My Notes

Study Timer
25:00
Today: 0 min
Total: 0 min
🏆

Achievement Unlocked!

Description

+50 XP

Practice Questions

Reading Timer
25:00
BBA 2533 — Management Information System Practice Questions
BBA 2533 · Syllabus Aligned

Management Information System
Detailed Question Bank

A comprehensive chapter-wise study guide with detailed answers aligned entirely to the rigorous BBA 2533 syllabus core requirements.

Course Code: BBA 2533 Programme: BBA Chapters: 14 Units
01

Managing the Digital Firm

BBA 2533 — Management Information System — Chapter 1

Section A — Very Short Answer

Section A — Very Short Answer — Very Short Answer

2 Marks Each
Q 1.1 2 Marks
What defines a 'Digital Firm' in modern business?
✦ Detailed Answer

Hint & Explanation: A digital firm is an organization where nearly all significant business relationships with customers, suppliers, and employees are digitally enabled and mediated, relying on continuous digital networks.

Q 1.2 2 Marks
Why do organizations need Information Systems?
✦ Detailed Answer

Hint & Explanation: Organizations use IS to manage daily operations, support managerial decision-making, coordinate activities globally, and secure a sustainable competitive advantage.

Q 1.3 2 Marks
What is the fundamental difference between the technical and behavioral approaches to Information Systems (IS)?
✦ Detailed Answer

Hint & Explanation: The technical approach focuses on mathematically based models, computer science, and operations research (hardware/software), whereas the behavioral approach focuses on organizational, psychological, and social impacts on the system (people/processes).

Q 1.4 2 Marks
List three new technologies currently transforming the role of Information Systems.
✦ Detailed Answer

Hint & Explanation: Technologies include Cloud Computing, Big Data analytics, the Internet of Things (IoT), and Artificial Intelligence/Machine Learning platforms.

Q 1.5 2 Marks
Explain the difference between data and information.
✦ Detailed Answer

Hint & Explanation: Data represents raw facts and raw streams of observations. Information is data that has been shaped into a meaningful and useful form for human beings.

Section B — Short Answer

Section B — Short Answer — Short Answer

7 Marks Each
Q 1.6 7 Marks
Explain the new role of Information Systems in contemporary organizations.
✦ Detailed Answer

Hint & Explanation: Information systems have shifted from being generic back-office support tools to becoming strategic assets. They enable entirely new business models, allow decision-makers to track corporate performance in real-time, facilitate mass customization, and are critical for navigating globalization and ensuring corporate survival against digital disruptors.

Q 1.7 7 Marks
Describe the 'Sociotechnical Systems' view of Information Systems.
✦ Detailed Answer

Hint & Explanation: The sociotechnical perspective argues that optimal organizational performance is achieved by mutually adjusting both the social and technical systems used in production. It implies that technology alone is not enough; the technology, the people, and the business processes must adapt to one another to avoid friction and implementation failure.

Q 1.8 7 Marks
Discuss the specific reasons why businesses invest heavily in Information Systems today.
✦ Detailed Answer

Hint & Explanation: Firms invest in IS to achieve six strategic business objectives: operational excellence, creation of new products and services, customer and supplier intimacy, improved decision-making, competitive advantage, and general survival in a technologically advancing market.

Q 1.9 7 Marks
What are the major management challenges managers face when adopting new IS technologies? How can they address them?
✦ Detailed Answer

Hint & Explanation: Chief challenges include the high cost of implementation, strong employee resistance to change, integration with legacy systems, and data security risks. These can be addressed through effective change management, phased rollouts, strong strategic alignment, and comprehensive employee training programs.

Section C — Long Answer

Section C — Long Answer — Long Answer

15 Marks Each
Q 1.10 15 Marks
Analyse the transformation of traditional businesses into 'Digital Firms'. In your answer, discuss the strategic objectives of information systems, the sociotechnical approach, and how new technologies influence this transformation.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Defining the digital firm and distinguishing it from traditional paper-based businesses.
(ii) The six strategic objectives (operational excellence, new products, customer intimacy, etc.).
(iii) The importance of the sociotechnical approach in balancing both the technical machinery (software/hardware) and the human/behavioral aspects (training/culture) to ensure successful digital transformation.
(iv) Real-world examples of how cloud computing, mobile tech, and big data structurally alter operations.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

Q 1.11 15 Marks
Evaluate the behavioral and technical approaches to studying Information Systems. Imagine you are leading a digital transformation project; structure your implementation strategy to incorporate both approaches, ensuring long-term organizational value.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Detailed explanation of the technical approach (management science, computer science) and what it provides (efficiency, modeling).
(ii) Detailed explanation of the behavioral approach (psychology, sociology) and what it provides (understanding resistance, workflows).
(iii) The strategy combining them (Sociotechnical design), detailing how addressing technology hardware without training personnel leads to failure, and highlighting strategies for managing the disruption caused by IS implementation.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

02

Information Systems in the Enterprise

BBA 2533 — Management Information System — Chapter 2

Section A — Very Short Answer

Section A — Very Short Answer — Very Short Answer

2 Marks Each
Q 2.1 2 Marks
What is a Transaction Processing System (TPS)?
✦ Detailed Answer

Hint & Explanation: A TPS is a computerized system that performs and records the daily routine transactions necessary to conduct business, serving the operational level (e.g., payroll, order entry).

Q 2.2 2 Marks
What does an Enterprise Resource Planning (ERP) system do?
✦ Detailed Answer

Hint & Explanation: An ERP system integrates data from key business processes across the entire organization into a single software system so that information can be shared seamlessly by multiple departments.

Q 2.3 2 Marks
What is the primary goal of a Customer Relationship Management (CRM) system?
✦ Detailed Answer

Hint & Explanation: To manage a firm's interactions with current and prospective customers to optimize revenue, improve customer satisfaction, and improve customer retention.

Q 2.4 2 Marks
Define Supply Chain Management (SCM) systems.
✦ Detailed Answer

Hint & Explanation: SCM systems help manage relationships with suppliers, coordinating the flow of materials, information, and financial capital from raw materials to final delivery.

Q 2.5 2 Marks
Which level of management primarily utilizes Management Information Systems (MIS)?
✦ Detailed Answer

Hint & Explanation: MIS primarily serves middle management by providing reports on the organization's current performance based on data extracted from the underlying TPS.

Section B — Short Answer

Section B — Short Answer — Short Answer

7 Marks Each
Q 2.6 7 Marks
Differentiate between a functional perspective of IS and an enterprise-wide perspective of IS.
✦ Detailed Answer

Hint & Explanation: The functional perspective views systems as isolated operational 'silos' specific to individual departments (Sales systems, HR systems, Finance systems). The enterprise perspective views processes conceptually cutting across departments, where an action in Sales immediately updates Inventory and Finance through integrated Enterprise Applications.

Q 2.7 7 Marks
Explain the role and characteristics of Decision Support Systems (DSS).
✦ Detailed Answer

Hint & Explanation: DSS support middle and upper management in non-routine, semi-structured, and unstructured decision-making. They use complex analytical models, external data, and simulations (e.g., 'What-if' analysis) to help managers solve problems where the procedure for arriving at a solution is not fully predefined.

Q 2.8 7 Marks
Describe how Executive Support Systems (ESS) differ from lower-level transaction systems.
✦ Detailed Answer

Hint & Explanation: ESS are designed for senior management. They address non-routine decisions requiring judgment and evaluation, often utilizing visual interfaces like digital dashboards. Unlike TPS, which records granular daily data, ESS aggregates and filters both internal metrics and external trends to give a high-level strategic overview.

Q 2.9 7 Marks
What is Knowledge Management (KM), and how do specific systems support it in an enterprise?
✦ Detailed Answer

Hint & Explanation: Knowledge management consists of processes developed to create, store, transfer, and apply specialized knowledge. Systems like intranets, document management systems, and communities of practice support KM by preventing 'brain-drain' and institutionalizing the specialized expertise of employees into a searchable corporate asset.

