Management Information System
Detailed Question Bank
A comprehensive chapter-wise study guide with detailed answers aligned entirely to the rigorous BBA 2533 syllabus core requirements.
Managing the Digital Firm
BBA 2533 — Management Information System — Chapter 1
Section A — Very Short Answer — Very Short Answer
2 Marks EachHint & Explanation: A digital firm is an organization where nearly all significant business relationships with customers, suppliers, and employees are digitally enabled and mediated, relying on continuous digital networks.
Hint & Explanation: Organizations use IS to manage daily operations, support managerial decision-making, coordinate activities globally, and secure a sustainable competitive advantage.
Hint & Explanation: The technical approach focuses on mathematically based models, computer science, and operations research (hardware/software), whereas the behavioral approach focuses on organizational, psychological, and social impacts on the system (people/processes).
Hint & Explanation: Technologies include Cloud Computing, Big Data analytics, the Internet of Things (IoT), and Artificial Intelligence/Machine Learning platforms.
Hint & Explanation: Data represents raw facts and raw streams of observations. Information is data that has been shaped into a meaningful and useful form for human beings.
Section B — Short Answer — Short Answer
7 Marks EachHint & Explanation: Information systems have shifted from being generic back-office support tools to becoming strategic assets. They enable entirely new business models, allow decision-makers to track corporate performance in real-time, facilitate mass customization, and are critical for navigating globalization and ensuring corporate survival against digital disruptors.
Hint & Explanation: The sociotechnical perspective argues that optimal organizational performance is achieved by mutually adjusting both the social and technical systems used in production. It implies that technology alone is not enough; the technology, the people, and the business processes must adapt to one another to avoid friction and implementation failure.
Hint & Explanation: Firms invest in IS to achieve six strategic business objectives: operational excellence, creation of new products and services, customer and supplier intimacy, improved decision-making, competitive advantage, and general survival in a technologically advancing market.
Hint & Explanation: Chief challenges include the high cost of implementation, strong employee resistance to change, integration with legacy systems, and data security risks. These can be addressed through effective change management, phased rollouts, strong strategic alignment, and comprehensive employee training programs.
Section C — Long Answer — Long Answer
15 Marks EachHint & Explanation: A comprehensive answer should cover:
(i)
Defining the digital firm and distinguishing it from traditional paper-based
businesses.
(ii) The six strategic objectives (operational excellence,
new products, customer intimacy, etc.).
(iii) The importance of the
sociotechnical approach in balancing both the technical machinery
(software/hardware) and the human/behavioral aspects (training/culture) to ensure
successful digital transformation.
(iv) Real-world examples of how
cloud computing, mobile tech, and big data structurally alter operations.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Hint & Explanation: A comprehensive answer should cover:
(i)
Detailed explanation of the technical approach (management science, computer
science) and what it provides (efficiency, modeling).
(ii) Detailed
explanation of the behavioral approach (psychology, sociology) and what it provides
(understanding resistance, workflows).
(iii) The strategy combining
them (Sociotechnical design), detailing how addressing technology hardware without
training personnel leads to failure, and highlighting strategies for managing the
disruption caused by IS implementation.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Information Systems in the Enterprise
BBA 2533 — Management Information System — Chapter 2
Section A — Very Short Answer — Very Short Answer
2 Marks EachHint & Explanation: A TPS is a computerized system that performs and records the daily routine transactions necessary to conduct business, serving the operational level (e.g., payroll, order entry).
Hint & Explanation: An ERP system integrates data from key business processes across the entire organization into a single software system so that information can be shared seamlessly by multiple departments.
Hint & Explanation: To manage a firm's interactions with current and prospective customers to optimize revenue, improve customer satisfaction, and improve customer retention.
Hint & Explanation: SCM systems help manage relationships with suppliers, coordinating the flow of materials, information, and financial capital from raw materials to final delivery.
Hint & Explanation: MIS primarily serves middle management by providing reports on the organization's current performance based on data extracted from the underlying TPS.
Section B — Short Answer — Short Answer
7 Marks EachHint & Explanation: The functional perspective views systems as isolated operational 'silos' specific to individual departments (Sales systems, HR systems, Finance systems). The enterprise perspective views processes conceptually cutting across departments, where an action in Sales immediately updates Inventory and Finance through integrated Enterprise Applications.
Hint & Explanation: DSS support middle and upper management in non-routine, semi-structured, and unstructured decision-making. They use complex analytical models, external data, and simulations (e.g., 'What-if' analysis) to help managers solve problems where the procedure for arriving at a solution is not fully predefined.
Hint & Explanation: ESS are designed for senior management. They address non-routine decisions requiring judgment and evaluation, often utilizing visual interfaces like digital dashboards. Unlike TPS, which records granular daily data, ESS aggregates and filters both internal metrics and external trends to give a high-level strategic overview.
Hint & Explanation: Knowledge management consists of processes developed to create, store, transfer, and apply specialized knowledge. Systems like intranets, document management systems, and communities of practice support KM by preventing 'brain-drain' and institutionalizing the specialized expertise of employees into a searchable corporate asset.
Section C — Long Answer — Long Answer
15 Marks EachHint & Explanation: A comprehensive answer should cover:
(i)
Definitions and roles of each system type mapped to operational, middle, and senior
management.
(ii) Explanation of how lower-level systems (TPS) act as
data feeders for higher-level systems (MIS/DSS).
(iii) Examples for
each (e.g., TPS = point of sale, MIS = monthly sales report, DSS = pricing
simulator, ESS = corporate dashboard).
