Computers & Information Systems
Computers & Information Systems
Question
What is an Information System? What will be the benefits for a company that does not have an
Information system if it deploys a well-designed and structured Information system?
An Information System is a computer system or set of interrelated components for collecting (input),
creating, storing, processing, and distributing information (output), typically including hardware and
software, system users, and the data itself: the use of information systems to solve business problems
and goals that are defined in the mission statement, support forecasting, planning control, coordination,
decision making and operational activities in an organization.
A well designed and structured IS supports the attempts to gain competitive advantage through a
number of different approaches, such as improving operational efficiency (e.g. implementing an
inventory control system to manage stock levels in production or in administration introducing office
automation systems), raising entry barriers (these are created to prevent new competitors entering the
industry), creating high switching costs (this way the supplier or customer is discouraged from switching
to the competitor`s system and competitors are excluded from the business relationship) and gaining
information leadership
2. Question
What competencies do information systems managers need to have in order to participate fully in the
operations of an organization?
One of the most important functions of these competences is the possibility to create a vision of IT and
how these technologies can be applied to organizations. Always bearing this strategic vision in mind, the
information system courses for managers must develop seven essential competences. The first is
knowledge in IT. The second competence is linked to the knowledge of the existing applications in the
market and which programs exist for each of the specific functions of the organization and how they can
provide support to the activities and to the decision-making processes, as well as the information
systems as the basic coordination component among activities. Third, it is necessary to create
competences in the development and analysis of information systems, linked to IS creation or upgrade
projects in the organizations. The fourth competence involves the acquisition of abilities in IS
administration and all the aspects linked to security and audits. Fifth, e-commerce, web 2.0, and the
new tendencies in mobile technologies and applications should be included in the curricula of the IS
subjects. Sixth, managers must know about the legal aspect of data protection, e-commerce, and e-
government. Finally, it is necessary to encourage associates about the importance of knowing reliable IT
experts and consultants who are vitally important for SME.
3. Question
How internet technology can be used in an Information system? What are the dangers of using the net
within an information system?
Companies are using more-organized information and improved efficiency through Internet use.
Information exchange happens faster via email or chat. Another benefit of the Internet is that
companies are connected internally as well as externally with other organizations. Internet-based
systems integrate three main sources of company information: The Internet (holds the public area of a
company Web site that anyone can access), intranet (only company personnel are allowed to access an
intranet, which is the private area of a company Web site), and extranet (private area of a company Web
site that clients, outside contractors, and business affiliates can access).
Armed with a browser and a reasonably fast Internet connection, company personnel can access a
centralized, well-organized, comprehensive company database from anywhere. Cloud computing also
has the advantages of cost (eliminates the expense of buying HW and SW), speed (provided as self-
service or on-demand in minutes), scalability (delivering the right amount of resource exactly when
needed) and reliability (data backup and disaster recovery through cloud mirroring).
The most common dangers threatening an IS using the Internet are attacks from outside, such as
phishing, that can implement viruses, spywares and other harming malwares that can compromise
company trade secrets, data and information, social engineering, etc.
4. Question
What are the different types of information systems and how do they differ? Can you give an example of
each one?
Deterministic and probabilistic systems: Deterministic or mechanistic system: all of the system`s
outputs can be predicted by examining its inputs. An example of a deterministic system is an electronic
calculator, where the results of carrying out a calculation can be predicted with complete accuracy. In a
probabilistic (stochastic) system the outputs of the system cannot be predicted with complete accuracy.
An example of a probabilistic system is a production planning system used to schedule work. Although
the system can predict how long the production run is likely to take, it cannot provide a precise figure.
An example of this kind of system is a sales forecasting system.
Adaptive systems: also called self-organizing or cybernetic responds to changes in the environment and
modifies its operation accordingly. The outputs obtained from the system are sometimes uncertain since
the system may respond to the same stimuli in a different way. Examples of adaptive systems include
human beings, plants and business organizations.
Hard and soft systems: a hard system has an explicit objective and is governed by fixed rules and
procedures such as those encountered for structured decision making. The conditions of the system`s
environment tend to be stable and therefore more predictable. In turn, the system`s outputs can be
predicted more easily and its performance can be measured objectively. An example of a hard system is
a production line. A soft system operates in a relatively unpredictable environment where conditions
may be certain or liable to rapid change. Soft systems usually involve people or socio-technical
situations.
5. Question
What are the main reasons that may lead an Information System to fail?
An IS failure occurs when a system does not meet its requirements or when the level of discontentment
with a system increases to the level that there is no enough provision to sustain it. Information system
project failure may be as a result of its inability to meet users’ requirements and/or overruns pertaining
to budget or completion time. Studies have shown that many failed projects are over budget, some by
as much as 189%. Research showed that only one-sixth (16.67%) of projects are finished as schedule and
within budget. An information system failure can cause financial loss, commercial embarrassment, loss
of customers and revenue streams, sanctions and the loss of staff morale or stakeholder allegiance in an
organization. Examples of system failures includes an alarm system that fails to sound when pressed, an
automated door that fails to open and close on its own accord on approach, ammunition that detonates
prematurely, and other similar conditions.
6. Question
Describe the skills, areas of knowledge and background disciplines that an information systems designer
must have.
The design phase of the systems development lifecycle involves the specification of how system should
work. There are environmental constraints on design which are a result of the hardware and software
environment of implementation, which are needed to be known by the system designer, include:
hardware platform, operating system, web browsers to be supported, data links required between
applications, design tools (CASE tools), methodologies or standards, industry standards, systems
development tools and the performance required for the number of users. The input to the design
phase is the requirements specification from the analysis phase. The output from the design phase is a
design specification that is used by programmers in the build phase. The IS designer should have the
know the elements of design: whether to approach a bottom-up strategy or top-down one? Validation
checks if the requirements are fulfilled, verification tests whether it is error-free and scalability is the
potential of the IS. Further on, it needs to be reviewed the major elements of the systems design: overall
or systems design (e.g. ERP or client/server model), detailed design, DB design (e.g. MS Access), user
interface design (e.g. Web design for B2C E-commerce) and security design authentication, etc.
7. Question
Security is a major phase in the design and implementation of an Information System. Though system
analysts leave some holes in the systems implement. Why? How can this be controlled?
The most common threats faced by organizational ISs can be placed into the following categories:
accidents, natural disasters, vandalism, theft, phishing, unauthorized use, computer viruses and
malwares, and sabotage (industrial and individual). The latter answers the question raised above, as
there is an example of individual sabotage called back door. The back door is a section of a program
code that allows the user to circumvent the security procedures in order to gain full access to an
information system. Although back doors have legitimate uses, such as for program testing, they can
also be used as an instrument of sabotage. It should be noted, however that individual sabotage is
becoming more infrequent due to legislation such as the Computer Misuse Act.
There are certain control strategies that reduce these threats: containment (creating an impression that
the targeted data is of no, or little value – e.g. encrypted), deterrence (threat of punishment to
discourage potential intruders), obfuscation (hiding or distributing assets so that any damage caused can
be limited), recovery (ensure the normal operation of the IS is restored quickly and as possible, with
little disruption to the organization as possible.
Types of controls: physical protection (physical barriers: if access is restricted, risk of theft and
vandalism is also reduced), biometric controls (e.g. laptops with sensitive data are equipped with
fingerprint scanner), telecommunication controls (e.g. 2-factor authentication with mobile device),
failure controls (limit or avoid damage caused by failure – e.g. regular backup), auditing (involves taking
stock of procedures, hardware, software and data on a regular intervals).
Techniques for controlling: formal security policies, passwords, file encryptions, organizational
procedures, user validation, backup procedures.
8. Question
What are the two primary approaches to data management? Mention two advantages and two
disadvantages for each of the alternatives.
Hierarchical Ease with which data can be stored Hierarchical one-to many relationships must
Data Structure and retrieved in structured, be specified in advance, and are not flexible.
routine types of transactions.
