Department of Informatics - Digital...
Transcript of Department of Informatics - Digital...
nAmIB I A UnIVERSITY OF SCIEnCE AnD TECHnOLOGY
Computing and Informatics
Department of Informatics
QUALIFICATION: Bachelor of Informatics, Bachelor of Computer Science, Bachelor of Logistics and
Supply Chain
QUALIFICATION CODE: 07BACS, 07BAIF, 07BLSM LEVEL: 5
COURSE: Management Information Systems COURSE CODE: MNSSllS
DATE: July 2016
DURATION: 3 Hours
EXAMINER
MODERATOR
SESSION: 2
MARKS: 100
SECOND OPPORTUNITY EXAMINATION PAPER
Mr Nkululeko Mthembo
Mr. A. Kachepa
THIS QUESTION PAPER CONSISTS OF 9 PAGES
(EXCLUDING THIS FRONT PAGE)
INSTRUCTIONS
1. Answer ALL the questions.
2. Write clearly and neatly.
3. Number the answers clearly.
Section A
1. Which of the following are key corporate assets?
A) intellectual property, core competencies, and financial and human assets
B) production technologies and business processes for sales, marketing, and finance
C) knowledge and the firm's tangible assets, such as goods or services
D) time and knowledge
E) significant business relationships
2. Which of the following statements best describes organizational culture?
A) It encompasses the sum of beliefs and assumptions by all members.
B) It enables the organization to transcend the different levels and specialties of its employees.
C) It reflects the senior management's perspective on the organization and goals.
D) It allows a company to achieve greater operational efficiency.
E) It is a set of assumptions and values accepted by most members.
3. Networking and telecommunications technologies, along with computer hardware, software, data
management technology, and the people required to run and manage them, constitute an
organization's
A) data management environment.
B) networked environment.
C) IT infrastructure.
D) information system.
E) culture.
4. An example of an organizational complementary asset is
A) using the appropriate business model.
B) a collaborative work environment.
C) laws and regulations.
D) the Internet.
E) strong senior management.
5. An example of a cross-functional business process is
A) identifying customers.
B) transporting the product.
C) creating a new product.
D) assembling a product.
E) paying creditors.
2
6. To monitor the status of internal operations and the firm's relations with the external environment,
managers need ____ systems.
A) decision-support
B) knowledge
C) transaction processing
D) management information
7. Which type of system would you use to forecast the return on investment if you used new suppliers
with better delivery track records?
A) ESS
B) TPS
C) MIS
D) CRM
E) DSS
8. Which level of the organization are ESS specifically designed to serve?
A) operational
B) end-user
C) middle management
D) senior management
E) knowledge workers
9. Executive support systems are information systems that support the
A) long-range planning activities of senior management.
B) knowledge and data workers in an organization.
C) decision making and administrative activities of middle managers.
D) day-to-day processes of production.
E) transactional needs ofthe organization.
10. When consumers use the Internet to buy or sell goods from or to each other it is called
A) B2B e-commerce.
B) B2C -ecommerce.
C) C2B-- ecommerce
D) C2C- ecommerce.
E) G2C-ecommerce.
11. Which type of system integrates supplier, manufacturer, distributor, and customer logistics
processes?
A) collaborative distribution system
B) supply-chain management system
C) reverse logistics system
D) enterprise planning system
E) transaction processing system
3
12. Business processes are collections of
A) informal practices and behaviors.
B) formalized and documented practices.
C) business rules.
D) rights and privileges.
E) routines.
13. Which model is used to describe the interaction of external forces that affect an organization's
strategy and ability to compete?
A) network economics model
B) competitive forces model
C) competitive advantage model
D) demand control model
E) agency costs model
14. All of the following are competitive forces except
A) suppliers.
B) new market entrants.
C) external environment.
D) customers.
E) substitute products.
15. Which of the following represent the primary activities of a firm?
A) inbound logistics, operations, outbound logistics, sales and marketing, and service
B) inbound logistics, operations, outbound logistics, technology, and service
C) procurement, inbound logistics, operations, technology, and outbound logistics
D) procurement, operations, technology, sales and marketing, and services
E) organization infrastructure, human resources, technology, and procurement
16. The expenses incurred by a customer or company in lost time and resources when changing from
one supplier or system to a competing supplier or system are known as
A) retention costs.
B) preservation costs.
C) differentiation costs.
D) switching costs.
E) variation costs.
17. Which of the following best describes the effect that new information technology has on society?
A) It has a dampening effect on the discourse of business ethics.
B) It has a ripple effect, raising new ethical, social, and political issues.
C) It is beneficial for society as a whole, while raising dilemmas for consumers.
D) It has a waterfall effect in raising ever more complex ethical issues.
E) It has a magnifying effect creating increasing numbers of ethical issues.
4
18. Which of the following is not one of the current key technology trends that raises ethical issues?
A) data storage improvements
B) data analysis advancements
C) increase in multimedia quality
D) increase in use of mobile devices
E) advances in networking technology
19. is the use of computers to assemble data from different sources to create electronic
dossiers of detailed information about individuals.
A) Profiling
B) Phishing
C) Spamming
D) Targeting
E) Spyware
20. Cookies created during Web site visits are stored
A) on the Web site's server.
B) on the user's computer.
C) on servers owned by advertising networks.
D) in the browser's application settings.
