Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
9.200 Paper Number 417 UNIVERSITY OF MANITOBA I. H. Asper School of Business Department of Accounting and Finance Information Systems for Management Final Exam December 14, 2002 1:30 p.m. – 3:30 p.m. Dr. M. Hine Page 1 of 14 Name: ID Number: Section: INSTRUCTIONS: 1. Do not open this examination until instructed to do so. 2. You have 120 minutes to complete this examination. 3. Indicate your name, University of Manitoba identification number and section in the space above. 4. You are allowed pens, pencils and erasers. No other materials are permitted. 5. Write your answers to question 1 on the bubble sheets provided using an HB pencil. Write all other answers in this examination booklet. 6. Hand in all pages of the examination. This space is reserved for the grader. Part Multiple Choice Short Answer 1 2 3 4 5 6 Total Grade /49 / /8 /7 /7 /11 /8 /10 /100 9.200 Paper Number 417 UNIVERSITY OF MANITOBA I. H. Asper School of Business Department of Accounting and Finance Information Systems for Management Final Exam December 14, 2002 1:30 p.m. – 3:30 p.m. Dr. M. Hine Page 2 of 14 MULTIPLE CHOICE: (1 mark each) 1. Each of the following is an essential component of a telecommunications system except: (a) (b) (c) (d) (e) 2. The principal functions of protocols in a telecommunication network include: (a) (b) (c) (d) (e) 3. (b) (c) (d) (e) fibre-optic cable is considerably faster, lighter and more durable than wire media. fibre-optic cable is easier to work with and less expensive than coaxial cable. fibre-optic cable is well suited to systems requiring transfers of large volumes of data. fibre-optic cable has data transfer rates from 500 kilobits to several billion bits per second. fibre-optic cables are used in most networks as the high speed backbone. The transmission medium that is a high-volume, long-distance, point-to-point transmission in which high-frequency radio signals are transmitted through the atmosphere from one terrestrial transmission station to another describes: (a) (b) (c) (d) (e) 5. verifying that a message requires retransmission because it cannot be correctly interpreted. identifying each device in the communication path. securing the attention of the receiving device. verifying correct receipt of the transmitted message. doing all of the above. Each of the following is a true statement about fibre-optic cable except: (a) 4. computers. end users. terminals. communication channels. communication processors. infrared. fibre optics. satellite. microwave. spread spectrum. A telecommunications computer that collects and temporarily stores messages from terminals for batch transmission to the host computer best defines: (a) (b) (c) (d) (e) front-end processor. controller. multiplexer. concentrator. bridge. 9.200 Paper Number 417 6. (b) (c) (d) (e) PBXs require special wiring. PBXs require an organization to have special expertise to manage them. The geographic scope of a PBX is not limited. PBXs can easily handle very large volumes of data. PBXs are limited to telephone lines. Which of the following is the driving force behind the explosion of electronic business and the emergence of the digital firm? (a) (b) (c) (d) (e) 9. if one of the computers in a star network fails, none of the other components in the network are affected. the star topology is useful for applications where some processing must be centralized and some can be performed locally. all communications on a star network must pass through a central computer. communication in a star network will come to a standstill if the host computer stops functioning. one problem with the star network is its vulnerability. Which of the following is a true statement? (a) (b) (c) (d) (e) 8. Dr. M. Hine Page 3 of 14 Each of the following is a true statement except: (a) 7. UNIVERSITY OF MANITOBA I. H. Asper School of Business Department of Accounting and Finance Information Systems for Management Final Exam December 14, 2002 1:30 p.m. – 3:30 p.m. The Internet’s ability to increase information asymmetry. The Internet’s ability to increase a company’s profit. The Internet’s ability to provide electronic portals to company information from disparate locations. Low-cost connectivity and universal standards provided by Internet technology. The ability to use banner ads for advertisement purposes. An online bookstore, such as Chapters.ca has the following advantages over a “bricks and mortar” bookstore: (a) (b) (c) (d) (e) larger selection. more reference information, such as book reviews and recommendations. lower overhead costs. better searching facilities. all of the above. 10. When one party in a transaction has more information that is important for the transaction than the other party, this is called: (a) (b) (c) (d) (e) transaction richness. transaction costs. agency costs. insider trading. information asymmetry. 