Web-delivered services and content paid

Assignment Help Business Management
Reference no: EM13921519

Question 1. Question: Web 2.0 refers to Web-delivered services and content paid for by:

  • SM sponsors.
  • users.
  • advertisers.
  • investors.

Question 2. Which of the following statements is true of social CRM?

  • Customers likely to generate the most business get the most attention from the organization.
  • All the customer relationship processes in social CRM are structured and controlled.
  • Each customer crafts his or her own relationship with the company.
  • Though relationships emerge from joint activity, companies control the customers.

Question 3. When a student attends a business function for the purpose of meeting people and reinforcing relationships, he or she is investing in his or her:

  • human capital.
  • process capital.
  • social capital.
  • structural capital.

Question 4. A group considers Twitter to be far superior to Facebook and attempts to convince others that this is true. When confronted with contrary evidence, the group members do not change their opinion. According to Gossieaux and Moran, which of the following kinds of communities is most likely being illustrated in the given scenario?

  • Defenders of belief
  • Seekers of the truth
  • Proprietary community
  • Gated community

Question 5. The primary risk of peer-to-peer support in the context of social media and customer service is:

  • loss of control.
  • loss of credibility.
  • lack of privacy.
  • increase in expenses.

Question 6. Social capital, unlike traditional capital:

  • appreciates with time and never depreciates.
  • depreciates with time and never appreciates.
  • sometimes depreciates and at other times appreciates with time.
  • remains constant with time.

Question 7. According to the SEAMS dynamic process, which of the following activities is most likely to involve the identification of important communities, what they do, where they hang out, what they care about, and how organizations relate to them?

  • Sensing
  • Engaging
  • Activating
  • Measuring

Question 8. Question : Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as:

  • links.
  • authoring.
  • signals.
  • extensions.

Question 9. In McAfee's SLATES Enterprise 2.0 model, "A" stands for:

  • auditing.
  • alerts.
  • authoring.
  • announcements.

Question 10. ________, which refers to the matter in an SM site that is contributed by nonemployee site visitors, is the essence of SM relationships.

  • User-generated content
  • Folksonomy
  • Secondary data
  • Continuous data

Question 11. ________ measures the frequency that someone who clicks on an ad makes a purchase, "Likes" a site, or takes some other action desired by the advertiser.

  • Pay-per-click
  • Conversion rate
  • Folksonomy
  • Enterprise 2.0

Question 12. Which of the following revenue models is most likely followed by companies providing Web 2.0 services?

  • Traditional marketing
  • Pay-per-click
  • User participation
  • Venture capital

Question 13. According to Gossieaux and Moran, which of the following observations is true about a hyper-social organization?

  • It uses social media in an organization-centric manner.
  • It creates relationships in which only one of the parties perceives and gains value.
  • It is characterized by a transformation of thinking from market segments to tribes.
  • It is an organization that transitions from a dynamic process to a structured one.

Question 14. The storage of ________ differentiates SMIS from Web site applications.

  • secondary data
  • content data
  • connection data
  • continuous data

Question 15. According to Gossieaux and Moran, which of the following statements is true of defenders-of-belief communities?

  • They are open to changing their beliefs when confronted with contrary evidence.
  • They are very effective for activities that involve innovation or problem solving.
  • They make ineffective sales and marketing professionals.
  • They seek conformity and want to convince others of the wisdom of their beliefs.

Question 16. A ________ is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies.

  • business analyst
  • business application programmer
  • business administrator
  • business supervisor

Question 17. In a business process, resources are:

  • people or computer applications that are assigned to roles.
  • collections of procedures and activities.
  • the total number of points of work that can be accomplished in each scrum period.
  • collections of related tasks that receive inputs and produce outputs.

Question 18. According to Brooks' Law, adding more people to a late project will:

  • guarantee efficiencies.
  • speed up the project.
  • create diseconomies of scale.
  • reduce the need for coordination.

Question 19. Question : Organizational feasibility assesses:

  • the organization's budget and schedule requirements.
  • the competitor's business process model.
  • whether the organization has the technical infrastructure to implement the new system.
  • whether the new system fits within the organization's customs or legal requirements.

Question 20. Question : In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs.

  • activities
  • databases
  • resources
  • presentations

Question 21. Question : In a business process, an inventory or a database is an example of a:

  • decision tree.
  • repository.
  • botnet.
  • cookie.

Question 22. Question : A ________ is a sequence of activities that determine the earliest date by which a project can be completed.

  • Venn diagram
  • Pareto chart
  • critical path
  • scatter plot

Question 23. Question : According to the scrum process, once the tasks are known for a given set of requirements, the next step is to assign each task a difficulty score, called:

  • scrums.
  • points.
  • grades.
  • tallies.

