CSC July Adni (Part A, B & C)
CSC July Adni (Part A, B & C)
CSC July Adni (Part A, B & C)
1. _______________is a key used in second table as look-up field to identify records from
original table.
A. Secondary key
B. Primary key
C. Foreign key
D. Super key
2. Internet of Things (IoT) and Big Data are two related technological concepts. What does
Big Data refer to?
A. Combination of multiple devices to produce data to be transferred through the
Internet.
B. The growing collection of data stored in a decentralised ledger for the purpose of
recording transactions.
C. The amount of data that cannot be processed by humans.
D. The massive sets of data gathered from various sources need to be analysed using
computing technology to reveal patterns and trends.
3. All of the following are technologies used to analyse and manage big data EXCEPT:
A. cloud computing
B. in-memory computing
C. analytic platforms
D. Hadoop
4. Which of the following functions would be responsible for procedures and policies for
managing internal data resources in a large organization?
A. Database administration
B. Information policy administration
C. Data administration
D. Data auditing
8. Which of the following statements is TRUE about the Intrusion Detection System?
A. A combination of hardware and software that prevents unauthorized users from
accessing private networks.
B. Monitors hot spots on corporate networks to detect and deter intruders.
C. Checks computers for the presence of malware and can often eliminate it as well.
D. Automates the process of keeping track of all users and privileges.
11. ______ would be the most appropriate network for a business that comprises three
employees and a manager working in the same office space, whose primary need is to
share documents.
A. MAN
B. CAN
C. LAN
D. WAN
14. The _____________ is a type of supply chain model that is driven by actual customer
orders or purchases.
A. bullwhip effect
B. replenishment-driven
C. build-to-stock
D. pull-based model
15. Enterprise software is implemented by a company to achieve all the following EXCEPT:
A. standardizing business processes across all business functional areas.
B. improving its bargaining power with suppliers.
C. reducing the number of employees.
D. reacting faster to market changes.
16. A company's suppliers, supplier's suppliers, and the processes for managing
relationships with them, is known as _______.
A. supplier's internal supply chain.
B. external supply chain.
C. upstream supply chain.
D. downstream supply chain.
17. Which of the following statements best described the term “disintermediation”?
A. Reduction or removal of intermediaries between producers and consumers.
B. Creating an agreement to settle disputes or conflicts between two parties.
C. Companies that act as brokers and consultants in a specific area.
D. Disintegration over time due to the breakdown of support systems.
QUESTION 1
a) List FOUR (4) problems of traditional file processing systems. (4 marks)
- Data redundancy
- Data Inconsistency
- Lack of Flexibility
- Poor Security
b) What is the name of the process used to protect transmitted data in a VPN? Briefly
describe the process.
(6 marks)
- Encryption is the process of converting plain, readable data into a scrambled format
using mathematical algorithms, known as ciphertext. This process ensures that
transmitted data remains unreadable and secure even if intercepted by unauthorized
individuals. The original data is transformed into ciphertext before being decrypted using
the appropriate decryption key. The decrypted data is then delivered to the intended
recipient in its original, readable form. Encryption is crucial in VPNs as it guarantees the
confidentiality and integrity of transmitted data. VPNs provide a secure tunnel for data
travel, protecting sensitive information from eavesdropping and unauthorized access.
QUESTION 2
a) Alice wants to send a message to Bob. She uses a key, namely key A known to her and Bob
to encrypt the message. Bob decrypts the message using his secret key, namely key B.
i. Identify the name of the above method.(1 mark)
- Symmetric encryption
iii. Illustrate a diagram to show the process. Your illustration must include labeling and a brief
explanation.(3 marks)
b) It is critical to have a framework that supports the security of a company's information
systems. This includes defining appropriate security rules for the company, understanding
threats to the company’s information systems, and implementing information system controls.
i.What are the TWO (2) information system controls mentioned in the above statement?
(2 marks)
- General Control
- Application Control
ii. Differentiate between the TWO (2) answers provided in 2.b) i. (4 marks)
- General Control = Govern design, security, and use of computer programs and security
of data files in general throughout organization’s information technology infrastructure.
Apply to all computerized applications.
- Application Control = Specific controls unique to each computerized application, such as
payroll or order processing. Include both automated and manual procedures. Ensure
that only authorized data are completely and accurately processed by that application.
QUESTION 3
a) Enterprise systems can provide firmwide information to help managers make better decisions
and support some of the major business processes such as finance, sales and marketing,
production, and human resources. Discuss TWO (2) examples of human resource-related
business processes that are supported by enterprise systems. (4 marks)
- Enterprise systems streamline payroll processes by integrating data from various
sources, automating calculations, generating electronic payslips, and facilitating direct
deposit. They enable seamless integration with finance and accounting modules,
enabling easy tracking of expenses and financial analysis. Performance management is
crucial, enabling HR managers to define goals, establish key indicators, and conduct
regular evaluations and feedback sessions.
b) CRM tools allow a company to link customer conversations and relationships from social
networking sites to CRM processes. This current feature of technology has been offered by
leading CRM vendors. Discuss TWO (2) benefits of social CRM for businesses, using an
example of any social network platform. (4 marks)
- Social CRM integrates social networking sites with CRM processes, offering businesses
two key advantages: enhanced customer engagement and relationship building. By
linking customer conversations and relationships to CRM processes, businesses can
gain valuable insights into customer preferences, behaviors, and opinions. This data can
be used to personalize interactions and improve customer engagement. Additionally,
social CRM allows businesses to provide timely and targeted customer support,
capturing and organizing customer inquiries through platforms like Facebook and Twitter.