Cannot easily handle ad hoc requests for
Ease with which data can be information.
extracted for reporting purposes.
Modifying a hierarchical database structure
Routine types of transaction is complex.
processing is fast and efficiently.
Great deal of redundancy.
Network More flexible that the hierarchical Network many-to-many relationships must
Structure model. be specified in advance
Flexible in that it can handle ad hoc Cannot process large amounts of business
information requests. transactions as quickly and efficiently as the
Relational hierarchical and network models.
Structure Easy for programmers to work
with. End users can use this model
with litter effort or training.
Easier to maintain than the
hierarchical and network models.
9. Question
An ideal operating system is sometimes described as ‘a layered product’. Outline six or seven layers in an
ideal generalized operating system. Provide a general outline as to the function of each of these layers.
A system (operating also) can be defined as a collection of interrelated components that work together
towards a collective goal. An operating system is a large and complex system that can only be created by
partitioning into small pieces. These pieces should be a well-defined portion of the system, which
carefully defined inputs, outputs, and functions. Although Mac, Unix, Linux, Windows, and other OS do
not have the same structure, most of the operating systems share similar OS system components like
File, Process, Memory, I/O device management. Let's see each of these components in detail:
1. File Management: File and directory creation and deletion; for manipulating files and directories;
mapping files onto secondary storage; backup files on stable storage media.
2. Process Management: a procedure for managing the many processes that are running simultaneously
on the operating system. Every software application program has one or more processes associated with
them when they are running. It also uses memory allocated to them and shutting them down when
needed. The following are functions of process management: Process creation and deletion; Suspension
and resumption; Synchronization process and Communication process.
3. I/O Device Management: One of the important uses of an operating system that helps you to hide the
variations of specific hardware devices from the user. It offers buffer caching system, It provides general
device driver code, It provides drivers for particular hardware devices and I/O helps you to knows the
individualities of a specific device.
4. Network Management: is the process of administering and managing computer networks. It includes
performance management, fault analysis, provisioning of networks, and maintaining the quality of
service. The computers in the network are connected through a communication network, which can be
configured in a number of different ways. With the help of network management, the network can be
fully or partially connected, which helps users to design routing and connection strategies that
overcome connection and security issues. Functions of Network management: Distributed systems help
you to various computing resources in size and function. They may involve microprocessors,
minicomputers, and many general-purpose computer systems. A distributed system also offers the user
access to the various resources the network shares. It helps to access shared resources that help
computation to speed-up or offers data availability and reliability.
5. Main Memory management: Main Memory is a large array of storage or bytes, which has an address.
The memory management process is conducted by using a sequence of reads or writes of specific
memory addresses. In order to execute a program, it should be mapped to absolute addresses and
loaded inside the Memory. The selection of a memory management method depends on several factors.
Main Memory offers fast storage that can be accessed directly by the CPU. It is costly and hence has a
lower storage capacity. However, for a program to be executed, it must be in the main Memory. An
Operating System performs the following functions for Memory Management: It helps you to keep
track of primary memory; Determine what part of it are in use by whom, what part is not in use; In a
multiprogramming system, the OS takes a decision about which process will get Memory and how much;
Allocates the memory when a process requests; It also de-allocates the Memory when a process no
longer requires or has been terminated.
6. Secondary-Storage Management: The most important task of a computer system is to execute
programs. These programs, along with the data, helps you to access, which is in the main memory
during execution. This Memory of the computer is very small to store all data and programs
permanently. The computer system offers secondary storage to back up the main Memory. Today
modern computers use hard drives/SSD as the primary storage of both programs and data. However,
the secondary storage management also works with storage devices, like a USB flash drive, and CD/DVD
drives. Programs like assemblers, compilers, stored on the disk until it is loaded into memory, and then
use the disk as a source and destination for processing. Functions of Secondary storage management in
OS: Storage allocation, Free space management and Disk scheduling.
7. Security Management: The various processes in an operating system need to be secured from each
other's activities. For that purpose, various mechanisms can be used to ensure that those processes
which want to operate files, memory CPU, and other hardware resources should have proper
authorization from the operating system.
10. Question
How might an organization manage the change to staff working practices when introducing a new
information system or upgrading an existing one with revised features to enhance the business?
11. Question
What is Information Technology? What are the phases that need to be followed for the deployment of
an Information System?
IT or information technology refers to the development, maintenance, and use of computer software,
systems, and networks. It includes their use for the processing and distribution of data. Data means
information, facts, statistics, etc., gathered together for reference, storage, or analysis. The word
technology on its own refers to the application of scientific knowhow for practical purposes.
12. Question
What risk factors must be taken into consideration in order to ensure the correct implementation of an
information system?
During the system development process, risk management aims to participate the future risks of an
information systems project and put in place measures to counter or eliminate these risks. These
common IT risks are grouped into seven broad categories and the impact of these risk factors will differ,
depending on the nature of the system being developed:
1 Commercial and legal relationships: inadequate third-party performance where the contractor is
unable to provide a solution that meets time, cost quality and performance objectives.
2 Economic circumstances: changing market conditions (e.g. changing consumer market conditions) or
harmful competitive action (e.g. competitor builds software solution more quickly)
3 Human behaviour: personnel shortfalls, where work cannot be done due to insufficient staff, poor
quality, lack of ability, training and motivation could be significant factors that extend to hw, os and db
management.
4 Political circumstances: internal politics among management between and within departments could
lead to users not supporting the projects, resulting in difficult to manage.
5 Technology and technical issues: inadequate user documentation, application software perceived as
not being fit for the purpose, poor production system performance, technical limitation of the software
purpose, inappropriate user interface, etc.
6. Management activities and control: unreasonable project schedule and budget, continuous changes
to the requirements, failure to review daily progress poor leadership, lack of formal change
management, etc.
7 Individual activities: overspecification and unrealistic expectations
13. Question
What are the organization, management and technology dimensions of an Information System?
3) Technology dimension of an information system includes; hardware and software. Management uses
technology dimension to store its data in a safe custody. Through this dimension, management
communicates throughout the world via internet and networking. They must be aware of this stuff with
a knowledge of business because this is an era of technology and even if you are not in this line, but you
must possess know-how of information technology.
14. Question
What is the principal difference between a management information system and a decision support
system?
MIS, Management Information System, is a computer-based program to assist users to make decisions
based on information present in the system.
DSS, Decision Support System, is also to help making decisions. It uses communication technologies,
data, documents to identify problems and to finalize decisions.
Following are the important differences between MIS and DSS.
15. Question
Why would anyone build a new information system when they could purchase an off the self-package
which could much the organization requirements? What are the factors that determine whether the
new system is to be implemented in-house or purchased?
There are a number of factors that will influence the choice of acquisition method. Three critical ones
are time, cost and quality considerations. If the organization has a pressing problem and it needs it
quickly, then probably the package or the tailored package will be sought - similarly when the company
needs quality systems. Benefit of the packaged software is that it has fewer bugs, as the debugging is
shared among other companies, thus the cost is also lower, although it also has a weakness as it has to
suit the organization`s requirements – as a consequence: it may not meet requirements. Other factors
that affect acquisition are: organization size: smaller companies have limited resources for IT/IS,
therefore the off-the-shelf packages are favoured; inhouse IT/IS expertise: with little IS/IT expertise
there will be a need to use third parties for new IT/IS acquisition – also depending on other factors;
complexity of the required IS: in many cases complexity tends to acquire a bespoke solution, though it is
not necessarily an indicator that off-the-shelf package should be ruled out; uniqueness of the business:
the higher the degree of uniqueness, the less likely it will be an off-the-shelf package selected. Clearly an
indicator that a bespoke development should be acquired; IS/IT expertise among users: if little end-user
IT/IS expertise but there is IS/IT department, it will be be dependent on solutions provided by IS/IT
professionals; linkages with existing application software: where it needs to integrate with existing IS, it
is very likely that a bespoke IS will be implemented.