9.200 Paper Number 417 UNIVERSITY OF MANITOBA I. H. Asper School of Business Department of Accounting and Finance Information Systems for Management Final Exam December 14, 2002 1:30 p.m. – 3:30 p.m. Dr. M. Hine Page 4 of 14 11. A company that uses bulk e-mail distribution to market and sell its product, is focusing on information: (a) (b) (c) (d) (e) asymmetry. richness. reach. relevance. responsiveness. 12. A Web site or other service using Web browsers and search technology that provides an initial point of entry to the Web or to internal company data best describes a: (a) (b) (c) (d) (e) search engine. gateway. search directory. portal. Web site. 13. The use of handheld wireless devices for purchasing goods and services is called: (a) (b) (c) (d) (e) mobile commerce. micro commerce. virtual commerce. DoCoMo commerce. browser-based commerce. 14. Which of the following is an example of disintermediation caused by the Internet? (a) (b) (c) (d) (e) Customers purchasing from stores outside their country. Businesses establishing tight links with their trading partners. Customers bypassing retailers and purchasing products directly form manufacturers. Customers purchasing products through mobile devices, such as, cell phones and hand-held digital appliances. Customers initiating auctions, where suppliers bid to offer the lowest price. 15. When compared to the United States, the percentage of Canadian e-commerce use per capita or per business is: (a) (b) (c) (d) (e) significantly higher. somewhat higher. about the same. lower. can not be compared. 9.200 Paper Number 417 UNIVERSITY OF MANITOBA I. H. Asper School of Business Department of Accounting and Finance Information Systems for Management Final Exam December 14, 2002 1:30 p.m. – 3:30 p.m. Dr. M. Hine Page 5 of 14 16. The linking of separate networks, each of which retains its own identity, into an interconnected network best describes: (a) (b) (c) (d) (e) enterprise networking. internetworking. client/server computing. peer-to-peer networking. telnet. 17. A standard currently under development that will allow high-speed communication among wireless phones, pagers, computers and other handheld devices within any ten metre area so that these devices can operate with each other is called: (a) (b) (c) (d) (e) Bluetooth. TCP/IP. Chicago. Connect-1. Tracker. 18. The Internet is based upon: (a) (b) (c) (d) (e) a star topology. client/server technology. decentralized technology. a ring topology. centralized technology. 19. Which of the following maps numerical Internet machine addresses to alphabetic names? (a) (b) (c) (d) (e) Simple Mail Transfer Protocol. Domain Name Server. File Transfer Protocol. Firewall filters. Network News Transfer Protocol. 20. Given the e-mail address of [email protected], the top level domain is: (a) (b) (c) (d) (e) gord. gordsmith. mcmaster. edu. ca. 9.200 Paper Number 417 UNIVERSITY OF MANITOBA I. H. Asper School of Business Department of Accounting and Finance Information Systems for Management Final Exam December 14, 2002 1:30 p.m. – 3:30 p.m. Dr. M. Hine Page 6 of 14 21. A method of obtaining relevant information on the Internet by having a computer broadcast information directly to the user based on prespecified interests best describes: (a) (b) (c) (d) (e) pull technology. Telnet. channeling. push technology. streamlining. 22. Which of the following best describes tracking users’ movements on a Web site and comparing the information gleaned about a user’s behaviour against data about other customers with similar interests to predict what the user would like to see next? (a) (b) (c) (d) (e) Clickstream tracking. Web page monitoring. Web site performance monitoring tools. collaborative filtering. WAP. 23. The information systems plan: (a) (b) (c) (d) (e) contains a statement of corporate goals and specified how information technology supports the attainment of those goals. shows how general goals will be achieved by specific systems projects. lays out specific target dates and milestones that can be used later to judge the progress of the plan in terms of how many objectives were actually attained in the time frame specified in the plan. indicates the key management decisions concerning hardware acquisition; telecommunications; centralization/decentralization of authority, data and hardware; and required organizational change. does all of the above. 24. The primary weakness of the CSF approach is that: (a) (b) (c) (d) (e) they rarely reflect true success factors. market conditions are not considered. competitive considerations are not included. the aggregation process and the analysis of data are art forms. it is applicable to only certain industries. 