INFORMATION COMMUNICATION TECHNOLOGY BLOCK REVISION QUESTIONS AND ANSWERS June 2011

QUESTION ONE

 

  • It is claimed that data required to support strategic planning differs from data required to support operational  decisions in terms of the time period referred to and the source or origin of the data. Required       :

Briefly describe how data required to support strategic planning differs from that required to  support operational decisions in terms of:

  • Time period referred to. (4 marks)
  • The source or origin of the data. (4 marks)
  • The organisation you work for has hired a software engineer to develop a suite of software to manage your payroll application system. As the financial manager, you are working closely with the software engineer to ensure that the software quality assurance standards are attained.

Required:

  • List any four data validation checks that the software engineer should incorporate into

the program.                                                                               (4 marks)

  • Why is it important to test the software before implementing it? (2 marks) (iii) Suggest two measures that the software engineer must take in order to simplify user        training and support that is fundamental to the success of the information systems        (6 marks)                            (Total: 20 marks)
  • QUESTION ONE
    •  Strategic planning:

    This refers to planning that covers a long period of time, usually 5 to 7 years. The planning determines the long-term objectives, resources and policies of an organization.

     

     

    OPERATIONAL DECISIONS

    They are concerned with daily or routine operations of the organization relating mainly to its primary activities. Examples include decisions to reorder stock when the stock is almost sold out and decisions to suspend a client from purchasing goods and services on credit due to an outstanding balance.

     

    How data required to support strategic planning differs from that required to support             operational decisions in terms of:

  • Time Period Referred To

     

    Data required for operational decisions usually covers a short time period usually in days or months. For example, data relating to the outstanding balance of a customer that determines whether or not the customer should be allowed to purchase more goods and services on credit usually spans a few days or utmost a month.

     

    Data required for strategic planning usually covers a longer time period, usually in years. From this data, forecasts can be made concerning market trends e.g. a plan to start another branch needs forecasts into the future say, in terms of sales, expenses, etc

     

    The Source or Origin of the Data

    Data required for operational decisions usually originates from within the organization. For example, stock level data and clients outstanding balances can only be sourced from within the organization in order to influence operational decisions.

     

    Data required for strategic planning usually has a greater external orientation. For instance, data about global markets that can influence an organization to globalize is external to the organization.

     

    • Validation This refers to the process by which a computer system identifies and reports incorrect data items. Validation occurs during data processing.

     

    Validation checks that should be incorporated into the program:

    • Sequence checks g. checking whether employee numbers are in sequence
    • Limit checks. For instance, salaries of employees should be checked within a certainlimit e.g. not more than Ksh 2,000,000
    • Range checks– could be used to check the correctness of processed salaries.
    • Validity checks for coded data. For instance, marital status of employees could bechecked for M (i.e. married) or S (i.e. single) and anything else should be rejected.
    • Reasonableness check. For instance, a processed pay slip, which indicates a negativesalary, should be investigated for error.
    • Existence check to ensure that all fields of a file contain an entry after data entry
    • Check digits– to detect transcription and transposition errors.

     

    • Testing enables errors in the software to be identified and corrected before the software is implemented. This testing ensures that the implemented system is highly reliable and free from error.

     

    • Measures that must be taken to simplify user training and support:

     

    • Use of an online training and support system

     

    Online training and support would be easily available to users at any time. The training and support could be provided at a specific site in the intranet (Organization‘s computer network) with multimedia (Text, sound and graphics) used to enhance understanding.

    • Training schedules could be supplied to system users so that they know in advance howlong the training is supposed to take and what is expected of them during the

    training. This would improve user cooperation and thus simplify the training.

    • Training should be carried out in phases so that users are gradually familiarized with theinformation system. A general timing approach to be used could be as follows:
      • Before the feasibility study whereby the users are given a general explanation ofcomputer systems and their relevance in function application and reason for the

    desire to introduce a computer in the specific functions on the organization.

    • Before investigation where users are explained about the impact of the new

    systemand the importance of their involvement in development. o During fact finding so that they can cooperate and provide useful information

    toguide the system developer during the analysis phase of SDLC.

