 

A.

The user doesn't need to dedicate special time to reviewing the data model.

 

B.

If corrections are needed in the database structure, the requirements step is the best time to.

 

A database is a model of how only managers view their business world.

 

D.

If the data model is incorrect, the database can still be used successfully.

 

E.

Do not proceed with database design unless the data model is accurate.

           

15. The designers of a database typically begin by developing a ________ in order to construct a logical representation of the database before it is implemented.

 

A.

3D representation

 

B.

data model

 

C.

network diagram

 

D.

line drawing

 

E.

process model

16. _______ is an international standard language for processing a database.

 

A.

PHP

 

B.

HTML

 

C.

SQL

 

D.

DB2

 

E.

RDBMS

17. Data integrity problems are likely to occur when __________.

 

A.

the data design has a N:M relationship

 

B.

normal forms are used

 

C.

data is duplicated

 

D.

attribute conflicts are not resolved

 

E.

minimum cardinalities are not met

 

18. In databases, bytes are grouped into ________ which describe characteristics of the object being stored.

 

A.

relationships

 

B.

columns

 

C.

rows

 

D.

records

 

E.

tables

19. Which of the following is true of the database development process?

 

A.

User review of the data model is avoided because it is not helpful in data modeling.

 

B.

Problems in the data model will not affect the application.

 

C.

A database is a model of how the developers view their business world.

 

D.

Changing a relationship from 1:N to N:M is simply a matter of changing the notations.

 

E.

The database structure cannot be changed during the data modeling stage.

20. A key aspect of database administration is to set __________, or rules that govern precisely what each user can see and do with the data in the database.

 

A.

user precedence

 

B.

power users

 

C.

permissions

 

D.

usage regulations

 

E.

supervisor rules

 

21. Every database table must have a ________, a field (or fields) that contains a unique value for every table record.

 

A.

predictive key

 

B.

foreign key

 

C.

relationship line

 

D.

primary key

 

E.

primary element

22. When you state a business rule that pertains to your organization, such as "At my university, a student may declare only one single major," you are actually defining the __________ of the relationship between students and majors.

 

A.

maximum cardinality

 

B.

normality

 

C.

minimum cardinality

 

D.

foreign keys

 

E.

relational limits

 

23. Characteristics of traditional database application programs include all of the following except _________.

 

A.

written in programming languages like COBOL, C++, and VisualBasic

 

B.

they are thick client applications

 

C.

involve a server to house and serve data

 

D.

accessed via browsers

 

E.

require that the application programs be installed on the user computers

 

24. The explosive growth in data expected through 2026 means that ________ is even more important.

 

A.

 

B.

data prediction

 

C.

business intelligence

 

D.

spyware

 

E.

data outsourcing

25. If two users of a database access the same record and both attempt to transaction with that record, the ________ problem is likely to occur.

 

A.

lost update

 

B.

power surging

 

C.

transaction processing

 

D.

processing

 

E.

Web browsing

 

Chapter 6

 

1.    Advantages of content delivery networks include all of the following except ________.

 

A.

pay-as-you-go

 

B.

higher costs to mobile users

 

C.

faster load times

 

D.

protection from DOS attacks

 

E.

increased reliability

 

2.    A network that relies primarily on wireless connection of devices located near to a single person is a ___________.

 

A.

limited area network

 

B.

private area network

 

C.

wide area network

 

D.

personal area network

 

E.

local area network

3.    Communication carriers are unhappy with the regulations that impose ________ and are currently engaged in legal battles to eliminate the concept.

 

A.

hop restrictions

 

B.

bandwidth limits

 

C.

maximum transmission speeds

 

D.

wide area networks

 

E.

net neutrality

 

4. Communication carriers are unhappy with the regulations that impose ________ and are currently engaged in legal battles to eliminate the concept.

A.

hop restrictions

B.

bandwidth limits

C.

maximum transmission speeds

D.

wide area networks

E.

net neutrality

Now

 

4.    A common protocol that enables files to be moved from one computer to another over the Internet is _________.

 

A.

