Deck 8: Social Media Information Systems

Full screen (f)
exit full mode
Question
Social networking procedures are more informal for SM sponsors than they are for social networking users.
Use Space or
up arrow
down arrow
to flip the card.
Question
SM sponsors contribute to the site via browsers or by using specialized sponsor applications provided by the SM application provider.
Question
Content data is data and responses to data that are contributed by users and SM sponsors.
Question
Users employ browsers and client applications to read and submit data and to add and remove connections to communities and other users.
Question
Content data differentiates SMIS from Web site applications.
Question
A viral hook is something that induces people to share a message with others.
Question
Facebook, Twitter, LinkedIn, and Google are all SM application providers.
Question
Social media is the use of information technology to support the sharing of content among networks of users.
Question
Defenders-of-belief communities are highly effective for activities that involve innovation or problem solving.
Question
Social media sponsors are the companies that operate the SM sites.
Question
Only social networking sites present user and responder content, but both Web sites and social networking applications store and process connection data.
Question
Before initiating a social networking presence, organizations must develop procedures for creating content, managing user responses, removing obsolete or objectionable content, and extracting value from content.
Question
Social media application providers are companies and other organizations that choose to support a presence on one or more SM sites.
Question
SM communities are formed based on mutual interests and transcend familial, geographic, and organizational boundaries.
Question
Seekers-of-the-truth communities facilitate activities like sales and marketing.
Question
The primary risk of peer-to-peer support is loss of control.
Question
Both community users and employees of SM sponsors process SM sites using intelligent communications devices.
Question
Defenders of belief are communities that share a common belief and form their hive around that belief.
Question
Social CRM is a dynamic, SM-based CRM process.
Question
Social CRM is centered on lifetime value; customers that are likely to generate the most business get the most attention and have the most impact on the organization.
Question
Seekers of the truth will seek the truth, even if that means recommending another vendor's product over yours.
Question
Defenders-of-belief communities provide better and faster problem solutions to complex supply chain problems.
Question
According to Henk Flap, the value of social capital is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.
Question
An active lurker is someone who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium.
Question
Social capital does not depreciate.
Question
The multiplicative nature of social capital means that a huge network of relationships to people who have few resources may be lower than that of a smaller network with people with substantial resources.
Question
When you attend a business function for the purpose of meeting people and reinforcing relationships, you are investing in your social capital.
Question
Key users submit ideas and responses to nonkey users for publication in communities.
Question
Google, Amazon.com, and eBay exemplify traditional processing.
Question
According to Gossieaux and Moran's model of the hyper-social organization, channels transmit knowledge, whereas networks transmit data.
Question
Outsourcing is the dynamic social media process of employing users to participate in product design or product redesign.
Question
Web 2.0 applications are characterized by frequent releases of thick-client applications.
Question
An organization has a strong relationship with you if you buy its products and write positive reviews about it.
Question
Enterprise 2.0 is the application of social media to facilitate the cooperative work of people inside organizations.
Question
Unlike humans, organizations do not have social capital.
Question
Human capital is the investment in social relations with the expectation of returns in the marketplace.
Question
In Web 2.0 processing, business models rely on the sale of software licenses.
Question
A hyper-social organization is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.
Question
Web 2.0 generally refers to a loose grouping of capabilities, technologies, business models, and philosophies.
Question
A folksonomy is content structure that has emerged from the processing of many user tags.
Question
The first step that any hyper-organization should take is to develop and publicize UGC.
Question
If a reasoned, nondefensive response generates continued and unreasonable UGC from that same source, it is best to respond to the problematic content.
Question
________ is data and responses to data that are contributed by users and SM sponsors.

A) Networking data
B) Content data
C) Connection data
D) User-generated data
Question
Web 2.0 interfaces carefully control the users' experience.In contrast, traditional interfaces are organic.
Question
A characteristic of Web 2.0 is that the value of a site increases with users and use.
Question
A(n)________ is an IS that supports the sharing of content among networks of users.

A) DSS
B) SMIS
C) ERP
D) TPS
Question
________ are the companies that operate the SM sites.

A) SM application providers
B) SM sponsors
C) SM client servers
D) SM consultants
Question
User-generated content (UGC)is the essence of SM relationships.
Question
Emergence in the context of management means loss of control of employees.
Question
A ________ is an inducement for passing the message along through the tiers.

A) motif
B) viral hook
C) folksonomy
D) protocol
Question
Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites.

