DBIT 507 BUSINESS INFORMATION STRATEGY.

UNIVERSITY EXAMINATIONS: 2017/2018
EXAMINATION FOR THE DIPLOMA IN BUSINESS INFORMATION
TECHNOLOGY
DBIT 507: BUSINESS INFORMATION STRATEGY
DATE: NOVEMBER, 2017 TIME: 11
/2 HOURS
INSTRUCTIONS: Answer any THREE questions.

QUESTION ONE
(a) The ability to exploit technology requires high levels of engagement and co-operation
among FOUR key constituents. Discuss the different constituents clearly showing the
role played by each. [8 Marks]
(b) Many firms nowadays opt to outsource IT infrastructures. Discuss FIVE challenges of
outsourcing. [5 Marks]
(c) Explain FOUR ways to physically protect information systems and THREE ways in
which they can be logically protected. [7 Marks]

QUESTION TWO
(a) Ubiquitous computing (ubicomp) is an emerging paradigm for interaction between people
and computers. A guiding principle of ubicomp is to break away from desktop computing
to provide computational services to a user when and where required. Discuss this
expression, highlighting its strategic value in a business. [10 Marks]
(b) Define the following terms [10 Marks]
i. Strategy
ii. E- commerce
iii. Business information systems
iv. Mobile commerce
v. Digital cash
QUESTION THREE
(a) Discuss three benefits of Office Automation System [6 Marks]
(b) Explain how IT infrastructure can help an organization realize competitive advantage.
[5 Marks]
(C) explain the following THREE components of intellectual capital that a firm needs to consider
when designing the information systems strategy. [6 Marks]
i. Human capital
ii. Customer capital
iii. Structure capital
(D) Briefly explain three E-Commerce models [3 Marks]
QUESTION FOUR
(a)With real-time internetworking infrastructure, customers are serviced and economical value is
realized immediately rather than over hours, days or weeks. Discuss the benefits of these
infrastructures. [5 Marks]
(b) An information system consists of an integrated set of components that collect, store and
manage data to provide output information to users. Describe the various components of an
information system. [5 Marks]
(c) Briefly describe any FIVE computer fraud and abuse techniques. [5 Marks]
(d) Explain the drawbacks of real- time infrastructures. [5 Marks]
QUESTION FIVE
(a) Discuss the term BPR in light of its aims and roles in business. [10 Marks]
(b) Discuss the various information systems needed for knowledge creation, sharing and
management. [10 Marks]

 

(Visited 70 times, 1 visits today)
Share this:

Written by