8
I HFHTIIBIPI UNIVERSITY OF SCIENCE HHD TECHI‘IOLOGY Faculty of Computing and Informatics Department of Informatics QUALIFICATION: BACHELOR OF INFORMATICS, BACHELOR OF COMPUTER SCIENCE, BACHELOR OF LOGISTICS AND SUPPLY CHAIN MANAGEMENT QUALIFICATION CODE: O7BACS, O7BAIF, ' 07BLSM LEVEL. 5 COURSE: MANAGEMENT INFORMATION SYSTEMS COURSE CODE. MNSSllS DATE:JuIy 2017 SESSION: 2 DURATION: 3 hours MARKS: 100 SECOND OPPORTUNITY EXAMINATION QUESTION PAPER EXAMINER(S) Prof. Nomusa DIodIo Mr. NkquIeko Mthembo Mr. Munyaradzi Maravanyika Ms. Sinte Mutelo Mr. Pardon Maoneke Mr. Jude Osakwe Ms. Marly Samuel MODERATOR: Mr. Admire Kachepa THIS QUESTION PAPER CONSISTS OF 7 PAGES (Excluding this front page) INSTRUCTIONS 1. Answer ALL the questions. 2. Write clearly and neatly. 3. Number the answers clearly.

HFHTIIBIPI UNIVERSITY Faculty Computingexampapers.nust.na/greenstone3/sites/localsite... · According to research on organisational resistance, the four components that must be changed

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: HFHTIIBIPI UNIVERSITY Faculty Computingexampapers.nust.na/greenstone3/sites/localsite... · According to research on organisational resistance, the four components that must be changed

I

HFHTIIBIPI UNIVERSITY

OF SCIENCE HHD TECHI‘IOLOGY

Faculty of Computing and Informatics

Department of Informatics

QUALIFICATION: BACHELOR OF INFORMATICS, BACHELOR OF COMPUTER SCIENCE, BACHELOR

OF LOGISTICS AND SUPPLY CHAIN MANAGEMENT

QUALIFICATION CODE: O7BACS, O7BAIF,'

07BLSMLEVEL. 5

COURSE: MANAGEMENT INFORMATION

SYSTEMSCOURSE CODE. MNSSllS

DATE:JuIy 2017 SESSION: 2

DURATION: 3 hours MARKS: 100

SECOND OPPORTUNITY EXAMINATION QUESTION PAPER

EXAMINER(S) Prof. Nomusa DIodIo

Mr. NkquIeko Mthembo

Mr. Munyaradzi MaravanyikaMs. Sinte Mutelo

Mr. Pardon Maoneke

Mr. Jude Osakwe

Ms. Marly Samuel

MODERATOR:Mr. Admire Kachepa

THIS QUESTION PAPER CONSISTS OF 7 PAGES

(Excluding this front page)

INSTRUCTIONS

1. Answer ALL the questions.

2. Write clearly and neatly.

3. Number the answers clearly.

Page 2: HFHTIIBIPI UNIVERSITY Faculty Computingexampapers.nust.na/greenstone3/sites/localsite... · According to research on organisational resistance, the four components that must be changed

SECTION A [20 marks]

Answer TRUE or FALSE (Each question carries 1 mark)

10.

11.

12.

13.

14.

15.

16.

VolP technology delivers voice information in digital form using packet switching.

A computer network consists of at least three computers.

Safety stock acts as a buffer for the lack of flexibility in the supply chain.

Analytic CRM uses tools to analyse customer data collected from the firm’s

customer touch points and other sources.

Knowledge workers include all of a company’s workers who are tasked with

managing or creating knowledge, from top-level scientists to clerical and data

workers.

Expert systems are typically used in business in discrete, highly-structured decision-

making situations.

An example of the portal business model is Facebook

Transaction-level information is essential for operational management to be able to

direct the day-to—day operations of a business.

Identifying customers is a business process handled by the human resources

function.

An inventory control system is an example ofan MIS.

The effect of the Internet has been to decrease the bargaining power of customers.

Customers are one of the competitive forces that affect an organisation’s ability to

compete.

A physical view shows data as it is actually organized and structured on the data

storage media.

To analyse unstructured data, such as memos and legal cases, you would use text

mining tools.

Developing a new product, hiring a new employee, and fulfilling an order are

examples of business processes.

A fully digital firm produces only digital goods or services.

1

Page 3: HFHTIIBIPI UNIVERSITY Faculty Computingexampapers.nust.na/greenstone3/sites/localsite... · According to research on organisational resistance, the four components that must be changed

17.

18.

19.

20.

Viruses can be spread through email.

Sniffers enable hackers to steal proprietary information from anywhere on a

network, including email messages, company files and confidential reports.

Any intellectual work product that isn’t based on public knowledge can be classified

as a trade secret.

