Get premium membership and access questions with answers, video lessons as well as revision papers.
Common reasons for losing data
(i) Ignorance – a software user may delete data files maintained by a software because
he/she does not know how to operate the software of is unaware of the
consequences of deletion.
(ii) Accidents – a user may accidentally delete data files maintained by software due to
mistaken identity of files.
(iii) Fraud – employer may access and delete security log files to cover any illegal
activities taking place.
(iv) Malice – hackers may delete organizational data in order to bring down the
operations of an organization.
(v) Poor management of data stores – could result in the theft of companies‘ diskettes
containing sensitive data.
gregorymasila answered the question on November 24, 2017 at 04:55
- Some of the major challenges facing the convergence of networks in businesses is performance, that is, the network can at times be painfully too slow...(Solved)
Some of the major challenges facing the convergence of networks in businesses is performance, that is, the network can at times be painfully too slow and result in high
inter-connectivity costs.
Required:
(i) Explain the meaning of the terms: bandwidth and inter-connectivity costs.
(4 marks)
(ii) Examine four factors that can determine the extent to which network performance degrades or slows down.
Explain two strategies that business organizations can adopt to keep network costs low.
Date posted: November 24, 2017. Answers (1)
- Explain the advantages to an organization in having users involved in developing an information systems application. (Solved)
Explain the advantages to an organization in having users involved in developing an information systems application.
Date posted: November 24, 2017. Answers (1)
- Ethical principals can help in evaluating the potential harms or risks in the use of information communication technology(Solved)
Ethical principals can help in evaluating the potential harms or risks in the use of information communication technology.
Date posted: November 24, 2017. Answers (1)
- Certain employees will always be placed in positions of trust, for example senior systems analysts, database administrators and information systems security managers. Such employees can...(Solved)
Certain employees will always be placed in positions of trust, for example senior systems analysts, database administrators and information systems security managers.
Such employees can therefore, compromise the security of information systems if they so wish.
Required:
(i) Explain three control measures that an organization should institute over these employees and guarantee the security of the information systems.
(ii) Every individual in an organization has some opportunity to commit computer fraud.
The potential for which they can do so depends on a number of factors. Examine three
of these factors.
Date posted: November 24, 2017. Answers (1)
- Describe any three features of information needed for strategic planning(Solved)
Describe any three features of information needed for strategic planning.
Date posted: November 23, 2017. Answers (1)
- What risks do you see in using information communications technology (ICT) as a strategic resource and what actions should be taken to make ICT a...(Solved)
What risks do you see in using information communications technology (ICT) as a strategic resource and what actions should be taken to make ICT a viable strategic resource?
Date posted: November 23, 2017. Answers (1)
- Electronic point of sale (EPOS) and Automatic Teller Machines (ATMs) are the dominant terminals currently being used in business.Briefly explain three summary reports that are...(Solved)
Electronic point of sale (EPOS) and Automatic Teller Machines (ATMs) are the dominant terminals currently being used in business.
Briefly explain three summary reports that are likely to be generated by each terminal.
Date posted: November 23, 2017. Answers (1)
- In modern economies, the volume of trade transacted by enterprises over the internet is rapidly increasing that transacted through the traditional channels. Discuss how any two...(Solved)
In modern economies, the volume of trade transacted by enterprises over the internet is rapidly increasing that transacted through the traditional channels.
Discuss how any two traditional functions of doing business have moved to the internet and the benefits this movement has brought to enterprises.
Date posted: November 23, 2017. Answers (1)
- Most governments are embracing information communication technology through the implementation of e-governance initiatives. Describe what is meant by e-governance and give four areas in which e-governance...(Solved)
Most governments are embracing information communication technology through the implementation of e-governance initiatives.
Describe what is meant by e-governance and give four areas in which e-governance is beneficial to the public.
Date posted: November 23, 2017. Answers (1)
- Networks are increasingly being managed remotely. Name three security implications of remote network management and three mechanisms that are needed for remote network management..(Solved)
Networks are increasingly being managed remotely. Name three security implications of remote network management and three mechanisms that are needed
for remote network management.
Examine some of the challenges facing the convergence of networks in business
organizations.
Date posted: November 23, 2017. Answers (1)
- Examine two disadvantages of using direct access storage devices(Solved)
Examine two disadvantages of using direct access storage devices.
Date posted: November 23, 2017. Answers (1)
- Human intelligence can be defined as a person‘s ability to solve problems, utilize logic and think critically. Discuss the major differences between human intelligence and artificial...(Solved)
Human intelligence can be defined as a person‘s ability to solve problems, utilize logic and think critically.
Discuss the major differences between human intelligence and artificial intelligence.
Date posted: November 23, 2017. Answers (1)
- Give four examples of industries and business organizations that are currently using computer networking(Solved)
Give four examples of industries and business organizations that are currently using
computer networking.
Date posted: November 23, 2017. Answers (1)
- Briefly describe the following two elements of software quality and explain howeach element can be measured:(i.) Functional correctness of the software. (ii.) Reliability of...(Solved)
Briefly describe the following two elements of software quality and explain how each element can be measured:
(i.) Functional correctness of the software.
(ii.) Reliability of the software.
Date posted: November 23, 2017. Answers (1)
- (i) Networks are increasingly being managed remotely. Name three security implications of remote network management and three mechanisms that are needed for remote network management(Solved)
(i) Networks are increasingly being managed remotely. Name three security
implications of remote network management and three mechanisms that are needed
for remote network management.
(ii) Examine some of the challenges facing the convergence of networks in business
organizations.
Date posted: November 23, 2017. Answers (1)
- Who should be involved in a requirement review? Suggest their role in the requirement review(Solved)
Who should be involved in a requirement review? Suggest their role in the requirement review.
Date posted: November 23, 2017. Answers (1)
- Differentiate between the following terms:(i.) Hardware and software;(ii.) Application software and system software;(iii.) Bit and byte; (iv.) RAM and ROM;...(Solved)
Differentiate between the following terms:
(i.) Hardware and software;
(ii.) Application software and system software;
(iii.) Bit and byte;
(iv.) RAM and ROM;
(v.) Data and information.
Date posted: November 23, 2017. Answers (1)
- Describe three major factors that affect the performance of a computer operation.For each factor, state one example of measurement.(Solved)
Describe three major factors that affect the performance of a computer operation.
For each factor, state one example of measurement.
Date posted: November 23, 2017. Answers (1)
- Examine the issues to be considered when planning for information systems training(Solved)
Examine the issues to be considered when planning for information systems training.
Date posted: November 23, 2017. Answers (1)
- Explain the following database security features: (i) Authorization (ii) Authentication(Solved)
Explain the following database security features:
(i) Authorization
(ii) Authentication
Date posted: November 23, 2017. Answers (1)