BCOM 9TH EDITION BY CAROL M. LEHMAN – Test Bank

$20.00

Pay And Download
Complete Test Bank With Answers
 
 
Sample Questions Posted Below

 

 

 

 

Multiple Choice

 

1. Which of the following is true of data security?

  a. Policies associated with data security generally require that employees share data informally.
  b. The responsibilities of collecting, handling, and storing data properly rest solely with a company’s database administrator.
  c. Risks associated with data security include breaches of confidentiality and failure to offer choice in what information is shared.
  d. Even data that is no longer needed should be preserved securely.

 

ANSWER:   c

 

2. Identify a true statement about channel selection.

  a. If a message is straightforward and informative, a technological communication channel is inappropriate.
  b. Before choosing a communication channel, it should be determined whether a permanent record of a message is needed or if a temporary form would suffice.
  c. An electronic communication tool is appropriate for communicating bad-news messages in sensitive situations.
  d. Personal interaction cannot replace written communication, printed or online, which is essential in today’s team-based work environments.

 

ANSWER:   b

 

3. Which of the following statements is true of a company’s right over its employees’ electronic communication?

  a. A company cannot intercept its employees’ electronic communications.
  b. A company cannot use its employees’ electronic communication to determine legitimate business use.
  c. A company can monitor its employees’ electronic communications without consent.
  d. A company technically owns its employees’ electronic communications.

 

ANSWER:   d

 

4. Which of the following considerations must be made before sending a message?

  a. An electronic format is preferred over a face-to-face encounter for sensitive situations.
  b. A technological option is inappropriate if the message is straightforward and informative.
  c. Messages cannot be retrieved once they are deleted.
  d. The communication channel should fit the sender’s purpose.

 

ANSWER:   d

 

5. Which of the following is true of email?

  a. It is costly if used for communicating with people located in different time zones.
  b. It is best suited for delivering sensitive and confidential information.
  c. It offers a personal touch to business communication.
  d. It facilitates the fast, convenient flow of information among users at various locations.

 

ANSWER:   d

 

6. _____ is effective when sending a single message to several recipients and when needing to communicate 24 hours a day, 365 days a year.

  a. Email
  b. Spyware
  c. A wiki
  d. A weblog

 

ANSWER:   a

 

7. Which of the following is an advantage of email communication?

  a. It reduces a company’s costs.
  b. It offers a personal touch.
  c. It is safe from malicious attacks.
  d. It ensures a quick verbal response.

 

ANSWER:   a

 

8. Which of the following guidelines should you follow for effective email communication?

  a. Send to single or multiple addressees.
  b. Avoid restating the subject in the body of a message.
  c. Focus on multiple topics in a single message.
  d. Avoid using graphic highlighting.

 

ANSWER:   a

 

9. Who among the following adheres to the guidelines for preparing effective email messages?

  a. Alan, who focuses on multiple topics and addresses all of them in the email
  b. Ellis, who restates the subject in the body of the message
  c. Jake, who avoids using a descriptive subject line
  d. Mary, who avoids integrating graphs and pictures into the email

 

ANSWER:   b

 

10. Which of the following is a guideline that assists in effective email usage?

  a. Check mails once every week.
  b. Do not contribute to email overload.
  c. Send messages that are formatted.
  d. Do not use separate accounts for receiving messages.

 

ANSWER:   b

 

11. Aaron, an employee of MindRaft Inc., had an argument with one of his colleagues, Ron. Following this, Aaron sent hate mails containing sarcastic and offensive statements to Ron. In this scenario, the message sent by Aaron is an example of a _____.

  a. spam
  b. flame
  c. virus
  d. hoax

 

ANSWER:   b

 

12. _____, which are websites that provide virtual communities in which people with shared interests can communicate, are common sources of viruses and spyware.

  a. Uniform resource locators
  b. Social networking sites
  c. Web browsers
  d. Proxy servers

 

ANSWER:   b

 

13. Which of the following statements is true of instant messaging (IM)?

  a. With IM, your conversation with someone is free from eavesdropping.
  b. With IM, it is important to pay careful attention to spelling and grammar when trading messages.
  c. The best known IM programs require special hardware and extensive training.
  d. To use IM, you maintain a list of people with whom you want to interact.

