Quality assurance – involves the entire software development process. It is the monitoring
and improving the process making sure that any agreed procedures are followed and problems are
found and dealt with. The characteristics are:-
(i) Reliability – the software should fit the users requirement and perform the functions
they are designed for.
(ii) Documentation – the software should be accompanied by a manual which is easy to
understand. This helps in use and maintenance of the software.
(iii) User friendliness – the software should be easy to use with clear on screen prospects,
menu driven and extensive screen help facilities.
(iv) Controls – it should have in-built controls which may include passwords, options,
validation checks.
(v) Up-to-date- the software should be up-to-date..
(vi) Modification- the software should be modifiable to fit the requirement of users.
(vii) Compatibility of software- it should integrate easily with other software in use in the
system.
gregorymasila answered the question on November 24, 2017 at 05:01
- What are the limitations of a graphical user interface?(Solved)
What are the limitations of a graphical user interface?
Date posted: November 24, 2017. Answers (1)
- Identify any four common reasons for losing data in computer-based systems.(Solved)
Identify any four common reasons for losing data in computer-based systems.
Date posted: November 24, 2017. Answers (1)
- Some of the major challenges facing the convergence of networks in businesses is performance, that is, the network can at times be painfully too slow...(Solved)
Some of the major challenges facing the convergence of networks in businesses is performance, that is, the network can at times be painfully too slow and result in high
inter-connectivity costs.
Required:
(i) Explain the meaning of the terms: bandwidth and inter-connectivity costs.
(4 marks)
(ii) Examine four factors that can determine the extent to which network performance degrades or slows down.
Explain two strategies that business organizations can adopt to keep network costs low.
Date posted: November 24, 2017. Answers (1)
- Explain the advantages to an organization in having users involved in developing an information systems application. (Solved)
Explain the advantages to an organization in having users involved in developing an information systems application.
Date posted: November 24, 2017. Answers (1)
- Ethical principals can help in evaluating the potential harms or risks in the use of information communication technology(Solved)
Ethical principals can help in evaluating the potential harms or risks in the use of information communication technology.
Date posted: November 24, 2017. Answers (1)
- Certain employees will always be placed in positions of trust, for example senior systems analysts, database administrators and information systems security managers. Such employees can...(Solved)
Certain employees will always be placed in positions of trust, for example senior systems analysts, database administrators and information systems security managers.
Such employees can therefore, compromise the security of information systems if they so wish.
Required:
(i) Explain three control measures that an organization should institute over these employees and guarantee the security of the information systems.
(ii) Every individual in an organization has some opportunity to commit computer fraud.
The potential for which they can do so depends on a number of factors. Examine three
of these factors.
Date posted: November 24, 2017. Answers (1)
- Describe any three features of information needed for strategic planning(Solved)
Describe any three features of information needed for strategic planning.
Date posted: November 23, 2017. Answers (1)
- What risks do you see in using information communications technology (ICT) as a strategic resource and what actions should be taken to make ICT a...(Solved)
What risks do you see in using information communications technology (ICT) as a strategic resource and what actions should be taken to make ICT a viable strategic resource?
Date posted: November 23, 2017. Answers (1)
- Electronic point of sale (EPOS) and Automatic Teller Machines (ATMs) are the dominant terminals currently being used in business.Briefly explain three summary reports that are...(Solved)
Electronic point of sale (EPOS) and Automatic Teller Machines (ATMs) are the dominant terminals currently being used in business.
Briefly explain three summary reports that are likely to be generated by each terminal.
Date posted: November 23, 2017. Answers (1)
- In modern economies, the volume of trade transacted by enterprises over the internet is rapidly increasing that transacted through the traditional channels. Discuss how any two...(Solved)
In modern economies, the volume of trade transacted by enterprises over the internet is rapidly increasing that transacted through the traditional channels.
Discuss how any two traditional functions of doing business have moved to the internet and the benefits this movement has brought to enterprises.
Date posted: November 23, 2017. Answers (1)
- Most governments are embracing information communication technology through the implementation of e-governance initiatives. Describe what is meant by e-governance and give four areas in which e-governance...(Solved)
Most governments are embracing information communication technology through the implementation of e-governance initiatives.
Describe what is meant by e-governance and give four areas in which e-governance is beneficial to the public.
Date posted: November 23, 2017. Answers (1)
- Networks are increasingly being managed remotely. Name three security implications of remote network management and three mechanisms that are needed for remote network management..(Solved)
Networks are increasingly being managed remotely. Name three security implications of remote network management and three mechanisms that are needed
for remote network management.
Examine some of the challenges facing the convergence of networks in business
organizations.
Date posted: November 23, 2017. Answers (1)
- Examine two disadvantages of using direct access storage devices(Solved)
Examine two disadvantages of using direct access storage devices.
Date posted: November 23, 2017. Answers (1)
- Human intelligence can be defined as a person‘s ability to solve problems, utilize logic and think critically. Discuss the major differences between human intelligence and artificial...(Solved)
Human intelligence can be defined as a person‘s ability to solve problems, utilize logic and think critically.
Discuss the major differences between human intelligence and artificial intelligence.
Date posted: November 23, 2017. Answers (1)
- Give four examples of industries and business organizations that are currently using computer networking(Solved)
Give four examples of industries and business organizations that are currently using
computer networking.
Date posted: November 23, 2017. Answers (1)
- Briefly describe the following two elements of software quality and explain howeach element can be measured:(i.) Functional correctness of the software. (ii.) Reliability of...(Solved)
Briefly describe the following two elements of software quality and explain how each element can be measured:
(i.) Functional correctness of the software.
(ii.) Reliability of the software.
Date posted: November 23, 2017. Answers (1)
- (i) Networks are increasingly being managed remotely. Name three security implications of remote network management and three mechanisms that are needed for remote network management(Solved)
(i) Networks are increasingly being managed remotely. Name three security
implications of remote network management and three mechanisms that are needed
for remote network management.
(ii) Examine some of the challenges facing the convergence of networks in business
organizations.
Date posted: November 23, 2017. Answers (1)
- Who should be involved in a requirement review? Suggest their role in the requirement review(Solved)
Who should be involved in a requirement review? Suggest their role in the requirement review.
Date posted: November 23, 2017. Answers (1)
- Differentiate between the following terms:(i.) Hardware and software;(ii.) Application software and system software;(iii.) Bit and byte; (iv.) RAM and ROM;...(Solved)
Differentiate between the following terms:
(i.) Hardware and software;
(ii.) Application software and system software;
(iii.) Bit and byte;
(iv.) RAM and ROM;
(v.) Data and information.
Date posted: November 23, 2017. Answers (1)
- Describe three major factors that affect the performance of a computer operation.For each factor, state one example of measurement.(Solved)
Describe three major factors that affect the performance of a computer operation.
For each factor, state one example of measurement.
Date posted: November 23, 2017. Answers (1)