    • Before programming so that they can prepare themselves for specific roles at theimplementation stage. These may include testing activities or roles. o Before implementation to enable users cooperate and play their roles as assigned       o  After implementation in order to assist in evaluation of system performance.

QUESTION TWO

  • The accounting department of a medium sized business organisation for which you work wishes to purchase’microcomputers to support its functions. You have been asked to draft a document that outlines the hardware and software specifications for the

proposed project.

What would your draft contain?                                                               (8 marks)

  • User friendliness is one of the key and desirable features that form a basis for evaluating competing software packages.

 

Required:

Name and describe three features of a user friendly software.(6 marks)(c)Why are expert information systems not popular in business systems?

(4 marks)

(d) Define the term “Business continuity planning”.                                         (2 marks)

(Total: 20 marks) 

QUESTION TWO

 

  • The document that needs to be prepared is an invitation to tender document.

 

Invitation to Tender (ITT)

This refers to a document issued to a range of suppliers. It sets out the specifications for the required equipment and software and it should explore how the hardware will be used and the time and scale. The also sets out the performance criteria for the required system.

 

Contents of ITT:

An ITT document usually contains background information together with and indication of the  purpose of the system. This includes:

      • The volume of data to be processed by the system. The complexity of the system requirements and the system interfaces should be stated.
      • The number of individuals who will want to access the computer system after installation and whether access needs to be instant or not.
      • The speed of the hardware processing required or expected.
      • Input and output systems desired.
      • The type of processing methods preferred.
      • Estimated life of the computerized system.
      • Possible upgrades or expansions anticipated.
      • Other general considerations include:
        • Contact person in the company
        • Overall financial constraints oThe form that submission is to take.
        • Closing date for submission of tender.
        • The address to which the tender is to be sent.
        • The reference person to which the tender is to be addressed.
      • The business organization could also specify how it intends to acquire the hardware and software. Available options include: o Purchasing o Leasing o Renting
        • User friendly software This refers to software that the user finds helpful, easy to learn and easy to use.

         

        Features of user friendly software:

        • It should be relatively easy for the user to start using the software.
        • The software should be as much as possible self-contained so that the user is not forced into accessing manuals or dealing with things that should be kept outside the system.
        • The amount of effort and information required of the user to get the system to complete required tasks should be kept to a minimum.
        • The user should be able to adjust to different levels of expertise between users, as users grow in competence.
        • The use should be made to feel in control of what is going on.
        • The software should behave in a logical and consistent manner, enabling the user to reason about what is going on and apply what has been learned.

         

        • Expert information system

        This refers to a knowledge intensive information system that captures expertise of a human in limited domains of knowledge. Expert information systems can assist decision making by asking relevant questions and explaining the reasons for adopting certain actions.

         

        Reasons why expert information systems are not popular in business systems:

        • They are quite narrow, shallow and brittle. They typically perform very limited tasks that can be performed by professionals in a few minutes or hours.
        • They are expensive to purchase since they contain captured human expertise.
        • Expert systems cannot handle exceptional decision making situations which are typical of day-to-day business. For instance, CLUES, an expert system used by Countrywide Funding Corp. in Pasadena, California, USA is able to process normal loan applications with 95% accuracy but it‘s unreliable when faced with exceptional situations such as those involving a self-employed person or complex financial schemes. Such exceptional situations

        are best handled by insurance underwriters.

        • Incase a poor decision is made, a business organization cannot hold the expert system accountable because it‘s not a person rather it‘s a tool. The organization can only pursue those responsible for developing the system if tit was in-house developed. If it was purchased or outsourced, then the organization must have a really good case for it to hold the concerned organization responsible. However, if a manager of an organization makes a poor decision, he/she would be fully accountable. Human decision makers can be

        questioned regarding the success or failures of their decisions.

As much as expert systems provide solutions to business problems, they are not used inisolation. They are used together with a human decision maker who considers the advicefrom the expert system before giving the final decision. Thus, expert systems do not contribute to substantial cost reductions due to downsizing of staff.