By looking at combinations from above it is possible to come up with a “best fit” acquisition method.
16. Question
Networks have a lot of advantages but they have also some weaknesses. One of them is security. Discuss
the security problems created by networks and consider whether they could ever be so secure that the
management of an organization should take no precautions to protect them by intruders.
Many companies suffer from numerous network security problems without ever actually realizing it.
What’s worse, when these problems go unresolved, they can create openings for attackers to breach a
company’s security infrastructure to steal data and generally wreak havoc. There are many businesses
that don’t have a complete inventory of all of the IT assets that they have tied into their network. This is
a massive problem. If you don’t know what all of the assets are on your network, how can you be sure
your network is secure? The easiest fix for this is to conduct a review of all the devices on your network
and identify all of the various platforms they run. By doing this, you can know what all of the different
access points are on your network and which ones are most in need of security updates. Whether it’s
because of honest mistakes, intentional leaks and misuse of account privileges, or identity theft arising
from a phishing campaign or other social engineering attack that compromises their user account data,
the people inside your business represent one of the biggest security problems you’ll ever face. Many
businesses are concerned with “zero day” exploits. These exploits are those unknown issues with
security in programs and systems that have yet to be used against anyone. The more often the exploit is
used, the more likely it is to get discovered and patched. Also, it takes a lot of effort to independently
discover a completely unknown vulnerability in a system. The easiest fix for this problem is to maintain a
strict schedule for keeping up with security patches. Also, gradually changing the programs and
operating systems on your network to make them the same can simplify this process. Eventually,
despite all of your best efforts, there will be a day where an attacker succeeds in breaching your
network security. However, just how much damage this attacker will be capable of depends on how the
network is structured. If the network is structured with strong segmentation to keep all of its discrete
parts separate, then it’s possible to slow down the attacker enough to keep them out of vital systems
while your security team works to identify, contain, and eliminate the breach. Another common issue
for many companies is that even when they have all of the best cybersecurity solutions in place, they
might not have enough people in place to properly manage those solutions. To build up IT security staff
quickly, many businesses use the services of a dedicated partner. This allows these businesses to access
a full team of experienced cybersecurity professionals for a fraction of the cost of hiring them full-time
internally.
17. Question
A computer network is a set of connected computers. Computers on a network are called nodes. The
connection between computers can be done via cabling, most commonly the Ethernet cable, or
wirelessly through radio waves. Connected computers can share resources, like access to the Internet,
printers, file servers, and others. A network is a multipurpose connection, which allows a single
computer to do more.
Local area networks (LANs) allow computers and devices that are near each other — and usually making
use of the same switch or router — to connect to share files and complete tasks. Consisting only of
everyday devices (e.g., desktops, laptops, tablets, printers), router and/or switch, and Ethernet cables or
wireless cards, LANs are relatively inexpensive to set up and are commonly used in homes.
Ethernet cables, like the Cat5, Cat5e, and Cat6 and Cat6a, can be used to physically connect computers
to the network. In the instances where fiber-to-the-home (or similar) is available, copper cabling may
also be used at some point. Wi-Fi has become one of the most popular methods for wireless networking
over a local network.
A wide area network (WAN) is used to connect computers that are not close to one another. It is
possible — and almost always the case — that LANs are connected to WANs. This enables small home or
office networks to connect to wider networks, such as those across state or country lines. Most WANs
connect through public networks, like the telephone system, or via leased lines. The Internet, which
connects computers all around the world, can be considered the largest WAN in existence.
18. Question
What are the stages of the Software Development Cycle? Explain the main activities and objectives of
each stage.
First, Requirement gathering and analysis is done. Once the requirement is fixed
then only the System Design can start. Herein, the SRS document created is the
output for the Requirement phase and it acts as an input for the System Design.
System Design: In this phase, the requirement gathered in the SRS document is
used as an input and software architecture that is used for implementing system
development is derived.
Implementation/Coding starts once the developer gets the Design document. The
Software design is translated into source code. All the components of the software
are implemented in this phase.
In the testing phase, the developed code is tested thoroughly to detect the defects
in the software. Defects are logged into the defect tracking tool and are retested
once fixed. Bug logging, Retest, Regression testing goes on until the time the
software is in go-live state.
In the Deployment phase, the developed code is moved into production after the sign off is given by the
customer.
Any issues in the production environment are resolved by the developers which come under
maintenance.
19. Question
Explain the difference between E-Business and E-Commerce providing one example of each.
20. Question
Provide a definition for ERP systems and describe their key functions and characteristics.
ERP or enterprise resource systems are enterprise systems that support processes within an
organization, such as procurement (request order, get quote, approve order, receive product or service,
make payment), product development, manufacturing and sales. It can be extended with additional ESs
such as SCM (supply chain management) that covers processes such as warehousing, transportation and
supply network – inbound logistics/upstream (suppliers – procurement – operations) and outbound
logistics/downstream (operations – physical distribution management – customers) processes. CRM
(customer relationship management) covers marketing, sales and service; SRM (supplier relationship
management) covers sourcing, contract management, supplier collaboration and procurement.
Key features of ERP systems:
Enterprise-wide integration. Business processes are integrated end to end across departments and
business units. For example, a new order automatically initiates a credit check, queries product
availability, and updates the distribution schedule. Once the order is shipped, the invoice is sent.
Real time (or near real time) operations. Since the processes in the example above occur within a few
seconds of order receipt, problems are identified quickly, giving the seller more time to correct the
situation.
A common database. A common database was one of the initial advantages of the ERP. It allowed data
to be defined once for the enterprise with every department using the same definition. Individual
departments now had to conform to the approved data standards and editing rules. While some ERPs
continue to rely on a single database, others have split the physical database to improve performance.
Consistent look and feel. Early ERP vendors realized that software with a consistent user interface
reduces training costs and appears more professional. When other software is acquired by an ERP
vendor, common look and feel is sometimes abandoned in favour of speed to market. As new releases
enter the market, most ERP vendors restore the consistent user interface.
Key characteristics of an ERP System:
Integration: ERP vendors promise complete integration of the entire organisation’s information. This
integration, however, requires some effort. In order to achieve integration, the system needs to be set
up to match the organisation’s products, customers, accounts and business processes.
Packages: ERP software is usually a commercial package and not a solution developed in-house from
scratch. Because modifying the package may result in losing key benefits from using the ERP,
organisations try to fit the package, with the help of configuration tools and options, rather than the
other way around.
Best practices: Through the study of businesses and academic theory, ERP vendors claim to have
embedded best business practices in their solutions. This is also a solid argument against modifying their
packages.
Evolving: ERP is not a constant solution; it changes over time in terms of services and architecture like
any other information technology.
21. Question
Outline the advantages and disadvantages of ERP systems. Explain why they are successful in your
opinion through the use of examples.
Advantages of ERP: 1. Focused IT Costs: Although ERP is often a large investment, it can unify your IT
costs and improve efficiency. Instead of spending resources on multiple systems that all need dedicated
staff, infrastructure, support teams and licenses, you can focus all these costs into one ERP. 2. Total
Visibility: This benefit of ERP is one of the biggest selling points for the software. ERP allows total access
to every important process in your business by making data from every department easily accessible to
you and your senior management. 3. Improved Reporting and Planning: Implementing an ERP suite
across departments means your organization has a single, unified reporting system for every process. By
having a single source of truth, an ERP system can readily generate useful reports and analytics at any
time. 4. Complete Customization: Most ERP vendors offer several applications that can be implemented
together according to business needs. 5. Improved Efficiency: Along with reduced IT and training costs,
an ERP can reduce the time and effort required by your workforce to carry out their daily activities. 6.
Customer Service: Through the end-to-end tracking and insight offered by an ERP, you can provide
better customer interaction from targeted marketing all the way through late-phase customer service. 7.