(iv) Integration challenges when
these systems do not communicate properly.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Hint & Explanation: A comprehensive answer should cover:
(i) The
problems of the 'silo' approach (redundant data, slow processes).
(ii)
Detailed explanation of ERP (internal integration of finance/HR/manufacturing), SCM
(external integration with suppliers/logistics), and CRM (managing consumer
relationships across sales/service).
(iii) How integrating these three
components creates an agile, responsive organization capable of executing
just-in-time manufacturing and superior customer personalization.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Information Systems, Organizations, Management and Strategy
BBA 2533 — Management Information System — Chapter 3
Section A — Very Short Answer — Very Short Answer
2 Marks EachHint & Explanation: It is a framework analyzing the strategic environment by measuring five forces: traditional competitors, new market entrants, substitute products/services, supplier power, and buyer power.
Hint & Explanation: A value chain models the sequence of specific activities (inbound logistics, operations, sales) that add value or cost to a firm's product or service.
Hint & Explanation: The financial, psychological, or operational costs a customer incurs when changing from one product, supplier, or system to another.
Hint & Explanation: By providing lower-level employees with the information they need to make decisions autonomously, reducing the need for layers of middle management.
Hint & Explanation: Historical IT investments that cannot be recovered and may cause an organization to resist transitioning to new, more efficient technology.
Section B — Short Answer — Short Answer
7 Marks EachHint & Explanation: Organizations design and implement information systems to achieve specific objectives, while simultaneously, the structure, politics, culture, and workflows of the organization must adapt to the new capabilities and constraints introduced by the IS.
Hint & Explanation: IS reduces the costs of acquiring information, allowing managers to monitor geographically dispersed operations in real-time, speeding up decision-making, increasing precision, and shifting management from a localized to a globalized overview capability.
Hint & Explanation: Firms can use IS (like B2B portals and SCM tools) to integrate closely with multiple suppliers, increasing supplier interdependence, demanding lower prices through greater transparency, or reducing the need for intermediaries altogether.
Hint & Explanation: Synergies occur when the output of some units becomes inputs for others, combining capabilities to lower costs and generate more profit. IS enables synergies by digitally tying together operations of disparate business units, standardizing data, and allowing them to cross-sell to a shared customer base.
Section C — Long Answer — Long Answer
15 Marks EachHint & Explanation: A comprehensive answer should cover:
(i)
Detailed explanation of the five forces.
(ii) How IT reduces threat of
new entrants by raising capital costs.
(iii) How IT counters
substitutes by enhancing product differentiation.
(iv) How IT manages
rivalry by optimizing internal efficiencies for lower prices.
(v) How
IT increases buyer power (e.g., loyalty programs increasing switching costs).
(vi) How IT checks supplier power (e.g., online procurement
marketplaces).
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Hint & Explanation: A comprehensive answer should cover:
(i) The
transition from hierarchical, tall organizations to flattened, decentralized
structures enabled by immediate data access.
(ii) Explanation of
organizational culture and organizational politics as barriers to change.
(iii) The strategic alignment of business strategy with IS goals.
(iv) Change management techniques such as stakeholder engagement,
phased training, and securing top-level management support.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
The Digital Firm: Electronic Business and Electronic Commerce
BBA 2533 — Management Information System — Chapter 4
Section A — Very Short Answer — Very Short Answer
2 Marks EachHint & Explanation: E-Commerce specifically involves buying and selling goods/services over the internet. E-Business encompasses all digital processes required to run the enterprise, including internal inventory management, HR portals, and intranet coordination.
Hint & Explanation: The removal of previously necessary intermediary organizations or business process layers (like distributors or retail storefronts) responsible for intermediary steps in a value chain.
Hint & Explanation: Business-to-Business E-Commerce; electronic sales of goods and services occurring among businesses, such as a manufacturer buying raw materials online from a supplier.
Hint & Explanation: A situation where one party in a transaction possesses more or superior, critical information than the other party.
Hint & Explanation: Goods that can be delivered entirely over a digital network, such as software, music, digital video, and digital publications.
Section B — Short Answer — Short Answer
7 Marks EachHint & Explanation: E-commerce is ubiquitous (available everywhere, anytime), has global reach across national boundaries, operates on universal technological standards, supports rich multimedia formats seamlessly, enables high interactivity, drastically increases information density, and allows for massive personalization and customization.
Hint & Explanation: C2C e-commerce involves consumers selling goods and services directly to other consumers, facilitated by an online platform that acts as a marketplace or broker. Examples include eBay, Craigslist, or local Facebook Marketplace groups, where the platform takes a fee for providing the connection infrastructure.
Hint & Explanation: Opportunities include massive cost reductions due to disintermediation, entry into global markets, and real-time operational efficiency. Challenges include intense pressure to maintain cybersecurity, severe legal and privacy compliance burdens (e.g., GDPR), maintaining consumer trust online, and the continuous need to upgrade rapidly aging IT infrastructure.
Hint & Explanation: Digital goods possess extremely low marginal costs of production (the cost to produce one additional copy is near zero), which lowers prices. E-commerce also provides price transparency, leading to dynamic pricing strategies where prices vary rapidly based on demand and consumer characteristics, compared to fixed shelf prices in traditional retail.
Section C — Long Answer — Long Answer
15 Marks EachHint & Explanation: A comprehensive answer should cover:
(i)
E-commerce business models suitable for them (e-tailer, portal, community provider).
(ii) Necessary internal e-business processes to support operations
(supply chain transparency, payment gateways, cybersecurity).
(iii)
Distinctions between digital goods vs physical goods logistics.