 

ANSWER:   d

 

14. Chris and Stephanie are friends who reside in two different states. They stay in touch with the help of a computer program that allows them to send messages to each other that both of them can immediately see when they are online. In this scenario, the technology used by Chris and Stephanie is:

  a. blogging.
  b. phishing.
  c. text messaging.
  d. instant messaging.

 

ANSWER:   d

 

15. Which of the following statements is true of text messaging?

  a. It cannot be used to send messages from a cellphone to a computer.
  b. It puts less premium on conciseness than email.
  c. It is a refinement of computer instant messaging.
  d. It cannot be used for business purposes.

 

ANSWER:   c

 

16. _____ is particularly well suited to text messaging because the names of the numbers are also close to the sounds of certain words.

  a. Mandarin
  b. Arabic
  c. Japanese
  d. English

 

ANSWER:   a

 

17. Identify a true statement about the legal requirements governing electronic messages.

  a. A copy of an electronic message cannot be produced as verification in the courts.
  b. Inability to locate emails and other relevant documents cannot be considered negligence.
  c. Evidence produced by companies in the form of an email is considered invalid by the courts.
  d. Destroying email messages in violation of securities rules is a sure path to destruction.

 

ANSWER:   d

 

18. To avoid the legal perils of electronic communications, employees must be taught to:

  a. write loose messages.
  b. use technical jargon.
  c. delete all old messages.
  d. organize relevant messages.

 

ANSWER:   d

 

19. Which of the following is true of effective Web writing?

  a. Web users refer frequently to directions and are likely to read little notes, sidebars, and help files.
  b. Information on a website should follow the pyramid style of writing common in newspaper writing.
  c. Web users can more quickly scan items in rows rather than columns.
  d. English-speaking readers typically start scanning at the right side of the main content area of a website.

 

ANSWER:   b

 

20. Who among the following is following a good practice while writing for a website?

  a. James, who avoids highlighting the content area on his website
  b. Jane, who categorizes and groups items in columns rather than rows on her website
  c. Zafar, who places little notes, sidebars, and help files on his website
  d. Alisha, who places the main idea at the end of the content area on her website

 

ANSWER:   b

 

21. Which of the following is a difference between web pages and social media?

  a. Unlike web pages, social media prohibits users from generating their own content.
  b. Unlike web pages, social media enables people to connect online and have a conversation.
  c. Unlike web pages, social media is not generally interactive.
  d. Unlike web pages, social media requires authorization before posting.

 

ANSWER:   b

 

22. Which of the following is a Web 2.0 technology?

  a. A database
  b. A wiki
  c. A flame
  d. A cookie

 

ANSWER:   b

 

23. Stuart is agitated by the political developments that took place in his country in the last couple of months and decides to share his views. He posts his concerns online by filling a simple online form on his browser. The visitors to his online journal can post comments. The technology used in this scenario is an example of:

  a. text messaging.
  b. instant messaging.
  c. blogging.
  d. emailing.

 

ANSWER:   c

 

24. _____ are dynamic, with rapidly changing content that does not require authorization to post.

  a. Flames
  b. Cookies
  c. Blogs
  d. Websites

 

ANSWER:   c

 

25. A _____ is a collaborative website that hosts the collective work of many authors.

  a. weblog
  b. wiki
  c. flame
  d. cookie

 

ANSWER:   b

 

26. Which of the following statements is true of voice mail technology?

  a. It makes it possible for people to participate on the Web.
  b. It allows flexibility in staying in touch without the aid of a computer.
  c. It has rapidly changing content that requires authorization to post.
  d. It provides a platform for people with shared interests to communicate.

 

ANSWER:   b

 

27. Abdul, a manager at Chrysum Corp., was assigned the task of overseeing the operations in a foreign office for a week. Before leaving the country, Abdul recorded a message on his phone to inform callers that he was away from home and would return their calls when he returned. In this scenario, the technology used by Abdul is an example of:

  a. text messaging.
  b. social networking.
  c. cellphone communication.
  d. voice mail communication.

 

ANSWER:   d

 

28. Which of the following is a guideline for effective voice mail communication?

  a. Refrain from updating your greeting often.
  b. Encourage callers to leave detailed messages.
  c. Never leave your email address or fax number on your greeting.
  d. Check your voice mail once a week.

 

ANSWER:   b

 

29. Which of the following tips should be followed to improve voice mail communication?

  a. Speak fast and in a loud voice.
  b. Keep your message brief, typically 60 seconds or less.
  c. Avoid updating your greeting frequently.
  d. Avoid repeating your name and phone number.