25. The lowest degree of project risk is when: (a) (b) (c) (d) (e) structure is high, technology level is high and size is small. structure is high, technology level is low and size is small. structure is high, technology level is high and size is large. structure is low, technology level is high and size is large. structure is low, technology level is high and size is small. 9.200 Paper Number 417 UNIVERSITY OF MANITOBA I. H. Asper School of Business Department of Accounting and Finance Information Systems for Management Final Exam December 14, 2002 1:30 p.m. – 3:30 p.m. Dr. M. Hine Page 7 of 14 26. During the systems analysis process, determining whether the solution is achievable, given the organization’s resources and constraints is achieved through: (a) (b) (c) (d) (e) requirements analysis. a feasibility study. a conceptual analysis. logical design. testing. 27. Which of the following introduces the new system to a limited area of the organization, such as a single department or operating unit? (a) (b) (c) (d) (e) Pilot study conversion strategy. Phased approach conversion strategy. Direct cutover conversion strategy. Parallel conversion strategy. Walkthrough strategy. 28. Alternative systems-building approaches include: (a) (b) (c) (d) (e) prototyping. application software packages. outsourcing. end-user development. all of the above. 29. Which of the following is least descriptive of prototyping development? (a) (b) (c) (d) (e) Small scale Interactive Iterative Clearly defined specifications. End-user focused. 30. Bringing end users and information systems specialists together for a session to discuss the interactive design of the system best describes: (a) (b) (c) (d) (e) JAD. outsourcing. active development. structured analysis. structured design. 9.200 Paper Number 417 UNIVERSITY OF MANITOBA I. H. Asper School of Business Department of Accounting and Finance Information Systems for Management Final Exam December 14, 2002 1:30 p.m. – 3:30 p.m. Dr. M. Hine Page 8 of 14 31. The type of DSS that is primarily a stand-alone system and uses some type of model to perform “what-if” and other kinds of analyses describes a(n): (a) (b) (c) (d) (e) model-driven DSS. expert system. data-driven DSS. executive support system. group decision support system. 32. The most visible benefit of ESS is their ability to: (a) (b) (c) (d) (e) speed up decision making. be easily cost-justified. analyze, compare and highlight trends. save time. structure decision making tasks. 33. Each of the following are true statements except: (a) (b) (c) (d) (e) MIS primarily provide information on the firm’s performance to help managers in monitoring and controlling the business. MIS typically produced fixed, regularly scheduled reports based on data extracted and summarized from the organization’s underlying TPS. The format for reports generated by an MIS are generally specified in advance. A DSS emphasizes change, flexibility and a rapid response. With a DSS, more effort is needed to link users to structured information flows. 34. A type of knowledge management system that helps disseminate and coordinate the flow of information in an organization best describes a(n): (a) (b) (c) (d) (e) decision support system. knowledge work system. group collaboration and support system. office system. artificial intelligence system. 35. A GDSS software tool that allows individuals simultaneously and anonymously to contribute ideas, best describes: (a) (b) (c) (d) (e) electronic questionnaires. electronic brainstorming tools. idea organizers. stakeholder identification and analysis tools. group dictionaries. 9.200 Paper Number 417 UNIVERSITY OF MANITOBA I. H. Asper School of Business Department of Accounting and Finance Information Systems for Management Final Exam December 14, 2002 1:30 p.m. – 3:30 p.m. Dr. M. Hine Page 9 of 14 36. Types of GDSS software tools include each of the following except: (a) (b) (c) (d) (e) policy formation tools. group dictionaries. stakeholder identification and analysis tools. tools for voting or setting priorities. intelligent agents. 37. A model for analyzing firm performance which supplements traditional financial measures with measurements from additional business perspectives, such as customers, internal business processes, learning and growth best defines: (a) (b) (c) (d) (e) internal integration tools. external integration tools. structure chart. balanced scorecard. PERT. 38. Each of the following is especially useful for knowledge management except: (a) (b) (c) (d) (e) office systems. transaction processing systems. knowledge work systems. group collaboration systems. artificial intelligence applications. 39. The stored learning from an organization’s history that can be used for decision making and other purposes best describes: (a) (b) (c) (d) (e) rules base. knowledge base. tacit knowledge. organizational memory. organizational learning. 