You are on page 1of 9

PART A (40 MARKS)

1. _______________is a key used in second table as look-up field to identify records from
original table.
A. Secondary key
B. Primary key
C. Foreign key
D. Super key

2. Internet of Things (IoT) and Big Data are two related technological concepts. What does
Big Data refer to?
A. Combination of multiple devices to produce data to be transferred through the
Internet.
B. The growing collection of data stored in a decentralised ledger for the purpose of
recording transactions.
C. The amount of data that cannot be processed by humans.
D. The massive sets of data gathered from various sources need to be analysed using
computing technology to reveal patterns and trends.

3. All of the following are technologies used to analyse and manage big data EXCEPT:
A. cloud computing
B. in-memory computing
C. analytic platforms
D. Hadoop

4. Which of the following functions would be responsible for procedures and policies for
managing internal data resources in a large organization?
A. Database administration
B. Information policy administration
C. Data administration
D. Data auditing

5. Which of the following is NOT a virus?


A. Worm
B. Trojan horse
C. Keylogger
D. Spam mail

6. Computer forensic is _______.


A. a scientific collection and analysis of data from computer storage media and used
as evidence in a court of law.
B. evidence of white-collar crimes in digital form.
C. the protection of computer systems and information from harm, theft, and
unauthorized use.
D. a written document in an organization outlining how to protect the organisation from
Threats.

7. Intentional disruption, defacement, and destruction of a website or corporate


information system is one type of computer crime today. This crime is called _______.
A. system intrusion.
B. system damage.
C. cyber vandalism.
D. cyber forgery.

8. Which of the following statements is TRUE about the Intrusion Detection System?
A. A combination of hardware and software that prevents unauthorized users from
accessing private networks.
B. Monitors hot spots on corporate networks to detect and deter intruders.
C. Checks computers for the presence of malware and can often eliminate it as well.
D. Automates the process of keeping track of all users and privileges.

9. Which of the following is NOT a characteristic of packet switching?


A. Packets travel independently of each other.
B. Packets are routed through many different paths.
C. Packet switching requires point-to-point circuits.
D. Packets are reassembled into the original message when they reach their destinations.

10. _________ is NOT the major component of a computer network.


A. Network operating system
B. Cookie
C. Hub
D. Router

11. ______ would be the most appropriate network for a business that comprises three
employees and a manager working in the same office space, whose primary need is to
share documents.
A. MAN
B. CAN
C. LAN
D. WAN

12. Client/server computing is a __________.


A. network that connects sensors to desktop computers.
B. network where centralized mainframe computers serve local devices.
C. centralized model of computing for large corporations.
D. distributed computing model where clients are linked to one another through a
network that is controlled by a network server computer.
13. The Customer Relationship Management System (CRMS) includes customer service
modules that provide tools, particularly for ______________.
A. organizing effective marketing campaigns.
B. assigning and managing customer service requests.
C. gathering data of sales prospects and customers.
D. keeping track of sales prospects and contact information.

14. The _____________ is a type of supply chain model that is driven by actual customer
orders or purchases.
A. bullwhip effect
B. replenishment-driven
C. build-to-stock
D. pull-based model

15. Enterprise software is implemented by a company to achieve all the following EXCEPT:
A. standardizing business processes across all business functional areas.
B. improving its bargaining power with suppliers.
C. reducing the number of employees.
D. reacting faster to market changes.

16. A company's suppliers, supplier's suppliers, and the processes for managing
relationships with them, is known as _______.
A. supplier's internal supply chain.
B. external supply chain.
C. upstream supply chain.
D. downstream supply chain.

17. Which of the following statements best described the term “disintermediation”?
A. Reduction or removal of intermediaries between producers and consumers.
B. Creating an agreement to settle disputes or conflicts between two parties.
C. Companies that act as brokers and consultants in a specific area.
D. Disintegration over time due to the breakdown of support systems.

18. Business to business (B2B) e-commerce involves _____.


A. retailing products and services to individual shoppers.
B. selling products among consumers.
C. sales of goods and services among businesses.
D. delivery of items to individual consumers.