 

ANSWER:   b

 

30. Which of the following is true of cellphone communication?

  a. It ensures complete confidentiality.
  b. It improves performance among salespersons by improving their outreach to clients.
  c. It is free from policies and legal restrictions.
  d. It is cost-effective when communicating with people located in several time zones.

 

ANSWER:   b

 

31. Identify a true statement about cellphone communication.

  a. Cellphone communication dramatically deteriorates performance among salespersons.
  b. Confidential or sensitive information can be effectively shared through cellphones.
  c. Cellphone communication is cost-effective when communicating with people located in several locations and time zones.
  d. The radio frequencies that transmit the voice signals in cellphone communication can be picked up by other equipment.

 

ANSWER:   d

 

32. In the context of channels of virtual collaboration, virtual teams can use _____ that can serve as an electronic bulletin board.

  a. memos
  b. wikis
  c. claims
  d. citations

 

ANSWER:   b

 

33. _____ is a popular software program that lets participants share what’s on their personal computer with the entire group, including PowerPoint slides, data summaries, and written reports.

  a. GoToMeeting
  b. JavaScript
  c. Visual Studio
  d. LinkSwift

 

ANSWER:   a

 

34. Which of the following is true of electronic meeting systems (EMS)?

  a. They are a group of Internet-based applications that allow the creation and exchange of user-generated content.
  b. They enable group members in brainstorming ideas, voting, outlining ideas, or expanding on the ideas of others.
  c. They cannot be used when people are not in the same room at the same time.
  d. They consist of computer software programs that can help group members collaborate when meeting face to face.

 

ANSWER:   b

 

35. Which of the following is a category of virtual team management tools that allows you to chat in real-time with your team members?

  a. File sharing
  b. Scheduling
  c. Instant messaging
  d. Meeting

 

ANSWER:   c

 

36. _____ is a virtual team management tool for scheduling.

  a. Sqwiggle
  b. Doodle
  c. Brix
  d. Jive

 

ANSWER:   b

 

37. Which of the following is a virtual team management tool for team games?

  a. Prelude
  b. Blackboard
  c. Huddle
  d. Jive

 

ANSWER:   a

 

True / False

 

38. Data mining is difficult to judge in terms of its ethicality.

  a. True
  b. False

 

ANSWER:   True

 

39. For delivering a message that is straightforward and informative, a face-to-face encounter is preferred over a technological channel.

  a. True
  b. False

 

ANSWER:   False

 

40. Employees that are floors apart or in different offices or time zones benefit from email and Web communications.

  a. True
  b. False

 

ANSWER:   True

 

41. Undeliverable email messages are delivered to a mail administrator.

  a. True
  b. False

 

ANSWER:   True

 

42. A deleted message cannot be resurrected.

  a. True
  b. False

 

ANSWER:   False

 

43. A message through an electronic format might be interpreted as cold and impersonal.

  a. True
  b. False

 

ANSWER:   True

 

44. A sender should choose a communication channel according to his or her preference.

  a. True
  b. False

 

ANSWER:   False

 

45. Jargon is the buzzword for proper behavior on the Internet.

  a. True
  b. False

 

ANSWER:   False

 

46. Blogging is a real-time email technology that blends email with conversation.

  a. True
  b. False

 

ANSWER:   False

 

47. The typical cellphone screen can accommodate no more than 100 characters.

  a. True
  b. False

 

ANSWER:   False

 

48. Text messaging cannot be used for business purposes as it is strictly a social communication tool.

  a. True
  b. False

 

ANSWER:   False

 

49. Companies are not authorized to monitor the electronic mail of an employee.

  a. True
  b. False

 

ANSWER:   False

 

50. An employer must have either a warrant or an employee’s permission to view messages stored by someone other than the employer.

  a. True
  b. False

 

ANSWER:   True

 

51. English-speaking readers typically start scanning at the top right side of the main content area of a website.

  a. True
  b. False

 

ANSWER:   False

 

52. On a website, users can more quickly scan items in rows rather than columns.

  a. True
  b. False

 

ANSWER:   False

 

53. Information that is confidential or sensitive can be securely shared through cellphone communication.

  a. True
  b. False

 

ANSWER:   False

 

54. All virtual communication is mediated by technology but they differ in that communication can be achieved through voice, text, video, or some combination of these.

  a. True
  b. False

 

ANSWER:   True

 

55. Face-to-face meetings are more effective than video-conferences when participants are involved in a structured discussion.

  a. True
  b. False

 

ANSWER:   False

 

Essay

 

56. Discuss the risks associated with data security. What measures are taken by organizations to guide employees in the proper use of technology to safeguard information?

