Computer related crimes that an organization should be aware of:
1. Theft of computer resources (hardware and CDs containing software).
2. Introduction of viruses.
3. Disruption of computer systems.
4. Theft of services.
5. Hacking.
6. Spamming - usually targets organizations connected to the Internet. Marketers send
outunsolicited mass e-mail to recipients who have not requested the information.
7. Jamming –Targets organizations connected to the Internet. Jammers use
softwareroutines to tie up the computer hosting a website so that legitimate
users can‘t access the site.
8. Malicious software –Targets organizations connected to the Internet.
Cyber vandals use data flowing through the Internet to transmit computer viruses, which
disable the computers they ?infect?.
9. Spoofing –targets organizations linked to the Internet. Spoofers
fraudulentlymisrepresent themselves as other organizations, setting up false websites
where they can collect confidential information from unsuspecting visitors to the site.
10. Sniffing –targets organizations linked to the Internet. Sniffing, a form of
eavesdropping,involves placing a piece of software to interpret information passing from
a user to the computers hosting a website. This information can include credit card
numbers and other confidential data.
gregorymasila answered the question on November 29, 2017 at 09:05
- Explain the term 'critical path' as used in project management(Solved)
Explain the term 'critical' path as used in project management.
Date posted: November 29, 2017. Answers (1)
- Describe the role of project management(Solved)
Describe the role of project management.
Date posted: November 29, 2017. Answers (1)
- Structured walkthrough addresses some areas of interest in a new program under programming productivity(Solved)
Structured walkthrough addresses some areas of interest in a new program under programming productivity.
Date posted: November 29, 2017. Answers (1)
- Explain how the use of Computer Aided Software Engineering (CASE) improves
programming productivity.(Solved)
Explain how the use of Computer Aided Software Engineering (CASE) improves
programming productivity.
Date posted: November 29, 2017. Answers (1)
- In a sequential narrative. name and describe the main stages in the program development life cycle.(Solved)
In a sequential narrative. name and describe the main stages in the program
development life cycle.
Date posted: November 29, 2017. Answers (1)
- Identify six risks associated with end user computing(Solved)
Identify six risks associated with end user computing.
Date posted: November 27, 2017. Answers (1)
- Explain the role of the following in promoting end user computing (i) Information resource centres. (ii) Object oriented programming.(Solved)
Explain the role of the following in promoting end user computing
(i) Information resource centres.
(ii) Object oriented programming.
Date posted: November 27, 2017. Answers (1)
- Explain the two terms "process engineering and re-engineering".(Solved)
Explain the two terms "process engineering and re-engineering".
Date posted: November 27, 2017. Answers (1)
- Explain the use and application of the following:(i) Telecommuting. (ii) Electric data interchange. (iii) Computer conferencing.(Solved)
Explain the use and application of the following:
(i) Telecommuting.
(ii) Electric data interchange.
(iii) Computer conferencing.
Date posted: November 27, 2017. Answers (1)
- Tactical management level may require the use of Decision Support Systems (DSS) for semi
-structured decisions and data modelling.
Required:
(a)Describe four functional characteristics of Decision Support...(Solved)
Tactical management level may require the use of Decision Support Systems (DSS) for semi
-structured decisions and data modelling.
Required:
(a)Describe four functional characteristics of Decision Support Systems (DSS).
(8 marks)
Date posted: November 27, 2017. Answers (1)
- Name four types of accounting information systems which DSS may address(Solved)
Name four types of accounting information systems which DSS may address.
Date posted: November 27, 2017. Answers (1)
- Explain the term "prototype" and describe the main steps involved in its development(Solved)
Explain the term "prototype" and describe the main steps involved in its development.
Date posted: November 27, 2017. Answers (1)
- New information systems quite often play a major role in the support of planning objectives of an organisation. Management participation is required for better evaluation...(Solved)
New information systems quite often play a major role in the support of planning objectives of
an organisation. Management participation is required for better evaluation and control of new
systems.
Required:
Identify and explain three forms of competitive strategies which information technology would
address.
Date posted: November 27, 2017. Answers (1)
- List five ethical and societal dimensions to the development and use of information technology(Solved)
List five ethical and societal dimensions to the development and use of information technology.
Date posted: November 27, 2017. Answers (1)
- Discuss security measures which could be adopted by businesses and individuals involved in e-banking/on-line banking(Solved)
Discuss security measures which could be adopted by businesses and individuals involved in e-banking/on-line banking.
Date posted: November 27, 2017. Answers (1)
- During output design, the designer‘s ideas are put to test. Some ideas are essential while others are dictated by circumstances. Required:(i) State the general principles applied...(Solved)
During output design, the designer's ideas are put to test. Some ideas are essential while others are dictated by circumstances.
Required:
(i) State the general principles applied in output design.
(ii) Outline the ?Steps taken in designing an output.
Date posted: November 27, 2017. Answers (1)
- Describe the options available for the analyst to use when implementing an output(Solved)
Describe the options available for the analyst to use when implementing an output.
Date posted: November 27, 2017. Answers (1)
- Systems development projects are usually triggered by:(i) Problems(ii) Directives. Explain the meaning of these terms in the context of systems development.(Solved)
Systems development projects are usually triggered by:
(i) Problems
(ii) Directives
Explain the meaning of these terms in the context of systems development.
Date posted: November 27, 2017. Answers (1)
- State and explain the four major components of the information technology architecture component(Solved)
State and explain the four major components of the information technology architecture component.
Date posted: November 27, 2017. Answers (1)
- The e-business application development and deployment process involve some activities that should be properly managed for the e-business planning process to be completed successfully. List and...(Solved)
The e-business application development and deployment process involve some activities that should be properly managed for the e-business planning process to be completed successfully.
List and briefly explain these activities.
Date posted: November 27, 2017. Answers (1)