Question 24. Question : : In Business Process Modeling Notation (BPMN) diagrams, a square with a plus sign means that:

  • a question can be answered with no.
  • it is the end of the process.
  • a question can be answered with yes.
  • an activity is considered to be a subprocess of a process.

Question 25. Question : During the system implementation phase of the SDLC, once a system has passed testing, the organization installs the new system. Which of the following terms is used to refer to this activity?

  • Beta testing
  • System conversion
  • Agile development
  • System control

Question 26. Question : During the requirements definition stage of developing an information system, the project team will consist mostly of:

  • programmers and testers.
  • testers and business users.
  • business and systems analysts.
  • database designers and administrators.

Question 27. Question : The term ________ refers to a set of management policies, practices, and tools that developers use to maintain control over the SDLC project's resources.

  • swim-lane layout
  • trade-off
  • transmission control protocol
  • configuration control

Question 28. Question : Which of the following phases of the SDLC include identifying what is to be produced, how frequently, and how fast it is to be produced?

  • Requirements analysis
  • System implementation
  • Component design
  • System definition

Question 29. Question : The project plan which results from defining the system is the input to ________, which is the second phase of the SDLC.

  • system design
  • system implementation
  • requirements analysis
  • system maintenance

Question 30. Question : Which of the following are the four dimensions of feasibility?

  • Planning, process, technical, and schedule feasibility
  • Operational, strategic, technical, and tactical feasibility
  • Cost, schedule, technical, and organizational feasibility
  • Schedule, process, technical, and competitive feasibility

Question 31. Question : Firewalls produce ________ which include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall.

  • honeypots
  • blogs
  • activity logs
  • RSS feeds

Question 32. Question : Key escrow is a(n):

  • protocol used to secure communication over the internet.
  • safety procedure that allows a trusted party to have a copy of the encryption key.
  • device that prevents unauthorized network access.
  • encryption algorithm that uses both public and private keys.

Question 33. Question : Secure Socket Layer is also known as:

  • application layer.
  • transport layer security.
  • presentation layer.
  • network interface layer security.

Question 34. Question : Which of the following is classified as a technical safeguard?

  • Cookies
  • Firewalls
  • Key escrow
  • Passwords

Question 35. Question : Which of the following statements is true of the Secure Socket Layer (SSL)?

  • It uses asymmetric encryption exclusively.
  • It is used to send sensitive data such as credit card numbers.
  • It uses one set of encryption keys for multiple sessions.
  • It is a stronger version of HTTPS.

Question 36. Question : A virus is a computer program that replicates itself. The program code that causes unwanted activity is called the:

  • payload.
  • kernel.
  • bot herder.
  • key escrow.

Question 37. Question : ________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.

  • Data encryption
  • Database administration
  • Data authentication
  • Database normalization

Question 38. Question : ________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.

  • Data administration
  • Authentication
  • Usurpation
  • Data encryption

Question 39. Question : Packet-filtering firewalls:

  • can filter both inbound and outbound traffic.
  • examine the destination address but not the source address.
  • are the most complex type of firewall.
  • seldom examine the data or the addresses of the message.

Question 40. Question : Which of the following is an example of a sniffing technique?

  • IP spoofing
  • Caches
  • Denial of service
  • Adware

Question 41. Question : ________ is a technique for intercepting computer communications, either through a physical connection to a network or without a physical connection in the case of wireless networks.

  • Spoofing
  • Phishing
  • Sniffing
  • Pretexting

Question 42. Question : Which of the following systems procedures is specifically the responsibility of operations personnel?

  • Writing software program codes
  • Using systems to perform job tasks
  • Creating back up of system databases
  • Knowing whom to contact when a security breach occurs

Question 43. Question : ________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.

  • Unauthorized data disclosure
  • Incorrect data modification
  • Denial of service
  • Loss of infrastructure

Question 44. Question : A(n) ________ has a microchip in it to hold data.

  • ATM card
  • smart card
  • cookie
  • key escrow

Question 45. Question : In information security, which of the following is true of managing risk?

  • All organizations except financial institutions should invest heavily in security safeguards.
  • Organizations should implement safeguards that balance the trade-off between risk and cost.
  • Passwords are classified under the technical safeguards category.
  • Physical security is classified under the human safeguards category.

Question 46. Question : When a firm is localizing a computer program, which of the following should it avoid?

  • Translating the user interface
  • Retaining forms and reports that have labels
  • Adjusting the sorting order for different character sets
  • Redrawing and translating diagrams

Question 47. Question : A ________ is a network of organizations and facilities that transforms raw materials into products delivered to customers.

  • legacy system
  • flat organization
  • shell corporation
  • supply chain

Question 48. Question : Which of the following best describes the bullwhip effect?

