Topic: Information Systems Development and Security

Search 500 + past questions and counting.
  • Filter by Professional Bodies

  • Filter by Subject

  • Filter by Series

  • Filter by Topics

  • Filter by Levels

MI – Nov 2020 – L1 – SB – Q6 – Information System Development and Security

Identify costs of software implementation, types of firewalls, common network issues, and methods to manage email inboxes.

a. When a new software is implemented, various costs are incurred. Identify FIVE of such costs. (5 Marks)

b. Identify FOUR types of firewalls. (4 Marks)

c. State FIVE common network issues an organisation may encounter. (5 Marks)

d. If email is used inappropriately, it can hinder productivity. Identify SIX ways email inbox can be better managed. (6 Marks)

(Total 20 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2020 – L1 – SB – Q6 – Information System Development and Security"

MI – Nov 2020 – L1 – SB – Q5 – Information Systems

Define Decision Support System, list DSS packages, and outline advantages, disadvantages, and impact of IT.

a. Define Decision Support System (DSS). (2 Marks)

b. List FIVE DSS packages that can be used to explore alternatives. (5 Marks)

c. Enumerate THREE advantages and TWO disadvantages of DSS. (5 Marks)

d. State FOUR benefits and FOUR lapses of information technology to individual, organisation, and government. (8 Marks)

(Total 20 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2020 – L1 – SB – Q5 – Information Systems"

MI – Nov 2020 – L1 – SA – Q19 – Information Systems Development and Security

Identify the device that uses light beams to convert images or text into digital files.

Which of the following devices uses light beams to digitally convert images, codes, text, or objects as two-dimensional (2D) digital files for transfer to the computer for processing?

A. Magnetic Character Reader

B. Optical Character Reader

C. Optical Mark Reader

D. Digital Camera

E. Magnetic Ink Character Reader

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2020 – L1 – SA – Q19 – Information Systems Development and Security"

MI – Nov 2020 – L1 – SA – Q18 – Information System Development and Security

Identify the method of system changeover that maintains the old system operational after the new system is launched.

The practice of keeping an old system operational after a new system has been launched is known as:

A. Direct Changeover

B. Parallel Changeover

C. Phased Changeover

D. Pilot Changeover

E. Concurrent Changeover

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2020 – L1 – SA – Q18 – Information System Development and Security"

MI – Nov 2020 – L1 – SA – Q13 – Information System Development and Security

Identify the primary purpose of a firewall in computer systems.

Firewall in a computer system is used for:

A. Security

B. Transmission

C. Encryption

D. Fire drills

E. Reporting

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2020 – L1 – SA – Q13 – Information System Development and Security"

MI – Nov 2015 – L1 – SB – Q6a – Information Systems

Identifies areas where computers serve as instruments and targets of crime.

a. In a computer environment, it is a common occurrence that data is lost, manipulated, or tampered with by unauthorized individuals for selfish reasons.

Required:
Enumerate FOUR areas where computers are used as instruments of crime and FOUR areas as targets of crime. (8 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SB – Q6a – Information Systems"

MI – Nov 2015 – L1 – SB – Q5 – Information Systems

Defines an information system and explains the functions of different types of support systems.

a. Define an Information System. (2 Marks)

b. Explain FOUR functions of an Executive Support System. (8 Marks)

c. Explain briefly the following:
i. Transaction Processing System (TPS). (5 Marks)
ii. Decision Support System (DSS). (5 Marks)

(Total 20 Marks)

 

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SB – Q5 – Information Systems"

MI – Nov 2015 – L1 – SB – Q4b – Information Systems

Summary: Describes three main methods used to monitor performance in IT-based organizations.

State and describe briefly THREE main methods of monitoring performance in
an IT based organisation. (6 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SB – Q4b – Information Systems"

MI – Nov 2015 – L1 – SB – Q4a – Information Systems

Identifies values added by an Accounting Information System and its various uses.

a. “A well-designed Accounting Information System normally adds VALUES to an organization.”
Required:
i. Enumerate FOUR of these values. (4 Marks)

ii. State FIVE uses of Accounting Information System and explain each briefly. (10 Marks)

(Total 14 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SB – Q4a – Information Systems"

MI – Nov 2015 – L1 – SA – Q20 – Information Systems

Identifies an incorrect statement regarding directional alignment between IT strategy and business strategy.

