Download Please analyze CARFIN LTD. using the following questions as a

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Business intelligence wikipedia , lookup

Transcript
9.200
Paper Number 417
UNIVERSITY OF MANITOBA
I. H. Asper School of Business
Department of Accounting and Finance
Information Systems for Management Final Exam
December 14, 2002 1:30 p.m. – 3:30 p.m.
Dr. M. Hine
Page 1 of 14
Name:
ID Number:
Section:
INSTRUCTIONS:
1.
Do not open this examination until instructed to do so.
2.
You have 120 minutes to complete this examination.
3.
Indicate your name, University of Manitoba identification number and section in the
space above.
4.
You are allowed pens, pencils and erasers. No other materials are permitted.
5.
Write your answers to question 1 on the bubble sheets provided using an HB
pencil. Write all other answers in this examination booklet.
6.
Hand in all pages of the examination.
This space is reserved for the grader.
Part
Multiple Choice
Short Answer
1
2
3
4
5
6
Total
Grade
/49
/
/8
/7
/7
/11
/8
/10
/100
9.200
Paper Number 417
UNIVERSITY OF MANITOBA
I. H. Asper School of Business
Department of Accounting and Finance
Information Systems for Management Final Exam
December 14, 2002 1:30 p.m. – 3:30 p.m.
Dr. M. Hine
Page 2 of 14
MULTIPLE CHOICE: (1 mark each)
1.
Each of the following is an essential component of a telecommunications system
except:
(a)
(b)
(c)
(d)
(e)
2.
The principal functions of protocols in a telecommunication network include:
(a)
(b)
(c)
(d)
(e)
3.
(b)
(c)
(d)
(e)
fibre-optic cable is considerably faster, lighter and more durable than wire
media.
fibre-optic cable is easier to work with and less expensive than coaxial cable.
fibre-optic cable is well suited to systems requiring transfers of large volumes
of data.
fibre-optic cable has data transfer rates from 500 kilobits to several billion bits
per second.
fibre-optic cables are used in most networks as the high speed backbone.
The transmission medium that is a high-volume, long-distance, point-to-point
transmission in which high-frequency radio signals are transmitted through the
atmosphere from one terrestrial transmission station to another describes:
(a)
(b)
(c)
(d)
(e)
5.
verifying that a message requires retransmission because it cannot be
correctly interpreted.
identifying each device in the communication path.
securing the attention of the receiving device.
verifying correct receipt of the transmitted message.
doing all of the above.
Each of the following is a true statement about fibre-optic cable except:
(a)
4.
computers.
end users.
terminals.
communication channels.
communication processors.
infrared.
fibre optics.
satellite.
microwave.
spread spectrum.
A telecommunications computer that collects and temporarily stores messages
from terminals for batch transmission to the host computer best defines:
(a)
(b)
(c)
(d)
(e)
front-end processor.
controller.
multiplexer.
concentrator.
bridge.
9.200
Paper Number 417
6.
(b)
(c)
(d)
(e)
PBXs require special wiring.
PBXs require an organization to have special expertise to manage them.
The geographic scope of a PBX is not limited.
PBXs can easily handle very large volumes of data.
PBXs are limited to telephone lines.
Which of the following is the driving force behind the explosion of electronic
business and the emergence of the digital firm?
(a)
(b)
(c)
(d)
(e)
9.
if one of the computers in a star network fails, none of the other components
in the network are affected.
the star topology is useful for applications where some processing must be
centralized and some can be performed locally.
all communications on a star network must pass through a central computer.
communication in a star network will come to a standstill if the host computer
stops functioning.
one problem with the star network is its vulnerability.
Which of the following is a true statement?
(a)
(b)
(c)
(d)
(e)
8.
Dr. M. Hine
Page 3 of 14
Each of the following is a true statement except:
(a)
7.
UNIVERSITY OF MANITOBA
I. H. Asper School of Business
Department of Accounting and Finance
Information Systems for Management Final Exam
December 14, 2002 1:30 p.m. – 3:30 p.m.
The Internet’s ability to increase information asymmetry.
The Internet’s ability to increase a company’s profit.
The Internet’s ability to provide electronic portals to company information
from disparate locations.
Low-cost connectivity and universal standards provided by Internet
technology.
The ability to use banner ads for advertisement purposes.
An online bookstore, such as Chapters.ca has the following advantages over a
“bricks and mortar” bookstore:
(a)
(b)
(c)
(d)
(e)
larger selection.
more reference information, such as book reviews and recommendations.
lower overhead costs.
better searching facilities.
all of the above.
10. When one party in a transaction has more information that is important for the
transaction than the other party, this is called:
(a)
(b)
(c)
(d)
(e)
transaction richness.
transaction costs.
agency costs.
insider trading.
information asymmetry.
