
BUAW Lesson 2 - Organisational structure and governance
Authored by AAT Tutors
Professional Development
Professional Development
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which are the correct organisational structures?
Matrix
Department
Functional
Division
Operational
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A business that buys raw material from an overseas supplier in a country where war has broken out, decides to find a new supplier based in the UK.
Which strategic approach is the organisation taking to manage the following risks?
Transfer
Accept
Reduce
Avoid
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A business that wants to move to using electric vehicles is concerned about the cost of replacing the batteries, so decides to lease the vehicles rather than buying them.
Which strategic approach is the organisation taking to manage the following risks?
Transfer
Accept
Reduce
Avoid
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A business that is entering into a long-term contract with a contractor is concerned about increasing prices in the future so negotiates a fixed price for the contract.
Which strategic approach is the organisation taking to manage the following risks?
Transfer
Accept
Reduce
Avoid
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a reputational risk to a business?
One of its suppliers has been unable to import the raw materials required by the business.
The sales director has left the business to join the board of trustees of a charity.
The managing director has been implicated in some insider trading in the shares of another business.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The ‘top-down’ structure of a business with centralised control often leads to a less collaborative working atmosphere.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
‘A cyber-attack that records every keystroke a user makes, which can then be used to identify password and other sensitive information.’
Spyware
Keylogging
Phishing
Password Attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Comunicación Asertiva
Quiz
•
Professional Development
15 questions
BJT - BASICS
Quiz
•
Professional Development
12 questions
Maslow's theory test
Quiz
•
Professional Development
12 questions
Test de emprendimiento
Quiz
•
Professional Development
10 questions
Tools of KPI
Quiz
•
Professional Development
10 questions
Applied Networking
Quiz
•
Professional Development
10 questions
FUTURES THINKING & SCENARIO PLANNING
Quiz
•
Professional Development
15 questions
Emerging Tech
Quiz
•
Professional Development
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Professional Development
15 questions
LOTE_SPN2 5WEEK3 Day 2 Itinerary
Quiz
•
Professional Development
6 questions
Copy of G5_U6_L5_22-23
Lesson
•
KG - Professional Dev...
10 questions
March Quiz
Quiz
•
Professional Development
5 questions
Copy of G5_U6_L8_22-23
Lesson
•
KG - Professional Dev...
10 questions
suffixes FUL OR LESS
Quiz
•
Professional Development