Test your basic knowledge |

Business And Technology

Subject : business-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Website success solely is measure by






2. Means Garbage In Garbage OUt






3. This approach views an organization as a series of processes - each of which adds value to the product or service for each customer.






4. Is responsible for (1) overseeing all uses of informatin technology (2) ensuring the strategic alignment of IT with business goals and objectives. CIO often reports directly to the CEO






5. Is data converted into a meaninfgul and useful context.






6. Is responsible for ensuing the ethical and legal use of informatio within an organization. these are lawyers






7. Measure the impact IT has on business processes and activities includin customer satisfaction - conversion rates - and sell through increases.






8. Is the analysis and redesign of workflow wthin and between enteprises. ex. NetFlix - Redbox






9. Is responsible for ensuring the throughput - speed - accuracy - availability - and reliability of an organization information.






10. To remain sucessful - and organizatios should use what?

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


11. Involves maaging all aspect of a customer's relationship with an organization to increase customer loalty and retention and organization's profitabilty. CRM allow an organization to gain insights into customers' shopping and buying beaviors ir order






12. Involves he management of information flows between and among stages in a a supply chain to maximize total supply chain effectiveness an profitability.






13. Raw facts that describe the characteristics of an event/information knowledge/business intelligent and competative advantage






14. The Benefits and and Magnitude of Change the Process Change Spectrum what would be th small change






15. A general name for the business function and academic discipline covering the application of people - technologies - and procedures.






16. Secure Sockets Layers: donted by th lock symbol in the lower right corner of a browser window and or he "s" in https; SSL is 128 bits. 128bit=2^128






17. Is responsible for collecting - maintaining - and distributing the organization's knowledge. data has base adminstrator






18. What does COO stands for






19. Out of the Relationship among People - Information - and Information Technology which one is the most important?






20. Is a standardized seet of activities that accomplish a specific task - such as processing a customer's order.






21. Is high when there are many alternatives to a product or service and low when there are few alternative from which to choose.






22. What is the function of CIO?






23. Buyer power - supplier power - threat of substitute product or services - threat of new entrants - rivalry among existing competiors






24. The most Effectiveness IT Metrics. the ease with which people perform transactions and/or find informatin. A popular usability metric on the internet is degrees of feedom - which measures the number of clicks required to find desired infomation.






25. What does CFO stands for






26. What does CIO stands for






27. Enables an organizatin to generate efficiencies within steps by automating and improving the information flows Wal-art and Procter&Gamble(P&G) implemented a tremedously successful SCM system. the system linked Wal-Mar's distribution centers directly






28. Is a field concrned with te use of technology in managing and processing information.It consist of hardware - software and telecommunication






29. A university professor at Harvard Business School - identified four competitive forces that can hurt potential sales.






30. Is high when competition is fierce in a market and low when competition is more complacent






31. Reward customers based on th amount of business they do with a particuar organization.






32. Consists of all parties involved - directly or indirectly - in the procurement of a poduct or raw materials






33. Mostly misuse by persons inside or outside an organization.






34. Occurs whn a company develops unique differences in its products with th intenet t influence demand






35. Is assessed analyzing the ability of buyers to directly impact the price they are willing to pay for an item.






36. Employees across departments are open to new insights about crises and radical changes and seek ways to create competitive advantages.






37. A famous management guru - once stated that if you cannot measure it - you cannot manage it






38. Costs that can make customers relcutant to switch to another product or service






39. The leading cause of downtime






40. The 4 strategic initiatives






41. What is on the mind of the CEO






42. A process of continuously measuring system results - comparing those results to optimal system performance (benchmark values) - and identifiying steps and procedures to improve syste performance.






43. What information technology projects goals has the most value?






44. The most important type of Efficiency IT Metics; the extent to which a system generates the correct results when executing the same transaction numerous times.






45. What would be the Greatest Benefits for Information Technology?






46. Occurs when an organization can significantl impact its marketshare by being first to market with a competitive advantage.






47. Most information security breaches result from people misusing an organizaton's information either Intentionally or Inadvertently. misuse of passwords






48. Is responsible for ensuring the security of IT system and developing strategies and IT safeguards against attacks fom hacker and viruses. He is call the Network Administrator






49. Information-Functional - Information-sharing - Information-inquiring - and Information-discovery






50. Baseline values the system seesks to attain