100% found this document useful (1 vote)
2K views6 pages

Csc408 Exam July 2023

CSC408 FINAL EXAM PAPER 2023

Uploaded by

Jazry
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
100% found this document useful (1 vote)
2K views6 pages

Csc408 Exam July 2023

CSC408 FINAL EXAM PAPER 2023

Uploaded by

Jazry
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
  • Exam Overview: Provides instructions for candidates on how to approach the examination, including parts and answer sheet usage.
  • Part A: Contains multiple-choice questions focusing on topics such as databases, data management, and technology concepts.
  • Part B: Features brief answer questions requiring explanation of concepts related to organization, data distribution, and communication networks.
  • Part C: Includes essay-type questions that delve into broader subjects like supply chain management, e-commerce, and information system controls.
CONFIDENTIAL CDIJUL 2023/¢8C208/408 ee Ms Mi UNIVERSITI TEKNOLOGI MARA FINAL EXAMINATION COURSE : MANAGEMENT INFORMATION SYSTEM COURSE CODE : cCSC208/408 EXAMINATION =: JULY 2023 TIME : 3HOURS INSTRUCTIONS TO CANDIDATES 1 This question paper consists of three (3) parts: PART A (20 Questions) PART B (4 Questions) PART C (2 Questions) 2, ‘Answer ALL questions from all three (3) parts: i] Answer PART A in the Objective Answer Sheet ii) Answer PART 8 and C in the Answer Booklet. Start each answer on a new page. 3. Do not bring any material into the examination room unless permission is given by the invigitato 4 Please check to make sure that this examination pack consists of i) the Question Paper ii) an Answer Booklet - provided by the Faculty lil) an Objective Answer Sheet — provided by tt culty 8. Answer ALL questions in English DO NOT TURN THIS PAGE UNTIL YOU ARE TOLD TO D0 SO This examination paper consisis oF 6 printed pagos (© Hak Cipta Universit Teknologi MARA CONFIDENTIAL CONFIDENTIAL, 2 CDIJUL 2023/680208/408 PART A | 4. Which of the following is the benefit of using a DBMS? They create automatic backups. ‘They provide seamiess Internet access to database data. They provide full security to data using private/public key encryption. They enable organization to have centralized data management and data security. gomPr 2. Internet of Things (loT) and Big Data are two related technological concepts. What is big data? A. The massive sets of data gathered from various sources need to be analysed using computing technology to reveal pattems and trends. & The growing collection of data stored in @ decentralised ledger for the purpose of recording transactions C. The amount of data that cannot be processed by humans. D. Combination of multiple devices to oroduce data to be transferred through the Internet 3. The traditional file environment typically does not have a problem with A. data inconsistency B. program-data independence C. lack of flexibility in creating ad-hoc reports D. poor security aA is a logically connected set of one or more fields that describes @ person. place, or thing. A database B. column ©. file D. record 5. Which of the following is NOT a characteristic of packet switching? Packets travel independently of each other. Packets are routed through many different paths. Packet switching requires point-to-point circuits. Paokets are reassembled into the otiginal message when they reach their destinations. gom> 6 would be the most appropriate network for a business that comprises three ‘employees and a manager working in the same office space, whose primary need is to share documents A MAN B. CAN cc. LAN D. WAN CONFIDENTIAL CONFIDENTIAL 3 CDIJUL 2023/¢8¢208/408 7, The is @ standard network protocol used for the transfer of computer files between a client and server on a computer network. ‘A. Uniform Resource Locator (URL) B, File Transfer Protocol (FTP) C. Hypertext Markup Language (HTML) D. Hypertext Transfer Protocol (HTTP) 8 is NOT the major component of a computer network. Network operating system B, Cookie C. Hub D. Router 9. Choose the BEST statement that describes mail encryption. ‘A. Unsolicited messages sent in buk by email B. The encoding process of email messages to protect the content from being read by ‘entities other than the intended recipients, ‘An automated message from a mail system, informing the sender of @ previous message that that message had not been delivered Decades the encrypted information so that an authorized user can only decrypt the data 29 10. Which of the following defines the function of firewalls? A. Restoring business operations after a disaster B. Restoration of disrupted services. c. D .. Recovery of ambient and hidden date. Combination of hardware and software that prevents unauthorized users from accessing private networks. 11. The following tools and technologies are used for safeguarding information resources EXCEPT: A. Computer forensics B. Antivirus and antispyware C. Firewalls D. Intrusion Detection Systems 12. A trojan horse is software that appears to be benign but does something other than expected a virus installed as a drive-by download a malware named for a breed of fast-moving Near-Eastemn horses. a type of sniffer used to infiltrate corporate networks. 