Get premium membership and access questions with answers, video lessons as well as revision papers.
a) Protocol
It refers to a set of communication rules for exchange of information. Protocols define speeds and modes for connecting one computer with another computer. An example of communication protocols is the Open System Interconnection (OSI) set of communication protocols which are used to identify functions provided by any network and to separate each network function into seven „layers? of communication roles.
b) (i) Multiplexors
These are communication devices that multiplex (combine) several signals for transmission over a single medium. A demultiplexor completes the process by separating multiplexed signals from a transmission line. Frequently, a multiplexor and demultiplexor are combined into a single device capable of processing both incoming and outgoing signals.
(ii) Acoustic coupler
This is a device used to connect a modem to a telephone line via an ordinary handset. The acoustic coupler converts electrical signals from the modem to sound via a loudspeaker, against which the mouthpiece of a telephone handset is placed. The earpiece is placed against a microphone which converts sound to electrical signals which return to the modem. The handset is inserted into a sound-proof box containing the loudspeaker and microphone to avoid interference from ambient noise. Acoustic couplers are rarely used today since most modems have a direct electrical connection to the telephone line.
(iii) Line concentrators
These are devices that combine data streams from many simultaneously active inputs into one shared channel in such a way that streams can be separated after transmission. The concentrator?s output bandwidth must be at least as great as the total bandwidth of all simultaneously active inputs. A concentrator is one kind of multiplexing device.
c) (i) How an ISDN may be used in a business organization:
ISDN
This refers to a suite of internationally adopted standards for end-to-end digital communication over a public telephone network. ISDN specifically refers to protocols that are utilized in order to provide potential for universal digital network with a series of standard interphases that will facilitate the connection of a wide variety of telecommunications equipment to the network. ISDN has the objective of making the network digital so that a variety of communications can be undertaken within the same line. ISDN is capable of integrating a variety of services for voice, data, video, images, etc on the same communication line. Through ISDN therefore, it?s possible to make use of one line for a variety of activities.
Business applications of ISDN include:
1. Videoconferencing
ISDN supports the real-time exchange of voice and video. This may be useful in meetings where the participants are in different geographical areas.
2. Shared electronic chalkboards
Ideas and illustrations can be distributed in real-time to remote locations so that people in other cities or other countries can participate in meetings.
3. Telecommuting
ISDN provides facilities for users to tap into central network resources from the privacy of their own homes and do so with the functionality of a network node.
4. Transmission of large amounts of data
For example transmitting the contents of a newspaper from the editorial office to the printers.
5. Computer-based training
ISDN supports the speedy broadcast of data from the node in the network where training is being carried out.
(ii) I would recommend a star network
STAR NETWORK
In this network, there are a number of processing sites linked to a central unit, which may be a host computer or file server. The four regional sites would constitute the processing sites. It may be noted that each regional site may consist of a subnetwork of computers. In addition to facilitating communication, the function of the central unit would be to provide control over the network. It could for instance be used to administer security over the network since all the regional sites are linked to it. The central unit could also be used to provide shared data storage in the form of a shared database of records for all the regional sites. Data processing could thus be distributed over the regional sites with the central unit being invoked only during exchange of messages between regional sites or when reference is being made to data stored on the central unit. The star network could take the following configuration:
Gregorymasila1 answered the question on March 28, 2018 at 14:40
- (a) Explain the following categories of systems in connection with management decision making, clearly distinguishing between the categories: (i.) Transaction processing systems; ...(Solved)
(a) Explain the following categories of systems in connection with management decision making, clearly distinguishing between the categories:
(i.) Transaction processing systems;
(ii.) Management Information Systems;
(iii.) Decision Support Systems;
(iv.) Executive Support Systems;
(b) Identify and briefly explain the three fundamental components of an expert system. Explain how an expert system may be used in a business application.
Date posted: March 28, 2018. Answers (1)
- Boni Wholesalers Ltd. Provides a variety if goods to customers in Nairobi. The wholesale business is owned and managed by Mr. Boniface Ndambuki. Mr....(Solved)
Boni Wholesalers Ltd. Provides a variety if goods to customers in Nairobi. The wholesale business is owned and managed by Mr. Boniface Ndambuki. Mr. Boni purchases goods on credit from his well established suppliers. He has a large box-file containing supplier details and another equally large one containing commodity details. The commodity file also indicates the levels of inventory held in the store.
