namib I A UnIVERSITY OF SCIEnCE AnD TECHnOLOGY

Size: px
Start display at page:

Download "namib I A UnIVERSITY OF SCIEnCE AnD TECHnOLOGY"

Transcription

1 namib I A UnIVERSITY OF SCIEnCE AnD TECHnOLOGY Computing and Informatics Department of Informatics QUALIFICATION: Bachelor of Informatics, Bachelor of Computer Science, Bachelor of Logistics and Supply Chain QUALIFICATION CODE: 07BACS, 07BAIF, 07BLSM LEVEL: 5 COURSE: Management Information Systems DATE: July 2016 DURATION: 3 Hours COURSE CODE: MNSSllS SESSION: 2 MARKS: 100 SECOND OPPORTUNITY EXAMINATION PAPER EXAMINER MODERATOR Mr Nkululeko Mthembo Mr. A. Kachepa THIS QUESTION PAPER CONSISTS OF 9 PAGES (EXCLUDING THIS FRONT PAGE) INSTRUCTIONS 1. Answer ALL the questions. 2. Write clearly and neatly. 3. Number the answers clearly.

2 Section A 1. Which of the following are key corporate assets? A) intellectual property, core competencies, and financial and human assets B) production technologies and business processes for sales, marketing, and finance C) knowledge and the firm's tangible assets, such as goods or services D) time and knowledge E) significant business relationships 2. Which of the following statements best describes organizational culture? A) It encompasses the sum of beliefs and assumptions by all members. B) It enables the organization to transcend the different levels and specialties of its employees. C) It reflects the senior management's perspective on the organization and goals. D) It allows a company to achieve greater operational efficiency. E) It is a set of assumptions and values accepted by most members. 3. Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization's A) data management environment. B) networked environment. C) IT infrastructure. D) information system. E) culture. 4. An example of an organizational complementary asset is A) using the appropriate business model. B) a collaborative work environment. C) laws and regulations. D) the Internet. E) strong senior management. 5. An example of a cross-functional business process is A) identifying customers. B) transporting the product. C) creating a new product. D) assembling a product. E) paying creditors. 2

3 6. To monitor the status of internal operations and the firm's relations with the external environment, managers need systems. A) decision-support B) knowledge C) transaction processing D) management information 7. Which type of system would you use to forecast the return on investment if you used new suppliers with better delivery track records? A) ESS B) TPS C) MIS D) CRM E) DSS 8. Which level of the organization are ESS specifically designed to serve? A) operational B) end-user C) middle management D) senior management E) knowledge workers 9. Executive support systems are information systems that support the A) long-range planning activities of senior management. B) knowledge and data workers in an organization. C) decision making and administrative activities of middle managers. D) day-to-day processes of production. E) transactional needs ofthe organization. 10. When consumers use the Internet to buy or sell goods from or to each other it is called A) B2B e-commerce. B) B2C -ecommerce. C) C2B-- ecommerce D) C2C- ecommerce. E) G2C-ecommerce. 11. Which type of system integrates supplier, manufacturer, distributor, and customer logistics processes? A) collaborative distribution system B) supply-chain management system C) reverse logistics system D) enterprise planning system E) transaction processing system 3

4 12. Business processes are collections of A) informal practices and behaviors. B) formalized and documented practices. C) business rules. D) rights and privileges. E) routines. 13. Which model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete? A) network economics model B) competitive forces model C) competitive advantage model D) demand control model E) agency costs model 14. All of the following are competitive forces except A) suppliers. B) new market entrants. C) external environment. D) customers. E) substitute products. 15. Which of the following represent the primary activities of a firm? A) inbound logistics, operations, outbound logistics, sales and marketing, and service B) inbound logistics, operations, outbound logistics, technology, and service C) procurement, inbound logistics, operations, technology, and outbound logistics D) procurement, operations, technology, sales and marketing, and services E) organization infrastructure, human resources, technology, and procurement 16. The expenses incurred by a customer or company in lost time and resources when changing from one supplier or system to a competing supplier or system are known as A) retention costs. B) preservation costs. C) differentiation costs. D) switching costs. E) variation costs. 17. Which of the following best describes the effect that new information technology has on society? A) It has a dampening effect on the discourse of business ethics. B) It has a ripple effect, raising new ethical, social, and political issues. C) It is beneficial for society as a whole, while raising dilemmas for consumers. D) It has a waterfall effect in raising ever more complex ethical issues. E) It has a magnifying effect creating increasing numbers of ethical issues. 4

