0% found this document useful (0 votes)
57 views7 pages

Mid Term Questions Bank

The document contains 8 questions related to information systems concepts. Question 1 asks about modeling techniques used in object oriented analysis and describes a case study about an information services company considering outsourcing. It asks about outsourcing vs. in-house development, risks of outsourcing, and reasons for the trend of outsourcing information processing. Question 2 covers software maintenance costs, prototyping stages, critical success factors for e-commerce businesses, and differences between analysis and design phases.

Uploaded by

Good Person
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views7 pages

Mid Term Questions Bank

The document contains 8 questions related to information systems concepts. Question 1 asks about modeling techniques used in object oriented analysis and describes a case study about an information services company considering outsourcing. It asks about outsourcing vs. in-house development, risks of outsourcing, and reasons for the trend of outsourcing information processing. Question 2 covers software maintenance costs, prototyping stages, critical success factors for e-commerce businesses, and differences between analysis and design phases.

Uploaded by

Good Person
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 7

Question 1

A. Identify and describe the modeling and diagramming techniques that are used for the
structure and object oriented analysis.
(6 marks)

B. Gegar Marketing Research (GMR), with operation in 10 countries, is one of the


recognized world leaders in the production and dissemination of marketing
information. GMR is pioneer in the development of the decision support information
business and has been the primary supplier for more than 10 years. GMR’s most
recognizable product is the GMR television ratings. GMR is one of the largest users
of computer capacity in Malaysia. Its information system has consistently ranked
above average in efficiency for its authority for its industry. However, it commissioned
IB,’s Integrated System Solution Corporation (ISSC) to evaluate outsourcing GMR’s
information processing. GMR wants to know whether outsourcing will allow it to
concentrate on giving its customer value added services and insights and whether
outsourcing can increase its flexibility, promote rapid growth, and provide it with more
real time information.

Required:

Briefly explain outsourcing and in-house development system.


(6 marks)

Discuss TWO (2) risks associated with outsourcing.


(4 marks)

Briefly explain TWO (2) reasons why outsourcing becomes a trend in the business
information processing nowadays.
(4 marks)
[Total: 20 marks]
Question 2

A. Software maintenance is an on-going process as new vulnerabilities are always


being discovered and exploited. To address this, firms regularly release security
updates as new vulnerabilities are found.

Required:

Discuss any TWO (2) factors that drive up the cost of a typical software development.
(5 marks)

B. Briefly explain FIVE (5) stages of prototyping.


(5 marks)

C. E-commerce offer a new dimension in marketing, selling, delivering, servicing of


products and services transacted over the internet. Many “dot.com” businesses failed
when most of the businesses were focusing only on retail e-commerce. Discuss
THREE (3) critical success factors that “dot-com” businesses should consider.

(6 marks)

D. Explain TWO (2) main differences between analysis and design phase.
(4 marks)
[Total: 20 marks]

Question 3

A. Identify and describe the modeling and diagramming techniques that are used for the
structure and object oriented analysis.
(6 marks)

A. Define what firewall is and distinguish between network-level and application-level


firewalls. Provide example for each firewall.
(6 marks)
B. Conversion is the process of changing from the old to new system. Many elements
must be converted. The process is completed when the new systems has become a
routine, on-going part of the system. Explain FOUR (4) conversion approach are
used to change from an old system to new system.
(8 marks)
[Total: 20 marks]
Question 4

A. You have started the process of selecting a new system for your company and you
are weighing all of the various issues that need to be considered and resources you
have at your disposal as you make this important decision. Dato’ Hafiz, the
company’s managing director has asked you to help him in presenting to the board of
director on outsourcing issues at the boards’ meeting next month.

Required:

i. Discuss TWO (2) advantages of outsourcing and TWO (2) risks of


outsourcing.
(8 marks)

ii. Beside outsource the system development project discuss FOUR (4) reasons
for in house development to justify your suggestion.
(8 marks)

B. Explain TWO (2) main differences between analysis and design phase.
(4 marks)
[Total: 20 marks]

Question 5
Electronic commerce involves the electronic processing and transmission of data. This broad
definition encompasses many diverse activities, including the electronic buying and selling of
goods and services, online delivery of digital products, electronic fund transfer (EFT),
electronic trading of stocks, and direct consumer marketing. Electronic commerce is not an
entirely new phenomenon; many companies have engaged in electronic data interchange
(EDI) over private networks for decades.

Required:

(a) What is a VPN?


(2 marks)

(b) Name the THREE (3) types of address used on the Internet
(3 marks)

(c) The benefits attained from electronic commerce will depend on the degree of
organizational commitment to it as a business strategy. Discuss FIVE (5) benefits of
Internet commerce.
(5 marks)

(d) Define what is Electronic Data Interchange (EDI) and discuss THREE (3) benefits of
EDI.
(6 marks)

(e) Firewall is used as part of controlling risks from subversive threats. Distinguish
between a network-level firewall and an application-level firewall.
(4 marks)
[Total: 20 marks]

Question 6
(a) Contrast proactive and reactive management styles.
(4 marks)

(b) Classify each of the following as either one-time or recurring costs:


i. Training personnel
ii. Initial programming and testing
iii. System design
iv. Hardware costs
v. Software maintenance costs
vi. Site preparation
vii. Rent for facilities
viii. Data conversion from old system to new system
ix. Insurance costs
x. Installation of original equipment
(10 marks)

(c) What are the THREE (3) factors that have stimulated the growth of commercial
package software?
(6 marks)
[Total: 20 marks]
Question 7

(a) Protocols are the rules and standards governing the design of hardware and
software that permit users of networks, which different vendors have manufactured,
to communicate and share data. The general acceptance of protocols within the
network community provides both standards and economic incentives for the
manufactures of hardware and software. Products that do not comply with
prevailing protocols will have little value to prospective customers.

Required:
Describe FIVE (5) importance of protocol.
(10 marks)
(b) In general, business risk is possibility of loss injury that can reduce or eliminate an
organization’s ability to achieve its objectives. In term of electronic commerce, risk
relates to the loss, theft, or destruction of data as well as the use of computer
programs that financially or physically harm an organization. Internet risks are
divided into two, internet risk of consumer and to business.

Required:

Discuss THREE (3) Internet risks towards consumers of electronic commerce.


(6 marks)

(c) Define what seal of assurance is and give TWO (2) examples of seal of assurance.
(4 marks)
[Total: 20 marks]
Question 8

(a) The systems evaluation and selection phase is an optimization process that seeks
to identify the best system. The purpose of a formal evaluation and selection
procedure is to structure this decision – making process and thereby reduce both
uncertainty and the risk of making a poor decision. The objective to provide a
means by which management can make an informed judgement. This selection
process involves two steps which are performing a detailed feasibility study and
perform a cost-benefit analysis.

Required:
Discuss THREE (3) feasibility measures. Provide an example of each
measure.

(6 marks)

(b) The process of converting from the old system to the new one is called the cutover.
What are the THREE (3) implementation (cutover) methods?
(6 marks)
(c) Define the management assertions of existence or occurrence, completeness,
rights and obligations, and valuation or allocation.
(8 marks)
[Total: 20 marks]

You might also like