  • The value of a telecommunications network is proportional to the square of the number of users connected to the system.
  • The performance improvement to be gained from using some faster mode of execution is limited by the fraction of the time the faster mode can be used.
  • The variability in the size and timing of orders increases at each stage up the supply chain, from customer to supplier.
  • Improvements in technology lead to new applications, which result in new markets and industries.

Question 49. Question : Which of the following statements is true of global databases?

  • A single database increases data integrity problems.
  • A single database makes it possible to have an integrated view of the operations of an organization.
  • When using a single database to process data, data transmission speeds are extremely high.
  • The processing of a single database that resides in a single location is referred to as distributed database processing.

Question 50. Question : Enterprise systems, such as ERP, solve the problems of data isolation by integrating data into a database that provides a comprehensive and organization-wide view. This would require:

  • all processes to be located in the same geographical place.
  • the company to standardize on a single language.
  • backshoring processes to the home country.
  • the company to customize its product offerings.

Reference no: EM13921519

Questions Cloud

Probability that the first card is an ace : If the card selection is without replacement, what is the probability that the first card is an ace and the second card is also an ace? (Express the answer in simplest fraction form)
How much will you choose to produce : How much will you choose to produce? What is your expected profit? Is it an advantage or a disadvantage to move first? Explain.
Major components of a strategic management process : What are the major components of a strategic management process? Which of these components is the most difficult for managers to perform? Explain your answer.
What should you bid on ebay : eBay quits bidding on your behalf once your maximum price is reached. Your best guess at the market value is $1,000. What should you bid?
Web-delivered services and content paid : Question 1. Question: Web 2.0 refers to Web-delivered services and content paid for by: Question 2. Which of the following statements is true of social CRM?
Ethics awareness inventory and ethical choices : Use the Ethics Awareness Inventory and Ethical Choices in the Workplace assessments to revisit your personal and professional values. Write a paper of no more than 1,050-words in which you do the following:
The bonds make semiannual payments : Heginbotham Corp. issued 10-year bonds two years ago at a coupon rate of 7.2 percent. The bonds make semiannual payments. If these bonds currently sell for 102 percent of par value, what is the YTM?
Should the market price of the bond be : Dewey Cheetham and Howe Accounting firm is considering the purchase of $1,000 New Haven Muncipal Bond. The stated coupon rate is 5%, paid quarterly. The bond will matuure in 22 years. The YTM for similar bonds is 4%. What should be the market price b..
What will bingo choose to do in equilibrium : Formulate the following situation as an extensive form game (using a game tree) and solve it using backward induction.  What will Bingo choose to do in equilibrium, and what will Canal's response be?

Reviews

Write a Review

Business Management Questions & Answers

  Determine a global beta for portfolio

Determine a global beta for his portfolio and holds a portfolio that is well-diversified with international investments, which performance measure is more appropriate,

  Change management strategies- development and implementation

Explain what are some definitions of change management and discuss how they can be applied in solving opportunities during change.

  Describe employee reaction

For a job you know well make a questionnaire of five items that elicits employee reaction to the employees' levels of compensation. Identify what information must be included in a job analysis and job evaluation in order to develop a job structure..

  The production function of william pizza shop

Which inputs are fixed and which are variable in the production function of William's pizza shop? Over what ranges do there appear to be increasing, constant, and/or diminishing returns to the number of workers employed?

  Explain at least three major trends that have occurred

Explain at least three major trends that have occurred within the hospital sector. Give three examples that explain and differentiate the roles of hospitals and nursing homes in providing long term care.

  Demonstrate the main reasons why workplace diversity

Describe one (1) workplace situation where your supervisor or coworker motivated you to perform better for the organization. Explain the situation, how you felt up to that point, and the motivation technique and approach that your supervisor or cowor..

  Explain marketing''s impact

Explain Marketing's Impact and Determine the challenges marketers currently face with clutter as well as its impact on marketing communication. Suggest two solutions to this dilemma

  Managerial economics-consulting and competition

The current price and output, demand for your client's product is price inelastic. What advice regarding pricing would you give and why

  Project management system to help manage project scheduling

Your client, CSM Tech Publishing , has been running Windows Server 2012 R2 Essentials Edition, which you installed about a year ago , and using the AD DS, DNS, IIS and file services roles. The number of computer client has grown form 25 to 50 in the ..

  Identify potential stakeholders and their characteristics

Identify your potential stakeholders and their characteristics in your organization using the tools and techniques

  Retribution in western nations

one of the most famous was the cancellation of The Smothers Brothers Comedy Hour from CBS for its criticism of the Viet Nam War and the Johnson Administration. Explain.

  Concepts in organizational behaviorfocusing on

concepts in organizational behaviorfocusing on organizational commitment and job satisfaction what major challenges do

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd