Get premium membership and access questions with answers, video lessons as well as revision papers.
Privacy issues associated with sensitive data held on a computer system is an obviously
important consideration. The statement highlights three important aspects.
1.) Data integrity is the term used to describe the accuracy and correctness of data
during and after processing. Systems controls are designed into a system as procedures
to maintain the integrity of the data and are incorporated at all stages in the system's
operation. Typically systems controls perform the following functions:-
o Recognizing when problems occur
o Finding and eliminating errors
o Ensuring that all data is processed
o Maintaining the correct timing and
o Sequencing of input and output processing
o Restarting the system efficiently when a breakdown occurs or when data files
have been corrupted providing a record of all processing operations
2.) The security of information relates to all aspects of protecting information from
unauthorized access, sabotage, accidental loss or damage, fraud and physical damage.
Systems security seeks to provide protection against the following:-
o The security risk of unauthorized users gaining access to the system
o The accidental loss of data stored on computer files-for example due to
operator error or updating the file.
o The deliberate sabotaging of the system
o The risk of physical damage to computer files caused by dirt, water, fire
damage and explosion
3.) Managing the risk associated with computer security essentially involves reducing the
risk profile of the company to the lowest feasible level. Risk management involves three
stages:-
o Risk assessment - arises from a full examination of all security factors. It should
be noted that risk is a specific to an organization at a point of time and will
change as applications are changed, new hardware introduced etc.
o Risk minimization - is the action the organization takes when it has identified its
exposure to risk and is the most critical aspect of the exercise. The process is
often termed computer security and will cover a multitude of aspects such as
the provision of standby facilities and disaster recovery procedures.
o Risk Transference - recognizes that it is impossible to eliminate all risk however
effective the security is. The uncovered elements of risk can be transferred
through the medium of insurance to an insurer of data.
gregorymasila answered the question on February 15, 2018 at 16:42
- A software house produces a software package for the insurance industry. Purchases of the
package have formed a very active user group which has lobbied...(Solved)
A software house produces a software package for the insurance industry. Purchases of the
package have formed a very active user group which has lobbied for a particular change to
be made to the software to improve the functionality and usability of the software.
Required:
(a) Briefly explain the following terms:
(i.) Corrective maintenance;
(ii.) Adaptive maintenance;
(iii.) Perfective maintenance.
(b) Briefly explain the meaning and purpose of a user group
The software house has an internal quality assurance process for implementing software
changes
Required:
Explain each of the following two stages of an internal quality assurance process:
(c) Unit testing.
(d) System testing.
Date posted: February 15, 2018. Answers (1)
- a. The assurance of quality is an important aspect within all information systems
departments. Explain the following two stages of an internal quality assurance process.
i....(Solved)
a. The assurance of quality is an important aspect within all information systems
departments. Explain the following two stages of an internal quality assurance process.
i. Unit testing
ii. Systems testing
b. Explain how using formal specification methods can contribute to improved quality
assurance.
Date posted: February 15, 2018. Answers (1)
- Many organizations operate an Information Systems department responsible for providing a
wide range of IT related services. Describe the role of the following employees within...(Solved)
Many organizations operate an Information Systems department responsible for providing a
wide range of IT related services. Describe the role of the following employees within an
Information Systems department.
a) Project Manager
b) Systems Analyst
c) Programmer
d) Data Analyst
Date posted: February 15, 2018. Answers (1)
- Most data work takes place in an office.
a. Outline the three major roles of an office.
b. What is an Office Automation System (OAS)?
c....(Solved)
Most data work takes place in an office.
a. Outline the three major roles of an office.
b. What is an Office Automation System (OAS)?
c. Outline what application packages might be found in the accounts office;
d. Word-processing and desk top publication applications have created a problem of an
increased flow of paper. Document imaging systems can reduce this problem.
i. Describe the key elements of a document imaging system;
ii. Outline why a document imaging system can significantly reduce the paper-flow.
Date posted: February 15, 2018. Answers (1)
- Implementing a new information system, computer or manual, into an existing organisation
requires careful planning for it to be successful.
a. Outline the various organisational (NOT...(Solved)
Implementing a new information system, computer or manual, into an existing organisation
requires careful planning for it to be successful.
a. Outline the various organisational (NOT COMPUTER) factors that must be considered
and planned for to ensure the probability of a successful implementation;
b. Outline the relationship between information systems and organisational politics
Date posted: February 15, 2018. Answers (1)
- The growth of telecommunications has made information a key organisational resource, which requires careful management.a. Give your definition of an Information System. b. The management...(Solved)
The growth of telecommunications has made information a key organisational resource,
which requires careful management.
a. Give your definition of an Information System.
b. The management of information may be divided into two categories:-
i. Information management and
ii. Information Systems management
Give a detailed description of each of these managerial tasks.
c. It has been suggested that both these managerial tasks commit personnel involved to a
'Lifelong learning process'. What are the reasons for this point of view?
Date posted: February 15, 2018. Answers (1)
- Information systems are usually more to do with people than technology. Over the last
century the task of management in organisations has been studied by...(Solved)
Information systems are usually more to do with people than technology. Over the last
century the task of management in organisations has been studied by many academics. Their
studies have been categorized under three main headings:-
Technical-Rational, Behavioural and Cognitive.
a. Outline the major aspects of each of these headings;
b. List the people involved in developing an information system.
