Deck 8: Social Media Information Systems

Full screen (f)
exit full mode
Question
A viral hook is something that induces people to share a message with others.
Use Space or
up arrow
down arrow
to flip the card.
Question
Content data is data and responses to data that are contributed by users and SM sponsors.
Question
Only social networking sites present user and responder content, but both Web sites and social networking applications store and process connection data.
Question
Before initiating a social networking presence, organizations must develop procedures for creating content, managing user responses, removing obsolete or objectionable content, and extracting value from content.
Question
The primary risk of peer-to-peer support is loss of control.
Question
Social media is the use of information technology to support the sharing of content among networks of users.
Question
Social CRM is a dynamic, SM-based CRM process.
Question
Social networking procedures are more informal for SM sponsors than they are for social networking users.
Question
Content data differentiates SMIS from Web site applications.
Question
Social CRM is centered on lifetime value; customers that are likely to generate the most business get the most attention and have the most effect on the organization.
Question
Users employ browsers and client applications to read and submit data and to add and remove connections to communities and other users.
Question
Social media application providers are companies and other organizations that choose to support a presence on one or more SM sites.
Question
SM communities are formed based on mutual interests and transcend familial, geographic, and organizational boundaries.
Question
SM sponsors contribute to the site via browsers or by using specialized sponsor applications provided by the SM application provider.
Question
Both community users and employees of SM sponsors process SM sites using communications devices.
Question
Defenders of belief are communities that share a common belief and form their hive around that belief.
Question
Facebook, Twitter, LinkedIn, and Google are all SM application providers.
Question
Seekers-of-the-truth communities facilitate activities like sales and marketing.
Question
Defenders-of-belief communities are highly effective for activities that involve innovation or problem solving.
Question
Social media sponsors are the companies that operate the SM sites.
Question
Someone who sees an interesting feature in an SM presence and sends a link to that feature to friends can be called an active lurker.
Question
An organization has a strong relationship with you if you buy its products and write positive reviews about it.
Question
Web 2.0 includes Web-delivered services and content that are paid for by users.
Question
According to Gossieaux and Moran's model of the hyper-social organization, channels transmit knowledge, whereas networks transmit data.
Question
Enterprise 2.0 is the application of social media to facilitate the cooperative work of people inside organizations.
Question
Social capital does not depreciate.
Question
According to Henk Flap, the value of social capital is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.
Question
The multiplicative nature of social capital means that a huge network of relationships to people who have few resources may be lower than that of a smaller network with people with substantial resources.
Question
A hyper-social organization is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.
Question
Seekers of the truth will seek the truth, even if that means recommending another vendor's product over yours.
Question
When you attend a business function for the purpose of meeting people and reinforcing relationships, you are investing in your social capital.
Question
Web 2.0 applications are characterized by frequent releases of thick-client applications.
Question
A folksonomy is content structure that has emerged from the processing of many user tags.
Question
Key users submit ideas and responses to nonkey users for publication in communities.
Question
An active lurker is someone who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium.
Question
Defenders-of-belief communities provide better and faster problem solutions to complex supply chain problems.
Question
The term use increases value means that the value of a web site is indirectly proportional to the number of people using it.
Question
Outsourcing is the dynamic social media process of employing users to participate in product design or product redesign.
Question
Human capital is the investment in social relations with the expectation of returns in the marketplace.
Question
Unlike humans, organizations do not have social capital.
Question
The first task in managing social networking risk is to know the sources of potential problems and to monitor sites for problematic content.
Question
A ________ is an inducement for passing the message along through the tiers.

A)motif
B)viral hook
C)folksonomy
D)protocol
Question
User-generated content (UGC)is the essence of SM relationships.
Question
If a reasoned, nondefensive response generates continued and unreasonable UGC from that same source, it is best to respond to the problematic content.
Question
Which of the following is an SM application provider?

A)Oracle
B)SAP
C)McAfee
D)LinkedIn
Question
SM communities differ from communities in the past because SM communities are ________.

A)formed based on family relationships
B)limited by geographic location
C)formed based on mutual interests
D)limited by organizational boundaries
Question
________ are the companies that operate the SM sites.

A)SM application providers
B)SM sponsors
C)SM client servers
D)SM consultants
Question
In the context of CRM, hyper-social means that the vendor gains control of the customer relationship.
Question
________ is data and responses to data that are contributed by users and SM sponsors.

A)Networking data
B)Content data
C)Connection data
D)User-generated data
Question
A characteristic of Web 2.0 is that the value of a site increases with users and use.
Question
Most SM applications earn revenue ________.

