INSS 640 - Information Systems and Technology
Fall 1996
Merrick School of Business
Final Exam
This is a take-home exam, covering both conceptual and applied materials. There are questions
asking you to explain a concept, to apply a concept to a small case, and to use an information
technology tool studied in this course. The final is due, in printed format (using a wordprocessor), in my office by 5 PM of December 12, 1996.
NOTE: Answer the questions in the simplest and shortest way possible. You can do this exam in 4-8 hours, or expend a month doing it. I expect you to do it in 4-8 hours, not in a month.
- Explain why information technology (IT) is an "enabling technology." Give an example of an
IT application in your work or daily life that is a good example of this concept.
- Write a description of a business process in your work. If you are not working do it for a
business process you are involved at UB (no more than five lines). Then, draw a business
process diagram for it.
- Explain the concept of client-server and give an example you are familiar with.
Read the case "The Internet: Information Source and Shopping Mall of the Future?" (Textbook,
pp. 677-680) and answer the next two questions (4-5).
- How do you explain the recent growth of AOL? Do you think AOL will still exist five years
from now? What recent actions AOL took to this purpose, and why?
- What are the major problems for the growth and the use of Internet for business? Explain.
- Look for an article in a recent issue of a magazine or journal that you read (Newsweek,
Businessweek, etc) related to information systems and technology. Summarize (no more than 5
lines) the main argument and discuss it using a concept you have learned in this course. Indicate
the source.
- Obtain an advertisement for a computer from a local newspaper (look for COMPUSA,
BESTBUY, Office Depot, etc). Read their description of the computer characteristics. Explain
briefly what these characteristics mean, regarding to hardware. Include a copy of the ad.
- What are the main differences between Windows 3.1 and Windows 95? Why do you think
Windows 95 was a success in the home market and not in the business market? Will it still be a
success in the business market?
- Explain the difference between analysis and design in the System Life Cycle. In your opinion,
who should be the project manager for a new order entry system in a business -- a MIS
professional or a manager in charge of the order entry department? Why?
- Read the case Custom T-Shirts, Inc (textbook, page 140) and draw a DFD for their intended
inventory system. Do not include the contextual (high-level) DFD, only the second level of the
exploded DFD.
KEEP IT SIMPLE!!!!
- Refer to Box 4.1 in the textbook, pp.156-158. Write in relational notation a data base
definition including PROFESSORS, STUDENTS and SECTIONS. What kind of relationship
exists between PROFESSORS and STUDENTS? Using your data base definition give an
example of a foreign key. (E-R Diagram NOT required).
- Information technology has been increasingly used to support the interpersonal role of
managers. Explain the advantages and disavantages of using e-mail and video-conferencing for
interpersonal communications.
- You have used extensively a business graphics presentation program in this course. What
interpersonal communication and decision-making activities can be facilitated by this type of
software? What are the advantages, disavantages, and requirements for its use? Should all
organizations use it? Why?
- Run a directory (dir) of a hard-drive, save it to a file, insert this file in your answer to this exam in a wordprocessor file.
- We are in the information age. What this means? What is the difference between operational
dependency and strategic impact of information technology? Give examples.
- Explain the advantages and disavantages of EDI. Give at least one example of the use of EDI.
- Why are organizations increasingly networking their computers, including PCs, minis and
mainframes? What is so good about it? Explain.
- Give examples of situations where information technology can be used to limit or invade your
privacy.
- Do you think what hackers do is ethical and/or legal? Why? Why they do it?
- Explain the role of IT in mass customization. Give an example.
- Read the "Dawson Paints:working successfully with top managers" application scenario in
the textbook, pp. 587-588. Why can't Crossetti just create an IS plan without bothering Castille?
Do you think most managers plan? Do they include information needs? Who should be in charge
of IS planning: MIS or the CEO, etc?
- Read the "Eden Travel" application scenario in the textbook, p. 120. What kind of strategic threat is Suresh confronted with? How can he transform the threat into an opportunity?
- Read the "Brinkley Bank" application scenario in the textbook, pp. 239-240. Evaluate the proposed system. Is this a type of information system that should be used to support the specific decison-making situation? If yes, why, if not, what is your suggestion?
- Read the Real-World Case "IBM : Using a Group Decision Support System" at the URL http://www.awl.com/he/is/authors/alter/infosys2e/infosys2e.cases.html#ibm and recall your experience at the ISRC. What do you see as strenghts and weeknesses of the use of GDSS at IBM?
- Read the Real-World Case "Digital Equipment Corporation: Building an Expert System" at the URL http://www.awl.com/he/is/authors/alter/infosys2e/infosys2e.cases.html#digital . Given Digital experience, can expert systems be seen as a tool in mass customization? What are the pros and cons?
This page is maintained by Al Bento
who can be reached at abento@ubmail.ubalt.edu. This page was last updated on December 4, 1996. Although we will attempt to keep this information accurate, we can not guarantee the accuracy of the information provided.