I Management Information Systems

Size: px
Start display at page:

Download "I Management Information Systems"

Transcription

1 POLYTECHNIC OF NAMIBIA School of Computing & Informatics Department of Informatics Private Bag 13388, 13 Storch Street, Windhoek, NAMIBIA Tel: (0) Fax: (0) Curriculum lsobsbc BIT (Business computing) '! I 80BSSD BIT {Software Development) I 80BSAN BIT (Computer Systems Administration & {sセエ I Subject f Paper r Date I Duration ェ Mt Networks) 07BLSM{Bachelor of Logistic &Supply Management) 07BCAS(Bachelor of Computer Science) I 07BAIF(Bachelor of Informatics) MNS511S I Management Information Systems ᄋM M Theory June 2014 j t Opportunity! 180 Minutes ( M S ィッセ [ I M M ᄋセ QP@ FIRST OPPORTUNITY This PAPER consists of 11 pages (including the front page) I I I First Examiner: Mr N. Mthembo Moderator: Mr. A. Kachepa Instructions for Students 1. Answer all questions in your Exam Pad. Clearly indicating questions answered. 2. Cross out all items in your Exam Pad unambiguously, which you do not want to be marked, e.g. any ' rough work'. 3. When answering questions you should be led by the allocation of marks. Do not give too few or too many facts in your answer. Answering more than expected does not result in higher marks. 4. For open questions any type of answer that makes sense in the given context will contribute to marks. 5. There are no books or any, notes or any other additional aid allowed.

2 SECTION A- Multiple Choice Questions Answer in your Answer Book- [45 Marks] 1. The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and A) improved business practices. B) improved efficiency. C) improved decision making. D) improved flexibility. 2. Which of the following choices may lead to competitive advantage: 1. new products, services, and business models; 2. charging less for superior products; 3. responding to customers in real time? A) 1 only B) 1 and 2 C) 2 and 3 D) 1, 2, and 3 3. The use of information systems because of necessity describes the business objective of A) competitive advantage. B) improved flexibility. C) survival. D) improved business practices. 4. The three activities in an information system that produce the information organizations use to control operations are A) input, processing, and output. B) input, output, and feedback. C) data analysis, processing, and feedback. D) information retrieval, research, and analysis. 5. An example of raw data from national car dealers would be A) 1 Toyota RA V4 sold March 3, 2008 in Windhoek, Khomas. B) an average of 13 Toyotas are sold daily in Khomas. C) 30 percent increase in Toyota RA V4 sales during September in Khomas. D) all of the above. 6. Organizational culture is best described by which of the following statements? A) It is a set of assumptions and values accepted by most members. B) It encompasses the sum of beliefs and assumptions by all members. C) It reflects the senior management's perspective on the organization and goals. D) It enables the organization to transcend the different levels and specialties of its employees. Page 2 ofll

3 7. An example of an organizational complementary asset is A) using the appropriate business model. B) laws and regulations. C) a collaborative work environment. D) all of the above. 8. Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization's A) networked environment. B) data management environment. C) IT infrastructure. D) information system. 9. Information density refers to the A) total amount and quantity of information delivered to consumers by merchants. B) Richness complexity and content of a message. C) total amount and quantity of information available to all market participants. D) D)amount of information available to reduce price transparency. 10. The integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology? A) ubiquity B) interactivity C) personalization/customization D) richness 11. Digital goods are goods that are A) produced digitally. B) sold over digital networks. C) used with digital equipment. D) delivered digitally. 12. In which of the following revenue models does a Web site charge a fee for access to some or all of its offerings on a continual, regular basis? A) sales B) transaction fee C) free/freemium D) subscription Page 3 ofll