FTP

 

B.

XML

 

C.

SMTP

 

D.

SNMP

 

E.

HTTPS

5.    Which of the following statements is NOT correct for private clouds?

 

A.

They farm of servers managed with elastic load balancing.

 

B.

They are built on top of public cloud infrastructure using VPN tunneling.

 

C.

Private clouds provide security within the organizational infrastructure.

 

D.

Private clouds can possibly provide secure access from outside that infrastructure.

 

E.

They enable the business to maintain physical control over its stored data.

6.    The most likely reason that an organization should not consider using the cloud is ______.

 

A.

the organization feels the clouds benefits are unclear

 

B.

the organization faces too much competition in its industry segment

 

C.

the organization is not technically sophisticated

 

D.

the organization is legally prohibited from losing physical control over its data

 

E.

the organization wants to wait for the cloud to mature

7.    An important cloud design philosophy that defines all interactions among computing devices as services in a formal standardized way is termed the ________.

 

A.

simple-option access

 

B.

service-options available

 

C.

standard-operational access

 

D.

service-oriented architecture

 

E.

seamless-operations architecture

8.    In order to get on the Internet from a location such as a coffee shop, your device uses your __________, which is then substituted with the shop LAN's _________.

          Which of the following is the most accurate and complete definition of the cloud?

 

A.

Computers somewhere out there

 

B.

A bubble on a network diagram

 

C.

Computing resources available to anyone

 

D.

Elastic leasing of pooled computer resources over the Internet

 

E.

Easily accessible data storage

 

9.    The following are all disadvantages of in-house hosting compared to use of the cloud, except ______.

 

A.

flexibility and adaptability to fluctuating demand

 

B.

capital investment

 

C.

visibility of security measures

 

D.

development effort

 

E.

obsolescence risk

10. Among the following, which is NOT likely to be a way for Falcon Security to use the cloud?

 

A.

Use Google Mail and Google Drive.

 

B.

Use Rackspace for hardware and load whatever operating system they want.

 

C.

Use a CDN to distribute its content worldwide.

 

D.

Obtain data storage services from Amazon.com's S3 product.

 

E.

Use Windows Servers with SQL Server already installed from the Microsoft Azure cloud offerings.

11. The computers in two separated company sites must be connected using a ________.

 

A.

wide area network (WAN)

 

B.

protocol

 

C.

local area network (LAN)

 

D.

Internet

 

E.

intranet

12. The sharing of physical hardware by many organizations in the cloud, termed pooling, is accomplished with ____________.

 

A.

provisioning

 

B.

visualization

 

C.

segmentation

 

D.

separation

 

E.

virtualization

13. _____ agreements ensure that communications carriers exchange traffic on their networks freely.

 

A.

Peering

 

B.

Free use

 

C.

Hopping

 

D.

Neutral

 

E.

Exchange

 

14. A negative consequence of the expanding use of the cloud will be ______.

 

A.

reduced availability of cloud services

 

B.

large increases in cloud vendor data center job openings

 

C.

slower performance of cloud-based services

 

D.

higher costs of cloud services

 

E.

fewer local jobs that focus on the installation and support of email and other servers

15. A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.

 

A.

network

 

B.

application

 

C.

farm

 

D.

server

 

E.

database

16. Since companies do not know precisely how much demand will be placed on their computing resources in the future, an attractive element of using the cloud is the fact that it is ________.

 

A.

flexible

 

B.

elastic

 

C.

variable

 

D.

unpredictable

 

E.

Dynamic

 

17. Which of the following is true about a VPN?

 

A.

It uses private networks instead of the public network.

 

B.

It encrypts messages to ensure secure transmissions.

 

C.

It appears as a secure connection, though it is not.

 

D.

It does not provide users with remote access.

 

E.

The actual internal LAN addresses are sent in the VPN messages on the Internet.

 

18. On a typical e-commerce Web site, a component called the ________ contains programs that obtain product data from a database, manage the shopping cart, and coordinate the checkout process.

 

A.

commerce server

 

B.