Data Security and Quality: Sharing data across functional silos such as customer service, sales, marketing
and business development enhances collaboration throughout a company. The other side to widespread
data access is controlling who can see and edit the information. ERP solutions have intrinsic controls to
ensure the security of your data. 8. Improved Collaboration and Workflows: An ERP platform streamlines
the process of collaborating with others by providing employees with access to the data they need when
they need it. 9. Standardized Business Processes It also allows businesses to standardize their own
processes and systems, which further enhances productivity and efficiency. 10. Facilitated Regulatory
Compliance: ERPs aid in regulatory compliance by virtue of secure and validated data, combined with
built-in reports (SOX and FISMA). 11. Improved Supply Chain Management: For companies that deal
with the moving of physical inventory and production, an ERP system bolsters supply chain management
in a variety of ways. This improvement results in shortened lead times, more on-time deliveries and
many other benefits that enhance the overall operation and success of your business. 12. Superior
Scalability: Whether you’re expanding your customer base; entering new markets; rolling out new
processes, departments or products; or are otherwise growing your business, adding new functionality
to an ERP platform is easy with the right software vendor.
Disadvantages of ERP: 1. The cost of the ERP Software: If you choose to invest in a traditional ERP, you
could easily end up spending five figures for a single license. 2. The cost of implementation and
maintenance: While the software alone is a major investment, the implementation process can cost
nearly four times as much. 3. The customization process: Customization is one of the best aspects of
ERP, but it can easily and quickly get out of hand. Customizing your ERP software takes a lot of time,
effort, expertise and money. But too often, businesses completely underestimate how many resources
are needed and either don’t finish their customization or end up going way over budget. 4. The
complexity: ERP software solutions provide numerous capabilities, but that also means the software can
be complex and difficult to use. It’s not unheard of for companies to get swept up in all the potential of
an ERP but fail to plan properly for its implementation.
22. Question
Describe two Social Media software and explain how these technologies can be used to increase the
revenue streams as well as improve the social profile of a company.
There are many ways in which social media can help you connect, engage, and grow your business.
Facebook and Instagram both use ads, that can:
Benefits of social media for brand building:
Increase brand awareness: With nearly half of the world’s population using social media platforms,
they’re a natural place to reach new and highly targeted potential customers. Humanize your brand:
Introduce your followers to the people who make up your company and showcase how existing
customers are using and benefiting from your products. Establish your brand as a thought leader: No
matter what industry your business is in, social media offers the opportunity to establish your brand as a
thought leader—the go-to source for information on topics related to your niche. The 2018 Edelman
Trust Barometer also found that 63 percent of people trust technical experts, compared to only 42
percent of people who trust businesses. Stay top of mind: Social media gives you to the opportunity to
connect with fans and followers every time they log in. Keep your social posts entertaining and
informative, and your followers will be glad to see your new content in their feeds, keeping you top of
mind so you’re their first stop when they’re ready to make a purchase.
Benefits of social media for growth:
Increase website traffic: Social media posts and ads are key ways to drive traffic to your website.
Sharing great content from your blog or website to your social channels is a great way to get readers as
soon as you publish a new post. Generate leads: Social media offers an easy and low-commitment way
for potential customers to express interest in your business and your products. Lead generation is such
an important benefit of social media for business that many social networks offer advertising formats
specifically designed to collect leads. Boost sales: As the number of people using social media continues
to grow and social sales tools evolve, social networks will become increasingly important for product
search and ecommerce. The time is right to align your social marketing and sales goals. For individual
sales professionals, social selling is already a critical tool. Partner with influencers: Word of mouth
drives 20 to 50 percent of purchasing decisions. When you get people talking about your product or
company on social media, you build brand awareness and credibility, and set yourself up for more sales.
Benefits of social media for communication:
Reputation management: Your customers are already talking about you on social media, whether or not
you’re there to respond. If you and your team are on the ball, you can pick up on important social posts
about your brand to highlight the positive and address the negative before it turns into a major issue.
Crisis communication: Silence is not an option when it comes to responding to crises on social media.
Maintaining well-run and managed social accounts and having a plan in place can help make sure you’re
present and ready to engage if the worst occurs. Customer and audience engagement: Social networks
give you the opportunity to interact directly with customers and fans, and likewise give them the chance
to interact directly with your brand. Customer service and customer support: People expect brands to
be available on social media and seek out their social accounts for customer service. Research published
in the Harvard Business Review shows that brands who don’t meeting those expectations damage their
bottom line.
23. Question
List and describe the various types of computers and outline their corresponding usage.
A traditional view of computer technology suggests three basic categories: mainframe, mini- and
microcomputers.
Mainframe computers are large, extremely powerful machines designed for large-scale data processing,
mostly used in the industry, they are considered as legacy systems now. Due to technological
advancement, a modern, pc could be more powerful.
Minicomputers and servers have the combined characteristics of microcomputers and mainframes,
nowadays simply referring to them as servers. Servers are powerful computers used to control the
management of a network. It may have a specific function such as storing user files or a database or
managing printers. Network servers run the network operating system (NOS), together they maintain
security, share peripheral devices, share applications or share information.
Microcomputers, or sometimes referred to as clients, are considered less powerful, but more flexible
and relatively inexpensive to purchase. Physical size is far smaller, they have the best price-to-
performance ratio, more accessible, technical and non-technical users are able to develop apps quickly
and easily, training is also at low cost. Types of microcomputers are: desktop computers (intended for
office use, day-to-day activities of an organization`s employees), portable computer (commonly known
as laptops, integrated power supply, keyboard and mouse, integrated display to facilitate carrying),
notebook (A4 sheet size portable computer), netbook (smallest, 10-inch screen, 1.4 kg portable
computer), ultrabook (thin and light portable computer with long battery life – successor of netbooks),
Chromebook (thin and light, long battery life, limited storage size, mainly relies on Internet services),
tablet computer (portable computer integrated into a flat screen).
25. Question
Input devices: are used to enter data or instructions (mouse, keyboard, scanner, microphone, joystick,
barcode reader, web camera, etc.
Processing: mentioned in the above answer
Output devices: display, speakers, printer
26. Question
Describe the functions performed in each of the three phases of the data processing cycle and identify
the ways in which electronic data processing differs from non-automated data processing. Give the
advantages of the Electronic Data Processing.
Data processing is simply the conversion of raw data to meaningful information through a process. Data
is technically manipulated to produce results that lead to a resolution of a problem or improvement of
an existing situation. Similar to a production process, it follows a cycle where inputs (raw data) are fed to
a process (computer systems, software, etc.) to produce output (information and insights).
1) Collection is the first stage of the cycle, and is very crucial, since the quality of data collected will
impact heavily on the output. The collection process needs to ensure that the data gathered are both
defined and accurate, so that subsequent decisions based on the findings are valid. This stage provides
both the baseline from which to measure, and a target on what to improve.
2) Preparation is the manipulation of data into a form suitable for further analysis and processing. Raw
data cannot be processed and must be checked for accuracy. Preparation is about constructing a data
set from one or more data sources to be used for further exploration and processing. Analysing data
that has not been carefully screened for problems can produce highly misleading results that are heavily
dependent on the quality of data prepared.
3) Input is the task where verified data is coded or converted into machine readable form so that it can
be processed through an application. Data entry is done through the use of a keyboard, scanner, or data
entry from an existing source.
4) Processing is when the data is subjected to various means and methods of powerful technical
manipulations using Machine Learning and Artificial Intelligence algorithms to generate an output or
interpretation about the data.
5) Output and interpretation is the stage where processed information is now transmitted and displayed
to the user. Output is presented to users in various report formats like graphical reports, audio, video, or
document viewers. Output need to be interpreted so that it can provide meaningful information that
will guide future decisions of the company.
6) Storage is the last stage in the data processing cycle, where data, and metadata (information about
data) are held for future use. The importance of this cycle is that it allows quick access and retrieval of
the processed information, allowing it to be passed on to the next stage directly, when needed.
