Chapter 20
Raj and Lee are both connected to Bob, but Raj and Lee are not connected to each other. From this scenario we can infer that
Bob is a structural hole
which of the following networks is the best example of a communication network
In a restaurant, George welcomes the customers, Jake's team takes the orders, and finally Jim's team serves the customers and conducts financial transactions.
Sam was unemployed and looking for a job. None of his close friends could help him as they themselves were all either unemployed or underemployed. However, Sam got a good job through James who he met a few months ago while traveling. From this scenario, it can be inferred that
James belongs to Sam's weak ties
which of the following networks is the best example of a trust network
Pinky couldn't work on her project due to some personal issues. She discussed her issues with Paul, her teammate, and he helped her finish the task on time.
which of the following networks best exemplifies an advise network
When it comes to solving technical issues, the employees in an organization often get suggestions from Victor, who has more technical expertise.
Which of the following conceptions of centrality represents potential control over information and over connections to others that anyone may want to reach?
betweenness
Lu, who is part of the production department, has key connections with members of the R&D, marketing, art, technical support, distribution, and human resources departments. From this information, we can infer that Lu is a
boundary spanner
which of the following is one of the conceptions of centrality
closeness
Sandy is a very competent technical expert, but her coworkers will not go to her for advice, seeking out the more likable, albeit less competent, Bob instead. From this scenario, we can infer that Sandy is a
competent jerk
effective networks
include a proper balance between the breadth of contacts and the depth or strength of contacts
According the David Krackhardt, the components of strong ties are
interaction, affection, and time
which of the following networks is considered to be the best?
large diverse networks with strong and weak ties
According to Brian Uzzi and Shannon Dunlap, which of the following is the first step in building a useful internal network?
mapping your network
Which of the following networks allows employees to share sensitive information and support one another in a crisis?
trust networks
Marvin is a high-performance general manager who has built and cultivated a strong network of relationships. Marvin has worked to create _____ capital.
social
which of the following statements about the strengths of ties is true
Unlike strong ties, weak ties provides individuals with exposure to novel information.
which of the following about communication networks is true
Examining communication networks can be helpful in identifying some of the gaps in information flow.
which of the following about interpersonal relationships is true
Interpersonal networks are networks of relationships that develop across functions and divisions to accomplish tasks quickly.
Which of the following is one of the six myths that exist about the best ways to build useful networks?
I already know what is going on in my network
Gail has a high level of connectivity with people in the organization and tends to know valuable information before anyone else. From this information, we can infer that Gail is a
broker
_____ refers to the activities associated with developing and managing relationships that are critical to a person's ability to accomplish tasks and develop personally and professionally.
networking
one of the three concepts of centrality, degree of centrality
represents the number of contacts to whom a person is connected in a social network.
Joe has connections with Shelley and Bob, who have similar positions with the organization. In the course of one hour, Joe receives the same piece of new information from both Shelly and Bob. From this scenario, we can infer that
shelley and bob are boundary spanners