Marketing
Finance
Entrepreneurship
Hospitality
FBLA/Misc
100

DECA
Businesses need to identify their markets in order to? A. improve their research methods.
B. control the costs of production.
C. reach goals and satisfy customers.
D. be sure to appeal to all consumers.

C. reach goals and satisfy customers.

100

DECA
What type of information is often transmitted through upward communication?
A. Instructions
B. Suggestions
C. Evaluations
D. Corrections

B. Suggestions

100

DECA
Which of the following is an example of a potential cost:
A. The cost of capital investment
B. The cost of installation
C. The cost of utilities
D. The cost of project failure

D. The cost of project failure

100

DECA
Which of the following is an effective strategy to use before beginning to read:
A. Think about what you want to learn.
B. Take notes.
C. Consult a glossary.
D. Summarize the information.

A. Think about what you want to learn.

100

FBLA (Parliamentary Procedure)
A meeting that is called to be held at a time different from the regular meeting to consider one or more items, is called a/an ______.
A. Executive meeting
B. Sine die meeting
C. Adjourned meeting
D. Special meeting

D. Special meeting

200

FBLA
Consumers are most likely to be involved in which business function?
A. Accounting
B. Production
C. Marketing
D. Operations

C. Marketing

200

FBLA

A college fund for a 2-year-old is an example of:

a) Short-term goal

b) Medium-term goal

c) Long-term goal

d) Irrelevant goal

c) Long-term goal

200

FBLA

In digital marketing, “SEO” stands for:

a) Sales Enhancement Opportunity

b) Search Engine Optimization

c) Strategic Engagement Operation

d) Social Engagement Outreach

b) Search Engine Optimization

200

FBLA

The first step in creating a comprehensive event plan is to:

a) Secure vendor contracts

b) Define objectives and target audience

c) Book the venue

d) Create a marketing campaign

b) Define objectives and target audience

200

FBLA (Journalism)
A photographer takes a picture of a protest in a public park. Can the image be published without consent?
A. Yes, because it's in a public setting
B. No, all individuals must consent
C. Only if the protest was newsworthy
D. Only if the photographer had a press badge

A. Yes, because it's in a public setting

300

DECA
Ethical dilemmas should be thought of as?
A. challenges.
B. opportunities.
C. easily avoidable.
D. emergencies.

B. opportunities.

300

DECA
Which of the following is a tax-deductible gift:
A. Stocks
B. Vacation home
C. Charitable donation
D. Inherited items

C. Charitable donation

300

DECA

Which of the following is a true statement about promotion:

A. Promotional budgets should be at least $200,000.

B. Companies should utilize all types of media.

C. Successful promotional strategies should not be changed.

D. Promotion's ultimate goal is to increase sales.

D. Promotion's ultimate goal is to increase sales.

300

DECA
Consumer spending tends to decrease when
A. an economic recession ends.
B. interest rates decrease.
C. business activities slow.
D. the inflation rate declines.

C. business activities slow.

300

FBLA (Tech Support & Services)
Which tool would best help to identify network connectivity issues?
A. Task Manager
B. Ping command
C. Disk Defragmenter
D. Control Panel's Sound settings

B. Ping command

400

FBLA
Which one of the following would include making improvements to existing products?
A. Marketing-information management
B. Market planning
C. Product and service management
D. Pricing

C. Product and service management

400

FBLA
A credit score of 780 is generally considered:

a) Poor

b) Fair

c) Excellent

d) Subprime

c) Excellent

400

FBLA
When drafting a business plan, which is the most effective approach to demonstrate market viability?

a) Include personal opinions of the founders

b) Provide detailed market research data and trends

c) Focus only on product features

d) Exclude competitor analysis

b) Provide detailed market research data and trends

400

FBLA
FIFO inventory management ensures that:

a) Old stock is used before new stock to reduce waste

b) New stock is always used first

c) Food costs are eliminated entirely

d) Staff handle only frozen products

a) Old stock is used before new stock to reduce waste

400

FBLA (Data Science & AI)
Which is an example of narrow AI?
A. Self-driving car software
B. General AI with human-like reasoning
C. An AI that can perform all intellectual tasks
D. Human brain emulation

A. Self-driving car software

500

DECA
Bryant recently applied for a personal loan from the Maryville Community Credit Union, but his application was rejected. Bryant has a friend who works at the credit union, so he asks her what went wrong with his application. She told Bryant that the credit union's manager is prejudiced and rarely accepts applications from individuals of Bryant's religion. The credit union violated Bryant's right to?
A. equal credit opportunity.
B. a guaranteed credit line.
C. proper notice of rejection.
D. practice his religion.

A. equal credit opportunity.

500

DECA
The Halifax Retail chain uses computer applications to track its inventory and order goods from its vendors. What form of technology is the company using to streamline its purchasing processes?
A. Customer relationship management (CRM)
B. Global positioning system (GPS)
C. Electronic data interchange (EDI)
D. Territorial routing application (TRA)

C. Electronic data interchange (EDI)

500

DECA
Scooter's Bakery is having trouble selling a certain flavor of pie. Scooter wants to offer a $2.00 reimbursement after, not at the time of, the sale. Which sales promotion would Scooter use?
A. Coupon
B. Rebate
C. Sweepstakes
D. Markdown

B. Rebate

500

DECA
Stella works for a cruise line, and she is recommending that the owners add another Alaskan cruise to the yearly schedule. She wants to demonstrate how sales of Alaskan cruises have risen over the past several years. What kind of chart should Stella use to demonstrate this?
A. Scatter
B. Pie
C. Column
D. Histogram

C. Column

500

FBLA (Cybersecurity)
Which type of attack floods a system with traffic to make it unavailable?
A. SQL Injection
B. Brute force
C. Distributed Denial of Service (DDoS)
D. Phishing

C. Distributed Denial of Service (DDoS)

M
e
n
u