  • Business continuity planning

This is a type of contingency planning that provides the ability to continue business functions through a disaster. Business continuity planning enables a quick and smooth restoration of operations after a disruptive event e.g. a fire, floods, etc

QUESTION THREE

Four companies A., B, C and D, which have similar activities but are not part of a group, have the following computer configurations,

Company A: Three stand-alone micro-computers (CPU, VDU, Keyboard, hard disk and  mouse) each having its own printer.

Company B Small office with 11 micro-computers linked in a Local Area Network (LAN). Each micro-computer has its own processing ability, but is linked via the LAN to central printers, disk storage, file server and tape streamer devices. The LAN is completely~ self-contained”, This means that there are

 

Questions – Past Paper                                                                                   19

 

no modems or other similar external devices attached to it.

Company C Four processing locations connected by a Wide Area Network (WAN). Each location has a LAN in the same configuration as company B, although there is also a dedicated landline to two of the three. offices (offices are connected in a ring to two of the other offices). Each server is updated with. data from the other three locations at 15 minutes interval.

 

Company D Twenty processing locations, each with its own LAN in the same configuration as company B. All locations are connected in a star configuration to head office. File servers at each location are updated from head office after every five minutes, Each location has a reserved external., telephone line for selected customers to use. Orders by customers are

transmitted direct on to the company D‘s Computer system

Required:

  • State, with reasons, for each company, what security procedures should be applied to

ensure there is no unauthorised access to its computer system.                                           (12 marks)

..

  • Company B is planning to establish additional branches and wants to upgrade its systems to duplicate those of company D.

State and explain the data communication systems you would recommend  (8 marks)

(Total: 20 marks) 

QUESTION THREE

 

  •  Terminologies in the question:

LAN (Local Area Network)

This refers to a computer network in which computers and peripheral devices are in close proximity. Specifically a LAN is a collection of computers within a single office or building that connect to a common electronic connection commonly known as a network backbone.

 

Wide Area Network (WAN)

This refers to a computer network that is countrywide or world wide. It normally connects networks over a large physical area such as different buildings, towns or even countries.

 

 

Ring network configuration

In this configuration, each device is connected to the other devices in the network to form a ring.

 

Star network configuration

This consists of a number of small computers or peripheral devices linked to a central unit called a main hub.

 

  • Company A

Since the computers are stand-alone, there is no need for network security mechanisms.

Physical measures that could be used to ensure security include:

  • Use of bolting door locks at computer room entrances. These locks require the

traditional metal key to gain entry.

  • Use of combination door locks (cipher locks). These use a numeric keypad or dial to gain entry.
  • Electronic door locks. This system uses a magnetic or embedded chip-based plastic card key or token entered into a sensor reader to gain access. o  Manual logging of visitors to the company to discourage intruders.
  • Electronic logging of visitors to the company to discourage intruders.
  • Identification badges (photo Ids).
  • Video cameras.
  • Security guards.
  • Not advertising the location of computer facilities to make it hard for intruders who have already gained entry into a company‘s premises to locate the computer facilities.

 

Logical security measures that could be used to prevent unauthorized access:

  • Username and password identification at each terminal to control access to    microcomputer resources.
  • Data stored on the stand-alone microcomputers should be encrypted so that an

            intruder who has already gained access to the data to be able to read data

  • Token devices, one-time passwords. This is a two-factor authentication that generates

one-time passwords that are good for only one logon session.

  • Biometric security access control- based on a physical feature of the user such as finger print or eye retina scan.
  • Data classification- by assigning classes or levels of sensitivity to computer files, management can establish guidelines for the level of access control that should be assigned. Confidential data should be given the highest priority when being protected from unauthorized access.

 

  • Company B

The physical security procedures described for company A could be applied to company B to ensure that no one has a physical chance of tapping into the corporate LAN. The logical security procedures described for company A would still apply to company B. In addition

other logical measures would be required for the corporate LAN. These include: oUse of terminal identification files by communication software to check the authentication of a terminal when it tries to send or receive messages.

