Deck 8: Social Media Information Systems
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/91
العب
ملء الشاشة (f)
Deck 8: Social Media Information Systems
1
________ is the dynamic social media process of employing users to participate in product design or product redesign.
A) Social capitalization
B) Flexible product development
C) Crowdsourcing
D) Collaborative product development
A) Social capitalization
B) Flexible product development
C) Crowdsourcing
D) Collaborative product development
C
2
Social media ________ are the companies that operate the SM sites.
A) outlets
B) sponsors
C) application providers
D) newsrooms
A) outlets
B) sponsors
C) application providers
D) newsrooms
C
3
________ is the application of social media to facilitate the cooperative work of people inside organizations.
A) Enterprise relationship management
B) Enterprise resource planning
C) Enterprise 2.0
D) Enterprise application integration
A) Enterprise relationship management
B) Enterprise resource planning
C) Enterprise 2.0
D) Enterprise application integration
C
4
A ________ is a content structure that has emerged from the processing of many user tags.
A) metalanguage
B) chrome
C) folksonomy
D) bookmark
A) metalanguage
B) chrome
C) folksonomy
D) bookmark
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
5
With respect to the five components of social media information systems (SMIS),which of the following statements is true of SM sponsors?
A) They process SM sites using elastic, cloud-based servers.
B) They develop and operate their own custom, proprietary, social networking application software.
C) They need to be trained on both SMIS user procedures as well as on the organization's social networking policy.
D) Their procedures are informal, evolving, and socially oriented.
A) They process SM sites using elastic, cloud-based servers.
B) They develop and operate their own custom, proprietary, social networking application software.
C) They need to be trained on both SMIS user procedures as well as on the organization's social networking policy.
D) Their procedures are informal, evolving, and socially oriented.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
6
With respect to the five components of social media information systems (SMIS),which of the following statements is true of application providers?
A) They usually process SM sites using desktops, laptops, and smartphones.
B) They store and retrieve SM data on behalf of sponsors and user communities.
C) They employ browsers and native mobile applications to store and retrieve connection data.
D) Their procedures are informal, evolving, and socially oriented.
A) They usually process SM sites using desktops, laptops, and smartphones.
B) They store and retrieve SM data on behalf of sponsors and user communities.
C) They employ browsers and native mobile applications to store and retrieve connection data.
D) Their procedures are informal, evolving, and socially oriented.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following statements is true of seekers of truth?
A) They share a common belief and seek conformity.
B) They do not change their opinion when confronted with a contrary opinion.
C) They are effective for activities like sales and marketing.
D) They generally do not form bonds with an organization.
A) They share a common belief and seek conformity.
B) They do not change their opinion when confronted with a contrary opinion.
C) They are effective for activities like sales and marketing.
D) They generally do not form bonds with an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
8
Social media ________ create the features and functions of the site,and they compete with one another for the attention of user communities and SM sponsors.
A) application providers
B) collaborators
C) dashboards
D) outlets
A) application providers
B) collaborators
C) dashboards
D) outlets
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
9
________ is the use of information technology to support the sharing of content among networks of users.
A) Electronic data interchange
B) Data warehousing
C) Cloud computing
D) Social media
A) Electronic data interchange
B) Data warehousing
C) Cloud computing
D) Social media
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
10
________ is data and responses to data that are contributed by users and SM sponsors.
A) Connection data
B) Capital data
C) Content data
D) Custom data
A) Connection data
B) Capital data
C) Content data
D) Custom data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following statements is a characteristic of user communities?
A) Social Media (SM) user communities are mostly based on geographic and familial ties.
B) Most users of SM belong to several different user communities.
C) In community-SM site relationships, the relationships in second-tier communities are disassociated from first-tier users.
D) A viral hook is an inducement to constrain communications between user communities.
A) Social Media (SM) user communities are mostly based on geographic and familial ties.
B) Most users of SM belong to several different user communities.
C) In community-SM site relationships, the relationships in second-tier communities are disassociated from first-tier users.