(iv)
Major management challenges such as channel conflict (when their website competes
with their own physical stores), trust and security management, and retraining
personnel.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Hint & Explanation: A comprehensive answer should cover:
(i)
Detailed explanation of disintermediation with an example (e.g., booking a flight
directly with an airline instead of via a travel agent).
(ii)
Definition of reintermediation, where new types of intermediaries emerge
specifically for the digital landscape (e.g., portals like Amazon or booking
aggregators like Expedia).
(iii) How increased price transparency
reduces information asymmetry, making it impossible for sellers to exploit local
monopolies, thus driving market efficiency and consumer power.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Ethical and Social Issue in the Digital Firm
BBA 2533 — Management Information System — Chapter 5
Section A — Very Short Answer — Very Short Answer
2 Marks EachHint & Explanation: The claim and moral right of individuals to be left alone, free from surveillance or unreasonable interference, encompassing the ability to control data regarding themselves.
Hint & Explanation: Intangible property created by individuals or corporations, protected under trade secret, copyright, and patent laws, applying to software, digital art, and proprietary algorithms.
Hint & Explanation: The stark disparity separating those who generally have access to modern information and communication technology (computers, broadband) from those who do not, often based on socioeconomic or geographic factors.
Hint & Explanation: Privacy, Accuracy, Property, and Accessibility — the four major moral dimensions of the information age.
Hint & Explanation: An opt-in model prohibits businesses from collecting data until the consumer explicitly gives permission. An opt-out model assumes permission to collect data unless the consumer explicitly requests the business to stop.
Section B — Short Answer — Short Answer
7 Marks EachHint & Explanation: Accuracy refers to who is morally and legally responsible when a system produces error. If a credit reporting IS generates incorrect data, who is liable for the damages suffered by the individual wrongly denied credit? Organizations must implement rigorous quality assurance and data cleansing protocols to fulfill their ethical responsibility for data accuracy.
Hint & Explanation: By combining data from multiple sources (credit card purchases, location data, browsing history), firms create extensive, highly revealing profiles of individuals without their explicit knowledge. This creates an ethical tension between leveraging data for highly customized marketing efficiency and violating intrinsic expectations of personal privacy and autonomy.
Hint & Explanation: IT professional codes emphasize taking responsibility for work, minimizing negative impacts on stakeholders, honoring contracts and agreements, respecting intellectual property rights, safeguarding data privacy, avoiding conflicts of interest, and proactively identifying and mitigating system vulnerabilities.
Hint & Explanation: Digital technology makes it exceedingly easy and almost costless to instantly copy and distribute IP across borders. Legal protections include copyrights (protecting expression), patents (protecting underlying ideas/functions), and trade secrets, but enforcement remains a massive challenge across divergent global legal jurisdictions.
Section C — Long Answer — Long Answer
15 Marks EachHint & Explanation: A comprehensive answer should cover:
(i)
Defining the digital divide and its manifestation across socioeconomic boundaries
globally and locally.
(ii) The impact of rapid IS integration on job
displacement, automation, and the shifting required skill sets.
(iii)
Societal consequences such as loss of boundaries between work and family time, and
health risks (RSI, screen fatigue).
(iv) Suggested mitigation measures
including government policy on broadband infrastructure, corporate social
responsibility in skills retraining, and ethical deployment of job-automating AI.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Hint & Explanation: A comprehensive answer should cover:
(i)
Privacy: How the hospital must implement stringent data access controls and opt-in
frameworks to protect sensitive health profiles.
(ii) Accuracy: The
critical, literal life-or-death risk if patient drug allergies are recorded
incorrectly, assigning liability for systemic errors.
(iii) Property:
Resolving who actually 'owns' the health data—the patient, the hospital, or the
software vendor.
(iv) Accessibility: Ensuring that patients,
potentially those elderly or without advanced computer literacy, have fair, secure
means to access their own digital records.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Managing Hardware and Software Assets
BBA 2533 — Management Information System — Chapter 6
Section A — Very Short Answer — Very Short Answer
2 Marks EachHint & Explanation: Hardware consists of the physical devices used to input, process, store, and output data and information, including mainframes, servers, PCs, and peripheral devices.
Hint & Explanation: System software manages the hardware and generic computer operations (e.g., Windows, Linux operating systems). Application software performs specific tasks for users (e.g., Microsoft Word, SAP ERP).
Hint & Explanation: A server is a computer specifically optimized to provide software and other resources (like databases or web pages) to other computers over a network.
Hint & Explanation: Software that provides free access to its program source code, allowing users to modify, study, and distribute it (e.g., Apache Web Server, Linux).
Hint & Explanation: TCO is a financial estimate helping managers determine the direct and indirect costs of owning a technology system, including hardware acquisition, software licenses, training, technical support, and eventual disposal.
Section B — Short Answer — Short Answer
7 Marks EachHint & Explanation: Organizations use: PCs for individual productivity; Workstations for intensive graphical/mathematical jobs; Servers for hosting databases, web applications, and network management; Mainframes for massive, centralized transaction processing (like airline reservations); and Supercomputers for advanced scientific modeling.
Hint & Explanation: Cloud computing delivers computing services over the internet. IaaS provides basic storage/hardware capabilities. PaaS offers development environments for programmers. SaaS delivers complete software applications (e.g., Google Workspace). Benefits include drastically reduced upfront capital costs, infinite scalability, and immediate access to updates without manual installation.
Hint & Explanation: Managers struggle with rapid technological obsolescence (hardware becoming outdated quickly), software licensing compliance (preventing piracy audits), escalating maintenance and power consumption costs, and the challenge of integrating legacy systems with deeply modern cloud-based apps.
