Get premium membership and access questions with answers, video lessons as well as revision papers.
a) (i) Recommendations on physical measures:
1. Use of receptionists and guards to control access to computer rooms.
2. Use of mechanical locks and keys to control access to computer rooms.
3. Use of electronic systems such as electronic door locks to control access.
4. Computer buildings should be designed unobtrusively as possible- notices which identify the function of the building should be avoided.
5. Cameras could be used to detect break-ins into the organization.
6. Computer terminal locks could be used to prevent the organization?s computers from being turned on or the keyboards from being used.
7. Alarms could be used to detect break-ins.
8. Report/documents distribution carts should be covered and locked and they should not be left unattended.
(ii) “Back up” refers to the process of maintaining a duplicate copy of the data of an information system at the same site or at a remote site as a contingency measure in case the original copy of the data is lost or destroyed.
“Back up” thus secures and information system?s data from loss or destruction by providing an additional copy of the data.
“Uninterruptible Power Supply” (UPS)
This prevents the loss of unsaved data during power blackouts by providing an alternative supply of power. Users working on the computer can thus working on the computer “uninterrupted”.
UPSs secure an information system from data loss due to power failure. Before a power blackout, data that is being worked on is normally held in the primary memory (RAM). RAM is usually volatile meaning that the presence of data depends on the availability of power. UPSs restore supply of power immediately after a blackout has occurred thus ensuring that data held on RAM is not lost.
They also secure information system equipment from damage due to voltage surges.
(iii) Security features of most operating systems:
1. Logon-Ids And Passwords
This feature is provided by operating systems such as Windows 2000, Windows XP, Linux and Unix. Such operating systems prompt the user to supply a logon-Id and password before he/she can be granted access to system resources.
2. Audit Trails
These enable attempts at unauthorized access to be logged.
3. Data Encryption
Most operating systems provide a facility for data encryption to protect data that is stored on a computer or data in transit. With data encryption, the data is coded using a key and it can only be decoded by a user possessing the decoding key.
4. File Access Permissions
Operating systems could restrict the operations performed on a file (e.g. read, write, modify) or the type of users who can access a file (e.g. normal user, administrator or power user) based on preferences supplied by the systems administrator.
5. FILE RECOVERY UTILITIES e.g. Recycle Bin in Windows range of operating systems.
These enable accidentally deleted files to be recovered since all deleted files are directed to a temporary storage location before they are permanently removed from the system.
(iv) Disasters that an information system should be guarded against:
1. Utility outages e.g. power blackouts.
2. Equipment failure.
3. Viruses i.e. programmed threats.
4. Water, leaks, toxic spills.
5. Foreign intelligence.
6. Human error.
7. Disgruntled employees.
8. Dishonest employees.
9. Greedy employees who sell information for financial gain.
10. Outsider access- hackers, crackers, criminals, terrorists, consultants, exconsultants, ex-employees, competitors, government agencies, spies (industrial, military, etc), disgruntled customers
11. Acts of God/Natural disasters- earthquakes, floods, hurricanes.
12. Accidents, fires, explosions.
(v) Importance of an information security (IS) policy to an organization:
1. To provide guidelines to organizational staff on information security procedures.
2. The presence of of an IS policy shows that the organization is committed to ensuring integrity of the information is handles. This thus enhances a company?s corporate image.
3. An IS policy could be used as evidence to show that an organization did its best to provide information security in cases where law suits are filed against an organization.
4. When followed, an IS policy could actually ensure that the IS is secure from most of the threats it faces.
b) (i) Computer
This is a generic term applied to a variety of malicious computer programs. These malicious programs affect other computer programs and data in a computer system.
(ii) Antivirus tools:
o Norton anti-virus software; o Mc Afee; o AVG, etc.
(iii) Administrative measures that may be used to check the threats of computer viruses:
1. Update virus scanning definitions frequently;
2. Have vendors run demonstrations on their machines, not yours;
3. Shareware should not be used without first scanning the shareware for a virus;
4. Review of anti-virus policies and procedures at least once a year;
5. Field technicians should scan their disks on a test machine before they use any of their disks on the system;
6. The network administrators should use workstation and server anti-virus software;
7. A virus eradication procedure should be prepared and a contact person identified;
8. Users should be educated about virus policies and procedures;
9. Commercial software should be scanned before it is installed to detect Trojan horses (viruses or worms);
10. Systems should be built from original, clean master copies. Booting should be from original diskettes whose write protection has always been in place;
11. All diskettes with .EXE or .COM extensions should be write protected;
12. All servers should be equipped with an activated current release of the virus detection software.
(iv) Environmental factors that should be controlled so that they don?t affect the operation of the computer:
1. Ventilation- it should be adequate to prevent hardware equipment from over heating.
2. Dust- should be minimized. Dust could damage a hard disk by resulting in a disk crash if it?s allowed to accumulate inside the computer system unit.
3. Moisture- should be minimized to avoid damage of equipment through short circuits.
Gregorymasila1 answered the question on March 28, 2018 at 14:32
-
a) List five types of systems
b) Explain the following characteristics of a system:
(i.) Differentiation;
(ii.) Equifinality;
(iii.) Feedback;
(iv.) Transformation;
(v.) Entropy;
(Solved)
a) List five types of systems
b) Explain the following characteristics of a system:
(i.) Differentiation;
(ii.) Equifinality;
(iii.) Feedback;
(iv.) Transformation;
(v.) Entropy;
Date posted: March 28, 2018. Answers (1)
- (a) (i.) What is a Decision Support System (DSS)?
(ii.) Describe the major DSS software components.
(b) (i.) What is...(Solved)
(a) (i.) What is a Decision Support System (DSS)?
(ii.) Describe the major DSS software components.
(b) (i.) What is an expert system?
(ii.) List four advantages of using an Expert System in decision making.
Date posted: March 28, 2018. Answers (1)
- In data communication, the communication channel is the route along which data is transmitted. The transmission of data can be described by the following four...(Solved)
In data communication, the communication channel is the route along which data is transmitted. The transmission of data can be described by the following four characteristics:
A. Direction of flow of data.
B. Communication lines.
C. Speed of data transmission.
D. Mode of data transmission.
Required: For each of the following data communication concepts/devices, indicate under which ONE of the above listed characteristics A-D they would best fall: ii. Protocol; iii. Half duplex; iv. Fibre optics; v. Simplex; vi. Analog signal; vii. Micro wave; viii. Band width; ix. Start/stop bit; x. Voice bad.
Explain the term internetworking within the context of data communication. How does a call-back unit and data-encryption equipment enhance security in a computer network?
Date posted: March 28, 2018. Answers (1)
- Masaku Engineering Co. Ltd, a company that is involved in the design and manufacturing of various products realizes that, in order to remain ahead of...(Solved)
Masaku Engineering Co. Ltd, a company that is involved in the design and manufacturing of various products realizes that, in order to remain ahead of its competitors, it must introduce Computer Aided Design (CAD) techniques.
Required:
a) Define what is meant by „Computer Assisted Design‟ techniques
b) List and describe briefly FOUR potential benefits, the company is likely to experience in the adoption of CAD
c) List five physical security procedures that Masaku might adopt to make sure that its information is secure.
Date posted: March 28, 2018. Answers (1)
- a) Before systems are put into organisational use, they should be well tested to ensure that the system being delivered is working as expected before...(Solved)
a) Before systems are put into organisational use, they should be well tested to ensure that the system being delivered is working as expected before it is implemented.
(i) What factors would determine the scope of system testing?
(ii) Who are involved in the testing process?
(iii) What do you consider to be limitations of software testing?
b) Decision support systems (DSS) are ISs that support managers in arriving at decisions in semi-structured problems. State any FOUR characteristics of DSS. Identify too the THREE main components of the DSS.
