SOLUTION TO QUESTIONS
The functions of a computer manager include;
(i)
To ensure
that the computer department functions efficiently in the service of the
computer.
(ii)
To ensure
that the company needs of the organization are met within the established
policy guidelines.
(iii)
To render
expert advice to the management on issue concerning the computer
(iv)
To ensure
safekeeping of the pieces of computer hardware and software.
(v)
To ensure
that the computer is operated within the stipulated operational guidelines.
The following mechanisms are
provided to prevent illegal access to information in a computer system:
(i)
Encryption:
This is the means of scrambling data into a form which is not intelligible to
unauthorized users.
(ii)
Identification
and authentication: This is where a user identifies himself giving his name,
account number (if possible and password.
(iii)
Confinement:
This is achieved by a software tool which ensures that no path exists to enable
a routine release information to a user outside the confined region.
(iv)
Internal
consistency checks are devised to help prevent fraudulent use of a program
since data values outside the range anticipated by the program designer can be
detected.
(v)
The
computer’s operating system can determine which process can assess which object
within the system
(vi)
Threat
detection mechanisms which detect and record any attempt to penetrate a
program’s security.
System capability Factor:
This is an evaluation of the
hardware and software features of the equipment which have value to potential
value to the user and which are not or cannot be fully evaluated according to
performance criteria.
In Evaluating Software capability we need to
assess:
(i)
The
operating systems
(ii)
The
available programming languages
(iii)
The utility
programs supplied by the vendor
(iv)
The
application packages supplied by the vendor
System hardware capabilities can
be evaluated more directly than those of systems software’s. A detailed
specification of the hardware must have been given to the vendors.
It is then pertinent to know whether:
(i)
The vendor meets
the minimum hardware specification;
(ii)
The system
is truly expendable in a way which meets longer range needs;
(iii)
Hardware
expansion mean faster through put or simply greater capacity;
(iv)
The vendor
exceeds equipment specifications to an extent worthy of special consideration.
Systems Support Factors
This is an assessment of the
hardware support systems, programming, and software support, and the training
and educational support services to be provided by the vendor as part of the
standard equipment cost.
To properly evaluate the proposed field
support (hardware and software supports), the following areas can be crucial;
(i)
Preventive
maintenance schedule
(ii)
Assignment
of hardware engineering personnel
(iii)
Parts
inventory
(iv)
Response
time to user calls
(v)
Overtime
charges
(vi)
Specialist
supports levels
(vii)
Back up
computers
(viii)
System down
time/system payment correlation.
Training and education can be broken into
three important areas;
i.
Formal
courses
ii.
Vendor
provided training materials
iii.
Documentation
The
factors necessary for effective computer system design include;
(i)
Production
of the desired information at the right time, in the right amount, with an
acceptable level of accuracy and in the form required at an economical cost
(ii)
Incorporation
of checks and controls, which are capable of detecting and dealing with
exceptional circumstances and errors.
(iii)
Need to
minimize the cost and the time spent on recording source data.
(iv)
Need for
effective safeguards for the prevention of fraud
(v)
Effective
security measures in order to avoid loss of data stored in master files
(vi)
Efficient
design of documents and reports
(vii)
Efficient
design of computer run.
Solution to question 7:
(i)
Computer
virus is a piece of software which corrupts programs and data and which may
replicate itself.
(ii)
Possible sources of computer virus include
a.
Free
software (for example) from magazine
b.
Through your
e-mail covers and bulletin boards
c.
Pirated
software (usually cheaper than original versions)
d.
Games
software (wide appeal)
e.
Duplication
of software in violation of manufacturer’s guidelines.
iv.
Some examples of time bomb virus include:
a.
6th
March (Michelangelo’s birthday)
b.
1st
April (All fool’s day)
c.
22nd
September (Hobbit Frode’s birthday)
d.
Any Friday
13 (unlucky day)
e.
26th
of every month (Chernobyl virus)
v.
Some of the administrative procedure to
prevent computer virus include:
a.
The use of
anti-virus software bought from a reputable source
b.
The scanning
of all foreign floppy diskettes before use
c.
Not sharing
programs or data files
d.
Avoid the
use of pirated software
e.
Not using
public domain or shareware software, unless this has been checked or
guaranteed.
f.
Not using
game software on computer meant for office work.
vi.
The main consideration in the selection of a
computer application package area:
a.
Cost of
purchase
b.
Type of
facilities available in the package
c.
Ease of use
d.