When a customer makes his order, the sales office accesses the commodity file to check if there is sufficient stock of the required items. If there is sufficient stock, then the sales office prepares a delivery note which is forwarded to the accounts office where an invoice is prepared. The invoice and the delivery note accompany the goods from the store to the customer who prepares a payment cheque for Boni Wholesalers Ltd. A copy of the delivery note is filed in the commodity file which now shows that the stock has reduced by the amount delivered to the customer.
Sometimes the stock of the required item is not sufficient to service the customer order. In this case the supplier‟s file is accessed to select the supplier that Boni
Wholesalers Ltd. Will order from. The sales office then produces purchase orders and dispatches them to the selected supplier. The supplier prepares his own invoice and delivery note which accompany the ordered goods to the stores of Boni Wholesalers Ltd. Once received, the invoice is forwarded to the accounts office for payment to the supplier. The delivery note is used to update the commodity as well as the supplier details files.
Required: a) In what ways can a business organization be considered as a system? Derive illustrations from Boni Wholesalers.
Date posted: March 28, 2018. Answers (1)
- Explain each of the following micro computer hardware/software devices:
(a) Cache memory; ...(Solved)
Explain each of the following micro computer hardware/software devices:
(a) Cache memory;
(b) Coprocessor;
(c) Device driver;
(d) Disk caching;
(e) Expansion card;
Date posted: March 28, 2018. Answers (1)
- (a) Information is a vital resource and most organizations are investing heavily in its management. It is therefore critical to protect data and information from...(Solved)
(a) Information is a vital resource and most organizations are investing heavily in its management. It is therefore critical to protect data and information from accidental or deliberate unauthorized modification or destruction. The information system itself must be protected from unauthorized interference so that it continues to meet its objective of continuing to provide information to various users. Required: (i.) Make two recommendations on physical security measures your organization‟s information system (2 marks) (ii.) Explain how “Backup” and “Uninterruptible Power Supply” are security measures. (2 marks)
(iii.) Discuss two security features that most operating systems have. (2 marks) (iv.) Name two disasters that information systems should be guarded against. (2 marks) (v.) Why do you think an information security policy is necessary for your organization? (2 marks)
b) Computer viruses pose a danger to the integrity of micro-computer systems. Fortunately a variety of anti-virus tools are available to detect, identify and remove viruses using a wide range of techniques. Required:
(i.) What is a computer virus?
(ii.) Name two anti-virus tools.
(iii.) Suggest two administrative measures that your organization should take to check the threats of computer viruses.
(iv.) Name two environmental factors that should be controlled so that they do not affect the operation of the computer.
Date posted: March 28, 2018. Answers (1)
-
a) List five types of systems
b) Explain the following characteristics of a system:
(i.) Differentiation;
(ii.) Equifinality;
(iii.) Feedback;
(iv.) Transformation;
(v.) Entropy;
(Solved)
a) List five types of systems
b) Explain the following characteristics of a system:
(i.) Differentiation;
(ii.) Equifinality;
(iii.) Feedback;
(iv.) Transformation;
(v.) Entropy;
Date posted: March 28, 2018. Answers (1)
- (a) (i.) What is a Decision Support System (DSS)?
(ii.) Describe the major DSS software components.
(b) (i.) What is...(Solved)
(a) (i.) What is a Decision Support System (DSS)?
(ii.) Describe the major DSS software components.
(b) (i.) What is an expert system?
(ii.) List four advantages of using an Expert System in decision making.
Date posted: March 28, 2018. Answers (1)
- In data communication, the communication channel is the route along which data is transmitted. The transmission of data can be described by the following four...(Solved)
In data communication, the communication channel is the route along which data is transmitted. The transmission of data can be described by the following four characteristics:
A. Direction of flow of data.
B. Communication lines.
C. Speed of data transmission.
D. Mode of data transmission.
Required: For each of the following data communication concepts/devices, indicate under which ONE of the above listed characteristics A-D they would best fall: ii. Protocol; iii. Half duplex; iv. Fibre optics; v. Simplex; vi. Analog signal; vii. Micro wave; viii. Band width; ix. Start/stop bit; x. Voice bad.
Explain the term internetworking within the context of data communication. How does a call-back unit and data-encryption equipment enhance security in a computer network?