Which of the following is NOT true of Directional Alignment between IT Strategy and Business Strategy?
A. The alignment must consider all of the organisation’s business functions
B. It must consider the related importance of data on assets throughout the enterprise
C. Alignment causes an organisation to incur costs that may not be necessary to the business needs
D. An organisation can transform technology into business service functions by aligning existing architecture and project portfolios with business needs
E. The cost of not having a directional alignment can be stated through direct costs to the technology environment

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SA – Q20 – Information Systems"

MI – Nov 2020 – L1 – SB – Q6 – Information System Development and Security

Identify costs of software implementation, types of firewalls, common network issues, and methods to manage email inboxes.

a. When a new software is implemented, various costs are incurred. Identify FIVE of such costs. (5 Marks)

b. Identify FOUR types of firewalls. (4 Marks)

c. State FIVE common network issues an organisation may encounter. (5 Marks)

d. If email is used inappropriately, it can hinder productivity. Identify SIX ways email inbox can be better managed. (6 Marks)

(Total 20 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2020 – L1 – SB – Q6 – Information System Development and Security"

MI – Nov 2020 – L1 – SB – Q5 – Information Systems

Define Decision Support System, list DSS packages, and outline advantages, disadvantages, and impact of IT.

a. Define Decision Support System (DSS). (2 Marks)

b. List FIVE DSS packages that can be used to explore alternatives. (5 Marks)

c. Enumerate THREE advantages and TWO disadvantages of DSS. (5 Marks)

d. State FOUR benefits and FOUR lapses of information technology to individual, organisation, and government. (8 Marks)

(Total 20 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2020 – L1 – SB – Q5 – Information Systems"

MI – Nov 2020 – L1 – SA – Q19 – Information Systems Development and Security

Identify the device that uses light beams to convert images or text into digital files.

Which of the following devices uses light beams to digitally convert images, codes, text, or objects as two-dimensional (2D) digital files for transfer to the computer for processing?

A. Magnetic Character Reader

B. Optical Character Reader

C. Optical Mark Reader

D. Digital Camera

E. Magnetic Ink Character Reader

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2020 – L1 – SA – Q19 – Information Systems Development and Security"

MI – Nov 2020 – L1 – SA – Q18 – Information System Development and Security

Identify the method of system changeover that maintains the old system operational after the new system is launched.

The practice of keeping an old system operational after a new system has been launched is known as:

A. Direct Changeover

B. Parallel Changeover

C. Phased Changeover

D. Pilot Changeover

E. Concurrent Changeover

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2020 – L1 – SA – Q18 – Information System Development and Security"

MI – Nov 2020 – L1 – SA – Q13 – Information System Development and Security

Identify the primary purpose of a firewall in computer systems.

Firewall in a computer system is used for:

A. Security

B. Transmission

C. Encryption

D. Fire drills

E. Reporting

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2020 – L1 – SA – Q13 – Information System Development and Security"

MI – Nov 2015 – L1 – SB – Q6a – Information Systems

Identifies areas where computers serve as instruments and targets of crime.

a. In a computer environment, it is a common occurrence that data is lost, manipulated, or tampered with by unauthorized individuals for selfish reasons.

Required:
Enumerate FOUR areas where computers are used as instruments of crime and FOUR areas as targets of crime. (8 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SB – Q6a – Information Systems"

MI – Nov 2015 – L1 – SB – Q5 – Information Systems

Defines an information system and explains the functions of different types of support systems.

a. Define an Information System. (2 Marks)

b. Explain FOUR functions of an Executive Support System. (8 Marks)

c. Explain briefly the following:
i. Transaction Processing System (TPS). (5 Marks)
ii. Decision Support System (DSS). (5 Marks)

(Total 20 Marks)

 

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SB – Q5 – Information Systems"

MI – Nov 2015 – L1 – SB – Q4b – Information Systems

Summary: Describes three main methods used to monitor performance in IT-based organizations.

State and describe briefly THREE main methods of monitoring performance in
an IT based organisation. (6 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SB – Q4b – Information Systems"

MI – Nov 2015 – L1 – SB – Q4a – Information Systems

Identifies values added by an Accounting Information System and its various uses.

a. “A well-designed Accounting Information System normally adds VALUES to an organization.”
Required:
i. Enumerate FOUR of these values. (4 Marks)

ii. State FIVE uses of Accounting Information System and explain each briefly. (10 Marks)

(Total 14 Marks)

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SB – Q4a – Information Systems"

MI – Nov 2015 – L1 – SA – Q20 – Information Systems

Identifies an incorrect statement regarding directional alignment between IT strategy and business strategy.

Which of the following is NOT true of Directional Alignment between IT Strategy and Business Strategy?
A. The alignment must consider all of the organisation’s business functions
B. It must consider the related importance of data on assets throughout the enterprise
C. Alignment causes an organisation to incur costs that may not be necessary to the business needs
D. An organisation can transform technology into business service functions by aligning existing architecture and project portfolios with business needs
E. The cost of not having a directional alignment can be stated through direct costs to the technology environment

Login or create a free account to see answers

Find Related Questions by Tags, levels, etc.

Report an error

You're reporting an error for "MI – Nov 2015 – L1 – SA – Q20 – Information Systems"

error: Content is protected !!
Oops!

This feature is only available in selected plans.

Click on the login button below to login if you’re already subscribed to a plan or click on the upgrade button below to upgrade your current plan.

If you’re not subscribed to a plan, click on the button below to choose a plan