NOTE: There are 9 Questions in all.
· Question 1 is compulsory and carries 20 marks. Answer to Q. 1. must be written in the space provided for it in the answer book supplied and nowhere else.
· Out of the remaining EIGHT Questions answer any FIVE Questions. Each question carries 16 marks.
· Any required data not explicitly given, may be suitably assumed and stated.
Q.1 Choose the correct or best alternative in the following: (2x10)
a. The system that generates the company’s income statements and balance sheets is
(A) general ledger system (B) Inventory control system
(C) Asset Management system (D) Payroll system
b. Which one of the following is non-volatile memory?
(A) Random Access Memory (B) Cache Memory
(C) Registers (D) Read Only Memory
c. Which of the following is not a database model?
(A) Hierarchical model (B) Operational model
(C) Network model (D) Relational model
d. An intelligent communication processor that interconnects networks based on different rules is called a
(A) Switch (B) Router
(C) Hub (D) Port
e. A depository of knowledge that human experts might apply to solve problem in a subject area like medicine, engineering, finance and so on is known as
(A) heuristics (B) knowledge base
(C) database (D) inference engine
f. Transaction Processing system is used by
(A) lower level managers (B) middle level managers
(C) top managers (D) knowledge and clerical workers
g. Designing of the interactions between end users and computer system is
(A) Input Design (B) Data Design
(C) User Interface Design (D) Process Design
h. A search engine that indexes one or more web sites, exploring all the links local to the site starting from the main page is called a
(A) Cookie (B) Spam
(C) Firewall (D) Spider
i. ___________ is used to evaluate the impact that each possible strategic opportunity can have on a company and its use of information technology
(A) System analysis (B) SWOT analysis
(C) Data analysis (D) Break-Even analysis
j. The process of optimising the delivery of goods, services and information from the supplier to the customer is called ___________
(A) Customer Relationship Management
(B) Relationship Management
(C) Supply Chain Management
(D) Marketing Automation
Answer any FIVE Questions out of EIGHT Questions.
Each question carries 16 marks.
Q.2 a. How has the management structure changed due to re-engineering. (5)
b. What is the main purpose of MIS? Describe the five components of a management information system. (7)
c. Differentiate between e-commerce and e-business. (4)
Q.3 a. Explain some of the security threats to information systems? (6)
b. How does encryption ensure data security? (4)
c. What capabilities do government agencies have to deal with crime and terrorism using electronic transmissions? (6)
Q.4 a. Explain the management strategy in an organisation. (8)
b. How is data stored in a relational database? (4)
c. Why are forms (input screens) important in a relational database? (4)
Q.5 a. What are the primary reasons for creating business models? Explain any three problems that can be encountered when using these models. (8)
b. What is a decision support system (DSS)? List the different sub systems and components of DSS. (8)
Q.6 a. Describe any four techniques that can be used to gain competitive advantage. (8)
b. What role is played by information systems in improving quality management? (4)
c. What are the costs and dangers of strategic implementations? (4)
Q.7 a. How does internet technology improve customer relationship management? (6)
b. Define entrepreneurship. Why is it import to economics. List the primary steps in starting a new business? (2+4+4)
Q.8 a. What drawbacks are created with the systems development life cycle methodology? Explain the manner in which the drawbacks of SDLC are overcome by prototyping. (4+3)
b. Define and correlate between the following:
(i) Object and Object hierarchy
(ii) Events and event-driven approach
(iii) Class and class diagram. (9)
Q.9 a. Explain the advantages of outsourcing computer facilities. Also explain some of its drawbacks. (8)
b. How does the internet affect centralization and decentralization of information technology within a company? (8)