Get premium membership and access questions with answers, video lessons as well as revision papers.
- Unauthorized access resulting in a loss or leaking of confidential information
- Unauthorized disclosure - information revealed without authorization
- Theft or destruction especially with respect to hardware and software
- Interference with system operation due to viruses and worms
Kavungya answered the question on May 14, 2019 at 07:48
- Small and micro-business enterprises have greater access to a variety of information technology
tools that improve productivity such as netbooks, smartphones and cloud computing-based services. However,...(Solved)
Small and micro-business enterprises have greater access to a variety of information technology
tools that improve productivity such as netbooks, smartphones and cloud computing-based services. However, without adequate end point security practices in place, many enterprises
are exposed to both external and internal threats that could cripple their operations.
Identify the end point security threats to small and micro-business enterprises,
Date posted: May 14, 2019. Answers (1)
- a) To be considered an executive information system (EIS), a software product should address
certain needs of the executive.
b) Briefly describe four structural elements of a...(Solved)
a) To be considered an executive information system (EIS), a software product should address
certain needs of the executive.
b) Briefly describe four structural elements of a computer system.
Date posted: May 14, 2019. Answers (1)
- For each of the following threats to information systems, security, identify two conditions that
might increase the vulnerability of the information systems security:
i. Operator error.
ii. Hardware...(Solved)
For each of the following threats to information systems, security, identify two conditions that
might increase the vulnerability of the information systems security:
i. Operator error.
ii. Hardware malfunction,
iii. Software bugs.
iv. Data errors.
v. Accidental disclosure of information.
vi. Theft.
vii. Vandalism and sabotage.
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "knowledge management system".
(ii) Highlight four benefits of a knowledge management system to a business organisation,
(iii) Outline three major problems a company...(Solved)
(i) Define the term "knowledge management system".
(ii) Highlight four benefits of a knowledge management system to a business organisation,
(iii) Outline three major problems a company might face when implementing a new
knowledge management system
Date posted: May 14, 2019. Answers (1)
- Briefly explain the following terms:
i. Uniform Resource Locator.
ii. Cloud computing.(Solved)
Briefly explain the following terms:
i. Uniform Resource Locator.
ii. Cloud computing.
Date posted: May 14, 2019. Answers (1)
- a) Outline three functions of an organisation that could be automated.
b) Briefly, describe how a computer system could be modified for use by physically challenged
persons(Solved)
a) Outline three functions of an organisation that could be automated.
b) Briefly, describe how a computer system could be modified for use by physically challenged
persons
Date posted: May 14, 2019. Answers (1)
- Briefly explain four authentication techniques that could enhance security of information
systems in an organisation.(Solved)
Briefly explain four authentication techniques that could enhance security of information
systems in an organisation.
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "management information systems" in the context of information systems.
(ii) Explain three advantages of management information systems to the banking sector.(Solved)
(i) Define the term "management information systems" in the context of information systems.
(ii) Explain three advantages of management information systems to the banking sector.
Date posted: May 14, 2019. Answers (1)
- a) (i) Highlight four benefits of office automation systems.
(ii) Explain four characteristics of information that is suitable for decision making.
b) Briefly explain four applications of...(Solved)
a) (i) Highlight four benefits of office automation systems.
(ii) Explain four characteristics of information that is suitable for decision making.
b) Briefly explain four applications of cloud computing.
Date posted: May 14, 2019. Answers (1)
- Discuss the evolution of information systems.(Solved)
Discuss the evolution of information systems.
Date posted: May 14, 2019. Answers (1)
- Distinguish between the following terms:
(i) Data security and systems security.(Solved)
Distinguish between the following terms:
(i) Data security and systems security.
Date posted: May 14, 2019. Answers (1)
- Describe six guidelines for managing computer passwords.(Solved)
Describe six guidelines for managing computer passwords.
Date posted: May 14, 2019. Answers (1)
- (a) Management information systems are designed to provide information needed for decision
making at different levels of management. Enumerate six main characteristics of
management information systems.
(b) In...(Solved)
(a) Management information systems are designed to provide information needed for decision
making at different levels of management. Enumerate six main characteristics of
management information systems.
(b) In relation to the following factors, argue the case for or against the use of online technology
in a business enterprise:
i. Cost.
ii. Security.
iii. Reliability.
iv. Time taken to complete transactions
(c) Citing examples explain the following key concepts of information security:
i. Confidentiality.
ii. Integrity.
iii. Availability.
Date posted: May 14, 2019. Answers (1)
- Explain the meaning of the following terms in the context of computerised data processing:
i) End user computing.
ii) Electronic data interchange.
iii) Data warehouse.
iv) Information centers(Solved)
Explain the meaning of the following terms in the context of computerised data processing:
i) End user computing.
ii) Electronic data interchange.
iii) Data warehouse.
iv) Information centers
Date posted: May 14, 2019. Answers (1)
- List seven application packages of a computer system.(Solved)
List seven application packages of a computer system.
Date posted: May 14, 2019. Answers (1)
- Data are raw facts which are further processed into useful information.
Required:
i) Identify data generated in a purchasing transaction.
ii) Briefly explain five main uses of information...(Solved)
Data are raw facts which are further processed into useful information.
Required:
i) Identify data generated in a purchasing transaction.
ii) Briefly explain five main uses of information to a business organisation.
Date posted: May 14, 2019. Answers (1)
- A new database is being designed for Joka Enterprises
i) Outline five major steps that should be undertaken during the design process
ii) Identify any three advantages...(Solved)
A new database is being designed for Joka Enterprises
i) Outline five major steps that should be undertaken during the design process
ii) Identify any three advantages of databases over the traditional file systems
Date posted: May 14, 2019. Answers (1)
- Modern accounting software packages are designed to simplify and automate complex manual
financial management processes and improve the accessibility, accuracy and timelines of
financial data
Discuss the key...(Solved)
Modern accounting software packages are designed to simplify and automate complex manual
financial management processes and improve the accessibility, accuracy and timelines of
financial data
Discuss the key features and capabilities of accounting software packages which enable
organizations to simplify and automate financial management processes
Date posted: May 14, 2019. Answers (1)
- Identify six facilities which are required by data processing applications(Solved)
Identify six facilities which are required by data processing applications
Date posted: May 14, 2019. Answers (1)
- Outline six data processing operations in an organisation(Solved)
Outline six data processing operations in an organisation
Date posted: May 14, 2019. Answers (1)