MIS MC quiz ch8.txt

  1. The U.S. Census Bureau, which publishes statistics on e-commerce activity, defines nonmerchant companies as ________.



    B) those that arrange for the purchase and sale of goods without ever owning the goods
  2. ________ take title to the goods they sell.



    D) Merchant companies
  3. Which of the following is an e-commerce merchant company?



    A) B2C
  4. Traditional B2C information systems rely on ________ that customers use to enter and manage their orders.



    B) Web storefronts
  5. Which of the following is the best-known auction company?



    B) eBay
  6. Clearinghouses ________.



    B) provide goods and services at a stated price
  7. E-commerce leads to ________, which is the elimination of middle layers of distributors and suppliers.



    B) disintermediation
  8. Price elasticity measures the ________.



    A) amount that demand rises or falls with changes in price
  9. In the context of e-commerce market efficiencies, managing prices by direct interaction with the customer aids in the knowledge of ________.



    A) price elasticity
  10. E-commerce ________



    C) increases the possibility of price conflict
  11. Which one of the following characteristics is true for companies such as Google, Amazon.com, and eBay that exemplify Web 2.0?



    C) viral marketing
  12. If a product requires advertising to be successful, then it is not a Web 2.0 product. Keeping this in mind, which one of the following products requires extensive advertising to be successful?



    B) Microsoft
  13. Web 2.0 applications are thin clients. What does this imply?



    B) Web servers download these programs as code within HTML.
  14. The Web 2.0 business model relies on ________.



    B) advertising
  15. Software as a service clashes with the software model used by traditional software vendors, such as Microsoft, Oracle, and SAP. Traditional software vendors depend on ________.



    D) software license fees
  16. In the Web 2.0 world software is provided ________.



    C) as a free service
  17. A characteristic of Web 2.0 is that the value of a Web site increases ________.



    C) with users and use
  18. Web 2.0 encourages ________, which occur(s) when the output from two or more Web sites is combined into a single user experience.



    D) mashups
  19. Who pioneered Web 2.0 advertising?



    A) Google
  20. Business literature defines three types of capital. Karl Marx defined capital as the investment of resources for future profit. This traditional definition refers to investments into resources such as________.



    A) factories and machines
  21. By taking an academic course, you are investing in your own ________ capital. You are investing your money and time to obtain knowledge that you hope will differentiate you from other workers and ultimately give you a wage premium in the workforce.



    D) human
  22. When you attend a business function for the purpose of meeting people and reinforcing relationships, you are investing in your ________ capital.



    C) social
  23. According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?



    D) social capital
  24. Being linked to a network of highly regarded contacts is a form of social ________.



    B) credential
  25. According to Henk Flap, the ________ is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.



    D) value of social capital
  26. The term ________ refers to any activity that an entity (individual, project, or organization) takes with entities with which it is related.



    D) social networking
  27. The Web 2.0 world does not rely on marketing. New product features are released and vendors wait for users to spread the news to one another, one friend sending a message to many friends; most of whom send that message, in turn, to their friends. The something that induces people to share your message is called a ________.



    C) viral hook
  28. To an organization, the ________ is the likelihood that an entity (person or other organization) in the relationship will do something that benefits the organization.



    C) strength of a relationship
  29. How can a firm use social networks to increase the strength of its relationships?



    D) By encouraging the creation of User-Generated-Content.
  30. Traditional capital ________.



    D) depreciates
  31. Social capital does depreciate, but such depreciation can be ameliorated by ________.



    B) adding something of value to the interaction
  32. Which of the following best represents the value of social capital?



    B) NumberRelationships * RelationshipStrength * EntityResources
  33. Which of the following observations is true?



    B) Most organizations today ignore the value of entity assets and simply try to connect to more people with stronger relationships.
  34. Social networking groups can be of three types. The group that anyone can find by searching, and anyone can join it is a(n) ________ group.



    B) public
  35. Social networking groups can be of three types. An invitation group ________.



    B) can be found by searching
  36. Social networking groups can be of three types. The group that cannot be found by searching, and members must be invited to join is a(n) ________ group.



    B) private
  37. Social networking applications run on servers provided by ________.



    A) the application's creator
  38. A(n) ________ is a network of relationships.



    D) social graph
  39. Meaningful social networking applications ________.



    B) address real needs
  40. ________ is a Web 2.0 application that allows users to publish 140-character descriptions of anything.



    D) Twitter
  41. A ________ is a Web site on which users can publish their opinions, just like a Web blog, but the opinions are restricted to small amounts of text.



    D) microblog
  42. Which of the following is true about microblogging?



    D) It isn't necessary to spell correctly.
  43. Microblogging enables ________ publishing, worldwide.



    D) two-way
  44. One of the applications of microblogging in business is ________.



    B) public relations
  45. Social networking in general and microblogging in particular are all about relationships - forming new relationships and strengthening existing ones. Such relationships can serve as an ideal channel for sales. But experience has shown that ________ are ineffective when microblogging.



    C) pure sales pitches
  46. "Product ratings and surveys have been used for years. Product opinions are also common. Recent research indicates that ratings and opinions of fellow customers are far more trusted than any advertising." This statement refers to types of ________.



    D) User-Generated-Content
  47. ________ are a form of User-Generated-Content in which customers and partners can offer advice and assistance regarding products.



    B) Wikis and blogs
  48. ________ is the process by which users provide services to or on behalf of a vendor.



    A) Crowdsourcing
  49. ________ is the creation and use of the Enterprise 2.0 collaborative relationship between businesses and customers.



    C) Social CRM
  50. ________ is the application of Web 2.0 technologies, collaboration systems, social networking, and related technologies to facilitate the cooperative work of people in organizations.



    B) Enterprise 2.0
  51. A ________ is content structure that has emerged from the processing of many user tags.



    D) folksonomy
  52. In McAfee's SLATES Enterprise 2.0 model, "L" is for ________.



    A) links
  53. In McAfee's SLATES Enterprise 2.0 model, "A" is for ________.



    D) authoring
  54. In Enterprise 2.0, pushing enterprise content to users based on subscriptions and alerts is part of ________, according to McAfee's Enterprise 2.0 model.



    A) signals
  55. Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.



    C) extensions
  56. Before a business plunges headlong into any commercial application of social networking, it should be aware of the risks that these tools entail. One of the major risks is ________.



    A) dependency on the social networking vendor
  57. Responding to problematic content on social networking sites is best reserved for when ________.



    B) the problematic content has caused the organization to do something positive as a result
  58. If the problematic content posted on a social networking site represents reasonable criticism of the organization's products or services, the best response would be to ________.



    D) leave it
  59. Deleting problematic content on social networking sites is best reserved for when ________.



    B) the content is obscene and inappropriate
  60. In the context of CRM, emergence means that the vendor loses control of the customer relationship. Customers use all the touch points they can find with the vendor to craft their own relationships. Emergence in the context of management means loss of control of ________.



    D) employees
Author
isatonk
ID
150063
Card Set
MIS MC quiz ch8.txt
Description
review questions, multiple choice only, for test 2, chapter 8
Updated