hfhtiibipi university faculty computingexampapers.nust.na/greenstone3/sites/localsite... ·...
TRANSCRIPT
I
HFHTIIBIPI UNIVERSITY
OF SCIENCE HHD TECHI‘IOLOGY
Faculty of Computing and Informatics
Department of Informatics
QUALIFICATION: BACHELOR OF INFORMATICS, BACHELOR OF COMPUTER SCIENCE, BACHELOR
OF LOGISTICS AND SUPPLY CHAIN MANAGEMENT
QUALIFICATION CODE: O7BACS, O7BAIF,'
07BLSMLEVEL. 5
COURSE: MANAGEMENT INFORMATION
SYSTEMSCOURSE CODE. MNSSllS
DATE:JuIy 2017 SESSION: 2
DURATION: 3 hours MARKS: 100
SECOND OPPORTUNITY EXAMINATION QUESTION PAPER
EXAMINER(S) Prof. Nomusa DIodIo
Mr. NkquIeko Mthembo
Mr. Munyaradzi MaravanyikaMs. Sinte Mutelo
Mr. Pardon Maoneke
Mr. Jude Osakwe
Ms. Marly Samuel
MODERATOR:Mr. Admire Kachepa
THIS QUESTION PAPER CONSISTS OF 7 PAGES
(Excluding this front page)
INSTRUCTIONS
1. Answer ALL the questions.
2. Write clearly and neatly.
3. Number the answers clearly.
SECTION A [20 marks]
Answer TRUE or FALSE (Each question carries 1 mark)
10.
11.
12.
13.
14.
15.
16.
VolP technology delivers voice information in digital form using packet switching.
A computer network consists of at least three computers.
Safety stock acts as a buffer for the lack of flexibility in the supply chain.
Analytic CRM uses tools to analyse customer data collected from the firm’s
customer touch points and other sources.
Knowledge workers include all of a company’s workers who are tasked with
managing or creating knowledge, from top-level scientists to clerical and data
workers.
Expert systems are typically used in business in discrete, highly-structured decision-
making situations.
An example of the portal business model is Facebook
Transaction-level information is essential for operational management to be able to
direct the day-to—day operations of a business.
Identifying customers is a business process handled by the human resources
function.
An inventory control system is an example ofan MIS.
The effect of the Internet has been to decrease the bargaining power of customers.
Customers are one of the competitive forces that affect an organisation’s ability to
compete.
A physical view shows data as it is actually organized and structured on the data
storage media.
To analyse unstructured data, such as memos and legal cases, you would use text
mining tools.
Developing a new product, hiring a new employee, and fulfilling an order are
examples of business processes.
A fully digital firm produces only digital goods or services.
1
17.
18.
19.
20.
Viruses can be spread through email.
Sniffers enable hackers to steal proprietary information from anywhere on a
network, including email messages, company files and confidential reports.
Any intellectual work product that isn’t based on public knowledge can be classified
as a trade secret.
In recent years, the illegal sharing of music files has declined with the improvement
of technological prevention.
l\)
SECTION B [20 marks]
Select the correct answer (Each question carries 1 mark)
1. The traditional file environment does not typically have a problem with:
a) Data inconsistency
b) Program-data independence
c) Lack of flexibility in creating ad-hoc reports
cl) Poor security
e) Data sharing
2. When an organisation buys on the marketplace what it cannot make itself, the costs
incurred are referred to as:
3) Switching costs
b) Network costs
c) Procurement
d) Agency costs
e) Transaction costs
3. Which type of network is used to connect digital devices within a SOD—metre radius:
a) WiFi
b) LAN
c) WAN
cl) MAN
e) SAN
4. Which of the following choices may lead to competitive advantage: 1. New products,services and business models; 2. Charging less for superior products; 3. Respondingto customers in real time?
a) 1 only
b) 1 and 2
c) 2 and 3
d) 1 and 3
e) 1, 2 and 3
5. According to research on organisational resistance, the four components that must
be changed in an organisation in order to successfully implement a new information
system are:
a) Environment, organisation, structure and tasks
b) Technology, people, culture and structure
c) Organisation, culture, management and environment
d) Tasks, technology, people and structure
e) Costs, tasks, structure and management
6.