D) A viral hook is an inducement to constrain communications between user communities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following statements is true about viral hooks?
A) It is used to restrain information leaks from an organization.
B) It is used to enhance an organization's privacy on its SM sites.
C) It is designed to root out users who post junk content on an organization's SM site.
D) It is an inducement to pass communication along the tiers of a community.
A) It is used to restrain information leaks from an organization.
B) It is used to enhance an organization's privacy on its SM sites.
C) It is designed to root out users who post junk content on an organization's SM site.
D) It is an inducement to pass communication along the tiers of a community.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
13
With respect to the five components of social media information systems (SMIS),which of the following statements is true of user communities?
A) They process SM sites using elastic, cloud-based servers.
B) They develop and operate their own custom social networking application software to read and submit data.
C) They need to be trained on both SMIS user procedures as well as on their organization's social networking policy.
D) Their procedures are informal, evolving, and socially oriented.
A) They process SM sites using elastic, cloud-based servers.
B) They develop and operate their own custom social networking application software to read and submit data.
C) They need to be trained on both SMIS user procedures as well as on their organization's social networking policy.
D) Their procedures are informal, evolving, and socially oriented.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
14
SM communities differ from regular communities because ________.
A) they are based on mutual interests of users
B) they are based only on organizational boundaries
C) most people belong to a single community
D) the total number of its users is determined by the sum of the sizes of all its communities
A) they are based on mutual interests of users
B) they are based only on organizational boundaries
C) most people belong to a single community
D) the total number of its users is determined by the sum of the sizes of all its communities
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
15
________ is data about relationships.
A) Connection data
B) Capital data
C) Content data
D) Communication data
A) Connection data
B) Capital data
C) Content data
D) Communication data
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following statements is a feature of social media application providers?
A) They do not support custom software for long durations as it is expensive.
B) They generally charge users a license fee to use their applications.
C) They use elastic, cloud-based servers to process SM sites.
D) They sponsor content on SM sites.
A) They do not support custom software for long durations as it is expensive.
B) They generally charge users a license fee to use their applications.
C) They use elastic, cloud-based servers to process SM sites.
D) They sponsor content on SM sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
17
According to McAfee's Enterprise 2.0 model,creating enterprise content via blogs,wikis,discussion groups,and presentations is part of ________.
A) signaling
B) authoring
C) tagging
D) searching
A) signaling
B) authoring
C) tagging
D) searching
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
18
Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites.
A) outlets
B) sponsors
C) application providers
D) dashboards
A) outlets
B) sponsors
C) application providers
D) dashboards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following statements is true of defenders of belief?
A) They seek conformity and want to convince others of the wisdom of their opinions.
B) Their communities do not facilitate activities like sales and marketing.
C) They are effective for activities that involve innovation and problem solving.
D) When confronted with contrary evidence, they change their opinion.
A) They seek conformity and want to convince others of the wisdom of their opinions.
B) Their communities do not facilitate activities like sales and marketing.
C) They are effective for activities that involve innovation and problem solving.
D) When confronted with contrary evidence, they change their opinion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following statements is true of social CRM?
A) The relationships between organizations and customers are unchanging.
B) Each customer crafts his or her own relationship with the company.
C) Sales managers can control what the customer is reading about a company and its products.
D) Customers who are likely to make the highest purchases are likely to receive the most attention.
A) The relationships between organizations and customers are unchanging.
B) Each customer crafts his or her own relationship with the company.
C) Sales managers can control what the customer is reading about a company and its products.
D) Customers who are likely to make the highest purchases are likely to receive the most attention.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
21
Both community users and employees of SM sponsors process SM sites using elastic,cloud-based servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
22
A social media sponsor cannot develop its own provider.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
23
A ________ is a statement that delineates employees' rights and responsibilities.
