(i) Website
This refers to all the World Wide Web pages maintained by an organization. The World Wide
Web is a system with universally accepted standards for storing, retrieving, formatting and
displaying information in a networked environment.
Websites could be maintained to aid other Internet users to search information, for purposes
of e-commerce, for purposes of advertising an organization‘s products and services, to enable
Internet users access e-mail facilities, etc. Websites usually contain stylish topography,
colourful graphics, push-button interactivity and sound and video to lure Internet users to
browse (view) their content. Examples of common websites include: www.yahoo.com (for e-
mail), www.google.com (for searching information), www.amazon.com (for e-commerce) and
www.skynews.com (for news).
(ii) Cyber café
This refers to a facility that enables individuals to access and use the Internet at a cost. Cyber
cafés are usually in the form of a small building or a small room with several computers linked
to the Internet. Individuals usually access the Internet for short periods ranging from a few
minutes to one or two hours. The cost varies with the total time of access. Other services
provided by cyber cafés include:
o Photocopying
o Printing
o CD writing
o Scanning
o Typing of documents
(iii) Network Browser
This refers to an application program that enables a user to access and view contents of a
website. Examples of web browsers are Microsoft Internet Explorer and Netscape Navigator.
gregorymasila answered the question on November 29, 2017 at 09:08
- During the design stage of a new information system, the following issues are addressed: (i) User interface (ii) Data (iii)Process. Required:Discuss the composition of design document under the...(Solved)
During the design stage of a new information system, the following issues are addressed:
(i) User interface.
(ii) Data.
(iii) Process.
Required:
Discuss the composition of design document under the above three elements.
Date posted: November 29, 2017. Answers (1)
- Briefly describe any four computer related crimes that an organisation which is considering computerising its operations should be aware of(Solved)
Briefly describe any four computer related crimes that an organisation which is considering computerising its operations should be aware of.
Date posted: November 29, 2017. Answers (1)
- Explain the term 'critical path' as used in project management(Solved)
Explain the term 'critical' path as used in project management.
Date posted: November 29, 2017. Answers (1)
- Describe the role of project management(Solved)
Describe the role of project management.
Date posted: November 29, 2017. Answers (1)
- Structured walkthrough addresses some areas of interest in a new program under programming productivity(Solved)
Structured walkthrough addresses some areas of interest in a new program under programming productivity.
Date posted: November 29, 2017. Answers (1)
- Explain how the use of Computer Aided Software Engineering (CASE) improves
programming productivity.(Solved)
Explain how the use of Computer Aided Software Engineering (CASE) improves
programming productivity.
Date posted: November 29, 2017. Answers (1)
- In a sequential narrative. name and describe the main stages in the program development life cycle.(Solved)
In a sequential narrative. name and describe the main stages in the program
development life cycle.
Date posted: November 29, 2017. Answers (1)
- Identify six risks associated with end user computing(Solved)
Identify six risks associated with end user computing.
Date posted: November 27, 2017. Answers (1)
- Explain the role of the following in promoting end user computing (i) Information resource centres. (ii) Object oriented programming.(Solved)
Explain the role of the following in promoting end user computing
(i) Information resource centres.
(ii) Object oriented programming.
Date posted: November 27, 2017. Answers (1)
- Explain the two terms "process engineering and re-engineering".(Solved)
Explain the two terms "process engineering and re-engineering".
Date posted: November 27, 2017. Answers (1)
- Explain the use and application of the following:(i) Telecommuting. (ii) Electric data interchange. (iii) Computer conferencing.(Solved)
Explain the use and application of the following:
(i) Telecommuting.
(ii) Electric data interchange.
(iii) Computer conferencing.
Date posted: November 27, 2017. Answers (1)
- Tactical management level may require the use of Decision Support Systems (DSS) for semi
-structured decisions and data modelling.
Required:
(a)Describe four functional characteristics of Decision Support...(Solved)
Tactical management level may require the use of Decision Support Systems (DSS) for semi
-structured decisions and data modelling.
Required:
(a)Describe four functional characteristics of Decision Support Systems (DSS).
(8 marks)
Date posted: November 27, 2017. Answers (1)
- Name four types of accounting information systems which DSS may address(Solved)
Name four types of accounting information systems which DSS may address.
Date posted: November 27, 2017. Answers (1)
- Explain the term "prototype" and describe the main steps involved in its development(Solved)
Explain the term "prototype" and describe the main steps involved in its development.
Date posted: November 27, 2017. Answers (1)
- New information systems quite often play a major role in the support of planning objectives of an organisation. Management participation is required for better evaluation...(Solved)
New information systems quite often play a major role in the support of planning objectives of
an organisation. Management participation is required for better evaluation and control of new
systems.
Required:
Identify and explain three forms of competitive strategies which information technology would
address.
Date posted: November 27, 2017. Answers (1)
- List five ethical and societal dimensions to the development and use of information technology(Solved)
List five ethical and societal dimensions to the development and use of information technology.
Date posted: November 27, 2017. Answers (1)
- Discuss security measures which could be adopted by businesses and individuals involved in e-banking/on-line banking(Solved)
Discuss security measures which could be adopted by businesses and individuals involved in e-banking/on-line banking.
Date posted: November 27, 2017. Answers (1)
- During output design, the designer‘s ideas are put to test. Some ideas are essential while others are dictated by circumstances. Required:(i) State the general principles applied...(Solved)
During output design, the designer's ideas are put to test. Some ideas are essential while others are dictated by circumstances.
Required:
(i) State the general principles applied in output design.
(ii) Outline the ?Steps taken in designing an output.
Date posted: November 27, 2017. Answers (1)
- Describe the options available for the analyst to use when implementing an output(Solved)
Describe the options available for the analyst to use when implementing an output.
Date posted: November 27, 2017. Answers (1)
- Systems development projects are usually triggered by:(i) Problems(ii) Directives. Explain the meaning of these terms in the context of systems development.(Solved)
Systems development projects are usually triggered by:
(i) Problems
(ii) Directives
Explain the meaning of these terms in the context of systems development.
Date posted: November 27, 2017. Answers (1)