Sunteți pe pagina 1din 4

June 2012 CT Section A 1. Which of the following is NOT an application program? a. b. c. d. Angry Birds game Adobe Photoshop iOS5.

1 Microsoft Internet Explorer 9

2.

____________ can help organizations achieve business goals and objectives. a. b. c. d. Customers Competitors Suppliers Information Systems

3.

A collection of servers called a ____________ coordinates the activities of thousands of users using the same network. a. b. c. d. Server farm Server warehouse Web farm Web hub

4.

The new iPad has 1 GB of RAM and up to 64GB of storage. The RAM is ________and the storage is __________ a. b. c. d. Permanent, temporary Temporary, permanent Fixed, expandable None of the above

5. 6. 7.

Question 5 related to Microsoft Excel Question 6 related to Microsoft Excel How many MB in a 4 GB thumbdrive? a. b. c. d. 1000 1024 4096 8000

8.

Which of the following is NOT a component of an Information System? a. b. c. d. Data Hardware Procedure Supplier bargaining power

9.

Secondary value chain activities include the following, except ________________ a. b. c. Human resources Technology development Procurement

d.

Marketing and Sales

10.

The main reason for adopting a cost leadership strategy is ______________ a. b. c. d. To provide a high quality products To attract price sensitive customers Lower customer loyalty To offer best services to all customers

11.

This NPal Student Service (NPal) consists of the full suite of Student Self-Service functions and is accessible to all NP students. The NPal service for students is a good example of _________ a. b. c. d. Off the shelf software Horizontal market software Custom-developed software Operating system

12.

A competitive strategy consists of moves to _______ a. b. c. d. Attract more customers Withstand competition from rivalry Improve an organizations market share All of the above

13. 14. 15. 16.

Question 13 related to Microsoft Access Question 14 related to Microsoft Excel Question 15 related to Microsoft Access An example of an unrealistic goal for business is ________ a. b. c. d. To increase the customer base by 3% every year To receive no customers complaints for the next 2 years To deploy IT services in all business units in 3 years To reduce operating costs by 5% annually

17.

A program that neither replicates or copies itself, but does damage or compromise the security of the computer. What is it? a. b. c. d. Macro virus Trojan horse Worm Hoax

18.

Computer processors are moving towards multiple cores such as dual cores and quad cores. The main advantage of the quad-core processors over dual-core processors is that it can perform ____________ a. b. c. d. Twice as many simultaneous functions Better with less heat dissipation Ten time faster in data processing Faster processing with less power consumption

19.

Which is the following is true for thin clients?

a. b. c. d.

iPhone is a good example of a thin client a thin client is a network computer without a hard disk drive more expensive to deploy and more work for IT to deploy can store local files and applications

20.

If you are making biscuits and there is only one person who sells flour, you have no alternative but to buy it from him. Th is is an example of ____ a. b. c. d. Customer bargaining power Threat of substitute of services Threat of new competitions Supplier bargaining power

Section B 1. 2. 3. Michael Porter claims that a company can employ a differentiation strategy across an industry to achieve a competitive advantage Google Doc can be used to create documents and spreadsheets only Antivirus software is a broad term that describes any program that is intended to cause harm or convey information to others without the owners permission 4. 5. 6. 7. 8. 9. 10. A thick client can only make use of resources on Internet to run software applications for users A CPU cache is a cache used by the processor to reduce the average time to access memory Microsoft Excel is better application software than Access to analyse and identify trends in business As software vendors discover security holes in their products they continually issue modifications called patches In Excel 2010, it supports file size more than 2 GB The main concern of using cloud computing for business is about the security and privacy issues Ferrari uses differentiation across the whole industry to compete with other car manufacturers

Section C 1a) Air Asia is known to offer cheap airfare to Malaysia. In fact, Air Asia has lowered its fare to fly from Singapore to Penang such that it is cheaper to fly than to take a bus. Does Air Asia cost structure increase or decrease the threat of substitutions to firms in the long distance bus industry? What is the impact to the bus industry?

1b) If there are many suppliers in the industry to choose from, and there is no significance difference in cost and quality of inputs among the potential suppliers, what is the threat to the industry? Explain using Porters five forces model.

1c) Many computer manufacturers are dependent on Microsoft for software and Intel for CPU chips. Is the threat of powerful suppliers high or low for computer manufacturers?

1d) A LED panel firm in South Korea has few customers such as Apple and Samsung, and they purchase a large portion of the fir ms output. What is the threat to the firm in terms of Porters Five Forces model?

2a) What are the basic functions of an operating system? Describe any 2 functions

2b) List three example of modern operating systems for computer or mobile devices.

2c) Cloud Computing enables a new startup Pinterest to handle 20 million users and 500 terabytes of data with a core team of 12 people as of

December 2011. Briefly discuss THREE benefits of using cloud computing for business users?

S-ar putea să vă placă și