19. Compared to digital goods, traditional goods have ______.


A. lower inventory costs.
B. lower marginal costs per unit.
C. more variable pricing.
D. higher costs of distribution.
20. Amazon.com is primarily known for its use of which of the following business models?
A. Content provider
B. Portal
C. Market creator
D. Transaction broker
PART B (40 MARKS)

QUESTION 1
a) List FOUR (4) problems of traditional file processing systems. (4 marks)
- Data redundancy
- Data Inconsistency
- Lack of Flexibility
- Poor Security

b) What is the name of the process used to protect transmitted data in a VPN? Briefly
describe the process.
(6 marks)
- Encryption is the process of converting plain, readable data into a scrambled format
using mathematical algorithms, known as ciphertext. This process ensures that
transmitted data remains unreadable and secure even if intercepted by unauthorized
individuals. The original data is transformed into ciphertext before being decrypted using
the appropriate decryption key. The decrypted data is then delivered to the intended
recipient in its original, readable form. Encryption is crucial in VPNs as it guarantees the
confidentiality and integrity of transmitted data. VPNs provide a secure tunnel for data
travel, protecting sensitive information from eavesdropping and unauthorized access.

QUESTION 2
a) Alice wants to send a message to Bob. She uses a key, namely key A known to her and Bob
to encrypt the message. Bob decrypts the message using his secret key, namely key B.
i. Identify the name of the above method.(1 mark)
- Symmetric encryption

ii. Name the above key A and key B respectively.(2 marks)


- Key A = Encryption
- Key B = Decryption

iii. Illustrate a diagram to show the process. Your illustration must include labeling and a brief
explanation.(3 marks)
b) It is critical to have a framework that supports the security of a company's information
systems. This includes defining appropriate security rules for the company, understanding
threats to the company’s information systems, and implementing information system controls.
i.What are the TWO (2) information system controls mentioned in the above statement?
(2 marks)
- General Control
- Application Control

ii. Differentiate between the TWO (2) answers provided in 2.b) i. (4 marks)
- General Control = Govern design, security, and use of computer programs and security
of data files in general throughout organization’s information technology infrastructure.
Apply to all computerized applications.
- Application Control = Specific controls unique to each computerized application, such as
payroll or order processing. Include both automated and manual procedures. Ensure
that only authorized data are completely and accurately processed by that application.

QUESTION 3
a) Enterprise systems can provide firmwide information to help managers make better decisions
and support some of the major business processes such as finance, sales and marketing,
production, and human resources. Discuss TWO (2) examples of human resource-related
business processes that are supported by enterprise systems. (4 marks)
- Enterprise systems streamline payroll processes by integrating data from various
sources, automating calculations, generating electronic payslips, and facilitating direct
deposit. They enable seamless integration with finance and accounting modules,
enabling easy tracking of expenses and financial analysis. Performance management is
crucial, enabling HR managers to define goals, establish key indicators, and conduct
regular evaluations and feedback sessions.

b) CRM tools allow a company to link customer conversations and relationships from social
networking sites to CRM processes. This current feature of technology has been offered by
leading CRM vendors. Discuss TWO (2) benefits of social CRM for businesses, using an
example of any social network platform. (4 marks)
- Social CRM integrates social networking sites with CRM processes, offering businesses
two key advantages: enhanced customer engagement and relationship building. By
linking customer conversations and relationships to CRM processes, businesses can
gain valuable insights into customer preferences, behaviors, and opinions. This data can
be used to personalize interactions and improve customer engagement. Additionally,
social CRM allows businesses to provide timely and targeted customer support,
capturing and organizing customer inquiries through platforms like Facebook and Twitter.
This proactive approach improves customer satisfaction and maintains a positive brand
image. Overall, social CRM is a valuable tool for businesses to enhance customer
engagement, increase satisfaction, and drive business growth.
QUESTION 4
a) Define e-commerce marketing.(1 mark)
- Use of the Internet and Web to transact business. E-commerce marketing strategies
promote products, attract customers, drive sales through digital channels, using SEO,
social media, email, content, and paid advertising.

b) Explain how e-commerce marketing has transformed the way most companies do business
today. Your answer must include a suitable example.(4 marks)
- E-commerce marketing has transformed businesses by expanding market reach,
enabling personalized experiences, improving targeting and analytics, and enhancing
customer convenience. Companies like Amazon have become global giants, leveraging
data to create personalized marketing campaigns and recommendations. E-commerce
platforms offer comprehensive analytics capabilities, allowing businesses to measure the
impact of their efforts and optimize campaigns. This has allowed companies to adapt to
the digital age, stay competitive, and drive growth in today's evolving business
landscape.