A) statement of purpose
B) bill of labor
C) social media policy
D) corporate datasheet
A) statement of purpose
B) bill of labor
C) social media policy
D) corporate datasheet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
24
Social media outlets are companies and other organizations that choose to support a presence on one or more SM sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
25
Google is an example of a social media application provider.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
26
Which of the following statements is true of social networking problems?
A) Responses to problematic content are best reserved for instances where it has caused the organization to do something positive.
B) Inappropriate contributions that contain obscene or otherwise inappropriate content should be ignored indefinitely.
C) The product development team should not receive the criticisms posted on a social networking site.
D) If the problematic content represents reasonable criticism of the organization's products, the best response is to delete it.
A) Responses to problematic content are best reserved for instances where it has caused the organization to do something positive.
B) Inappropriate contributions that contain obscene or otherwise inappropriate content should be ignored indefinitely.
C) The product development team should not receive the criticisms posted on a social networking site.
D) If the problematic content represents reasonable criticism of the organization's products, the best response is to delete it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
27
Social media is the use of information technology to support the sharing of content among networks of users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
28
A social media information system is an information system that supports the sharing of content among networks of users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
29
In McAfee's Enterprise 2.0 model,pushing enterprise content to users based on subscriptions and alerts is called ________.
A) signaling
B) authoring
C) tagging
D) searching
A) signaling
B) authoring
C) tagging
D) searching
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
30
Social media enables people to form hives,which refer to groups of people related by a common interest.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the following statements is true of social capital?
A) When a user creates content for an organization, the strength of the relationship increases.
B) Social capital does not depreciate.
C) Using relationships in social networks to influence decision makers decreases the value of social capital.
D) The strength of a relationship between two entities is determined by the number of relationships of each entity.
A) When a user creates content for an organization, the strength of the relationship increases.
B) Social capital does not depreciate.
C) Using relationships in social networks to influence decision makers decreases the value of social capital.
D) The strength of a relationship between two entities is determined by the number of relationships of each entity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
32
Social media application providers create the features and functions of the site,and they compete with one another for the attention of user communities and SM sponsors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
33
Being linked to a network of highly regarded contacts is a form of ________.
A) social credential
B) personal reinforcement
C) mobility
D) nepotism
A) social credential
B) personal reinforcement
C) mobility
D) nepotism
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
34
Which of the following statements is true of responding to social networking problems?
A) Deleting legitimate negative comments indicates that the site contains genuine user content.
B) Criticism of products on an SM site cannot be used for product development.
C) Responses to problematic content on the organization's SM site should be defensive.
D) Patronizing responses to comments from content contributors can generate a strong backlash.
A) Deleting legitimate negative comments indicates that the site contains genuine user content.
B) Criticism of products on an SM site cannot be used for product development.
C) Responses to problematic content on the organization's SM site should be defensive.
D) Patronizing responses to comments from content contributors can generate a strong backlash.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
35
Which of the following statements is true of social capital?
A) Social capital is the investment in human knowledge and skills for future profit.
B) The value of social capital is determined by the number of relationships in a social network.
C) Social capital can be gained by limiting the number of friends.
D) Being linked into social networks undermines a professional's image and position in an organization.
A) Social capital is the investment in human knowledge and skills for future profit.
B) The value of social capital is determined by the number of relationships in a social network.
C) Social capital can be gained by limiting the number of friends.
D) Being linked into social networks undermines a professional's image and position in an organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
36
In the context of management,________ means loss of control of employees.
A) transcendence
B) divergence
C) emergence
D) dependence
A) transcendence
B) divergence
C) emergence
D) dependence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
37
According to McAfee,Enterprise 2.0 workers want applications that enable them to rate tagged content and to use the tags to predict content that will be of interest to them: Which of the following characteristics of Enterprise 2.0 does this refer to?
A) search
B) links
C) signals
D) extensions
A) search
B) links
C) signals
D) extensions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
38
Social media sponsors are the companies that operate the SM sites.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
39
SM sponsors employ browsers and native mobile applications to read and submit data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following statements is true of using social media to advance organizational strategy?
A) The unpredictability of dynamic processes like social media is encouraged in supply chains.
B) Solving supply chain problems via social media reinforces an organization's sense of privacy.
C) Users who have no financial incentive are willing to provide reviews to the buyer community.
D) Organizations whose business strategy involves selling to developer networks are the last to adopt SM-based customer support.
A) The unpredictability of dynamic processes like social media is encouraged in supply chains.
B) Solving supply chain problems via social media reinforces an organization's sense of privacy.
C) Users who have no financial incentive are willing to provide reviews to the buyer community.
D) Organizations whose business strategy involves selling to developer networks are the last to adopt SM-based customer support.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
41
SM sponsors do not require training on social media information systems (SMIS)user procedures to contribute to their organization's SM site.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
42
SM application providers store and retrieve SM data on behalf of sponsors and user communities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
43
Seekers of the truth share a common desire to learn something,solve a problem,or make something happen.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
44
Seekers-of-the-truth communities are not likely to provide solutions to complex supply chain problems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
45
Defenders-of-belief communities are well-suited for activities that involve innovation or problem solving.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
46
Connection data differentiates social media information systems (SMIS)from Web site applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
47
The application of social media to facilitate the cooperative work of people inside organizations is called enterprise resource planning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
48
When confronted with contrary evidence,defenders of belief change their opinion.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
49
According to McAfee's Enterprise 2.0 model,creating enterprise content via blogs,wikis,discussion groups,and presentations is part of authoring.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
50
In social CRM,since the relationships between organizations and customers emerge from joint activity,customers have as much control as companies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
51
According to McAfee,Enterprise 2.0 workers prefer to navigate content structures rather than searching for content.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
52
Both Web sites and social networking sites present user and responder content,but only social networking applications store and process connection data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
53
Employees who contribute to and manage social networking sites will generate direct labor costs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
54
In social CRM,relationships between organizations and customers are fixed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
55
SM application providers develop and operate their own custom,proprietary,social networking application software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
56
Enterprise 2.0 content is tagged differently from the content on the Web.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
57
For SM sponsors,social networking procedures are informal,evolving,and socially oriented.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
58
Crowdsourcing is the dynamic social media process of employing users to participate in product design or product redesign.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
59
Defenders-of-belief communities facilitate activities like sales and marketing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
60
Content data is data about relationships.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
61
Social capital is the investment in human knowledge and skills for future profit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
62
Explain the software component of social media information systems (SMIS)with respect to each of the three organizational roles.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
63
Social capital can be gained by limiting the number of friends.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
64
To an organization,the strength of a relationship is the likelihood that the entity in the relationship will do something that benefits the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
65
What are social media sponsors?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
66
What are social media application providers?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
67
A social media policy is a statement that delineates employees' rights and responsibilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
68
Since the benefits of Enterprise 2.0 result from emergence,there is no way to control for either effectiveness or efficiency.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
69
A folksonomy is content structure that has emerged from processing many user tags.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
70
Being linked to a network of highly regarded contacts is a form of social credential.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
71
Explain the data component of social media information systems (SMIS).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
72
In the context of management,transcendence means loss of control of employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
73
If a reasoned,nondefensive response generates continued and unreasonable user-generated content from that same source,it is best for the organization to delete it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
74
According to McAfee's Enterprise 2.0 model,pushing enterprise content to users based on subscriptions and alerts is part of tagging.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
75
Capital is defined as the investment of resources for future profit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
76
In the context of Customer Relationship Management (CRM),social media means that the vendor loses control of the customer relationship.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
77
According to McAfee's Enterprise 2.0 model,the process in which workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them is called extensions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
78
Explain the hardware component of social media information systems (SMIS)with respect to each of the three organizational roles.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
79
What is social media?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck
80
The value of social capital is determined by the number of relationships in a social network,by the strength of those relationships,and by the resources controlled by those related.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 91 في هذه المجموعة.
فتح الحزمة
k this deck