  • Data encryption- to protect messages from disclosure during transmission.
  • Network monitoring devices may be used to inspect activity from known or unknown users.

 

  • Company C
  • Again, the physical security measures described for company A could be used for company C to secure the computer facilities from physical unauthorized access. The logical security measures for company A would still hold for company C. Additional logical security procedures required would be similar to that of company B since company B‘s configuration
  • (a LAN) is similar to Cs configuration (a WAN composed of many LANs similar to Bs). Specific emphasis should be on securing data in transit as the servers are updated. An appropriate data encryption algorithm (scheme) would suffice.
  •  Company D
  • The physical security measures should be similar to those of company A. The measures should be enforced in each of the twenty processing locations. The logical security measures should be similar to those of companies A, B, and C with the exception that the security system would be centralized about the head office system to make it more full proof. This is because in a star configuration, requests for data access must first be channeled to a central node in the network according to the polling media access control mechanism. The intrusion detection at the central node (head office computer server) would thus be able to monitor all system user requests.
  • Security procedures that should be applied:
  • Data communication systems I would recommend:
  • Modems
  • These would enable digital data to be transmitted over the telephone links present in company D‘s network configuration by converting it to an analog form and then
  •          reconverting it at the receiving end.
  • Telecommunication links- to provide interconnectivity between the processing locationsand the head office.
  • A much more powerful network operating software (e.g. Linux, Unix, Windows NT) to be able to cope with the large number of users. The network operating software should also
  •          be able to support frequent updates of file servers at each location.
  • Multiplexers

They are required to combine all links from the PCs in a processing location into a telecommunication link. Multiplexors are thus needed to share telecommunication links amongst the many users.

QUESTION FOUR

 

  • A company needs information on whicb to base decisions concerning the current operations and future plans. Explain areas of management control where computers are

used or can be used.   (8 marks)

  • One important aspect of information-systems management is the physical and managerial location or sitting of the information system within an organisation.

Explain two information systems location options indicating circumstances under

which~ each siting allocation is appropriate. (12 marks)

(Total: 20 marks)

QUESTION FOUR

 

  • Management control  This refers to the activity of monitoring how effectively resources are used and how well operational units are performing.

 

Areas of management control where computers are used/can be used:

  • At the operational level where transaction processing systems (computerized systems that perform and record the daily routine transactions necessary to conduct the business) could

be used to coordinate accounts receivable.

  • At the knowledge level where office systems (systems that automate office procedures) and knowledge work systems (systems that aid knowledge workers to create new information and knowledge) may be used for electronic scheduling of events and product
  • At the management    level     where
  • IFORMATION    COMMUNICATION

TECHNOLOGY (MISs- information systems at the management level of an organization that secure the functions of planning, controlling and decision making by providing routine summary and exception reports) could be used for budget preparation and in identifying

production cost overruns. Also

Decision support systems (information systems at the organization‘s management level that combine data and sophisticated analytical models or data analysis tools to support nonroutine decision making) could be used in supporting non-routine decisions such as

identifying production facility locations for a manufacturing company.

  • At the strategic level where executive support systems (information systems at the organization‘s strategic level designed to address unstructured decision making through advanced graphics and communications) to support senior managers in making decisions concerning new products and new markets.

 

  • Two options available are: –

Centralized information system

In this option, the processing of the information is at the central location i.e. the head office. This means that data will have to be captured and taken to that location where processing is to take place. The data can be taken to the central location either by:

  • Electronic means

Here data will be transmitted electronically from different sites to the central location where processing is undertaken. These sites have to be linked to the central processing through  computer networks.

  • By physical means

In this case, transaction records will be transported by physical means e.g. post or courier services to the central location where processing will take place.

Circumstances:

  • Where standards have to be maintained o Where high degree of control is required.
  • Where IT experts are concentrated in one location.

 

Distributed processing

Here, processing takes place in many dispersed locations. A distributed system is one where there are several autonomous but interacting data stores and systems of different geographical

locations that are linked through the use of computer networks.              Circumstances:

  • Where there is need to meet or tailor the system to local

needs. o Where there is availability of enough experts.

