筛选结果 共找出50

Are the following statements true or false?

1 Adair's leadership model focuses on what leaders do and not what they are

2 The Ashridge leadership model proposes a democratic approach to leadership

A

Both statements are true

B

Statement 1 is true; statement 2 is false

C

Statement 1 is false; statement 2 is true

D

Both statements are false

Which leadership approach sees the leadership process in a context made up of three interrelated variables: task needs, the

individual needs of group members and the needs of the group as a whole?

A

Action-centred leadership

B

Contingency theory

C

The managerial grid

D

Dispersed leadership

____ is the managerial function concerned with establishing a structure of tasks;grouping and assigning them to

appropriate units; and establishing lines of information and reporting to support performance.Which managerial function is

referred to in this definition?

A

Planning

B

Organising

C

Controlling

Which of the following is not one of Fayol's five functions of management?

A

Planning

B

 Organising

C

Motivating  

D

Commanding

According to Drucker, which one of the following is a management task?

A

Informational 

B

Developing people

C

Decisional

Which of the following writers put forward specific differences between the role of the manager and the role of the leader?

A

Bennis

B

Heifetz

C

Fielder

D

Blake and Mouton

Which of the following statements about internal audit is true?

A

Internal audit is an independent appraisal activity

B

Internal audit is separate from the organisation's internal control system

C

Internal audit is carried out solely for the benefit of the organisation's stakeholders

D

The internal audit function reports to the finance director

The use of uninterruptible (protected) power supplies is a method of protecting data and IT systems from what sort of security

threat?

A

Accidental damage

B

Weather

C

Hacking

Which of the following would be classed as a contingency control in an information system?

A

Password-only access to the system

B

System recovery procedures

C

Audit trails

All of the following, with one exception, are inherent limitations of internal control systems. Which is the exception?

A

The costs of control

B

Potential for human error and deliberate override

C

The types of transactions controls are designed to cope with

D

The independence of controls from the method of data processing