
City & Guilds Award in Business Processes
Authored by Duncan Binnie-Ritchie
Computers
12th Grade
Used 225+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which one of the following is the best definition of a standard operating procedure (SOP)?
A procedure that is enforceable by the government.
A procedure that must be followed by everyone.
A procedure that is not written down in the company handbook.
A procedure that is recognised internationally by the ISO.
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
During which stage of the business system lifecycle will a new service be normally rolled out or an old one withdrawn?
Strategy Stage.
Design Stage.
Transition Stage.
Operations Stage.
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
What is the main purpose of the service strategy stage in the Business System Lifecycle?
To identify improvements to a service in business operations.
To discontinue a current service that is no longer needed.
To hold a strategic service meeting for all parties involved.
To plan the services needed to meet business requirements.
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which one of the following organisational procedures refers to the allocation of equipment to an employee?
Configuration Management.
Joiner Mover Leaver process.
Organisational Management.
Personal Asset Tracking.
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Why is undertaking an Internal Audit an important aspect of information security management?
It gives management a way to improve health and safety.
It allows management to detect any non-compliance.
It gives management a way of eliminating waste.
It enables management to reduce costs.
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
What does the Data Protection Act 1998 require?
All computer software must be kept safe.
All computer systems must be secure.
All personal information must be held securely.
All business networks must have a firewall.
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which one of the following would be the best way to securely hold a confidential data file on a laptop?
Give it a misleading name.
Hide it in a system folder.
Encrypt it using suitable software.
Hold it as a JPEG image.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?