0% found this document useful (0 votes)
6 views2 pages

Final Exam

The document outlines the final exam for MIS courses, detailing questions from Chapters 6, 8, and 13 that require students to explore database technologies, information security challenges, and application development processes. Students must select one question from each chapter to answer in a word processing application and submit by the specified deadline. The exam emphasizes practical examples and critical thinking in the context of current technological issues.

Uploaded by

kaewwattana.lee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views2 pages

Final Exam

The document outlines the final exam for MIS courses, detailing questions from Chapters 6, 8, and 13 that require students to explore database technologies, information security challenges, and application development processes. Students must select one question from each chapter to answer in a word processing application and submit by the specified deadline. The exam emphasizes practical examples and critical thinking in the context of current technological issues.

Uploaded by

kaewwattana.lee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Final Exam | 472-326 & 472-390 MIS

Chapter 6
1. Describe & give an example the ways in which database
technologies could be used by our university or faculty to
achieve stakeholder intimacy (10 marks).
2. Describe & give an example the ways in which database
technologies could be used to effectively help cope with COVID-
19 pandemic (10 marks).
Chapter 8
3. What is your most information security challenge faced by
today’s teenagers? Why? Give an example to explain your
answer (10 marks).
4. Three major concerns of information system security are disaster,
security, and human error. Of the three, which do you think is
most difficult to deal with? Why? And how to safeguard
information resources from it? (10 marks).
5. You are about to run your own business, what will be the security
measures for the firm to take to protect itself from cyberattacks?
Is full protection feasible? Why or why not? Give an example of
any business to explain your answer (10 marks).
Chapter 13
6. You are about to develop an application for your own business
using the traditional System Development Life Cycle (SDLC),
describe activities you will perform for system analysis, system
design, and conversion phases. Give an example of any
application to explain your answer (10 marks).
7. You work for the IT department of a startup ABC, What approach
might you recommend for getting application to run the firm’s
core business functions among developing by IT department
itself, buying software packages, or hiring external vendors
(outsourcing)? Why? (10 marks).

Instructions
1. Choose 1 question from each chapter (totally 3 questions).
2. Write your answer on MS Word or any word processing
application.
3. There is no page limit.
4. Submit your file or link on Slack (direct message).
5. Submission deadline: Apr 30, 2021 | 6.00 pm., Slack time.

You might also like