Date posted: March 28, 2018. Answers (1)
- Masaku Engineering Co. Ltd, a company that is involved in the design and manufacturing of various products realizes that, in order to remain ahead of...(Solved)
Masaku Engineering Co. Ltd, a company that is involved in the design and manufacturing of various products realizes that, in order to remain ahead of its competitors, it must introduce Computer Aided Design (CAD) techniques.
Required:
a) Define what is meant by „Computer Assisted Design‟ techniques
b) List and describe briefly FOUR potential benefits, the company is likely to experience in the adoption of CAD
c) List five physical security procedures that Masaku might adopt to make sure that its information is secure.
Date posted: March 28, 2018. Answers (1)
- a) Before systems are put into organisational use, they should be well tested to ensure that the system being delivered is working as expected before...(Solved)
a) Before systems are put into organisational use, they should be well tested to ensure that the system being delivered is working as expected before it is implemented.
(i) What factors would determine the scope of system testing?
(ii) Who are involved in the testing process?
(iii) What do you consider to be limitations of software testing?
b) Decision support systems (DSS) are ISs that support managers in arriving at decisions in semi-structured problems. State any FOUR characteristics of DSS. Identify too the THREE main components of the DSS.
Date posted: March 28, 2018. Answers (1)
- a) Project management software can offer useful tool for managing projects. i) Identify the functions of project management software
ii) What are...(Solved)
a) Project management software can offer useful tool for managing projects. i) Identify the functions of project management software
ii) What are the typical inputs required for the software?
iii) Outline the major merits and demerits of using a project management software in the project management process
b) Outline the key steps in the systems acquisition process
Date posted: March 28, 2018. Answers (1)
- a) The systems implementation stage of SDLC involves getting the new system into use as smoothly and quickly as possible. Briefly explain the main activities...(Solved)
a) The systems implementation stage of SDLC involves getting the new system into use as smoothly and quickly as possible. Briefly explain the main activities in the implementation stage.
b) Fourth Generation Languages (4GLs) make rapid applications development faster for many programmers. What are 4GLs?
c) It has been suggested that for any business to derive strategic advantage from information systems there has to be alignment between the business strategy and the IS/IT strategy. Define what a business strategy for IT is and show why it is important for organisations to have an IS/ IT strategy.
Date posted: March 28, 2018. Answers (1)
- a) Explain the following tools for documenting and modelling user requirements
i) Entity-relationship diagrams (ERDs) ...(Solved)
a) Explain the following tools for documenting and modelling user requirements
i) Entity-relationship diagrams (ERDs) ii) Entity Life Histories
b) What are the desirable characteristics of a user-friendly system
c) Common computer outputs include printed reports and on screen reports. Explain the main classifications of reports.
Date posted: March 28, 2018. Answers (1)
- a) State the characteristics of a quality software product ...(Solved)
a) State the characteristics of a quality software product b) Explain the following terms as they relate to systems development: i) Quality management ii) Quality assurance
iii) Quality control
(2 marks)
c) In assessing the economic feasibility of MIS projects, it is important to identify the costs and benefits of New Systems. Identify Costs and benefits of new systems
Date posted: March 28, 2018. Answers (1)
- a) Define contingency planning and outline the contents of a contingency plan.
b) In ensuring control over the IS department resources, the company can...(Solved)
a) Define contingency planning and outline the contents of a contingency plan.
b) In ensuring control over the IS department resources, the company can adopt physical or logical access controls. With appropriate examples, explain the two forms of control. c) Define the following terms as they related to information systems.
i) Hackers
ii) Viruses
Date posted: March 28, 2018. Answers (1)
- Differentiate between static and dynamic testing as used in system analysis and design(Solved)
Differentiate between static and dynamic testing as used in system analysis and design.
Date posted: March 24, 2018. Answers (1)
- Distinguish between adaptive and probabilistic systems (Solved)
Distinguish between adaptive and probabilistic systems.
Date posted: March 24, 2018. Answers (1)
- Explain the term environment as used in information systems(Solved)
Explain the term environment as used in information systems.
Date posted: March 24, 2018. Answers (1)
- What are the physical parts of a computer?(Solved)
What are the physical parts of a computer?
Date posted: March 23, 2018. Answers (1)
- List any four likely causes of data and program loss in a computer system?(Solved)
List any four likely causes of data and program loss in a computer system?
Date posted: March 19, 2018. Answers (1)
- Write a program that solves a quadratic equation gives the answer for the roots.(Solved)
Write a program that solves a quadratic equation gives the answer for the roots.
Date posted: March 8, 2018. Answers (1)