Get premium membership and access revision papers, questions with answers as well as video lessons.
Got a question or eager to learn? Discover limitless learning on WhatsApp now - Start Now!

Information Systems Management Question Paper

Information Systems Management 

Course:Diploma In Information Technology

Institution: Nairobi Institute Of Business Studies question papers

Exam Year:2007



1.(a) (i) Explain the functions of the following:

Arithmetic and Logic Unit

Control Unit(6 marks)

(ii) Explain the THREE classifications of a digital computer in their functional design.(8 marks)

(b) Explain TWO kinds of document readers.(6 marks)


2.(a) (i) Describe computer output on microform.

(ii) Outline TWO advantages and TWO disadvantages of microform output.(7 marks)

(b) (i) Explain the THREE types of computer software.

(ii) Explain the following with reference to network topologies.

-RING

-STAR

-TREE.(13 marks)


3.(a) (i) Explain the following types of files

-Transaction file

-Back-up file

-Sort file

(ii) State FOUR steps to consider when selecting a file organization method.(10 marks)

(b) (i) Define the term database

(ii) Outline TWO advantages and TWO disadvantages of database approach.(10 marks)


4.(a) (i) Explain the following data processing modes.

-Outline processing

-Real time

-Time sharing

(ii) State THREE advantages of Real time processing.(12 marks)

(b) (i) State FOUR functions of management in an organization.

(ii) Explain TWO methods of procurement of a computer.(8 marks)


5.(a) Explain the following types of systems.

(i) Decision support systems

(ii) Executive information system

(iv) Management information systems.(9 marks)

(b) Explain the following approaches to computer audit.

-Round the computer

-Through the computer.(6 marks)

(c) Convert the following numbers

-12110 to binary

-12638 to decimal.(5 marks)


6.(a) Explain THREE forms of security threats.(9 marks)

(b) (i) State FIVE types of computer crimes.(5 marks)

(ii) Explain the following terminologies as used in computer criminology.

I Piracy

II Computer abuse.(6 marks)


7.(a) Explain FOUR characteristics of a good information system.(8 marks)

(b) State the stages of database development.(7 marks)

(c) Explain normalization as data modeling technique.(5 marks)


8.(a) Outline the stages in data collection.(8 marks)

(b) (i) Explain system control

(ii) Explain FOUR validation checks.(12 marks)






More Question Papers


Popular Exams



Return to Question Papers