  • Where fault tolerance is essential. The many processing locations provide an

alternativeprocessing option should one location fail.

QUESTION FIVE

  • During systems development life cycle (SDLC): the systems analyst uses some tools to model the users requirements in such a way that he is able to communicate his understanding of the users needs.

Required:

Identify and describe three tools the systems analyst may use. to model the systems requirements. (6 marks)

 

  • Graphical user interface (GUI) ,have proved to be more user friendly than current character based systems.

 

Other than the graphical user interface, give a summary of at least three interfaces you would use in “the design of systems. (3 marks)

(  Briefly explain three ways in which GUI makes a system user friendly.

(6 marks)

Using your own experience, explain why more-and more software is being purchased for windows environment as opposed to character based environment.             (5 marks)

~                            (Total: 20 marks)

ANSWERS TO QUESTION FIVE

 

  • a) System analyst

This is a specialist who translates business problems and requirements into information requirements and systems, acting as liaisons between the information systems department and the rest of the organization.

System development life cycle

This is a traditional methodology for developing an information system that partitions the systems development process into formal stages that must be completed sequentially with a very formal division of labour between the end users and the information systems specialists.

 

Tools that may be used by the analyst to model the systems requirements:

  • Data flow diagrams (DFDs)

These are visual tools that show the various processing steps and data flow through a  system. DFDs are constructed using four major components:  o External entities

These are sources of data input to the system or the destinations of data from the system. The standard notation for an external entity is a square.

  • Data stores

They represent the stores of data within the system. Examples are computer files or databases. o Process

 

These are events that change the state of data fed to them. The standard notation for a process is a circle.

  • Data flows

They are movements of data from one component to the other. The standard notation for a data flow is a unidirectional, labeled arrow

  • System flowcharts

These are diagrammatic representations that illustrate the sequence of operations performed to get the solution to a problem. They are useful in understanding the logic of

            complicated and length problems.             

 Entity relationship models (ERMs)

They are detailed logical representations of the data for an organization or for a business area. They are expressed in terms of the entities in the business area, the relationships among the entities and the attributes of the entities and their relationships. An entity is an object of interest (i.e. a thing or concept) about which data is to be stored. An attribute is a

           property or characteristic of an entity.             

Entity life history diagrams (ELHs)

These are diagrammatic representations of the lives of entities from their creation to deletion. The life of an entity is expressed as the permitted sequence of events that can cause an entity to change. An event may be thought of as whatever brings a process into

         action to change entities.

  • Data dictionary

This is a central storehouse of data about an information systems data and data transformations. Data dictionaries are necessary because it is impossible to fully describe all components of DFDs and E-R models. Data dictionaries describe in detail data flows, data stores, external entities, data structures, system processes and data elements.

 

  •  Graphical User Interface (GUI)

This refers to a human computer interface (HCI) based upon a graphical display. A GUI makes use of icons, buttons, bars and boxes to perform tasks.

Human Computer Interface (HCI)

This refers to the environment where the interaction between end users and the computer is said to take place.

Other interfaces that could be used in the design of systems:

  • Command driven interfaces– these enable the user to quickly and simply instruct thecomputer on what to do via commands.
  • Menu driven interfaces- these provide users with menus. The menus provide the userwith a number of options and a simple means of selecting between them.
  • Direct manipulation interfaces- these present the user with a set of options that arerepresented by icons. The user moves the cursor using the mouse until it is over the icon and then clicks the mouse button to select the option.
  • User Interface Management System (UIMS)- These create a means by which aconsistent interface with the same ―look and feel‖ can be provided for any number of different applications within the same system.

