Get premium membership and access questions with answers, video lessons as well as revision papers.
1. Documentation – this is the description of a software in written form after its development.
The importance are:-
(i) It guides the development team at various stages of the development life cycle.
(ii) Can be used as a system back up copy should something happen to its implementation
(iii) It aids or assists during system maintenance since it guides in identification of system
modules to be changed.
(iv) Effectively provides a check list of items to be covered during subsequent system
audit a maintenance.
(v) Guides against loss of system understanding particularly when the author leaves the
company or dies
(vi) Act as a training guide for users.
2. Importance of agreeing on the information system requirement.
(i) Improves relationship between users management and developers. It ensures that
potential dispute areas are reduced.
(ii) Lowers the cost of system development by defining the requirement time completely
and correctly.
(iii) Increases team satisfaction, confidence and support.
(iv) It makes it easier to plan to project as the total costs can be estimated with more
accuracy.
gregorymasila answered the question on November 24, 2017 at 05:16
- Name the basic requirements for internet connectivity.(Solved)
Name the basic requirements for internet connectivity.
Date posted: November 24, 2017. Answers (1)
- Explain the five stages of a transaction processing cycle(Solved)
Explain the five stages of a transaction processing cycle.
Date posted: November 24, 2017. Answers (1)
- Explain the characteristics of a data dictionary.(Solved)
Explain the characteristics of a data dictionary.
Date posted: November 24, 2017. Answers (1)
- Define and differentiate functional integration and physical integration in a workstation environment(Solved)
Define and differentiate functional integration and physical integration in a workstation environment.
Date posted: November 24, 2017. Answers (1)
- Briefly describe four characteristics of quality assurance you would expect to find in a software product(Solved)
Briefly describe four characteristics of quality assurance you would expect to find in a software product.
Date posted: November 24, 2017. Answers (1)
- What are the limitations of a graphical user interface?(Solved)
What are the limitations of a graphical user interface?
Date posted: November 24, 2017. Answers (1)
- Identify any four common reasons for losing data in computer-based systems.(Solved)
Identify any four common reasons for losing data in computer-based systems.
Date posted: November 24, 2017. Answers (1)
- Some of the major challenges facing the convergence of networks in businesses is performance, that is, the network can at times be painfully too slow...(Solved)
Some of the major challenges facing the convergence of networks in businesses is performance, that is, the network can at times be painfully too slow and result in high
inter-connectivity costs.
Required:
(i) Explain the meaning of the terms: bandwidth and inter-connectivity costs.
(4 marks)
(ii) Examine four factors that can determine the extent to which network performance degrades or slows down.
Explain two strategies that business organizations can adopt to keep network costs low.
Date posted: November 24, 2017. Answers (1)
- Explain the advantages to an organization in having users involved in developing an information systems application. (Solved)
Explain the advantages to an organization in having users involved in developing an information systems application.
Date posted: November 24, 2017. Answers (1)
- Ethical principals can help in evaluating the potential harms or risks in the use of information communication technology(Solved)
Ethical principals can help in evaluating the potential harms or risks in the use of information communication technology.
Date posted: November 24, 2017. Answers (1)
- Certain employees will always be placed in positions of trust, for example senior systems analysts, database administrators and information systems security managers. Such employees can...(Solved)
Certain employees will always be placed in positions of trust, for example senior systems analysts, database administrators and information systems security managers.
Such employees can therefore, compromise the security of information systems if they so wish.
Required:
(i) Explain three control measures that an organization should institute over these employees and guarantee the security of the information systems.
(ii) Every individual in an organization has some opportunity to commit computer fraud.
The potential for which they can do so depends on a number of factors. Examine three
of these factors.
Date posted: November 24, 2017. Answers (1)
- Describe any three features of information needed for strategic planning(Solved)
Describe any three features of information needed for strategic planning.
Date posted: November 23, 2017. Answers (1)
- What risks do you see in using information communications technology (ICT) as a strategic resource and what actions should be taken to make ICT a...(Solved)
What risks do you see in using information communications technology (ICT) as a strategic resource and what actions should be taken to make ICT a viable strategic resource?
Date posted: November 23, 2017. Answers (1)
- Electronic point of sale (EPOS) and Automatic Teller Machines (ATMs) are the dominant terminals currently being used in business.Briefly explain three summary reports that are...(Solved)
Electronic point of sale (EPOS) and Automatic Teller Machines (ATMs) are the dominant terminals currently being used in business.
Briefly explain three summary reports that are likely to be generated by each terminal.
Date posted: November 23, 2017. Answers (1)
- In modern economies, the volume of trade transacted by enterprises over the internet is rapidly increasing that transacted through the traditional channels. Discuss how any two...(Solved)
In modern economies, the volume of trade transacted by enterprises over the internet is rapidly increasing that transacted through the traditional channels.
Discuss how any two traditional functions of doing business have moved to the internet and the benefits this movement has brought to enterprises.
Date posted: November 23, 2017. Answers (1)
- Most governments are embracing information communication technology through the implementation of e-governance initiatives. Describe what is meant by e-governance and give four areas in which e-governance...(Solved)
Most governments are embracing information communication technology through the implementation of e-governance initiatives.
Describe what is meant by e-governance and give four areas in which e-governance is beneficial to the public.
Date posted: November 23, 2017. Answers (1)
- Networks are increasingly being managed remotely. Name three security implications of remote network management and three mechanisms that are needed for remote network management..(Solved)
Networks are increasingly being managed remotely. Name three security implications of remote network management and three mechanisms that are needed
for remote network management.
Examine some of the challenges facing the convergence of networks in business
organizations.
Date posted: November 23, 2017. Answers (1)
- Examine two disadvantages of using direct access storage devices(Solved)
Examine two disadvantages of using direct access storage devices.
Date posted: November 23, 2017. Answers (1)
- Human intelligence can be defined as a person‘s ability to solve problems, utilize logic and think critically. Discuss the major differences between human intelligence and artificial...(Solved)
Human intelligence can be defined as a person‘s ability to solve problems, utilize logic and think critically.
Discuss the major differences between human intelligence and artificial intelligence.
Date posted: November 23, 2017. Answers (1)
- Give four examples of industries and business organizations that are currently using computer networking(Solved)
Give four examples of industries and business organizations that are currently using
computer networking.
Date posted: November 23, 2017. Answers (1)