Section C — Long Answer

Section C — Long Answer — Long Answer

15 Marks Each
Q 2.10 15 Marks
Provide a comprehensive breakdown of the major types of information systems in an organization (TPS, MIS, DSS, ESS). Detail their specific functions, the management level they serve, their typical inputs and outputs, and how data flows continuously between them.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Definitions and roles of each system type mapped to operational, middle, and senior management.
(ii) Explanation of how lower-level systems (TPS) act as data feeders for higher-level systems (MIS/DSS).
(iii) Examples for each (e.g., TPS = point of sale, MIS = monthly sales report, DSS = pricing simulator, ESS = corporate dashboard).
(iv) Integration challenges when these systems do not communicate properly.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

Q 2.11 15 Marks
A large manufacturing enterprise currently operates with disconnected, legacy departmental systems. Discuss the strategic rationale for adopting an Enterprise Application architecture comprising ERP, SCM, and CRM. What functional and competitive benefits will they gain from this integration?
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) The problems of the 'silo' approach (redundant data, slow processes).
(ii) Detailed explanation of ERP (internal integration of finance/HR/manufacturing), SCM (external integration with suppliers/logistics), and CRM (managing consumer relationships across sales/service).
(iii) How integrating these three components creates an agile, responsive organization capable of executing just-in-time manufacturing and superior customer personalization.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

03

Information Systems, Organizations, Management and Strategy

BBA 2533 — Management Information System — Chapter 3

Section A — Very Short Answer

Section A — Very Short Answer — Very Short Answer

2 Marks Each
Q 3.1 2 Marks
What is Porter's Competitive Forces Model?
✦ Detailed Answer

Hint & Explanation: It is a framework analyzing the strategic environment by measuring five forces: traditional competitors, new market entrants, substitute products/services, supplier power, and buyer power.

Q 3.2 2 Marks
What is a Value Chain in the context of business strategy?
✦ Detailed Answer

Hint & Explanation: A value chain models the sequence of specific activities (inbound logistics, operations, sales) that add value or cost to a firm's product or service.

Q 3.3 2 Marks
Define 'Switching Costs'.
✦ Detailed Answer

Hint & Explanation: The financial, psychological, or operational costs a customer incurs when changing from one product, supplier, or system to another.

Q 3.4 2 Marks
How does an Information System potentially 'flatten' an organization's structure?
✦ Detailed Answer

Hint & Explanation: By providing lower-level employees with the information they need to make decisions autonomously, reducing the need for layers of middle management.

Q 3.5 2 Marks
What is meant by 'sunk costs' in an organizational system implementation?
✦ Detailed Answer

Hint & Explanation: Historical IT investments that cannot be recovered and may cause an organization to resist transitioning to new, more efficient technology.

Section B — Short Answer

Section B — Short Answer — Short Answer

7 Marks Each
Q 3.6 7 Marks
Explain how Information Systems act as a two-way relationship with an organization.
✦ Detailed Answer

Hint & Explanation: Organizations design and implement information systems to achieve specific objectives, while simultaneously, the structure, politics, culture, and workflows of the organization must adapt to the new capabilities and constraints introduced by the IS.

Q 3.7 7 Marks
Discuss how IS changes the landscape for managers and decision-making.
✦ Detailed Answer

Hint & Explanation: IS reduces the costs of acquiring information, allowing managers to monitor geographically dispersed operations in real-time, speeding up decision-making, increasing precision, and shifting management from a localized to a globalized overview capability.

Q 3.8 7 Marks
How can an organization use Information Systems to alter the balance of power with its suppliers?
✦ Detailed Answer

Hint & Explanation: Firms can use IS (like B2B portals and SCM tools) to integrate closely with multiple suppliers, increasing supplier interdependence, demanding lower prices through greater transparency, or reducing the need for intermediaries altogether.

Q 3.9 7 Marks
Describe the concept of 'Synergies' and how IS enables them.
✦ Detailed Answer

Hint & Explanation: Synergies occur when the output of some units becomes inputs for others, combining capabilities to lower costs and generate more profit. IS enables synergies by digitally tying together operations of disparate business units, standardizing data, and allowing them to cross-sell to a shared customer base.

Section C — Long Answer

Section C — Long Answer — Long Answer

15 Marks Each
Q 3.10 15 Marks
Using Porter’s Competitive Forces Model, assess how Information Systems can be used to achieve competitive advantage. Provide specifically detailed mechanisms and real-world examples for how IS can address each of the five forces.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Detailed explanation of the five forces.
(ii) How IT reduces threat of new entrants by raising capital costs.
(iii) How IT counters substitutes by enhancing product differentiation.
(iv) How IT manages rivalry by optimizing internal efficiencies for lower prices.
(v) How IT increases buyer power (e.g., loyalty programs increasing switching costs).
(vi) How IT checks supplier power (e.g., online procurement marketplaces).

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

Q 3.11 15 Marks
Analyse the relationship between Information Systems and organizational structure. How do systems facilitate 'planned organizational change', and how should a company manage the inherent political and cultural resistance that arises when business strategy alters traditional workflows?
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) The transition from hierarchical, tall organizations to flattened, decentralized structures enabled by immediate data access.
(ii) Explanation of organizational culture and organizational politics as barriers to change.
(iii) The strategic alignment of business strategy with IS goals.
(iv) Change management techniques such as stakeholder engagement, phased training, and securing top-level management support.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

04

The Digital Firm: Electronic Business and Electronic Commerce

BBA 2533 — Management Information System — Chapter 4

Section A — Very Short Answer

Section A — Very Short Answer — Very Short Answer

2 Marks Each
Q 4.1 2 Marks
What is the defining difference between Electronic Commerce (E-Commerce) and Electronic Business (E-Business)?
✦ Detailed Answer

Hint & Explanation: E-Commerce specifically involves buying and selling goods/services over the internet. E-Business encompasses all digital processes required to run the enterprise, including internal inventory management, HR portals, and intranet coordination.

Q 4.2 2 Marks
Define the term 'Disintermediation'.
✦ Detailed Answer

Hint & Explanation: The removal of previously necessary intermediary organizations or business process layers (like distributors or retail storefronts) responsible for intermediary steps in a value chain.

Q 4.3 2 Marks
What is B2B E-Commerce?
✦ Detailed Answer

Hint & Explanation: Business-to-Business E-Commerce; electronic sales of goods and services occurring among businesses, such as a manufacturer buying raw materials online from a supplier.

Q 4.4 2 Marks
What is meant by 'Information Asymmetry'?
✦ Detailed Answer

Hint & Explanation: A situation where one party in a transaction possesses more or superior, critical information than the other party.

Q 4.5 2 Marks
What is a 'Digital Good'?
✦ Detailed Answer

Hint & Explanation: Goods that can be delivered entirely over a digital network, such as software, music, digital video, and digital publications.

Section B — Short Answer

Section B — Short Answer — Short Answer

7 Marks Each
Q 4.6 7 Marks
Discuss the unique features of E-Commerce technology that distinguish it from traditional commerce.
✦ Detailed Answer

Hint & Explanation: E-commerce is ubiquitous (available everywhere, anytime), has global reach across national boundaries, operates on universal technological standards, supports rich multimedia formats seamlessly, enables high interactivity, drastically increases information density, and allows for massive personalization and customization.

Q 4.7 7 Marks
Explain the C2C (Consumer-to-Consumer) e-commerce model and provide an example.
✦ Detailed Answer

Hint & Explanation: C2C e-commerce involves consumers selling goods and services directly to other consumers, facilitated by an online platform that acts as a marketplace or broker. Examples include eBay, Craigslist, or local Facebook Marketplace groups, where the platform takes a fee for providing the connection infrastructure.

Q 4.8 7 Marks
What are the management challenges and opportunities presented by transitioning to an emerging digital firm?
✦ Detailed Answer

Hint & Explanation: Opportunities include massive cost reductions due to disintermediation, entry into global markets, and real-time operational efficiency. Challenges include intense pressure to maintain cybersecurity, severe legal and privacy compliance burdens (e.g., GDPR), maintaining consumer trust online, and the continuous need to upgrade rapidly aging IT infrastructure.

Q 4.9 7 Marks
How does E-Commerce impact the pricing structure of digital versus traditional goods?
✦ Detailed Answer

Hint & Explanation: Digital goods possess extremely low marginal costs of production (the cost to produce one additional copy is near zero), which lowers prices. E-commerce also provides price transparency, leading to dynamic pricing strategies where prices vary rapidly based on demand and consumer characteristics, compared to fixed shelf prices in traditional retail.