 

Ways in which a GUI makes a system user friendly:

  • GUIs minimize the time taken to perform trivial operations e.g. opening a file. Forinstance, to open a file in the GUI environment of the windows range of operating systems one only has to double-click on the icon (graphical symbol) representing the
  • One doesn‟t have to memorize commands with a GUI as compared to a command-driven interface. Hence, GUIs make it very easy to learn how to use a system.
    • GUIs minimize the typing of data required from the user because they provide agraphical means to supplement typing of data. Hence, they are convenient to system
    • It‟s easy to access help form a GUI as compared to other interfaces such as command-driven interfaces. To access help, for instance, in a windows operating system environment, one only has to locate and click-on the help option in the menu bar of the program‘s window. For a command-driven interfaces such as that of Microsoft DOS(disk operating system), one has to recall the help command before he/she can access help. If the user has no clue of the help command, then he/she is stuck.

     

    • Reasons why  more  and  more  software  is  being  purchased  for  windows  environment  as opposed to  character-based environment.
      • The windows environment saves on training of users. Most software developed for the windows environment conforms to some basic standards. For instance, there are always three buttons to the top right end of each window for the purposes of minimizing, closing or maximizing the window. Usually, also, there is always a menu-bar present in all program windows to provide users with various options. Since most software applications adhere to these standards, users of windows environment software can easily learn how to use many more software after learning how to use one software. Command/character-based systems have minimal standards. For instance, there are no conventions as to the naming of commands. This makes it very difficult to learn many different programs produced forcharacter-based environments.
        • Majority of the software today is based on a windows environment because its user Hence, customers have a wide variety to choose from.
        • Since majority of the software available is for the windows environment, organizations continue to purchase more and more windows-based software as compared to characterbased software in order to ensure compatibility with already existing systems.

QUESTION SIX

  • The adoption of database systems as a way of managing information systems is gaining popularity over standard file

 

Required:

  • State the features of a database management system that provide data security and

integrity.                                                                                           (4 marks)

  • What problems are caused by data redundancies? (4 marks)
  • Centralized control avoids unnecessary data redundancy or duplication. What precautions should be taken into account -in the process of establishing a centralized data control system to avoid data redundancy? (6 marks)
  • It is important to bear in mind that information may be relevant to people outside the organisation as well as to its ” internal  management  and   Sometimes  it  happens that some decisions relating to an organisation are taken by outsiders.

State six examples of decisions relating to an organisation that may be taken by outsiders (6              marks)

(Total: 20 marks)

QUESTION SIX

 

  • Database system

This refers to a system composed of a group of related files.              File

This is a group of records of the same type.

Record

This refers to a group of related fields e.g. a student record may be composed of fields such as  student name, student number, course, date of birth, etc  Database management system

This refers to a complex software system that constructs, expands and maintains the database. It also provides the controlled interface between the user and data in the database.

 

  • Features of a DBMS that provide data security and integrity:
    • Usernames and passwords- used to prevent unauthorized
    • Transaction locks e. write locks and read locks. Write locks prevent other processes(programs) from updating data currently being updated by a process. Read locks

prevent any other processes from updating data that is currently being read by a process.

  • Checkpoints and journals. A checkpoint is a ―snapshot‖ of the database before it wasupdated by processes/programs and the journal holds details of updates subsequently made. In the event of failure, the recovery process can rebuild the database

from checkpoints and journals.

  • User rights and privileges– access to files or fields of records could be granteddepending on the user privileges.

Encryption– coding of data by special algorithm that renders them unreadable without decryption

Integrity checks e.g. checks on relationships amongst tables to ensure that they are validand data validations

 

  • Data redundancy

This refers to the presence of duplicate data in multiple data files. Data redundancy occurs when different divisions, functional areas, and groups in an organization independently collect the same piece of information. For instance, within the commercial loans division of a bank, the marketing and credit information functions might collect the same customer information contained in separate files.

Problems caused by data redundancies:

  • Large storage space requirements

Since each functional area of an organization maintains the same piece of information,  the resource requirements (hard disk, optical disk, magnetic tape) may be very large.

  • Problem of securing all the redundant data

Though the data in such a database is redundant, it must still be secured from unauthorized access. This task is very difficult to implement because each functional area

            of an organization holds the data.

  • Confusion

Since data is collected and maintained in so many different places, the same data may have different meanings in different parts of an organization. Simple data items such as the fiscal year, employee identification, and product code can take on different meanings

            as programmers and analysts work in isolation on different applications.