In recent years, the illegal sharing of music files has declined with the improvement

of technological prevention.

l\)

Page 4: HFHTIIBIPI UNIVERSITY Faculty Computingexampapers.nust.na/greenstone3/sites/localsite... · According to research on organisational resistance, the four components that must be changed

SECTION B [20 marks]

Select the correct answer (Each question carries 1 mark)

1. The traditional file environment does not typically have a problem with:

a) Data inconsistency

b) Program-data independence

c) Lack of flexibility in creating ad-hoc reports

cl) Poor security

e) Data sharing

2. When an organisation buys on the marketplace what it cannot make itself, the costs

incurred are referred to as:

3) Switching costs

b) Network costs

c) Procurement

d) Agency costs

e) Transaction costs

3. Which type of network is used to connect digital devices within a SOD—metre radius:

a) WiFi

b) LAN

c) WAN

cl) MAN

e) SAN

4. Which of the following choices may lead to competitive advantage: 1. New products,services and business models; 2. Charging less for superior products; 3. Respondingto customers in real time?

a) 1 only

b) 1 and 2

c) 2 and 3

d) 1 and 3

e) 1, 2 and 3

5. According to research on organisational resistance, the four components that must

be changed in an organisation in order to successfully implement a new information

system are:

a) Environment, organisation, structure and tasks

b) Technology, people, culture and structure

c) Organisation, culture, management and environment

d) Tasks, technology, people and structure

e) Costs, tasks, structure and management

Page 5: HFHTIIBIPI UNIVERSITY Faculty Computingexampapers.nust.na/greenstone3/sites/localsite... · According to research on organisational resistance, the four components that must be changed

6.

10.

Which of the following is not one of the primary environmental actors that interacts

with an organisation and its information systems?

a) Competitors

b) Regulatory agencies

c) Customers

d) Suppliers

e) Sales force

The integration of video, audio and text marketing messages into a single marketing

message and consumer experience describes which dimension of eCommerce

technology?

a) Ubiquity

b) Personalisation/customization

c) Richness

d) Interactivity

e) Social technology

EDI is:

a) The use of internet technologies for electronic data transactions

b) The exchange between two organisations of standard transactions through a

network

c) Electronic data invoicing

d) Electronic delivery infrastructure

e) Slowly becoming the norm for 328 communications

You are advising a multimedia company on the best type of Knowledge

Management System to help them archive digital video and sound clips. Which of

the following will suit their needs?

a) Enterprise Content Management System

b) Digital Asset Management System

c) CAD system

d) VRML system

e) LMS

An activity businesses perform to measure and compare business processes to

similar processes of other companies within their industry is

a) Benchmarking

b) Best practices

c) Value chain analysis

d) Strategic systems analysis

e) Secondary activities

Page 6: HFHTIIBIPI UNIVERSITY Faculty Computingexampapers.nust.na/greenstone3/sites/localsite... · According to research on organisational resistance, the four components that must be changed

11.

12.

13.

14.

15.

CRM systems help businesses obtain which business objective:

3) Survival

b) Operational excellence

c) New products and services

d) Improved decision-making

e) Customer and supplier intimacy

The method of slicing digital messages into parcels, transmitting them alongdifferent communication paths, and reassembling them at their destination is called:

a) Multiplexing

b) Packet shifting

c) Packet routing

d) ATM

e) Packet switching

is the use of computers to assemble data from different sources to

create electronic dossiers of detailed information about individuals

a) Profiling

b) Phishing

c) Spamming

d) Targeting

e) Spyware

The internet poses specific security problems because

a) It was designed to be easily accessible

b) Internet data is not run over secure lines

c) Internet standards are universal

d) It changes so rapidly

e) There is no formal controlling body

The intentional defacement or destruction of a Web site is called

a) Spoofing

b) Cybervandalism

c) Cyberwa rfa re

d) Phishing

e) Pharming

. You have been hired as a security consultant for a law firm. Which of the followingconstitutes the greatest source for network security breaches to the firm?

Wireless network

Employees

Authentication proceduresLack of data encryption

Software quality

Page 7: HFHTIIBIPI UNIVERSITY Faculty Computingexampapers.nust.na/greenstone3/sites/localsite... · According to research on organisational resistance, the four components that must be changed

17. A data warehouse is composed of:

a) Historical data from legacy systems

b) Current data

c) Internal and external data sources

d) Historic and current data sources

e) Historic external data

18. The expenses incurred by a customer or company in lost time and resources when

changing from one supplier or system to a competing supplier or system are known

as:

a) Retention costs

b) Preservation costs

c) Differentiation costs

d) Switching costs

e) Variation costs

19. If your main supplier was late in delivering goods, which type of system would you

use to update your production schedule:

a) ESS

b) TPS

c) MIS

d) DSS

e) KMS

20. Which of the following traditional solutions enables manufacturers to deal with

uncertainties in the supply chain:

a) Safety stock

b) Continuous replenishment

c) Just—in-time strategies

d) Demand planning

e) Perfect information

Page 8: HFHTIIBIPI UNIVERSITY Faculty Computingexampapers.nust.na/greenstone3/sites/localsite... · According to research on organisational resistance, the four components that must be changed

SECTION C [60 marks]

Answer all questions from this section (Each question carries 10 marks)

Question 1

Identify the five (5) moral dimensions that define political, social and ethical issues and

briefly describe each [10]

Question 2

identify five (5) social costs of introducing ICT to an organisation and briefly describe each

[10]

Question 3

identify and briefly describe five (5) primary activities of a business value chain [10]

Question 4

Identify and briefly describe the five (5) benefits that can be derived from a DBMS

[10]

Question 5

Identify and briefly describe, five (5) eCommerce business models [10]

Question 6

Identify and briefly describe five (5) benefits of Knowledge Management [10]

End of exam