100%(1)100% found this document useful (1 vote) 2K views6 pagesCsc408 Exam July 2023
CSC408 FINAL EXAM PAPER 2023
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
- Exam Overview: Provides instructions for candidates on how to approach the examination, including parts and answer sheet usage.
- Part A: Contains multiple-choice questions focusing on topics such as databases, data management, and technology concepts.
- Part B: Features brief answer questions requiring explanation of concepts related to organization, data distribution, and communication networks.
- Part C: Includes essay-type questions that delve into broader subjects like supply chain management, e-commerce, and information system controls.
CONFIDENTIAL CDIJUL 2023/¢8C208/408
ee
Ms
Mi
UNIVERSITI TEKNOLOGI MARA
FINAL EXAMINATION
COURSE : MANAGEMENT INFORMATION SYSTEM
COURSE CODE : cCSC208/408
EXAMINATION =: JULY 2023
TIME : 3HOURS
INSTRUCTIONS TO CANDIDATES
1 This question paper consists of three (3) parts: PART A (20 Questions)
PART B (4 Questions)
PART C (2 Questions)
2, ‘Answer ALL questions from all three (3) parts:
i] Answer PART A in the Objective Answer Sheet
ii) Answer PART 8 and C in the Answer Booklet. Start each answer on a new page.
3. Do not bring any material into the examination room unless permission is given by the
invigitato
4 Please check to make sure that this examination pack consists of
i) the Question Paper
ii) an Answer Booklet - provided by the Faculty
lil) an Objective Answer Sheet — provided by tt
culty
8. Answer ALL questions in English
DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO D0 SO
This examination paper consisis oF 6 printed pagos
(© Hak Cipta Universit Teknologi MARA CONFIDENTIALCONFIDENTIAL, 2 CDIJUL 2023/680208/408
PART A |
4. Which of the following is the benefit of using a DBMS?
They create automatic backups.
‘They provide seamiess Internet access to database data.
They provide full security to data using private/public key encryption.
They enable organization to have centralized data management and data security.
gomPr
2. Internet of Things (loT) and Big Data are two related technological concepts. What is big
data?
A. The massive sets of data gathered from various sources need to be analysed using
computing technology to reveal pattems and trends.
& The growing collection of data stored in @ decentralised ledger for the purpose of
recording transactions
C. The amount of data that cannot be processed by humans.
D. Combination of multiple devices to oroduce data to be transferred through the
Internet
3. The traditional file environment typically does not have a problem with
A. data inconsistency
B. program-data independence
C. lack of flexibility in creating ad-hoc reports
D. poor security
aA is a logically connected set of one or more fields that describes @ person.
place, or thing.
A database
B. column
©. file
D. record
5. Which of the following is NOT a characteristic of packet switching?
Packets travel independently of each other.
Packets are routed through many different paths.
Packet switching requires point-to-point circuits.
Paokets are reassembled into the otiginal message when they reach their
destinations.
gom>
6 would be the most appropriate network for a business that comprises three
‘employees and a manager working in the same office space, whose primary need is to
share documents
A MAN
B. CAN
cc. LAN
D.
WAN
CONFIDENTIALCONFIDENTIAL 3 CDIJUL 2023/¢8¢208/408
7, The is @ standard network protocol used for the transfer of computer files
between a client and server on a computer network.
‘A. Uniform Resource Locator (URL)
B, File Transfer Protocol (FTP)
C. Hypertext Markup Language (HTML)
D. Hypertext Transfer Protocol (HTTP)
8 is NOT the major component of a computer network.
Network operating system
B, Cookie
C. Hub
D. Router
9. Choose the BEST statement that describes mail encryption.
‘A. Unsolicited messages sent in buk by email
B. The encoding process of email messages to protect the content from being read by
‘entities other than the intended recipients,
‘An automated message from a mail system, informing the sender of @ previous
message that that message had not been delivered
Decades the encrypted information so that an authorized user can only decrypt the
data
29
10. Which of the following defines the function of firewalls?
A. Restoring business operations after a disaster
B. Restoration of disrupted services.
c.
D
.. Recovery of ambient and hidden date.
Combination of hardware and software that prevents unauthorized users from
accessing private networks.
11. The following tools and technologies are used for safeguarding information resources
EXCEPT:
A. Computer forensics
B. Antivirus and antispyware
C. Firewalls
D. Intrusion Detection Systems
12. A trojan horse is
software that appears to be benign but does something other than expected
a virus installed as a drive-by download
a malware named for a breed of fast-moving Near-Eastemn horses.
a type of sniffer used to infiltrate corporate networks.