ANSWER:   Answers will vary. In the past several decades, computer technology has revolutionized the way that communication occurs in most organizations. Communication using a variety of text-, audio-, and video-enabled tools can be achieved almost instantaneously with others located around the globe. But with the many advantages of computer-mediated communication, a similar rise in the potential hazards associated with its use has occurred. Concerns about maintaining the privacy of and information about employees, partners, and customers as well as corporate resources has reached a critical point. A practice that is more difficult to judge in terms of its ethicality is that of data mining, which is used by many organizations on their social networking sites to learn more about customers so as to enhance marketing techniques.

Organizations may be held liable for providing outside access to private information of their employees, customers, and other external groups. This information includes customers’ credit card, bank account, and social security numbers; employee details, such as health records, home addresses, email addresses, and login information.

In addition to protecting employee, supplier, distributor, and customer privacy, organizations are also concerned about protecting proprietary information about products, services, and business strategies.

Because of these concerns many organizations have enacted policies to guide employees in the proper use of technology to safeguard information. These policies often address three data security risks: breaches of confidentiality, failing to offer choice in what information is shared, and reputational damage caused by data breaches. Often everyone in the company is expected to ensure that data is collected, handled, and stored properly.

Such policies generally require that employees are properly trained in data use and storage, that employees keep data secure, that data is not shared informally, that no information should be shared with unauthorized individuals, and that data no longer needed is properly deleted or disposed of. It is very important to be well informed about an organization’s data use policies and to follow policies to the letter to avoid breaches of data security. REJ: Please see the section “Data Security” for more information.

 

57. How can the purpose of a message be determined before choosing a communication channel?

ANSWER:   Answers will vary. If a message is straightforward and informative, chances are a technological option might be appropriate. Although the use of instantaneous and efficient communication methods is quite compelling, keep in mind that written communication, printed or online, cannot replace the personal interaction so essential in today’s team-based work environments. Employees that are floors apart or in different offices or time zones benefit from email and Web communications, but two people sitting side by side or on the same floor should not have to communicate solely by electronic means.

A second question when selecting among communication options is whether a permanent record of the message is needed or if a more temporary form such as a phone call or instant message would suffice. REJ: Please see the section “Appropriate Use of Technology” for more information.

 

58. Why it is important to determine whether an information is personal or confidential before choosing a communication channel?

ANSWER:   Answers will vary. As a general guideline, keep personal correspondence off-line if you do not want it to come back and haunt you. The content of an email message could have embarrassing consequences since such documents often become a part of public records, and wireless communications might be unexpectedly intercepted. Your company technically “owns” your electronic communications and thus can monitor them to determine legitimate business use or potential abuse. Undeliverable email messages are delivered to a mail administrator, and many networks routinely store backups of all email messages that pass through them.

Even deleted messages can be “resurrected” with little effort, as several public figures discovered when investigators retrieved archived email as evidence in court cases. For sensitive situations, a face-to-face encounter is often preferred. REJ: Please see the section “Appropriate Use of Technology” for more information.

 

59. Why it is important to determine whether positive human relations are sacrificed before choosing a communication channel?

ANSWER:   Answers will vary. You should be cautious of using an electronic communication tool as an avoidance mechanism. It is important to remember that some people do not regularly check their email or voice mail, and some have unreliable systems that are slow or prone to losing messages. Some news will be received better in person than through an electronic format that might be interpreted as cold and impersonal.

Additionally, some people, especially those of certain cultures, prefer a personal meeting even if you perceive that an electronic exchange of information would be a more efficient use of everyone’s time.

Choose the communication channel carefully to fit both your purpose and the preference of receivers. REJ: Please see the section “Appropriate Use of Technology” for more information.