Hint & Explanation: Legacy systems are critically important, older transaction processing systems (often running on mainframes) that are extremely expensive and risky to replace. They are difficult to manage because original programmers may have retired, documentation is often poor, and integrating them with newer mobile/web interfaces is technically complex.
Section C — Long Answer — Long Answer
15 Marks EachHint & Explanation: A comprehensive answer should cover:
(i)
Defining traditional local servers vs renting remote capacity.
(ii)
Cost transition from CapEx (buying expensive servers) to OpEx (paying monthly
subscriptions).
(iii) Security analysis (control of physical hardware
vs trusting a major cloud vendor like AWS).
(iv) How the university can
easily scale during high-traffic periods (exam registrations).
(v)
Utilization of SaaS for student email and LMS systems.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Hint & Explanation: A comprehensive answer should cover:
(i)
Clear definitions separating the OS from productivity/enterprise applications.
(ii) Strategic adoption of open-source alternatives (like Linux for
servers) to eliminate licensing fees while noting the offset in support costs.
(iii) Detailed breakdown of TCO showing that original acquisition cost
is only 20% of the true cost, highlighting the hidden costs of downtime, training,
and maintenance, and suggesting centralized IT purchasing to prevent departmental
'shadow IT'.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Managing Data Resources
BBA 2533 — Management Information System — Chapter 7
Section A — Very Short Answer — Very Short Answer
2 Marks EachHint & Explanation: A DBMS is specific software that permits an organization to centralize data, manage it efficiently, and provide applications with seamless access to stored data.
Hint & Explanation: It led to severe data redundancy (duplicate data in multiple files) and data inconsistency (same attribute having different values across files).
Hint & Explanation: A situation in traditional file systems where changes in the software program require corresponding changes to the data it accesses, making updates extremely difficult.
Hint & Explanation: A type of database that organizes data into two-dimensional tables (relations) with columns and rows, capable of linking tables based on common data elements.
Hint & Explanation: Massive sets of unstructured, semi-structured, and structured data whose volume, velocity, and variety are too immense to be captured and processed by traditional relational DBMS.
Section B — Short Answer — Short Answer
7 Marks EachHint & Explanation: A database approach drastically reduces data redundancy and inconsistency, uncouples programs and data (program-data independence), increases flexibility, tightens security (through centralized access controls), and greatly facilitates data sharing and availability across disparate enterprise applications.
Hint & Explanation: Creating a database environment requires: (1) Enterprise data planning and requirement analysis; (2) Conceptual design (creating an Entity-Relationship Diagram outlining relationships); (3) Logical and Physical design (translating the concept into actual tables/fields in the DBMS); and (4) Establishing strict data governance and data cleansing policies to ensure accuracy.
Hint & Explanation: Standard queries answer specific known questions (e.g., 'How many blue shirts were sold?'). Data mining uses complex algorithms to find hidden patterns, correlations, and anomalies in massive data sets to forecast future behavior (e.g., uncovering that customers who buy blue shirts often buy sunglasses the next week).
Hint & Explanation: Trends show a massive shift toward NoSQL databases, which handle unstructured data (like social media posts or machine sensors) better than relational systems by not requiring an upfront table schema. Furthermore, Cloud Databases like Amazon RDS allow firms to scale database capacity instantly without purchasing local storage arrays.
Section C — Long Answer — Long Answer
15 Marks EachHint & Explanation: A comprehensive answer should cover:
(i)
Detailed explanation of redundancy, inconsistency, lack of flexibility, and poor
security in file systems.
(ii) How the DBMS acts as an interface
between applications and physical data files.
(iii) The design process:
identifying entities (e.g., CUSTOMER, ORDER), defining attributes, mapping
relationships (1-to-many), and ensuring normalization to eliminate repeating groups.
(iv) The organizational requirement of a data dictionary and strict
data governance policies.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Hint & Explanation: A comprehensive answer should cover:
(i)
Defining Volume, Velocity, and Variety.
(ii) Why traditional SQL
relational models struggle with unstructured data streams (tweets, videos, sensor
logs), forcing the adoption of flexible NoSQL frameworks.
(iii)
Differentiating a Data Warehouse (structured historical data for reporting) from a
Data Lake (a massive pool of raw, unformatted data).
(iv) How advanced
predictive analytics turn this vast storage into actionable intelligence, such as
real-time dynamic pricing algorithms or predictive machine maintenance.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Telecommunications and Networks
BBA 2533 — Management Information System — Chapter 8
Section A — Very Short Answer — Very Short Answer
2 Marks EachHint & Explanation: Two or more connected computers established to share resources (like printers/files), transmit data, and facilitate electronic communications.
Hint & Explanation: A Local Area Network (LAN) connects computers within a limited physical geography like an office building. A Wide Area Network (WAN) spans broader geographic distances—entire states or continents (e.g., the Internet).
Hint & Explanation: A specialized network device that forwards data packets between computer networks, determining the most efficient path for the data to travel across interconnected networks.
Hint & Explanation: The maximum capability or physical capacity of a communications channel, usually measured in bits per second (bps) or Megabits per second (Mbps).
Hint & Explanation: A secure, encrypted, private network that runs over the public Internet, allowing remote users to securely access corporate systems.
Section B — Short Answer — Short Answer
7 Marks EachHint & Explanation: A telecommunications system fundamentally contains: sender/receiver computers; network interfaces (NIC); a communication medium (copper wire, fiber-optic cable, or wireless radio waves); specialized hardware (switches to connect local devices, routers to connect networks); and Network Operating System (NOS) software to route traffic and manage access.
