Get premium membership and access questions with answers, video lessons as well as revision papers.
Magnetic medium
This refers to a secondary storage medium that utilizes magnetism to store data. Examples
include magnetic disks (hard disks and floppy disks) and magnetic tapes.
Risks to data storage on a magnetic medium:
1.Strong magnetic fields- these could destroy the data on the medium by altering
themagnetic patterns on the media
2.Intense heat- this alters the magnetic patterns on the media thus destroying the
datarepresented by those magnetic patterns.
3.Dust- this results in hard disk crashes and also may render floppy disks unreadable. A
diskcrash is a situation that arises when dust particles come into the space between a read-
write head of a hard disk and the disk plate. Disk crashes render a hard disk unusable thus
resulting in loss of stored data.
4.Theft- since magnetic media are portable, they are liable to theft. Stealing a
magneticmedium device is as good as stealing the data it contains since the data stored can
be accessed after the device has been installed on another terminal.
gregorymasila answered the question on November 21, 2017 at 20:31
- It is important to bear in mind that information may be relevant to people outside the organisation as well as to its internal management and employees....(Solved)
It is important to bear in mind that information may be relevant to people outside the organisation as well as to its internal management and employees. Sometimes it happens that some decisions relating to an organisation are taken by outsiders.
State six examples of decisions relating to an organisation that may be taken by outsiders
Date posted: November 21, 2017. Answers (1)
- The adoption of database systems as a way of managing information systems is gaining popularity over standard file: Required:(i) State the features of a database management...(Solved)
The adoption of database systems as a way of managing information systems is gaining
popularity over standard file.
Required:
(i) State the features of a database management system that provide data security and
integrity.
(ii) What problems are caused by data redundancies?
(iii) Centralized control avoids unnecessary data redundancy or duplication.
What precautions should be taken into account -in the process of establishing a
centralized data control system to avoid data redundancy?
Date posted: November 21, 2017. Answers (1)
- Using your own experience, explain why more and more software is being purchased for windows environment as opposed to character based environment(Solved)
Using your own experience, explain why more and more software is being purchased for windows environment as opposed to character based environment.
Date posted: November 21, 2017. Answers (1)
- Explain Ways in which a GUI makes a system user friendly(Solved)
Explain Ways in which a GUI makes a system user friendly.
Date posted: November 21, 2017. Answers (1)
- Graphical user interface (GUI) ,have proved to be more user friendly than current character based systems.Other than the graphical user interface, give a summary of...(Solved)
(i) Graphical user interface (GUI) ,have proved to be more user friendly than current character based systems.
Other than the graphical user interface, give a summary of at least three interfaces you would use in "the design of systems.
(ii) Briefly explain three ways in which GUI makes a system user friendly.
Date posted: November 21, 2017. Answers (1)
- During systems development life cycle (SDLC): the systems analyst uses some tools to model the users requirements in such a way that he is able...(Solved)
During systems development life cycle (SDLC): the systems analyst uses some tools to model the users requirements in such a way that he is able to communicate his understanding of the users needs.
Required:
Identify and describe three tools the systems analyst may use. to model the systems
requirements.
Date posted: November 21, 2017. Answers (1)
- One important aspect of information-systems management is the physical and managerial location or siting of the information system within an organisation.Explain two information systems location...(Solved)
One important aspect of information-systems management is the physical and managerial location or sitting of the information system within an organisation.
Explain two information systems location options indicating circumstances under which each siting allocation is appropriate.
Date posted: November 21, 2017. Answers (1)
- A company needs information on whicb to base decisions concerning the current operations and future plans. Explain areas of management control where computers are used or...(Solved)
A company needs information on which to base decisions concerning the current operations and future plans. Explain areas of management control where computers are used or can be used.
Date posted: November 21, 2017. Answers (1)
- Four companies A., B, C and D, which have similar activities but are not part of a group,have the following computer configurations,Company A: Three stand-alone...(Solved)
Four companies A, B, C and D, which have similar activities but are not part of a group,
have the following computer configurations,
Company A: Three stand-alone micro-computers (CPU, VDU, Keyboard, hard disk and
mouse) each having its own printer.