Web browser

 

C.

database management system

 

D.

Web server

 

E.

Internet server

19. A wireless protocol that is becoming ever more common as everyday objects become "smart" devices is _________.

 

A.

Redhat

 

B.

Jetblack

 

C.

Greenline

 

D.

Bluetooth

 

E.

Whitehot

20. Your Internet Service Provider serves all of the following functions except _________.

 

A.

provides you with a legitimate Internet address

 

B.

provides you a gateway to the Internet

 

C.

pays access fees to communication carriers to help pay for the Internet

 

D.

collects money from its customers for its services

 

E.

allows you to access a personal area network (PAN)

 

21. The method of obtaining cloud-based services that include hardware infrastructure, operating system, and possibly a DBMS is termed _______.

 

A.

DaaS (Data as a Service)

 

B.

IaaS (Infrastructure as a Service)

 

C.

WaaS (Web as a Service)

 

D.

PaaS (Platform as a Service)

 

E.

SaaS (Software as a Service)

 

22. Which of the following is the distinguishing feature of a LAN as compared to a WAN?

 

A.

Single location

 

B.

Number of users

 

C.

Bandwidth

 

D.

Network hardware

 

E.

Communication capacity

 

23. Suppose Falcon Security wished to utilize a vendor's application software in the cloud. It would need to obtain ________ cloud resources.

 

A.

SaaS (Software as a Service)

 

B.

DaaS (Data as a Service)

 

C.

WaaS (Web as a Service)

 

D.

PaaS (Platform as a Service)

 

E.

IaaS (Infrastructure as a Service

 

24. A ________ is a set of rules that programs on two communicating devices follow.

 

A.

signal

 

B.

filter

 

C.

packet

 

D.

protocol

 

E.

Language

 

25. The computers in two separated company sites must be connected using a ________.

 

A.

wide area network (WAN)

 

B.

protocol

 

C.

local area network (LAN)

 

D.

Internet

 

E.

intranet

Chapter 7:

 

1. A component of an organization's database program code is a _______, which runs to keep the database consistent when certain conditions occur.

 

A.

dynamic procedure

 

B.

trigger

 

C.

flag

 

D.

stored procedure

 

E.

switching code

 

1.    Customer relationship management applications include all of the following except ________.

 

A.

relationship management

 

B.

solicitation and lead management

 

C.

sales applications

 

D.

customer support

 

E.

customer billing

 

2.    The activity of altering existing and designing new business processes to take advantage of new information systems is called _________.

 

A.

business process remediation

 

B.

business process restructuring

 

C.

business process revisioning

 

D.

business process reengineering

 

E.

business process alignment

 

 

3.    The problems presented by workgroup information systems can usually be resolved by ________.

 

A.

increasing the efficiencies of workgroup processes

 

B.

further disintegration of process data

 

C.

the workgroup itself

 

D.

building collaborative management

 

E.

eliminating duplication of data

 

 

4.    __________ measures how well a process achieves organizational strategies.

 

A.

Process utility

 

B.

Process capability

 

C.

Process flexibility

 

D.

Process effectiveness

 

E.

Process efficiency

 

5.    The sequence of activities and phases of the customer life cycle are as follows: ________.

 

A.

attract, sell, categorize, and support

 

B.

categorize, sell, support, and attract

 

C.

categorize, attract, sell, and support

 

D.

attract, categorize, sell, and support

 

E.

attract, sell, support, and categorize

 

 

6.    All of the following are security risks associated with the PRIDE system, except ________.

 

A.

there is no way to have everyone follow a single set of data security procedures

 

B.

patient health data can be viewed by other clubs

 

C.

patient's data can be used in unintended ways

 

D.

patient health data can be viewed by competing trainers

 

E.

doctors and trainers may be restricted to viewing only partial data

 

 

7.    In the future, ERP customers will store most of their data on cloud servers managed by cloud vendors and store sensitive data on servers that they manage themselves. This arrangement is known as the _______.

