Get premium membership and access questions with answers, video lessons as well as revision papers.
a) Computer Aided Design (CAD) techniques
These refer to techniques that automate the creation and revision of designs using sophisticated graphics software.
b) Potential benefits:
1. Quality designs. CAD ensures accuracy in the production of designs. CAD also subjects designs to rigorous testing thus ensuring reliability.
2. Speed in designing. Since the design process is automated, it?s likely to be shorter than manual design.
3. Improved group collaboration. CAD enables sharing of designs amongst many designers thus improving group collaboration.
4. Reduced costs
Using a traditional physical design methodology, each design modification requires a mold to be made and a prototype to be physically tested. This process must be repeated many times, which is very expensive and time consuming. Using a CAD workstation, the designer only needs to make a physical prototype toward the end of the design process because the design can be easily tested and changed on the computer.
c) Physical security procedures that may be adopted:
1. Bolting door locks – These require the traditional metal key to gain entry. The key should be stamped „Do not duplicate.?
2. Combination door locks – These utilize a numeric keypad or dial to gain entry. The combination should be changed at regular intervals or whenever an employee with access is transferred, fired or subject to disciplinary action.
3. Electronic door locks – These utilize a magnetic or embedded chip-based plastic card key or token entered into a sensor card reader to gain access. A special code internally stored in the card or token is read by the sensor device that activates the door locking mechanism.
4. Biometric door locks – An individual?s unique body features, such as voice, retina, fingerprint or signature, activate these locks.
5. Manual logging – All visitors should be required to sign a visitor?s log indicating their name, company represented, reason for visiting and person to see. Logging should be at the front reception desk and at the entrance to the computer room.
6. Electronic logging – All access should be logged with unsuccessful attempts highlighted.
7. Identification Badges (Photo Ids) – Badges should be worn and displayed by all personnel. Visitor badges should be a different colour from employee badges for easy identification.
8. Video cameras – They should be located at strategic points and monitored by security guards.
9. Security guards – They could be used together with video cameras for efficiency.
10. Controlled visitor access – All visitors should be escorted by a responsible employee.
11. Alarm systems – should be linked to inactive entry points, motion detectors and the reverse flow of enter or exit only doors.
12. Controlled single entry point. A controlled single entry point monitored by a receptionist should be used by all incoming personnel.
Gregorymasila1 answered the question on March 28, 2018 at 13:04
- a) Before systems are put into organisational use, they should be well tested to ensure that the system being delivered is working as expected before...(Solved)
a) Before systems are put into organisational use, they should be well tested to ensure that the system being delivered is working as expected before it is implemented.
(i) What factors would determine the scope of system testing?
(ii) Who are involved in the testing process?
(iii) What do you consider to be limitations of software testing?
b) Decision support systems (DSS) are ISs that support managers in arriving at decisions in semi-structured problems. State any FOUR characteristics of DSS. Identify too the THREE main components of the DSS.
Date posted: March 28, 2018. Answers (1)
- a) Project management software can offer useful tool for managing projects. i) Identify the functions of project management software
ii) What are...(Solved)
a) Project management software can offer useful tool for managing projects. i) Identify the functions of project management software
ii) What are the typical inputs required for the software?
iii) Outline the major merits and demerits of using a project management software in the project management process
b) Outline the key steps in the systems acquisition process
Date posted: March 28, 2018. Answers (1)
- a) The systems implementation stage of SDLC involves getting the new system into use as smoothly and quickly as possible. Briefly explain the main activities...(Solved)
a) The systems implementation stage of SDLC involves getting the new system into use as smoothly and quickly as possible. Briefly explain the main activities in the implementation stage.
b) Fourth Generation Languages (4GLs) make rapid applications development faster for many programmers. What are 4GLs?
c) It has been suggested that for any business to derive strategic advantage from information systems there has to be alignment between the business strategy and the IS/IT strategy. Define what a business strategy for IT is and show why it is important for organisations to have an IS/ IT strategy.
Date posted: March 28, 2018. Answers (1)
- a) Explain the following tools for documenting and modelling user requirements
i) Entity-relationship diagrams (ERDs) ...(Solved)
a) Explain the following tools for documenting and modelling user requirements
i) Entity-relationship diagrams (ERDs) ii) Entity Life Histories
b) What are the desirable characteristics of a user-friendly system
c) Common computer outputs include printed reports and on screen reports. Explain the main classifications of reports.
Date posted: March 28, 2018. Answers (1)
- a) State the characteristics of a quality software product ...(Solved)
a) State the characteristics of a quality software product b) Explain the following terms as they relate to systems development: i) Quality management ii) Quality assurance
iii) Quality control
(2 marks)
c) In assessing the economic feasibility of MIS projects, it is important to identify the costs and benefits of New Systems. Identify Costs and benefits of new systems
Date posted: March 28, 2018. Answers (1)
- a) Define contingency planning and outline the contents of a contingency plan.
b) In ensuring control over the IS department resources, the company can...(Solved)
a) Define contingency planning and outline the contents of a contingency plan.
b) In ensuring control over the IS department resources, the company can adopt physical or logical access controls. With appropriate examples, explain the two forms of control. c) Define the following terms as they related to information systems.
i) Hackers
ii) Viruses
Date posted: March 28, 2018. Answers (1)
- Differentiate between static and dynamic testing as used in system analysis and design(Solved)
Differentiate between static and dynamic testing as used in system analysis and design.
Date posted: March 24, 2018. Answers (1)
- Distinguish between adaptive and probabilistic systems (Solved)
Distinguish between adaptive and probabilistic systems.
Date posted: March 24, 2018. Answers (1)
- Explain the term environment as used in information systems(Solved)
Explain the term environment as used in information systems.
Date posted: March 24, 2018. Answers (1)
- What are the physical parts of a computer?(Solved)
What are the physical parts of a computer?
Date posted: March 23, 2018. Answers (1)
- List any four likely causes of data and program loss in a computer system?(Solved)
List any four likely causes of data and program loss in a computer system?
Date posted: March 19, 2018. Answers (1)
- Write a program that solves a quadratic equation gives the answer for the roots.(Solved)
Write a program that solves a quadratic equation gives the answer for the roots.
Date posted: March 8, 2018. Answers (1)
- Write a C++ program that accepts an integer and checks whether it is even or odd and then prints an appropriate message(Solved)
Write a C++ program that accepts an integer and checks whether it is even or odd and then prints an appropriate message.
Date posted: March 8, 2018. Answers (1)
- Discuss process synchronization in the context of computer operating systems(Solved)
Discuss process synchronization in the context of computer operating systems
Date posted: March 5, 2018. Answers (1)
- What is a Knowledge Based System?(Solved)
What is a Knowledge Based System?
Date posted: March 3, 2018. Answers (1)
- Explain Key challenges Facing Software Engineering.(Solved)
Explain key challenges facing Software Engineering.
Date posted: March 3, 2018. Answers (1)
- Explain types of Software products.(Solved)
Explain types of software products
Date posted: March 3, 2018. Answers (1)
- Differentiate between Software Engineering and System Engineering.(Solved)
Differentiate between Software Engineering and System Engineering
Date posted: March 3, 2018. Answers (1)
- Differentiate between Computer Science and Software Engineering.(Solved)
Differentiate between Computer Science and Software Engineering.
Date posted: March 3, 2018. Answers (1)
- Describe the term Quality assurance in relation to Software Engineering.(Solved)
Describe the term Quality assurance in relation to Software Engineering.
Date posted: March 3, 2018. Answers (1)