 

60. List four advantages of electronic mail communication.

ANSWER:   Answers will vary. Electronic mail, or email, offers numerous advantages. Its ready availability, convenience, and ease of use have resulted in its skyrocketing popularity. The advantages of email are numerous:

a. It facilitates the fast, convenient flow of information among users at various locations and time zones. Email is especially effective when sending a single message to several recipients and when needing to communicate 24 hours a day, 365 days a year.

b. It increases efficiency. Email reduces “telephone tag” and unnecessary telephone interruptions caused when delivering messages that are unlikely to require a verbal response.

c. It reduces costs. Sending email messages represents substantial savings to companies in long-distance telephone costs and postal mail-outs.

d. It reduces paper waste. Often an electronic message can be read and immediately discarded without the need for a printed copy. REJ: Please see the section “Electronic Mail Communication” for more information.

 

61. Camponi Fashions Inc. gives its sales consultants an allowance of $2,000 for purchase of clothing from the current line of products. Any purchase beyond this allowance can be made at a 15% discount. Due to an economic downturn, the management reduces the clothing allowance for the upcoming year to $1,000 and the purchase discount to 10%. When the company returns to normal profit levels in the future, the original allowance and discount would be restored.

Required: As a sales manager of the company, write an email message conveying the change in policy for the upcoming year.

ANSWER:   Answers will vary. The following guidelines should be followed while writing the email message:

a. Use a neutral subject line written inductively in proper format, with a neutral statement or observation that does not reveal the “bad news” or lead the readers to unrealistic expectations.

b. Provide specific details of the past clothing allowance and discount policies. State how these policies have benefited the company and the consultants.

c. Review the current financial difficulties the company is experiencing.

d. State the specifics of the new allowance and discount policies in the middle paragraph in passive voice.

e. State the company’s commitment to restore the previous policies once normal profits return.

A proposed solution follows:

To: Sales consultants

From: Sales manager

Subject: Changes to allowances

Hello, everyone,

We have seen that the last four years have been exceptionally good for us in the marketing arena. All of you as sales consultants have contributed to the progress achieved by the company. This contribution has been appreciated by the company in terms of various allowances, including the $2,000 purchase allowance and a 15% discount on additional purchases.

As we are all aware, the company’s performance in the last few months has not met its due expectations. Due to this, we are facing a major economic downturn. In the best interests of the company and our future, some changes in our purchase allowances have been made. The new purchase allowance would be $1,000 for purchase of clothing from the current line of products, and any purchase beyond this allowance can be made at a 10% discount. These changes are effective from the 1st of December.

These changes are temporary measures to restore the financial situation of the company. Your cooperation in this matter is highly appreciated.

Thanks,

XYZ

REJ: Please see the section “Electronic Mail Communication” for more information.

 

62. Analyze the following email message for content, formatting, and email practices. Revise the message.

To: Staff

Subject: Changes

It has come to my attention that some of you apparently do not have enough work to keep yourselves busy. In the past six months, since I assumed the position as your boss, I have observed many of you playing computer games, making personal phone calls, and spending far too much time in personal conversations with each other. We have far too much work in this department for all of you to waste time like this.

Effective immediately, the following changes will be enforced: (a) No personal use of the computer will be tolerated. (b) No personal phone calls should be made except in case of an emergency. (c) Conversations must be limited to break time and lunchtime, in the lunchroom only.

I expect your cooperation. Thank you.

Just a final reminder that we will have a staff meeting tomorrow at 3 p.m.

ANSWER:   Answers will vary. The analysis of the email is discussed below:

a. Subject line should be more detailed but not negative.

b. Tone of the email should not be harsh and condescending to avoid damage to morale and interpersonal relations.

c. Email should start by reminding staff of the busy workload, focusing on a positive team approach for accomplishing the daily work.

d. Policy regarding personal use of computers and phones should be reviewed. Facts should be stated clearly to the staff, but not in a harsh tone.

e. The staff meeting reminder should be sent in another email and not written as an afterthought to this email.

f. The email should preferably be sent as a confirmation of the changes, following discussion in a face-to-face staff meeting.

A proposed solution follows:

To: Staff

From: Manager

Subject: Work culture improvement

Hello, everyone,

Most of you have noticed the increased workload we have had in the past few months. Some of you have worked extra hard to keep up with the demands, but it has become increasingly important that each one of us gives our best so we can all avoid working overtime. Staying on top of things requires a team effort with everyone contributing equally.