 

A.

hybrid model

 

B.

mixed model

 

C.

relational model

 

D.

logical model

 

E.

joint model

 

 

8.    The most significant contributing factor to problems with data integrity is __________.

 

A.

data duplication

 

B.

limited information

 

C.

disjointed processes

 

D.

slow processes

 

E.

incomplete backups

 

 

9.    One important change that resulted from the movement to enterprise systems was the creation of stronger, faster, and more effective ________ among value chains.

 

A.

hops

 

B.

pathways

 

C.

routes

 

D.

linkages

 

E.

functions

 

10. If an organization replaces its existing hardware infrastructure with hardware in the cloud, then installs its own ERP software and databases on that cloud hardware, it is using _______.

 

A.

PaaS

 

B.

ERPaaS

 

C.

IaaS

 

D.

MaaS

 

E.

SaaS

 

 

11. When organizations accept the standardized business processes that are designed into ERP products, they are utilizing ___________ that represent industry best practices.

 

A.

predictive processes

 

B.

inherent processes

 

C.

innovative processes

 

D.

formulaic processes

 

E.

informative processes

 

 

12. organization that is implementing the manufacturing module of an ERP system has created a contest between several workgroups. The workgroup that adopts the ERP module most successfully (based on speed and number of errors) will be awarded a bonus. The intent of such a contest is to deal with __________.

 

A.

collaborative management

 

B.

upgrade stress

 

C.

requirements gaps

 

D.

transition problems

 

E.

employee resistance

 

 

13. An _________ is the condition that exists when data are isolated in separated information systems.

 

A.

information moat

 

B.

information island

 

C.

information bridge

 

D.

information barn

 

E.

information silo

 

 

14. A(n) _________ is a network of activities that generate value by transforming inputs into outputs.

 

A.

function

 

B.

capability

 

C.

network

 

D.

business process

 

E.

activity

 

 

15. Information systems that support processes spanning two or more independent organizations are termed ____________ information systems.

 

A.

functional

 

B.

personal

 

C.

workgroup

 

D.

inter-enterprise

 

E.

enterprise

 

 

16. A business process that is flexible, informal, and adaptive is said to be a _________ business process.

 

A.

uniform

 

B.

stable

 

C.

dynamic

 

D.

predictable

 

E.

structured

 

 

17. Enterprise application integration includes all of the following features except ___________.

 

A.

leverages existing systems

 

B.

enables existing systems to communicate and share data

 

C.

connects system "islands" with software

 

D.

provides integrated information

 

E.

use of inherent processes

 

18. All of the following are ways that an information system can be used to improve process quality except ________.

 

A.

assisting the human who is performing an activity in the process

 

B.

enabling the process to follow a random process

 

C.

ensuring the correct process flow is followed

 

D.

ensuring the quality of the data associated with the process

 

E.

performing an activity in the process

 

 

19. Requirements gap identification is a major task when implementing enterprise systems because of all of the following, except ________.

 

A.

the organization may need to change the way they do things to close the gaps

 

B.

the organization needs to decide what to do with the gaps

 

C.

the application may be altered to reduce the gaps

 

D.

features and functions of complex products like ERP are not easy to identify

 

E.

consolidating the functional systems will close the gaps

 

 

20. The primary goal of ERP systems is ___________.

 

A.

prediction

 

B.

backups

 

C.

integration

 

D.

redundancy

 

E.

use of the cloud

 

 

21. CRM software products enable organizations to become more _________.

 

A.

diverse

 

B.

customer-centric

 

C.

systematic

 

D.

self-organizing

 

E.

customized

 

 

22. the process of reengineering business processes is made difficult for all of the following reasons except:

 

A.

it is very easy to find people who can design the new improved processes.

 

B.

redesigning processes for the entire organization is extremely complex.

 

C.

it takes highly skilled people to redesign business processes.

 

D.

it is very difficult to envision the new improved processes.

 

E.

it takes much time to redesign business processes.

