e_Business example examination questions
question 1
draw
a diagram of the Knowledge Management Framework. depict
on the diagram the six activities that an e-Business needs to undertake to
manage knowledge. (2 marks)
For each
activity state on the diagram two examples of activity that CCC may undertake
to manage Knowledge. (3 marks)
question 2
a) Explain what an Intranet
is. What does it do for a corporate organisation?
Where does it sit in relation to the corporate IT infrastructure? (2 marks)
Mark scheme |
0-40% |
40%-60% |
60%-80% |
80%-100% |
a) 40% |
Little
explanation, Explanation is unclear. |
Intranet
is explained and its use is identified. |
+
Intranet technology is explained. |
+ Intranet
is explained within the context of corporate IT infrastructure. |
b) Using examples of how it
could be used; discuss the benefits of Intranet strategy and the use of an open
source content management system like "PostNuke"
for the implementation of the Intranet. (3 marks)
Mark scheme |
0-40% |
40%-60% |
60%-80% |
80%-100% |
b) 60% |
No valid
examples. Discussion is unclear. Does not identify the benefits. |
Examples
are valid though they are limited to core business processes. |
+
Examples are good for elaborating on the use of the technology that brings
about benefits. |
+ examples discuss a number of more intuitive ways
organisations could use Intranet technology and in particular PostNuke to build the Intranet. |
question 3
use examples to explain what 'domain name' and 'domain name service' are. (2 marks)
for
"aces.shu.ac.uk", draw a diagram to present the hierarchical
organisation of domains. state and explain all the
domains in this domain name. (3 marks)
question 4
a) identify the four security
cornerstones. use examples to briefly explain them. (2
marks)
Marking scheme |
0-40% |
40%-60% |
60%-80% |
80%-100% |
a) 40% |
Demonstrate little understanding of the terms. |
States three out of the four terms correctly. Explains as many as two of the terms using valid examples that demonstrate some understanding of the three terms. |
.. and all four terms are stated correctly. Two of the terms are explained correctly using appropriate examples of exchanges or transactions that take place online. |
and all four terms are explained using correct and appropriate examples of online transactions and exchanges. Demonstrates a full understanding of the terms. |
Answers |
0-40% |
40%-60% |
60%-80% |
80%-100% |
a) 40% |
Demonstrate little understanding of the terms. |
States three out of Integrity, Privacy, Authenticity and non-repudiation as the cornerstones. Some indication of understanding for example privacy is about making sure message remain private to the sender and intended receiver. Valid examples such as consumer sending his CC details to merchant must stay private to customer and merchant. |
.. and States all four. Two of them are explained using correct examples. Further examples may be: non-rep -consumer who places the order with Amazon should not be able to refrain from the order. Authentication - when a customer logs into Amazon server, he should be sure that Amazon are in fact who they claim to be. |
and more than two are correctly explained using appropriate examples. Demonstrates a full understanding of the terms. |
b) what is the role of a certificate authority like Amazon? what is a digital certificate? discuss
services that Verisign could provide CCC. (3 marks)
Marking scheme |
0-40% |
40%-60% |
60%-80% |
80%-100% |
b) 60% |
Demonstrates little understanding as to what a CA or a DC is. |
Explains what a CA is and what a DC is. |
.. and attempts to correctly place the role of CA and DC within PKI. Uses at least one good example, possibly related to potential services to students within SHU, to demonstrate understanding of the hierarchical structure of CAs. |
.. and extends the discussion (again may be related to services within the organisation) to fully demonstrate understanding of why certain organisations such as Amazon, banks, CC card companies are good candidates to emerge as CAs. |
Answers |
0-40% |
40%-60% |
60%-80% |
80%-100% |
b) 60% |
Demonstrates little understanding as to what a CA or a DC is. |
States that CA is a trusted party that issues digital certificates. Also explains that digital certificate is a credential that identifies the holding entity. |
.. and explains that a DC is required for secure communication. Mentions PKI and states DC to be a wrapper of public key. Use, say Amazon as an example of CA that is side-certified by Verisign to issue DC to various departments or to the students. |
and uses at least two examples. Fully explains that say Amazon is in a good position to act as a CA because it has many departments and many machines. Possibly another example in another context is also used like SHU must have checked and ensured student identity and credentials already so it could be a good candidate as CA. |
question 5
what
are B2C, B2B, C2C and C2B? use examples to briefly
explain them. (2 marks)
For CCC's B2B relationships, construct a simple spider diagram.
(3 marks)
question 6
use simple
examples and appropriate diagrammatic techniques and annotations to explain:
what is a use case? what is a use case diagram?. (2
marks)
Produce a
use case diagram for the University Library system, described below. (3 marks)
University Library System
This
is a Web-based system for administering loans of books. Both students and
staff may borrow and reserve books. All users may register online and
they are authenticated before they can reserve books and look up the books they
have on loan however there is no need for logging in if users want to look up
the catalogue. Only library staff can issue loans. At the time of
issue, admin staff have to make sure that user does
not have overdue books in which case the loan would be refused.
question 7
what
are the three functional requirements of computing applications? what is stand-alone? what is
client/server? (2 marks)
if we
are designing a client-server Web-based solution for CCC, what factors would
influence your decisions on client-side and server-side functionalities? (3
marks)
question 8
explain
what a web service is. what role does the xml
play in web service technology? (2 marks)
draw
a diagram that depicts the basic architecture of web services. make sure you include all standards and messaging patterns
and protocols. (3 marks)
question 9
explain
what the terms tacit knowledge, explicit knowledge and background knowledge
mean. Use examples to demonstrate your understanding of the terms. (2 marks)
use
examples to discuss how CCC should manage tacit and explicit knowledge and use
them to take advantage of the e-Business opportunity. (3 marks)