Integration
capability with other application package
e.
Experience
of previous users
f.
Type of
computer on which the package will be run
g.
Machine
memory capacity needed
vii.
The reasons
for the development of audit software are;
a.
The need to
improve the integrity, reliability, and quality of the audit process.
b.
The need to
improve its coverage to include all the pertinent areas that might otherwise be
overlooked.
c.
In modern
times, the data that are worked on are normally stored on electronic readable
storage media, which are software oriented
d.
The need to
harmonize the diversities in the computerized information processing
environments that might confront auditors.
e.
There is
also the need to make audit capabilities available to auditors who are
relatively unskilled in the use of computers i.e. may not be able to develop
the necessary programs on their own. .
viii.
The
functions that can be perfumed by auditors when using the software
a.
Accessing of
files read different data coding schemes, different records formats, and
different file structures.
b.
Checking of
arithmetic processes.
c.
Checking of
data analyses
d.
Checking of
created and updated work bases based on the organization’s master files
ix.
The Causes
of system Failure in the banks include;
a.
Electronic hard
ware malfunctioning
b.
Telecommunication
network problem
c.
Hidden
program errors
d.
Computer
viruses
e.
Irregular/Abnormal
supply of power of the system
f.
Irregular
Maintenance of hardware
g.
Sabotage due
to poor security measures on the systems.
(a) The reasons for constant maintenance
and review of a system are:
a.
To solve any unforeseen problems
b.
To confirm if the system is achieved and will
continue to achieve the desired output result.
c.
To keep up-to-date with technological
advancement.
d.
The need to meet the dynamic nature of users’
requirements.
e.
To determine if the system is justified in terms
of cost benefits analysis.
f.
As a preventive measure against system failure
in order to improve its reliability
g.
As a detective measure against failure so as to
minimize down-time
(b) The step that would
make fraud less likely to occur include:
a. Use
proper hiring and firing practice.
b. Proper
management of disgruntled employees.
c. Train employees in security and fraud
prevention measures.
d. Manage
and track software licenses.
e. Confidentiality
agreements should always be signed by employees.
f.
Develop a strong system of internal control.
g. Segregate
duties with clearly defined schedules.
h.
Duties should be rotated and all employees
encouraged to go on vacation.
i.
Restrict access to computer equipment and data
files.
j.
Encrypt data and files.
k.
Protect data and files.
l.
Protect telephone lines.
m.
Use anti-virus software.
n.
Exercise strict control over sensitive data
The following step could help to mitigate
computer fraud:
a.
Conduct frequent software audit.
b.
Use a computer security officer.
c.
Monitor system activities regularly.
d.
Use fraud detection software.
e.
Make use of adequate insurance policy.
f.
Use backup copies of programs and data files in
a secured location.
g.
Activate contingency plan.
h.
Use software to monitor system activities.
i.
Call in the law enforcement agents for
investigation in order to recover possess if possible.
SOLUTION TO
SECTION B
SOLUTION TO
QUESTION 1
The name given to buying and
selling on the internet is called e-commerce
The four main variation of buying and selling on the
internet are:
(i)
Business to-commerce - B2C
(ii)
Business to-commerce -
B2B
(iii)
Commerce to-business -
C2B
(iv)
Commerce to-commerce - C2C
Advantages of selling on the
internet include the following:
a.
The ability to generate increased revenue
through online sales.
b.
There is reduction in the cost of production
through online deliveries.
c.
There will be attraction of new customers
through web marketing.
d.
There will be increased loyalty exiting
customers through improved web customer through improved web customer services
and support.
e.
There will be development of new web-based
markets and distribution channels for Kankan soda water.
f.
There will be improved profitability.
(a) Kankan is spending 5% of its N76
million budget.
This amounts to (5%100 x N76,
000, 000).
= N5 x 760, 000
= N3, 800, 000
(b)
Global digital divide is the term used
specifically to describe differences in
information Technology access capabilities between contributes and region of
the world.
(c)
A Banner advertisement to any advertisement that
appears on Web sites.
(d)
The
possible crimes that could be committed during buying and selling on the
internet include the following:
a.
The sharp practices of dubious marketers
b.
Dubious customer might change their e-mail
addresses once goods are supplied
b.
There could be creation and introduction of
computer viruses.
a.
Crackers
or Hacker frequency assault the internet and other networks to steal or damage
data programs.
c.
There could be unauthorized copying of software.
In order to aid
selling on the internet, Kankan Co. plc may adopt any three of the following
measures:
a.