4 13. EDI is A) electronic delivery infrastructure. B) the exchange between two organizations of standard transactions through a network. C) the use of Internet technologies for electronic data transactions. D) electronic data invoicing. 14. The process of sourcing goods and materials, negotiating with suppliers, paying for goods, and making delivery arrangements is called A) e-procurement. B) sourcing. C) procurement. D) SCM. 15. refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems. A) "Controls" B) "Benchmarking" C) "Security" D) "Algorithms" 16. Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that A) are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error. B) are frequently available on the Internet. C) have the potential to be accessed by large numbers of people and by groups outside of the organization. D) are not secure because the technology to secure them did not exist at the time the files were created. 17. The Internet poses specific security problems because A) Internet standards are universal. B) it changes so rapidly. C) it was designed to be easily accessible. D) Internet data is not run over secure lines. 18. A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of A) pharming. B) phishing. C) spoofing. D) click fraud. Page 4 ofll

5 19. A keylogger is a type of? A) worm. B) spyware. C) Trojan horse. D) virus. 20. A firewall allows the organization to A) prevent known spyware and malware from entering the system. B) prevent unauthorized communication both into and out of the network. C) monitor network hot spots for signs of intruders. D) all of the above. 21. Most antivirus software is effective against A) only those viruses active on the Internet and through . B) any virus except those in wireless communications applications. C) only those viruses already known when the software is written. D) any virus. 22. A characteristic or quality describing an entity is called a(n) A) attribute. B) tuple. C) field. D) key field. 23. Duplicate data in multiple data files is called data A) independence B) repetition C) partitions D) redundancy 24. The type oflogical database model that treats data as if they were stored in twodimensional tables is the A) hierarchical DBMS. B) mobile DBMS. C) non-relational DBMS. D) relational DBMS. Page 5 ofll

6 25. In a relational database, the three basic operations used to develop useful sets of data are A) select, project, and join. B) select, project, and where. C) select, join, and where. D) select, from, and join. 26. You have been hired by a worldwide non-profit agency to implement a system to handle their donations. The system must be able to handle and record telephone, sms, and Internet donations, provide up-to-the-minute reports, and create highly customizable mailing lists. In addition, event fundraisers need to be able to quickly access a donor's information and history. Which of the following systems will best meet these needs? A) TPS with ESS capabilities B) TPS with DSS capabilities C) TPS with MIS capabilities D)TPS 27. Data mining is a tool for allowing users to A) obtain online answers to ad-hoc questions in a rapid amount oftime. B) summarize massive amounts of data into much smaller, traditional reports. C) find hidden relationships in data. D) quickly compare transaction data gathered over many years. 28. Legacy systems are still used because they A) are too expensive to redesign. B) integrate well using new Web services technologies. C) contain valuable data that would be lost during redesign. D) can only be run on the older mainframe computers. 29. Which of the following is not an example of the emerging mobile computing platforms? A) the Kindle B) cell phones C) CRM D) tablets 30. Which type of software is created and updated by a worldwide community of programmers and available for free? A) software packages B) open source C) outsourced D) mashups Page 6 ofll

7 31. The process of presenting a set of computing resources (such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location is called A) multicore processing. B) autonomic computing. C) cloud computing. D) virtualization. 32. The introduction of new information technology has a A) waterfall effect in raising ever more complex ethical issues. B) ripple effect raising new ethical, social, and political issues. C) beneficial effect for society as a whole, while raising dilemmas for consumers. D) dampening effect on the discourse ofbusiness ethics. 33. All of the following are current key technology trends raising ethical issues except A) data storage improvements. B) data analysis advancements. C) increase in use of mobile devices. D) increase in multimedia quality. 34. The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called A) profiling. B) targeting. C) phishing. D) spamming. 35. Accepting the potential costs, duties, and obligations for the decisions you make is referred to as A) accountability. B) responsibility. C) liability. D) due process. 36. Immanuel Kant's Categorical Imperative states that A) one should take the action that produces the least harm or incurs the least cost. B) if an action is not right for everyone to take, it is not right for anyone to take. C) one can put values in rank order and understand the consequences of various courses of action. D) if an action cannot be taken repeatedly, then it is not right to be taken at any time. Page 7 ofll

