INSS 640 - Information Systems and Technology
Fall 1996
Merrick School of Business

Final Exam

This is a take-home exam, covering both conceptual and applied materials. There are questions asking you to explain a concept, to apply a concept to a small case, and to use an information technology tool studied in this course. The final is due, in printed format (using a wordprocessor), in my office by 5 PM of December 12, 1996.

NOTE: Answer the questions in the simplest and shortest way possible. You can do this exam in 4-8 hours, or expend a month doing it. I expect you to do it in 4-8 hours, not in a month.


  1. Explain why information technology (IT) is an "enabling technology." Give an example of an IT application in your work or daily life that is a good example of this concept.

  2. Write a description of a business process in your work. If you are not working do it for a business process you are involved at UB (no more than five lines). Then, draw a business process diagram for it.

  3. Explain the concept of client-server and give an example you are familiar with.

    Read the case "The Internet: Information Source and Shopping Mall of the Future?" (Textbook, pp. 677-680) and answer the next two questions (4-5).

  4. How do you explain the recent growth of AOL? Do you think AOL will still exist five years from now? What recent actions AOL took to this purpose, and why?

  5. What are the major problems for the growth and the use of Internet for business? Explain.

  6. Look for an article in a recent issue of a magazine or journal that you read (Newsweek, Businessweek, etc) related to information systems and technology. Summarize (no more than 5 lines) the main argument and discuss it using a concept you have learned in this course. Indicate the source.

  7. Obtain an advertisement for a computer from a local newspaper (look for COMPUSA, BESTBUY, Office Depot, etc). Read their description of the computer characteristics. Explain briefly what these characteristics mean, regarding to hardware. Include a copy of the ad.

  8. What are the main differences between Windows 3.1 and Windows 95? Why do you think Windows 95 was a success in the home market and not in the business market? Will it still be a success in the business market?

  9. Explain the difference between analysis and design in the System Life Cycle. In your opinion, who should be the project manager for a new order entry system in a business -- a MIS professional or a manager in charge of the order entry department? Why?

  10. Read the case Custom T-Shirts, Inc (textbook, page 140) and draw a DFD for their intended inventory system. Do not include the contextual (high-level) DFD, only the second level of the exploded DFD.
    KEEP IT SIMPLE!!!!

  11. Refer to Box 4.1 in the textbook, pp.156-158. Write in relational notation a data base definition including PROFESSORS, STUDENTS and SECTIONS. What kind of relationship exists between PROFESSORS and STUDENTS? Using your data base definition give an example of a foreign key. (E-R Diagram NOT required).

  12. Information technology has been increasingly used to support the interpersonal role of managers. Explain the advantages and disavantages of using e-mail and video-conferencing for interpersonal communications.

  13. You have used extensively a business graphics presentation program in this course. What interpersonal communication and decision-making activities can be facilitated by this type of software? What are the advantages, disavantages, and requirements for its use? Should all organizations use it? Why?

  14. Run a directory (dir) of a hard-drive, save it to a file, insert this file in your answer to this exam in a wordprocessor file.

  15. We are in the information age. What this means? What is the difference between operational dependency and strategic impact of information technology? Give examples.

  16. Explain the advantages and disavantages of EDI. Give at least one example of the use of EDI.

  17. Why are organizations increasingly networking their computers, including PCs, minis and mainframes? What is so good about it? Explain.

  18. Give examples of situations where information technology can be used to limit or invade your privacy.

  19. Do you think what hackers do is ethical and/or legal? Why? Why they do it?

  20. Explain the role of IT in mass customization. Give an example.

  21. Read the "Dawson Paints:working successfully with top managers" application scenario in the textbook, pp. 587-588. Why can't Crossetti just create an IS plan without bothering Castille? Do you think most managers plan? Do they include information needs? Who should be in charge of IS planning: MIS or the CEO, etc?

  22. Read the "Eden Travel" application scenario in the textbook, p. 120. What kind of strategic threat is Suresh confronted with? How can he transform the threat into an opportunity?

  23. Read the "Brinkley Bank" application scenario in the textbook, pp. 239-240. Evaluate the proposed system. Is this a type of information system that should be used to support the specific decison-making situation? If yes, why, if not, what is your suggestion?

  24. Read the Real-World Case "IBM : Using a Group Decision Support System" at the URL http://www.awl.com/he/is/authors/alter/infosys2e/infosys2e.cases.html#ibm and recall your experience at the ISRC. What do you see as strenghts and weeknesses of the use of GDSS at IBM?

  25. Read the Real-World Case "Digital Equipment Corporation: Building an Expert System" at the URL http://www.awl.com/he/is/authors/alter/infosys2e/infosys2e.cases.html#digital . Given Digital experience, can expert systems be seen as a tool in mass customization? What are the pros and cons?


This page is maintained by Al Bento who can be reached at abento@ubmail.ubalt.edu. This page was last updated on December 4, 1996. Although we will attempt to keep this information accurate, we can not guarantee the accuracy of the information provided.