Process Management

Help Questions

CPA Business Environment and Concepts (BEC) › Process Management

Questions 1 - 6
1

Which of the following methods would be most effective for a company that wants to reduce its rate of defective products?

Variable costing

Six Sigma

Sensitivity analysis

Break-even analysis

Explanation

Six Sigma is a quality improvement program that uses metrics to evaluate the achievement of goals. Improving current processes for reducing defective products is a big component.

2

Unlike business process reengineering, business process management:

Has a longer implementation time

Increases the financial risk associated with change

Seeks incremental change

Seeks radical change

Explanation

Business process management seeks incremental change by tweaking the existing process and design.

3

Which of the following is not a disadvantage of outsourcing?

Security issues

Risk mitigation

Quality of service

Language barriers

Explanation

Non core functions to one business become critical for companies providing outsourcing services thereby reducing risk exposure in the event an issue arises.

4

Performance of quality assurance occurs in which of the following processes?

Close

Authorization

Planning

Implementation

Explanation

Quality assurance takes place in the implementation process after the standard of quality has been defined.

5

Organizations with one-piece flow manufacturing environments that are experiencing bottlenecks in production are most likely to develop strategies associated with:

Theory of constraints

Lean manufacturing

Demand flow manufacturing

Just in time management

Explanation

The theory of constraints says that organizations are impeded from achieving objectives by the existence of one or more constraints.

6

Of the following, which is not a key component of IT used in modern business?

Decision support systems

Accounting information systems

Management information systems

All of these are key components

Explanation

Among other systems, the following are critical for modern IT infrastructure.

Return to subject