A)by selling the license to their applications
B)through merchandising
C)through a type of advertising model
D)through viral marketing
Question
Google publishes Google Maps and provides tools for users to make custom modifications to those maps, which is an example of mashup.
Question
A(n)________ is an information system that supports the sharing of content among networks of users.

A)DSS
B)SMIS
C)ERP
D)TPS
Question
Web 2.0 does not allow mashups, which occur when the output from two or more Web sites is combined into a single user experience.
Question
One of the major sources of UGC problems is inappropriate content.
Question
Deleting content on user-generated content sites should be reserved for contributions that criticize a firm's products or services.
Question
Emergence in the context of management means loss of control of employees.
Question
________ is the use of information technology to support the sharing of content among networks of users.

A)Social media
B)Content publishing
C)Networking
D)Programming
Question
When a business participates in a social network or opens its site to UGC, it protects itself from misguided people who post junk unrelated to the site's purpose.
Question
Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites.

A)application providers
B)sponsors
C)blogs
D)users
Question
A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true.When confronted with contrary evidence, the group members do not change their opinion.According to Gossieaux and Moran, this is an example of a ________ community.

A)defenders-of-belief
B)seekers-of-the-truth
C)heterogeneous
D)cloud
Question
________ is the dynamic social media process of employing users to participate in product design or product redesign.

A)Crowdsourcing
B)Blogging
C)Publishing
D)Tweeting
Question
Defenders-of-belief communities facilitate activities like ________.

A)customer service
B)manufacturing and operations
C)inbound logistics
D)sales and marketing
Question
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.

A)links
B)authoring
C)signals
D)extensions
Question
A student invests money and time in taking a business administration course.In this example, the student invests in ________.

A)human capital
B)social capital
C)functional capital
D)mechanical capital
Question
When a student attends a business function for the purpose of meeting people and reinforcing relationships, he is investing in ________ capital.

A)human
B)technical
C)social
D)mechanical
Question
Which of the following is a risk associated with human resources using social media to form conclusions about candidate evaluation?

A)loss of privacy
B)loss of control
C)decrease in efficiency
D)possibility of error
Question
________ is the application of social media to facilitate the cooperative work of people inside organizations.

A)Enterprise 2.0
B)Enterprise resource planning
C)Enterprise application integration
D)Enterprise architecture
Question
Which of the following activities would seekers of the truth facilitate?

A)human resources
B)operations
C)marketing
D)sales
Question
________ differentiates SMIS from Web site applications.

A)Networking data
B)Content data
C)Connection data
D)User-generated data
Question
Which of the following statements is true of defenders-of-belief communities?

A)They are open to changing their belief when confronted with contrary evidence.
B)They are very effective for activities that involve innovation or problem solving.
C)They are useful in customer service activities.
D)They seek conformity and want to convince others of the wisdom of their belief.
Question
Which of the following statements is true of social CRM?

A)Customers that are likely to generate the most business get the most attention and have the most effect on the organization.
B)The relationships between organizations and customers emerge in a structured process as only the organization creates and processes content.
C)Each customer crafts his or her own relationship with the company.
D)Though relationships emerge from joint activity, companies have a lot more control than the customers.
Question
Which of the following is a significant risk of using social media for inbound and outbound logistics?

A)loss of control
B)loss of credibility
C)loss of privacy
D)loss of effectiveness
Question
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?

A)social capital
B)human capital
C)industrial capital
D)mechanical capital
Question
In McAfee's SLATES Enterprise 2.0 model, "L" is for ________.

A)LAN
B)links
C)language
D)leader
Question
In McAfee's SLATES Enterprise 2.0 model, "A" is for ________.

A)avatar
B)Ajax
C)authoring
D)affiliation
Question
According to McAfee, pushing enterprise content to users based on subscriptions and alerts is part of the ________ component.

A)signals
B)search
C)links
D)authoring
Question
According to Gossieaux and Moran, ________ share a common desire to learn something, solve a problem, or make something happen.

A)defenders of belief
B)advocates of philosophy
C)supporters of fidelity
D)seekers of the truth
Question
The primary risk of peer-to-peer support is ________.

A)loss of control
B)loss of credibility
C)lack of privacy
D)increase in expenses
Question
A ________ is content structure that has emerged from the processing of many user tags.