27. Question
(a) Compare three different types of printer that are suitable for use with a microcomputer. Discuss
their relative speeds, print qualities and costs.
Laser printers: Are capable of producing documents at a quality appropriate for business
correspondence – 600 dpi+. A typical laser printer will be able to print at a rate of up to 45 pages per
minute or more. This compares well against other printing methods, for example a typical inkjet printer
may only be capable of printing 20 pages per minute. Laser printers are considered relatively expensive
to purchase, operate and maintain in comparison with other types of printers. The cost of printing is
considered high, as documents are usually printed in a high quality.
Inkjet printers: Printing at the highest possible quality requires the use of special paper. This increase
cost. Although considerably faster than older technologies, inkjet printers are still unable to compete
with laser printers in terms of speed. Colour printing can be particularly slow, with some models taking
6-8 minutes to produce a single page. Inkjet printers can be purchased at a very low cost and are
relatively inexpensive to operate.
MFD (MFP): Although it is big in size and expensive to purchase, it has a cost saving feature, it saves a lot
of space, it can scan, copy and print up to 50 pages at once.
Quality appropriate High quality only with special Quality appropriate for
for business purposes paper - requires cost business purposes
Print quality
max. 20 pages/min
45 pages/min + 45 pages/min +
Speed sometimes 6-8 min
Volume 5k to 30k pages couple hundred 5k to 30k pages
Noise Loud Completely silent Loud
Cost of printing high Low cost mid
Color printing 0.30 GBP / page relatively inexpensive Low cost
Cost Expensive Low cost Low cost
(b) State the purpose of a printer buffer and explain how it operates.
A printer buffer is a temporary storage area that holds the data or documents to be printed by the
printer. It is created and managed by the operating system or printing management software to enable
storing print jobs data when multiple print jobs are assigned to a computer printer. A printer buffer may
also be called a print buffer or print spool. A printer buffer is primarily allocated within the computer
memory (RAM) or the storage disk. When multiple print jobs are sent to the printer, each of them is
stored in a logical print queue within the printer buffer. The print spooler then retrieves documents
from the printer buffer on FIFO mode i.e. the print job that came first will be printed first. When the
printer is finished printing the current document, it will then print the first document in the queue.
When all documents in the print queue are printed, the printer buffer is purged by default.
28. Question
Outline and discuss four general purpose packages and the term integrated packages. Explain
advantages and disadvantages.
GPP's are commercially available, fully tested software or Application's Packages that have been created
to help users solve a range of problems. Spreadsheet packages are used for storing numbers and
performing calculations using formulae. Examples include bank account details, company expenditure,
league tables. e.g Excel. Word processing packages are used for producing text documents, such as
letters, memo's, essays, books etc. Presentation graphics packages (e.g. PowerPoint) are used to create
slide shows and presentations which can be viewed on- screen or with a data or overhead projector.
Integrated packages have three or four GPPs in one package. They usually have spreadsheet, graphics,
database, and word-processing packages available.
Advs and disadvs of GPPs: Increases productivity: Using General Purpose Packages is a very productive
way to carry out complex tasks, such as performing calculations or searching for information. Accurate
and up to date: Keeping documents and data accurate and up to date is made easier because entering
data and updating files is straightforward. Ease of editing: Changing or adapting documents is made
easy. You can change the content, style or layout of a documents at any time. Ease of sharing and
communicating information: Can produce a range of documents to share and communicate ideas and
information with others. Reduce costs: Although the expensive to buy they reduce costs in the long term
because of the increase in productivity.
Integrated packages: Advantages: Transferring data between packages is quite easy. It is usually a
simple cut and paste. All the GPPs have a common HCI (human-computer-interaction). Integrated
packages cost less than buying a series of individual GPPs. Disadvantages: Individual programs that
make up the different parts of the package are less powerful than separate General-Purpose Packages.
OR Have fewer features for example integrated packages may not include a grammar checker.
29. Question
Explain why system security is important for organizations and describe the different ways that can be
used to protect against malicious attacks. Name three types of viruses and explain how each type acts.
Five reasons why investing in information security is significant: 1: Rising cost of breaches = Cost of a
breach = actual financial loss + cost of incident handling; 2: Increasingly sophisticated attackers =
Sophisticated attacks, like DDoS, Fileless malware, etc., are on rise. DDoS attacks have increased by
110% in third quarter of 2018. Fileless attacks are 10 times likely to succeed than file-based attacks; 3:
Proliferation of IoT devices = IoT is an easy way for cybercriminals into the business. IoT devices are
expected to grow to 20.4 billion by 2020; 4: Funded hackers and wide availability of hacking tools =
Intellectual property threats account for 25% of more than $600 billion cost of cybercrime to the world
economy. The commercialization of cybercrime provides easy access to the resources that needed to
launch severe attacks; 5: Regulatory compliances = Not just breaches but the regulatory laws, like GDPR,
also enforce information security measures. The violation of these compliances may cost heavily to the
businesses;
Simple steps to be protected against malicious attacks: Keep an up-to-date anti-virus software running
at all times; Never open suspicious looking e-mails or attachments; Stop using peer to peer file sharing
sites and downloading “cute” programs; Set up a firewall; Backup your files every night;
Trojan horse: A type of malware that uses malicious code to install software that seems ok, but is
hidden to create back doors into a system typically causing loss or theft of data from an external source.
Spyware: Spyware is software that aids in gathering information about a person or organization without
their knowledge, they can monitor and log the activity performed on a target system, like log key
strokes, or gather credit card and other information.
Worm: Unlike a virus, a worm, is a standalone piece of malicious software that replicates itself in order
to spread to other computers. It often uses a computer network to spread itself, relying on security
flaws on the target system to allow access.
30. Question
Explain why computer software is important, and define the different types of computer software
available today. Explain the different types of software licenses. Which, in your opinion, are used by
private organizations the most, and why?
Software engineering is important because specific software is needed in almost every industry, in every
business, and for every function. An operating system is the most important software that runs on a
computer. It manages the computer’s memory and processes, as well as all of its software and
hardware. It also allows you to communicate with the computer without knowing how to speak the
computer’s language.
System Software: System software or operating system is the software used by the computer to
translate inputs from various sources into a language which a machine can understand. Basically, the OS
coordinates the different hardware components of a computer.
Application software: A normal user rarely gets to see the operating system or to work with it. But all of
us are familiar with application software which we must use to interact with a computer. Popular
examples of application software are the Microsoft office suite which includes Word, Excel and
PowerPoint
Programming languages: Now this is a kind of computer software which is used exclusively by computer
programmers. Unless we are also programmers, we are unlikely to come across programming languages.
A simple way to understand programming languages is to think of them as bricks which can be used to
create applications and operating system. C++ and Java are some popular programming languages.
31. Question
(a) Describe and briefly explain three security precautions that can be taken to guard against
unauthorized access to a computer system.
It is essential to use a personal password for all of your accounts to prevent unauthorized access. A user
has to be more careful about this if they use a shared system. Apart from this, make sure to change
passwords often. The use of multiple authentication factors to prove one's identity is based on the
premise that an unauthorized actor is unlikely to be able to supply the factors required for access. If, in
an authentication attempt, at least one of the components is missing or supplied incorrectly, the user's
identity is not established with sufficient certainty and access to the asset (e.g., a building, or data) being
protected by multi-factor authentication then remains blocked. The authentication factors of a multi-
factor authentication scheme may include: Something you have - some physical object in the possession
of the user, such as a USB stick with a secret token, a bank card, a key, etc ; Something you know -
certain knowledge only known to the user, such as a password, PIN, TAN, etc; Something you are - some
physical characteristic of the user (biometrics), such as a fingerprint, eye iris, voice, typing speed, pattern
in key press intervals, etc; Somewhere you are - some connection to a specific computing network or
utilizing a GPS signal to identify the location. Carefully Read your Email Messages and Know the
Senders: The majority of users tend to ignore or neglect email security despite knowing about it. It is
imperative to ignore email messages you receive from unknown sources. Further, do not open any
attachments included from a source that you do not trust. One of the oldest methods to send malware
and viruses is through email attachments.