Section C — Long Answer

Section C — Long Answer — Long Answer

15 Marks Each
Q 4.10 15 Marks
A traditional brick-and-mortar retail company intends to transition into an emerging digital firm by launching a comprehensive B2C E-Commerce platform. Draft a strategic report outlining the e-commerce business models they could adopt, the digital firm processes they must implement, and the primary management challenges they will face during the transition.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) E-commerce business models suitable for them (e-tailer, portal, community provider).
(ii) Necessary internal e-business processes to support operations (supply chain transparency, payment gateways, cybersecurity).
(iii) Distinctions between digital goods vs physical goods logistics.
(iv) Major management challenges such as channel conflict (when their website competes with their own physical stores), trust and security management, and retraining personnel.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

Q 4.11 15 Marks
Evaluate how the internet has disrupted traditional business intermediaries, leading to 'Disintermediation'. Furthermore, describe the rise of 'Reintermediation'. Provide examples and analyze how reducing information asymmetry ultimately shifts power to the consumer in the digital age.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Detailed explanation of disintermediation with an example (e.g., booking a flight directly with an airline instead of via a travel agent).
(ii) Definition of reintermediation, where new types of intermediaries emerge specifically for the digital landscape (e.g., portals like Amazon or booking aggregators like Expedia).
(iii) How increased price transparency reduces information asymmetry, making it impossible for sellers to exploit local monopolies, thus driving market efficiency and consumer power.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

05

Ethical and Social Issue in the Digital Firm

BBA 2533 — Management Information System — Chapter 5

Section A — Very Short Answer

Section A — Very Short Answer — Very Short Answer

2 Marks Each
Q 5.1 2 Marks
What is meant by 'Information Privacy'?
✦ Detailed Answer

Hint & Explanation: The claim and moral right of individuals to be left alone, free from surveillance or unreasonable interference, encompassing the ability to control data regarding themselves.

Q 5.2 2 Marks
Define 'Intellectual Property' (IP) in the context of information systems.
✦ Detailed Answer

Hint & Explanation: Intangible property created by individuals or corporations, protected under trade secret, copyright, and patent laws, applying to software, digital art, and proprietary algorithms.

Q 5.3 2 Marks
What is the 'Digital Divide'?
✦ Detailed Answer

Hint & Explanation: The stark disparity separating those who generally have access to modern information and communication technology (computers, broadband) from those who do not, often based on socioeconomic or geographic factors.

Q 5.4 2 Marks
What does the acronym PAPA stand for in the context of IT ethics?
✦ Detailed Answer

Hint & Explanation: Privacy, Accuracy, Property, and Accessibility — the four major moral dimensions of the information age.

Q 5.5 2 Marks
What is an 'Opt-in' versus 'Opt-out' privacy policy?
✦ Detailed Answer

Hint & Explanation: An opt-in model prohibits businesses from collecting data until the consumer explicitly gives permission. An opt-out model assumes permission to collect data unless the consumer explicitly requests the business to stop.

Section B — Short Answer

Section B — Short Answer — Short Answer

7 Marks Each
Q 5.6 7 Marks
Discuss the moral dimension of 'Accuracy' in information systems.
✦ Detailed Answer

Hint & Explanation: Accuracy refers to who is morally and legally responsible when a system produces error. If a credit reporting IS generates incorrect data, who is liable for the damages suffered by the individual wrongly denied credit? Organizations must implement rigorous quality assurance and data cleansing protocols to fulfill their ethical responsibility for data accuracy.

Q 5.7 7 Marks
Explain how big data analytics and profiling present ethical dilemmas for digital firms.
✦ Detailed Answer

Hint & Explanation: By combining data from multiple sources (credit card purchases, location data, browsing history), firms create extensive, highly revealing profiles of individuals without their explicit knowledge. This creates an ethical tension between leveraging data for highly customized marketing efficiency and violating intrinsic expectations of personal privacy and autonomy.

Q 5.8 7 Marks
What are the key principles of a professional code of ethics for IT workers?
✦ Detailed Answer

Hint & Explanation: IT professional codes emphasize taking responsibility for work, minimizing negative impacts on stakeholders, honoring contracts and agreements, respecting intellectual property rights, safeguarding data privacy, avoiding conflicts of interest, and proactively identifying and mitigating system vulnerabilities.

Q 5.9 7 Marks
How does information technology threaten intellectual property rights, and what legal protections exist?
✦ Detailed Answer

Hint & Explanation: Digital technology makes it exceedingly easy and almost costless to instantly copy and distribute IP across borders. Legal protections include copyrights (protecting expression), patents (protecting underlying ideas/functions), and trade secrets, but enforcement remains a massive challenge across divergent global legal jurisdictions.

Section C — Long Answer

Section C — Long Answer — Long Answer

15 Marks Each
Q 5.10 15 Marks
Analyse the impact of information systems on the 'Digital Divide' and other societal disparities. How should digital firms, governments, and society address the broader social and ethical issues stemming from rapid technological advancement and job automation?
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Defining the digital divide and its manifestation across socioeconomic boundaries globally and locally.
(ii) The impact of rapid IS integration on job displacement, automation, and the shifting required skill sets.
(iii) Societal consequences such as loss of boundaries between work and family time, and health risks (RSI, screen fatigue).
(iv) Suggested mitigation measures including government policy on broadband infrastructure, corporate social responsibility in skills retraining, and ethical deployment of job-automating AI.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

Q 5.11 15 Marks
Provide a comprehensive breakdown of the moral dimensions of information systems utilizing the PAPA framework (Privacy, Accuracy, Property, and Accessibility) in a scenario involving a hospital deploying a new digital patient record database.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Privacy: How the hospital must implement stringent data access controls and opt-in frameworks to protect sensitive health profiles.
(ii) Accuracy: The critical, literal life-or-death risk if patient drug allergies are recorded incorrectly, assigning liability for systemic errors.
(iii) Property: Resolving who actually 'owns' the health data—the patient, the hospital, or the software vendor.
(iv) Accessibility: Ensuring that patients, potentially those elderly or without advanced computer literacy, have fair, secure means to access their own digital records.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

06

Managing Hardware and Software Assets

BBA 2533 — Management Information System — Chapter 6

Section A — Very Short Answer

Section A — Very Short Answer — Very Short Answer

2 Marks Each
Q 6.1 2 Marks
What constitutes Computer Hardware in IT Infrastructure?
✦ Detailed Answer

Hint & Explanation: Hardware consists of the physical devices used to input, process, store, and output data and information, including mainframes, servers, PCs, and peripheral devices.

Q 6.2 2 Marks
Differentiate between System Software and Application Software.
✦ Detailed Answer

Hint & Explanation: System software manages the hardware and generic computer operations (e.g., Windows, Linux operating systems). Application software performs specific tasks for users (e.g., Microsoft Word, SAP ERP).

Q 6.3 2 Marks
What is a Server?
✦ Detailed Answer

Hint & Explanation: A server is a computer specifically optimized to provide software and other resources (like databases or web pages) to other computers over a network.

Q 6.4 2 Marks
What does 'Open-Source Software' mean?
✦ Detailed Answer

Hint & Explanation: Software that provides free access to its program source code, allowing users to modify, study, and distribute it (e.g., Apache Web Server, Linux).

Q 6.5 2 Marks
Define 'Total Cost of Ownership' (TCO) in hardware management.
✦ Detailed Answer

Hint & Explanation: TCO is a financial estimate helping managers determine the direct and indirect costs of owning a technology system, including hardware acquisition, software licenses, training, technical support, and eventual disposal.

Section B — Short Answer

Section B — Short Answer — Short Answer

7 Marks Each
Q 6.6 7 Marks
Categorize and describe the primary types of computer systems used in modern organizations.
✦ Detailed Answer

Hint & Explanation: Organizations use: PCs for individual productivity; Workstations for intensive graphical/mathematical jobs; Servers for hosting databases, web applications, and network management; Mainframes for massive, centralized transaction processing (like airline reservations); and Supercomputers for advanced scientific modeling.