Hint & Explanation: Transmission Control Protocol/Internet Protocol (TCP/IP) is the foundational, open communication standard of the internet. It breaks complex data into smaller 'packets', routes them individually via the IP address, and reliably reassembles them at the destination using TCP, ensuring seamless global interoperability across different localized hardware types.
Hint & Explanation: Copper wire transmits data via electrical pulses; it is cheap and easy to install but suffers from slower speeds and interference over long distances. Fiber-optic cable transmits data as pulses of light through glass strands; it handles vastly larger bandwidth, experiences zero electromagnetic interference, and travels enormous distances, but is much more expensive and difficult to splice.
Hint & Explanation: Wireless networks (WiFi, 4G/5G, Bluetooth) untether workers and consumers from physical offices. They enable mobile commerce (m-commerce), real-time logistics tracking (RFID tags on shipments), continuous field-sales updates, and push notifications to local consumers based on GPS mapping technologies.
Section C — Long Answer — Long Answer
15 Marks EachHint & Explanation: A comprehensive answer should cover:
(i)
Deploying LANs (Ethernet/WiFi) inside each distribution hub.
(ii)
Connecting these hubs globally via a massive WAN.
(iii) Recommending
Fiber-optics for the massive data backbone between continents, and Satellite/4G for
remote, rural hubs.
(iv) Utilizing specialized routers and switches to
manage logistics data traffic efficiently.
(v) Emphasizing the absolute
necessity of a VPN to encrypt internal transit communications over the public
internet, shielded locally by hardware firewalls.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Hint & Explanation: A comprehensive answer should cover:
(i) The
historical limitation of circuit-switched, proprietary analog phone networks vs the
modern efficiency of digital packet-switching.
(ii) The detailed role
of TCP/IP as the universal language allowing any device to talk to any other device.
(iii) How fiber-optics removed bandwidth bottlenecks, allowing
high-density e-commerce operations (like streaming Netflix or real-time
high-definition video conferencing).
(iv) How these low-cost global
communications drastically lower entry barriers for small digital firms.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
The Internet and the New Information Technology Infrastructure
BBA 2533 — Management Information System — Chapter 9
Section A — Very Short Answer — Very Short Answer
2 Marks EachHint & Explanation: A unique string of 32-bit (IPv4) or 128-bit (IPv6) numbers assigned to every device connected to the internet that identifies its unique network location.
Hint & Explanation: DNS translates human-readable domain names (e.g., 'google.com') into their corresponding numerical IP addresses (e.g., '142.250.190.46') so computers can route requests properly.
Hint & Explanation: A system with universally accepted standards (HTTP, HTML) for storing, formatting, and retrieving information structured via hyperlink pages across the internet.
Hint & Explanation: An internal, private network inside an organization that utilizes identical internet architecture and web standards but is heavily firewalled and accessible only to employees.
Hint & Explanation: Technologies include SSL/TLS (Secure Sockets Layer) for encrypting payment transmission, Digital Certificates for platform verification, and Electronic Payment Gateways.
Section B — Short Answer — Short Answer
7 Marks EachHint & Explanation: It has shifted away from isolated, rigid, mainframes towards high-speed, ubiquitous Internet connectivity supporting a mix of Cloud Computing clusters, massive mobile hardware adoption (smartphones/tablets), and the Internet of Things (IoT). The focus is entirely on seamless, scalable integration of diverse web services via standardized APIs.
Hint & Explanation: Hypertext Transfer Protocol (HTTP) is the foundational communications protocol determining how web clients (browsers) request documents and how web servers deliver them. Hypertext Markup Language (HTML) is the formatting language used to structure the text, links, and media within the documents delivered. HTTP delivers the package; HTML tells the browser how to open and display it.
Hint & Explanation: Running an e-business requires a web server to host pages, an application server to execute business logic, a high-speed database to store inventory/catalog items, and a merchant payment gateway to process credit cards securely using robust SSL/TLS encryption protocols to ensure data cannot be intercepted mid-transit.
Hint & Explanation: Significant management challenges include dealing with severe cybersecurity vulnerabilities associated with being continuously connected globally, managing escalating bandwidth and cloud storage costs, avoiding vendor lock-in with massive cloud providers, and overcoming data privacy/legal hurdles across varying international jurisdictions.
Section C — Long Answer — Long Answer
15 Marks EachHint & Explanation: A comprehensive answer should cover:
(i)
Explanation of the Internet as a network of networks relying on IP routing and
packet switching.
(ii) Detail how a user typing a URL triggers a DNS
query to find an IP address.
(iii) The client/server model: the browser
(client) sends an HTTP request to an origin web server.
(iv) The server
responding with HTML scripts, which the browser renders into the multimedia pages we
consume.
(v) How this standardized, open nature birthed global
E-commerce by eliminating proprietary software barriers.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Hint & Explanation: A comprehensive answer should cover:
(i)
Defining organizational agility—the ability to respond instantly to market demands
using scalable cloud resources and ubiquitous mobile worker access.
(ii) The drastic reduction in upfront capital required to launch new
global services.
(iii) Governance issues: outlining the severe
existential business risks of critical cloud outages, cyber attacks (DDoS,
ransomware), and stringent data sovereignty laws.
(iv) The management
decision to balance innovation speed with strict, enforced compliance and disaster
recovery architectures.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Knowledge Management for The Digital Firm
BBA 2533 — Management Information System — Chapter 10
Section A — Very Short Answer — Very Short Answer
2 Marks EachHint & Explanation: The set of business processes developed in an organization to systematically create, store, transfer, and apply existing and new knowledge.