Company B Small office with 11 micro-computers linked in a Local Area Network (LAN).
Each micro-computer has its own processing ability, but is linked via the
LAN to central printers, disk storage, file server and tape streamer devices.
The LAN is completely self-contained", This means that there are no modems or other similar external devices attached to it.
Company C Four processing locations connected by a Wide Area Network (WAN). Each
location has a LAN in the same configuration as company B, although there is also a
dedicated landline to two of the three. offices (offices are connected in a ring to two of
the other offices). Each server is updated with. data from the other three locations at 15
minutes interval.
Company D Twenty processing locations, each with its own LAN in the same configuration
as company B. All locations are connected in a star configuration to head
office. File servers at each location are updated from head office after every
five minutes, Each location has a reserved external., telephone line for
selected customers to use. Orders by customers are
transmitted direct on to the company D‘s Computer system
Required:
(a) State, with reasons, for each company, what security procedures should be applied to
ensure there is no unauthorized access to its computer system.
(b) Company B is planning to establish additional branches and wants to upgrade its
systems to duplicate those of company D.
State and explain the data communication systems you would recommend
Date posted: November 21, 2017. Answers (1)
- Why are expert information systems not popular in business systems?
(Solved)
Why are expert information systems not popular in business systems?
Date posted: November 21, 2017. Answers (1)
- User friendliness is one of the key and desirable features that form a basis for evaluating competing software packages. Required:Name and describe three features of a...(Solved)
User friendliness is one of the key and desirable features that form a basis for evaluating competing software packages.
Required:
Name and describe three features of a user friendly software.
Date posted: November 21, 2017. Answers (1)
- The accounting department of a medium sized business organisation for which you work wishes to purchase microcomputers to support its functions. You have been asked to...(Solved)
The accounting department of a medium sized business organisation for which you work wishes to purchase microcomputers to support its functions. You have been asked to draft a document that outlines the hardware and software specifications for the proposed project.
What would your draft contain?
Date posted: November 21, 2017. Answers (1)
- Which recursive sorting technique always makes recursive calls to sort
subarrays that are about half size of the original array?(Solved)
Which recursive sorting technique always makes recursive calls to sort
subarrays that are about half size of the original array?
Date posted: November 21, 2017. Answers (1)
- What is friend function?(Solved)
What is friend function?
Date posted: November 21, 2017. Answers (1)
- Outline the disadvantages of bureaux as a method of possessing a computer.(Solved)
Outline the disadvantages of bureaux as a method of possessing a computer.
Date posted: November 21, 2017. Answers (1)
- The organisation you work for has hired a software engineer to develop a suite of software to manage your payroll application system. As the financial...(Solved)
The organisation you work for has hired a software engineer to develop a suite of
software to manage your payroll application system. As the financial manager, you
are working closely with the software engineer to ensure that the software quality
assurance standards are attained.
Required:
(i) List any four data validation checks that the software engineer should incorporate into
the program.
(ii) Why is it important to test the software before implementing it?
(iii) Suggest two measures that the software engineer must take in order to simplify user
training and support that is fundamental to the success of the information systems
project.
Date posted: November 21, 2017. Answers (1)
- Outline the service factors to consider before procuring a computer.(Solved)
Outline the service factors to consider before procuring a computer.
Date posted: November 21, 2017. Answers (1)
- It is claimed that data required to support strategic planning differs from data required to support operational decisions in terms of the time period referred to...(Solved)
It is claimed that data required to support strategic planning differs from data required to
support operational decisions in terms of the time period referred to and the source or origin of the data.
Required:
Briefly describe how data required to support strategic planning differs from that required to
support operational
decisions in terms of:
(i) Time period referred to.
(ii) The source or origin of the data.
Date posted: November 21, 2017. Answers (1)
- Outline advantages of using bureaux as a way of acquiring a computer.(Solved)
Outline advantages of using bureaux as a way of acquiring a computer.
Date posted: November 21, 2017. Answers (1)
- Outline the disadvantages of leasing a computer.(Solved)
Outline the disadvantages of leasing a computer.
Date posted: November 21, 2017. Answers (1)