Q 6.7 7 Marks
Explain the concept and business benefits of Cloud Computing (SaaS, PaaS, IaaS).
✦ Detailed Answer

Hint & Explanation: Cloud computing delivers computing services over the internet. IaaS provides basic storage/hardware capabilities. PaaS offers development environments for programmers. SaaS delivers complete software applications (e.g., Google Workspace). Benefits include drastically reduced upfront capital costs, infinite scalability, and immediate access to updates without manual installation.

Q 6.8 7 Marks
Discuss the challenges organizations face when managing both hardware and software assets.
✦ Detailed Answer

Hint & Explanation: Managers struggle with rapid technological obsolescence (hardware becoming outdated quickly), software licensing compliance (preventing piracy audits), escalating maintenance and power consumption costs, and the challenge of integrating legacy systems with deeply modern cloud-based apps.

Q 6.9 7 Marks
What is a 'Legacy System' and why are they difficult to manage?
✦ Detailed Answer

Hint & Explanation: Legacy systems are critically important, older transaction processing systems (often running on mainframes) that are extremely expensive and risky to replace. They are difficult to manage because original programmers may have retired, documentation is often poor, and integrating them with newer mobile/web interfaces is technically complex.

Section C — Long Answer

Section C — Long Answer — Long Answer

15 Marks Each
Q 6.10 15 Marks
Evaluate the strategic decision a university must make between maintaining an on-premise IT infrastructure versus migrating entirely to Cloud Computing. Your evaluation should cover the definitions of hardware/software infrastructure, cost models (Capital vs. Operational expenditures), data security concerns, scalability, and specific cloud models (IaaS, SaaS).
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Defining traditional local servers vs renting remote capacity.
(ii) Cost transition from CapEx (buying expensive servers) to OpEx (paying monthly subscriptions).
(iii) Security analysis (control of physical hardware vs trusting a major cloud vendor like AWS).
(iv) How the university can easily scale during high-traffic periods (exam registrations).
(v) Utilization of SaaS for student email and LMS systems.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

Q 6.11 15 Marks
Detail a comprehensive software asset management strategy for a multinational enterprise. Discuss the classification of software (System vs. Application), the role of open-source solutions in reducing costs, and the implementation of Total Cost of Ownership (TCO) models to control rogue IT spending.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Clear definitions separating the OS from productivity/enterprise applications.
(ii) Strategic adoption of open-source alternatives (like Linux for servers) to eliminate licensing fees while noting the offset in support costs.
(iii) Detailed breakdown of TCO showing that original acquisition cost is only 20% of the true cost, highlighting the hidden costs of downtime, training, and maintenance, and suggesting centralized IT purchasing to prevent departmental 'shadow IT'.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

07

Managing Data Resources

BBA 2533 — Management Information System — Chapter 7

Section A — Very Short Answer

Section A — Very Short Answer — Very Short Answer

2 Marks Each
Q 7.1 2 Marks
What is a Database Management System (DBMS)?
✦ Detailed Answer

Hint & Explanation: A DBMS is specific software that permits an organization to centralize data, manage it efficiently, and provide applications with seamless access to stored data.

Q 7.2 2 Marks
What was the primary flaw of the traditional file environment?
✦ Detailed Answer

Hint & Explanation: It led to severe data redundancy (duplicate data in multiple files) and data inconsistency (same attribute having different values across files).

Q 7.3 2 Marks
Define 'Program-Data Dependence'.
✦ Detailed Answer

Hint & Explanation: A situation in traditional file systems where changes in the software program require corresponding changes to the data it accesses, making updates extremely difficult.

Q 7.4 2 Marks
What is a Relational Database?
✦ Detailed Answer

Hint & Explanation: A type of database that organizes data into two-dimensional tables (relations) with columns and rows, capable of linking tables based on common data elements.

Q 7.5 2 Marks
What is 'Big Data'?
✦ Detailed Answer

Hint & Explanation: Massive sets of unstructured, semi-structured, and structured data whose volume, velocity, and variety are too immense to be captured and processed by traditional relational DBMS.

Section B — Short Answer

Section B — Short Answer — Short Answer

7 Marks Each
Q 7.6 7 Marks
Explain the specific advantages a database approach provides over a traditional file-based system.
✦ Detailed Answer

Hint & Explanation: A database approach drastically reduces data redundancy and inconsistency, uncouples programs and data (program-data independence), increases flexibility, tightens security (through centralized access controls), and greatly facilitates data sharing and availability across disparate enterprise applications.

Q 7.7 7 Marks
Outline the critical steps required to create a new database environment.
✦ Detailed Answer

Hint & Explanation: Creating a database environment requires: (1) Enterprise data planning and requirement analysis; (2) Conceptual design (creating an Entity-Relationship Diagram outlining relationships); (3) Logical and Physical design (translating the concept into actual tables/fields in the DBMS); and (4) Establishing strict data governance and data cleansing policies to ensure accuracy.

Q 7.8 7 Marks
What is Data Mining and how does it differ from a standard database query?
✦ Detailed Answer

Hint & Explanation: Standard queries answer specific known questions (e.g., 'How many blue shirts were sold?'). Data mining uses complex algorithms to find hidden patterns, correlations, and anomalies in massive data sets to forecast future behavior (e.g., uncovering that customers who buy blue shirts often buy sunglasses the next week).

Q 7.9 7 Marks
Discuss the current trends in database technology, particularly NoSQL and Cloud Databases.
✦ Detailed Answer

Hint & Explanation: Trends show a massive shift toward NoSQL databases, which handle unstructured data (like social media posts or machine sensors) better than relational systems by not requiring an upfront table schema. Furthermore, Cloud Databases like Amazon RDS allow firms to scale database capacity instantly without purchasing local storage arrays.

Section C — Long Answer

Section C — Long Answer — Long Answer

15 Marks Each
Q 7.10 15 Marks
Analyse the transition from a traditional file-based organizational data structure to a centralized Database Management System (DBMS). Detail the specific technical problems solved by this transition, the steps required in logical database design (including Entity-Relationship modeling), and the role of data administration policies.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Detailed explanation of redundancy, inconsistency, lack of flexibility, and poor security in file systems.
(ii) How the DBMS acts as an interface between applications and physical data files.
(iii) The design process: identifying entities (e.g., CUSTOMER, ORDER), defining attributes, mapping relationships (1-to-many), and ensuring normalization to eliminate repeating groups.
(iv) The organizational requirement of a data dictionary and strict data governance policies.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

Q 7.11 15 Marks
Evaluate the impact of 'Big Data' and modern database trends on a digital firm's ability to gain competitive advantage. Include in your analysis the specific characteristics of Big Data, the shift toward NoSQL databases, the utilization of data warehouses and data lakes, and the application of predictive analytics.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Defining Volume, Velocity, and Variety.
(ii) Why traditional SQL relational models struggle with unstructured data streams (tweets, videos, sensor logs), forcing the adoption of flexible NoSQL frameworks.
(iii) Differentiating a Data Warehouse (structured historical data for reporting) from a Data Lake (a massive pool of raw, unformatted data).
(iv) How advanced predictive analytics turn this vast storage into actionable intelligence, such as real-time dynamic pricing algorithms or predictive machine maintenance.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

08

Telecommunications and Networks

BBA 2533 — Management Information System — Chapter 8

Section A — Very Short Answer

Section A — Very Short Answer — Very Short Answer

2 Marks Each
Q 8.1 2 Marks
What is a Computer Network?
✦ Detailed Answer

Hint & Explanation: Two or more connected computers established to share resources (like printers/files), transmit data, and facilitate electronic communications.

Q 8.2 2 Marks
Differentiate between a LAN and a WAN.
✦ Detailed Answer

Hint & Explanation: A Local Area Network (LAN) connects computers within a limited physical geography like an office building. A Wide Area Network (WAN) spans broader geographic distances—entire states or continents (e.g., the Internet).

Q 8.3 2 Marks
What is a Router?
✦ Detailed Answer

Hint & Explanation: A specialized network device that forwards data packets between computer networks, determining the most efficient path for the data to travel across interconnected networks.

