True Or False s2
Total Page:16
File Type:pdf, Size:1020Kb
Name
MIS 2101 Sample Final Exam Fall 2008 Time Allotted: 2 hours
Instructions: This sample exam is designed to demonstrate the type of questions that will be answered in the final exam for MIS 2101. The actual questions and number of questions in the final exam may be different. You can answer these questions as well as view answers posted by other students’ on the online discussion board at http://mis.temple.edu/mis2101 (under the category “Question Bank”). The exam is open book / open notes and has three components. Part A is True/False, Part B is multiple choice/fill in the blanks, and Part C is short answer type. Please read all instructions carefully before attempting any part. Write your name on each page. Please limit your answers to the space provided.
Part A: True or False (Give reasons to support your answer – in one or two lines to receive full points) - 3 points each
1. The internet is widely used both by businesses and consumers. Therefore, it would currently lie in the “peak of inflated expectations phase” of the Gartner’s Hype cycle.
2. Cyber-squatting is a term used to describe a virus that infects a target computer, but lays dormant until triggered on a preset date.
3. By using state-of-the-art security technology, a firm can reduce the probability of being breached to zero.
Sample Final Exam Fall 2008 1/8 Name
4. The archiving functionality in SAP can help an organization comply with regulations such as the Sarbanes-Oxley.
5. Cyber-criminals always need to be highly technically sophisticated to commit a computer crime such as obtaining people’s confidential information.
Sample Final Exam Fall 2008 2/8 Name
Part B: Multiple Choice Answers (Choose one correct answer. No credit will be given for multiple answer or answers which are not clear) / Fill in the blanks – 2 points each
1. A category of SAP data which is relatively stable and includes data on materials, customers and vendors is known as …………………..
2. ……………. is a collection of techniques used to manipulate people into performing actions or divulging confidential information.
3. ______attacks occur when electronic intruders deliberately attempt to prevent legitimate users from using that service.
4. A ______refers to the flow of information through a set of business activities, in which information flows through functional areas that facilitate the internal activities of the business.
5. Which of the following is true about SAP? A. SAP works on a client / server architecture B. The SAP client is usually a laptop or computer where users work with SAP C. SAP uses an application server and a database server D. All the above E. None of the above
6. Technology is said to ______when we take a manual process (done by hand) and use computers to perform the task. A. automate B. informate C. strategize D. compete
Part C: Short Answer Type (Please try to restrict your answer to the space provided; however, if you need extra space for any question, you can make use of the back of the sheet or the extra sheet on Page 9. Please mark the question number clearly if you are using extra space) – 5 points each
Will & Sons, a manufacturer of sports goods, has hired you as an IT consultant to oversee implementation of its SAP enterprise solution. The existing IT infrastructure at Will & Sons is similar to Fitter Snacker where different functional areas have their own information systems which are not connected to the information
Sample Final Exam Fall 2008 3/8 Name systems of other functional areas. Your job is to advise the top management on technology related business issues. Here are some potential situations that you are likely to encounter.
1. Will & Sons implemented a supply chain management (SCM) system a year ago, but the CEO is not convinced that the SCM system is a success. Advise the CEO on what performance measures his company can use to judge the success of the SCM system (list and describe three such measures).
2. Last year, a clerk at Will & Sons defrauded the company of hundreds of thousands of dollars by processing a single fraudulent purchase order and sending payment to a fictitious vendor in the Cayman Islands. He then deleted the vendor from the computer records and no one could trace how the fraud was committed. Explain two ways in which an enterprise system such as SAP can help prevent such fraud.
Sample Final Exam Fall 2008 4/8 Name
3. At a crucial executive meeting, the CIO has to convince top management that the ERP project is necessary for the company. He says, “If we don’t implement this enterprise resource planning system, we’ll get killed by our competitors because they’re all implementing these kinds of systems……We either do this or we die”. In light of our class discussion on valuing IT investments, what type of an argument is this? Also, list and briefly explain other types of arguments for making a business case for information systems.
4. The VP - Legal of Will & Sons recently watched the video “No Place to Hide”. She would like to know why information privacy is such a big issue these days. What would you answer the VP – Legal? List and explain any three reasons.
Sample Final Exam Fall 2008 5/8 Name
5. The CFO at Will & Sons has heard from other companies that more than 50% ERP projects fail. Explain to him three common mistakes companies make while implementing ERP and how you, as a consultant, are going to avoid making these mistakes at Will & Sons.
6. The VP marketing at Will & Sons thinks that the marketing information system at the company is running fine, and is skeptical about shifting to an ERP system. Explain to the VP marketing how her team can benefit from an enterprise system which integrates marketing with other functional areas such as production, accounting etc. List and explain three reasons.
Sample Final Exam Fall 2008 6/8 Name
7. Enlighten the CEO of Will & Sons on any three differences between sustaining and disruptive technologies. Also give three examples each of sustaining and disruptive technologies
Bonus Questions – for extra credit ( 3 points each)
1. What was your team’s project in the ‘Emerging Technologies’ presentation? List three reasons why you think that the technology will / will not be successful.
Sample Final Exam Fall 2008 7/8 Name
Extra Space
Sample Final Exam Fall 2008 8/8