MIS 101 FINAL EXAM- Social Media Information Systems

Your page rank:

Total word count: 2068
Pages: 8

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

________ is the use of information technology to support the sharing of content among networks of users.
A) Social media
B) Content publishing
C) Multimedia
D) Programming

A

A ________ is an information system that supports the sharing of content among networks of users.
A) human resource information system (HRIS)
B) social media information system (SMIS)
C) database management system (DBMS)
D) transaction processing system (TPS)

B

Social media (SM) communities differ from communities in the past because SM communities are ________.
A) formed based on family relationships
B) limited by geographic location
C) formed based on mutual interests
D) limited by organizational boundaries

C

A(n) ________ is an inducement to social media users for passing communications along through different tiers of communities in social media.
A) network motif
B) viral hook
C) folksonomy
D) internet site

B

Social ________ provide platforms that enable the creation of social networks, or social relationships among people with common interests.
A) media providers
B) media sponsors
C) welfare organizers
D) application providers

A

Social media (SM) providers host the SM presence using ________ in the cloud.
A) elastic servers
B) proxy servers
C) vanity metrics
D) viral hooks

A

Which of the following is a social media (SM) application provider?
A) Oracle
B) SAP
C) McAfee
D) LinkedIn

D

Data and responses to data that are contributed to social media (SM) sites by users and SM sponsors are referred to as ________.
A) secondary data
B) content data
C) connection data
D) continuous data

B

The storage of ________ differentiates social media information systems (SMIS) from Web site applications.
A) secondary data
B) content data
C) connection data
D) continuous data

C

) Which of the following is a dynamic, social media-based CRM process?
A) social CRM
B) human resource CRM
C) media CRM
D) traditional CRM

A

Social CRM is a(n) ________ process.
A) structured and controlled
B) uncontrolled but structured
C) unstructured but controlled
D) unstructured and uncontrolled

D

________ activities are supported by structured process.
A) Operations and manufacturing
B) Sales and marketing
C) Media and human resource
D) Media and customer service

A

Which of the following statements is true about social CRM?
A) Customers likely to generate the most business get the most attention from the organization.
B) All the customer relationship processes in social CRM are structured and controlled.
C) Each customer crafts his or her own relationship with the company.
D) Though relationships emerge from joint activity, companies control the customers.

C

The primary risk of peer-to-peer support in the context of social media and customer service is ________.
A) loss of control
B) loss of credibility
C) lack of privacy
D) lack of investment

A

Which of the following is a significant risk of using social media for inbound and outbound logistics?
A) loss of control
B) loss of credibility
C) loss of privacy
D) loss of effectiveness

C

________ is the dynamic social media process of employing users to participate in product design or product redesign.
A) Crowdsourcing
B) Outsourcing
C) Homesourcing
D) Showrooming

A

Which of the following is a risk associated with using social media in human resources to form conclusions about employees?
A) loss of privacy of the employees
B) loss of control over the employees
C) decrease in efficiency of the evaluation process
D) possibility of error on the site

D

Which of the following terms refers to the investment of resources for future profit?
A) capital
B) interest
C) loan
D) cash flow

A

________ is the investment in social relations with the expectation of returns in the marketplace.
A) Social capital
B) Social stock
C) Market stock
D) Media capital

A

A student invests money and time in a business administration course. In this example, the student invests in ________.
A) human capital
B) social capital
C) structural capital
D) process capital

A

When a student attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her ________.
A) human capital
B) process capital
C) social capital
D) structural capital

C

According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?
A) social capital
B) human capital
C) structural capital
D) process capital

A

According to Nan Lin, social networks provide four forms of value: information, social credentials, personal reinforcement, and ________.
A) monetary benefit
B) popularity
C) influence
D) security

C

Being linked to a network of highly regarded contacts is a form of ________.
A) social credential
B) viral marketing
C) crowdsourcing
D) human capital

A

According to Henk Flap, the ________ is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.
A) strength of a viral hook
B) value of social capital
C) strength of dimensionality
D) value of human capital

B

To an organization, the ________ is the likelihood that an entity in a relationship will do something that benefits the organization.
A) metric of a relationship
B) strength of a relationship
C) value of human capital
D) customer lifetime value

B

Which of the following best represents the value of social capital?
A) Number of Relationships × Relationship Strength × Entity Resources
B) Entity Resources – (Number of Relationships + Relationship Strength)
C) Number of Relationships – Relationship Strength – Entity Resources
D) (Number of Relationships × Relationship Strength) / Entity Resources

A

Which of the following observations regarding the value of social capital is true?
A) A huge network of relationships with people who have few resources is of greater value than a smaller network of people with substantial resources.
B) People should ideally ignore entity assets and try to connect to more people with stronger relationships.
C) Social capital depreciates and such depreciation can be ameliorated by adding something of value to interactions.
D) The value of social capital is best expressed as the summation of the number of relationships in a social network and the resources controlled by those related.

