Question: 1 Global Tech Solutions, a mid - sized software company, has been approached by a large retail chain, MegaMart, to develop a new inventory management
Global Tech Solutions, a midsized software company, has been approached by a large retail chain,
MegaMart, to develop a new inventory management system. MegaMart wants to streamline its
supply chain, improve stock accuracy, and enhance customer satisfaction. The system needs to
integrate with existing pointofsale systems and provide realtime updates to both store managers
and warehouse staff.
a Identify and briefly describe the roles of five key participants who should be involved in this
systems development project.
b For each of the following SDLC approaches, explain how the project might be executed and discuss
one advantage and one disadvantage of using that approach for this specific project:
i Traditional SDLC
ii Prototyping
iii Rapid Application Development RAD
iv EndUser Development
c Based on the scenario and your analysis in part b recommend the most suitable SDLC approach
for this project. Justify your choice with two specific reasons related to the project requirements or
constraints.
Your answer should demonstrate a clear understanding of the different roles in systems
development, the characteristics of each SDLC approach, and the ability to apply this knowledge to
a realworld scenario.
Marks
TechSecure, a mediumsized financial services company, has recently experienced a series of
cybersecurity incidents. The company's IT department is concerned about the increasing
sophistication of these attacks and wants to educate employees about various types of computer
crimes and protective measures.
a Define computer crime and briefly explain its potential impact on businesses like TechSecure.
b TechSecure has identified several specific threats. Identify and explain at least five threat that
TechSecure may face. Discuss countermeasures that TechSecure could implement to protect against
these threats. For each countermeasure:
Briefly explain how it works
Describe its effectiveness against the identified threats
Your answer should demonstrate a clear understanding of various types of computer crimes, their
potential impacts, and the role of different security measures in protecting against these threats.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