9.200
Paper Number 417
UNIVERSITY OF MANITOBA
I. H. Asper School of Business
Department of Accounting and Finance
Information Systems for Management Final Exam
December 14, 2002 1:30 p.m. – 3:30 p.m.
Dr. M. Hine
Page 4 of 14
11. A company that uses bulk e-mail distribution to market and sell its product, is
focusing on information:
(a)
(b)
(c)
(d)
(e)
asymmetry.
richness.
reach.
relevance.
responsiveness.
12. A Web site or other service using Web browsers and search technology that
provides an initial point of entry to the Web or to internal company data best
describes a:
(a)
(b)
(c)
(d)
(e)
search engine.
gateway.
search directory.
portal.
Web site.
13. The use of handheld wireless devices for purchasing goods and services is called:
(a)
(b)
(c)
(d)
(e)
mobile commerce.
micro commerce.
virtual commerce.
DoCoMo commerce.
browser-based commerce.
14. Which of the following is an example of disintermediation caused by the Internet?
(a)
(b)
(c)
(d)
(e)
Customers purchasing from stores outside their country.
Businesses establishing tight links with their trading partners.
Customers bypassing retailers and purchasing products directly form
manufacturers.
Customers purchasing products through mobile devices, such as, cell phones
and hand-held digital appliances.
Customers initiating auctions, where suppliers bid to offer the lowest price.
15. When compared to the United States, the percentage of Canadian e-commerce
use per capita or per business is:
(a)
(b)
(c)
(d)
(e)
significantly higher.
somewhat higher.
about the same.
lower.
can not be compared.
9.200
Paper Number 417
UNIVERSITY OF MANITOBA
I. H. Asper School of Business
Department of Accounting and Finance
Information Systems for Management Final Exam
December 14, 2002 1:30 p.m. – 3:30 p.m.
Dr. M. Hine
Page 5 of 14
16. The linking of separate networks, each of which retains its own identity, into an
interconnected network best describes:
(a)
(b)
(c)
(d)
(e)
enterprise networking.
internetworking.
client/server computing.
peer-to-peer networking.
telnet.
17. A standard currently under development that will allow high-speed communication
among wireless phones, pagers, computers and other handheld devices within any
ten metre area so that these devices can operate with each other is called:
(a)
(b)
(c)
(d)
(e)
Bluetooth.
TCP/IP.
Chicago.
Connect-1.
Tracker.
18. The Internet is based upon:
(a)
(b)
(c)
(d)
(e)
a star topology.
client/server technology.
decentralized technology.
a ring topology.
centralized technology.
19. Which of the following maps numerical Internet machine addresses to alphabetic
names?
(a)
(b)
(c)
(d)
(e)
Simple Mail Transfer Protocol.
Domain Name Server.
File Transfer Protocol.
Firewall filters.
Network News Transfer Protocol.
20. Given the e-mail address of [email protected], the top level domain is:
(a)
(b)
(c)
(d)
(e)
gord.
gordsmith.
mcmaster.
edu.
ca.
9.200
Paper Number 417
UNIVERSITY OF MANITOBA
I. H. Asper School of Business
Department of Accounting and Finance
Information Systems for Management Final Exam
December 14, 2002 1:30 p.m. – 3:30 p.m.
Dr. M. Hine
Page 6 of 14
21. A method of obtaining relevant information on the Internet by having a computer
broadcast information directly to the user based on prespecified interests best
describes:
(a)
(b)
(c)
(d)
(e)
pull technology.
Telnet.
channeling.
push technology.
streamlining.
22. Which of the following best describes tracking users’ movements on a Web site
and comparing the information gleaned about a user’s behaviour against data
about other customers with similar interests to predict what the user would like to
see next?
(a)
(b)
(c)
(d)
(e)
Clickstream tracking.
Web page monitoring.
Web site performance monitoring tools.
collaborative filtering.
WAP.
23. The information systems plan:
(a)
(b)
(c)
(d)
(e)
contains a statement of corporate goals and specified how information
technology supports the attainment of those goals.
shows how general goals will be achieved by specific systems projects.
lays out specific target dates and milestones that can be used later to judge
the progress of the plan in terms of how many objectives were actually
attained in the time frame specified in the plan.
indicates the key management decisions concerning hardware acquisition;
telecommunications; centralization/decentralization of authority, data and
hardware; and required organizational change.
does all of the above.
24. The primary weakness of the CSF approach is that:
(a)
(b)
(c)
(d)
(e)
they rarely reflect true success factors.
market conditions are not considered.
competitive considerations are not included.
the aggregation process and the analysis of data are art forms.
it is applicable to only certain industries.