Hint & Explanation: Explicit knowledge is formal, documented, and codified (e.g., procedure manuals, databases). Tacit knowledge exists within an employee's mind, derived from personal experience, and is extremely difficult to formally codify or transfer.
Hint & Explanation: An expert system is a restrictive form of AI that captures human expertise in a highly specific domain as a set of rules (If-Then statements) deployed in a software system to automate decision-making.
Hint & Explanation: Systems that support data processing and clerical workers (e.g., secretaries or accountants) primarily focused on processing and distributing existing information using word processors or basic databases.
Hint & Explanation: Informal social networks of professionals within an organization who share similar work-related activities, interests, and expertise, facilitating natural tacit knowledge transfer.
Section B — Short Answer — Short Answer
7 Marks EachHint & Explanation: The KM value chain includes: (1) Knowledge Acquisition (discovering patterns via data mining or building expert networks); (2) Knowledge Storage (document management systems and expert databases); (3) Knowledge Dissemination (intranets, email, collaborative portals); and (4) Knowledge Application (incorporating this knowledge directly into enterprise business processes and executive decisions).
Hint & Explanation: A KWS supports highly specialized knowledge workers (scientists, architects, engineers) in discovering and creating entirely new knowledge to integrate into the firm. An example is Computer-Aided Design (CAD) software, which allows engineers to create, test, and instantly modify complex 3D industrial blueprints without building physical prototypes.
Hint & Explanation: Unlike traditional databases that just store facts, AI simulates human reasoning. Machine Learning algorithms parse vast data sets to autonomously 'learn' and detect complex patterns that human analysts cannot perceive. They enhance KM by automating data categorization, recognizing speech/images effortlessly, and providing dynamic predictive intelligence.
Hint & Explanation: Fuzzy Logic is a rule-based technology that tolerates imprecision by using continuous values rather than stark True/False binary logic (used in autofocus cameras or washing machines). Intelligent Agents are background software programs that carry out specific, repetitive, predictable tasks for a user, such as continuously crawling the web to find the lowest price for raw materials.
Section C — Long Answer — Long Answer
15 Marks EachHint & Explanation: A comprehensive answer should cover:
(i)
Defining knowledge as a unique asset that inherently increases in value when shared.
(ii) The tactical differences in managing explicit knowledge (via
standard document management repositories and firm databases) versus tacit knowledge
(via employee directories profiling specific expertise and fostering
physical/digital Communities of Practice).
(iii) Outlining an
Enterprise-wide KM System (an intranet portal tying everything together).
(iv) Highlighting the behavioral challenge: managers must implement
reward structures that actively incentivize employees to document and share their
knowledge before they retire or resign (combating corporate amnesia).
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Hint & Explanation: A comprehensive answer should cover:
(i)
Distinguishing between general clerical IS and highly specialized KWS (mentioning
power requirements and massive data access for engineers/financial modelers).
(ii) Providing a deep dive into Expert Systems outlining how human
heuristic knowledge translates into 'If/Then' rules.
(iii) The massive
utility of Machine Learning in continuously analyzing data without explicit
programming.
(iv) Examples of Intelligent agents reducing worker strain
(spam checkers, automated logistics routers).
(v) The overall business
outcome: converting abstract human capital into scalable digital operations.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Enhancing Management Decision making for the Digital Firm
BBA 2533 — Management Information System — Chapter 11
Section A — Very Short Answer — Very Short Answer
2 Marks EachHint & Explanation: A DSS is an interactive information system designed to assist middle management in making semi-structured and unstructured decisions by analyzing raw data and executing sophisticated analytical models.
Hint & Explanation: Structured decisions are routine and predefined (e.g., payroll processing). Unstructured decisions require judgment and insight (e.g., entering a new market). Semi-structured decisions contain elements of both.
Hint & Explanation: An interactive computer-based system designed to facilitate the solution of unstructured problems by a set of decision-makers working collaboratively as a group in the same room or remotely.
Hint & Explanation: An information system designed exclusively for senior executives, distilling internal and external data into a high-level digital dashboard prioritizing key performance indicators (KPIs) to aid strategic planning.
Hint & Explanation: A primary capability is 'What-if' analysis, working forward from known or assumed conditions to predict various outcomes based on altering specific variables (e.g., changing price points).
Section B — Short Answer — Short Answer
7 Marks EachHint & Explanation: The process involves: (1) Intelligence (discovering and identifying the problem in the organization); (2) Design (identifying and exploring various solutions); (3) Choice (selecting the best among the alternatives); and (4) Implementation (executing the decision and monitoring the outcome).
Hint & Explanation: An ESS helps a CEO by eliminating the overwhelming avalanche of granular data. It provides intuitive visualizations (graphs, dials) displaying only the critical KPIs aligned with company strategy, while retaining the capacity to 'drill down' into specific operational details if a problem is detected.
Hint & Explanation: A GDSS removes meeting bottlenecks by allowing all participants to simultaneously input ideas anonymously. This eliminates the fear of criticizing superiors ('groupthink'), prevents dominant personalities from hijacking the meeting, and automatically records all brainstormed proposals into a structured, voteable matrix.
Hint & Explanation: BI platforms form the data foundation of a modern DSS. They integrate data from ERPs, external markets, and databases, cleaning it and presenting it to managers through powerful querying tools (OLAP), ad-hoc reports, and dashboards, enabling highly informed 'What-if' modeling.