A)mashup
B)taxonomy
C)folksonomy
D)microblog
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/121
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Social Media Information Systems
1
A viral hook is something that induces people to share a message with others.
True
2
Content data is data and responses to data that are contributed by users and SM sponsors.
True
3
Only social networking sites present user and responder content, but both Web sites and social networking applications store and process connection data.
False
4
Before initiating a social networking presence, organizations must develop procedures for creating content, managing user responses, removing obsolete or objectionable content, and extracting value from content.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
5
The primary risk of peer-to-peer support is loss of control.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
6
Social media is the use of information technology to support the sharing of content among networks of users.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
7
Social CRM is a dynamic, SM-based CRM process.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
8
Social networking procedures are more informal for SM sponsors than they are for social networking users.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
9
Content data differentiates SMIS from Web site applications.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
10
Social CRM is centered on lifetime value; customers that are likely to generate the most business get the most attention and have the most effect on the organization.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
11
Users employ browsers and client applications to read and submit data and to add and remove connections to communities and other users.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
12
Social media application providers are companies and other organizations that choose to support a presence on one or more SM sites.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
13
SM communities are formed based on mutual interests and transcend familial, geographic, and organizational boundaries.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
14
SM sponsors contribute to the site via browsers or by using specialized sponsor applications provided by the SM application provider.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
15
Both community users and employees of SM sponsors process SM sites using communications devices.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
16
Defenders of belief are communities that share a common belief and form their hive around that belief.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
17
Facebook, Twitter, LinkedIn, and Google are all SM application providers.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
18
Seekers-of-the-truth communities facilitate activities like sales and marketing.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
19
Defenders-of-belief communities are highly effective for activities that involve innovation or problem solving.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
20
Social media sponsors are the companies that operate the SM sites.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
21
Someone who sees an interesting feature in an SM presence and sends a link to that feature to friends can be called an active lurker.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
22
An organization has a strong relationship with you if you buy its products and write positive reviews about it.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
23
Web 2.0 includes Web-delivered services and content that are paid for by users.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
24
According to Gossieaux and Moran's model of the hyper-social organization, channels transmit knowledge, whereas networks transmit data.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
25
Enterprise 2.0 is the application of social media to facilitate the cooperative work of people inside organizations.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
26
Social capital does not depreciate.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
27
According to Henk Flap, the value of social capital is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
28
The multiplicative nature of social capital means that a huge network of relationships to people who have few resources may be lower than that of a smaller network with people with substantial resources.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
29
A hyper-social organization is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
30
Seekers of the truth will seek the truth, even if that means recommending another vendor's product over yours.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
31
When you attend a business function for the purpose of meeting people and reinforcing relationships, you are investing in your social capital.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
32
Web 2.0 applications are characterized by frequent releases of thick-client applications.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
33
A folksonomy is content structure that has emerged from the processing of many user tags.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
34
Key users submit ideas and responses to nonkey users for publication in communities.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
35
An active lurker is someone who reads, consumes, and observes activity in one social medium and then broadcasts it in some other medium.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
36
Defenders-of-belief communities provide better and faster problem solutions to complex supply chain problems.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
37
The term use increases value means that the value of a web site is indirectly proportional to the number of people using it.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
38
Outsourcing is the dynamic social media process of employing users to participate in product design or product redesign.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
39
Human capital is the investment in social relations with the expectation of returns in the marketplace.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
40
Unlike humans, organizations do not have social capital.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
41
The first task in managing social networking risk is to know the sources of potential problems and to monitor sites for problematic content.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
42
A ________ is an inducement for passing the message along through the tiers.

A)motif
B)viral hook
C)folksonomy
D)protocol
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
43
User-generated content (UGC)is the essence of SM relationships.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
44
If a reasoned, nondefensive response generates continued and unreasonable UGC from that same source, it is best to respond to the problematic content.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following is an SM application provider?

A)Oracle
B)SAP
C)McAfee
D)LinkedIn
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
46
SM communities differ from communities in the past because SM communities are ________.

A)formed based on family relationships
B)limited by geographic location
C)formed based on mutual interests
D)limited by organizational boundaries
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
47
________ are the companies that operate the SM sites.

A)SM application providers
B)SM sponsors
C)SM client servers
D)SM consultants
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
48
In the context of CRM, hyper-social means that the vendor gains control of the customer relationship.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
49
________ is data and responses to data that are contributed by users and SM sponsors.

A)Networking data
B)Content data
C)Connection data
D)User-generated data
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
50
A characteristic of Web 2.0 is that the value of a site increases with users and use.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
51
Most SM applications earn revenue ________.