13.A company’s suppliers, supplier's suppliers, and the processes for managing lationships with them is known as supplier's internal supply chain extemal supply chain. upstream supply chain. downstream supply chain a> 9OO> comp (© Hak Cipta Universit Teknologi MARA CONFIDENTIAL CONFIDENTIAL, 4 CDIJUL 2023/¢8208/408 44, "Manufacturers do not have problems with uncertainties and unforeseen circumstances, regarding how many units of product customers wanted, when the products could be produced, and get the products to be delivered to their ‘customers’. This stetement describes the concept of A streamined strategy B. hyper-efficient strategy C. bullwhip strategy D. just-in-time strategy 48. Which of the following does NOT contribute to the business value of an effective supply chain management system? A. improved delivery service. B. Increased inventory levels ©. Cost reduction. D. Speed product time to market. 16. The is @ recurring problem in supply chain management in which information about the demand for a product gets distorted as it passes from one entity to the next across the supply chain A. ripple effect, B. whirlpoo! effect C. bullwhip effect D. network error 47. Ubiquity is one of the unique features of the intemet as a commercial medium. Indicate the BEST statement to support this characteristic. ‘A. The fact of appearing everywhere or of being very common, B. The ability of a computer to respond to a user's input C. Tailors an experience based on @ consumer's previous behaviors. D. Modifying something to suit a particular individual or task 18.Which of the following dimensions of e-commerce technology involves engaging consumers in a dialogue that dynamically adjusts the experience to the individual? A. Ubiquity B. Personalization/customization C. Richness D. Interactivity 19, What is the primary benefit to consumers of disintermediation? A, Faster service B. Lower costs ©. Higher quality D. Greater choices ‘© Hak Cipta Universit Teknologi MARA CONFIDENTIAL, CONFIDENTIAL 5 CDIJUL 2028/¢8C208/408 20. “Consumers can share their shopping experiences with one another by viewing products, chatting, or texting about brands, products, and services.” Choose the BEST answer that describes the above situation. Network notification ‘Web personal marketing Collaborative shopping ocial search vom, PARTB (4? movks) QUESTION 4 a) Briefly explain ONE (1) advantage and ONE (1) challenge of big data to organisation (4 marks) 4) “Packets of data are encrypted and wrapped inside IP packets and transmitted through a secure virtual private network, VPN.” i) Based on the above statement, identify the name of the process. (2 marks) ji) Briefly describe an appropriate scenario or situation to explain your answer in (i). (4 marks) QUESTION 2 Tradein is an online retall company that uses various information systems to manage its operations, finances, and customer data. It uses an inventory management system to track and manage its products, Although the company has a dedicated IT department that manages and maintains these systems, the mariagement team is concerned about the data's security and integrity. To address these concerns, the company has put information system controls to protect its information systems and decided to conduct an information systems audit 2) Identify the TWO (2) types of information system controls. (2 marks} b) Differentiate between the two answers in (a) (4 marks) ©) Briefly describe THREE (3) roles of an information systems audit. (6 marks) © Hak Ciota Universit Teknologi MARA CONFIDENTIAL, CONFIDENTIAL, 6 CDIWUL 2ozs/CSc208/408 QUESTION 3 Typically, the supply chain management system is driven by a push-based model. With new flows of information made possible by web-based tools, it easily follows a pull-based model. a) What is the other name used for (i) push-based model and (il) pull-based model respectively? (4 marks) b) Differentiate between push-based and pull-based model. (4 marks) QUESTION 4 E-commerce has grown rapidly due to the unique nature of the Intemet and the Web. a) List FIVE (5) unique features of e-commerce. ( marks) b) Differentiate any TWO (2) unique features of e-commerce technology in (a), Provide ONE (1) example for each, (5 marks) parte (20 mnths) QUESTION 1 Database technology cuts through many of the problems of traditional fle organisation. Date is stored in a single file location that serves muttiple applications. Describe a database management system (DBMS) and explain how it helps to solve the problems of the traditional file environment (10 marks) QUESTION 2 ‘Smartphones and mobile devices can facilitate real-time communications, location-based communications, and quick access to information on the consumer's schedule. They use mobile devices in every aspect of their lives from riding the trains, fiying the planes, watching a movie, reading online newspapers, and reading books (on Kindle) to name a few. As the mobile audience has expanded rapidly, mobile advertising and m-commeroe have taken off. Define location-based services, Describe with appropriate examples the three main categories of location-based services which are geosocial, geoadvertising, and gecinformation services. (10 marks) END OF QUESTION PAPER (© Hak Cipta Universit Tekrologl MARA CONFIDENTIAL

You might also like