Section C — Long Answer — Long Answer
15 Marks EachHint & Explanation: A comprehensive answer should cover:
(i)
Defining the structured, predefined routine reports of an MIS based strictly on
internal TPS data.
(ii) Contrasting this with the flexible,
user-directed nature of a DSS, which pulls from diverse internal/external databases.
(iii) Focusing on DSS analytical tools like sensitivity analysis,
goal-seeking analysis, and OLAP cubes.
(iv) Using an example: an MIS
generating a weekly sales summary vs a DSS simulating profit margins if shipping
costs increase by 15%.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Hint & Explanation: A comprehensive answer should cover:
(i)
Defining the Balanced Scorecard model: translating strategy into operational metrics
across four dimensions (financial, customer, business process, and learning/growth).
(ii) How an ESS dynamically pulls data corresponding specifically to
those KPIs.
(iii) The importance of visual simplicity
(dashboards/color-coding) to save executive time.
(iv) Exploring the
'Drill-Down' function: allowing an executive to see a red warning light in regional
sales, click it, and drill down to the specific poorly performing store without
needing to consult a lower manager.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Redesigning the Organization with Information Systems
BBA 2533 — Management Information System — Chapter 12
Section A — Very Short Answer — Very Short Answer
2 Marks EachHint & Explanation: The fundamental rethinking and radical, start-from-scratch redesign of existing business processes to achieve dramatic improvements in massive cost, quality, service, and speed.
Hint & Explanation: The complete life cycle activities encompassing the analysis, design, implementation, and maintenance of an information system to solve an organizational problem.
Hint & Explanation: Building an experimental, scaled-down system rapidly and inexpensively for end-users to evaluate and refine requirements before building the massive final system.
Hint & Explanation: The Systems Development Life Cycle: the oldest, highly structured method for building IS, progressing purely linearly through strict stages (Planning, Analysis, Design, Implementation, Maintenance).
Hint & Explanation: The creation of information systems entirely by the actual end-users without technical assistance from corporate programmers, typically using modern, intuitive software tools.
Section B — Short Answer — Short Answer
7 Marks EachHint & Explanation: The SDLC involves: (1) Systems Analysis (defining the precise problem and requirements); (2) Systems Design (crafting the technical and hardware specifications); (3) Programming (writing the actual code); (4) Testing (verifying the system performs exactly as intended); (5) Conversion (transitioning from the old system to the new); and (6) Production/Maintenance (post-launch support).
Hint & Explanation: TQM (like Kaizen) focuses on constant, incremental, small improvements driven generally by operational employees. BPR is top-down, massive, incredibly disruptive, and specifically completely ignores the old way of working in favor of designing a radically new workflow engineered entirely around new IS capabilities.
Hint & Explanation: RAD is a process used to create workable systems in a very short amount of time using robust visual programming tools, pre-built coding modules, and intense, continuous teamwork between developers and actual users to drastically accelerate the SDLC.
Hint & Explanation: Advantages include drastically reduced domestic labor costs, access to massive specialized global skills, and freeing internal IT teams to focus on core strategic business. Severe risks include losing intense control over code quality, devastating 'scope creep' driving up unseen backend costs, communication breakdowns caused by cultural/time-zone differences, and catastrophic losses of proprietary data.
Section C — Long Answer — Long Answer
15 Marks EachHint & Explanation: A comprehensive answer should cover:
(i)
Defining automation (speeding up tasks) and rationalization of procedures
(streamlining bottlenecks) as low-risk, low-reward changes.
(ii)
Defining BPR (radically redesigning workflows) and Paradigm Shifts (entirely
redefining the nature of the business) as tremendously high-reward but possessing a
brutally high failure rate.
(iii) Arguing why inserting new technology
into an outdated, poorly designed process is useless without simultaneous structural
and cultural change.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Hint & Explanation: A comprehensive answer should cover:
(i)
Analyzing the massive, rigid bureaucracy of the SDLC ('Waterfall' method) and why
it's excellent for gigantic, mission-critical systems (like banking mainframes)
where requirements are perfectly known upfront and errors are catastrophic.
(ii) Explaining how Prototyping is vastly superior for user-interface
design or when the user doesn't actually know what they want until they see it.
(iii) Addressing how End-User Development is brilliant for small
departmental tasks but frequently causes severe data non-compliance issues.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Understanding the Business Value of Systems and Managing Change
BBA 2533 — Management Information System — Chapter 13
Section A — Very Short Answer — Very Short Answer
2 Marks EachHint & Explanation: It represents the tangible (financial profit, reduced costs) and intangible (improved decision-making, greater customer loyalty) benefits generated directly by deploying an IS.
Hint & Explanation: Failures often result not from technological flaws, but from extremely poor project management, severe organizational resistance, lack of executive leadership, and poorly defined user requirements.
Hint & Explanation: The methodical process of guiding an organization's people, workflows, and culture smoothly through the disruptive transition caused by implementing a massive new information system.
Hint & Explanation: A strict financial metric calculating the net financial benefits of an IT investment directly divided by the total costs of implementing the system to determine profitability.
Hint & Explanation: A project management failure where the features, goals, and requirements of the information system continually expand beyond the original plan, causing devastating delays and budget overruns.
Section B — Short Answer — Short Answer
7 Marks EachHint & Explanation: Tangible benefits can be strictly quantified mathematically (e.g., $50,000 saved per month due to reduced paperwork, or a specific 15% increase in sales). Intangible benefits cannot be strictly quantified mathematically but profoundly impact the organization (e.g., higher employee morale, faster executive decision-making, enhanced corporate reputation).
