Get premium membership and access questions with answers, video lessons as well as revision papers.
Three main sources of applications software and their appropriateness.
Applications software consists of programs which carry out a specific activity task for the
user.
The various sources of application programs are:
1. Application packages
These are also known as off the shelf programs and are ready made programs written by
a manufacturer to perform a particular task which is common to many potential users
and could be adopted by all of them. Packages may contain add-on facilities to allow for
minor alterations required to suit certain businesses. Packages are normally appropriate in
that:
i) The come with an assurance of system compatibility.
ii) They require minimum start up time and training cost during implementation.
iii) They can be tailored to meet certain unique needs.
iv) They can be sold to other users since they can use standard
2. Do-it-yourself programs
This application programs designed and developed by users themselves. They are also
known as in-house programs and are normally not very complex. These programs are
appropriate because: -
i) The invoice only a low cost since no specialists need to be hired.
ii) They are fast to develop and complete.
iii) They can be revised when need arises.
iv) They are a morale booster to electronic data processing staff.
v) They are naturally customised to the system being developed.
3. Specialist built or customised programs
These are application programs developed by software experts normally information
analysts with experience in system analysis who are contracted by the organisation to
develop an application program for its use. They are ideal where the program required is
complex. These programs are appropriate in that:
i) The can be revised by the developer to suit changing demands.
ii) They are easy to learn and use.
iii) They are free from errors since they are thoroughly tested before being released as
opposed to do-it-yourself programs.
gregorymasila answered the question on November 30, 2017 at 13:47
- Identify and describe the application of fourth generation languages (4GLs) during information system development(Solved)
Identify and describe the application of fourth generation languages (4GLs) during information system development.
Date posted: November 30, 2017. Answers (1)
- Due to complexity of information systems development, a number of tools and methodologies have been used to resolve this complexity. Some of such tools and...(Solved)
Due to complexity of information systems development, a number of tools and methodologies have been used to resolve this complexity. Some of such tools and methodologies include Computer Aided Software Engineering (CASE) and Prototyping.
Required:
Identify those aspects of information systems development life cycle for which these tools or techniques are available illustrating their application in each case.
Date posted: November 30, 2017. Answers (1)
- What is the role of a database administrator in an organisation.(Solved)
Examine the role of a database administrator in an organisation.
Date posted: November 30, 2017. Answers (1)
- For applications such as banking, it may be argued that security is a major concern when implementing database systems. As a database administrator, you are...(Solved)
For applications such as banking, it may be argued that security is a major concern when implementing database systems. As a database administrator, you are expected to explain five security features expected to be included with the design of the database systems.
Date posted: November 30, 2017. Answers (1)
- What is meant by cost/benefit analysis? Illustrate its relevance to the System Analyst during systems development life cycle(Solved)
What is meant by cost/benefit analysis? Illustrate its relevance to the System Analyst during systems development life cycle
Date posted: November 30, 2017. Answers (1)
- Examine any four desirable features which should be inherent in an operating system(Solved)
Examine any four desirable features which should be inherent in an operating system.
Date posted: November 30, 2017. Answers (1)
- Decisions can either be classified as structured (programmed) or unstructured (non-programmed). Required: (i) Distinguish between programmed and non-programmed decisions. (ii) Identify each of the following with...(Solved)
Decisions can either be classified as structured (programmed) or unstructured (non-programmed).
Required:
i) Distinguish between programmed and non-programmed decisions.
ii) Identify each of the following with the type of decision to which it may apply.
- Computer program;
- Stock ordering;
- Judgement;
- Regulation.
Date posted: November 30, 2017. Answers (1)
- You recently attended a seminar organised by the Institute of Certified Public Accountants of Kenya (ICPAK) on information management into the 21st century. One of...(Solved)
You recently attended a seminar organised by the Institute of Certified Public Accountants
of Kenya (ICPAK) on information management into the 21st century. One of the topics
covered was on Internet and its impact on the society. Your first task is to explain to the
senior management the effect of Internet on the following sectors of society.
i) Education.
ii) Service provision industry.
Date posted: November 30, 2017. Answers (1)
- Identify and describe the main criteria which should be met by a local area network design.(Solved)
Identify and describe the main criteria which should be met by a local area network design.
Date posted: November 30, 2017. Answers (1)
- What reasons would you put forward for adopting a database as a basis for an information system?(Solved)
What reasons would you put forward for adopting a database as a basis for an information system?
Date posted: November 30, 2017. Answers (1)
- It has been cited that Information Technology has caused more harm than good. One of the vices sited is computer related crime. Outline and briefly describe...(Solved)
It has been cited that Information Technology has caused more harm than good. One of
the vices sited is computer related crime. Outline and briefly describe four categories of
computer related crimes.
Date posted: November 30, 2017. Answers (1)
- Everything an expert system can do, a decision support system (DSS) can also do?. Discuss any four grounds that consistently support or disapprove this statement....(Solved)
Everything an expert system can do, a decision support system (DSS) can also do.
Discuss any four grounds that consistently support or disapprove this statement.
Date posted: November 30, 2017. Answers (1)
- Whenever a user buys a software, it is essential that the software comes with a seller maintenance contract. As an outside consultant, you are required...(Solved)
Whenever a user buys a software, it is essential that the software comes with a seller
maintenance contract. As an outside consultant, you are required to explain to the user what
a seller maintenance contract is and the specifications required by the user in a seller
maintenance contract.
Date posted: November 30, 2017. Answers (1)
- Most users interact with their computer systems through a command-driven interface or graphical interface. As a person in charge of Information Technology (IT), your...(Solved)
Most users interact with their computer systems through a command-driven interface or
graphical interface. As a person in charge of Information Technology (IT), your boss is
proposing that you move away from the command driven interface you are currently
using, to a new platform which is object-based and has appealing interface as well as
being more user friendly.
What advise might you offer your boss regarding this proposal
Date posted: November 30, 2017. Answers (1)
- Without proper consideration of the behaviour of people in the business organisation setting even the best technically designed system is likely to fail.Required: (a) Analyse the...(Solved)
Without proper consideration of the behaviour of people in the business organisation setting
even the best technically designed system is likely to fail.
Required:
a) Analyse the most common reasons that may lead to resistance to the introduction of
Management Information Systems and how an organisation can overcome it.
Date posted: November 30, 2017. Answers (1)
- Change is inevitable. Change occurs in many ways and adapting to change is a primary management responsibility. Identify the factors, which bring about change in anorganisation....(Solved)
Change is inevitable. Change occurs in many ways and adapting to change is a primary
management responsibility. Identify the factors, which bring about change in an
organisation.
Date posted: November 30, 2017. Answers (1)
- The widespread use of computers in offices have raised major health and safety issues. Describe three major health related problems that may result from intensive...(Solved)
The widespread use of computers in offices have raised major health and safety issues.
Describe three major health related problems that may result from intensive computer use
and list three products that may be made available to improve the working conditions of
personnel using computers.
Date posted: November 30, 2017. Answers (1)
- Distinguish between online and offline transactions(Solved)
Distinguish between online and offline transactions.
Date posted: November 30, 2017. Answers (1)
- Describe any three basic strategies that an organisation can employ to obtain competitive advantage and illustrate the role of Information Technology in each case(Solved)
Describe any three basic strategies that an organisation can employ to obtain competitive advantage and illustrate the role of Information Technology in each case.
Date posted: November 30, 2017. Answers (1)
- Name six guidelines required for the development of new information systems.(Solved)
Name six guidelines required for the development of new information systems.
Date posted: November 30, 2017. Answers (1)