Search Header Logo

City & Guilds Award in Business Processes

Authored by Duncan Binnie-Ritchie

Computers

12th Grade

Used 225+ times

City & Guilds Award in Business Processes
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which one of the following is the best definition of a standard operating procedure (SOP)?

A procedure that is enforceable by the government.
A procedure that must be followed by everyone.
A procedure that is not written down in the company handbook.
A procedure that is recognised internationally by the ISO.

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

During which stage of the business system lifecycle will a new service be normally rolled out or an old one withdrawn?

Strategy Stage.
Design Stage.
Transition Stage.
Operations Stage.

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What is the main purpose of the service strategy stage in the Business System Lifecycle?

To identify improvements to a service in business operations.
To discontinue a current service that is no longer needed.
To hold a strategic service meeting for all parties involved.
To plan the services needed to meet business requirements.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which one of the following organisational procedures refers to the allocation of equipment to an employee?

Configuration Management.
Joiner Mover Leaver process.
Organisational Management.
Personal Asset Tracking.

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Why is undertaking an Internal Audit an important aspect of information security management?

It gives management a way to improve health and safety.
It allows management to detect any non-compliance.
It gives management a way of eliminating waste.
It enables management to reduce costs.

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

What does the Data Protection Act 1998 require?

All computer software must be kept safe.
All computer systems must be secure.
All personal information must be held securely.
All business networks must have a firewall.

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which one of the following would be the best way to securely hold a confidential data file on a laptop?

Give it a misleading name.
Hide it in a system folder.
Encrypt it using suitable software.
Hold it as a JPEG image.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?