Management information systems revision question and answer

CPA-Quantitative-Analysis-Section-4 BLOCK RELEASE

(a) During the design stage of a new information system, the following issues are addressed:
• User interface.
• Data.
• Process.
Discuss the composition of design document under the above three elements.
(b) Briefly describe any four computer related crimes that an organisation which is considering computerising its operations should be aware of.
a) User interface
It contains:

o Screen designs– the design document contains presentation features such as text, colour,highlighting, graphics and animations.
o Dialogs- a dialog is a set of procedures for exchange of information between users andthe computer. The design document contains the types of dialogs in the information system under development e.g. menu based, form filling, command language, and natural language dialogs.
It specifies whether the data is stored in conventional files or databases. It also specifies the types of files in the information system i.e. whether there are master files (contain records or information of long-term value to the organization), transaction files (contains temporary records which represent the operation of the organization for a particular period of time), archive files (keeps offline storage), and audit files (shows all the operations performed on the system). The design document also specifies the media that is used to store the systems data e.g. tape, magnetic disk, optical disk, etc. Finally the design document specifies how records are organized in the file i.e. whether serial, sequential, random, inverted files or index-sequential organization is used.

The design document contains a detailed breakdown of the systems processes showing the steps that constitute the each process. The design document also specifies the input, processing and output involved for each process. Error conditions and the recovery procedures are also specified for each process.

b) Computer related crimes that an organization should be aware of:
1. Theft of computer resources (hardware and CDs containing software).
2. Introduction of viruses.
3. Disruption of computer systems.
4. Theft of services.
5. Hacking.
6. Spamming – usually targets organizations connected to the Internet. Marketers send out unsolicited mass e-mail to recipients who have not requested the information.
7. Jamming –Targets organizations connected to the Internet. Jammers use software routines to tie up the computer hosting a website so that legitimate users can‘t access the site.
8. Malicious software –Targets organizations connected to the Internet.
Cyber vandals use data flowing through the Internet to transmit computer viruses, which
disable the computers they ―infect‖.
9. Spoofing –targets organizations linked to the Internet. Spoofers fraudulently misrepresent themselves as other organizations, setting up false websites where they can collect confidential information from unsuspecting visitors to the site.
10. Sniffing –targets organizations linked to the Internet. Sniffing, a form of eavesdropping,involves placing a piece of software to interpret information passing from a user to the computers hosting a website. This information can include credit card numbers and other confidential data.

(Visited 20 times, 1 visits today)
Share this on:

Leave a Reply

Your email address will not be published. Required fields are marked *