Question: 1 Global Tech Solutions, a mid - sized software company, has been approached by a large retail chain, MegaMart, to develop a new inventory management

1 Global Tech Solutions, a mid-sized software company, has been approached by a large retail chain,
MegaMart, to develop a new inventory management system. MegaMart wants to streamline its
supply chain, improve stock accuracy, and enhance customer satisfaction. The system needs to
integrate with existing point-of-sale systems and provide real-time updates to both store managers
and warehouse staff.
a) Identify and briefly describe the roles of five key participants who should be involved in this
systems development project.
b) For each of the following SDLC approaches, explain how the project might be executed and discuss
one advantage and one disadvantage of using that approach for this specific project:
i) Traditional SDLC
ii) Prototyping
iii) Rapid Application Development (RAD)
iv) End-User Development
c) Based on the scenario and your analysis in part (b), recommend the most suitable SDLC approach
for this project. Justify your choice with two specific reasons related to the project requirements or
constraints.
Your answer should demonstrate a clear understanding of the different roles in systems
development, the characteristics of each SDLC approach, and the ability to apply this knowledge to
a real-world scenario.
[20 Marks]
3.2 TechSecure, a medium-sized financial services company, has recently experienced a series of
cybersecurity incidents. The company's IT department is concerned about the increasing
sophistication of these attacks and wants to educate employees about various types of computer
crimes and protective measures.
a) Define computer crime and briefly explain its potential impact on businesses like TechSecure.
b) TechSecure has identified several specific threats. Identify and explain at least five threat that
TechSecure may face. Discuss countermeasures that TechSecure could implement to protect against
these threats. For each countermeasure:
Briefly explain how it works
Describe its effectiveness against the identified threats
Your answer should demonstrate a clear understanding of various types of computer crimes, their
potential impacts, and the role of different security measures in protecting against these threats.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!