Hint & Explanation: If end-users are utterly excluded during the system design phase, they will actively reject the system upon launch out of fear or frustration. Furthermore, without highly visible, uncompromising support from top executive management, mid-level staff will simply refuse to abandon the legacy systems they are comfortable with.
Hint & Explanation: Organizations utilize Capital Budgeting models: the Payback Method calculates exactly how many months it takes for the system to pay for itself; the Return on Investment (ROI) provides a percentage yield; and the Net Present Value (NPV) factors in the time-value of money to show true long-term profitability.
Hint & Explanation: A successful strategy demands active user involvement in the design, comprehensive and ongoing training programs, a phased 'pilot' rollout rather than an abrupt shutdown of old systems, clear communication of the system's benefits to specific job roles, and ensuring usability parameters are met.
Section C — Long Answer — Long Answer
15 Marks EachHint & Explanation: A comprehensive answer should cover:
(i)
Defining the failure metrics (systems not utilized, drastically over budget,
unworkable interfaces).
(ii) Explaining that people inherently resist
change because new systems frequently disrupt established power structures and
demand arduous retraining.
(iii) Discussing the fatal error of skipping
the requirements-gathering phase with actual end-users.
(iv) Outlining
change management tactics: appointing localized 'super-users' as ambassadors,
demonstrating direct job benefits, offering immense training, and securing an
executive sponsor to mandate adoption.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Hint & Explanation: A comprehensive answer should cover:
(i) Why
initial acquisition costs are totally deceptive without calculating the Total Cost
of Ownership (maintenance, training, downtime).
(ii) Explaining the
strict financial models (NPV, ROI) to satisfy financial officers based on projected
tangible efficiencies.
(iii) Acknowledging that strict math drastically
undervalues CRM systems because customer satisfaction and better strategic vision
are intangible.
(iv) Proposing the use of Information System Scoring
Models or Portfolio Analysis to weigh both strategic alignment and financial return
equally before pulling the trigger on the investment.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Information Systems Security and Control
BBA 2533 — Management Information System — Chapter 14
Section A — Very Short Answer — Very Short Answer
2 Marks EachHint & Explanation: Inherent weaknesses in the design, configuration, or implementation of a network, operating system, or application that can be exploited by an internal or external threat.
Hint & Explanation: Malware (including viruses, worms, Trojans, and ransomware) and Phishing (social engineering used to steal credentials via fake emails).
Hint & Explanation: A firewall is a massive combination of hardware and software monitoring and controlling all incoming and outgoing network traffic based strictly on predetermined security rules, acting as a gatekeeper.
Hint & Explanation: Encryption uses complex mathematical algorithms to convert plain text data into unreadable cipher-text so that unauthorized interceptors cannot comprehend the data.
Hint & Explanation: The systemic methodology encompassing intense testing, validation, and continuous auditing to ensure an information system functions correctly, securely, reliably, and without deviation from requirements.
Section B — Short Answer — Short Answer
7 Marks EachHint & Explanation: Vulnerabilities arise technically from software bugs (flaws in the code), hardware failures, and unprotected wireless network nodes. They arise behaviorally from poor employee password hygiene, insider threats (malicious employees), and physically from the risk of natural disasters (floods destroying servers).
Hint & Explanation: The control environment consists of the policies, procedures, and massive technical measures implemented to safeguard assets, ensure accuracy, and force operational adherence. It is categorized into General Controls (ruling the entire IT infrastructure, like physical server locks) and Application Controls (ruling specific software, like demanding a numeric value in a zip-code field).
Hint & Explanation: Achieving high quality demands relentless Software Testing (unit testing, system testing, and brutal user acceptance testing (UAT)), continuous formal Code Reviews, adherence to international QA models (like ISO 9000), and maintaining completely uncompromising Data Cleansing routines so 'garbage data' does not corrupt the system.
Hint & Explanation: A Disaster Recovery Plan provides the exact, intensely detailed technical steps to restore disrupted computing and communications services (e.g., maintaining mirrored servers in a different state). The broader Business Continuity Plan focuses entirely on how the company will continue processing core business operations while the primary IT systems remain utterly offline.
Section C — Long Answer — Long Answer
15 Marks EachHint & Explanation: A comprehensive answer should cover:
(i) The
mechanics of worms, Trojans, and the devastating impact of ransomware locking up
hospital or corporate data.
(ii) How Distributed Denial of Service
(DDoS) botnets completely crash commercial web servers.
(iii) Why
humans are the weakest link: the mechanics of social engineering and careless
password sharing.
(iv) Designing the defense: Implementing mandatory
Two-Factor Authentication (2FA), placing strict hardware/software Firewalls at
network edges, encrypting all data 'at rest' and 'in transit', and performing
relentless employee anti-phishing training.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.
Hint & Explanation: A comprehensive answer should cover:
(i)
Highlighting that security is no longer just an IT problem but a C-suite liability
disaster; a breach instantly destroying consumer trust and plummeting stock value.
(ii) Referencing stringent legal compliance frameworks (such as GDPR,
HIPAA for healthcare, or Sarbanes-Oxley for financial records) which mandate
crushing fines for negligence.
(iii) Defining exactly how General
Controls (data center security, backup plans) and Application Controls (input
validation, edit checks) ensure this data integrity.
(iv) The role of
the IS Auditor in relentlessly checking these controls to ensure the firm survives
an attack.
Study Tip: Detailed long answer questions must have a structured approach. Use headings to separate the required parts of the question, and elaborate heavily using examples from the core text.