INFORMATION SYSTEMS STRATEGY, GOVERNANCE AND ETHICS DECEMBER 2022 PAST PAPER
TUESDAY: 6 December 2022. Morning Paper. Time Allowed: 2 hours. Answer ALL questions by indicating the letter (A, B, C or D) that represents the correct answer. This paper is made up of fifty (50) Multiple Choice Questions. Each question is allocated two (2) marks. 1. Which of the following statement defines e-business? A. The use of technology to work and empower business people B. The use of information technology to work and empower business processes C. The use of information technology to work and empower business processes, electronic commerce, and enterprise collaboration D. The use of technology to empower people 2. As a prospective manager, business professional, and knowledge worker, you will be challenged by many responsibilities generated by the use of information technology. Which of the following represents using business analytics, data mining, data visualization, and data tools to help organisations make better data-driven decisions? A. Collusion B. Incentives C. Business intelligence D. Human resource management 3. Which of the following would be considered as a combination of software and hardware resources? A. Microcomputer systems and midrange computer systems B. Keyboards and electronic mice C. Data media such as sheets of paper D. Firmware in a computing device 4. System software resources would include all of the following EXCEPT: A. Device drivers B. Operating system program C. Spreadsheets D. Utilities 5. Choose the choice with the FIVE basic resources of information systems? A. Hardware, software, networks, the internet, and knowledge bases B. Hardware, software, data, networks, and the internet C. Hardware, software, data, networks, and people D. Hardware, software, data, networks and security 6. The person who focuses on planning, policies, and procedures regarding the use of corporate data and information is known as: A. Chief Information Officer B. Systems analyst C. Database administrator D. System operator 7. Which of the following best describes internet of things (IoT)? A. Network of physical objects embedded with sensors B. Network of virtual objects C. Network of objects in the ring structure D. Network of sensors 8. Two or more participants may conspire to defraud another participant in a digital business transaction. This is known as________________________________. A. Technology diffusion B. Technology infusion C. Technology collusion D. Technology fusion 9. Which one of the following is NOT one of the FIVE basic competitive forces that shape the structure of competition in its industry? A. Bargaining power of customers B. Threat of new entrants C. Threat of substitutes D. Strategic dominance 10. Which of the following is one of the competitive strategies a company can use to counter competitive forces? A. Rivalry of competition B. Innovation C. Bargaining power of customers D. Bargaining power of suppliers 11. The value chain concept was developed by Michael Porter, where a firm is viewed as a series, or chain, or network of basic activities that add value to its products and services and thus add a margin of value to the firm. One of the primary activities in a firm’s “value chain” typically includes: A. Administrative services B. Technology development C. Human resource management D. Marketing and sales 12. One of the most important implementations of competitive strategies is business process reengineering (BPR). Which of the following statements BEST describes BPR: A. A customer’s perception of a customer-focused business that offers the best value B. A fundamental rethinking and radical redesign of business processes to achieve dramatic improvements in cost, quality, speed, and service C. Organisational operations and development D. A customer’s perception that uses the Internet 13. When a company can make a profit in markets with broad production ranges and short model lifetimes and can produce orders individually in an arbitrary lot size, can be described as a(n): A. Virtual company B. Differentiated company C. Agile company D. Cost leader 14. When a company makes investments in IT to improve its operations or promote innovation, what can it erect so that it would discourage or delay competitors from entering a market. A. Switching costs B. Differentiation C. Barriers to entry D. Price control 15. In business ethics, the theory that states companies have ethical responsibilities to all members of society is known as: A. Social contract theory B. Stakeholder theory C. Shareholder theory D. No free lunch theory 16. The benefits and burdens of the technology should be distributed fairly. Which of the following term best describes this principles? A. Informed consent B. Justice C. Minimised risk D. Proportionality 17. According to the definition by the Association of Information Technology Professionals, computer crime includes the following EXCEPT: A. Unauthorised release of information B. Unauthorised copying of software C. Using or conspiring to use computer or network resources to illegally obtain information or tangible property D. Keeping confidential data safely 18. Which of the following statements best describes companies that have been faced with cyber theft: A. Discover that a majority of the cases are inside jobs by current employees B. Discover that a majority of the cases are outside jobs by external hackers and thieves C. Readily report full details about the thefts to authorities to deter additional thefts from occurring D. Recognise that customers and shareholders want to know full details and readily report them 19. Sniffer software can be used by hackers to assault companies through the Internet. This is accomplished by: A. Faking an e-mail address or Web page to trick a company into passing along critical information B. Searching individual packets of data as they pass through the Internet, capturing passwords or the entire contents C. Dialing thousands of telephone numbers in search of a way in through a modem connection D. Talking to unsuspecting company employees to get valuable information such as passwords 20. Unauthorised use of computer systems at work often involves the Internet. Which of the following is NOT an example of such Internet abuses? A. Non-work-related download/upload B. Pornography C. General e-mail abuses D. Charting with a friend 21. Which of the following refers to a prominent attribute of management information procured through MIS of
INFORMATION SYSTEMS STRATEGY, GOVERNANCE AND ETHICS DECEMBER 2022 PAST PAPER Read Post »