I would like to remind you to take advantage of your morning and afternoon breaks and give yourself your full lunchtime. This will help relieve work stress and give you a regular scheduled time to chat with your colleagues. Feel free to use the tables in the courtyard or the lunchroom. The office computers should not be used to play games as company policy requires that computers be used for work purposes only. Also, please limit personal phone calls on the company phone to emergency situations. Following these guidelines will allow all of us more productive.

We have a good staff, and I appreciate your hard work.

Thanks,

XYZ

REJ: Please see the section “Electronic Mail Communication” for more information.

 

63. You are the vice-president of sales for a Car Zone dealership in South Florida. Top sales people are annually recognized with Bronze, Silver, or Gold awards, depending on the level of their sales. Sales people are recognized at an annual banquet and presented with a certificate. The top sales person for the year is Brandon Spellman.

The top sales person for the year is Brandon Spellman.

Required: Write an email message to Car Zone employees congratulating all award winners and announcing Brandon Spellman as the top salesperson of the year.

ANSWER:   Answers will vary. The following guidelines should be followed while writing the email:

a. Write a subject line that mentions the topic, such as “Congratulations to Car Zone Top Sales People.”

b. Begin the email message, written deductively, with congratulations to Brandon Spellman as the top sales person for the year.

c. Provide the names of the winners of the Bronze, Silver, and Gold awards.

d. Explain the level of achievement required for receipt of these awards.

e. Close with a positive statement congratulating all award recipients.

A proposed solution follows:

To: Car Zone Employees

From: The Vice-president of sales

Subject: Congratulations to top sales representatives!

Hello, super sales representatives,

Congratulations to all sales representatives who received Bronze, Silver, and Gold awards last night at our annual banquet! We are especially proud of Brandon Spellman who received the Top Salesperson award of the year. He not only had the highest sales for the year but also broke our sales record! Great job, Brandon!

We have a terrific sales force! The recipient of the Gold award for sales of $xxxxxx is Alan, Silver award for sales of $xxxxxx is Joan, and Bronze award for sales of $xxxxxx is Jane.

Join me in congratulating your colleagues for their hard work this year. You all have the potential to be winners. Keep up the excellent job!

Best wishes,

XYZ

REJ: Please see the section “Electronic Mail Communication” for more information.

 

64. What is instant messaging? Discuss its features and uses.

ANSWER:   Answers will vary. Instant messaging (IM) is a real-time email technology that blends email with conversation; sender and receiver who are online at the same time can type messages that both see immediately.

The best-known IM programs are free and require no special hardware and little training. With some programs, users can exchange graphics and audio and video clips. To use instant messaging, users maintain a list of people with whom they want to interact. They can send messages to any or all of the people on their lists as long as the people are online. Sending a message opens up a window in which a user and his or her contact can key messages that they both can see immediately.

With IM, spelling and grammar matter less when trading messages at high speed. IM users often use shorthand for common words and phrases. IM and telephone communication also share common challenges: being sure that the sender is who he or she claims to be and that the conversation is free from eavesdropping.

Some managers worry that employees will spend too much work time using IM to chat with buddies inside and outside the company. They also emphasize that IM is not the right tool for every business purpose. Employees should still rely on email when they need a record and use the telephone for a personal touch. REJ: Please see the section “Electronic Mail Communication” for more information.

 

65. Discuss Web 2.0 technologies. Compare social media and web pages.

ANSWER:   Answers will vary. Web 2.0, which encourages online interaction, made it possible for people to participate on the Web. Unlike web pages, which are not generally interactive, social media enables people to connect online and have a conversation. Web 2.0 technologies include blogs, wikis, video, and social networking sites that enable users to generate their own content.

More and more organizations are using social media tools to communicate with customers.

Seventy-nine percent of the Fortune Global 100 companies use at least one of four social platforms—Facebook, videos, Twitter, and blogs—for this purpose. As with company websites, most employees are not responsible for posting to their organization’s social media platforms, but as with web pages, employees should understand the process and expectations for doing so. REJ: Please see the section “Web Page Communication and Social Media” for more information.

 

66. What is a wiki? Describe the guidelines that need to be followed for wiki writing.

ANSWER:   Answers will vary. A wiki is a collaborative website that hosts the collective work of many authors. Similar to a blog in structure and logic, a wiki allows anyone to edit, delete, or modify content, even the work of previous authors. While allowing everyday users to create and edit a website encourages cooperative use of electronic information, the content posted at such sites should not be considered authoritative. When wiki writing, avoid the first-person blogging style and conform to the tone and flow of the existing article. Wikis are not typically the place for personal opinion and analysis. Hence, present factual information in clear, concise, and neutral language.