  • Difficulty in performing updates

To update a redundant data item, one must update all instances of the redundant item in  all the department files of an organization. This is clearly hectic!

  • Compromised system integrity

In cases where only one instance of a redundant data item is updated, the system integrity is compromised since the other instances of the redundant data item in the rest of the organization‘s departments will differ from the updated instance of the redundant data item.

 

  • Precautions that should be taken into account in establishing a centralized data control system to avoid redundancy:
  • One should ensure that adequate security mechanisms are in place to ensure that users are granted access to only what they are supposed to access.
  • One should ensure that the system is fault tolerant i.e. it should be not too centralized as to be vulnerable to failure.

 

          • Decisions relating to an organization that may be taken by outsiders:
            • Changes in value added tax
            • Changes in materials costs
            • Change in bank account charges
            • Regulation of prices e.g. petroleum prices, matatu fares, etc
            • Regulation of bank interest rates
            • Changes in legislation e.g. changes to clauses in the Companies Act 7. Imposition of exports quotas

QUESTION SEVEN

  • Risks to data are relevant to manual as well as computerised systems. With computerized systems however”, the risks are greater, because data are held on

       magnetic files and cannot be seen or read by the human eye.

What risks are particularly relevant to data storage on a magnetic medium?

(5 marks)

  • Your managing director is in two minds about establishing a company website and has asked you to produce a “balanced report” on the pros and cons. You have already written several pages on the benefits and you have just started on a section headed “Anxieties”.

What sub-headings might this section include?                                         (5 marks)

  • Why do  organisations  automate  reasoning  or  decision  making  tasks  which  human  beings are naturally better able to perform than computers? (4 marks)  (d)State six ways in which a business can use Desktop Publishing (DTP).(6 marks)

(Total: 20 marks)

QUESTION SEVEN

 

  • Magnetic medium

This refers to a secondary storage medium that utilizes magnetism to store data. Examples include magnetic disks (hard disks and floppy disks) and magnetic tapes.

 

Risks to data storage on a magnetic medium:

              • Strong magnetic fields– these could destroy the data on the medium by altering themagnetic patterns on the media
                • Intense heat– this alters the magnetic patterns on the media thus destroying the datarepresented by those magnetic patterns.
                • Dust– this results in hard disk crashes and also may render floppy disks unreadable. A diskcrash is a situation that arises when dust particles come into the space between a readwrite head of a hard disk and the disk plate. Disk crashes render a hard disk unusable thus

                resulting in loss of stored data.

                • Theft– since magnetic media are portable, they are liable to theft. Stealing a magneticmedium device is as good as stealing the data it contains since the data stored can be accessed after the device has been installed on another terminal.

                 

                • Anxieties about establishing a company website:
                  • High costs involved

                It‘s costly to develop a website or to outsource (pay an information technology firm to develop the website) development due to the high level of expertise required. Maintenance costs of the website would also be very high since maintenance of websites is an activity that needs to be carried out frequently. The cost of hosting the website would also have to  be considered.

                • Business process reengineering

                Establishing a company website may involve change of business processes. Setting up an ecommerce site may force an organization to change its business processes to foster the selling of goods and services over the Internet. Changes to business processes may encounter internal resistance from company employees or external resistance in the form of customer reluctance to comply with the change e.g. customers may be reluctant to switch

                       from the traditional channels of doing business to the Internet.

                • Exposure of organizational information to competitors

                Setting up a corporate website would mean that organizational data such as the nature of its business and the products and services offered will be available to competing businesses. Some companies are usually conservative to setting up corporate websites because the information that is displayed on the websites could be used by competitors to improve their

                       competitive advantage.

                • Security

                If the company website is hosted (contained) within the company then setting up the website would expose organizational data to security threats from the Internet. The website

                       would also provide an avenue for hackers to access the organization‘s computers.

                • Training

                Company staff may have to be trained on how to use the website. For instance, employees may need to be trained on how to log-on and how to access, say, their business e-mails. Training would be expensive in terms of time and costs (trainers salaries).