(b) Describe three measures that can be taken to avoid the misuse of personal data held in a computer
file.
Monitor user action: One of the best ways to detect and prevent misuse of data is to see exactly what
happens after data is accessed. Logs usually don’t give you this information, or at least not to the full
extent. But a dedicated user monitoring solution allows you to easily see what exactly has happened
with data – when it was used, how, and by whom.
Manage data access: Data access is the entry point for potential misuse. Employees and subcontractors
may get access to confidential or sensitive data that they aren’t supposed to have access to. Sometimes
this happens because they use a shared account or a co-worker’s password in order to save time.
Sometimes it happens by accident, and sometimes it’s done for personal gain.
Educate your employees: Include information on data security in a general corporate policy. A well
thought out corporate policy is a reliable source of information about in-house procedures and
standards, including for cybersecurity. It’s the best way to let newcomers know what they can and can’t
do with corporate data. Set up educational courses on data security. You can ask security officers to
share their experience. A generic course on cybersecurity is always useful to remind employees not to
share their credentials, tell them about new methods of phishing, etc.
32. Question
Describe three areas where Information Systems can be used in daily life. Give examples and explain
their advantages.
Finance: Every time you use a debit or credit card the shop till uses a terminal connected to other
computers via a network. Your identification details are automatically transferred from your card to your
bank or credit card company for verification, and your balance adjusted accordingly. This also applies if
you are shopping online, or over the phone (when booking a cinema ticket, for example). ATMs (also
known as cashpoints) allow you to check your bank balance or withdraw cash from wherever you are in
the world. The machines are networked to a central computer, which has records of your account in a
filing system known as a database. Many banks also provide banking services via the internet,
minimising the need for customers to visit a branch. Financial services have undergone huge changes in
recent years as a result of the development of IT systems.
Entertainment: The world of entertainment is constantly evolving with the advent of new technologies.
Digital broadcasting has changed the way we experience television, with more interactive programming
and participation. Digital cameras, printers and scanners have enabled more people to experiment with
image production. Computer gaming has been an important influence in the development of graphical
interfaces. Technology has been at the forefront of changes in the production and distribution of music,
as well as in the ways in which people can access and listen to music.
The internet: As well as impacting on the commercial world, the internet has had an enormous impact
on all areas of life. While there are still people in many parts of the world who do not have access to an
internet connection, the majority of people in the developed world now have access either at home or
at work, and have the opportunity to use online information resources, or communicate with others
using email, instant messaging or discussion groups. New online communities have developed and
existing communities have created new ways of communicating.
33. Question
Security is a major phase in the design and implementation of an Information System. Explain the
following providing examples of applicability
34. Question
Explain what a mobile device is. Give two advantages and two drawbacks of using a mobile device. Give
three examples of incorporating mobile devices in the business environment.
Mobile technology is exactly what the name implies - technology that is portable. Examples of mobile IT
devices include: laptop, tablets and netbook computers, smartphones, global positioning system (GPS)
devices, wireless debit/credit card payment terminals.
Benefits of using mobile technology for business can manifest in: higher efficiency and productivity of
staff; the quality and flexibility of service you offer your customers; the ability to accept payments
wirelessly; increased ability to communicate in and out of the workplace; greater access to modern apps
and services; improved networking capabilities
Mobile devices can link you directly into the office network while working off-site. For example, you
could remotely: set up a new customer's account; access existing customer records; check prices and
stock availability; place an order online.
Main disadvantages that come with the use of mobile technology in business include: Costs - new
technologies and devices are often costly to purchase and require ongoing maintenance and upkeep.
Workplace distractions - as the range of technologies and devices increases, so does the potential for
them to disrupt productivity and workflow in the business. Additional training needs - staff may need
instructions and training on how to use new technology. Increased IT security needs - portable devices
are vulnerable to security risks, especially if they contain sensitive or critical business data.
35. Question
Explain the difference between system software and application software providing at least one
example for each one.
System software is general purpose software which is used to operate computer hardware. It provides
platform to run application softwares. Application software is specific purpose software which is used by
user for performing specific task.
1. System software is used for operating computer hardware; application software is used by user to
perform specific task. 2. System softwares are installed on the computer when operating system is
installed, application softwares are installed according to user’s requirements. 3. In general, the user
does not interact with system software because it works in the background, in general, the user
interacts with application softwares.4. System software can run independently. It provides platform for
running application softwares, application software can’t run independently. They can’t run without the
presence of system software. 5. Some examples of system softwares are compiler, assembler, debugger,
driver, etc. Some examples of application softwares are word processor, web browser, media player,
etc. 6. In general System software are developed in low level language which is more compatible with
the system hardware in order to interact with, while in case of Application software high level language
is used for their development as they are developed as some specific purpose software.
36. Question
Explain the difference between data and information, their role and differences between a traditional
database and a data warehouse.
Data is a raw and unorganized fact that required to be processed to make it meaningful. Data can be
simple at the same time unorganized unless it is organized. Generally, data comprises facts,
observations, perceptions numbers, characters, symbols, image, etc. Information is a set of data which is
processed in a meaningful way according to the given requirement. Information is processed,
structured, or presented in a given context to make it meaningful and useful. It is processed data which
includes data that possess context, relevance, and purpose. It also involves manipulation of raw data.
Information assigns meaning and improves the reliability of the data. It helps to ensure undesirability
and reduces uncertainty. So, when the data is transformed into information, it never has any useless
details.
37. Question
1. Computer Hardware: Physical equipment used for input, output and processing. What hardware to
use it depends upon the type and size of the organisation. It consists of input, an output device,
operating system, processor, and media devices. This also includes computer peripheral devices. 2.
computer Software: The programs/ application program used to control and coordinate the hardware
components. It is used for analysing and processing of the data. These programs include a set of
instruction used for processing information. Software is further classified into 3 types: System Software,
Application Software and Procedures. 3. Databases: Data are the raw facts and figures that are
unorganised that are and later processed to generate information. Softwares are used for organising
and serving data to the user, managing physical storage of media and virtual resources. As the hardware
can’t work without software the same as software needs data for processing. Data are managed using
Database management system. Database software is used for efficient access for required data, and to
manage knowledge bases. 4. Network: Networks resources refer to the telecommunication networks
like the intranet, extranet and the internet. These resources facilitate the flow of information in the
organisation. Networks consists of both the physicals devises such as networks cards, routers, hubs and
cables and software such as operating systems, web servers, data servers and application servers.
Telecommunications networks consist of computers, communications processors, and other devices
interconnected by communications media and controlled by software. Networks include communication
media, and Network Support. 5. Human Resources: It is associated with the manpower required to run
and manage the system. People are the end user of the information system, end-user use information
produced for their own purpose, the main purpose of the information system is to benefit the end user.
The end user can be accountants, engineers, salespersons, customers, clerks, or managers etc. People
are also responsible to develop and operate information systems. They include systems analysts,
computer operators, programmers, and other clerical IS personnel, and managerial techniques.
38. Question
Describe the three types of database structures, while briefly pointing out the advantages and
disadvantages for each one.
Hierarchical database model resembles a tree structure, similar to a folder architecture in your
computer system. The relationships between records are pre-defined in a one to one manner, between
'parent and child' nodes. They require the user to pass a hierarchy in order to access needed data. Due
to limitations, such databases may be confined to specific uses. The idea behind hierarchical database
models is useful for a certain type of data storage, but it is not extremely versatile. Its limitations mean
that it is confined to some very specific uses. For example, where each individual person in a company
may report to a given department, the department can be used as a parent record and the individual
employees will represent secondary records, each of which links back to that one parent record in a
hierarchical structure. Hierarchical models make the most sense where the primary focus of information
gathering is on a concrete hierarchy such as a list of business departments, assets or people that will all
be associated with specific higher-level primary data elements.