Many businesses make use of wikis to encourage free flow of ideas within the organization. Content in a wiki can be updated in real time, without any real administrative effort, and without the need for deliberate distribution. Contributors simply visit and update a common website. Wikis facilitate the exchange of information within and between teams. They allow maintenance of a series of unique documents with evolving content. Placing a document in a wiki does not necessarily make it editable by everyone with access to the wiki. REJ: Please see the section “Web Page Communication and Social Media” for more information.

 

67. Describe the policies created by companies to ensure that employees use social media responsibly.

ANSWER:   Answers will vary. Typically, the policies for the use of social media address three broad areas: communicating honestly and ethically, protecting a corporation’s proprietary information and employee privacy, and maintaining an employee’s credibility and an organization’s reputation.

a. Communicate honestly and ethically. When using social media platforms, writers should be transparent about who they are, who they work for, their role, and whether they have a vested interest in an issue. Contributors should write about their area of expertise. For example, a marketing specialist should not contribute information about human resources practices.

b. Protect the company’s proprietary and employees’ private information. This should be obvious. Sharing proprietary information can cost an organization thousands or millions of dollars. Sharing private employee information can expose a writer and the company to legal damages and may endanger or harm individuals if personal addresses or information that enables identity theft is publicized.

c. Protect yours as well as your company’s reputation. When communicating on social media sites, a writer should be concerned about projecting a professional persona for himself or herself and a reputable image of the company. Making negative statements about competitors, supervisors, colleagues, or company policies may expose the contributor to disciplinary measures or the company to legal threats or bad publicity. REJ: Please see the section “Web Page Communication and Social Media” for more information.

 

68. List the recommended guidelines for effective voice mail communication.

ANSWER:   Answers will vary. Voice mail technology allows flexibility in staying in touch without the aid of a computer and reduces telephone tag. Just as email communication can be enhanced by adhering to some basic principles, voice mail communication can be more effective by following recommended guidelines:

a. Update your greeting often to reflect your schedule and leave special announcements.

b. Leave your email address, fax number, or mailing address on your greeting if this information might be helpful to your callers.

c. Encourage callers to leave detailed messages. If you need certain standard information from callers, use your greeting to prompt them for it. Such information often eliminates the need to call back.

d. Instruct callers on how to review their message or be transferred to an operator.

e. Check your voice mail regularly, and return all voice messages within 24 hours. REJ: Please see the section “Voice and Wireless Communication” for more information.

 

69. Describe the commonsense guidelines that help ensure that you are not seen as a discourteous cellphone user.

ANSWER:   Answers will vary. Few commonsense guidelines that help ensure that you are not seen as a discourteous cellphone user are discussed below.

a. Be aware of company cellphone policies and obey them. Some companies do not allow cellphone use for personal reasons during work hours. Most companies have policies prohibiting the harassment of others, and today’s smartphones make it easy to send thoughtless messages using various media instantaneously. Not only might these messages damage the sender, but they may also reflect poorly on the employer if posted to Twitter or some other public social medium.

b. Observe wireless-free quiet zones. This obviously includes theaters, performances, and religious services, but can also include meetings, restaurants, hospitals, and other public places. Exercise judgment about silencing your ringer, switching to vibrate mode, or turning off your phone.

c. Respect others in crowded places and be wary of publicizing company information. Speak in low conversational tones, and consider the content of your conversation. You should use good judgment in determining when and where to discuss proprietary company information or client data. Divulging such information in public places might enable its abuse by others.

d. Think safety. Some states and municipalities have banned the use of cellphones while driving. Others allow the use of hands-free devices only. Even if not illegal, cellphone usage increases the risk of accident by distracting a driver. Some companies are implementing cellphone policies that prohibit operators of company-owned vehicles from using cellphones or other communication devices while driving in order to minimize risks to their employees and liability resulting from accidents. REJ: Please see the section “Voice and Wireless Communication” for more information.

 

 

There are no reviews yet.

Add a review

Be the first to review “BCOM 9TH EDITION BY CAROL M. LEHMAN – Test Bank”

Your email address will not be published. Required fields are marked *

Category:
Updating…
  • No products in the cart.