Академический Документы
Профессиональный Документы
Культура Документы
CAT 1 AND 2
NAME:
ADM NO:
1. Describe five technology and business trends that have enhanced the role of
Technology has evolved in many different ways. This way it has helped
businesses to improve their key factors in business environment. Technology also helps
business leverage and stay competitive. Five technologies that help in the business
shopping has improved tremendously which helps people buy and sell goods
online and get them delivered at the comfort of their home. Online shopping
provides shipping and delivery of goods from one place to another via online
services.
employers can earn directly through social media. Also social Medias can be
because people don’t need to sit in a desktop computer and access internet
and data visualization. E.g. Oil field learning through 3D visualization and
simulation
5. Cloud computing- cloud computing has enable businesses to setup what is
to hardware.
assessment should be carried out. List and briefly describe the items that a
A risk assessment is the combined effort of: identifying and analyzing potential
events that may negatively impact individuals, assets, and/or the environment; and making
judgments "on the tolerability of the risk on the basis of a risk analysis" while considering
objectives.
iii. Scope of this risk assessment- The General and the specific objective
assessment
(iii) Risk model- How to mitigate the risk in case there is an occurrence
conditions.
(iii) Data used by system- What data flow does the system contain. Is it safe?
assessment
6. Threat statement- The pre-final statement given so the threat can be analyzed and
controlled.
7. Risk assessment Results- The entire risk assessment report results, to determine the
risk involved
ii. State and justify the key elements of a disaster recovery plan.
Disaster recovery plan is the process of mitigating a risk or having a backup plan to control a
maintaining and controlling the disaster recovery plan. They help to plan and give out
(b) Identify and access disaster risks- Risks of the organization should be identified and
documents and resources which are mostly likely to be affected by the disaster should
(d) Specify backup and off-site procedures- These procedures should identify what to
back up, by whom, how to perform the backup, location of backup and how
frequently backups should occur. All critical applications, equipment, and documents
(e) Test and maintain in the Disaster Recovery Plan- Organizational routine process
should be done to ensure that the DRP is tested and maintained from time to time.
iii. Explain EACH of the following and state how this is achieved:
(a) A fault tolerant computer system-Fault tolerance refers to the ability of a system (computer,
network, cloud cluster, etc.) to continue operating without interruption when one or more of its
components fail. The objective of creating a fault-tolerant system is to prevent disruptions arising
(b) High availability computing- In computing, it refers to computers that are available and
can serve for a long period of time without failure. This aims to eliminate single points of
used, most of the problems we have with information systems will disappear. Do you
Yes I do agree with the above statement, this is because as the computer
systems are getting faster and cheaper and internet is being widely used, hence the problems of
information system would turn out to be more instead of less due to massive internet usage and
as the information system expert is important to pull the raw data into some useful information
which can be used for decision making in an organization and for specific analysis hence there
need would be more than what is needed now. As part of the SDLC approach also, planning,
creating, testing, and deploying the information system hence the need for information system
Briefly describe the range of threats that has given rise to these concerns, and
(a) Logic bomb- This are codes embedded in a program that is set to
(b) Trap doors- This are login programs written by developers to gain
unauthorized access.
(c) Login spoofing- This is a technique of collecting other users
passwords.
(a) Trojan horses- It looks like a useful system application but has a
(b) Virus- A program that infects other programs and makes copies of
itself which can spread in the whole system and take control of the
operating system.
(a) Strong Access Controls- This is to prevent unauthorized access in the system
(c) Standardize software- This is to ensure the users cannot install software without
approval
(d) Use Network Protection Measures- By using different software which control traffic
like firewall
If a group is well managed, its synergy should lead to an output that is greater than
the sum of the inputs of the individual members of the group. A group might not all
work in the same location and might only interact via a computer network.
i. Describe the software and hardware facilities that such an online group
would require and briefly explain why EACH of the items you describe is
necessary.
Software and hardware are the key components for the facilitation of online groups. Software
Software
(i) Zoom Meeting- This is a video conferencing meeting application that is used to
enable video of a group of people online. The main advantage of zoom meeting is it
(iii) Microsoft Teams- Teams is a chat-based collaboration tool that provides global,
remote, and dispersed teams with the ability to work together and share information
via a common space. You can utilize cool features like document collaboration, one-
Hardware
ii. An online group can easily lose its cohesiveness and deteriorate into a set of
Explain how you would manage such a group so that it retains its synergy.
(d) Team processes. A sense of unity is created through sharing clear goals which are
(f) Communication- This involves being clear, accurate, open and honest.
(g) Decision-making- This involves making sure that established procedures are in
place, that everybody is clear about leadership and an environment of trust is being
created.
References
plan-is-your-business-prepared/
Schmidtler, M. A., Dalal, G., & Kovalev, T. (2019). U.S. Patent No. 10,284,570.
Matthews, K. L., Baird, M., & Duchesne, G. (2018). Using online meeting