25. The lowest degree of project risk is when:
(a)
(b)
(c)
(d)
(e)
structure is high, technology level is high and size is small.
structure is high, technology level is low and size is small.
structure is high, technology level is high and size is large.
structure is low, technology level is high and size is large.
structure is low, technology level is high and size is small.
9.200
Paper Number 417
UNIVERSITY OF MANITOBA
I. H. Asper School of Business
Department of Accounting and Finance
Information Systems for Management Final Exam
December 14, 2002 1:30 p.m. – 3:30 p.m.
Dr. M. Hine
Page 7 of 14
26. During the systems analysis process, determining whether the solution is
achievable, given the organization’s resources and constraints is achieved
through:
(a)
(b)
(c)
(d)
(e)
requirements analysis.
a feasibility study.
a conceptual analysis.
logical design.
testing.
27. Which of the following introduces the new system to a limited area of the
organization, such as a single department or operating unit?
(a)
(b)
(c)
(d)
(e)
Pilot study conversion strategy.
Phased approach conversion strategy.
Direct cutover conversion strategy.
Parallel conversion strategy.
Walkthrough strategy.
28. Alternative systems-building approaches include:
(a)
(b)
(c)
(d)
(e)
prototyping.
application software packages.
outsourcing.
end-user development.
all of the above.
29. Which of the following is least descriptive of prototyping development?
(a)
(b)
(c)
(d)
(e)
Small scale
Interactive
Iterative
Clearly defined specifications.
End-user focused.
30. Bringing end users and information systems specialists together for a session to
discuss the interactive design of the system best describes:
(a)
(b)
(c)
(d)
(e)
JAD.
outsourcing.
active development.
structured analysis.
structured design.
9.200
Paper Number 417
UNIVERSITY OF MANITOBA
I. H. Asper School of Business
Department of Accounting and Finance
Information Systems for Management Final Exam
December 14, 2002 1:30 p.m. – 3:30 p.m.
Dr. M. Hine
Page 8 of 14
31. The type of DSS that is primarily a stand-alone system and uses some type of
model to perform “what-if” and other kinds of analyses describes a(n):
(a)
(b)
(c)
(d)
(e)
model-driven DSS.
expert system.
data-driven DSS.
executive support system.
group decision support system.
32. The most visible benefit of ESS is their ability to:
(a)
(b)
(c)
(d)
(e)
speed up decision making.
be easily cost-justified.
analyze, compare and highlight trends.
save time.
structure decision making tasks.
33. Each of the following are true statements except:
(a)
(b)
(c)
(d)
(e)
MIS primarily provide information on the firm’s performance to help managers
in monitoring and controlling the business.
MIS typically produced fixed, regularly scheduled reports based on data
extracted and summarized from the organization’s underlying TPS.
The format for reports generated by an MIS are generally specified in
advance.
A DSS emphasizes change, flexibility and a rapid response.
With a DSS, more effort is needed to link users to structured information
flows.
34. A type of knowledge management system that helps disseminate and coordinate
the flow of information in an organization best describes a(n):
(a)
(b)
(c)
(d)
(e)
decision support system.
knowledge work system.
group collaboration and support system.
office system.
artificial intelligence system.
35. A GDSS software tool that allows individuals simultaneously and anonymously to
contribute ideas, best describes:
(a)
(b)
(c)
(d)
(e)
electronic questionnaires.
electronic brainstorming tools.
idea organizers.
stakeholder identification and analysis tools.
group dictionaries.
9.200
Paper Number 417
UNIVERSITY OF MANITOBA
I. H. Asper School of Business
Department of Accounting and Finance
Information Systems for Management Final Exam
December 14, 2002 1:30 p.m. – 3:30 p.m.
Dr. M. Hine
Page 9 of 14
36. Types of GDSS software tools include each of the following except:
(a)
(b)
(c)
(d)
(e)
policy formation tools.
group dictionaries.
stakeholder identification and analysis tools.
tools for voting or setting priorities.
intelligent agents.
37. A model for analyzing firm performance which supplements traditional financial
measures with measurements from additional business perspectives, such as
customers, internal business processes, learning and growth best defines:
(a)
(b)
(c)
(d)
(e)
internal integration tools.
external integration tools.
structure chart.
balanced scorecard.
PERT.
38. Each of the following is especially useful for knowledge management except:
(a)
(b)
(c)
(d)
(e)
office systems.
transaction processing systems.
knowledge work systems.
group collaboration systems.
artificial intelligence applications.
39. The stored learning from an organization’s history that can be used for decision
making and other purposes best describes:
(a)
(b)
(c)
(d)
(e)
rules base.
knowledge base.
tacit knowledge.
organizational memory.
organizational learning.
40. Which of the following best describes a strategy for searching the rule base in an
expert system that acts like a problem solver by beginning with a hypothesis and
seeking out more information until the hypothesis is either proved or disproved?