10.
Which of the following is not one of the primary environmental actors that interacts
with an organisation and its information systems?
a) Competitors
b) Regulatory agencies
c) Customers
d) Suppliers
e) Sales force
The integration of video, audio and text marketing messages into a single marketing
message and consumer experience describes which dimension of eCommerce
technology?
a) Ubiquity
b) Personalisation/customization
c) Richness
d) Interactivity
e) Social technology
EDI is:
a) The use of internet technologies for electronic data transactions
b) The exchange between two organisations of standard transactions through a
network
c) Electronic data invoicing
d) Electronic delivery infrastructure
e) Slowly becoming the norm for 328 communications
You are advising a multimedia company on the best type of Knowledge
Management System to help them archive digital video and sound clips. Which of
the following will suit their needs?
a) Enterprise Content Management System
b) Digital Asset Management System
c) CAD system
d) VRML system
e) LMS
An activity businesses perform to measure and compare business processes to
similar processes of other companies within their industry is
a) Benchmarking
b) Best practices
c) Value chain analysis
d) Strategic systems analysis
e) Secondary activities
11.
12.
13.
14.
15.
CRM systems help businesses obtain which business objective:
3) Survival
b) Operational excellence
c) New products and services
d) Improved decision-making
e) Customer and supplier intimacy
The method of slicing digital messages into parcels, transmitting them alongdifferent communication paths, and reassembling them at their destination is called:
a) Multiplexing
b) Packet shifting
c) Packet routing
d) ATM
e) Packet switching
is the use of computers to assemble data from different sources to
create electronic dossiers of detailed information about individuals
a) Profiling
b) Phishing
c) Spamming
d) Targeting
e) Spyware
The internet poses specific security problems because
a) It was designed to be easily accessible
b) Internet data is not run over secure lines
c) Internet standards are universal
d) It changes so rapidly
e) There is no formal controlling body
The intentional defacement or destruction of a Web site is called
a) Spoofing
b) Cybervandalism
c) Cyberwa rfa re
d) Phishing
e) Pharming
. You have been hired as a security consultant for a law firm. Which of the followingconstitutes the greatest source for network security breaches to the firm?
Wireless network
Employees
Authentication proceduresLack of data encryption
Software quality
17. A data warehouse is composed of:
a) Historical data from legacy systems
b) Current data
c) Internal and external data sources
d) Historic and current data sources
e) Historic external data
18. The expenses incurred by a customer or company in lost time and resources when
changing from one supplier or system to a competing supplier or system are known
as:
a) Retention costs
b) Preservation costs
c) Differentiation costs
d) Switching costs
e) Variation costs
19. If your main supplier was late in delivering goods, which type of system would you
use to update your production schedule:
a) ESS
b) TPS
c) MIS
d) DSS
e) KMS
20. Which of the following traditional solutions enables manufacturers to deal with
uncertainties in the supply chain:
a) Safety stock
b) Continuous replenishment
c) Just—in-time strategies
d) Demand planning
e) Perfect information
SECTION C [60 marks]
Answer all questions from this section (Each question carries 10 marks)
Question 1
Identify the five (5) moral dimensions that define political, social and ethical issues and
briefly describe each [10]
Question 2
identify five (5) social costs of introducing ICT to an organisation and briefly describe each
[10]
Question 3
identify and briefly describe five (5) primary activities of a business value chain [10]
Question 4
Identify and briefly describe the five (5) benefits that can be derived from a DBMS
[10]
Question 5
Identify and briefly describe, five (5) eCommerce business models [10]
Question 6
Identify and briefly describe five (5) benefits of Knowledge Management [10]
End of exam