Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

NUMBER ONE Consider a supermarket chain and the use they may make of information systems in the running of their business. Some of the

image text in transcribedimage text in transcribedimage text in transcribed

NUMBER ONE Consider a supermarket chain and the use they may make of information systems in the running of their business. Some of the objectives they are faced with are: - a. Easy product identification; b. Fast customer processing at the cash tills; c. Extremely efficient stock control; d. Rapid bulk replacement of goods from suppliers. Describe in detail how Information Systems can help supermarket chains with these specific objectives. Your answer should outline the systems involved, the hardware that might be required and an indication of how the various systems might interact with each other. (5 marks for each, total marks 20) NUMBER TWO The development of powerful desktop computers coupled to telecommunication networks has revolutionized the way organizations may carry out their business. The following are some alternatives for an organization's internal and external communications: - a. (8marks) b. (6marks) C. (3marks) d. (3marks) Client-Server Internet (Total marks 20) Intranet Extranet NUMBER THREE In the context of Information Systems Security, write short notes on ALL of the following headings:- a. Why are computer systems more vulnerable to destruction, error, abuse and misuse than manual systems? b. What is meant by the term Risk Assessment? c. What are Worms and Viruses? d. Outline the process of Public Key Encryption. (5 marks for each, total marks 20) NUMBER FOUR Organizations are now moving from Strategic Management systems towards Enterprise systems and yet further to Industrial Networks and Extended Enterprise systems. a. Describe the features of Enterprise computing and industrial networks; b. What are the business and technological reasons for this move? c. Outline the key elements required to build an enterprise information technology structure d. Outline potential organisational problems in the creation of these enterprises systems. (5 marks for each, total marks 20) NUMBER FIVE In the context of ethical considerations: - a. Outline the individual ethical issues implied when a person joins a professional organization. (10 marks) b. Describe some of the ethical dilemmas that are involved with Information Systems. (10 marks) (Total: 20 marks) NUMBER SIX a) A major source of errors in computer systems is errors in the input data. What controls would you install for the control of such errors? (6 marks) b) Describe four methods that would be used for fact finding during system investigation. marks) c) Give the principal method of data capture in the following applications: (i.) Banks; (ii.)Supermarkets; (iii.) Clothing and footwear retailing. marks) d) What are the functions of a systems programmer? marks) (4 (2 marks) (2 marks) (2 (4 (Total: 20 marks) NUMBER SEVEN One of the current developments in information technology, which has strategic implications for business firms, is the move towards open systems. Required: a) Explain the meaning of the open systems concept. marks) b) Discuss the implications of the move towards open systems for organizations that have already invested in proprietary information systems. (8 marks) c) Outline two potential benefits to information technology due to the move towards open systems. (4 marks) (Total: 20 marks) NUMBER EIGHT Computer systems which process financial data for a company should be audited to evaluate the reliability of information and also the efficiency and effectiveness of the system. The main problem with auditing a computer system is that processing operations are invisible. Required: a) State five systems checks and controls that should be built in the system at the design stage to reduce the problem and weaknesses that auditors frequently detect. (5 marks) b) Discuss the audit trail in computerized accounting information systems. (6 marks) c) Explain each of the following computer auditing approaches and techniques: (i.) Auditing around the computer; (3 marks) (ii.) Auditing through the computer; (3 marks) (iii.) Auditing packages. (3 marks) (Total: 20 marks)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Management And Organisational Behaviour

Authors: Laurie Mullins

7th Edition

0273688766, 978-0273688761

More Books

Students also viewed these Programming questions