E) nowhere, because they are only used during a visit and are discarded once a visitor leaves
the Web site.
21. Which of the following best describes intellectual property?
A) intangible property created by individuals or corporations
B) unique creative work or ideas
C) tangible or intangible property created from a unique idea
D) the expression of an intangible idea
E) any tangible or intangible property with in the creative arts
22. The extreme difference among different social groups regarding their access to computers and the
Internet is called the divide.
A) computer
B) technology
C) digital
D) electronic
E) Internet
23. Which ofthe following is the most popular mobile operating system?
A) Linux
B) Android
C) Chrome OS
D) iOS
E) Unix
5
24. Which type of software is created and updated by a worldwide community of programmers and
available for free?
A) software packages
B) mashups
C) outsourced
D) open source
E) closed source
25. The practice of contracting custom software development to an outside firm is commonly referred
to as
A) outsourcing.
B) scaling.
C) service-oriented architecture.
D) application integration.
E) utility computing.
26. Which of the following refers to the ability of a computer, product, or system to expand to serve a
larger number of users without breaking down?
A) modality
B) scalability
C) expandability
D) disintermediation
E) customizability
27. A(n) is a characteristic or quality that describes a database entity.
A) field
B) tuple
C) key field
D) attribute
E) relationship
28. Data ____ occurs when the same data is duplicated in multiple files of a database.
A) redundancy
B) repetition
C) independence
D) partitions
E) discrepancy
29. When the same attribute in related data files has different values, this is called data
A) redundancy.
B) dupl ication .
C) dependence.
D) discrepancy.
E) inconsistency.
6
30. A(n) ____ organizes data in two-dimensional tables.
A) non-relational DBMS
B) mobile DBMS
C) relational DBMS
D) hierarchical DBMS
E) object-oriented DBMS
31. In a relational database, the three basic operations used to develop useful sets of data are
A) select, project, and where.
B) select, join, and where.
C) select, project, and join.
D) where, from, and join.
E) where, find, and select.
32. The most prominent data manipulation language today is
A) Access.
B) DB2.
C) SQL.
D) Crystal Reports.
E) NoSQL.
33. Large amounts of data stored in electronic form are ____ than the same data in manual form .
A) less vulnerable to damage
B) more secure
C) vulnerable to many more kinds of threats
D) more critical to most businesses
E) prone to more errors
34. Electronic data are more susceptible to destruction, fraud, error, and misuse because information
systems concentrate data in computer files that
A) are easily decrypted.
B) can be opened with easily available software.
C) may be accessible by anyone who has access to the same network.
D) are unprotected by up-to-date security systems.
E) are rarely validated.
35. A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's
advertising costs up. This is an example of
A) phishing.
B) pharming.
C) spoofing.
D) evil twins.
E) click fraud.
7
36. is malware that logs and transmits everything a user types.
A) Spyware.
B) A Trojan horse.
C) A keylogger.
D) Aworm.
E) A sniffer.
37. Tricking employees to reveal their passwords by pretending to be a legitimate member of a
company is called
A) sniffing.
B) social engineering.
C) phishing.
D) pharming.
E) snooping
38. How do software vendors correct flaws in their software after it has been distributed?
A) They issue bug fixes.
B) They issue patches.
C) They re-release the software.
D) They release updated versions of the software.
E) They don't; users purchase software at their own risk.
39. The most common type of electronic evidence is
A) voice-mail.
B) spreadsheets.
C) instant messages.
D) e-mail.
E) VOIP data .
40. A f irewall allows the organization to
A) enforce a security policy on data exchanged between its network and the Internet.
B) check the accuracy of all transactions between its network and the Internet.
C) create an enterprise system on the Internet.
D) check the content of all incoming and outgoing e-mail messages.
E) create access rules for a network.
8
Section B - Answer True/FAlSE [10 Marks]
1. The three main dimensions of information systems are management, organizations, and information
technology.
2. There are four major business functions: human resources; manufacturing and production; finance
and accounting; and information technology.
3. Decision-support systems are most commonly used by the operations management level of an
organization
4. For non-routine decision making, senior managers rely on management information systems.
5. DSS use internal information as well as information from external sources.
6. The value chain model classifies all company activities as primary activities
7. Disintermediation provides major benefits to the distributor
8. Smartphones typically feature state-of-the-art encryption and security features, making them highly
secure tools for businesses.
9. The effect of the Internet has been to decrease the bargaining power of customers
10. Supply chain management systems are more externally oriented than enterprise systems
9
Section C- Structured Questions [SO Marks]
Question One
E-commerce has grown over the years due to features of the internet. Briefly explain 6 (six) features of the internet that have driven the growth of e-commerce. [12 marks]
Question Two
i) What is a business model?
ii) What do you understand by the term" Complementary Assets", give examples?
Question Three
Define the following terms as used in information Systems
a) Switching Costs
b) IT Governance
c) Disruptive Technology
d) E-Commerce
e) Cloud Computing
Question four
[2 marks]
[6 marks]
[10 marks]
Identify four Information System strategies that can be used to gain and sustain competitive advantage? For each strategy provide a brief explanation [8 marks]
Question Five
List and describe four (4) different types of information systems that serve the different levels of an organisation? [8 marks]
Question Six
What do you see as the benefits of using a Web-like browser to access information from a data warehouse? [4 marks]
[THE END]
10