Reference no: EM132278564
1. The depth and detail of a business plan is determined primarily by which of the following factors?
A. The experience of those leading the new venture
B. The target market of the new venture
C. The size and scope of the new venture
D. The amount of funds raised for the new venture
2. In a corporation, the type of stock that is the basic form of ownership and that denotes voting rights at shareholder meetings is
A. Preferred stock
B. Common stock
C. Treasury stock
D. No par stock
3. Which of the following types of business ownership should include written provisions for dissolving the business?
A. Sole proprietorship
B. Partnership
C. Corporation
D. Cooperative
4. Criteria such as stability, security, and compatibility with current technology most often used to evaluate
A. An external hard Drive
B. A network laser printer
C. Bitmap image software
D. An operating system
5. Which of the following is the process through which a computer user identity is verified and validated to access a computer?
A. Authentication
B. Emulation
C. Encryption
D. Recursion
6. Which of the following best describes a non-traditional student as defined by the Carl D Perkins career and Technical education Act?
A. A student seeking a career field in dominated by people of the opposite gender
B. A student from a low socioeconomic status household
C. A student born outside the US whose first language is not English
D. Single parent who has either custody or joint custody of a minor child
7. Which of the following types of business ownership should include written provisions for dissolving the business?
A. Sole proprietorship
B. Partnership
C. Corporation
D. Cooperative
8. A financial advisor with a fiduciary Duty would invest in which of the following?
A. A pyramid scheme started by the advisors friend
B. And establish a mutual fund that later decreases in value
C. And insolvent company listed on the New York Stock Exchange
D. A friend’s internet startup company
9. Which of the following is a primary function of a firewall?
A. Preventing viruses from entering a network
B. Preventing spam emails from entering a network
C. Preventing unauthorized access to a network
D. Preventing distributed denial of service attacks to a network