Dylan is looking to appoint a new supplier of paint to his manufacturing business. The paint will be used to paint buses and taxis and therefore needs to be high quality and durable. Which of the following should Dylan look for in terms of quality management when appraising the suppliers?
A balance sheet will show a company's assets, liabilities and shareholder equity. What is share-holder equity?
Jack Green is planning to use competitive tendering to source a new component for a new product that the customer research department has been developing for the domestic market. Jack is intending to use an open tender process. Which of the following aspects must Jack consider if an open tender procedure is to be used?
Under what circumstances can a buyer reduce timescales for a tender in the Public Sector?
Credit rating agencies can assist procurement professionals. Typically, which of the following can be obtained from a credit rating agency report? Select TWO that apply.
A buyer evaluates a supplier's ethical and social practices during the pre-qualification stage of the supplier onboarding process. Which of the following variables would trigger further follow-up activities?
The bill of lading is one of the main documents associated with sea freight within international sourcing. Which of the following statements represent some of the uses of the bill of lading? Select TWO that apply.
Which of the following can be undertaken by the buyer in relation to the governance of a supplier’s ethical and sustainable behaviours?
Review the insurance clauses in the contract
Check that the supplier’s internal policies are up to date
Check the supplier’s conflict of interest register for their contract
Review the non-disclosure agreement for their contract
Which of the following are primary sources of data? Select TWO.
'Phishing' is an activity that can occur when an employee within an organisation receives an email that appears to be from a genuine supplier but is false. These types of emails expose the organisation to the activities of expert cyber criminals. Which type of crime category does this activity fall within?