Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Information Technologyss March 2023

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

INFORMATION TECHNOLOGY

MARCH 2023 SUGGESTED SOLUTIONS


QUESTION 1 (TOTAL 40 MARKS)
a) Type of information system (according to the management groups) is used in this case?
- It’s a TPS since this system is responsible for the daily and routine activities at the
operational level of the management. At this level decision making is highly
structured
- In this case the system is responsible for recording the daily activities (invoices) on
the system and to control the internal data and work on the operational level only.
b) Strategic business objective(s) could be addressed by this system?
- The operational excellence: where using the system to make the processes more
efficient based on the right technology.
- In this case the waiters can use the handled device to enter the invoice on the POS
system faster and by WIFI automatically transforming the order to the kitchen saving
time and errors
- Customer intimacy: using the system to make the relation with the customer more
loyal and intimate. In this case customers are better served, faster and even the invoice
is printed directly when closing the table.
c) Technology components used in this case:-
- Server / back-office computer/ handled device / POS system / application for
accounting and sales / printers /
d) Securing restaurant information system:-
- Physical security: Lock and keys, security guards
- Digital security: Firewalls, antivirus, passwords, security awareness education
e) two (2) types of information systems:-
- Transaction processing information systems
- Executive management information systems

QUESTION 2 (TOTAL 20 MARKS)


a) Functions of a Project Manager
- Planning: Resources, risks, budgets
- Communication
- Producing project documents
- Monitoring and control of project execution
b) Ways of obtaining information
- Observation
- Reading associated documentation
- Interviews
- Questionnaires

QUESTION 3 (TOTAL 20 MARKS)


a) Write brief notes on the following:
i. A data warehouse.
- is a central repository of information that can be analyzed to make more informed
decisions. Data flows into a data warehouse from transactional systems, relational
databases, and other sources, typically on a regular cadence.
ii. Data mining.
- is the process of analyzing dense volumes of data to find patterns, discover trends,
and gain insight into how that data can be used.

1
iii. Data mart
- is a data storage system that contains information specific to an organisation's
business unit.
- It contains a small and selected part of the data that the company stores in a larger
storage system.
iv. Meta data
- Data that provide information about other data. Metadata summarizes basic
information about data, making finding & working with particular instances of data
easier.
b) Normalisation
- It is the process of determining how much redundancy exists in a table. The goals of
normalization are to:
- Be able to characterize the level of redundancy in a relational schema.
- Provide mechanisms for transforming schemas in order to remove redundancy.
- Normalization is the process of organizing data in a database. This includes creating
tables and establishing relationships between those tables according to rules designed
both to protect the data and to make the database more flexible by eliminating
redundancy and inconsistent dependency.

QUESTION 4 (TOTAL 20 MARKS)


- A feasibility study is carried out to evaluate a project before it takes off.
- Feasibility report covers financial, technical, social and technological aspects of a
projects.
- Role of a System Analyst: - Analyses the existing system and comes up with
improvements; converts functional requirements into technical requirement, develops
algorithms, design new systems in collaboration with programmers and is always
coordinating activities between the client and development team.
QUESTION 5 (TOTAL 20 MARKS)
- Weak data security can lead to key information being lost or stolen, create a poor
experience for customers and reputational harm.
- Data breaches, fraud, and cyber-security attacks are all becoming more common as
people become more reliant on technology.
QUESTION 6 (TOTAL 20 MARKS)
a) Evaluate each of the following systems as used in management information systems:
i. Knowledge management system. (
- A knowledge management system is any kind of IT system that stores and retrieves
knowledge to improve understanding, collaboration, and process alignment.
Knowledge management systems can exist within organizations or teams, but they
can also be used to center your knowledge base for your users or customers.
ii. Supply chain management system. (2 marks)
- An information management system is one of the few elements of supply chain that
can offer both improved performance and lower cost.
- It enables companies to maintain key information in an accessible format and helps to
take operational and planning decisions.
b) Distinguish between “technical approach” and “behavioural approach” to
management information systems.
(4 marks)
- The behavioural approach looks at the psychological, sociological and economic
aspects of the system.

2
- This approach is fields of an information system that deals with behaviour issues
arising from the developed system and longtime maintenance of the information
system also deals with issues that cannot be explode using formulas.
- The technical approach to information systems emphasizes mathematically based
models to study information systems, as well as the physical technology and formal
capabilities of these systems.
- Technical approach this approach emphasis on three things –
 mathematically based models to study an information system,
 looks at physical technology and formal capability of the system,
 the emphasis at identifying solutions that can be represented by formulas.
c) An information communication technology (ICT) expert at XYZ Company intends to
write a report on the negative impacts of information systems to its users. Discuss
three impacts she could include in her report. (6
marks)
- Business competition is not healthy.
- Mass layoffs, from where with technological developments into action, in which
human labor began to be replaced by the era of robots.
- Privacy, security of personal data problem becomes serious.
d) Explain each of the following types of system maintenance:
i. Corrective.
- is the category of maintenance tasks that are performed to rectify and repair
faulty systems and equipment.
- The purpose of corrective maintenance is to restore systems that have broken
down.
ii. Adaptive.
- is the modification of software to keep it usable after a change to its operating
environment.
- Many factors can change an application's environment, including new technical
knowledge, hardware and security threats.
e) State two (2) advantages of rapid applications development (RAD).
- Quicker delivery
- Quicker adjustments
- Fewer errors
- Lower development cost
- Lower maintenance costs
- Faster release of versions
- Better adoption of new technologies
- More involvement from business
- More usable software

‘END OF SUGGESTED SOLUTIONS’

You might also like