Q 8.4 2 Marks
Define 'Bandwidth' in the context of telecommunications.
✦ Detailed Answer

Hint & Explanation: The maximum capability or physical capacity of a communications channel, usually measured in bits per second (bps) or Megabits per second (Mbps).

Q 8.5 2 Marks
What is a Virtual Private Network (VPN)?
✦ Detailed Answer

Hint & Explanation: A secure, encrypted, private network that runs over the public Internet, allowing remote users to securely access corporate systems.

Section B — Short Answer

Section B — Short Answer — Short Answer

7 Marks Each
Q 8.6 7 Marks
Describe the essential components and functions of a modern telecommunications system.
✦ Detailed Answer

Hint & Explanation: A telecommunications system fundamentally contains: sender/receiver computers; network interfaces (NIC); a communication medium (copper wire, fiber-optic cable, or wireless radio waves); specialized hardware (switches to connect local devices, routers to connect networks); and Network Operating System (NOS) software to route traffic and manage access.

Q 8.7 7 Marks
Explain the TCP/IP protocol suite and its importance to modern networking.
✦ Detailed Answer

Hint & Explanation: Transmission Control Protocol/Internet Protocol (TCP/IP) is the foundational, open communication standard of the internet. It breaks complex data into smaller 'packets', routes them individually via the IP address, and reliably reassembles them at the destination using TCP, ensuring seamless global interoperability across different localized hardware types.

Q 8.8 7 Marks
Compare Fiber-Optic cables with traditional Copper twisted-pair cables.
✦ Detailed Answer

Hint & Explanation: Copper wire transmits data via electrical pulses; it is cheap and easy to install but suffers from slower speeds and interference over long distances. Fiber-optic cable transmits data as pulses of light through glass strands; it handles vastly larger bandwidth, experiences zero electromagnetic interference, and travels enormous distances, but is much more expensive and difficult to splice.

Q 8.9 7 Marks
How do wireless network technologies uniquely support E-Business capabilities?
✦ Detailed Answer

Hint & Explanation: Wireless networks (WiFi, 4G/5G, Bluetooth) untether workers and consumers from physical offices. They enable mobile commerce (m-commerce), real-time logistics tracking (RFID tags on shipments), continuous field-sales updates, and push notifications to local consumers based on GPS mapping technologies.

Section C — Long Answer

Section C — Long Answer — Long Answer

15 Marks Each
Q 8.10 15 Marks
A massive logistical enterprise needs to drastically overhaul its telecommunications infrastructure to connect 50 regional distribution hubs globally. Propose a comprehensive network strategy evaluating LAN vs. WAN deployment, transmission media (Fiber vs. Wireless/Satellite), network hardware, and security protocols (VPN and Firewalls).
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Deploying LANs (Ethernet/WiFi) inside each distribution hub.
(ii) Connecting these hubs globally via a massive WAN.
(iii) Recommending Fiber-optics for the massive data backbone between continents, and Satellite/4G for remote, rural hubs.
(iv) Utilizing specialized routers and switches to manage logistics data traffic efficiently.
(v) Emphasizing the absolute necessity of a VPN to encrypt internal transit communications over the public internet, shielded locally by hardware firewalls.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

Q 8.11 15 Marks
Analyse the structural transition of telecommunications from analog voice networks to digital packet-switched data networks. Discuss how TCP/IP standardizes this global communication and evaluate the profound impact this standard, paired with high-bandwidth fiber optics, has had on executing modern Electronic Commerce.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) The historical limitation of circuit-switched, proprietary analog phone networks vs the modern efficiency of digital packet-switching.
(ii) The detailed role of TCP/IP as the universal language allowing any device to talk to any other device.
(iii) How fiber-optics removed bandwidth bottlenecks, allowing high-density e-commerce operations (like streaming Netflix or real-time high-definition video conferencing).
(iv) How these low-cost global communications drastically lower entry barriers for small digital firms.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

09

The Internet and the New Information Technology Infrastructure

BBA 2533 — Management Information System — Chapter 9

Section A — Very Short Answer

Section A — Very Short Answer — Very Short Answer

2 Marks Each
Q 9.1 2 Marks
What is an IP Address?
✦ Detailed Answer

Hint & Explanation: A unique string of 32-bit (IPv4) or 128-bit (IPv6) numbers assigned to every device connected to the internet that identifies its unique network location.

Q 9.2 2 Marks
What does the Domain Name System (DNS) do?
✦ Detailed Answer

Hint & Explanation: DNS translates human-readable domain names (e.g., 'google.com') into their corresponding numerical IP addresses (e.g., '142.250.190.46') so computers can route requests properly.

Q 9.3 2 Marks
Define the World Wide Web (WWW).
✦ Detailed Answer

Hint & Explanation: A system with universally accepted standards (HTTP, HTML) for storing, formatting, and retrieving information structured via hyperlink pages across the internet.

Q 9.4 2 Marks
What is an Intranet?
✦ Detailed Answer

Hint & Explanation: An internal, private network inside an organization that utilizes identical internet architecture and web standards but is heavily firewalled and accessible only to employees.

Q 9.5 2 Marks
Identify two supporting technologies crucial for executing safe E-Commerce.
✦ Detailed Answer

Hint & Explanation: Technologies include SSL/TLS (Secure Sockets Layer) for encrypting payment transmission, Digital Certificates for platform verification, and Electronic Payment Gateways.

Section B — Short Answer

Section B — Short Answer — Short Answer

7 Marks Each
Q 9.6 7 Marks
Explain the 'New Information Technology Infrastructure' for modern digital firms.
✦ Detailed Answer

Hint & Explanation: It has shifted away from isolated, rigid, mainframes towards high-speed, ubiquitous Internet connectivity supporting a mix of Cloud Computing clusters, massive mobile hardware adoption (smartphones/tablets), and the Internet of Things (IoT). The focus is entirely on seamless, scalable integration of diverse web services via standardized APIs.

Q 9.7 7 Marks
How are HTML and HTTP fundamentally different but cooperative technologies on the Web?
✦ Detailed Answer

Hint & Explanation: Hypertext Transfer Protocol (HTTP) is the foundational communications protocol determining how web clients (browsers) request documents and how web servers deliver them. Hypertext Markup Language (HTML) is the formatting language used to structure the text, links, and media within the documents delivered. HTTP delivers the package; HTML tells the browser how to open and display it.

Q 9.8 7 Marks
Discuss the specific supporting technologies required to operate a functional and secure E-Business website.
✦ Detailed Answer

Hint & Explanation: Running an e-business requires a web server to host pages, an application server to execute business logic, a high-speed database to store inventory/catalog items, and a merchant payment gateway to process credit cards securely using robust SSL/TLS encryption protocols to ensure data cannot be intercepted mid-transit.

Q 9.9 7 Marks
What are the principal management issues surrounding the adoption of this new internet-based IT infrastructure?
✦ Detailed Answer

Hint & Explanation: Significant management challenges include dealing with severe cybersecurity vulnerabilities associated with being continuously connected globally, managing escalating bandwidth and cloud storage costs, avoiding vendor lock-in with massive cloud providers, and overcoming data privacy/legal hurdles across varying international jurisdictions.

Section C — Long Answer

Section C — Long Answer — Long Answer

15 Marks Each
Q 9.10 15 Marks
Provide a highly detailed analysis of the architecture of the Internet and the World Wide Web. Explain the routing of data utilizing IP addresses, the translation mechanism of the DNS, the implementation of client/server computing, and the foundational role of HTML/HTTP in shaping modern internet consumption.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Explanation of the Internet as a network of networks relying on IP routing and packet switching.
(ii) Detail how a user typing a URL triggers a DNS query to find an IP address.
(iii) The client/server model: the browser (client) sends an HTTP request to an origin web server.
(iv) The server responding with HTML scripts, which the browser renders into the multimedia pages we consume.
(v) How this standardized, open nature birthed global E-commerce by eliminating proprietary software barriers.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

Q 9.11 15 Marks
Evaluate the impact of the new IT infrastructure (combining cloud computing, mobile technologies, and massive internet bandwidth) on organizational agility. Furthermore, address the severe management decisions and issues required to govern an enterprise whose entire operational core resides on the public internet.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Defining organizational agility—the ability to respond instantly to market demands using scalable cloud resources and ubiquitous mobile worker access.
(ii) The drastic reduction in upfront capital required to launch new global services.
(iii) Governance issues: outlining the severe existential business risks of critical cloud outages, cyber attacks (DDoS, ransomware), and stringent data sovereignty laws.
(iv) The management decision to balance innovation speed with strict, enforced compliance and disaster recovery architectures.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

10

Knowledge Management for The Digital Firm

BBA 2533 — Management Information System — Chapter 10

Section A — Very Short Answer

Section A — Very Short Answer — Very Short Answer

2 Marks Each
Q 10.1 2 Marks
What is Knowledge Management (KM)?
✦ Detailed Answer

Hint & Explanation: The set of business processes developed in an organization to systematically create, store, transfer, and apply existing and new knowledge.