A)by selling the license to their applications
B)through merchandising
C)through a type of advertising model
D)through viral marketing
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
52
Google publishes Google Maps and provides tools for users to make custom modifications to those maps, which is an example of mashup.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
53
A(n)________ is an information system that supports the sharing of content among networks of users.

A)DSS
B)SMIS
C)ERP
D)TPS
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
54
Web 2.0 does not allow mashups, which occur when the output from two or more Web sites is combined into a single user experience.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
55
One of the major sources of UGC problems is inappropriate content.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
56
Deleting content on user-generated content sites should be reserved for contributions that criticize a firm's products or services.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
57
Emergence in the context of management means loss of control of employees.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
58
________ is the use of information technology to support the sharing of content among networks of users.

A)Social media
B)Content publishing
C)Networking
D)Programming
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
59
When a business participates in a social network or opens its site to UGC, it protects itself from misguided people who post junk unrelated to the site's purpose.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
60
Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites.

A)application providers
B)sponsors
C)blogs
D)users
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
61
A group considers Google+ to be far superior to Facebook and attempts to convince others that this is true.When confronted with contrary evidence, the group members do not change their opinion.According to Gossieaux and Moran, this is an example of a ________ community.

A)defenders-of-belief
B)seekers-of-the-truth
C)heterogeneous
D)cloud
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
62
________ is the dynamic social media process of employing users to participate in product design or product redesign.

A)Crowdsourcing
B)Blogging
C)Publishing
D)Tweeting
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
63
Defenders-of-belief communities facilitate activities like ________.

A)customer service
B)manufacturing and operations
C)inbound logistics
D)sales and marketing
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
64
Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as ________.

A)links
B)authoring
C)signals
D)extensions
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
65
A student invests money and time in taking a business administration course.In this example, the student invests in ________.

A)human capital
B)social capital
C)functional capital
D)mechanical capital
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
66
When a student attends a business function for the purpose of meeting people and reinforcing relationships, he is investing in ________ capital.

A)human
B)technical
C)social
D)mechanical
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
67
Which of the following is a risk associated with human resources using social media to form conclusions about candidate evaluation?

A)loss of privacy
B)loss of control
C)decrease in efficiency
D)possibility of error
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
68
________ is the application of social media to facilitate the cooperative work of people inside organizations.

A)Enterprise 2.0
B)Enterprise resource planning
C)Enterprise application integration
D)Enterprise architecture
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
69
Which of the following activities would seekers of the truth facilitate?

A)human resources
B)operations
C)marketing
D)sales
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
70
________ differentiates SMIS from Web site applications.

A)Networking data
B)Content data
C)Connection data
D)User-generated data
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
71
Which of the following statements is true of defenders-of-belief communities?

A)They are open to changing their belief when confronted with contrary evidence.
B)They are very effective for activities that involve innovation or problem solving.
C)They are useful in customer service activities.
D)They seek conformity and want to convince others of the wisdom of their belief.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
72
Which of the following statements is true of social CRM?

A)Customers that are likely to generate the most business get the most attention and have the most effect on the organization.
B)The relationships between organizations and customers emerge in a structured process as only the organization creates and processes content.
C)Each customer crafts his or her own relationship with the company.
D)Though relationships emerge from joint activity, companies have a lot more control than the customers.
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
73
Which of the following is a significant risk of using social media for inbound and outbound logistics?

A)loss of control
B)loss of credibility
C)loss of privacy
D)loss of effectiveness
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
74
According to Nan Lin, which of the following types of capital adds value through information, influence, and personal reinforcement?

A)social capital
B)human capital
C)industrial capital
D)mechanical capital
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
75
In McAfee's SLATES Enterprise 2.0 model, "L" is for ________.

A)LAN
B)links
C)language
D)leader
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
76
In McAfee's SLATES Enterprise 2.0 model, "A" is for ________.

A)avatar
B)Ajax
C)authoring
D)affiliation
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
77
According to McAfee, pushing enterprise content to users based on subscriptions and alerts is part of the ________ component.

A)signals
B)search
C)links
D)authoring
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
78
According to Gossieaux and Moran, ________ share a common desire to learn something, solve a problem, or make something happen.

A)defenders of belief
B)advocates of philosophy
C)supporters of fidelity
D)seekers of the truth
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
79
The primary risk of peer-to-peer support is ________.

A)loss of control
B)loss of credibility
C)lack of privacy
D)increase in expenses
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
80
A ________ is content structure that has emerged from the processing of many user tags.

A)mashup
B)taxonomy
C)folksonomy
D)microblog
Unlock Deck
Unlock for access to all 121 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 121 flashcards in this deck.