Mid Term Questions Bank
Mid Term Questions Bank
A. Identify and describe the modeling and diagramming techniques that are used for the
structure and object oriented analysis.
(6 marks)
Required:
Briefly explain TWO (2) reasons why outsourcing becomes a trend in the business
information processing nowadays.
(4 marks)
[Total: 20 marks]
Question 2
Required:
Discuss any TWO (2) factors that drive up the cost of a typical software development.
(5 marks)
(6 marks)
D. Explain TWO (2) main differences between analysis and design phase.
(4 marks)
[Total: 20 marks]
Question 3
A. Identify and describe the modeling and diagramming techniques that are used for the
structure and object oriented analysis.
(6 marks)
A. You have started the process of selecting a new system for your company and you
are weighing all of the various issues that need to be considered and resources you
have at your disposal as you make this important decision. Dato’ Hafiz, the
company’s managing director has asked you to help him in presenting to the board of
director on outsourcing issues at the boards’ meeting next month.
Required:
ii. Beside outsource the system development project discuss FOUR (4) reasons
for in house development to justify your suggestion.
(8 marks)
B. Explain TWO (2) main differences between analysis and design phase.
(4 marks)
[Total: 20 marks]
Question 5
Electronic commerce involves the electronic processing and transmission of data. This broad
definition encompasses many diverse activities, including the electronic buying and selling of
goods and services, online delivery of digital products, electronic fund transfer (EFT),
electronic trading of stocks, and direct consumer marketing. Electronic commerce is not an
entirely new phenomenon; many companies have engaged in electronic data interchange
(EDI) over private networks for decades.
Required:
(b) Name the THREE (3) types of address used on the Internet
(3 marks)
(c) The benefits attained from electronic commerce will depend on the degree of
organizational commitment to it as a business strategy. Discuss FIVE (5) benefits of
Internet commerce.
(5 marks)
(d) Define what is Electronic Data Interchange (EDI) and discuss THREE (3) benefits of
EDI.
(6 marks)
(e) Firewall is used as part of controlling risks from subversive threats. Distinguish
between a network-level firewall and an application-level firewall.
(4 marks)
[Total: 20 marks]
Question 6
(a) Contrast proactive and reactive management styles.
(4 marks)
(c) What are the THREE (3) factors that have stimulated the growth of commercial
package software?
(6 marks)
[Total: 20 marks]
Question 7
(a) Protocols are the rules and standards governing the design of hardware and
software that permit users of networks, which different vendors have manufactured,
to communicate and share data. The general acceptance of protocols within the
network community provides both standards and economic incentives for the
manufactures of hardware and software. Products that do not comply with
prevailing protocols will have little value to prospective customers.
Required:
Describe FIVE (5) importance of protocol.
(10 marks)
(b) In general, business risk is possibility of loss injury that can reduce or eliminate an
organization’s ability to achieve its objectives. In term of electronic commerce, risk
relates to the loss, theft, or destruction of data as well as the use of computer
programs that financially or physically harm an organization. Internet risks are
divided into two, internet risk of consumer and to business.
Required:
(c) Define what seal of assurance is and give TWO (2) examples of seal of assurance.
(4 marks)
[Total: 20 marks]
Question 8
(a) The systems evaluation and selection phase is an optimization process that seeks
to identify the best system. The purpose of a formal evaluation and selection
procedure is to structure this decision – making process and thereby reduce both
uncertainty and the risk of making a poor decision. The objective to provide a
means by which management can make an informed judgement. This selection
process involves two steps which are performing a detailed feasibility study and
perform a cost-benefit analysis.
Required:
Discuss THREE (3) feasibility measures. Provide an example of each
measure.
(6 marks)
(b) The process of converting from the old system to the new one is called the cutover.
What are the THREE (3) implementation (cutover) methods?
(6 marks)
(c) Define the management assertions of existence or occurrence, completeness,
rights and obligations, and valuation or allocation.
(8 marks)
[Total: 20 marks]