C

Which of the following revenue models offers advertisers to display ads to potential customers for free and pay only when the customer clicks?
A) pay-per-click model
B) freemium model
C) data model
D) click-free model

A

The term ________ means the more people use a site, the more value it has, and the more people will visit.
A) par value
B) vendor’s value
C) enterprise use value
D) use increases value

D

The ________ revenue model offers users a basic service for free, and then charges a premium for upgrades or advanced features.
A) freemium
B) pay-per-click
C) licensing
D) premium

A

Most social media companies rely on ________ for revenue.
A) advertising
B) software license fees
C) venture capital
D) controlled, fixed interfaces

A

The ________ revenue model successfully emerged on PC devices where there is plenty of space for lots of ads
A) ad click
B) data
C) click-free
D) ad pay

A

Which of the following is true of online ad revenue?
A) Mobile ad clicks are more effective, on average, than PC clicks.
B) Advertisers can find out who responds to ads but not how strongly.
C) One of the principal means of attracting viewers is to provide low-cost content.
D) Most ads on social media generate revenue only when customers click on them.

D

Which of the following revenue models for social media is most likely followed by companies providing Web 2.0 services?
A) traditional marketing
B) pay-per-click
C) user participation
D) venture capital

B

________ measures the frequency that someone who clicks on an ad makes a purchase, "Likes" a site, or takes some other action desired by the advertiser.
A) Pay-per-click
B) Conversion rate
C) Folksonomy
D) Enterprise 2.0

B

The first step in developing a social media information system (SMIS) is to ________.
A) define the goals of the organization
B) identify the metrics
C) identify the target audience
D) define the value of the organization

A

________ are measurements used to track performance of an organization.
A) Units
B) Metrics
C) Attributes
D) Assets

B

________ metrics keep track of goals achieved by an organization.
A) Success
B) Vanity
C) Performance
D) Scalar

A

Success metrics are also known as ________.
A) key performance indicators (KPI)
B) performance scale identifiers (PSI)
C) vanity metrics
D) conversion rates

A

Metrics that don’t improve one’s decision making skills are commonly referred to as ________ metrics.
A) success
B) failure
C) vanity
D) viral

C

Which of the following is an example of an analytical tool?
A) Facebook Page Insights
B) WinRunner
C) FileMaker Pro
D) Pidgin

A

A(n) ________ is a software platform that uses social media to facilitate co-operative work of people within an organization.
A) enterprise social network (ESN)
B) organization net-application (ONAP)
C) Webapp
D) virtual private network (VPN)

A

________ is the application of social media to facilitate the cooperative work of people inside organizations.
A) Enterprise 2.0
B) Enterprise resource planning
C) Enterprise application integration
D) Enterprise architecture

A

The characteristics of McAfee’s Enterprise 2.0 model are given by the acronym SLATES; L in SLATES stands for ________.
A) local network
B) links
C) language
D) leader

B

The characteristics of McAfee’s Enterprise 2.0 model are given by the acronym SLATES; A in SLATES stands for ________.
A) auditing
B) alerts
C) authoring
D) announcements

C

A ________ is content structure that has emerged from the processing of many user tags in social media.
A) mashup
B) taxonomy
C) folksonomy
D) viral hook

C

According to McAfee, pushing enterprise content to users based on subscriptions and alerts is a characteristic of the ________ component of Enterprise 2.0.
A) signals
B) search
C) links
D) authoring

A

Which of the following components of McAfee’s Enterprise 2.0 Model involves the creation of enterprise content via blogs, wikis, discussion groups, presentations, and other social media platforms?
A) search
B) author
C) extension
D) signal

B

Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.
A) links
B) authoring
C) signals
D) extensions

D

The first step that any organization should take to manage the risk of employee communication is to develop and publicize a(n) ________ policy.
A) human resource
B) insurance
C) corporate social responsibility
D) social media

D

A social media policy used by an organization is a statement that ________.
A) delineates employees’ rights and responsibilities
B) lists a firm’s products and services that are advertised on social media
C) lists the social and environmental effects of a company’s economic actions
D) defines the type of medium and channel an organization uses on a social media site

A

The more technical an organization, the ________ the social policies.
A) less important
B) more stringent
C) more lenient
D) less open

C

________, which refers to the matter on a social media (SM) site that is contributed by users, is the essence of SM relationships.
A) User-generated content
B) Folksonomy
C) Secondary data
D) Continuous data

A

________ are an extension of bad reviews.
A) Mutinous movements
B) Vanity metrics
C) Critic’s comments
D) Viral hooks

A

If the content posted on a social networking site represents reasonable criticism of an organization’s products or services, the best response would most likely be to ________.
A) leave it
B) edit it
C) delete it
D) report it

A

Responding to problematic content on social networking sites is best reserved for when the problematic content ________.
A) is obscene and inappropriate
B) does not affect the site where the content has been posted
C) represents reasonable criticism of an organization’s products or services
D) has caused an organization to do something positive as a result

D

Deleting problematic content on social networking sites is best reserved for content that is ________.
A) grammatically incorrect
B) obscene and inappropriate
C) legitimate but negative
D) contributed by a layperson

B

In 2025, emergence in the context of management would most likely mean a(n) ________.
A) loss of control over employees
B) loss of loyal customers
C) increase in the use of social media for managing employees
D) increase in the control over culturally diverse customers

A

In the context of CRM, which of the following statements is true about the foreseen changes and developments by the year 2025?
A) Vendors might lose control of customer relationship.
B) Organizations might lose control over employees.
C) The use of social media for managing employees will be static.
D) The control over culturally-diverse customers would be lost.

A

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending