0% found this document useful (0 votes)
2 views17 pages

Bis

Download as docx, pdf, or txt
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 17

SECTION A (COMPULSORY)

(Open book semester project to be handed over to invigilator before exam


starts in hard

copy)

Question 1

Think of any possible situation faced by any company and explain how an
information system can assist in addressing the situation. The situation
can either be a problem that the company wants to solve, or an
opportunity that the company wants to take advantage of. The aim is to
come out with an idea of a system that is able to provide a strategic
advantage to the company.

Provide the following

(1) Company profile: name, nature of business etc. (05 marks)

(i) Background of the problem / Background of the situation: what is the

situation

(05 marks)

(ii) Proposed system: how the system is going to address the situation

(10 marks)

(iv) Plan of action: steps to be taken to have the system(05 marks)

(v) Targeted outcome: expected benefits to be gained from using the


system

(05 marks)

SECTION B

Question 2

(a) Some of the most common techniques used to control information


systems are: formal security policies, passwords, file encryption,
organizational procedures governing the use of information system, user
validation techniques and backup procedures. Describe each of the above
techniques giving relevant examples.14 marks)

(b) Explain the difference between a database and a database


management system (3 marks)
(c) Explain the difference between a multi-user database and an
enterprise database (3 marks)

Question 3

(a) Describe how the traditional waterfall model and the system
development life cycle can be used in developing information systems.
(08 marks)

(b) Acquiring information systems in organizations is not easy. However


the choices in acquiring these systems can be categorized into off-the-
shelf, bespoke application development and the end user development
system. Explain each of them (12 marks)

Question 4

(a) Rubaga Hospital in Uganda has existed since 1890 handling all its
business activities manually. They think it's high time to integrate
information systems into the Hospital business. As an expert, you have
been contracted to develop a business case to guide Hospital
management in the process of integration. Come up with a business case
that you will present to management. (12 marks)

(b) Explain the difference between Online transaction processing and


Analytical

Transaction Processing (08 marks)

Question 5

The day after becoming the CEO of a company facing turbulent times,
David had a dream. In it, while walking on a beach he discovered a bottle.
On opening, a genie appeared offering him a wish in exchange for her
freedom. Eschewing riches, fame or a long life, David opted for the one
thing he knew he needed to help him guide his people in the best way
possible. He chose the gift of wisdom.

In today's hyperactive digital age, attaining wisdom is a challenge. With


tablets and phones and their various apps constantly vying for our
immediate attention, it is increasingly difficult to find the time and mental
space for making meaningful connections or engaging in the deep
conversations, reflection, emotional awareness, empathy and compassion,
necessary in its pursuit.

Indeed, it is an unfortunate fact for many leaders in David's position, that


while wisdom requires education, education does not necessarily make
people wise. As Professor Charles Gragg noted in his classic case study
"Because Wisdom Can't Be Told", the mere act of listening to wise
statements and sound advice doesn't necessarily ensure the transfer of
wisdom.

(i)Explain the difference between wisdom and knowledge? Give supporting


examples (10 marks)

(ii)If in today's hyperactive digital age, attaining wisdom is a challenge,


how can one go round it so as to become wise? (10 marks)

Question 6

(a) Explain the following concepts in relation to information systems


development

(08 marks)

(i)Black box

(ii)Coupling

(iii)Decomposition

(iv) Prototype

(b) Describe Nkumba University as a system. Give use case examples (12
marks)

Solns

SOLN1

Company Profile:

Name: FreshHarvest Co.


Nature of Business: Agriculture and food supply chain management
company specializing in farm-to-table delivery services for fresh produce.

Background of the Problem:

FreshHarvest Co. has been facing inefficiencies in its supply chain


management, particularly in tracking inventory levels, reducing food
waste, and ensuring timely delivery of perishable goods. Customers often
complain about late deliveries or receiving spoiled produce. Additionally,
farmers face challenges predicting demand, leading to overproduction or
underproduction.
This situation not only impacts customer satisfaction but also increases
operational costs and food wastage, which are detrimental to the
company's profitability and sustainability goals.

Proposed System:

Name of System: SmartAgro Supply Chain Management System


(SASCM)

Key Features:

1. Real-Time Inventory Tracking: Tracks inventory levels at every


stage of the supply chain.

2. Demand Prediction Algorithms: Uses AI to forecast demand


based on historical data, seasonal trends, and customer
preferences.

3. Cold Storage Monitoring: IoT sensors monitor temperature and


humidity in real time to ensure produce remains fresh.

4. Delivery Optimization: Leverages GPS and route optimization


algorithms to minimize delivery time and fuel costs.

5. Farmer Dashboard: Provides farmers with insights on planting


schedules and expected demand to reduce overproduction.

The system integrates IoT, AI, and data analytics to create a streamlined
supply chain, ensuring timely delivery, reduced waste, and better demand
forecasting.

Plan of Action:

1. Needs Analysis: Conduct workshops with stakeholders (farmers,


warehouse managers, logistics teams, and customers) to
understand their pain points.

2. System Design: Collaborate with IT developers to create a


blueprint of the SASCM system, outlining modules like inventory
management, IoT integration, and delivery tracking.

3. Vendor Selection: Identify and partner with vendors for IoT


sensors, software development, and cloud infrastructure.

4. System Implementation: Deploy the system in phases, starting


with a pilot in one region to test its effectiveness.
5. Training: Train staff, farmers, and delivery personnel on how to use
the system effectively.

6. Evaluation: Monitor performance metrics such as delivery time,


waste reduction, and customer satisfaction during the pilot phase.

7. Full Rollout: Based on the pilot results, scale the system to other
regions and optimize as needed.

Targeted Outcome:

1. Reduced Food Waste: By monitoring inventory and predicting


demand, the company can minimize overstocking and spoilage.

2. Improved Delivery Efficiency: Optimized routes and real-time


tracking reduce delivery delays and fuel costs.

3. Enhanced Customer Satisfaction: Customers receive fresher


produce, delivered on time, improving loyalty.

4. Better Farmer Productivity: Insights from demand prediction


help farmers plan better, reducing losses from overproduction.

5. Cost Savings: Reduced waste, efficient logistics, and optimized


inventory lower operational costs.

6. Sustainability Goals: A more efficient system aligns with


environmental sustainability by reducing waste and emissions.

By implementing SASCM, FreshHarvest Co. can achieve a strategic


advantage, positioning itself as a leader in sustainable and customer-
focused food supply chain management

Soln2

(a) Techniques to Control Information Systems

1. Formal Security Policies


These are written rules and procedures that define how an
organization protects its information systems. Policies specify who
can access certain data, what activities are permissible, and how
violations are handled.
Example: A policy might state that only employees in the finance
department can access payroll data and must use multi-factor
authentication (MFA) to log in.

2. Passwords
Passwords are secret codes used to authenticate users and control
access to systems or data. A strong password is typically a mix of
letters, numbers, and symbols to make it hard to guess.
Example: An employee uses a unique password to log into the
company’s email system. The password is required to meet
complexity requirements, such as being at least 12 characters long.

3. File Encryption
Encryption converts data into a coded format that can only be read
by someone with the proper decryption key. This protects sensitive
information from unauthorized access.
Example: A financial institution encrypts customer data stored in its
database to protect it from cyberattacks. Even if data is stolen, it
cannot be read without the decryption key.

4. Organizational Procedures Governing the Use of Information


Systems
Organizations set procedures for how employees interact with
information systems, such as guidelines for accessing, storing, and
sharing data. These procedures help maintain security and
efficiency.
Example: Employees in a company are required to log out of their
workstations when stepping away and to report suspicious activities
to the IT department.

5. User Validation Techniques


These techniques verify a user's identity before granting access to a
system. Common methods include biometrics (e.g., fingerprint or
facial recognition), security tokens, and multi-factor authentication
(MFA).
Example: An online banking app requires customers to validate their
identity using both a password and a one-time code sent to their
phone.

6. Backup Procedures
Regular backups ensure that critical data can be restored in case of
system failures, cyberattacks, or natural disasters. Backups can be
stored locally or in the cloud.
Example: A company schedules daily backups of its customer
database to an off-site cloud server, ensuring data can be recovered
if the main system crashes.

(b) Difference Between a Database and a Database Management


System (DBMS)
Database Management System
Database
(DBMS)

A structured collection of data Software used to create, manage, and


stored for future use. interact with a database.

Example: A table of employee Example: Microsoft SQL Server, Oracle


records stored on a system. DB, or MySQL.

Focuses on storing and organizing Focuses on providing tools for data


data. manipulation and security.

(c) Difference Between a Multi-User Database and an Enterprise


Database

Multi-User Database Enterprise Database

Supports a limited number of users Designed to handle large-scale data


working on the database with many users across an
simultaneously. organization.

Suitable for small to medium-sized Suitable for large corporations with


businesses or departments. complex operations.

Example: A database shared Example: A centralized system used


among 20 employees in a small by thousands of employees across
office. global branches.

Solns 3

(a) Traditional Waterfall Model and System Development Life


Cycle (SDLC) in Developing Information Systems

Waterfall Model

The Waterfall Model is a sequential approach where each phase is


completed before the next begins. It is linear and easy to follow, making it
suitable for projects with well-defined requirements.

Phases in the Waterfall Model:

1. Requirement Analysis: Identify and document the system’s


functional and non-functional requirements.
Example: Defining user authentication features for a banking
system.

2. System Design: Create a detailed design of the system


architecture, databases, and user interfaces.
3. Implementation (Coding): Developers write code based on the
system design.

4. Testing: Test the system for bugs, functionality, and compatibility.

5. Deployment: Deploy the system in the organization or make it


available to end users.

6. Maintenance: Address issues and make updates as needed after


deployment.

The Waterfall Model works well for small projects where requirements are
clear from the beginning.

System Development Life Cycle (SDLC)

The SDLC is a broader framework used to guide the development of


information systems. It includes various methodologies, such as the
Waterfall Model, Agile, and Spiral. SDLC ensures systematic planning,
implementation, and maintenance.

Phases in the SDLC:

1. Planning: Identify project scope, objectives, and resources needed.

2. Analysis: Gather and analyze requirements from stakeholders.

3. Design: Develop detailed system architecture and design


specifications.

4. Development: Write code and build system components.

5. Testing: Validate that the system meets requirements and works as


intended.

6. Implementation: Deploy the system and train users.

7. Maintenance: Continuously improve and update the system based


on feedback.

How They Work Together:


The Waterfall Model is a specific way to execute the SDLC. In practice,
organizations may use the SDLC framework to decide on the best
development approach, including Waterfall.

(b) Choices in Acquiring Information Systems

1. Off-the-Shelf Systems
These are pre-built, ready-to-use software solutions that can be
purchased from vendors. They are designed to meet general
requirements and are quicker to deploy.

Advantages:

o Cost-effective compared to custom development.

o Quick implementation.

o Often comes with vendor support and regular updates.

Disadvantages:

o Limited customization options.

o May not meet all specific needs of the organization.

Example: Microsoft Dynamics 365 for enterprise resource planning (ERP).

2. Bespoke Application Development


These are custom-built systems developed specifically to meet the
unique needs of an organization.

Advantages:

o Tailored to the exact requirements of the organization.

o Can offer a competitive advantage by solving specific


challenges.

Disadvantages:

o Expensive and time-consuming to develop.

o Requires skilled development teams and ongoing


maintenance.

Example: A hospital developing a proprietary patient management


system that integrates with its unique workflows.

3. End-User Development Systems


These are systems created by end users rather than professional
developers, often using tools like spreadsheets, low-code platforms,
or database software.

Advantages:

o Quick development with minimal technical expertise.

o Cost-effective for small-scale or departmental needs.


Disadvantages:

o May lack scalability and robustness.

o Can result in inconsistencies or security risks if poorly


managed.

Example: A sales team using Microsoft Excel to develop a custom sales


tracking system.

Each acquisition method has its pros and cons, and organizations choose
based on their budget, timeline, and requirements.

Soln4

(a) Business Case for Integrating Information Systems into


Rubaga Hospital

1. Executive Summary
Rubaga Hospital, founded in 1890, has relied on manual processes to
handle its operations, including patient management, billing, inventory,
and reporting. This approach is no longer efficient, given the increasing
demands for quality healthcare services. Integrating information systems
will streamline operations, improve service delivery, and enhance
decision-making.

2. Current Challenges

 Inefficiency in Patient Management: Delays in retrieving patient


records and tracking medical history.

 Billing Errors: Manual calculations lead to frequent errors and


disputes.

 Inventory Management Issues: Difficulty in monitoring and


restocking medical supplies, leading to stockouts or wastage.

 Data Overload: Manual record-keeping makes it hard to analyze


data for informed decision-making.

 Compliance and Reporting: Manual preparation of compliance


reports is time-consuming and prone to inaccuracies.

3. Proposed Solution
Implement a Hospital Management Information System (HMIS) to
automate and integrate hospital operations.
Key Features:

 Electronic Medical Records (EMR): Digitally store and manage


patient records.

 Billing and Accounting Module: Automate billing and track


financials.

 Inventory Management System: Monitor and optimize the use of


medical supplies.

 Appointment Scheduling: Streamline patient booking and reduce


wait times.

 Reporting and Analytics: Generate real-time reports for better


decision-making.

4. Benefits of Integration

1. Improved Operational Efficiency: Faster processing of patient


records and billing.

2. Enhanced Patient Experience: Reduced wait times and better


service delivery.

3. Cost Savings: Lower administrative costs and reduced wastage in


inventory.

4. Better Decision-Making: Access to real-time data for strategic


planning.

5. Regulatory Compliance: Simplified generation of accurate


compliance reports.

5. Financial Justification
The initial investment in the HMIS, including software, hardware, and
training, will be offset by:

 Reduced administrative overheads.

 Improved revenue collection through accurate billing.

 Savings from efficient inventory management.

6. Implementation Plan
 Phase 1: Needs Assessment – Identify the hospital’s specific
requirements.

 Phase 2: Vendor Selection – Choose a reliable HMIS provider.

 Phase 3: System Customization and Testing – Tailor the system to


Rubaga Hospital’s needs.

 Phase 4: Training – Train staff to use the system effectively.

 Phase 5: Rollout and Support – Launch the system and provide


ongoing support.

7. Conclusion
Integrating information systems will transform Rubaga Hospital into a
modern healthcare facility capable of meeting the demands of the 21st
century. This investment will not only enhance operational efficiency but
also improve patient care and the hospital’s reputation.

(b) Difference Between Online Transaction Processing (OLTP) and


Analytical Transaction Processing (OLAP)

Online Transaction Analytical Transaction


Feature
Processing (OLTP) Processing (OLAP)

Handles day-to-day Focuses on analyzing data for


Purpose
transactional operations. decision-making and insights.

Data Type Current, detailed data. Historical, summarized data.

Insert, update, delete, and Complex queries on large


Operations query small volumes of datasets (aggregation,
data. analysis).

Operational staff (e.g., Managers, analysts, decision-


Users
cashiers, doctors, admin). makers.

Processing patient
Example Generating reports on patient
registration or billing in a
Use Case admission trends.
hospital.

System Efficiency and speed of Flexibility and depth of data


Focus individual transactions. analysis.

Database Highly normalized for fast Denormalized, using star or


Design transaction processing. snowflake schemas for
Online Transaction Analytical Transaction
Feature
Processing (OLTP) Processing (OLAP)

analytics.

In summary, OLTP supports operational processes, while OLAP supports


strategic analysis. Both are crucial for a comprehensive information
system.

Soln5

(i) Difference Between Wisdom and Knowledge

Definition:

 Knowledge: The collection of facts, information, and skills acquired


through experience or education. It is about "knowing" something.

 Wisdom: The ability to apply knowledge in a practical, meaningful,


and ethical way. It involves judgment, insight, and understanding of
deeper principles.

Key Differences:

Aspect Knowledge Wisdom

Information or facts that The ability to use knowledge


Nature
can be learned. effectively.

Focus What is known. How to use what is known.

Gained through study, Developed through reflection,


Acquisition
education, or experience. experience, and judgment.

Applied in real-life situations for


Application May remain theoretical.
the best outcomes.

Knowing the rules of Using good judgment to avoid


Example
driving. accidents on a busy road.

Role in Provides data and facts for Guides ethical and balanced
Decisions decision-making. decision-making.

Supporting Example:
A doctor might have the knowledge to diagnose a disease (facts about
symptoms, tests, and treatments). However, wisdom allows the doctor to
understand the patient’s emotional state and suggest a treatment plan
that considers their overall well-being, financial situation, and personal
values.
(ii) How to Attain Wisdom in Today’s Hyperactive Digital Age

Attaining wisdom requires deliberate effort in an age dominated by


constant distractions and superficial engagement. Here are strategies to
cultivate wisdom:

1. Practice Reflection:
Allocate time daily for introspection. Reflect on experiences,
decisions, and their outcomes to gain deeper insights.
Example: Journaling about lessons learned from a challenging
situation.

2. Engage in Deep Conversations:


Seek meaningful discussions with people who hold diverse
perspectives. This fosters empathy and a broader understanding of
the world.
Example: Participating in forums or groups where thoughtful
dialogue is encouraged.

3. Limit Digital Distractions:


Use technology mindfully by setting boundaries, such as turning off
notifications, scheduling screen-free time, or using focus apps.
Example: Designating "no-phone hours" during family or reading
time.

4. Read and Learn from Wisdom Literature:


Study books, biographies, and philosophies that delve into timeless
principles and moral reasoning.
Example: Reading classics like Marcus Aurelius's Meditations or texts
on ethics.

5. Cultivate Emotional Intelligence:


Develop skills in self-awareness, empathy, and emotional regulation
to improve understanding and compassion in interactions.
Example: Practicing mindfulness or attending workshops on
emotional intelligence.

6. Seek Mentors and Role Models:


Learn from those who demonstrate wisdom in their lives. Observe
how they make decisions and handle challenges.
Example: Consulting a mentor for advice on navigating complex
career choices.

7. Practice Humility:
Acknowledge limitations and remain open to learning. Humility is a
foundation for gaining deeper insight.
Example: Admitting mistakes and actively seeking feedback.

8. Balance Knowledge with Values:


Prioritize ethical considerations and the long-term consequences of
actions over short-term gains.
Example: A business leader prioritizing sustainability despite higher
costs.

Summary:
Wisdom is a lifelong pursuit that involves combining knowledge with
reflection, empathy, and ethical judgment. In the digital age, creating
intentional habits and spaces for deep thinking and meaningful
interactions can help overcome distractions and foster wisdom.

Soln6

(a) Concepts in Relation to Information Systems Development

(i) Black Box

A black box refers to a system, component, or process where only the


inputs and outputs are known or relevant, but the internal workings are
hidden or irrelevant to the observer. This concept simplifies complex
systems by focusing only on their functionality.

 Example: A user enters their credentials into a login system (input),


and the system either grants or denies access (output). The user
doesn’t need to know how authentication is processed internally.

(ii) Coupling

Coupling refers to the degree of dependency between different modules


or components of a system.

 Tightly Coupled Systems: Modules are highly interdependent,


making changes in one module likely to affect others.

 Loosely Coupled Systems: Modules operate independently,


making the system more flexible and easier to maintain.

 Example: In a student management system, loose coupling means


the student registration module can function independently of the
fee payment module.
(iii) Decomposition

Decomposition involves breaking down a complex system into smaller,


manageable components or subsystems. This makes the system easier to
understand, design, and maintain.

 Example: Decomposing a university management system into


smaller modules like student records, payroll, library, and
admissions. Each module can then be developed and managed
independently.

(iv) Prototype

A prototype is an early version or model of a system, used to test and


refine functionality, design, and user interaction before final development.
Prototyping allows developers and stakeholders to identify issues early
and make improvements.

 Example: Developing a mock-up of a university portal to test how


students interact with features like course registration and grade
viewing before implementing the final system.

(b) Nkumba University as a System

Nkumba University can be described as a system because it operates as


an organized set of interconnected components working together to
achieve the goal of providing quality education and services.

System Components:

1. Inputs:

o Students, faculty, administrative staff, financial resources, and


educational materials.

2. Processes:

o Teaching, research, student admissions, exams, library


services, and financial management.

3. Outputs:

o Graduates, research publications, community engagement,


and skilled workforce.

4. Feedback Mechanisms:
o Alumni feedback, academic assessments, and performance
reviews.

Use Case Examples:

1. Student Registration System:

o Actors: Students, admissions staff.

o Use Case: A student fills out an online application form,


submits required documents, and receives confirmation of
admission.

2. Course Management System:

o Actors: Lecturers, students, administrators.

o Use Case: A lecturer uploads course content, students access


materials, and the system tracks attendance and grades.

3. Library System:

o Actors: Students, librarians.

o Use Case: A student searches for and borrows books using an


online catalog, and the system tracks due dates and fines.

4. Financial Management System:

o Actors: Students, finance department.

o Use Case: A student pays tuition through an online portal, and


the system generates a receipt and updates financial records.

5. Examination System:

o Actors: Students, academic office.

o Use Case: Students access their exam schedules and submit


assignments through the system, while examiners upload
grades.

By viewing Nkumba University as a system, its various components can be


managed and integrated effectively through information systems to
ensure seamless operations and better service delivery.

You might also like