SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Business And Technology
Start Test
Study First
Subject
:
business-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To remain sucessful - and organizatios should use what?
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
2. Is a standardized seet of activities that accomplish a specific task - such as processing a customer's order.
People
Business proess
Usability
Switching costs
3. Is the acauisition and analysis of evenst and trends in the environment external to an organization.
Threat of substitute products or services
Countefeit software
Environmental scannig
Security breach
4. Effective communication between business personnel and IT personnel
Supplier power
Benchmarking
Organizatonal Informaion Cultures
One of the greatest challenges today
5. The most Effectiveness IT Metrics. the ease with which people perform transactions and/or find informatin. A popular usability metric on the internet is degrees of feedom - which measures the number of clicks required to find desired infomation.
Usability
Information security
Data
Supplier power
6. Is assessed by th supplier's ability to directly impact the price they are charging for supplies(including materials - labor - and services)
Enhance Customer Satisfaction
Benchmarks
Enhancing customer satisfaction
Supplier power
7. Reward customers based on th amount of business they do with a particuar organization.
Loyalty programs
Chief Executive officer
Security breach
Brusiness process reengineering (BPR)
8. Out of the Relationship among People - Information - and Information Technology which one is the most important?
People
Threat of new entrants
Benchmarking
Organizatonal Informaion Cultures
9. Is high when it is easy for new cdompetitors to enter a market and low when there are significant entry barriers to entering market.
Chief privacy officer(CPO)
Chief Financial Officer
Threat of new entrants
Brusiness process reengineering (BPR)
10. What is the function of CIO?
SCM software
Automate
Manage - leader - communicator
Chief knowldedge officer (CKO)
11. The leading cause of downtime
Value chain
Porters's Five Forces - the three generic strategies - and value chanin analysis to adopt new business strategies
Amount of traffic
Software failure and human error
12. What does CEO stands for
Security breach
Chief Executive officer
Management Information System (MIS)
Chief security officer (CSO)
13. Website success solely is measure by
G I G O
Chief Information Officer
Reducing Cost/Improve Productivity
Amount of traffic
14. What Concerns CIOs the most?
Enhancing customer satisfaction
Environmental scannig
Enhance Customer Satisfaction
Chief Information Officer
15. Is assessed analyzing the ability of buyers to directly impact the price they are willing to pay for an item.
Organizatonal Informaion Cultures
Chief knowldedge officer (CKO)
Buyer power
Usability
16. The 4 strategic initiatives
Effeciveness IT metics
Chief security officer (CSO)
SCM - CRM - ERP AND BPR
Supply chain
17. Is a product or service that an organization's customer place a greater value on than similar offerings from a competitor.
People
Chief information officer
Comptevive advantage
Benchmarks
18. Is responsible for collecting - maintaining - and distributing the organization's knowledge. data has base adminstrator
Chief knowldedge officer (CKO)
Informaton
Customer Relationship management(CRM)
Chief privacy officer(CPO)
19. Is responsible for ensuring the throughput - speed - accuracy - availability - and reliability of an organization information.
Chief technology offiicer(CTO)
Value chain
Supplier power
Chief information officer
20. Occurs whn a company develops unique differences in its products with th intenet t influence demand
Product differentiation
One of the greatest challenges today
Porters's Five Forces - the three generic strategies - and value chanin analysis to adopt new business strategies
Effeciveness IT metics
21. Measure the impact IT has on business processes and activities includin customer satisfaction - conversion rates - and sell through increases.
Effeciveness IT metics
Chief Executive officer
Threat of substitute products or services
The basic component of supply chain management
22. Information-Functional - Information-sharing - Information-inquiring - and Information-discovery
First-mover advantage
Supplier power
Organizatonal Informaion Cultures
Chief Operation Officer
23. Involves maaging all aspect of a customer's relationship with an organization to increase customer loalty and retention and organization's profitabilty. CRM allow an organization to gain insights into customers' shopping and buying beaviors ir order
Chief privacy officer(CPO)
Enhance Customer Satisfaction
Customer Relationship management(CRM)
The basic component of supply chain management
24. What would be the Greatest Benefits for Information Technology?
Customer Service
Reducing Cost/Improve Productivity
Software failure and human error
Product differentiation
25. Is responsible for ensuring the security of IT system and developing strategies and IT safeguards against attacks fom hacker and viruses. He is call the Network Administrator
Chief security officer (CSO)
Business process
Environmental scannig
Switching costs
26. This approach views an organization as a series of processes - each of which adds value to the product or service for each customer.