 

 

23. While changing a business process by adding a resource, one should add cost to the process if ________.

 

A.

the resources added are non-human

 

B.

the resources added are human

 

C.

the resource is a one-time investment

 

D.

the change generates value greater than its cost

 

E.

the resource adds a recurring cost

 

 

25. Enterprise information systems can solve all the following problems except ________.

 

A.

disjointed business processes

 

B.

inefficiencies of isolated systems

 

C.

extra process costs from repetition of activities

 

D.

duplicated enterprise information

 

E.

data quality problems

 

 

Chapter 8

 

A way for SM companies to monetize their application, service, or content is through the ________.

 

A.

freemium revenue model

 

B.

Web status model

 

C.

power user premium model

 

D.

advanced user fee

 

E.

focused sponsor model

 

 

1.    The recommended steps in the process of developing a plan for effectively using an existing social media platform are ___________.

 

A.

define your value; make personal connections; define your goals; gather and analyze data; identify success metrics; identify target audience

 

B.

identify target audience; make personal connections; define your value; define your goals; identify success metrics; gather and analyze data

 

C.

identify success metrics; gather and analyze data; identify target audience; make personal connections; define your value; define your goals

 

D.

define your goals; identify success metrics; identify target audience; define your value; make personal connections; gather and analyze data

 

E.

make personal connections; gather and analyze data; define your value; define your goals; identify success metrics; identify target audience

 

 

2.    Which of the following is NOT a business function successfully using SMIS to advance organizational strategy?

 

A.

Logistics

 

B.

Sales and marketing

 

C.

Internal accounting

 

D.

Manufacturing and operations

 

E.

Customer service

 

 

3.    Among the following statements, which is true in regards to differences between social CRM and traditional CRM?

 

A.

In traditional CRM, customers have more control over the relationship with the company.

 

B.

Social CRM is centered on lifetime value.

 

C.

A quiet customer, who spends a lot, is less valuable in social CRM.

 

D.

Traditional CRM is not centered on lifetime value.

 

E.

Traditional CRM is more dynamic than social CRM.

 

 

4.    A KPI is a(n) ________ used to measure success of social media within an enterprise.

 

A.

competitive analysis

 

B.

social media provider

 

C.

vanity metric

 

D.

online analytical tool

 

E.

success metric

 

5.    Which of the following is NOT a question that is difficult to answer regarding the future of social media?

 

A.

Is there an Enterprise 3.0 around the corner?

 

B.

Will social media become more unified on a single platform, or become more fragmented across many different platforms?

 

C.

Will your refrigerators publish what kids are eating after school on the family's social media site?

 

D.

Will companies start employing people into new positions that are responsible for developing and managing innovative social media programs?

 

E.

How will companies promote their products?

 

 

6.    Which of the following is an internal risk for organizations who have adopted social media?

 

A.

mistaken or misleading information

 

B.

junk postings

 

C.

information leakage about future products

 

D.

inappropriate content

 

E.

unfavorable reviews

 

 

 

7.    The best practices associated with successful ESN implementation include ___________.

 

A.

promote; support; measure; success

 

B.

plan; sponsorship; measure; adopt

 

C.

plan; engage; adopt

 

D.

sponsor; engage; adopt

 

E.

strategy; sponsorship; support; success

 

 

8.    When Starbucks asks its social media users to suggest new drink varieties and to comment on new drinks that are being market tested, it is employing the ________ process.

 

A.

blogging

 

B.

user-based

 

C.

crowdsourcing

 

D.

specialty design

 

E.

outsourcing

 

 

9.    Which of the following statements is most accurate?

 

A.

"Few social media companies earn revenue through advertising."

 

B.

"The freemium revenue model offers users access to all features of its site for free."

 

C.

"Charging subscription fees has proven to be an effective revenue model for social media."

 

D.

"The more people who use a site, the less valuable it becomes because of crowding."

 

E.

"Making the 'users' the product is effective at making money using social media."

 

 

 

10. A critical measure of the efficacy of the advertising revenue model is the ___________.

 

A.

interest index

 

B.

conversion rate

 

C.

mobility measure

 

D.

power user metric

 

E.

response portfolio

 

 

11. Microsoft's use of its MVP (Most Valuable Professional) program is a classic example of social media-based _________.

