An example of price competition is a hotel's promotion of its:
A. airport shuttle bus.
B. trained service staff.
C. special weekend room rates.
D. sauna and exercise equipment.
C (Special weekend room rates)
A bike company envisions itself as young, active, and rugged. This is its brand:
A. identity.
B. personality.
C. value.
D. promise.
B (Personality)
Which of the following are considered the owners of a corporation:
A. Lower level employees
B. Managers
C. Stockholders
D. CEOs
C (Stockholders)
Tom runs a company that produces pencils. To stay in business, Tom must:
A. have a distribution plan.
B. make a profit.
C. employ a sales force.
D. order more machinery.
B (Make a profit)
The desire for an item that has monetary value is a(n) __________ want.
A. non-economic
B. unlimited
C. economic
D. intangible
C (Economic)
Sharon is in charge of examining and preparing financial records at her company. What category of finance careers does she likely work in?
A. Securities and investments
B. Banking services
C. Insurance
D. Accounting
D (Accounting)
Many businesses use database software programs to computerize their customer mailing lists in order to instantly:
A. prepare sales letters.
B. sort by zip code.
C. write email messages.
D. calculate monthly profit.
B (Sort by zip code)
Which of the following is an example of business managers dealing unethically with employees:
A. Offering limited part-time options
B. Disciplining a whistle-blower
C. Monitoring use of supplies
D. Downsizing the workforce
B (Disciplining a whistle-blower)
What usually decreases when the economy is experiencing a period of contraction?
A: Interest rates
B: Consumer spending
C: Cost of living
D: Unemployment
B (Consumer Spending)
Businesses seeking to target the teenage market often use:
A. newspapers.
B. specialty advertising.
C. direct mail.
D. broadcast media.
D (Broadcast media)
One way that a business can learn about its competitors' activities is by:
A. developing product specifications.
B. reviewing secondary data.
C. identifying communication barriers.
D. evaluating intranet efficiencies.
B (Reviewing secondary data)
A business can protect its confidential computer information from unauthorized users by:
A. encrypting computer files.
B. developing internet message boards.
C. conducting annual virus scans.
D. classifying business data.
A (Encrypting computer files)
Once you have acknowledged your existing biases, you should:
A. explain to others that everyone has biases.
B. try not to dwell on them so they will not affect you.
C. monitor and challenge your biased thoughts.
D. interact with people who share your biases.
C (Monitor and challenge your biased thoughts)