Encryption of data as a means of protecting data
and other computer networking resources
b.
Use of firewalls
c.
Use o virus defends mechanisms
d.
Use of computer failure controls.
Advantages of
centralized processing
a.
There is a central control by management
b.
Consistent standard in developing and operations
c.
Centralized database open to all users
d.
Major hardware are concentrated in a single
place.
e.
Computer staffs are in a single location and
more expert staff are likely to be employed.
f.
Career paths may be more clearly defined for the
computer personnel.
g.
Cost of duplicating computer resources including
personnel in various locations are
saved
Disadvantages
of centralized processing
a.
High cost of communicating with end-users in
possibly
b.
Different locations
c.
Remoteness of i.e. users involvement is not
encouraged
d.
Vulnerable on central computer
e.
Special environment for computer system and
special training
f.
For user
are required. This could be very expensive
g.
Department secret is not encouraged.
Advantages of
Distributing processing
a. Different
locations are directly involved in processing
b. Low
communication cost
c. Vulnerable
to breakdown
d. Reliance
on central computer
e. Special
environment for computer system and special training
f.
For users are required. This could be very
expensive
g. Departmental
secret is not encouraged.
Advantages of
Distributing processing
a.
Different locations are directly involved in
processing
b.
Low communication cost
c.
Faster response, since processing is done at
each location
d.
Less impact caused by breakdown
e.
Provides subordinates with better knowledge and
job satisfaction
f.
There is greater flexing in system designed. The
system can cater for both specific needs of each local computer.
g.
There is a possibility if a distributed
database, Data is held in a number of locations, but any user can access all of
it for a global view.
h.
It is more economical to install smaller computers
at each of the user’s location rather that concentrating all workers on a
singles.
Disadvantages
of Distributing processing
a.
Control over development standard is difficult
b.
High hardware cost
c.
Duplication of data in different locations
d.
More staff is required
e.
The items of equipment used in the different
locations may not be compatibles with each other which may lead to problems of
incompatibility of data file.
Ways by which
the uses of information Technology can bring about improvements in productivity.
a. Faster
access to information and records
b. Automatic
processing and decision making
c. Availability
of wider range of information
d. Reduction
of errors caused by human processing
e. Automatic
monitoring of balance, stock level, etc.
f.
Productivity per labour will be higher,
particularly on routine and operational applications.
g. It
is easier to make alterations
h. Tidier
environment, since there is less paper work.
Ways through
which the use of information Technology sometimes harm productivity
a. If
not controlled properly, files and dated may be lost or corrupted
b. Competitors
may access confidential files through the network
c. Unauthorized
amendments to programs and files may be made for fraudulent purposes
d. Computer
virus may cause disastrous problems
e. Denial
of services when the computer is down.
SOLUTION TO
QUESTION 3
a.
Input hardware consist of devices through which
programs and data are sent into the computer.
b. Examples
of this input hardware are:
a. Keyboard
and monitor
b. Mouse
c. Scanner
d. Video
Cameras
e. Microphones
f.
Joystick
g. Magnetic
Ink Character Recognition (MICR)
h. Optical
Mark Recognition (OMR)
i.
Optical Character Recognition (OCR)
j.
Digital tablets
Volatile storage device is a computer device which is
unable to retain (store) data in the absence of electric power, an example is Random Access Memory (RAM).
Non-volatile storage device id the computer storage
device like Read Only Memory (ROM), which retains its state in the absence of
electrical power to hold the computer’s initial instructions and data.
Outsourcing is the use of an outside organization or
third party to perform services which otherwise would have been done within the
organization.
Advantages
a. Outsourcing
could reduce cost, since the salaries of permanent staff are not involved.
b. It
provides the advantage of special skills, expertise and dedication of the party
company.
c. It
frees management of focus on its core business.
Disadvantages
a. Binds/locks
the company to a provider
b. Denies
the company the opportunity of
understanding the processes better
c. Possibility
of loss of confidentiality
d. There
could be conflicting objectives. While the outstanding organization could be
interested in cost project minimization, the parent organization will be
interested in maximizing the performance of business benefits.
SOLUTION TO
QUESTION 5
(a) An
e-business based enterprise is one that uses the internet, intrantets,
extranets and other computer networks is support electronic commerce and other
business processes and payments are made electronically.
(b) E-business
system should be periodically examined or audited by internal auditing staff as
well as auditors to review and evaluate whether proper and adequate security
measured and management have been adhered to and implemented.