Date posted: February 15, 2018. Answers (1)
- Computer systems which process financial data for a company should be audited to evaluate
the reliability of information and also the efficiency and effectiveness of...(Solved)
Computer systems which process financial data for a company should be audited to evaluate
the reliability of information and also the efficiency and effectiveness of the system. The
main problem with auditing a computer system is that processing operations are invisible.
Required:
a) State five systems checks and controls that should be built in the system at the design
stage to reduce the problem and weaknesses that auditors frequently detect.
b) Discuss the audit trail in computerized accounting information systems.
c) Explain each of the following computer auditing approaches and techniques:
(i.) Auditing around the computer;
(ii.) Auditing through the computer;
(iii.) Auditing packages.
Date posted: February 15, 2018. Answers (1)
- One of the current developments in information technology, which has strategic
implications for business firms, is the move towards open systems.
Required:
a) Explain the meaning of...(Solved)
One of the current developments in information technology, which has strategic
implications for business firms, is the move towards open systems.
Required:
a) Explain the meaning of the open systems concept.
b) Discuss the implications of the move towards open systems for organizations that have
already invested in proprietary information systems.
c) Outline two potential benefits to information technology due to the move towards open
systems.
Date posted: February 15, 2018. Answers (1)
- (a) A major source of errors in computer systems is errors in the input data. What controls would you install for the control of such errors?...(Solved)
(a) A major source of errors in computer systems is errors in the input data. What controls
would you install for the control of such errors?
(b) Describe four methods that would be used for fact finding during system investigation.
(c) Give the principal method of data capture in the following applications:
(i.) Banks;
(ii.) Supermarkets
(iii.) Clothing and footwear retailing.
(d) What are the functions of a systems programmer?
Date posted: February 15, 2018. Answers (1)
- In the context of ethical considerations: -
a. Outline the individual ethical issues implied when a person joins a professional
organization
b. Describe some of the ethical dilemmas...(Solved)
In the context of ethical considerations: -
a. Outline the individual ethical issues implied when a person joins a professional
organization.
b. Describe some of the ethical dilemmas that are involved with Information Systems.
Date posted: February 15, 2018. Answers (1)
- Organizations are now moving from Strategic Management systems towards Enterprise
systems and yet further to Industrial Networks and Extended Enterprise systems.
a. Describe the features of...(Solved)
Organizations are now moving from Strategic Management systems towards Enterprise
systems and yet further to Industrial Networks and Extended Enterprise systems.
a. Describe the features of Enterprise computing and industrial networks;
b. What are the business and technological reasons for this move?
c. Outline the key elements required to build an enterprise information technology structure
d. Outline potential organisational problems in the creation of these enterprises systems.
Date posted: February 15, 2018. Answers (1)
- In the context of Information Systems Security, write short notes on ALL of the following
headings:-
a. Why are computer systems more vulnerable to destruction, error,...(Solved)
In the context of Information Systems Security, write short notes on ALL of the following
headings:-
a. Why are computer systems more vulnerable to destruction, error, abuse and misuse than
manual systems?
b. What is meant by the term Risk Assessment?
c. What are Worms and Viruses?
d. Outline the process of Public Key Encryption.
Date posted: February 15, 2018. Answers (1)
- The development of powerful desktop computers coupled to telecommunication networks
has revolutionized the way organizations may carry out their business.
The following are some alternatives for...(Solved)
The development of powerful desktop computers coupled to telecommunication networks
has revolutionized the way organizations may carry out their business.
The following are some alternatives for an organization‘s internal and external
communications: -
a. Client-Server
b. Internet
c. Intranet
d. Extranet
Date posted: February 15, 2018. Answers (1)
- Consider a supermarket chain and the use they may make of information systems in the
running of their business. Some of the objectives they are...(Solved)
Consider a supermarket chain and the use they may make of information systems in the
running of their business. Some of the objectives they are faced with are: -
a. Easy product identification;
b. Fast customer processing at the cash tills;
c. Extremely efficient stock control;
d. Rapid bulk replacement of goods from suppliers.
Describe in detail how Information Systems can help supermarket chains with these specific
objectives. Your answer should outline the systems involved, the hardware that might be
required and an indication of how the various systems might interact with each other.
Date posted: February 15, 2018. Answers (1)
- Differentiate between pseudo code and flowcharts(Solved)
Differentiate between pseudo code and flowcharts.
Date posted: February 14, 2018. Answers (1)
- What is: (1) Program (2) Algorithm (3) Translator (4) Hardware (5) Object code(Solved)
What is: (1) Program (2) Algorithm (3) Translator (4) Hardware (5) Object code
Date posted: February 13, 2018. Answers (1)
- What is a predicate in a system program?(Solved)
What is a predicate in a system program?
Date posted: February 13, 2018. Answers (1)
- Give one advantage and one disadvantage of using the string data type in a computer program. (Solved)
Give one advantage and one disadvantage of using the string data type in a computer program.
Date posted: February 13, 2018. Answers (1)
- Define a container, an iterator, and an algorithm as they relate to the STL in a computer program.(Solved)
Define a container, an iterator, and an algorithm as they relate to the STL in a computer program.
Date posted: February 13, 2018. Answers (1)