5 18. Which of the following is not one of the current key technology trends that raises ethical issues? A) data storage improvements B) data analysis advancements C) increase in multimedia quality D) increase in use of mobile devices E) advances in networking technology 19. is the use of computers to assemble data from different sources to create electronic dossiers of detailed information about individuals. A) Profiling B) Phishing C) Spamming D) Targeting E) Spyware 20. Cookies created during Web site visits are stored A) on the Web site's server. B) on the user's computer. C) on servers owned by advertising networks. D) in the browser's application settings. E) nowhere, because they are only used during a visit and are discarded once a visitor leaves the Web site. 21. Which of the following best describes intellectual property? A) intangible property created by individuals or corporations B) unique creative work or ideas C) tangible or intangible property created from a unique idea D) the expression of an intangible idea E) any tangible or intangible property within the creative arts 22. The extreme difference among different social groups regarding their access to computers and the Internet is called the divide. A) computer B) technology C) digital D) electronic E) Internet 23. Which ofthe following is the most popular mobile operating system? A) Linux B) Android C) Chrome OS D) ios E) Unix 5

6 24. Which type of software is created and updated by a worldwide community of programmers and available for free? A) software packages B) mashups C) outsourced D) open source E) closed source 25. The practice of contracting custom software development to an outside firm is commonly referred to as A) outsourcing. B) scaling. C) service-oriented architecture. D) application integration. E) utility computing. 26. Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? A) modality B) scalability C) expandability D) disintermediation E) customizability 27. A(n) is a characteristic or quality that describes a database entity. A) field B) tuple C) key field D) attribute E) relationship 28. Data occurs when the same data is duplicated in multiple files of a database. A) redundancy B) repetition C) independence D) partitions E) discrepancy 29. When the same attribute in related data files has different values, this is called data A) redundancy. B) duplication. C) dependence. D) discrepancy. E) inconsistency. 6

7 30. A(n) organizes data in two-dimensional tables. A) non-relational DBMS B) mobile DBMS C) relational DBMS D) hierarchical DBMS E) object-oriented DBMS 31. In a relational database, the three basic operations used to develop useful sets of data are A) select, project, and where. B) select, join, and where. C) select, project, and join. D) where, from, and join. E) where, find, and select. 32. The most prominent data manipulation language today is A) Access. B) DB2. C) SQL. D) Crystal Reports. E) NoSQL. 33. Large amounts of data stored in electronic form are than the same data in manual form. A) less vulnerable to damage B) more secure C) vulnerable to many more kinds of threats D) more critical to most businesses E) prone to more errors 34. Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that A) are easily decrypted. B) can be opened with easily available software. C) may be accessible by anyone who has access to the same network. D) are unprotected by up-to-date security systems. E) are rarely validated. 35. A salesperson clicks repeatedly on the online ads of a competitor's in order to drive the competitor's advertising costs up. This is an example of A) phishing. B) pharming. C) spoofing. D) evil twins. E) click fraud. 7

8 36. is malware that logs and transmits everything a user types. A) Spyware. B) A Trojan horse. C) A keylogger. D) Aworm. E) A sniffer. 37. Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is called A) sniffing. B) social engineering. C) phishing. D) pharming. E) snooping 38. How do software vendors correct flaws in their software after it has been distributed? A) They issue bug fixes. B) They issue patches. C) They re-release the software. D) They release updated versions of the software. E) They don't; users purchase software at their own risk. 39. The most common type of electronic evidence is A) voic . B) spreadsheets. C) instant messages. D) . E) VOIP data. 40. A firewall allows the organization to A) enforce a security policy on data exchanged between its network and the Internet. B) check the accuracy of all transactions between its network and the Internet. C) create an enterprise system on the Internet. D) check the content of all incoming and outgoing messages. E) create access rules for a network. 8

9 Section B - Answer True/FAlSE [10 Marks] 1. The three main dimensions of information systems are management, organizations, and information technology. 2. There are four major business functions: human resources; manufacturing and production; finance and accounting; and information technology. 3. Decision-support systems are most commonly used by the operations management level of an organization 4. For non-routine decision making, senior managers rely on management information systems. 5. DSS use internal information as well as information from external sources. 6. The value chain model classifies all company activities as primary activities 7. Disintermediation provides major benefits to the distributor 8. Smartphones typically feature state-of-the-art encryption and security features, making them highly secure tools for businesses. 9. The effect of the Internet has been to decrease the bargaining power of customers 10. Supply chain management systems are more externally oriented than enterprise systems 9

10 Section C- Structured Questions [SO Marks] Question One E-commerce has grown over the years due to features of the internet. Briefly explain 6 (six) features of the internet that have driven the growth of e-commerce. [12 marks] Question Two i) What is a business model? ii) What do you understand by the term" Complementary Assets", give examples? [2 marks] [6 marks] Question Three Define the following terms as used in information Systems a) Switching Costs b) IT Governance c) Disruptive Technology d) E-Commerce e) Cloud Computing [10 marks] Question four Identify four Information System strategies that can be used to gain and sustain competitive advantage? For each strategy provide a brief explanation [8 marks] Question Five List and describe four (4) different types of information systems that serve the different levels of an organisation? [8 marks] Question Six What do you see as the benefits of using a Web-like browser to access information from a data warehouse? [4 marks] [THE END] 10