This typically involves verification of the accuracy
and integrity of the e-business software as well as the input of data and
output product using special test program or audit software packages.
Another objective of the e-business system audit is to
test the integrity of an application’s audit trail itself. The audit trail may
begin with a transactions’ appearance on a source document to its
transformation and finally to output document by searching electronically
through disks and tape files of pass activities.
Security
measures that are commonly used to protect E-business systems and networks
include:
a.
Implementation of firewalls
b.
Installation of encryption mechanism
c.
Use of biometric measures
d.
Use of antivirus software
e.
Password protection mechanism
f.
Use of computer failure monitor
g.
The integration of disaster recovery measures
h.
Acquisition of system tools
i.
Protection of system configuration parameters.
A website is a
place on the internet where an individual, company or organization has
information about itself.
Reasons for a
business organization choosing to develop and maintain a website are to:
a.
sell or market products and services
b.
advertised products and services
c.
promote corporate image
d.
provide information
e.
reach out to several people simultaneously.
A.
Advantages
of automobile include:
B.
Increased
of productivity:
Output will increase as Computer will effectively take
over some or all of the manual chemicals.
(ii) Cost of reduction:
The cost of production of chemicals will fall.
(ii) More effective use of materials. When
there is no evidence of human mistakes, computers will generally make better use of resources
due to more accurate measuring and mxing. XYX may find that wastage of raw
material decreases, providing some cost saving.
(iv) Better
product quality:
Since accuracy of mixing raw materials and consistency
of mixing raw materials as well of fiscal output are essential, machines
(computers)tend to produce higher quality output than XYZ Organisation.
a. Improved safety:
b. Computers
do not get tired or make mistakes, so a safer production process should result
in use of robots.
c. Improved security:
d. Organization’s
information will be more secured.
e. Improved
storage facilities.
f.
Health hazard is reduced.
g. Over
stocking of product is reduced due to the use of stock-control software.
h. Workflow
will be stream lined and simplified.
i.
Less labour-intensive.
(c)
Disadvantages
of automation
(d)
Downsizing
or redundancies:
Redundancy, because
some human jobs will be replaced. XYZ will have to make redundancy payments.
Risk and
uncertainly resulting from change. The change will introduce a higher degree of
risk and uncertainly into the organization.
Higher capital expenditure:
Budgets will
need to be prepared to help the board decide whether or not to invest
automatically; because initial cost of automation will be enormous:
Increased unit maintenance cost: Maintenance
of the equipment will be essential or the quality of chemicals could
deteriorate.
Possibility that jobs may become
dehumanized:
Workers will be
required to maintain machines rather than perform more interesting jobs. This
may have a negative impact on moral, affecting the efficiencies gained by using
the new process.
SOLUTION TO QUESTION 3
Software:
It is a generic name given to a set of programs, document, procedures
and routines associated with the operation of a computer system.
There are two basic types of
software and they are:
(i)
System software
(ii)
Application software
System and application
software:
System software consists of all programs that control and monitor the
operation of the computer resource that are available in a computer
instillation. They also perform some system activities such as loading of
programs into memory and compilation of source programs. They are mostly
provided by the manufacturers. Example – Operating System (OS). Translator,
Utility programs, Loaders, Loaders, Editors.
Application software consist of programs intended to solve particular
problems or performs specific tasks. They are written by users themselves or
acquired from manufacturer as packaged.
Examples: payroll, word processing, spreadsheet packages graphical
packages, database packages etc.
A computer is a system software language processor that converts
programs written in a high-level code to machine readable codes or machine
executable code. Compiler produces a set of object programs that could be
executed later.
SOLUTION TO QUESTION 6
E-marking is an electronic communication system for linking buyers and
seller. It allows companies to sell products to any person in the world, given
that they have appropriate internet access.
a.
It provides access to global market place.
b.
Any organization, no matter the size, can
maintain a website which is viewable
worldwide, thus without incurring the cost of setting up sales
departments in many different countries.
c.
It makes it cheap to set up and maintain
internet sites.
d.
Product awareness can be increased by
appropriate use of internet advertising.
Access to databases are allowed, no matter where they are located
within the organization. Obtaining and sharing of information will easily be
supported between workers throughout the organization.
Training cost are limited because most employees will already be
familiar with browser technology from the use of the internet.
Information can be provided in more user-friendly format, which will
help encourage the use of intranet.
No comments:
Post a Comment