(a)
(b)
(c)
(d)
(e)
Forward chaining
Decision chaining
Backward chaining
Hypothesis chaining
Results chaining
9.200
Paper Number 417
UNIVERSITY OF MANITOBA
I. H. Asper School of Business
Department of Accounting and Finance
Information Systems for Management Final Exam
December 14, 2002 1:30 p.m. – 3:30 p.m.
Dr. M. Hine
Page 10 of 14
41. Rule-based AI that tolerates imprecision by using nonspecific terms called
membership functions to solve problems describes:
(a)
(b)
(c)
(d)
(e)
forward chaining.
knowledge base.
inference engine.
fuzzy logic.
robotics.
42. Problem-solving methods that promote the evolution of solutions to specific
problems using the model of living organisms adapting to their environment
defines:
(a)
(b)
(c)
(d)
(e)
neural network.
genetic algorithms.
polymorphism.
expert systems.
artificial intelligence.
43. The cost of repairing an error is least expensive during the:
(a)
(b)
(c)
(d)
(e)
analysis and design phase.
programming phase.
conversion phase.
testing phase.
post-implementation phase.
44. Which of the following defines all of the methods, policies, and procedures that
ensure protection of the organization’s assets, accuracy and reliability of its
records, and operational adherence to management standards?
(a)
(b)
(c)
(d)
(e)
Security
Mission
Controls
System audit
Software metrics
45. A firm, such as a financial institution, that must have 100 percent availability of
their critical systems, would likely use:
(a)
(b)
(c)
(d)
(e)
fault-tolerant computer systems.
high-availability computing.
clustering.
batch processing.
error detection systems.
9.200
Paper Number 417
UNIVERSITY OF MANITOBA
I. H. Asper School of Business
Department of Accounting and Finance
Information Systems for Management Final Exam
December 14, 2002 1:30 p.m. – 3:30 p.m.
Dr. M. Hine
Page 11 of 14
46. In public key encryption, if the sender wants to ensure that the intended recipient
is the only person that can read the message, the message would be encoded
with:
(a)
(b)
(c)
(d)
(e)
the sender’s public key.
the sender’s private key.
the recipient’s public key.
the recipients private key.
both the sender’s and recipient’s public keys.
47. An attachment to an electronic message that verifies the identity of the sender and
provides the receiver with the means to encode a reply defines:
(a)
(b)
(c)
(d)
(e)
parity check.
echo check.
authentication byte.
digital signature.
digital certificate.
48. In a dataflow diagram, processes tend to be represented by:
(a)
(b)
(c)
(d)
(e)
rounded boxes.
square boxes.
open rectangles.
diamonds.
arrows.
49. The main principle of structured design is that a system should be designed:
(a)
(b)
(c)
(d)
(e)
from the top down.
from the bottom up.
in a network fashion.
from the middle out.
from the outside in.
9.200
Paper Number 417
UNIVERSITY OF MANITOBA
I. H. Asper School of Business
Department of Accounting and Finance
Information Systems for Management Final Exam
December 14, 2002 1:30 p.m. – 3:30 p.m.
Dr. M. Hine
Page 12 of 14
SHORT ANSWER:
1.
List and explain the four major components of the Greek Temple Diagram of
Information Systems in Healthcare. (8 marks: 1 mark for each component; 1
mark for each explanation.)
2.
Define datamining. Identify and describe three types of information patterns and
relationships that can be discovered from datamining. (7 marks: 2 marks for
definition; 1 mark for naming and 1 mark for each description of pattern and
relationship.)
9.200
Paper Number 417
UNIVERSITY OF MANITOBA
I. H. Asper School of Business
Department of Accounting and Finance
Information Systems for Management Final Exam
December 14, 2002 1:30 p.m. – 3:30 p.m.
Dr. M. Hine
Page 13 of 14
3.
List and explain (in proper order) the six activities or phases associated with the
systems development process. (7 marks: 1 mark for each activity; 1 mark for
proper order.)
4.
Based on the discussion IN CLASS, list in order and explain the purpose of the
five layers of the TCP/IP model. (11 marks: 1 mark for each layer; 1 mark for
each description; 1 mark for proper order.)
9.200
Paper Number 417
UNIVERSITY OF MANITOBA
I. H. Asper School of Business
Department of Accounting and Finance
Information Systems for Management Final Exam
December 14, 2002 1:30 p.m. – 3:30 p.m.
Dr. M. Hine
Page 14 of 14
5.
Define and discuss the following three terms:
“knowledge-based core
compentencies”, “organizational learning”, and “knowledge management”. How do
these three concepts relate to each other? Please limit your discussion of
organizational learning to the text book definition (i.e., do not go into the process
diagram that was presented in class). (8 marks)
6.
List and explain 5 Internet Business models. (10 marks)