📘 **NOTE**
These MIS questions have been compiled from **KNEC past
papers spanning the last 4 years** .
They are organized by topic and include essential keynotes
for effective study.
🔥 **IMPORTANT:
** If you decide not to use your basic reasoning and logical
thinking,
that’s exactly how you fail MIS.Don’t just memorize—
understand the concepts and apply them!
1. PROJECT MANAGEMENT
✅ Keynotes:
* Milestone: Key event marking project progress.
* PERT: Uses optimistic, most likely & pessimistic time to
calculate expected duration.
* CPM: Identifies longest time path in a project (no slack).
* Expected Time Formula: (O + 4M + P) ÷ 6
* Critical Path: Longest path in a network diagram.
* Gantt Chart: Bar chart showing task schedules.
* Project Management Phases: Initiation, planning, execution,
monitoring, closure.
📘 Questions:
* 1(c) Describe optimistic, most likely & pessimistic time.
(6 marks)
* 1(d) Explain two limitations of PERT. (4 marks)
* 2(c) Determine critical path using earliest start and
latest finish. (6 marks)
* 4(d)(i–iii) Construct network diagram, identify critical
path, and determine new finish time if delayed. (8 marks)
* 6(d) Calculate probability project will exceed highest
pessimistic time. (6 marks)
* 9(a) Differentiate between CPM and PERT. (4 marks)
* 11(a) Outline four stages of project management. (4 marks)
* 7(a)(i–ii) Uses and inputs of project management software.
(4 marks)
* 12(c) Explain three time estimates for activities. (6
marks)
2. SYSTEM MAINTENANCE & DEVELOPMENT
✅ Keynotes:
* Corrective: Fix faults after system is live.
* Perfective: Improve system performance or add features.
* Adaptive: Modify system due to external changes.
* Preventive: Avoid future issues.
* SDLC: Planning, analysis, design, development, testing,
implementation, maintenance.
📘 Questions:
* 3(b) Circumstances requiring: corrective, perfective,
adaptive maintenance. (6 marks)
* 2(a) Two circumstances that lead to adaptive maintenance.
(4 marks)
* 2(b)(i–ii) Maintenance for new laws + explain other types.
(6 marks)
* 8(c) Differentiate between perfective and preventative
maintenance. (4 marks)
* 10(c)(ii) Distinguish between perfective and preventive
maintenance. (4 marks)
3. MIS FUNDAMENTALS
✅ Keynotes:
* MIS Definition: Supports management in decision-making.
* Components: Hardware, software, data, people, procedures.
* Functions: Planning, control, coordination, reporting.
* Early Warning Mechanism: Alerts before problems arise.
* Levels of Support: Strategic, tactical, operational.
📘 Questions:
* 1(b) Explain three advantages of using DBMS. (6 marks)
* 2(a) Define early warning mechanism. (2 marks)
* 6(a) State four components of MIS. (2 marks)
* 6(b) Describe three types of IS used across all levels. (6
marks)
* 4(d) Describe classification of MIS based on support
provided. (4 marks)
4. IMPLEMENTATION & CHANGEOVER METHODS
✅ Keynotes:
* Parallel Changeover: Run new and old systems together.
* Advantages: Safer, fallback available.
* Disadvantages: Expensive, duplicate effort.
* Implementation Issues: Resistance, training, poor planning.
* Preventing Failure: Clear goals, stakeholder input,
training.
📘 Questions:
* 3(d)(i) Explain two advantages of parallel changeover. (4
marks)
* 3(d)(ii) Explain one disadvantage. (2 marks)
* 4(c) Explain three measures to prevent IS implementation
failure. (6 marks)
* 8(d) Explain three measures to minimize resistance to new
IS. (6 marks)
5. DECISION SUPPORT SYSTEMS (DSS)
✅ Keynotes:
* DSS Definition: Helps in semi-structured decision-making.
* Components: Database, Model Base, User Interface.
* Herbert Simon Model: Intelligence → Design → Choice.
* Supports: What-if analysis, forecasts, simulations.
📘 Questions:
* 4(b) Describe three components of DSS. (6 marks)
* 3(a) MIS facilitates: coordination, planning, control. (6
marks)
* 3(b) Explain three DSS applications in an organization. (6
marks)
* 6(d) Describe Herbert Simon’s model of decision making. (6
marks)
6. INFORMATION SYSTEM SECURITY & ETHICS
✅ Keynotes:
* Unethical Use: Data theft, misuse of privileges, software
piracy.
* Hacker: Accesses systems for fun or challenge.
* Cracker: Malicious intent—destroys or steals.
* Cyber Warfare: Nation-state attacks on information systems.
* Integrity: Ensuring data is accurate and untampered.
📘 Questions:
* 7(b) Unethical behavior examples. (6 marks)
* 7(c) Hacker vs cracker. (4 marks)
* 4(a) Define cyber warfare. (2 marks)
* 13(b)(i–ii) Define passive attack & integrity. (4 marks)
* 13(d) Explain three ICT security control measures. (6
marks)
7. TYPES OF INFORMATION SYSTEMS
✅ Keynotes:
* OAS: Automates office tasks.
* GIS: Analyzes geographical data.
* Virtual Reality: Simulated environment for training or
design.
* TPS: Records day-to-day transactions.
* EIS: Summarizes data for executives.
📘 Questions:
* 5(b) Describe OAS, GIS, Virtual Reality. (6 marks)
* 4(a) Benefits of TPS. (4 marks)
* 5(a) Features of EIS. (4 marks)
8. PROCUREMENT & ACQUISITION OF IS
✅ Keynotes:
* Procurement Method (Sole Source): Only one vendor
available.
* UAD: Users develop own systems.
* Outsourcing: Hire external vendor to deliver system.
📘 Questions:
* 6(b)(i–ii) Identify procurement method + disadvantages. (4
marks)
* 5(a) Benefits of outsourcing IS. (4 marks)
* 5(b)(i–ii) Situations for UAD + limitations. (6 marks)
9. IS RESOURCE MANAGEMENT
✅ Keynotes:
* Components: Hardware, software, people, data.
* Information as a Resource: Valuable for decisions.
* Confidentiality vs Integrity: Privacy vs accuracy.
📘 Questions:
* 1(a) Master vs transaction file. (4 marks)
* 1(d) Ethical obligations about employee data. (6 marks)
* 4(c) Attributes of information. (4 marks)
* 10(b) Importance of MIS in organization. (4 marks)
* 13(c) Advantages of office automation systems. (6 marks)