8 37. The ethical"no free lunch" rule states that A) if an action cannot be taken repeatedly, then it is not right to be taken at any time. B) one should take the action that produces the least harm or incurs the least cost. C) everything is owned by someone else, and that the creator wants compensation for this work. D) one can put values in rank order and understand the consequences of various courses of action. 38. Intellectual property can best be described as A) tangible or intangible property created from a unique idea. B) unique creative work or ideas. C) intangible property created by individuals or corporations. D) the expression of an intangible idea. 39. The interaction between information systems and organizations is influenced A) primarily by the decision making of middle and senior managers. B) by two main microeconomic forces: capital and labor. C) by many factors, including structure, politics, culture, and environment. D) primarily by the organization's business processes and culture. 40. The model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete. A) demand control B) competitive forces C) network economics D) competitive advantage 41. Amazon's use of the Internet as a platform to sell books more efficiently than traditional bookstores illustrates a use of information services for A) low-cost leadership. B) focusing on market niche. C) strengthening supplier intimacy. D) marketing effectiveness. 42. When a firm provides a specialized product or service for a narrow target market better than competitors, they are using a strategy. A) mass custornization B) product differentiation C) market niche D) process efficiency Page 8 ofll

9 43. In environmental scanning, a firm may use information systems to A) analyze external Internet traffic to its Web sites. B) understand its carbon footprint and energy impacts on the environment. C) identify external events that may affect it. D) utilize sensors that track products through the value chain. 44. Which of the following industries bas not been disrupted by the Internet? A) clothing B) newspapers C) air travel D) encyclopedias 45. The primary activities of a firm include A) inbound logistics, operations, outbound logistics, sales and marketing, and service. B) procurement, operations, technology, sales and marketing, and services. C) procurement, inbound logistics, operations, technology, and outbound logistics. D) inbound logistics, operations, outbound logistics, technology, and service. Section B - True/ False Statements [15 Marks] State whether the following statements are True or False in your ANSWER BOOK 1. Developing a new product, fulfilling an order, and hiring a new employee are examples of business processes. 2. A business model describes how a company produces, delivers, and sells a product or service to create wealth. 3. There are four major business functions: sales and marketing; manufacturing and production; fmance and accounting; and information technology. 4. Customers are one of the competitive forces that affect an organization's ability to compete. 5. Data gathered by online behavioural tracking firms is limited to the user's behaviour on a single Web site. 6. Most Internet businesses do very little to protect the privacy of their customers. 7. In white-collar fraud, information systems are most typically used as a means to hide financial evidence of crimes. Page 9 ofll

10 8. Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan. 9. The competitive forces model can be used to analyze today's digital firm as well as traditional firms. 10. Strong linkages to customers and suppliers decrease switching costs. 11. Business processes are collections of standard operating procedures. 12. IT infrastructure consists of just those physical computing devices required to operate the enterprise. 13. A grouping of characters into a word, a group of words, or a complete number is called a record. 14. OLAP enables users to obtain online answers to ad-hoc questions in a fairly rapid amount of time, except when the data are stored in very large databases. 15. Computer worms spread much more rapidly than computer viruses. Section C - [ 40 Marks] Question One a) The diagram below illustrates the functions of an information system. State what each of the following labels (letters) represent in relation to an information system. F ENVIRONMENT G INFORMATION SYSTEM (A t ri ) t H I J [5 marks] Page 10 of 11

11 b) Discuss the impact new information systems may have on organizational culture and organizational politics. [5 marks] Question Two a) Describe at least four of the problems traditional file environments have caused. [4 marks] b) Describe the three capabilities of database management systems: data definition, data dictionary, and data manipulation language [6 marks] Question Three a) Describe six unique features of Internet and their effects which made ecomrnerce to grow rapidly [6 marks] b) Discuss the internet's impact on competitive advantage [2 marks] Question Four a) Discuss at least three benefits and three challenges of enterprise systems and explain why a firm would want to incorporate one. [8 marks] b) How is the security of a firm's information system and data affected by its employees, organization, and technology? [ 4 marks] [END] Page 11 ofll