Get premium membership and access questions with answers, video lessons as well as revision papers.
i) Unusual events that could alert Joyce Kubo of possible computer virus infection
- New icons and files that she did not create
- Antivirus program becomes disabled.
- The computer runs slower than usual and disks and disk drive become inaccessible
- The computer stops responding or locks up frequently
- Double extension on recently opened documents ii) Reasons why Joyce Kubo prefers
PDF file format
ii) Reasons why Joyce Kubo prefers PDF file format
- Supports high levels of data encryption and security and provides an easy and secure
approach for data
- Preserves all visual element which have been created in another document such as word,
or excel document when saving as a PDF file
- Allows file compression from raw data file such as PowerPoint. It is useful in graphics
laden documents since PDF can achieve effective reduction.
- With the necessary software to read PDF file, PDF documents are portable and can be
easily accessed
iii) Precaution Joyce Kubo should observe when putting text in a presentation
- Ensure the presentation should be precise
- Make use of graphics and other visual styles
- Ensure the fonts are large and well visible
- Ensure information is well arranged in the slides and there is a flow of the information
being passed across
Kavungya answered the question on May 14, 2019 at 09:05
- (i) Define the term "network firewall
(ii) Describe three advantages and three disadvantages of adopting hardware firewall.(Solved)
(i) Define the term "network firewall
(ii) Describe three advantages and three disadvantages of adopting hardware firewall.
Date posted: May 14, 2019. Answers (1)
- a) Distinguish between data privacy and data security,
b) Outline three countermeasures to information security threats,(Solved)
a) Distinguish between data privacy and data security,
b) Outline three countermeasures to information security threats,
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "logical topology" as used in computer networks.
(i!) Explain two types of logical topologies.(Solved)
(i) Define the term "logical topology" as used in computer networks.
(i!) Explain two types of logical topologies.
Date posted: May 14, 2019. Answers (1)
- Briefly discuss four advantages of the virtual private network.(Solved)
Briefly discuss four advantages of the virtual private network.
Date posted: May 14, 2019. Answers (1)
- (i)Define the term "protocol" in the context of computer networks.
(ii)Illustrate two types of wireless media necessary when setting up a network.(Solved)
(i)Define the term "protocol" in the context of computer networks.
(ii)Illustrate two types of wireless media necessary when setting up a network.
Date posted: May 14, 2019. Answers (1)
- Explain three modes of data communication and their practical use.(Solved)
Explain three modes of data communication and their practical use.
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "mobile computing”
(ii) Outline five limitations of mobile computing devices(Solved)
(i) Define the term "mobile computing”
(ii) Outline five limitations of mobile computing devices
Date posted: May 14, 2019. Answers (1)
- Analyse the following modes of communication with reference to-cost, speed of transmission
and reliability:
(i) Serial mode.
(ii) Parallel mode.(Solved)
Analyse the following modes of communication with reference to-cost, speed of transmission
and reliability:
(i) Serial mode.
(ii) Parallel mode.
Date posted: May 14, 2019. Answers (1)
- Information systems controls consist of all methods, policies and organizational procedures that
ensure the safety of the organization’s assets, the accuracy and reliability of its accounting
records...(Solved)
Information systems controls consist of all methods, policies and organizational procedures that
ensure the safety of the organization’s assets, the accuracy and reliability of its accounting
records and operational adherence to management standards.
Required:
Describe five types of general information systems controls.
Date posted: May 14, 2019. Answers (1)
- Differentiate between information systems (IS) and information technology (IT).(Solved)
Differentiate between information systems (IS) and information technology (IT).
Date posted: May 14, 2019. Answers (1)
- a) Identify the procedures that could be adopted to control the spread of computer viruses in
an organisation.
b) Name six threats to an organization’s information system...(Solved)
a) Identify the procedures that could be adopted to control the spread of computer viruses in
an organisation.
b) Name six threats to an organization’s information system that could arise as a result of
computer crime.
Date posted: May 14, 2019. Answers (1)
- Identify three vital services which information systems can provide to a business organization.(Solved)
Identify three vital services which information systems can provide to a business organization.
Date posted: May 14, 2019. Answers (1)
- a) Identify three roles of- information systems in-an. organisation.
b) State and explain the components of an information system.(Solved)
a) Identify three roles of- information systems in-an. organisation.
b) State and explain the components of an information system.
Date posted: May 14, 2019. Answers (1)
- Organizations individual use different types of information systems for different purposes.
Describe the characteristics of the following information systems:
i) Transaction processing systems (TPS).
ii) Sales and marketing...(Solved)
Organizations individual use different types of information systems for different purposes.
Describe the characteristics of the following information systems:
i) Transaction processing systems (TPS).
ii) Sales and marketing systems.
Date posted: May 14, 2019. Answers (1)
- a) i) Define the term "information systems
ii) State five types of information systems
b) As the information system manager of a company whose operations are highly...(Solved)
a) i) Define the term "information systems
ii) State five types of information systems
b) As the information system manager of a company whose operations are highly automated,
you have noticed that a large number of employees are suffering from occupational over-use
syndrome otherwise known as repetitive strain injury (RSI)
Identify four measures that you could adopt in order to minimize occupational over-use
syndrome
Date posted: May 14, 2019. Answers (1)
- Explain four security concerns that personal computer users face in an organization.(Solved)
Explain four security concerns that personal computer users face in an organization.
Date posted: May 14, 2019. Answers (1)
- Small and micro-business enterprises have greater access to a variety of information technology
tools that improve productivity such as netbooks, smartphones and cloud computing-based services. However,...(Solved)
Small and micro-business enterprises have greater access to a variety of information technology
tools that improve productivity such as netbooks, smartphones and cloud computing-based services. However, without adequate end point security practices in place, many enterprises
are exposed to both external and internal threats that could cripple their operations.
Identify the end point security threats to small and micro-business enterprises,
Date posted: May 14, 2019. Answers (1)
- a) To be considered an executive information system (EIS), a software product should address
certain needs of the executive.
b) Briefly describe four structural elements of a...(Solved)
a) To be considered an executive information system (EIS), a software product should address
certain needs of the executive.
b) Briefly describe four structural elements of a computer system.
Date posted: May 14, 2019. Answers (1)
- For each of the following threats to information systems, security, identify two conditions that
might increase the vulnerability of the information systems security:
i. Operator error.
ii. Hardware...(Solved)
For each of the following threats to information systems, security, identify two conditions that
might increase the vulnerability of the information systems security:
i. Operator error.
ii. Hardware malfunction,
iii. Software bugs.
iv. Data errors.
v. Accidental disclosure of information.
vi. Theft.
vii. Vandalism and sabotage.
Date posted: May 14, 2019. Answers (1)
- (i) Define the term "knowledge management system".
(ii) Highlight four benefits of a knowledge management system to a business organisation,
(iii) Outline three major problems a company...(Solved)
(i) Define the term "knowledge management system".
(ii) Highlight four benefits of a knowledge management system to a business organisation,
(iii) Outline three major problems a company might face when implementing a new
knowledge management system
Date posted: May 14, 2019. Answers (1)