Get premium membership and access questions with answers, video lessons as well as revision papers.
- Disclosure: Where messages and data traversing internet can be seen by other machines
including e-mail files, passwords and in some cases key-strokes as they are being entered
in real time.
- Unauthorized access: since many internet software packages can render system subject
to attack. Lack of proper configuration can result to unauthorized access incidents. The
perimeter can be protected with firewalls
- Theft or alteration of corporate information: where information can be intercepted and
contents changed, this can have disastrous effect.
- Viruses and worms: this can be from from e-mail attachments. An email anti-virus
gateway to filter incoming email messages can be used for protection.
- Disruption of network devices and services- Set up an authentication server on the
network and equip remote users with authentication tokens.
Kavungya answered the question on May 14, 2019 at 07:46
- a) To be considered an executive information system (EIS), a software product should address
certain needs of the executive.
b) Briefly describe four structural elements of a...(Solved)
a) To be considered an executive information system (EIS), a software product should address
certain needs of the executive.
b) Briefly describe four structural elements of a computer system.
Date posted: May 14, 2019. Answers (1)
- For each of the following threats to information systems, security, identify two conditions that
might increase the vulnerability of the information systems security:
i. Operator error.
ii. Hardware...(Solved)
For each of the following threats to information systems, security, identify two conditions that
might increase the vulnerability of the information systems security:
i. Operator error.
ii. Hardware malfunction,
iii. Software bugs.
iv. Data errors.
v. Accidental disclosure of information.
vi. Theft.
vii. Vandalism and sabotage.
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "knowledge management system".
(ii) Highlight four benefits of a knowledge management system to a business organisation,
(iii) Outline three major problems a company...(Solved)
(i) Define the term "knowledge management system".
(ii) Highlight four benefits of a knowledge management system to a business organisation,
(iii) Outline three major problems a company might face when implementing a new
knowledge management system
Date posted: May 14, 2019. Answers (1)
- Briefly explain the following terms:
i. Uniform Resource Locator.
ii. Cloud computing.(Solved)
Briefly explain the following terms:
i. Uniform Resource Locator.
ii. Cloud computing.
Date posted: May 14, 2019. Answers (1)
- a) Outline three functions of an organisation that could be automated.
b) Briefly, describe how a computer system could be modified for use by physically challenged
persons(Solved)
a) Outline three functions of an organisation that could be automated.
b) Briefly, describe how a computer system could be modified for use by physically challenged
persons
Date posted: May 14, 2019. Answers (1)
- Briefly explain four authentication techniques that could enhance security of information
systems in an organisation.(Solved)
Briefly explain four authentication techniques that could enhance security of information
systems in an organisation.
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "management information systems" in the context of information systems.
(ii) Explain three advantages of management information systems to the banking sector.(Solved)
(i) Define the term "management information systems" in the context of information systems.
(ii) Explain three advantages of management information systems to the banking sector.
Date posted: May 14, 2019. Answers (1)
- a) (i) Highlight four benefits of office automation systems.
(ii) Explain four characteristics of information that is suitable for decision making.
b) Briefly explain four applications of...(Solved)
a) (i) Highlight four benefits of office automation systems.
(ii) Explain four characteristics of information that is suitable for decision making.
b) Briefly explain four applications of cloud computing.
Date posted: May 14, 2019. Answers (1)
- Discuss the evolution of information systems.(Solved)
Discuss the evolution of information systems.
Date posted: May 14, 2019. Answers (1)
- Distinguish between the following terms:
(i) Data security and systems security.(Solved)
Distinguish between the following terms:
(i) Data security and systems security.
Date posted: May 14, 2019. Answers (1)
- Describe six guidelines for managing computer passwords.(Solved)
Describe six guidelines for managing computer passwords.
Date posted: May 14, 2019. Answers (1)
- (a) Management information systems are designed to provide information needed for decision
making at different levels of management. Enumerate six main characteristics of
management information systems.
(b) In...(Solved)
(a) Management information systems are designed to provide information needed for decision
making at different levels of management. Enumerate six main characteristics of
management information systems.
(b) In relation to the following factors, argue the case for or against the use of online technology
in a business enterprise:
i. Cost.
ii. Security.
iii. Reliability.
iv. Time taken to complete transactions
(c) Citing examples explain the following key concepts of information security:
i. Confidentiality.
ii. Integrity.
iii. Availability.
Date posted: May 14, 2019. Answers (1)
- Explain the meaning of the following terms in the context of computerised data processing:
i) End user computing.
ii) Electronic data interchange.
iii) Data warehouse.
iv) Information centers(Solved)
Explain the meaning of the following terms in the context of computerised data processing:
i) End user computing.
ii) Electronic data interchange.
iii) Data warehouse.
iv) Information centers
Date posted: May 14, 2019. Answers (1)
- List seven application packages of a computer system.(Solved)
List seven application packages of a computer system.
Date posted: May 14, 2019. Answers (1)
- Data are raw facts which are further processed into useful information.
Required:
i) Identify data generated in a purchasing transaction.
ii) Briefly explain five main uses of information...(Solved)
Data are raw facts which are further processed into useful information.
Required:
i) Identify data generated in a purchasing transaction.
ii) Briefly explain five main uses of information to a business organisation.
Date posted: May 14, 2019. Answers (1)
- A new database is being designed for Joka Enterprises
i) Outline five major steps that should be undertaken during the design process
ii) Identify any three advantages...(Solved)
A new database is being designed for Joka Enterprises
i) Outline five major steps that should be undertaken during the design process
ii) Identify any three advantages of databases over the traditional file systems
Date posted: May 14, 2019. Answers (1)
- Modern accounting software packages are designed to simplify and automate complex manual
financial management processes and improve the accessibility, accuracy and timelines of
financial data
Discuss the key...(Solved)
Modern accounting software packages are designed to simplify and automate complex manual
financial management processes and improve the accessibility, accuracy and timelines of
financial data
Discuss the key features and capabilities of accounting software packages which enable
organizations to simplify and automate financial management processes
Date posted: May 14, 2019. Answers (1)
- Identify six facilities which are required by data processing applications(Solved)
Identify six facilities which are required by data processing applications
Date posted: May 14, 2019. Answers (1)
- Outline six data processing operations in an organisation(Solved)
Outline six data processing operations in an organisation
Date posted: May 14, 2019. Answers (1)
- (i) Define a presentation program.
(ii) Highlight two major components of a presentation program.(Solved)
(i) Define a presentation program.
(ii) Highlight two major components of a presentation program.
Date posted: May 14, 2019. Answers (1)