Management information systems revision question and answer

CPA-Quantitative-Analysis-Section-4 BLOCK RELEASE

Kasuku Engineering Co. Ltd, a company that is involved in the design and manufacturing of various products realizes that, in order to remain ahead of its competitors, it must introduce Computer Aided Design (CAD) techniques.
Required:
a) Define what is meant ‗Computer Assisted Design‘ techniques.
b) List and describe briefly FOUR potential benefits, the company is likely to experience in the adoption of CAD.
c) List five physical security procedures that Kasuku might adopt to make sure that its information is secure.
ANSWER
a) Computer Aided Design (CAD) techniques
These refer to techniques that automate the creation and revision of designs using sophisticated graphics software.

b) Potential benefits:
1. Quality designs. CAD ensures accuracy in the production of designs. CAD also subjects designs to rigorous testing thus ensuring reliability.

2. Speed in designing. Since the design process is automated, it‘s likely to be shorter than manual design.

3. Improved group collaboration. CAD enables sharing of designs amongst many designers thus improving group collaboration.

4. Reduced costs
Using a traditional physical design methodology, each design modification requires a mold to be made and a prototype to be physically tested. This process must be repeated many times, which is very expensive and time consuming. Using a CAD workstation, the designer only needs to make a physical prototype toward the end of the design process because the design can be easily tested and changed on the computer.

c) Physical security procedures that may be adopted:
1. Bolting door locks –These require the traditional metal key to gain entry. The key should be stamped ‗Do not duplicate.‘
2. Combination door locks –These utilize a numeric keypad or dial to gain entry.The combination should be changed at regular intervals or whenever an employee with access is transferred, fired or subject to disciplinary action.
3. Electronic door locks –These utilize a magnetic or embedded chip-based plastic card key or token entered into a sensor card reader to gain access. A special code internally stored in the card or token is read the sensor device that activates the door locking mechanism.
4. Biometric door locks – An individual‘s unique body features, such as voice, retina,fingerprint or signature, activate these locks.
5. Manual logging – All visitors should be required to sign a visitor‘s log indicating their name, company represented, reason for visiting and person to see. Logging should be at the front reception desk and at the entrance to the computer room.
6. Electronic logging –All access should be logged with unsuccessful attempts highlighted.
7. Identification Badges (Photo Ids)–Badges should be worn and displayed all personnel. Visitor badges should be a different colour from employee badges for easy identification.
8. Video cameras –They should be located at strategic points and monitored security guards.
9. Security guards –They could be used together with video cameras for efficiency.
10. Controlled visitor access –All visitors should be escorted a responsible employee.
11. Alarm systems –should be linked to inactive entry points, motion detectors and the reverse flow of enter or exit only doors.
12. Controlled single entry point.A controlled single entry point monitored a receptionist should be used all incoming personnel.

(Visited 4 times, 1 visits today)
Share this on:

Leave a Reply

Your email address will not be published. Required fields are marked *