-Password protection.
- User and group permissions.
- User – level security.
- Data encryption.
Musyoxx answered the question on February 27, 2018 at 15:47
-
Give two ways in which ICT is used in shipping industry.
(Solved)
Give two ways in which ICT is used in shipping industry.
Date posted:
February 27, 2018
.
Answers (1)
-
Which is the first web browser invented in 1990?
(Solved)
Which is the first web browser invented in 1990?
Date posted:
February 26, 2018
.
Answers (1)
-
What is the advantage of UNION in C?
(Solved)
What is the advantage of UNION in C?
Date posted:
February 24, 2018
.
Answers (1)
-
Write a C language program to create file “odd” to store all odd numbers between 1 and n.
(Solved)
Write a C language program to create file “odd” to store all odd numbers between 1 and n.
Date posted:
February 24, 2018
.
Answers (1)
-
Distinguish between character constant and string constant
(Solved)
Distinguish between character constant and string constant.
Date posted:
February 24, 2018
.
Answers (1)
-
Explain in detail bitwise operators with example
(Solved)
Explain in detail bitwise operators with example.
Date posted:
February 24, 2018
.
Answers (1)
-
Describe all operators used in C language with example
(Solved)
Describe all operators used in C language with example.
Date posted:
February 24, 2018
.
Answers (1)
-
Explain the concept of files, records and fields
(Solved)
Explain the concept of files, records and fields.
Date posted:
February 24, 2018
.
Answers (1)
-
What is built in function?
(Solved)
What is built in function?
Date posted:
February 24, 2018
.
Answers (1)
-
A system analyst in the development of computerized information systems is defined as an agent of change.Required: (a) Define the term 'agent of change‘ and describe...
(Solved)
A system analyst in the development of computerized information systems is defined as an 'agent of change'.
Required:
a) Define the term =agent of change‘ and describe four roles of a system analyst in the
development of computerized information systems.
b) Outline five advantages of an external system analyst in the development of
computerized information systems.
Date posted:
February 15, 2018
.
Answers (1)
-
Outline five factors that determine an application suitability for an expert system approach.
(Solved)
Outline five factors that determine an application suitability for an expert system approach.
Date posted:
February 15, 2018
.
Answers (1)
-
(a) Define the following terms in relation to systems: (i.) Symbiosis;(ii.) Synergy; (iii.) Redundancy;(iv.) Factoring; (b) What is meant by 'hard' and 'soft' properties of...
(Solved)
a) Define the following terms in relation to
systems:
(i.) Symbiosis;
(ii.) Synergy;
(iii.) Redundancy;
(iv.) Factoring;
b) What is meant by 'hard' and 'soft' properties of system approach? Describe briefly two
features of each
Date posted:
February 15, 2018
.
Answers (1)
-
The growth of telecommunications has made information a key organisational resource, which requires careful management.a. Give your definition of an Information System. b. The management...
(Solved)
The growth of telecommunications has made information a key organisational resource,
which requires careful management.
a. Give your definition of an Information System.
b. The management of information may be divided into two categories:-
i. Information management and
ii. Information Systems management
Give a detailed description of each of these managerial tasks.
c. It has been suggested that both these managerial tasks commit personnel involved to a
'Lifelong learning process'. What are the reasons for this point of view?
Date posted:
February 15, 2018
.
Answers (1)
-
(a) A major source of errors in computer systems is errors in the input data. What controls would you install for the control of such errors?...
(Solved)
(a) A major source of errors in computer systems is errors in the input data. What controls
would you install for the control of such errors?
(b) Describe four methods that would be used for fact finding during system investigation.
(c) Give the principal method of data capture in the following applications:
(i.) Banks;
(ii.) Supermarkets
(iii.) Clothing and footwear retailing.
(d) What are the functions of a systems programmer?
Date posted:
February 15, 2018
.
Answers (1)
-
In the context of ethical considerations: -
a. Outline the individual ethical issues implied when a person joins a professional
organization
b. Describe some of the ethical dilemmas...
(Solved)
In the context of ethical considerations: -
a. Outline the individual ethical issues implied when a person joins a professional
organization.
b. Describe some of the ethical dilemmas that are involved with Information Systems.
Date posted:
February 15, 2018
.
Answers (1)
-
Consider a supermarket chain and the use they may make of information systems in the
running of their business. Some of the objectives they are...
(Solved)
Consider a supermarket chain and the use they may make of information systems in the
running of their business. Some of the objectives they are faced with are: -
a. Easy product identification;
b. Fast customer processing at the cash tills;
c. Extremely efficient stock control;
d. Rapid bulk replacement of goods from suppliers.
Describe in detail how Information Systems can help supermarket chains with these specific
objectives. Your answer should outline the systems involved, the hardware that might be
required and an indication of how the various systems might interact with each other.
Date posted:
February 15, 2018
.
Answers (1)
-
Differentiate between pseudo code and flowcharts
(Solved)
Differentiate between pseudo code and flowcharts.
Date posted:
February 14, 2018
.
Answers (1)
-
What is: (1) Program (2) Algorithm (3) Translator (4) Hardware (5) Object code
(Solved)
What is: (1) Program (2) Algorithm (3) Translator (4) Hardware (5) Object code
Date posted:
February 13, 2018
.
Answers (1)
-
What is a predicate in a system program?
(Solved)
What is a predicate in a system program?
Date posted:
February 13, 2018
.
Answers (1)
-
Give one advantage and one disadvantage of using the string data type in a computer program.
(Solved)
Give one advantage and one disadvantage of using the string data type in a computer program.
Date posted:
February 13, 2018
.
Answers (1)