Network database models also have a hierarchical structure. However, instead of using a single-parent
tree hierarchy, this model supports many to many relationships, as child tables can have more than one
parent. The main advantage of a network database is that it allows for a more natural modelling of
relationships between records or entities, as opposed to the hierarchical model. However, the relational
database model has started to win over both the network and the hierarchical models because its added
flexibility and productivity has become more evident as hardware technology has become faster.
Finally, in object-oriented databases, the information is represented as objects, with different types of
relationships possible between two or more objects. Such databases use an object-oriented
programming language for development. A real-life parallel to objects is a car engine. It is composed of
several parts: the main cylinder block, the exhaust system, intake manifold and so on. Each of these is a
standalone component; but when machined and bolted into one object, they are now collectively
referred to as an engine. Similarly, when programming one can define several components, such as a
vertical line intersecting a perpendicular horizontal line while both lines have a graded measurement.
This object can then be collectively labelled a graph. When utilizing the ability to plot components, there
is no need to first define a graph; but rather the instance of the created graph can be called.
39. Question
Explain the terms LAN and WAN and provide examples how a company can benefit by deploying
networks in each category.
A LAN (local area network) is a group of computers and network devices connected together, usually
within the same building. By definition, the connections must be high speed and relatively inexpensive
(e.g., token ring or Ethernet). One of the major advantages with LANs are the speeds they can reach.
With a LAN, it isn’t uncommon to see technology ready for 1Gbps (1 gigabit per second). Another
advantage to having a LAN connection is the cost. It is relatively cheap to have as it tends to require less
hassle to set up and less advanced infrastructure to keep it running. This is mainly due to the
technological components of a LAN, which brings me to the next difference. A LAN connection tends to
require some relatively simple things to set it up. All you need is some Ethernet cables, a network
switch, and you are good to go. Alternatively, you can also see LANs being done over Wi-Fi, or you can
use Wi-Fi in conjunction with standard Ethernet connections to create a LAN available to all kinds of
devices, whether it be a smartphone or a desktop computer.
A WAN (wide area network) is not restricted to a geographical location, although it might be confined
within the bounds of a state or country. A WAN connects several LANs, and may be limited to an
enterprise (a corporation or an organization) or accessible to the public. The technology is high speed
and relatively expensive. A WAN connection should truly only occur in large environments. WAN
connections are available from house to house, city to city, and country to country. In fact, just by
reading this you know you have access to a very popular WAN, the Internet, so the advantages of WAN
are that it allows for much larger and more intricate network and it can cover near infinite geographical
distance.
40. Question
Data centres are physical or virtual infrastructure used by enterprises to house computer, server and
networking systems and components for the company's information technology (IT) needs, which
typically involve storing, processing and serving large amounts of mission-critical data to clients in a
client/server architecture. A data centre, or datacentre, often requires extensive redundant or backup
power supply systems, cooling systems, redundant networking connections and policy-based security
systems for running the enterprise's core applications.
b) What are some of the services that an information centre might provide for an organization?
Core or Traditional Data Centre Services: The data centre has traditionally served as a three-legged
stool of compute space, power and telecommunications. These basic services support everything else
that is happening in your data centre. Managed hosting services let you move away from a CAPEX
model, where you own your data centre and all of your equipment. Instead, your data centre solutions
provider hosts your servers, operating system (OS), network, storage and/or databases. Managed
Services: IT organizations are under pressure to deliver secure applications faster than ever, do more
with less, and stay ahead of the changing security landscape. They need to have a wide variety of skills
to evolve their IT architecture and application portfolio. As a result, more and more companies are
embracing managed services to help with the large burden placed on IT. In fact, CompTIA research has
shown that 46 percent of firms have cut IT expenses by 25 percent or more as a result of implementing
managed services. Managed Security Services: many IT organizations don’t have the internal resources
to keep their systems secure and compliant. It’s often easier to partner with someone who can give you
“pre-built” security and compliance. Look for a data centre solutions provider who has the physical
security and cyber security you need to protect your data. Also be sure that your provider can meet your
compliance requirements. Asset Lifecycle Management Services; Architecture Design Services: If you
want to save money by moving to a high-density data centre, your architecture design is critical. The
initial investment you make in architecture design can have a huge impact on your long-term
operational spend. Migration Services: Many IT organizations spend a lot of time planning their data
centre facility but neglect planning for their migration or transformation. For a successful migration, you
must address these two tasks jointly. Proper migration planning reduces your risk of downtime when
you transition your new IT environment.
41. Question
b. Explain the difference between the terms hardware and software, while providing three examples of
each one.
Computer hardware is any physical tangible device used in or with your machine, whereas software is a
collection of code installed onto your computer's hard drive. For example, the computer monitor you
are using to read this text and the mouse you are using to navigate this document and the printer where
you print it out are computer hardware. The Internet browser that allowed you to visit this page, the
operating system that the browser is running on and the driver package that lets the printer operate
are considered software.
42. Question
Explain how the World Wide Web changed the business world, especially the interaction between
businesses and customers. Provide three real-life examples.
Before the introductions of the internet, consumers would have to walk into a store to get the product
or service they want. Today, however, for example, you only need to go to an E-commerce store, scroll
through the selection of goods, get reviews from previous customers, and purchase what you like.
Before the internet era, you had to wait for a major business document to be delivered via the post
office, and meetings always meant going for a face-to-face date with a prospect. Today, for example, it
only takes less than a second to send and receive an email and meetings can be done via Skype
regardless of the physical location of your prospect. Two decades ago, you could afford to do business
with an ‘okay’ customer service. If you try the same thing today, chances are you’ll incur a hateful rant
on Twitter, or you’ll suffer bad reviews on sites like Yelp. When you consider that a customer who has
had a bad experience will tell 16 other consumers, you start to understand why businesses are keen on
hiring social media managers. When the way we buy changes, advertising techniques also change
accordingly. Keeping in mind that even when customers are in a store, they still go online to compare
the different products available, businesses have adopted online marketing strategies to ensure that
they provide all the information needed by consumers. For example, working from home: Why go to
work 5 days a week when you only need a PC or laptop? This process, referred to as telecommuting,
allows a business to decrease its overhead costs since employees only need office equipment to work
from home. This not only saves on space but also means fewer office utilities are used.
43. Question
Enterprise Resource Planning (ERP) software applications are nowadays considered as of vital
importance for any organization’s success. Describe what an ERP system does, and explain how such a
system can help an organization to become more profitable.
Enterprise resource planning (ERP) refers to a type of software that organizations use to manage day-to-
day business activities such as accounting, procurement, project management, risk management and
compliance, and supply chain operations. A complete ERP suite also includes enterprise performance
management, software that helps plan, budget, predict, and report on an organization’s financial
results. ERP systems tie together a multitude of business processes and enable the flow of data between
them. By collecting an organization’s shared transactional data from multiple sources, ERP systems
eliminate data duplication and provide data integrity with a single source of truth. Today, ERP systems
are critical for managing thousands of businesses of all sizes and in all industries. To these companies,
ERP is as indispensable as the electricity that keeps the lights on.
RP systems are designed around a single, defined data structure (schema) that typically has a common
database. This helps ensure that the information used across the enterprise is normalized and based on
common definitions and user experiences. These core constructs are then interconnected with business
processes driven by workflows across business departments (e.g. finance, human resources,
engineering, marketing, operations), connecting systems and the people who use them. Simply put, ERP
is the vehicle for integrating people, processes, and technologies across a modern enterprise.