 

A.

outbound logistics

 

B.

sales and marketing

 

C.

human resources

 

D.

customer support

 

E.

inbound logistics

 

 

12. Which of the following examples of user-generated content does NOT need to be deleted from a company's social media site?

 

A.

Obscene language

 

B.

Postings regarding conspiracy theories

 

C.

Outbursts about topics not related to the site

 

D.

Graphic photographs

 

E.

Negative comments about an experience with the company

 

 

13. Which of the following is NOT a way organizations develop an effective SMIS?

 

A.

Define goals.

 

B.

Identify target audience.

 

C.

Define value.

 

D.

Identify success metrics.

 

E.

Use what other companies are using.

 

14. Some measures used by organizations to track the success of their use of social media are useless in terms of meaningful measurement. These measures are known as _________.

 

A.

target metrics

 

B.

vanity metrics

 

C.

bounce metrics

 

D.

key performance metrics

 

E.

user response metrics

 

15. A(n) ________ is used to identify the strengths and weaknesses in your competitor's use of social media.

 

A.

vanity metric

 

B.

online analytical tool

 

C.

social media provider

 

D.

success metric

 

E.

competitive analysis

 

 

16. When an organization utilizes a social media platform to enable its employees to work cooperatively, it is said to use a(n) ____________.

 

A.

personal social network

 

B.

employee social network

 

C.

internal social network

 

D.

enterprise social network

 

E.

collaborative social network

 

 

 

17. Which statement among the following is NOT one of the SLATES characteristics of Enterprise 2.0?

 

A.

Applications enable users to rate tagged content.

 

B.

Tagged content cannot be pushed to users.

 

C.

Flexible tagging results in folksonomies of enterprise content.

 

D.

Enterprise content is pushed to users based on subscriptions.

 

E.

People have more success searching than they do finding from structured content.

 

18. The use of information technology to support the sharing of content among users related by common interests is termed ________.

 

A.

social media

 

B.

common media

 

C.

networks

 

D.

social networks

 

E.

online communities

 

19. Facebook, LinkedIn, and Twitter are examples of ___________.

 

A.

social media users

 

B.

social media providers

 

C.

social media sponsors

 

D.

information systems

 

E.

communities of practice

 

20. The nature of social capital means that, figuratively, social capital equals ________.

 

A.

Number of Relationships + Relationship Strength + Entity Resources

 

B.

Number of Relationships / Relationship Strength / Entity Resources

 

C.

Number of Relationships < Relationship Strength < Entity Resources

 

D.

Number of Relationships

dash-

Relationship Strength

dash-

Entity Resources

 

E.

Number of Relationships x Relationship Strength x Entity Resources

 

 

21. A social media site chooses to relate to communities of users based on its goals. If the site is interested in pure publicity, it ________.

 

A.

competes with other sites for the attention of SM sponsors

 

B.

creates a viral hook to induce users to share communications

 

C.

endeavors to constrain the communications across tiers

 

D.

works with social media application providers to update the site features

 

E.

competes with other sites for the attention of user communities

 

 

22. A unique aspect of social media data is the presence of content data (user contributions) and _________ data (relationship data).

 

A.

partner

 

B.

connection

 

C.

relational

 

D.

network

 

E.

friend

 

23. Organizations have learned that they can strengthen their relationships with customers by:

 

A.

paying them a fee.

 

B.

providing a "frequent buyer" benefit.

 

C.

giving away coupons.

 

D.

tweeting about the customer.

 

E.

Answers

(118)
Status NEW Posted 16 Oct 2017 02:10 AM My Price 14.00

ISM------------ 3-----------011----------- In-----------fo -----------Sys-----------tem-----------s i-----------n O-----------rga-----------niz-----------ati-----------ons----------- (C-----------hap-----------ter----------- 5------------8) ----------- Me-----------ssa-----------ge -----------me -----------on -----------cha-----------t f-----------or -----------ans-----------wer----------- fi-----------le-----------

Not Rated(0)