13.A company’s suppliers, supplier's suppliers, and the processes for managing
lationships with them is known as
supplier's internal supply chain
extemal supply chain.
upstream supply chain.
downstream supply chain
a> 9OO>
comp
(© Hak Cipta Universit Teknologi MARA CONFIDENTIALCONFIDENTIAL, 4 CDIJUL 2023/¢8208/408
44, "Manufacturers do not have problems with uncertainties and unforeseen circumstances,
regarding how many units of product customers wanted, when the products could be
produced, and get the products to be delivered to their ‘customers’.
This stetement describes the concept of
A streamined strategy
B. hyper-efficient strategy
C. bullwhip strategy
D. just-in-time strategy
48. Which of the following does NOT contribute to the business value of an effective supply
chain management system?
A. improved delivery service.
B. Increased inventory levels
©. Cost reduction.
D. Speed product time to market.
16. The is @ recurring problem in supply chain management in which
information about the demand for a product gets distorted as it passes from one entity to
the next across the supply chain
A. ripple effect,
B. whirlpoo! effect
C. bullwhip effect
D. network error
47. Ubiquity is one of the unique features of the intemet as a commercial medium. Indicate
the BEST statement to support this characteristic.
‘A. The fact of appearing everywhere or of being very common,
B. The ability of a computer to respond to a user's input
C. Tailors an experience based on @ consumer's previous behaviors.
D. Modifying something to suit a particular individual or task
18.Which of the following dimensions of e-commerce technology involves engaging
consumers in a dialogue that dynamically adjusts the experience to the individual?
A. Ubiquity
B. Personalization/customization
C. Richness
D. Interactivity
19, What is the primary benefit to consumers of disintermediation?
A, Faster service
B. Lower costs
©. Higher quality
D. Greater choices
‘© Hak Cipta Universit Teknologi MARA CONFIDENTIAL,CONFIDENTIAL 5 CDIJUL 2028/¢8C208/408
20. “Consumers can share their shopping experiences with one another by viewing products,
chatting, or texting about brands, products, and services.”
Choose the BEST answer that describes the above situation.
Network notification
‘Web personal marketing
Collaborative shopping
ocial search
vom,
PARTB (4? movks)
QUESTION 4
a) Briefly explain ONE (1) advantage and ONE (1) challenge of big data to organisation
(4 marks)
4) “Packets of data are encrypted and wrapped inside IP packets and transmitted through
a secure virtual private network, VPN.”
i) Based on the above statement, identify the name of the process.
(2 marks)
ji) Briefly describe an appropriate scenario or situation to explain your answer in (i).
(4 marks)
QUESTION 2
Tradein is an online retall company that uses various information systems to manage its
operations, finances, and customer data. It uses an inventory management system to track
and manage its products, Although the company has a dedicated IT department that
manages and maintains these systems, the mariagement team is concerned about the data's
security and integrity. To address these concerns, the company has put information system
controls to protect its information systems and decided to conduct an information systems
audit
2) Identify the TWO (2) types of information system controls.
(2 marks}
b) Differentiate between the two answers in (a)
(4 marks)
©) Briefly describe THREE (3) roles of an information systems audit.
(6 marks)
© Hak Ciota Universit Teknologi MARA CONFIDENTIAL,CONFIDENTIAL, 6 CDIWUL 2ozs/CSc208/408
QUESTION 3
Typically, the supply chain management system is driven by a push-based model. With new
flows of information made possible by web-based tools, it easily follows a pull-based model.
a) What is the other name used for (i) push-based model and (il) pull-based model
respectively?
(4 marks)
b) Differentiate between push-based and pull-based model.
(4 marks)
QUESTION 4
E-commerce has grown rapidly due to the unique nature of the Intemet and the Web.
a) List FIVE (5) unique features of e-commerce.
( marks)
b) Differentiate any TWO (2) unique features of e-commerce technology in (a), Provide ONE
(1) example for each,
(5 marks)
parte (20 mnths)
QUESTION 1
Database technology cuts through many of the problems of traditional fle organisation. Date
is stored in a single file location that serves muttiple applications. Describe a database
management system (DBMS) and explain how it helps to solve the problems of the traditional
file environment
(10 marks)
QUESTION 2
‘Smartphones and mobile devices can facilitate real-time communications, location-based
communications, and quick access to information on the consumer's schedule. They use
mobile devices in every aspect of their lives from riding the trains, fiying the planes, watching
a movie, reading online newspapers, and reading books (on Kindle) to name a few. As the
mobile audience has expanded rapidly, mobile advertising and m-commeroe have taken off.
Define location-based services, Describe with appropriate examples the three main
categories of location-based services which are geosocial, geoadvertising, and
gecinformation services.
(10 marks)
END OF QUESTION PAPER
(© Hak Cipta Universit Tekrologl MARA CONFIDENTIAL