It’s impossible to ignore the impact of ERP in today’s business world. As enterprise data and processes
are corralled into ERP systems, businesses can align separate departments and improve workflows,
resulting in significant bottom-line savings. Examples of specific business benefits include: Improved
business insight from real-time information generated by reports; Lower operational costs through
streamlined business processes and best practices; Enhanced collaboration from users sharing data in
contracts, requisitions, and purchase orders; Improved efficiency through a common user experience
across many business functions and well-defined business processes; Consistent infrastructure from the
back office to the front office, with all business activities having the same look and feel; Higher user-
adoption rates from a common user experience and design; Reduced risk through improved data
integrity and financial controls; and Lower management and operational costs through uniform and
integrated systems
44. Question
a) Explain the term E-Business and provide one example of a successful e-business.
E-business can take place on two main platforms: online storefronts and online marketplaces. Online
marketplaces are websites that facilitate the buying and selling of goods and services between
merchants and customers. Examples of online marketplaces include Amazon, eBay, Etsy, Fiverr and
Upwork.
b) Describe three important considerations that need to be addressed before deploying an e-business.
1. An appropriate domain name: It is by a domain name that we are identified on the Net. So, choose
one that is short, easy to spell, and represents the business accurately. 2. Good marketing strategies:
Find the best strategies to bring visitors on the website and ones that guarantee good customer
responses. 3. Complete database: It is used to find out what your customers are doing on the site and
what more they would like to see. 4. Complete information: An online business should offer FAQs and
other important information regarding the products, services, queries, shipping, etc.
45. Question
Explain the term information privacy and describe five policies that must be included in the privacy
policy of a company regarding retrieval, retention and protection of user data.
Information privacy is the privacy of personal information and usually relates to personal data stored on
computer systems. The need to maintain information privacy is applicable to collected personal
information, such as medical records, financial data, criminal records, political records, business related
information or website data. Information privacy is also known as data privacy.
Protecting information: Employees and partners shall secure all documents, work in process, training or
other items incorporating any confidential or proprietary information in locked file drawers or areas to
which access is restricted in order to prevent its unauthorised disclosure. The same regulations apply if
work is conducted off site or from home. Employees and partners shall secure all information taken off
site and prevent its unauthorised disclosure. Using such information in public locations such as
restaurants, train stations, etc. is strictly prohibited. Any document, work in process, training or other
items incorporating any confidential or proprietary information taken home has to be returned to
company premises immediately after usage.
Declaration of privacy at the bottom of e-mails: All e-mails sent by employees include an automatic
footnote/disclaimer which states that any information included in the e-mail contains privileged and
confidential information and that if the recipient received an e-mail in error, the company should be
notified and the e-mail deleted. (Even if the e-mail does not contain such information, the note should
be included as a contingency.)
Collection of data: Personal data may be collected through online forms, phone calls, emails, social
networks and promotional activities. Furthermore, we monitor activities and register user activities with
the use of cookies, social media plugins, and tracking tools on our website and social networks such as
Facebook, Twitter, LinkedIn, and Google+.
System Data Security Policies – The security configuration of all essential servers and operating systems
is a critical piece of the data security policy. Rules regarding servers that run on the company's networks
as well as the management of accounts and passwords must be clearly defined. Firewall, database and
antivirus policies also fall under this heading.
Monitoring Compliance– The use of audits is a good way to ensure that the company’s staff and
management are complying with the various elements of a data security policy. These audits should be
performed on a regular schedule.
46. Question
b) Explain what m-commerce is and describe a scenario where a company can be benefited by offering
m-commerce services to its customers.
Mobile commerce, also known as m-commerce, is the use of wireless handheld devices like cell phones
and tablets to conduct commercial transactions online, including the purchase and sale of products,
online banking, and paying bills. Benefits: Provides Easy Store Access: m-Commerce makes easy to
discover the products available in the market by utilizing wireless devices. With mobile commerce,
customers need not travel to the store to purchase their needs, rather, they can buy their products
online. Better User Experience: Today, people are well familiar with how smartphones and tablets work.
And the customers already know how to navigate to desired products in several clicks. Creates a New
Marketing Channel: It serves multiple functionalities such as it can give general information, search
features, news feeds, product prices, and so on. Although, one of the biggest advantages of having a
mobile app for your business is that all the information you like to provide your clients is available at
their fingertips. This involves special sales and promotions. Location Tracking & Personalized
Notifications: Location tracking can benefit from providing assistance to consumers in navigating
directions or helping them discover the expected transportation service, etc. Cost Reduction and
Productivity: Through reaching your customer faster with a mobile app you certainly reduce marketing
campaign expenses. Attracts New Consumers: In eCommerce, there is always the potential to bring in
new consumers.
47. Question 1
Identify five main hardware components (non-peripherals) of a traditional Desktop computer. Provide
adequate information for each component in order show your understanding of how a traditional
computer operates.
System Board—MLB: The MLB, system board, or motherboard is the physical foundation of a computer.
Baseboard, planar board, or main boards are other terms used to identify the MLB. It is the central PC
building block because all other components must either plug into it or be physically mounted on it.
Without a system board, no electrical interconnectivity is available to allow the PC's hardware
components and subsystems to communicate.
CPU: The CPU is the core component of what defines a computing device, but it isn’t the sole
component — again, it’s just the brains. It’s a chip that sits in a special seat (socket) located on the main
circuit board (motherboard or mainboard) inside the device. At its core, a CPU takes instructions from a
program or application and performs a calculation. This process breaks down into three key stages:
Fetch, decode, and execute. A CPU fetches the instruction from RAM, decodes what the instruction
actually is, and then executes the instruction using relevant parts of the CPU.
RAM: is the working area of the PC. All data must flow into and out of RAM. It holds both programs and
data. When a program is running (executing) and working on data, the program and most often the data
reside in RAM. In a Windows environment, RAM is virtualized.
LAN Adapters: Almost all business PCs are LAN connected. Many home PCs are networked as well using
Ethernet, home wiring, or wireless LAN technologies. A LAN provides an easy mechanism for sharing disk
drives and exchanging data between PCs. After people work with a LAN, they rarely want to go back to
operating without the LAN. LAN connections bring high-speed Internet connectivity to the home.
Hard drive: The hard drive is where programs and files are stored. More traditional drives are called
Hard Disk Drives (HDD) and are comprised of a series of magnetized disks which store the data. These
disks spin under a magnetic arm which can read and write data. Newer hard drives are called Solid-state
Drives (SSD) and use electrical circuits to store data. These are much faster than traditional HDDs and
are starting to be found in more and more computers.
48. Question 4
Discuss three Information Technology considerations a company must address when planning to expand
globally.
1. Embrace the Cloud: The use of on-premise software and hardware is becoming extinct with the
availability of cloud-based solutions such as Microsoft Office 365. Cloud-based solutions offer greater
scalability, security, efficiency and flexibility regarding access than their on-premise counterparts. Cloud-
based services help save hard drive space and give peace of mind with automatic backups, plus they also
make collaboration easier.
2. Collaboration: It is vital employees and business partners work together to collaborate resources. This
will allow for your business to improve and innovate going forward. Make full use of the resources you
have available.
3. Cyber Security: Most businesses are not equipped to handle data breaches, often because small
business owners underestimate how vulnerable they really are to cybersecurity threats. Meeting that
challenge requires the use of holistic, end-to-end, rules-based solutions. No matter how well prepared
you think your business is, cyber security attacks can still happen. Cybercrimes are becoming ever more
common and increasingly sophisticated. Educate your workforce and stay informed and protected.
4. Refresh Your Hardware: keeping your hardware cutting edge will increase productivity and help you
stay within budget. Upgrade the most important hardware first and gradually replace the rest on a
schedule that works for your business. Every business should develop a strategic approach to using
technology and its power to support business goals. By partnering with an IT service provider your
business can tap into unrivalled technological expertise and knowledge.
5. Business Intelligence: Knowing what’s coming next in technology is a tricky thing to predict. But it is
important you keep an eye out on emerging advances in technology when planning your business’s
future. A little foresight and planning can keep your business secure and at the forefront of your
industry.