Management Informatio System::Past Papers


Answer ANY five questions

a) Identify six major components of a computer system. (6 marks)

b) Describe the following with reference to systems development.
1. Structured analysis (3 marks)
2. Structured design (3 marks)

c) The current trend in database systems development include the growth in distributed database systems and the emergence of object oriented and hypermedia database systems.
Distinguish between object oriented and hypermedia database systems. (8 marks)

a) Risk assessment is a process that involves evaluation of the impact of risk and its probability of occurring.

Using suitable examples, explain what is involved in the following risk assessment issues
1. Preventive risk measures. (3 marks)
2. Mitigation risk measures. (3 marks)

b) Highlight the difference between business continuity planning and disaster recovery.
(3 marks)

c) State the meaning of the term "system integrity" and describe the moral issues which a systems developer should consider in order to maintain the integrity of an information system. (10 marks)

a) Define the term "information systems strategy" (2 marks)

b) The business information technology (IT) planning process focuses on discovering innovative approaches to satisfying an organization's customer and business value goals.

Examine the three components of business/IT planning process. (6 marks)

c) Describe the four components of information technology architecture which are created by the strategic business/IT planning process. (12 marks)

a) Suggest the network devices which would be suitable for the following tasks:
1. Connecting a local area network to another local area network using the same protocol. (1 mark)
2. Allowing several users to send information over a network at the same time without slowing each other down. (1 mark)
3. Determining the next network point to which a data packet should be forwarded. (1 mark)
4. Allowing data convergence from one or more directions and forwarding it out in one or more directions. (1 mark)

b) Explain the function of an interface message processor (IMP) in a network protocol (3 marks)

c) In a network, the host computer may need extra processors in order to increase the efficiency of the network.
Name and briefly describe the two types of subordinate processors which may be configured with the host computer. (6 marks)

d) Briefly examine three electronic payment systems which are used to settle e-commerce transactions. (6 marks)

a) Using a well labelled diagram, explain the rapid application development approach to systems development. (8 marks)

b) Before a systems analyst can begin a systems investigation, he/she requires the terms of reference.
Highlight the information contained in the terms of reference. (5 marks)

c) Computer software, books, music and other creative works can be digitized and distributed over the internet.
Examine the problems faced in the protection of intellectual property rights arising from the use of the internet. (7 marks)

a) Briefly describe the following data communication terms:
1. Information superhighway (3 marks)
2. Transmission speed (3 marks)

b) Briefly describe the four categories of e-commerce. (8 marks)

c) Highlight the characteristics of the following information systems:
1. Knowledge work systems (3 marks)
2. Executive support systems (3 marks)
5. Providing an entrance to another network. (1 mark)


Answer ANY five questions

The manager of a manufacturing company has noted several data entry errors in the sales analysis system used by his company. The sales analysis system contains the following fields:
Sales reference number
Product code
Product quantity
Product price
Product stock value

The manager has further observed that the errors may have arisen because the sales analysis system described above may not have undergone validation and verification checks.

a) citing an example in each case, explain the meaning of the following terms as used in computing:
1. Validation (4 marks)
2. Verification (4 marks)

b) For each of the fields in the sales analysis system above, state and justify the required type of data validation check. (12 marks)

a) Briefly describe the following internet applications:
1. Web blogs (3 marks)
2. Instant messaging (3 marks)

b)1. Distinguish between centralized data processing and distributed data processing. (2 marks)
2. Discuss the advantages and disadvantages of distributed data processing. (2 marks)

a) Public domain software could be obtained from friends and other sources.
1. Explain the term "public domain software" (2 marks)
2. Highlight the main reasons why software is often distributed under the umbrella of public domain software. (3 marks)
3. State three sources of public domain software (3 marks)

b) Highlight four ways in which application packages could enhance the efficiency of a business firm. (4 marks)

c) 1. Identify ways in which an organization could minimize unauthorized access to data in its computerized information systems. (4 marks)

2. Outline the methods used to detect data access in computerized information systems. (4 marks)

a) 1. Describe the stages of the classic systems development life cycle (SDLC) (12 marks)
2. Explain the limitations of SDLC (4 marks)

b) Outline the advantages of prototyping information systems development technique over the classic SDLC (4 marks)

a) The components of a computer-based information system in an organization comprise among others, people and data.

1. Explain three other components of a computer based information system (6 marks)
2. Evaluate the reasons why business organizations that have computer-based information systems are more competitive (8 marks)

b) Briefly describe three specialist roles that may be performed by information communication technology (ICT) professionals. (6 marks)

a) The growing number of web applications and service oriented architectures necessitates in-depth management focus on network and database security.

1. Define the term "spyware" (1 mark)
2. Explain the implications of spyware on network security. (2 marks)
3. Enumerate the basic signs of spyware infection (5 marks)

b) Outline the essential capabilities of a secure database. (4 marks)

c) Data encryption is a key component of network security.
Examine the factors considered when selecting an encryption tool for organization. (8 marks)

The management of Ekwe and Muli (Certified Public Accountants) wish to offer their services online. Consequently, the management are in the process of contracting an information communication technology (ICT) consultant to advise on the establishment of a website.

a) List five different ways in which a business any establish a website. (5 marks)
b) Assess the elements that a business organization may consider in order to leverage on the establishment of the website. (15 marks)

a) Write short notes on the following:
1. Query languages (3 marks)
2. Application generators (3 marks)

b) Highlight four organizational factors that should be taken into account during the planning and implementation stages of information systems development. (4 marks)

c) 1. Outline five challenges that may affect successful adoption of an information system in an organization (5 marks)

2. Suggest five remedies to the challenges outlined in (c) (1) above. (5 marks)