Value chain
Business is always #1
Peter Drucker
Customer Service
27. Is the analysis and redesign of workflow wthin and between enteprises. ex. NetFlix - Redbox
Security breach
Brusiness process reengineering (BPR)
Supply chain
Buyer power
28. Raw facts that describe the characteristics of an event/information knowledge/business intelligent and competative advantage
Data
Benchmarking
Balanced scorecard
Chief information officer
29. Means Garbage In Garbage OUt
Reducing Cost/Improve Productivity
Data
G I G O
Porters's Five Forces - the three generic strategies - and value chanin analysis to adopt new business strategies
30. What does CFO stands for
Chief Financial Officer
Porters's Five Forces - the three generic strategies - and value chanin analysis to adopt new business strategies
Environmental scannig
SCM - CRM - ERP AND BPR
31. Is a field concrned with te use of technology in managing and processing information.It consist of hardware - software and telecommunication
Chief information officer
G I G O
Information Technology (IT)
Chief security officer (CSO)
32. Enables an organizatin to generate efficiencies within steps by automating and improving the information flows Wal-art and Procter&Gamble(P&G) implemented a tremedously successful SCM system. the system linked Wal-Mar's distribution centers directly
Efficiency IT metrics
Enhancing customer satisfaction
SCM software
Product differentiation
33. The plans and goals of the IT department must align with the plans and goals of the organization.
Automate
Product differentiation
Business is always #1
The Five Forces Model
34. Baseline values the system seesks to attain
Benchmarks
Countefeit software
Informaton
Chief privacy officer(CPO)
35. What is on the mind of the CEO
Enterprise resource planning (ERP)
Enhance Customer Satisfaction
Chief privacy officer(CPO)
Porters's Five Forces - the three generic strategies - and value chanin analysis to adopt new business strategies
36. The most important type of Efficiency IT Metics; the extent to which a system generates the correct results when executing the same transaction numerous times.
Reducing Cost/Improve Productivity
Key performance indicators (KPIs)
Threat of substitute products or services
Informantion accuracy
37. Costs that can make customers relcutant to switch to another product or service
G I G O
Data
Usability
Switching costs
38. Measures that are tied to busines drivers Metrics such as GPA(grade point average)
Supply chain
Key performance indicators (KPIs)
Chief knowldedge officer (CKO)
Manage - leader - communicator
39. Measure the performance of the IT system itself includngthroughput - speed - and availability.
Supplier power
Amount of traffic
Efficiency IT metrics
Automate
40. Integrates all departments and functins thoughout an organization into asingle IT system (or integrated set of IT systems) so that employees can ake decisions by viewing enterprisewide information on all businss operations.:is a software island of in
Environmental scannig
SCM software
Enterprise resource planning (ERP)
Chief Operation Officer
41. What does CIO stands for
Organizatonal Informaion Cultures
Comptevive advantage
Security breach
Chief Information Officer
42. Is responsible for (1) overseeing all uses of informatin technology (2) ensuring the strategic alignment of IT with business goals and objectives. CIO often reports directly to the CEO
Comptevive advantage
Michael Porter
Chief information officer
Threat of substitute products or services
43. A general name for the business function and academic discipline covering the application of people - technologies - and procedures.
Information Discovery
Product differentiation
Management Information System (MIS)
Threat of substitute products or services
44. Is high when there are many alternatives to a product or service and low when there are few alternative from which to choose.
Porters's Five Forces - the three generic strategies - and value chanin analysis to adopt new business strategies
Organizatonal Informaion Cultures
Threat of substitute products or services
Supplier power
45. Issuses Affected by Technology Advance: intellectual property - Copyright - fair use doctrine - pirated software and counterfeit software of these which is the worst?
SSL
Porters's Five Forces - the three generic strategies - and value chanin analysis to adopt new business strategies
Information security
Countefeit software
46. Secure Sockets Layers: donted by th lock symbol in the lower right corner of a browser window and or he "s" in https; SSL is 128 bits. 128bit=2^128
SSL
Product differentiation
Chief Financial Officer
SCM software
47. The Benefits and and Magnitude of Change the Process Change Spectrum what would be th small change
Automate
Amount of traffic
The basic component of supply chain management
Loyalty programs
48. Most information security breaches result from people misusing an organizaton's information either Intentionally or Inadvertently. misuse of passwords
Management Information System (MIS)
Security breach
People
Effeciveness IT metics
49. A famous management guru - once stated that if you cannot measure it - you cannot manage it
Peter Drucker
Management Information System (MIS)
Supplier power
Efficiency IT metrics
50. Occurs when an organization can significantl impact its marketshare by being first to market with a competitive advantage.
First-mover advantage
Buyer power
Environmental scannig
Chief knowldedge officer (CKO)