c) “Lazada's constantly evolving technology, logistics, and payments infrastructure connects this
vast and diverse region; and offers Southeast Asia a shopping experience that is safe,
seamless, and enjoyable.” Source: Lazada website
i. What type of e-commerce revenue model does Lazada use?(1 mark)
- e-commerce revenue model

ii. With an appropriate example, explain the revenue model stated above.(4 marks)
- The online marketplace revenue model connects buyers and sellers, facilitating
transactions and charging fees or commissions on each transaction. Etsy, an
e-commerce platform specializing in handmade, vintage, and unique products, serves as
an intermediary between sellers and buyers. Etsy provides infrastructure, technology,
and customer reach, while Etsy processes payments and handles shipping logistics. The
model benefits both sellers and buyers, offering a wide selection of unique products, a
trusted payment system, and customer support. Etsy's success demonstrates the
effectiveness of this model, fostering a community of independent sellers and attracting
a loyal customer base.
PART C (20 MARKS)

QUESTION 1
The term "big data" refers to data that cannot be stored or processed in traditional database
management systems. Big data refers to databases containing millions to tens of millions of
records, and often exabytes of data. Companies need to acquire, store, analyse, and generate
big data information in near real-time because it can discover trends in business activities and
processes that executives and managers can use. Based on the above context, differentiate
between Database Management Systems (DBMS) and non-relational databases. Provide ONE
(1) example of an information system for each type of database.(10 marks)

- Database Management Systems (DBMS) and non-relational databases (NoSQL


databases) are two distinct approaches to data storage and management. DBMS are traditional,
relational databases that use structured query language (SQL) for data organization and
retrieval. They are based on the relational model, which organizes data into tables with
predefined schemas and relationships. DBMS have several characteristics, including structure,
schema enforcement, ACID compliance, and scalability.

Oracle Database is a widely used DBMS that follows the relational model, providing a robust
and secure platform for managing structured data. It supports complex queries, transactions,
and data integrity constraints, making it suitable for enterprise applications with high data
volumes and stringent reliability requirements.

Non-relational databases, also known as NoSQL databases, provide a flexible and scalable
approach to handling large volumes of unstructured or semi-structured data. They do not
adhere to the rigid structure of the relational model and use various data models, such as
key-value, document, columnar, or graph. NoSQL databases allow dynamic schema changes,
horizontal scalability, high performance, and no ACID guarantees.

MongoDB is a popular document-oriented NoSQL database that stores data in flexible


JSON-like documents, allowing the representation of complex data structures. Its flexible
schema and horizontal scalability make it well-suited for use cases such as content
management systems, real-time analytics, and caching layers.

In summary, DBMS follows a structured, relational model with predefined schemas, enforcing
strict data integrity rules, while NoSQL databases offer flexibility, scalability, and high
performance for handling large volumes of unstructured or semi-structured data.
QUESTION 2
We live in an era where smartphones and other mobile devices are used pervasively.
Smartphones have become a necessity. People are using their devices to purchase, transact
and conduct their daily affairs. Mobile commerce (m-commerce) is the new hype in many
applications orchestrating their businesses. Discuss and give an example of how m-commerce
application works in the following areas.
a) Banking
b) Mobile Marketing
c) Mobile Ticketing
d) Reservations
e) Entertainment
(10 marks)

- Mobile commerce applications have revolutionized various sectors, including banking,


marketing, ticketing, reservations, and entertainment. These applications provide users with
convenience, accessibility, and personalized experiences, enabling them to perform
transactions, access services, and enjoy digital content seamlessly through their mobile
devices.

Banking apps enable users to securely access account balances, transfer funds, pay bills, apply
for loans, and deposit checks on the go. Mobile marketing applications have transformed the
way businesses engage with customers through marketing efforts, delivering targeted and
personalized advertisements, promotions, and offers directly to users' mobile devices.

Mobile ticketing applications have revolutionized the ticketing industry by allowing users to
purchase and store tickets on their mobile devices. These applications generate scannable QR
codes or barcodes for easy entry, such as the Ticketmaster app. Reservations applications
simplify the reservation process for various services, such as restaurants, hotels, flights, and car
rentals. These applications often provide real-time updates and notifications, making it easier for
users to secure dining experiences.

Entertainment applications play a significant role in the entertainment industry, offering users
access to a wide range of digital content and services. Users can stream movies, TV shows,
music, podcasts, and purchase digital content like e-books and games. Subscription-based
models are common in this area, where users pay a recurring fee for access to a library of
content.

In summary, mobile commerce applications have transformed various sectors, providing users
with convenience, accessibility, and personalized experiences, enabling them to perform
transactions, access services, and enjoy digital content seamlessly through their mobile
devices.

You might also like