Functional requirements required
(i) User requirements – the system should be able to meet the need of the firm and its
users as closely as possible.
(ii) Processing time – it should have a short response time. A faster system will be very
appropriate.
(iii) User friendliness – the system should be easy to use with clear on screen prompts
menu driven and extensive on screen help facilities.
(iv) Controls – the system should have in built controls which may include passwords,
validation checks, audit trails etc to boost information and data integrity.
(v) Flexibility – the system should allow for future modification in case of requirement
changing.
(vi) Compatibility – the system should be compatible with other system to allow
simulations with user systems
(vii) Portability – the software should be able to run on the firms different machines.
gregorymasila answered the question on November 24, 2017 at 05:16
- Outline four features of a word processing software package(Solved)
Outline four features of a word processing software package.
Date posted: November 24, 2017. Answers (1)
- Explain the importance of documenting and agreeing on the information systems requirements(Solved)
Explain the importance of documenting and agreeing on the information systems requirements.
Date posted: November 24, 2017. Answers (1)
- Name the basic requirements for internet connectivity.(Solved)
Name the basic requirements for internet connectivity.
Date posted: November 24, 2017. Answers (1)
- Explain the five stages of a transaction processing cycle(Solved)
Explain the five stages of a transaction processing cycle.
Date posted: November 24, 2017. Answers (1)
- Explain the characteristics of a data dictionary.(Solved)
Explain the characteristics of a data dictionary.
Date posted: November 24, 2017. Answers (1)
- Define and differentiate functional integration and physical integration in a workstation environment(Solved)
Define and differentiate functional integration and physical integration in a workstation environment.
Date posted: November 24, 2017. Answers (1)
- Briefly describe four characteristics of quality assurance you would expect to find in a software product(Solved)
Briefly describe four characteristics of quality assurance you would expect to find in a software product.
Date posted: November 24, 2017. Answers (1)
- What are the limitations of a graphical user interface?(Solved)
What are the limitations of a graphical user interface?
Date posted: November 24, 2017. Answers (1)
- Identify any four common reasons for losing data in computer-based systems.(Solved)
Identify any four common reasons for losing data in computer-based systems.
Date posted: November 24, 2017. Answers (1)
- Some of the major challenges facing the convergence of networks in businesses is performance, that is, the network can at times be painfully too slow...(Solved)
Some of the major challenges facing the convergence of networks in businesses is performance, that is, the network can at times be painfully too slow and result in high
inter-connectivity costs.
Required:
(i) Explain the meaning of the terms: bandwidth and inter-connectivity costs.
(4 marks)
(ii) Examine four factors that can determine the extent to which network performance degrades or slows down.
Explain two strategies that business organizations can adopt to keep network costs low.
Date posted: November 24, 2017. Answers (1)
- Explain the advantages to an organization in having users involved in developing an information systems application. (Solved)
Explain the advantages to an organization in having users involved in developing an information systems application.
Date posted: November 24, 2017. Answers (1)
- Ethical principals can help in evaluating the potential harms or risks in the use of information communication technology(Solved)
Ethical principals can help in evaluating the potential harms or risks in the use of information communication technology.
Date posted: November 24, 2017. Answers (1)
- Certain employees will always be placed in positions of trust, for example senior systems analysts, database administrators and information systems security managers. Such employees can...(Solved)
Certain employees will always be placed in positions of trust, for example senior systems analysts, database administrators and information systems security managers.
Such employees can therefore, compromise the security of information systems if they so wish.
Required:
(i) Explain three control measures that an organization should institute over these employees and guarantee the security of the information systems.
(ii) Every individual in an organization has some opportunity to commit computer fraud.
The potential for which they can do so depends on a number of factors. Examine three
of these factors.
Date posted: November 24, 2017. Answers (1)
- Describe any three features of information needed for strategic planning(Solved)
Describe any three features of information needed for strategic planning.
Date posted: November 23, 2017. Answers (1)
- What risks do you see in using information communications technology (ICT) as a strategic resource and what actions should be taken to make ICT a...(Solved)
What risks do you see in using information communications technology (ICT) as a strategic resource and what actions should be taken to make ICT a viable strategic resource?
Date posted: November 23, 2017. Answers (1)
- Electronic point of sale (EPOS) and Automatic Teller Machines (ATMs) are the dominant terminals currently being used in business.Briefly explain three summary reports that are...(Solved)
Electronic point of sale (EPOS) and Automatic Teller Machines (ATMs) are the dominant terminals currently being used in business.
Briefly explain three summary reports that are likely to be generated by each terminal.
Date posted: November 23, 2017. Answers (1)
- In modern economies, the volume of trade transacted by enterprises over the internet is rapidly increasing that transacted through the traditional channels. Discuss how any two...(Solved)
In modern economies, the volume of trade transacted by enterprises over the internet is rapidly increasing that transacted through the traditional channels.
Discuss how any two traditional functions of doing business have moved to the internet and the benefits this movement has brought to enterprises.
Date posted: November 23, 2017. Answers (1)
- Most governments are embracing information communication technology through the implementation of e-governance initiatives. Describe what is meant by e-governance and give four areas in which e-governance...(Solved)
Most governments are embracing information communication technology through the implementation of e-governance initiatives.
Describe what is meant by e-governance and give four areas in which e-governance is beneficial to the public.
Date posted: November 23, 2017. Answers (1)
- Networks are increasingly being managed remotely. Name three security implications of remote network management and three mechanisms that are needed for remote network management..(Solved)
Networks are increasingly being managed remotely. Name three security implications of remote network management and three mechanisms that are needed
for remote network management.
Examine some of the challenges facing the convergence of networks in business
organizations.
Date posted: November 23, 2017. Answers (1)
- Examine two disadvantages of using direct access storage devices(Solved)
Examine two disadvantages of using direct access storage devices.
Date posted: November 23, 2017. Answers (1)