Which is not a social media survey


Q1. __________ involves the evaluation of strengths and weaknesses, which are internal factors; and opportunities and threats, which are external factors.
a. Strategic analysis
b. Business performance
c. Operational planning
d. SWOT analysis

Q2. __________ involve the purchase of materials, the processing of materials into products, and delivery of products to customers.
a. Supply chains
b. Logistics
c. Primary activities
d. Support activities

Q3. How a company generates revenue from its assets is referred to as its __________.
a. asset infrastructure
b. business model
c. corporate culture
d. organizational structure

Q4. Why are companies, such as Monsanto and Wells Fargo, willing to invest in the building of new data centers?
a. To stop wasting capital maintaining outdated energy-inefficient data centers.
b. To comply with government energy regulations.
c. To develop new computing capabilities.
d. To improve business process performance.

Q5. A negative ethical impact of mobile marketing efforts is that they can be __________.
a. invasive
b. expensive
c. innovative
d. pervasive

Q6. Which of the following is a characteristic of competitive advantage?
a. It is a long lasting edge over competitors if based on IT.
b. It is short-lived if competitors quickly duplicate it.
c. It requires the use of social media and networks.
d. It always provides a big strategic payoff.

Q7. Which of the following statements about mobile market opportunities is false?
a. Mobiles are replacing computers as the primary way to connect with public and private networks and to get work done.
b. Mobile gadgets are starting to look and feel like handheld computers, able to run all sorts of software.
c. Desktop and laptop computers are taking on more and more nontraditional duties, like streaming media to TV sets, stereos, and other household appliances.
d. Touch-navigate devices running on 3G and 4G networks create business opportunities and eliminate business threats.

Q8. Decision makers manipulate models in a DSS to perform __________ analysis, which refers to changing assumptions or data in the model to see the impacts of those changes on the outcome.
a. goal seeking
b. experimental
c. structured
d. what-if

Q9. When employees log into the company network or e-mail accounts, or access data or documents to perform their jobs, two critical factors impacting their productivity are:
a. password strength and availability of mobile networks.
b. cloud computing and software applications.
c. virtualization and private clouds.
d. speed of the response and the reliability of the hardware.

Q10. Cloud computing is Internet-based computing in which shared resources, such as hard drives and software apps, are provided to computers and other devices __________, like a public utility.
a. in batch
b. via mobile networks
c. on-demand
d. via SaaS

Q11. __________ is data that has been processed, organized, or put into context so that it has meaning and value to the person receiving it.
a. Information
b. A transaction
c. Knowledge
d. A report

Q12. Sales of fresh produce drop during an E. coli food contamination crisis. What type of reports would be generated in this unique situation?
a. Periodic
b. Exception
c. Ad hoc
d. Functional

Q13. A __________ is a visual presentation of critical data, such as the results of a report or analysis, to more quickly understand data.
a. dashboard
b. GUI
c. touch screen
d. KPI

Q14. A transaction processing system (TPS):
a. processes raw data.
b. does reporting.
c. extracts, transforms, and loads data.
d. does advanced data analysis.

Q15. The main difference between a database and data warehouse is that:
a. databases are designed and optimized to store data, whereas data warehouses are designed and optimized to respond to analysis questions that are critical for a business.
b. databases are designed and optimized to analyze data, whereas data warehouses are designed and optimized to store data for sharing.
c. databases are designed to detect trends in the data, whereas data warehouses are designed to support supply chains.
d. databases are designed to support traditional commerce, whereas data warehouses are designed to support e-commerce.

Q16. Companies implement __________ systems to retain and archive their business records that are not needed for current operations or decisions, but that must be accessible for legal or auditing obligations.
a. electronic records management
b. database management
c. archive management
d. infrastructure management

Q17. According to the principle of __________, the more recent the data, the more valuable they are.
a. data uncertainty
b. 90/90 data use
c. diminishing data value
d. data in context

Q18. Creating backups of records is not a form of electronic records management (ERM) because:
a. the content on backups is not organized so that it can be accurately and easily retrieved.
b. business records and documents may need to be modified.
c. records and documents cannot be stored together.
d. the requirement to save records is new.

Q19. Which is not a benefit of having a unified view of customers?
a. More accurate customer data to support marketing, sales, support, and service initiatives.
b. Better responsiveness to ensure that customer service representatives have up-to-date, reliable information on the customers.
c. Faster transaction processing by organizing the data in one location.
d. Better revenue management and more responsive business decisions.