Q 10.2 2 Marks
Differentiate between Tacit Knowledge and Explicit Knowledge.
✦ Detailed Answer

Hint & Explanation: Explicit knowledge is formal, documented, and codified (e.g., procedure manuals, databases). Tacit knowledge exists within an employee's mind, derived from personal experience, and is extremely difficult to formally codify or transfer.

Q 10.3 2 Marks
What is the defining characteristic of an Expert System?
✦ Detailed Answer

Hint & Explanation: An expert system is a restrictive form of AI that captures human expertise in a highly specific domain as a set of rules (If-Then statements) deployed in a software system to automate decision-making.

Q 10.4 2 Marks
What are Information Work Systems?
✦ Detailed Answer

Hint & Explanation: Systems that support data processing and clerical workers (e.g., secretaries or accountants) primarily focused on processing and distributing existing information using word processors or basic databases.

Q 10.5 2 Marks
Define 'Communities of Practice' (COPs).
✦ Detailed Answer

Hint & Explanation: Informal social networks of professionals within an organization who share similar work-related activities, interests, and expertise, facilitating natural tacit knowledge transfer.

Section B — Short Answer

Section B — Short Answer — Short Answer

7 Marks Each
Q 10.6 7 Marks
Explain the four steps in the Knowledge Management Value Chain.
✦ Detailed Answer

Hint & Explanation: The KM value chain includes: (1) Knowledge Acquisition (discovering patterns via data mining or building expert networks); (2) Knowledge Storage (document management systems and expert databases); (3) Knowledge Dissemination (intranets, email, collaborative portals); and (4) Knowledge Application (incorporating this knowledge directly into enterprise business processes and executive decisions).

Q 10.7 7 Marks
Describe the purpose of a Knowledge Work System (KWS) and provide a concrete example.
✦ Detailed Answer

Hint & Explanation: A KWS supports highly specialized knowledge workers (scientists, architects, engineers) in discovering and creating entirely new knowledge to integrate into the firm. An example is Computer-Aided Design (CAD) software, which allows engineers to create, test, and instantly modify complex 3D industrial blueprints without building physical prototypes.

Q 10.8 7 Marks
How does Artificial Intelligence (AI) and Machine Learning distinctively enhance enterprise Knowledge Management?
✦ Detailed Answer

Hint & Explanation: Unlike traditional databases that just store facts, AI simulates human reasoning. Machine Learning algorithms parse vast data sets to autonomously 'learn' and detect complex patterns that human analysts cannot perceive. They enhance KM by automating data categorization, recognizing speech/images effortlessly, and providing dynamic predictive intelligence.

Q 10.9 7 Marks
What are 'Other Intelligence Techniques' besides AI, such as Fuzzy Logic and Intelligent Agents?
✦ Detailed Answer

Hint & Explanation: Fuzzy Logic is a rule-based technology that tolerates imprecision by using continuous values rather than stark True/False binary logic (used in autofocus cameras or washing machines). Intelligent Agents are background software programs that carry out specific, repetitive, predictable tasks for a user, such as continuously crawling the web to find the lowest price for raw materials.

Section C — Long Answer

Section C — Long Answer — Long Answer

15 Marks Each
Q 10.10 15 Marks
Analyse the critical role of Knowledge Management in securing a sustainable competitive advantage for a digital firm. Specifically, contrast the management of explicit and tacit knowledge, and outline a comprehensive strategy deploying enterprise-wide KM systems, intranets, and employee policies to prevent 'Corporate Amnesia'.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Defining knowledge as a unique asset that inherently increases in value when shared.
(ii) The tactical differences in managing explicit knowledge (via standard document management repositories and firm databases) versus tacit knowledge (via employee directories profiling specific expertise and fostering physical/digital Communities of Practice).
(iii) Outlining an Enterprise-wide KM System (an intranet portal tying everything together).
(iv) Highlighting the behavioral challenge: managers must implement reward structures that actively incentivize employees to document and share their knowledge before they retire or resign (combating corporate amnesia).

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

Q 10.11 15 Marks
Evaluate the impact of Artificial Intelligence and specialized Knowledge Work Systems on modern business operations. Explain how Intelligent Agents, Expert Systems, and Machine Learning drastically accelerate knowledge acquisition and automate complex, previously human-exclusive decision-making.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Distinguishing between general clerical IS and highly specialized KWS (mentioning power requirements and massive data access for engineers/financial modelers).
(ii) Providing a deep dive into Expert Systems outlining how human heuristic knowledge translates into 'If/Then' rules.
(iii) The massive utility of Machine Learning in continuously analyzing data without explicit programming.
(iv) Examples of Intelligent agents reducing worker strain (spam checkers, automated logistics routers).
(v) The overall business outcome: converting abstract human capital into scalable digital operations.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

11

Enhancing Management Decision making for the Digital Firm

BBA 2533 — Management Information System — Chapter 11

Section A — Very Short Answer

Section A — Very Short Answer — Very Short Answer

2 Marks Each
Q 11.1 2 Marks
What defines a Decision Support System (DSS)?
✦ Detailed Answer

Hint & Explanation: A DSS is an interactive information system designed to assist middle management in making semi-structured and unstructured decisions by analyzing raw data and executing sophisticated analytical models.

Q 11.2 2 Marks
Differentiate between structured, semi-structured, and unstructured decisions.
✦ Detailed Answer

Hint & Explanation: Structured decisions are routine and predefined (e.g., payroll processing). Unstructured decisions require judgment and insight (e.g., entering a new market). Semi-structured decisions contain elements of both.

Q 11.3 2 Marks
What is a Group Decision Support System (GDSS)?
✦ Detailed Answer

Hint & Explanation: An interactive computer-based system designed to facilitate the solution of unstructured problems by a set of decision-makers working collaboratively as a group in the same room or remotely.

Q 11.4 2 Marks
What is an Executive Support System (ESS)?
✦ Detailed Answer

Hint & Explanation: An information system designed exclusively for senior executives, distilling internal and external data into a high-level digital dashboard prioritizing key performance indicators (KPIs) to aid strategic planning.

Q 11.5 2 Marks
Give an example of a specific analytical capability of a DSS.
✦ Detailed Answer

Hint & Explanation: A primary capability is 'What-if' analysis, working forward from known or assumed conditions to predict various outcomes based on altering specific variables (e.g., changing price points).

Section B — Short Answer

Section B — Short Answer — Short Answer

7 Marks Each
Q 11.6 7 Marks
Explain the four stages of the classical decision-making process.
✦ Detailed Answer

Hint & Explanation: The process involves: (1) Intelligence (discovering and identifying the problem in the organization); (2) Design (identifying and exploring various solutions); (3) Choice (selecting the best among the alternatives); and (4) Implementation (executing the decision and monitoring the outcome).

Q 11.7 7 Marks
How does an Executive Support System (ESS) specifically help a CEO?
✦ Detailed Answer

Hint & Explanation: An ESS helps a CEO by eliminating the overwhelming avalanche of granular data. It provides intuitive visualizations (graphs, dials) displaying only the critical KPIs aligned with company strategy, while retaining the capacity to 'drill down' into specific operational details if a problem is detected.

Q 11.8 7 Marks
Discuss how a Group Decision Support System (GDSS) improves collaborative meeting outcomes.
✦ Detailed Answer

Hint & Explanation: A GDSS removes meeting bottlenecks by allowing all participants to simultaneously input ideas anonymously. This eliminates the fear of criticizing superiors ('groupthink'), prevents dominant personalities from hijacking the meeting, and automatically records all brainstormed proposals into a structured, voteable matrix.