                 

                • Reasons for automation of decision making roles:
                  • To achieve speed in making structured decisions g. an order to restock when stocklevels are low could automatically be implemented by a computerized solution to

                decision making.

                • By automating structured decisions, human beings are freed to more complexstructured decisions that require creativity, which is not provided for in
                • Computers are more reliable when it comes to making routine decisions. A human beingis capable of forgetting to perform a routine decision e.g. restocking particularly when under stress. Computers on the other hand, are programmed and thus they cannot forget to

                perform routine tasks. Infact, they are excellent at routine tasks

                • A computerized solution to decision making is cheaper than a human solution todecision making. Managerial decision makers usually offer their expertise at a high cost. A computerized solution to decision making would only involve an initial investment cost and

                subsequent maintenance costs which are in the long run cheaper.

                • Objectivity- computers are totally objective. Human beings could have other factors thatmay affect their reasoning (e.g. anger) which could end up compromising the decisions they make.
                  • Desktop publishing (DTP)

                  This refers to technology that produces professional–quality documents combining output form word processors with design, graphics, and special layout features. Examples of software used for desktop publishing include PageMaker and Publisher.

                         Ways in which a business can use Desktop Publishing:

                  • Production of brochures and flyers
                  • Production of manuals for staff
                  • Production of certificates
                  • Production of newsletters
                  • Production of calendars and diaries 6. Production of quality commodity catalogues.QUESTION EIGHT
                    • Decision support systems (DSS) help to fulfil management’s requirements for computerized information systems by assisting them in complex and unstructured tasks.

                     

                    Required:

                    Describe the relevance and uses of a DSS to management accountants.     (8 marks)

                     

                    • Name and explain three tasks that the systems analyst would undertake in the design phase of information systems development process. (6 marks)
                    • Explain why Local Area Networks (LANs) have been successful in improving the flow

                    of data and information in organisations.                                         (6 marks)

                    (Total: 20 marks)

                    ANSWERS TO QUESTION EIGHT

                     

                    • Decision support system (DSS)

                    These are information systems at the organization‘s management level that combine data and sophisticated analytical models or data analysis tools to support decision making (specifically semi-structured and un structured decision making).

                     

                    Relevance of DSSs to management accountants:

                    DSSs help management accountants to make semi-structured and unstructured decisions  relating to accounting.

                    Uses of DSSs:

                    DSSs assist management accountants in:

                    • Evaluating planned asset acquisitions
                    • Evaluating investment options
                    • Controlling organizational expenditure
                    • Evaluating proposed asset disposals
                    • Budget planning by enabling simulation of how the budget would look like when various parts of it are altered.

                     

                    • Tasks undertaken by the systems analyst in the design phase of the information systems

                    development process:

                    • Soliciting ideas and opinions from users, vendors and IT specialists. Users ideas andopinions are useful in reviewing systems designs such as output designs (specifically document/form design). Vendor and IT specialist‘s opinions are critical when producing

                    hardware and software specifications.

                    • Ensures adherence to internal technical design standards g. program designstandards that ensure completeness, usability, reliability, performance and quality of

                    the system being developed.

                    • Design of outputs, inputs, interfaces, software and processes for the system
                    • Participation in design reviews in order to establish areas where improvements can bemade to the system designs.
                    • Oversees the preparation of the systems specification document.

                     

                    • Local Area Network (LAN) This refers to a collection of computers within a single office of building that connect to a       common electronic connection (network backbone).Reasons for the success of LANs:LANs enable faster sending/receiving of data and information.Since the movement of data and information is electronic, the sending and receiving of data and information over the LAN is almost instantaneous.LANs eliminate bottlenecksWithout a LAN, the sending/receiving of data and information contained in documents is

                      usually through a 3rd party responsible for delivering the documents to the intended recipient

                      department. At the recipient department the documents also have to be sorted out before being delivered to the intended employees LANs eliminate the bottleneck of a 3rd party since an

 

(Visited 30 times, 1 visits today)
Share this:

Written by 

Leave a Reply

Your email address will not be published. Required fields are marked *