This proactive approach improves customer satisfaction and maintains a positive brand
image. Overall, social CRM is a valuable tool for businesses to enhance customer
engagement, increase satisfaction, and drive business growth.
QUESTION 4
a) Define e-commerce marketing.(1 mark)
- Use of the Internet and Web to transact business. E-commerce marketing strategies
promote products, attract customers, drive sales through digital channels, using SEO,
social media, email, content, and paid advertising.
b) Explain how e-commerce marketing has transformed the way most companies do business
today. Your answer must include a suitable example.(4 marks)
- E-commerce marketing has transformed businesses by expanding market reach,
enabling personalized experiences, improving targeting and analytics, and enhancing
customer convenience. Companies like Amazon have become global giants, leveraging
data to create personalized marketing campaigns and recommendations. E-commerce
platforms offer comprehensive analytics capabilities, allowing businesses to measure the
impact of their efforts and optimize campaigns. This has allowed companies to adapt to
the digital age, stay competitive, and drive growth in today's evolving business
landscape.
c) “Lazada's constantly evolving technology, logistics, and payments infrastructure connects this
vast and diverse region; and offers Southeast Asia a shopping experience that is safe,
seamless, and enjoyable.” Source: Lazada website
i. What type of e-commerce revenue model does Lazada use?(1 mark)
- e-commerce revenue model
ii. With an appropriate example, explain the revenue model stated above.(4 marks)
- The online marketplace revenue model connects buyers and sellers, facilitating
transactions and charging fees or commissions on each transaction. Etsy, an
e-commerce platform specializing in handmade, vintage, and unique products, serves as
an intermediary between sellers and buyers. Etsy provides infrastructure, technology,
and customer reach, while Etsy processes payments and handles shipping logistics. The
model benefits both sellers and buyers, offering a wide selection of unique products, a
trusted payment system, and customer support. Etsy's success demonstrates the
effectiveness of this model, fostering a community of independent sellers and attracting
a loyal customer base.
PART C (20 MARKS)
QUESTION 1
The term "big data" refers to data that cannot be stored or processed in traditional database
management systems. Big data refers to databases containing millions to tens of millions of
records, and often exabytes of data. Companies need to acquire, store, analyse, and generate
big data information in near real-time because it can discover trends in business activities and
processes that executives and managers can use. Based on the above context, differentiate
between Database Management Systems (DBMS) and non-relational databases. Provide ONE
(1) example of an information system for each type of database.(10 marks)
Oracle Database is a widely used DBMS that follows the relational model, providing a robust
and secure platform for managing structured data. It supports complex queries, transactions,
and data integrity constraints, making it suitable for enterprise applications with high data
volumes and stringent reliability requirements.
Non-relational databases, also known as NoSQL databases, provide a flexible and scalable
approach to handling large volumes of unstructured or semi-structured data. They do not
adhere to the rigid structure of the relational model and use various data models, such as
key-value, document, columnar, or graph. NoSQL databases allow dynamic schema changes,
horizontal scalability, high performance, and no ACID guarantees.
In summary, DBMS follows a structured, relational model with predefined schemas, enforcing
strict data integrity rules, while NoSQL databases offer flexibility, scalability, and high
performance for handling large volumes of unstructured or semi-structured data.
QUESTION 2
We live in an era where smartphones and other mobile devices are used pervasively.
Smartphones have become a necessity. People are using their devices to purchase, transact
and conduct their daily affairs. Mobile commerce (m-commerce) is the new hype in many
applications orchestrating their businesses. Discuss and give an example of how m-commerce
application works in the following areas.
a) Banking
b) Mobile Marketing
c) Mobile Ticketing
d) Reservations
e) Entertainment
(10 marks)
Banking apps enable users to securely access account balances, transfer funds, pay bills, apply
for loans, and deposit checks on the go. Mobile marketing applications have transformed the
way businesses engage with customers through marketing efforts, delivering targeted and
personalized advertisements, promotions, and offers directly to users' mobile devices.
Mobile ticketing applications have revolutionized the ticketing industry by allowing users to
purchase and store tickets on their mobile devices. These applications generate scannable QR
codes or barcodes for easy entry, such as the Ticketmaster app. Reservations applications
simplify the reservation process for various services, such as restaurants, hotels, flights, and car
rentals. These applications often provide real-time updates and notifications, making it easier for
users to secure dining experiences.
Entertainment applications play a significant role in the entertainment industry, offering users
access to a wide range of digital content and services. Users can stream movies, TV shows,
music, podcasts, and purchase digital content like e-books and games. Subscription-based
models are common in this area, where users pay a recurring fee for access to a library of
content.
In summary, mobile commerce applications have transformed various sectors, providing users
with convenience, accessibility, and personalized experiences, enabling them to perform
transactions, access services, and enjoy digital content seamlessly through their mobile
devices.