Q 11.9 7 Marks
Describe the role of Business Intelligence (BI) platforms in a DSS.
✦ Detailed Answer

Hint & Explanation: BI platforms form the data foundation of a modern DSS. They integrate data from ERPs, external markets, and databases, cleaning it and presenting it to managers through powerful querying tools (OLAP), ad-hoc reports, and dashboards, enabling highly informed 'What-if' modeling.

Section C — Long Answer

Section C — Long Answer — Long Answer

15 Marks Each
Q 11.10 15 Marks
Analyse the structural differences between a Management Information System (MIS) and a Decision Support System (DSS). Evaluate their respective roles in assisting middle management, emphasizing the type of data they consume, their analytical capabilities, and the specific nature of the decisions they support.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Defining the structured, predefined routine reports of an MIS based strictly on internal TPS data.
(ii) Contrasting this with the flexible, user-directed nature of a DSS, which pulls from diverse internal/external databases.
(iii) Focusing on DSS analytical tools like sensitivity analysis, goal-seeking analysis, and OLAP cubes.
(iv) Using an example: an MIS generating a weekly sales summary vs a DSS simulating profit margins if shipping costs increase by 15%.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

Q 11.11 15 Marks
Evaluate how an enterprise utilizes Executive Support Systems (ESS) and the Balanced Scorecard framework to align operational activities with high-level corporate strategy. Detail the specific functions of an ESS dashboard and the necessity of 'Drill-Down' capabilities.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Defining the Balanced Scorecard model: translating strategy into operational metrics across four dimensions (financial, customer, business process, and learning/growth).
(ii) How an ESS dynamically pulls data corresponding specifically to those KPIs.
(iii) The importance of visual simplicity (dashboards/color-coding) to save executive time.
(iv) Exploring the 'Drill-Down' function: allowing an executive to see a red warning light in regional sales, click it, and drill down to the specific poorly performing store without needing to consult a lower manager.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

12

Redesigning the Organization with Information Systems

BBA 2533 — Management Information System — Chapter 12

Section A — Very Short Answer

Section A — Very Short Answer — Very Short Answer

2 Marks Each
Q 12.1 2 Marks
What is Business Process Reengineering (BPR)?
✦ Detailed Answer

Hint & Explanation: The fundamental rethinking and radical, start-from-scratch redesign of existing business processes to achieve dramatic improvements in massive cost, quality, service, and speed.

Q 12.2 2 Marks
What is meant by 'Systems Development'?
✦ Detailed Answer

Hint & Explanation: The complete life cycle activities encompassing the analysis, design, implementation, and maintenance of an information system to solve an organizational problem.

Q 12.3 2 Marks
Define 'Prototyping' in system development.
✦ Detailed Answer

Hint & Explanation: Building an experimental, scaled-down system rapidly and inexpensively for end-users to evaluate and refine requirements before building the massive final system.

Q 12.4 2 Marks
What does the SDLC stand for?
✦ Detailed Answer

Hint & Explanation: The Systems Development Life Cycle: the oldest, highly structured method for building IS, progressing purely linearly through strict stages (Planning, Analysis, Design, Implementation, Maintenance).

Q 12.5 2 Marks
What is 'End-User Development'?
✦ Detailed Answer

Hint & Explanation: The creation of information systems entirely by the actual end-users without technical assistance from corporate programmers, typically using modern, intuitive software tools.

Section B — Short Answer

Section B — Short Answer — Short Answer

7 Marks Each
Q 12.6 7 Marks
Sequence and explain the major stages in the Systems Development Life Cycle (SDLC).
✦ Detailed Answer

Hint & Explanation: The SDLC involves: (1) Systems Analysis (defining the precise problem and requirements); (2) Systems Design (crafting the technical and hardware specifications); (3) Programming (writing the actual code); (4) Testing (verifying the system performs exactly as intended); (5) Conversion (transitioning from the old system to the new); and (6) Production/Maintenance (post-launch support).

Q 12.7 7 Marks
Compare Business Process Reengineering (BPR) with continuous process improvement (Total Quality Management).
✦ Detailed Answer

Hint & Explanation: TQM (like Kaizen) focuses on constant, incremental, small improvements driven generally by operational employees. BPR is top-down, massive, incredibly disruptive, and specifically completely ignores the old way of working in favor of designing a radically new workflow engineered entirely around new IS capabilities.

Q 12.8 7 Marks
What is Rapid Application Development (RAD)?
✦ Detailed Answer

Hint & Explanation: RAD is a process used to create workable systems in a very short amount of time using robust visual programming tools, pre-built coding modules, and intense, continuous teamwork between developers and actual users to drastically accelerate the SDLC.

Q 12.9 7 Marks
Discuss the specific advantages and profound risks of utilizing external Outsourcing for application development.
✦ Detailed Answer

Hint & Explanation: Advantages include drastically reduced domestic labor costs, access to massive specialized global skills, and freeing internal IT teams to focus on core strategic business. Severe risks include losing intense control over code quality, devastating 'scope creep' driving up unseen backend costs, communication breakdowns caused by cultural/time-zone differences, and catastrophic losses of proprietary data.

Section C — Long Answer

Section C — Long Answer — Long Answer

15 Marks Each
Q 12.10 15 Marks
Analyse the concept of Information Systems acting as a catalyst for 'Planned Organizational Change'. Discuss the varying degrees of organizational change—starting from simple Automation and Rationalization, up to total Paradigm Shifts and Business Process Reengineering (BPR)—stating the risks and rewards of each.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Defining automation (speeding up tasks) and rationalization of procedures (streamlining bottlenecks) as low-risk, low-reward changes.
(ii) Defining BPR (radically redesigning workflows) and Paradigm Shifts (entirely redefining the nature of the business) as tremendously high-reward but possessing a brutally high failure rate.
(iii) Arguing why inserting new technology into an outdated, poorly designed process is useless without simultaneous structural and cultural change.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

Q 12.11 15 Marks
Evaluate the traditional Systems Development Life Cycle (SDLC) against modern alternative system-building approaches (Prototyping, End-User Development, and RAD). Determine under what specific project conditions a firm should select the SDLC versus Prototyping.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Analyzing the massive, rigid bureaucracy of the SDLC ('Waterfall' method) and why it's excellent for gigantic, mission-critical systems (like banking mainframes) where requirements are perfectly known upfront and errors are catastrophic.
(ii) Explaining how Prototyping is vastly superior for user-interface design or when the user doesn't actually know what they want until they see it.
(iii) Addressing how End-User Development is brilliant for small departmental tasks but frequently causes severe data non-compliance issues.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

13

Understanding the Business Value of Systems and Managing Change

BBA 2533 — Management Information System — Chapter 13

Section A — Very Short Answer

Section A — Very Short Answer — Very Short Answer

2 Marks Each
Q 13.1 2 Marks
What is meant by the 'Business Value' of Information Systems?
✦ Detailed Answer

Hint & Explanation: It represents the tangible (financial profit, reduced costs) and intangible (improved decision-making, greater customer loyalty) benefits generated directly by deploying an IS.

Q 13.2 2 Marks
Why do large-scale IS implementations frequently fail?
✦ Detailed Answer

Hint & Explanation: Failures often result not from technological flaws, but from extremely poor project management, severe organizational resistance, lack of executive leadership, and poorly defined user requirements.

Q 13.3 2 Marks
What is Change Management in the context of IS?
✦ Detailed Answer

Hint & Explanation: The methodical process of guiding an organization's people, workflows, and culture smoothly through the disruptive transition caused by implementing a massive new information system.

Q 13.4 2 Marks
What does Return on Investment (ROI) measure for an IT project?
✦ Detailed Answer

Hint & Explanation: A strict financial metric calculating the net financial benefits of an IT investment directly divided by the total costs of implementing the system to determine profitability.

Q 13.5 2 Marks
Define 'Scope Creep'.
✦ Detailed Answer

Hint & Explanation: A project management failure where the features, goals, and requirements of the information system continually expand beyond the original plan, causing devastating delays and budget overruns.