40. Which of the following best describes a strategy for searching the rule base in an expert system that acts like a problem solver by beginning with a hypothesis and seeking out more information until the hypothesis is either proved or disproved? (a) (b) (c) (d) (e) Forward chaining Decision chaining Backward chaining Hypothesis chaining Results chaining 9.200 Paper Number 417 UNIVERSITY OF MANITOBA I. H. Asper School of Business Department of Accounting and Finance Information Systems for Management Final Exam December 14, 2002 1:30 p.m. – 3:30 p.m. Dr. M. Hine Page 10 of 14 41. Rule-based AI that tolerates imprecision by using nonspecific terms called membership functions to solve problems describes: (a) (b) (c) (d) (e) forward chaining. knowledge base. inference engine. fuzzy logic. robotics. 42. Problem-solving methods that promote the evolution of solutions to specific problems using the model of living organisms adapting to their environment defines: (a) (b) (c) (d) (e) neural network. genetic algorithms. polymorphism. expert systems. artificial intelligence. 43. The cost of repairing an error is least expensive during the: (a) (b) (c) (d) (e) analysis and design phase. programming phase. conversion phase. testing phase. post-implementation phase. 44. Which of the following defines all of the methods, policies, and procedures that ensure protection of the organization’s assets, accuracy and reliability of its records, and operational adherence to management standards? (a) (b) (c) (d) (e) Security Mission Controls System audit Software metrics 45. A firm, such as a financial institution, that must have 100 percent availability of their critical systems, would likely use: (a) (b) (c) (d) (e) fault-tolerant computer systems. high-availability computing. clustering. batch processing. error detection systems. 9.200 Paper Number 417 UNIVERSITY OF MANITOBA I. H. Asper School of Business Department of Accounting and Finance Information Systems for Management Final Exam December 14, 2002 1:30 p.m. – 3:30 p.m. Dr. M. Hine Page 11 of 14 46. In public key encryption, if the sender wants to ensure that the intended recipient is the only person that can read the message, the message would be encoded with: (a) (b) (c) (d) (e) the sender’s public key. the sender’s private key. the recipient’s public key. the recipients private key. both the sender’s and recipient’s public keys. 47. An attachment to an electronic message that verifies the identity of the sender and provides the receiver with the means to encode a reply defines: (a) (b) (c) (d) (e) parity check. echo check. authentication byte. digital signature. digital certificate. 48. In a dataflow diagram, processes tend to be represented by: (a) (b) (c) (d) (e) rounded boxes. square boxes. open rectangles. diamonds. arrows. 49. The main principle of structured design is that a system should be designed: (a) (b) (c) (d) (e) from the top down. from the bottom up. in a network fashion. from the middle out. from the outside in. 9.200 Paper Number 417 UNIVERSITY OF MANITOBA I. H. Asper School of Business Department of Accounting and Finance Information Systems for Management Final Exam December 14, 2002 1:30 p.m. – 3:30 p.m. Dr. M. Hine Page 12 of 14 SHORT ANSWER: 1. List and explain the four major components of the Greek Temple Diagram of Information Systems in Healthcare. (8 marks: 1 mark for each component; 1 mark for each explanation.) 2. Define datamining. Identify and describe three types of information patterns and relationships that can be discovered from datamining. (7 marks: 2 marks for definition; 1 mark for naming and 1 mark for each description of pattern and relationship.) 9.200 Paper Number 417 UNIVERSITY OF MANITOBA I. H. Asper School of Business Department of Accounting and Finance Information Systems for Management Final Exam December 14, 2002 1:30 p.m. – 3:30 p.m. Dr. M. Hine Page 13 of 14 3. List and explain (in proper order) the six activities or phases associated with the systems development process. (7 marks: 1 mark for each activity; 1 mark for proper order.) 4. Based on the discussion IN CLASS, list in order and explain the purpose of the five layers of the TCP/IP model. (11 marks: 1 mark for each layer; 1 mark for each description; 1 mark for proper order.) 9.200 Paper Number 417 UNIVERSITY OF MANITOBA I. H. Asper School of Business Department of Accounting and Finance Information Systems for Management Final Exam December 14, 2002 1:30 p.m. – 3:30 p.m. Dr. M. Hine Page 14 of 14 5. Define and discuss the following three terms: “knowledge-based core compentencies”, “organizational learning”, and “knowledge management”. How do these three concepts relate to each other? Please limit your discussion of organizational learning to the text book definition (i.e., do not go into the process diagram that was presented in class). (8 marks) 6. List and explain 5 Internet Business models. (10 marks)