Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

UNISA MEMO AIN1501 MAYJUNE2013

QUESTION 1 (10 MARKS)

Question Answers
1.1 Data is the raw material available for processing into True
information
1.2 A closed system is affected by its environment and it, in False
turn affects its environment
1.3 Touch screens can double as both input and output True
devices
1.4 Most organisations use electronic funds transfer (EFT) False
to secure to secure sensitive data transmitted via their
website.
1.5 Expert system (ES) allow only expert users in the field False
to benefit from the available field
1.6 In changing from an old to a new system, pilot running False
involves running both the old and new systems for a
specific period.
1.7 Economic feasibility determines whether the hardware, False
software and other systems components can be
acquired or developed.
1.8 Intrusion detection systems are an example of False
preventive controls.
1.9 A rootkit is malicious software that grants an attacker True
continuous full access to a computer while hiding its
presence.
1.10 The application layer is the highest layer in the Open True
Systems Interconnections framework (OSI).

1
QUESTION 2 (10 MARKS)

A1 Connections are established, managed and B19 Session layer


terminated between applications
A2 Virus, Worms and Trojan horse B15 Malicious code

A3 Technological barriers designed to prevent B8 Firewalls


unauthorised or unwanted communication between
computer networks or hosts
A4 Consists of two or more components that combine B7 System
to achieve a common goal
A5 Includes all software that utilises the information B1 Application software
system to solve the specific data processing needs
of users
A6 The new system that is first used by a small group B2 Pilot running
of users. If the systems performs satisfactorily, a
direct changeover can take place
A7 A step that aims to determine what to do to solve B3 Systems analysis
the identified problem
A8 A financial option available for acquiring a B10 Rental
computer systems
A9 A type of solid-state technology B6 Flash memory

A10 A device that translates digital signals from a B13 Modem


computer into an analogue format so that the
information can be transmitted over analogue
telephone lines

QUESTION 3 (10 MARKS)

3.1 (5 MARKS) (any 5)

 Any authorised user linked to the server with a computer has access to authorised
information.
 An ERP is a system that is implemented throughout the organisation.
 It makes processes and workflow more efficient.
 It eliminates the expensive and inflexible system.
 Has a familiar interface, menus across all modules
 It improves tracking and forecasting
 Data only captured once will then be available to all modules connected to ERP
 It is easier to upgrade only one system

3.2 (5 MARKS)

 Problem recognition
 Problem definition and structuring
 Identifying alternative courses of action
 Making and communicating the decision
 Implementing the decision and monitoring the effects of the decision

2
QUESTION 4 (10 MARKS)

4.1 (2 MARKS)

E-commerce can be defined as technology-mediated exchange including the business


process of selling, buying, delivering, servicing and paying for products and services over
computer networks.

4.2 (8 MARKS) (any 4)

 Business-to-business (B2B) – both participants in the electronic transactions are


organisations, for example when a wholesaler sells to a retailer
 Business-to-consumer (B2C) – involves an organisation selling its product or service
directly to the public
 Consumer-to-consumer (C2C) – is an online version of the classified pages of a
newspaper where consumers can sell their products or services directly to other
consumers.
 Consumer-to-business (C2B) – it is whereby a consumer post his request for a
product or service online, indicating the details for the product or service needed, that
is, amount available, delivery dates and other specifications.
 E-government – this allows governments to transact with other organisations, their
citizens and other governments.

QUESTION 5 (10 MARKS)

5.1 (6 MARKS)

 The arithmetic/logic unit (ALU), which performs mathematical calculations and logical
operations
 The control unit, which fetches program instructions, decodes them and direct the
instructions I and out of the ALU, the registers, the primary and secondary storage,
and output devices
 Registers (primary memory) are temporary high-speed storage areas used to hold
program instructions before, during after their execution by the CPU

5.2 (4 MARKS) (any 4)

 Ease of use
 The intended use
 Level of security
 Hardware compatibility
 Software compatibility
 Technical support

QUESTION 6 (10 MARKS)

6.1 (2 MARKS)

 Input controls prevent and detect errors when entering information into the
information system in order to ensure validity, timeliness and accuracy.

3
 Processing controls are designed to ensure that all transaction data have been
processed accurately and in time.

6.2 (4 MARKS)

 Data observation and recording


 Data transcription (batch and converting)
 Edit tests of transaction data
 Transmission of transaction data

6.3 (4 MARKS) (any 4)

 Physical inspections and checks


 Logic checks
 Run-to-run totals
 File and programme changes
 Audit trail linkages
 Processing logic checks

QUESTION 7 (10 MARKS)

7.1 (4 MARKS)

 Communication channels or media


 Communication hardware devices
 Communication protocols
 Communication software

7.2 (4 MARKS) (any 4)

 Microwave transmission
 Satellite transmission
 Cellular telephones
 Global positioning systems
 Cordless computer devices

7.3 (2 MARKS)

 An intranet is an internal or private network that is under the control of a single


organisation.
 An extranet is a network that links an intranet to the internet.

QUESTION 8 (10 MARKS)

8.1 (6 MARKS) (any 6)

 Changes in technology
 Changes in decision-making policies
 Changes in the needs and demands of users and stakeholders
 Changes in the business environment
 Changes in the nature of the organisation

4
 Changes to maintain a competitive advantage
 Changes to improve performance and productivity

8.2 (4 MARKS) (any 4)

 Purchasing pre-written software


 Prototyping
 Applications development tools (for example CASE)
 Using software houses (or bureaus)
 End-user development
 Outsourcing the operation or development of the information system
 Re-engineering business operations

QUESTION 9 (10 MARKS)

9.1 (6 MARKS)

 Vulnerability – refer to a security weakness or flaw in the information system that


creates an opportunity for an attack on confidentiality, integrity and availability of the
information.
 Threat – the potential exists that vulnerabilities might be exploited, either intentionally
or accidentally. This potential is known as a threat
 Risk – can be explained as the likelihood of the attack on information assurance
occurring, that is, the probability of the vulnerability being exploited, and can
therefore be quantified.

9.2 (4 MARKS)

 Computer virus
 Worm
 Trojan horse
 Logic bomb

QUESTION 10 (10 MARKS)

10.1 (6 MARKS) (any 3)

 Management – managers need internal information about their budgets and products
in order to carry out their financial planning and make informed decisions.
 Financial managers – financial managers need information on the financial
performance of the organisation in order to make decisions on cash flow and
financing.
 Production managers – internal information on sales quantities and sales forecasting
is needed to control and plan the production process.
 Staff managers – staff managers use internal information on qualifications needed
and salary levels.
 Marketing managers – internal information needed relates to products, target
markets and prices in order to make decisions on possible promotions and
advertising methods.

5
 Sales managers – internal information is needed on production costs and all
overhead costs in order to make decisions on sales prices.
 Purchase managers – internal information is necessary on the quantity of the various
products or raw material needed by the production department.
 Employees – employees need to have internal information on the sustainability of the
organisation for job security reasons and external information on labour laws and
unions.

10.2 (4 MARKS) (any 4)

 Accurate
 Accessible
 Up-to-date information
 Detail information
 Flexibility
 Relevance of information
 Cost-effectiveness
 Reliability
 Timely
 Format of information

Total 100
©
UNISA 2013

You might also like