All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer sciences
databases
Questions and Answers of
Databases
What is systems operation?
What are the major steps of systems implementation?
What are some tools and techniques for software development?
Give three examples of an IS vendor.
How can SaaS be used in software acquisition?
What are the steps involved in testing the information system?
What are some of the reasons for program maintenance? Explain the types of maintenance.
How is system performance measurement related to the systems review?
What is interactive processing? What design factors should be taken into account for this type of processing?
How can the object-oriented approach be used during systems design?
What is the difference between logical and physical design?
What is environmental design?
What are the different types of software and database backup? Describe the procedure you use to back up your homework files.
Identify specific controls that are used to maintain input integrity and security.
What is an RFP? What is typically included in one? How is it used?
What activities go on during the user preparation phase of systems implementation?
Describe the participants in the systems design stage. How do these participants compare with the participants of systems investigation?
You have been hired to oversee a major systems development effort to purchase a new accounting software package. Describe what is important to include in the contract with the software vendor.
Assume that you are starting an Internet site to sell clothing. Describe how you would design the interactive processing system for this site. Draw a diagram showing the home page for the Web site.
Identify the various forms of testing. Why are there so many different types of tests?
What is the goal of conducting a systems review? What factors need to be considered during systems review?
Describe how you would select the best admissions software for your college or university. What features would be most important for school administrators? What features would be most important for
What issues might you expect to arise if you initiate the use of a request for maintenance form when none had been required previously? How would you deal with these issues?
Assume that you have a personal computer that is several years old. Describe the steps you would use to perform systems review to determine whether you should acquire a new PC.
Assume that you want to start a new video rental business for students at your college or university. Go through logical design for a new information system to help you keep track of the videos in
Assume that you are the owner of an online stock-trading company. Describe how you could design the trading system to recover from a disaster.
Identify some of the advantages and disadvantages of purchasing a database package instead of taking the DaaS approach.
Discuss the relationship between maintenance and systems design.
What are the advantages and disadvantages of the object oriented approach to systems implementation?
A project team has estimated the costs associated with the development and maintenance of a new system. One approach requires a more complete design and will result in a slightly higher design and
Assume that your project team has been working for three months to complete the systems design of a new Web-based customer ordering system. Two possible options seem to meet all users' needs. The
Rogers Communications is one of Canada's largest telecom companies. It offers home phone services, wireless phone services, Internet service, and cable TV service. Rogers provides small shops in 93
Northrop Grumman is a global defense and technology company specializing in information services, electronics, aerospace, and shipbuilding for government and commercial purposes. Northrop Grumman
1. What function(s) did the systems analysis report and the design report play in the creation of the AMCI system? 2. What precautions did Josh and Sandra take to make sure the AMCI system was stable
What is a spam filter? How does such a program work? What is the issue with image-based spam?
Identify at least five tips to follow to avoid becoming a victim of a computer scam.
What is the difference between a patent and a copyright? What copyright issues come into play when downloading software or music from a Web site?
What is the difference between the Children's Online Privacy Protection Act and the Children's Internet Protection Act?
What is ergonomics? How can it be applied to office workers?
What specific actions can you take to avoid spyware?
What is a code of ethics? Give an example.
How can antivirus software reduce computer waste?
Outline a four-step process to prevent computer waste and mistakes.
Why are all computer crimes not reported to law enforcement agencies?
What is a virus? What is a worm? How are they different?
What is a variant? What dangers are associated with such malware?
What is phishing? What actions can you take to reduce the likelihood that you will be a victim of this crime?
Outline measures you should take to protect yourself against viruses and worms.
What does intrusion detection software do? What are some of the issues with the use of this software?
Imagine that your friend regularly downloads copies of newly released, full-length motion pictures for free from the Internet and makes copies for others for a small fee. Do you think that this is
Briefly discuss the difference between acting morally and acting legally. Give an example of acting legally and yet immorally.
Outline an approach, including specific techniques (e.g., dumpster diving, phishing, social engineering) that you could employ to gain personal data about the members of your class.
Your 12-year-old niece shows you a dozen or so photos of herself and a brief biography including address and cell phone number she plans to post on MySpace. What advice might you offer her about
Imagine that you are a hacker and have developed a Trojan horse program. What tactics might you use to get unsuspecting victims to load the program onto their computer?
Discuss the importance of educating employees in preventing computer waste and computer crime. Imagine that you are given the assignment of developing a computer education program for your employer.
You are the new head of corporate security for a large Fortune 1000 company and are alarmed at the number of laptop computers your firm's employees lose each month. What actions would you take to cut
Do you believe that the National Security Agency should be able to collect the telephone call records of U.S. citizens without the use of search warrants? Why or why not?
Using information presented in this chapter on federal privacy legislation, identify which federal law regulates the following areas and situations: cross-checking IRS and Social Security files to
You are a senior member of a marketing organization for a manufacturer of children's toys. A recommendation has been made to develop a Web site to promote and sell your firm's products as well as
You have just begun a new position in customer relations for a mid-sized bank. Within your first week on the job, several customers have expressed concern about potential theft of customer data from
Sometimes in protecting a network, the ones to watch are within the organization. That's the lesson learned by the City of San Francisco. The city's network administrator for its multimillion dollar
Discussion Questions 1. Why do you think extending access to the Whitmann Price network beyond the business's walls dramatically elevated the risk to information security? 2. What was the primary
Showing 2900 - 3000
of 2962
First
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30