Section B — Short Answer

Section B — Short Answer — Short Answer

7 Marks Each
Q 13.6 7 Marks
Explain the difference between tangible and intangible benefits of an Information System.
✦ Detailed Answer

Hint & Explanation: Tangible benefits can be strictly quantified mathematically (e.g., $50,000 saved per month due to reduced paperwork, or a specific 15% increase in sales). Intangible benefits cannot be strictly quantified mathematically but profoundly impact the organization (e.g., higher employee morale, faster executive decision-making, enhanced corporate reputation).

Q 13.7 7 Marks
Describe the critical role of users and management support in successfully managing system implementation.
✦ Detailed Answer

Hint & Explanation: If end-users are utterly excluded during the system design phase, they will actively reject the system upon launch out of fear or frustration. Furthermore, without highly visible, uncompromising support from top executive management, mid-level staff will simply refuse to abandon the legacy systems they are comfortable with.

Q 13.8 7 Marks
Discuss specific methods organizations use to calculate the financial justification of an IT project.
✦ Detailed Answer

Hint & Explanation: Organizations utilize Capital Budgeting models: the Payback Method calculates exactly how many months it takes for the system to pay for itself; the Return on Investment (ROI) provides a percentage yield; and the Net Present Value (NPV) factors in the time-value of money to show true long-term profitability.

Q 13.9 7 Marks
What are the key elements of a successful change management strategy during a major IS rollout?
✦ Detailed Answer

Hint & Explanation: A successful strategy demands active user involvement in the design, comprehensive and ongoing training programs, a phased 'pilot' rollout rather than an abrupt shutdown of old systems, clear communication of the system's benefits to specific job roles, and ensuring usability parameters are met.

Section C — Long Answer

Section C — Long Answer — Long Answer

15 Marks Each
Q 13.10 15 Marks
Evaluate why high-value Information System projects experience catastrophic failure. Detail the primary organizational, managerial, and technical causes. In your response, outline exactly how a Project Manager must utilize Change Management to mitigate user resistance and secure implementation success.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Defining the failure metrics (systems not utilized, drastically over budget, unworkable interfaces).
(ii) Explaining that people inherently resist change because new systems frequently disrupt established power structures and demand arduous retraining.
(iii) Discussing the fatal error of skipping the requirements-gathering phase with actual end-users.
(iv) Outlining change management tactics: appointing localized 'super-users' as ambassadors, demonstrating direct job benefits, offering immense training, and securing an executive sponsor to mandate adoption.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

Q 13.11 15 Marks
A corporation intends to invest $5 Million in a massive new CRM system. Establish a highly structured framework for evaluating the true business value of this system. Discuss how balancing rigorous financial metrics (ROI, TCO) against qualitative/intangible benefits using a multi-criteria scoring model provides a superior strategic assessment.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Why initial acquisition costs are totally deceptive without calculating the Total Cost of Ownership (maintenance, training, downtime).
(ii) Explaining the strict financial models (NPV, ROI) to satisfy financial officers based on projected tangible efficiencies.
(iii) Acknowledging that strict math drastically undervalues CRM systems because customer satisfaction and better strategic vision are intangible.
(iv) Proposing the use of Information System Scoring Models or Portfolio Analysis to weigh both strategic alignment and financial return equally before pulling the trigger on the investment.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

14

Information Systems Security and Control

BBA 2533 — Management Information System — Chapter 14

Section A — Very Short Answer

Section A — Very Short Answer — Very Short Answer

2 Marks Each
Q 14.1 2 Marks
What defines a 'System Vulnerability'?
✦ Detailed Answer

Hint & Explanation: Inherent weaknesses in the design, configuration, or implementation of a network, operating system, or application that can be exploited by an internal or external threat.

Q 14.2 2 Marks
Give two examples of common IS security threats.
✦ Detailed Answer

Hint & Explanation: Malware (including viruses, worms, Trojans, and ransomware) and Phishing (social engineering used to steal credentials via fake emails).

Q 14.3 2 Marks
What is the primary function of a Firewall?
✦ Detailed Answer

Hint & Explanation: A firewall is a massive combination of hardware and software monitoring and controlling all incoming and outgoing network traffic based strictly on predetermined security rules, acting as a gatekeeper.

Q 14.4 2 Marks
What does Encryption do?
✦ Detailed Answer

Hint & Explanation: Encryption uses complex mathematical algorithms to convert plain text data into unreadable cipher-text so that unauthorized interceptors cannot comprehend the data.

Q 14.5 2 Marks
What is System Quality Assurance?
✦ Detailed Answer

Hint & Explanation: The systemic methodology encompassing intense testing, validation, and continuous auditing to ensure an information system functions correctly, securely, reliably, and without deviation from requirements.

Section B — Short Answer

Section B — Short Answer — Short Answer

7 Marks Each
Q 14.6 7 Marks
Categorize and describe the primary sources of vulnerabilities in an Information System.
✦ Detailed Answer

Hint & Explanation: Vulnerabilities arise technically from software bugs (flaws in the code), hardware failures, and unprotected wireless network nodes. They arise behaviorally from poor employee password hygiene, insider threats (malicious employees), and physically from the risk of natural disasters (floods destroying servers).

Q 14.7 7 Marks
Explain the concept of an Information Systems Control Environment.
✦ Detailed Answer

Hint & Explanation: The control environment consists of the policies, procedures, and massive technical measures implemented to safeguard assets, ensure accuracy, and force operational adherence. It is categorized into General Controls (ruling the entire IT infrastructure, like physical server locks) and Application Controls (ruling specific software, like demanding a numeric value in a zip-code field).

Q 14.8 7 Marks
Discuss the specific methods required for ensuring robust System Quality.
✦ Detailed Answer

Hint & Explanation: Achieving high quality demands relentless Software Testing (unit testing, system testing, and brutal user acceptance testing (UAT)), continuous formal Code Reviews, adherence to international QA models (like ISO 9000), and maintaining completely uncompromising Data Cleansing routines so 'garbage data' does not corrupt the system.

Q 14.9 7 Marks
Outline the essential components of an organizational Disaster Recovery Plan and a Business Continuity Plan.
✦ Detailed Answer

Hint & Explanation: A Disaster Recovery Plan provides the exact, intensely detailed technical steps to restore disrupted computing and communications services (e.g., maintaining mirrored servers in a different state). The broader Business Continuity Plan focuses entirely on how the company will continue processing core business operations while the primary IT systems remain utterly offline.

Section C — Long Answer

Section C — Long Answer — Long Answer

15 Marks Each
Q 14.10 15 Marks
Provide a comprehensive analysis of the contemporary security threats devastating modern digital firms. Evaluate both the malicious technical threats (Malware, DoS) and the behavioral threats (Phishing, Insider sabotage). Conclude by designing a robust organizational security posture emphasizing strict access controls, encryption, and comprehensive policies.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) The mechanics of worms, Trojans, and the devastating impact of ransomware locking up hospital or corporate data.
(ii) How Distributed Denial of Service (DDoS) botnets completely crash commercial web servers.
(iii) Why humans are the weakest link: the mechanics of social engineering and careless password sharing.
(iv) Designing the defense: Implementing mandatory Two-Factor Authentication (2FA), placing strict hardware/software Firewalls at network edges, encrypting all data 'at rest' and 'in transit', and performing relentless employee anti-phishing training.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.

Q 14.11 15 Marks
Evaluate the absolute necessity for organizations to establish Information Systems Security and Control frameworks not merely as IT necessities, but as immense legal and strategic requirements. Discuss the catastrophic impact of data breaches on corporate liability and strictly defined regulatory compliance, alongside the implementation of Application and General Controls.
✦ Detailed Answer

Hint & Explanation: A comprehensive answer should cover:
(i) Highlighting that security is no longer just an IT problem but a C-suite liability disaster; a breach instantly destroying consumer trust and plummeting stock value.
(ii) Referencing stringent legal compliance frameworks (such as GDPR, HIPAA for healthcare, or Sarbanes-Oxley for financial records) which mandate crushing fines for negligence.
(iii) Defining exactly how General Controls (data center security, backup plans) and Application Controls (input validation, edit checks) ensure this data integrity.
(iv) The role of the IS Auditor in relentlessly checking these controls to ensure the firm survives an attack.

Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.