Q20. The high costs of data warehouses can make them too expensive for a company to implement. As an alternative, many firms create lower-cost, scaled-down __________.
a. data marts
b. data stores
c. multidimensional databases
d. SBUs

Q21. __________ shows the power of the individual in the connected age a better research tool than major corporations had in the 1990s.
a. Facebook
b. Google
c. Microsoft
d. eBay

Q22. __________ are networks that are capable of transmitting data at very fast rates, but operate in a limited area, such as an office building, campus, or home.
a. MANs
b. Hot spots
c. LANs
d. WANs

Q23. __________ are built by attaching a wireless access point (WAP) to the edge of the wired network.
a. WLANs
b. WiMAX
c. Wi-Fi hot spots
d. Base stations

Q24. Virtual private networks (VPN) are private tunnels in the Internet that are created by __________.
a. content indexing
b. usernames and passwords
c. biometrics
d. encryption

Q25. __________ transmits voice and data in packets and has become one of the most cost effective ways to communicate.
a. TCP
b. UDP
c. VoIP
d. UM

Q26. __________ is a general term that means fast transmission speed.
a. Bandwidth
b. Protocol
c. TCP/IP
d. Broadband

Q27. What is the most cost-effective approach to managing fraud?
a. prevention
b. detection
c. prosecution
d. compliance

Q28. Fraud management starts with corporate governance culture and ethics __________.
a. in the accounting department
b. in the IT department
c. at the top levels of the organization
d. at the lowest levels of the organization

Q29. A fiduciary responsibility is both a legal and an ethical obligation.
a. True
b. False

Q30. Crime can be divided into two categories depending on the tactics used to carry out the crime. What are those two categories?
a. personal and non-personal
b. felonies and misdemeanors
c. insider and outsider
d. violent and nonviolent

Q31. __________ is a security technology for wireless networks that improves on the authentication and encryption features of WEP.
a. Network access control (NAC)
b. Security exchange commission (SEC)
c. Wi-Fi protected access (WPA)
d. Intrusion detection system (IDS)

Q32. __________, such as AirSnort and WEPcrack, are readily available tools that can be used to gain unauthorized access to networks putting them at great risk.
a. Wireless packet analyzers
b. Password crackers
c. Firewall sniffers
d. Intrusion detectors

Q33. Public and private __________ are sites where many sellers and many buyers buy and sell.
a. networks
b. exchanges
c. sources
d. value chains

Q34. California's Office of Traffic Safety (OTS) partnered with the Taxi Magic app team to __________.
a. reduce DUI
b. sponsor contests
c. interface with Facebook
d. reduce poverty

Q35. __________ refers to word-of-mouth marketing in which customers promote a product or service by telling others about it.
a. Affiliate marketing
b. Customizing ads
c. Sourcing
d. Viral marketing

Q36. Ethical standards and laws frequently __________ technological innovation.
a. lag behind
b. keep pace
c. conflict with
d. lead ahead of

Q37. __________ are e-marketplaces that serve one industry, e.g., automotive, chemical, along the entire supply chain.
a. Vertical exchanges
b. Supply hubs
c. Horizontal exchanges
d. Collaboration hubs

Q38. One of the problems with __________ advertising is that advertisers knew very little about the recipients.
a. direct mail
b. Web
c. interactive
d. social media

Q39. __________ handhelds are a special technology that involves computer-generated images superimposed on pictures of real things and can be used by advertisers in several ways.
a. Augmented reality
b. Foursquare
c. WAP
d. Skype

Q40. The underlying technologies needed for location-based commerce and services are __________ and __________.
a. GPS; GIS
b. TPS; laptops
c. portals; servers
d. social networks; sensors

Q41. How can handheld mobile computing devices and technology significantly improve performance in the healthcare system?
a. Make it easier and faster to get prescriptions
b. Reduce the preventable errors made by healthcare providers
c. Reduce the need for emergency medical care

Q42. Writing apps for handheld devices, such as smartphones, is __________.
a. easy because only a few lines of code are needed
b. easy because the devices have limited features
c. difficult because of many different models and OSs
d. about the same as writing apps for computers.

Q43. Engineers can find the location of any receiving station to within 50 feet by __________, using the distance from a GPS to three satellites to make the computation.
a. latitude
b. longitude
c. triangulation
d. altitude

Q44. The __________ continues to be a leader in making digital music, movies and podcasts available to consumers for a fee.
a. iTunes Store
b. Amazon.com
c. Fox Mobile
d. Grooveshark.com

Q45. __________ refers to a search strategy that focuses on finding information in a particular content area, such as travel, finance, legal, and medical.
a. Vertical search
b. Horizontal search
c. Tag search
d. Web 3.0 search

Q46. Most large and medium sized companies utilize an Intranet based on __________ technology for internal collaboration and communication, which gives them control of the content.
a. Web 1.0
b. Web 2.0
c. social tagging
d. wikis

Q47. Which is not a social media activity metric?
a. pageviews
b. posts
c. unique number of visitors
d. quality and speed of issue resolution

Q48. Why do companies create private social networks?
a. To better understand their customers
b. To communicate short messages with followers
c. To interact with employees using avatars
d. To broadcast messages to very large groups of followers.

Q49. Facebook and other __________ are different from the broader category of online communities in that they usually allow individuals to control who can access information they post to the site.
a. bookmarking sites
b. mashups
c. social networking sites
d. wikis

Q50. Which is not a social media survey metric?
a. time spent on site
b. satisfaction
c. content relevance
d. quality and speed of issue resolution

 

Solution Preview :

Prepared by a verified Expert
Management Theories: Which is not a social media survey
Reference No:- TGS01134855

Now Priced at $45 (50% Discount)

Recommended (93%)

Rated (4.5/5)