A) application providers
B) sponsors
C) blogs
D) users
Question
The first task in managing social networking risk is to know the sources of potential problems and to monitor sites for problematic content.
Question
One of the major sources of UGC problems is inappropriate content.
Question
Which of the following is an SM application provider?

A) Oracle
B) SAP
C) McAfee
D) LinkedIn
Question
Deleting content on user-generated content sites should be reserved for contributions that criticize a firm's products or services.
Question
SM communities differ from communities in the past because they are ________.

A) formed based on family relationships
B) limited by geographic location
C) formed based on mutual interests
D) limited by organizational boundaries
Question
Most SM applications earn revenue through ________.

A) selling license to their applications
B) merchandising
C) a type of advertising model
D) viral marketing
Question
Google pioneered Web 2.0 advertising.With its AdWords software, vendors pay a certain amount for particular search words.
Question
In the context of CRM, hyper-social means that the vendor gains control of the customer relationship.
Question
________ is the use of information technology to support the sharing of content among networks of users.

A) Social media
B) Content publishing
C) Networking
D) Programming
Question
A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true.When confronted with contrary evidence, the group members do not change their opinion.According to Gossieaux and Moran, this is an example of a ________ community.

A) defenders-of-belief
B) seekers-of-the-truth
C) heterogeneous
D) cloud
Question
In McAfee's SLATES Enterprise 2.0 model, "L" is for ________.

A) LAN
B) links
C) language
D) leader
Question
________ is the application of social media to facilitate the cooperative work of people inside organizations.

A) Enterprise 2.0
B) Enterprise resource planning
C) Enterprise application integration
D) Enterprise architecture
Question
Which of the following statements is true of social CRM?

A) Customers that are likely to generate the most business get the most attention and have the most impact on the organization.
B) The relationships between organizations and customers emerge in a structured process as only the organization creates and processes content.
C) Each customer crafts his or her own relationship with the company.
D) Though relationships emerge from joint activity, companies have a lot more control than the customers.
Question
________ differentiates SMIS from Web site applications.

A) Networking data
B) Content data
C) Connection data
D) User-generated data
Question
Defenders-of-belief communities facilitate activities like ________.

A) customer service
B) manufacturing and operations
C) inbound logistics
D) sales and marketing
Question
A student invests money and time in taking a business administration course.In this example, the student invests in ________.

A) human capital
B) social capital
C) functional capital
D) mechanical capital
Question
When a student attends a business function for the purpose of meeting people and reinforcing relationships, he is investing in ________ capital.

A) human
B) technical
C) social
D) mechanical
Question
According to McAfee, pushing enterprise content to users based on subscriptions and alerts is part of ________.

A) signals
B) search
C) links
D) authoring
Question
The primary risk of peer-to-peer support is ________.

A) loss of control
B) loss of credibility
C) lack of privacy
D) increase in expenses
Question
Which of the following is a risk associated with human resources using social media to form conclusions about employees?

A) loss of privacy
B) loss of control
C) decrease in efficiency
D) possibility of error
Question
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?

A) social capital
B) human capital
C) industrial capital
D) mechanical capital
Question
Which of the following activities would seekers of the truth facilitate?

A) human resources
B) operations
C) marketing
D) sales
Question
Which of the following is a significant risk of using social media for inbound and outbound logistics?

A) loss of control
B) loss of credibility
C) loss of privacy
D) loss of effectiveness
Question
Which of the following statements is true of defenders-of-belief communities?

A) They are open to changing their belief when confronted with contrary evidence.
B) They are very effective for activities that involve innovation or problem solving.
C) They are useful in customer service activities.
D) They seek conformity and want to convince others of the wisdom of their belief.
Question
A ________ is content structure that has emerged from the processing of many user tags.

A) mashup
B) taxonomy
C) folksonomy
D) microblogging
Question
According to Gossieaux and Moran, ________ share a common desire to learn something, solve a problem, or make something happen.

A) defenders of belief
B) advocates of philosophy
C) supporters of fidelity
D) seekers of the truth
Question
________ is the dynamic social media process of employing users to participate in product design or product redesign.

A) Crowdsourcing
B) Microblogging
C) Publishing
D) Tweeting
Question
In McAfee's SLATES Enterprise 2.0 model, "A" is for ________.

A) avatar
B) Ajax
C) authoring
D) affiliation
Question
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.

A) links
B) authoring
C) signals
D) extensions
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/121
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Social Media Information Systems
1
Social networking procedures are more informal for SM sponsors than they are for social networking users.
False
2
SM sponsors contribute to the site via browsers or by using specialized sponsor applications provided by the SM application provider.
True
3
Content data is data and responses to data that are contributed by users and SM sponsors.
True
4
Users employ browsers and client applications to read and submit data and to add and remove connections to communities and other users.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
5
Content data differentiates SMIS from Web site applications.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
6
A viral hook is something that induces people to share a message with others.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
7
Facebook, Twitter, LinkedIn, and Google are all SM application providers.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
8
Social media is the use of information technology to support the sharing of content among networks of users.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
9
Defenders-of-belief communities are highly effective for activities that involve innovation or problem solving.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
10
Social media sponsors are the companies that operate the SM sites.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
11
Only social networking sites present user and responder content, but both Web sites and social networking applications store and process connection data.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
12
Before initiating a social networking presence, organizations must develop procedures for creating content, managing user responses, removing obsolete or objectionable content, and extracting value from content.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
13
Social media application providers are companies and other organizations that choose to support a presence on one or more SM sites.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
14
SM communities are formed based on mutual interests and transcend familial, geographic, and organizational boundaries.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
15
Seekers-of-the-truth communities facilitate activities like sales and marketing.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
16
The primary risk of peer-to-peer support is loss of control.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
17
Both community users and employees of SM sponsors process SM sites using intelligent communications devices.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
18
Defenders of belief are communities that share a common belief and form their hive around that belief.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
19
Social CRM is a dynamic, SM-based CRM process.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
20
Social CRM is centered on lifetime value; customers that are likely to generate the most business get the most attention and have the most impact on the organization.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
21
Seekers of the truth will seek the truth, even if that means recommending another vendor's product over yours.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
22
Defenders-of-belief communities provide better and faster problem solutions to complex supply chain problems.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
23
According to Henk Flap, the value of social capital is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
24
An active lurker is someone who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
25
Social capital does not depreciate.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
26
The multiplicative nature of social capital means that a huge network of relationships to people who have few resources may be lower than that of a smaller network with people with substantial resources.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
27
When you attend a business function for the purpose of meeting people and reinforcing relationships, you are investing in your social capital.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
28
Key users submit ideas and responses to nonkey users for publication in communities.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
29
Google, Amazon.com, and eBay exemplify traditional processing.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
30
According to Gossieaux and Moran's model of the hyper-social organization, channels transmit knowledge, whereas networks transmit data.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
31
Outsourcing is the dynamic social media process of employing users to participate in product design or product redesign.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
32
Web 2.0 applications are characterized by frequent releases of thick-client applications.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
33
An organization has a strong relationship with you if you buy its products and write positive reviews about it.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
34
Enterprise 2.0 is the application of social media to facilitate the cooperative work of people inside organizations.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
35
Unlike humans, organizations do not have social capital.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
36
Human capital is the investment in social relations with the expectation of returns in the marketplace.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
37
In Web 2.0 processing, business models rely on the sale of software licenses.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
38
A hyper-social organization is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
39
Web 2.0 generally refers to a loose grouping of capabilities, technologies, business models, and philosophies.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
40
A folksonomy is content structure that has emerged from the processing of many user tags.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
41
The first step that any hyper-organization should take is to develop and publicize UGC.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
42
If a reasoned, nondefensive response generates continued and unreasonable UGC from that same source, it is best to respond to the problematic content.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
43
________ is data and responses to data that are contributed by users and SM sponsors.

A) Networking data
B) Content data
C) Connection data
D) User-generated data
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
44
Web 2.0 interfaces carefully control the users' experience.In contrast, traditional interfaces are organic.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
45
A characteristic of Web 2.0 is that the value of a site increases with users and use.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
46
A(n)________ is an IS that supports the sharing of content among networks of users.

A) DSS
B) SMIS
C) ERP
D) TPS
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
47
________ are the companies that operate the SM sites.

A) SM application providers
B) SM sponsors
C) SM client servers
D) SM consultants
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
48
User-generated content (UGC)is the essence of SM relationships.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
49
Emergence in the context of management means loss of control of employees.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
50
A ________ is an inducement for passing the message along through the tiers.

A) motif
B) viral hook
C) folksonomy
D) protocol
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
51
Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites.

A) application providers
B) sponsors
C) blogs
D) users
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
52
The first task in managing social networking risk is to know the sources of potential problems and to monitor sites for problematic content.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
53
One of the major sources of UGC problems is inappropriate content.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following is an SM application provider?

A) Oracle
B) SAP
C) McAfee
D) LinkedIn
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
55
Deleting content on user-generated content sites should be reserved for contributions that criticize a firm's products or services.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
56
SM communities differ from communities in the past because they are ________.

A) formed based on family relationships
B) limited by geographic location
C) formed based on mutual interests
D) limited by organizational boundaries
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
57
Most SM applications earn revenue through ________.

A) selling license to their applications
B) merchandising
C) a type of advertising model
D) viral marketing
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
58
Google pioneered Web 2.0 advertising.With its AdWords software, vendors pay a certain amount for particular search words.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
59
In the context of CRM, hyper-social means that the vendor gains control of the customer relationship.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
60
________ is the use of information technology to support the sharing of content among networks of users.

A) Social media
B) Content publishing
C) Networking
D) Programming
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
61
A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true.When confronted with contrary evidence, the group members do not change their opinion.According to Gossieaux and Moran, this is an example of a ________ community.

A) defenders-of-belief
B) seekers-of-the-truth
C) heterogeneous
D) cloud
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
62
In McAfee's SLATES Enterprise 2.0 model, "L" is for ________.

A) LAN
B) links
C) language
D) leader
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
63
________ is the application of social media to facilitate the cooperative work of people inside organizations.

A) Enterprise 2.0
B) Enterprise resource planning
C) Enterprise application integration
D) Enterprise architecture
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following statements is true of social CRM?

A) Customers that are likely to generate the most business get the most attention and have the most impact on the organization.
B) The relationships between organizations and customers emerge in a structured process as only the organization creates and processes content.
C) Each customer crafts his or her own relationship with the company.
D) Though relationships emerge from joint activity, companies have a lot more control than the customers.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
65
________ differentiates SMIS from Web site applications.

A) Networking data
B) Content data
C) Connection data
D) User-generated data
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
66
Defenders-of-belief communities facilitate activities like ________.

A) customer service
B) manufacturing and operations
C) inbound logistics
D) sales and marketing
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
67
A student invests money and time in taking a business administration course.In this example, the student invests in ________.

A) human capital
B) social capital
C) functional capital
D) mechanical capital
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
68
When a student attends a business function for the purpose of meeting people and reinforcing relationships, he is investing in ________ capital.

A) human
B) technical
C) social
D) mechanical
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
69
According to McAfee, pushing enterprise content to users based on subscriptions and alerts is part of ________.

A) signals
B) search
C) links
D) authoring
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
70
The primary risk of peer-to-peer support is ________.

A) loss of control
B) loss of credibility
C) lack of privacy
D) increase in expenses
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following is a risk associated with human resources using social media to form conclusions about employees?

A) loss of privacy
B) loss of control
C) decrease in efficiency
D) possibility of error
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
72
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?

A) social capital
B) human capital
C) industrial capital
D) mechanical capital
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following activities would seekers of the truth facilitate?

A) human resources
B) operations
C) marketing
D) sales
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
74
Which of the following is a significant risk of using social media for inbound and outbound logistics?

A) loss of control
B) loss of credibility
C) loss of privacy
D) loss of effectiveness
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
75
Which of the following statements is true of defenders-of-belief communities?

A) They are open to changing their belief when confronted with contrary evidence.
B) They are very effective for activities that involve innovation or problem solving.
C) They are useful in customer service activities.
D) They seek conformity and want to convince others of the wisdom of their belief.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
76
A ________ is content structure that has emerged from the processing of many user tags.

A) mashup
B) taxonomy
C) folksonomy
D) microblogging
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
77
According to Gossieaux and Moran, ________ share a common desire to learn something, solve a problem, or make something happen.

A) defenders of belief
B) advocates of philosophy
C) supporters of fidelity
D) seekers of the truth
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
78
________ is the dynamic social media process of employing users to participate in product design or product redesign.

A) Crowdsourcing
B) Microblogging
C) Publishing
D) Tweeting
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
79
In McAfee's SLATES Enterprise 2.0 model, "A" is for ________.

A) avatar
B) Ajax
C) authoring
D) affiliation
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
80
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.

A) links
B) authoring
C) signals
D) extensions
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 121 flashcards in this deck.