DBIT507  BUSINESS INFORMATION STRATEGY.

UNIVERSITY EXAMINATIONS: 2017/2018
EXAMINATION FOR THE DIPLOMA IN INFORMATION TECHNOLOGY/DIPLOMA IN
BUSINESS INFORMATION TECHNOLOGY
DBIT507 BUSINESS INFORMATION STRATEGY
DATE: AUGUST 2018 TIME: 1
1
/2 HOURS
INSTRUCTIONS: ATTEMPT ANY THREE QUESTIONS.

QUESTION ONE
a) For an organization to survive and have the ability to compete, they must be able to identify
business opportunities and support business level strategy where an information system can
provide strategic advantages. In your own words explain how the following models can be used
to gain competitive edge.
i. Value chain model. [5 Marks]
ii. Competitive forces model. [5 Marks]
b) Define the following terms. [5 Marks]
i. Business vision
ii. Business mission
iii. Strategy
iv. Just in time delivery
v. Stockless inventory
c) Explain the academic disciplines that have been employed in business information strategies.
[5 Marks]
QUESTION TWO
a) Ability to exploit technology requires high levels of engagement and cooperation among FOUR
Constituencies. Identify these constituencies and explain the role played by each. [8 Marks]
b) Explain the challenges of outsourcing IT. [4 Marks]
c) Explain the following components of internetworking infrastructure and the products that fall
into each category. [8 Marks]
i. Networks
ii. Processing systems
iii. Business application
iv. Facilities
QUESTION THREE
a) Discuss why IT is helpful in enabling business strategy and promoting return on investment.
[5 Marks]
b) IT is a source of opportunity and advantage but also uncertainty and risk. Explain. [5
Marks]
c) Explain how any FIVE of the following factors influence organizations decision on whether to
BUY or MAKE software. [5 Marks]
i. Core competition
ii. Availability of suitable partners
iii. Cost/benefit analysis
iv. Time frame and implementation
v. Evolution and complexity
vi. Ease of implementation
vii. Protecting IT assets and managing risks
viii. Pervasive computing
d) Explain any FIVE computer fraud techniques. [5 Marks]
QUESTION FOUR
a) Discuss the following information system security measures. [5 Marks]
i. Firewalls
ii. Authentication
iii. Encryption
iv. Patching
v. Intrusion detection
b) Information systems can be physically or logically secured from unauthorized access. Explain
FIVE ways an organization can PHYSICALLY secure its systems. [5 Marks]
c) Explain TPS characteristics. [5 Marks]
d) Briefly explain FIVE E-Commerce models [5 Marks]
QUESTION FIVE
a) Explain FIVE features of good information. [5 Marks]
b) What do you consider to be ethical behaviour when it comes to the role of a computing
professional? [5 Marks]
c) Discuss how you would ensure that all projects within an organisation were operated ethically.
[5 Marks]
d) Explain what tasks still need be done once the implementation phase of the Software
Development Life Cycle has been completed. [5 Marks]

(Visited 85 times, 1 visits today)
Share this:

Written by