Get premium membership and access questions with answers, video lessons as well as revision papers.
a) Controlling the spread of computer viruses
- Ensure you have an update ant-virus software and scanning definitions frequently
- Allow no disk to be used until it has been scanned on a stand-alone machine that is used
for no other purpose and is not connected to the network.
- Ensure that the network administrator uses workstation and server anti-virus software
•Insist that field technicians scan their disks bn a test machine before they use any of their
disks on the system
- Enforce a rule of not using shareware without first scanning the shareware thoroughly for
a virus '
- Build any system from original, clean master copies. Boot only from original diskettes
whose write protection has always been in place.
- Write-protect all diskettes with EXE or COM extensions
b) Threats due to computer crime
- Sabotage - some perpetrators are not looking for financial gain. They merely want to
cause damage due to dislike of the organization or for self-gratification
- Financial loss - these losses can be direct, through loss of electronic funds or indirect,
through the costs of correcting the exposure.
- Legal repercussions - Not having proper security measures could expose the
organization to lawsuits from investors and insurers if a significant loss occurs from a security violation. Most companies also must comply with industry-specific regulatory
agencies.
- Loss of credibility or competitive edge - many organizations, especially service firms
such as . banks, savings and loans and investment firms, need credibility and public
trust to maintain a competitive edge. A security violation can severely damage this
credibility, resulting in loss of business and prestige.
- Blackmail/Industrial espionage - by gaining access to confidential information, a
perpetrator can extort payments or services from an organization by threatening to
exploit the security breach.
Kavungya answered the question on May 14, 2019 at 08:16
- Identify three vital services which information systems can provide to a business organization.(Solved)
Identify three vital services which information systems can provide to a business organization.
Date posted: May 14, 2019. Answers (1)
- a) Identify three roles of- information systems in-an. organisation.
b) State and explain the components of an information system.(Solved)
a) Identify three roles of- information systems in-an. organisation.
b) State and explain the components of an information system.
Date posted: May 14, 2019. Answers (1)
- Organizations individual use different types of information systems for different purposes.
Describe the characteristics of the following information systems:
i) Transaction processing systems (TPS).
ii) Sales and marketing...(Solved)
Organizations individual use different types of information systems for different purposes.
Describe the characteristics of the following information systems:
i) Transaction processing systems (TPS).
ii) Sales and marketing systems.
Date posted: May 14, 2019. Answers (1)
- a) i) Define the term "information systems
ii) State five types of information systems
b) As the information system manager of a company whose operations are highly...(Solved)
a) i) Define the term "information systems
ii) State five types of information systems
b) As the information system manager of a company whose operations are highly automated,
you have noticed that a large number of employees are suffering from occupational over-use
syndrome otherwise known as repetitive strain injury (RSI)
Identify four measures that you could adopt in order to minimize occupational over-use
syndrome
Date posted: May 14, 2019. Answers (1)
- Explain four security concerns that personal computer users face in an organization.(Solved)
Explain four security concerns that personal computer users face in an organization.
Date posted: May 14, 2019. Answers (1)
- Small and micro-business enterprises have greater access to a variety of information technology
tools that improve productivity such as netbooks, smartphones and cloud computing-based services. However,...(Solved)
Small and micro-business enterprises have greater access to a variety of information technology
tools that improve productivity such as netbooks, smartphones and cloud computing-based services. However, without adequate end point security practices in place, many enterprises
are exposed to both external and internal threats that could cripple their operations.
Identify the end point security threats to small and micro-business enterprises,
Date posted: May 14, 2019. Answers (1)
- a) To be considered an executive information system (EIS), a software product should address
certain needs of the executive.
b) Briefly describe four structural elements of a...(Solved)
a) To be considered an executive information system (EIS), a software product should address
certain needs of the executive.
b) Briefly describe four structural elements of a computer system.
Date posted: May 14, 2019. Answers (1)
- For each of the following threats to information systems, security, identify two conditions that
might increase the vulnerability of the information systems security:
i. Operator error.
ii. Hardware...(Solved)
For each of the following threats to information systems, security, identify two conditions that
might increase the vulnerability of the information systems security:
i. Operator error.
ii. Hardware malfunction,
iii. Software bugs.
iv. Data errors.
v. Accidental disclosure of information.
vi. Theft.
vii. Vandalism and sabotage.
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "knowledge management system".
(ii) Highlight four benefits of a knowledge management system to a business organisation,
(iii) Outline three major problems a company...(Solved)
(i) Define the term "knowledge management system".
(ii) Highlight four benefits of a knowledge management system to a business organisation,
(iii) Outline three major problems a company might face when implementing a new
knowledge management system
Date posted: May 14, 2019. Answers (1)
- Briefly explain the following terms:
i. Uniform Resource Locator.
ii. Cloud computing.(Solved)
Briefly explain the following terms:
i. Uniform Resource Locator.
ii. Cloud computing.
Date posted: May 14, 2019. Answers (1)
- a) Outline three functions of an organisation that could be automated.
b) Briefly, describe how a computer system could be modified for use by physically challenged
persons(Solved)
a) Outline three functions of an organisation that could be automated.
b) Briefly, describe how a computer system could be modified for use by physically challenged
persons
Date posted: May 14, 2019. Answers (1)
- Briefly explain four authentication techniques that could enhance security of information
systems in an organisation.(Solved)
Briefly explain four authentication techniques that could enhance security of information
systems in an organisation.
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "management information systems" in the context of information systems.
(ii) Explain three advantages of management information systems to the banking sector.(Solved)
(i) Define the term "management information systems" in the context of information systems.
(ii) Explain three advantages of management information systems to the banking sector.
Date posted: May 14, 2019. Answers (1)
- a) (i) Highlight four benefits of office automation systems.
(ii) Explain four characteristics of information that is suitable for decision making.
b) Briefly explain four applications of...(Solved)
a) (i) Highlight four benefits of office automation systems.
(ii) Explain four characteristics of information that is suitable for decision making.
b) Briefly explain four applications of cloud computing.
Date posted: May 14, 2019. Answers (1)
- Discuss the evolution of information systems.(Solved)
Discuss the evolution of information systems.
Date posted: May 14, 2019. Answers (1)
- Distinguish between the following terms:
(i) Data security and systems security.(Solved)
Distinguish between the following terms:
(i) Data security and systems security.
Date posted: May 14, 2019. Answers (1)
- Describe six guidelines for managing computer passwords.(Solved)
Describe six guidelines for managing computer passwords.
Date posted: May 14, 2019. Answers (1)
- (a) Management information systems are designed to provide information needed for decision
making at different levels of management. Enumerate six main characteristics of
management information systems.
(b) In...(Solved)
(a) Management information systems are designed to provide information needed for decision
making at different levels of management. Enumerate six main characteristics of
management information systems.
(b) In relation to the following factors, argue the case for or against the use of online technology
in a business enterprise:
i. Cost.
ii. Security.
iii. Reliability.
iv. Time taken to complete transactions
(c) Citing examples explain the following key concepts of information security:
i. Confidentiality.
ii. Integrity.
iii. Availability.
Date posted: May 14, 2019. Answers (1)
- Explain the meaning of the following terms in the context of computerised data processing:
i) End user computing.
ii) Electronic data interchange.
iii) Data warehouse.
iv) Information centers(Solved)
Explain the meaning of the following terms in the context of computerised data processing:
i) End user computing.
ii) Electronic data interchange.
iii) Data warehouse.
iv) Information centers
Date posted: May 14, 2019. Answers (1)
- List seven application packages of a computer system.(Solved)
List seven application packages of a computer system.
Date posted: May 14, 2019. Answers (1)