Date posted: March 28, 2018. Answers (1)
- a) Project management software can offer useful tool for managing projects. i) Identify the functions of project management software
ii) What are...(Solved)
a) Project management software can offer useful tool for managing projects. i) Identify the functions of project management software
ii) What are the typical inputs required for the software?
iii) Outline the major merits and demerits of using a project management software in the project management process
b) Outline the key steps in the systems acquisition process
Date posted: March 28, 2018. Answers (1)
- a) The systems implementation stage of SDLC involves getting the new system into use as smoothly and quickly as possible. Briefly explain the main activities...(Solved)
a) The systems implementation stage of SDLC involves getting the new system into use as smoothly and quickly as possible. Briefly explain the main activities in the implementation stage.
b) Fourth Generation Languages (4GLs) make rapid applications development faster for many programmers. What are 4GLs?
c) It has been suggested that for any business to derive strategic advantage from information systems there has to be alignment between the business strategy and the IS/IT strategy. Define what a business strategy for IT is and show why it is important for organisations to have an IS/ IT strategy.
Date posted: March 28, 2018. Answers (1)
- a) Explain the following tools for documenting and modelling user requirements
i) Entity-relationship diagrams (ERDs) ...(Solved)
a) Explain the following tools for documenting and modelling user requirements
i) Entity-relationship diagrams (ERDs) ii) Entity Life Histories
b) What are the desirable characteristics of a user-friendly system
c) Common computer outputs include printed reports and on screen reports. Explain the main classifications of reports.
Date posted: March 28, 2018. Answers (1)
- a) State the characteristics of a quality software product ...(Solved)
a) State the characteristics of a quality software product b) Explain the following terms as they relate to systems development: i) Quality management ii) Quality assurance
iii) Quality control
(2 marks)
c) In assessing the economic feasibility of MIS projects, it is important to identify the costs and benefits of New Systems. Identify Costs and benefits of new systems
Date posted: March 28, 2018. Answers (1)
- a) Define contingency planning and outline the contents of a contingency plan.
b) In ensuring control over the IS department resources, the company can...(Solved)
a) Define contingency planning and outline the contents of a contingency plan.
b) In ensuring control over the IS department resources, the company can adopt physical or logical access controls. With appropriate examples, explain the two forms of control. c) Define the following terms as they related to information systems.
i) Hackers
ii) Viruses
Date posted: March 28, 2018. Answers (1)
- Differentiate between static and dynamic testing as used in system analysis and design(Solved)
Differentiate between static and dynamic testing as used in system analysis and design.
Date posted: March 24, 2018. Answers (1)
- Distinguish between adaptive and probabilistic systems (Solved)
Distinguish between adaptive and probabilistic systems.
Date posted: March 24, 2018. Answers (1)
- Explain the term environment as used in information systems(Solved)
Explain the term environment as used in information systems.
Date posted: March 24, 2018. Answers (1)
- What are the physical parts of a computer?(Solved)
What are the physical parts of a computer?
Date posted: March 23, 2018. Answers (1)
- List any four likely causes of data and program loss in a computer system?(Solved)
List any four likely causes of data and program loss in a computer system?
Date posted: March 19, 2018. Answers (1)
- Write a program that solves a quadratic equation gives the answer for the roots.(Solved)
Write a program that solves a quadratic equation gives the answer for the roots.
Date posted: March 8, 2018. Answers (1)
- Write a C++ program that accepts an integer and checks whether it is even or odd and then prints an appropriate message(Solved)
Write a C++ program that accepts an integer and checks whether it is even or odd and then prints an appropriate message.
Date posted: March 8, 2018. Answers (1)
- Discuss process synchronization in the context of computer operating systems(Solved)
Discuss process synchronization in the context of computer operating systems
Date posted: March 5, 2018. Answers (1)
- What is a Knowledge Based System?(Solved)
What is a Knowledge Based System?
Date posted: March 3, 2018. Answers (1)
- Explain Key challenges Facing Software Engineering.(Solved)
Explain key challenges facing Software Engineering.
Date posted: March 3, 2018. Answers (1)