BLOGGER TEMPLATES AND TWITTER BACKGROUNDS »

Monday, September 28, 2009

Test 2 (8 september 2009)

QUESTION 2 :

The sequence of events in the development of an information system (application), which requires mutual effort on the part of user and technical staff.

1. SYSTEMS ANALYSIS & DESIGN

feasibility study

general design

prototyping

detail design
functional specifications
2. USER SIGN OFF
3. PROGRAMMING
design
coding
testing
4. IMPLEMENTATION
training
conversion
installation
5. USER ACCEPTANCE


The process of developing a new system will have to follow a strict order of a cycle called the system development cycle.The activities in this system development firstly is planning.In planning it must review project requires.
Analysis is the second process in the system development cycle.Which is it must context pull monary investigation before developing a new system.
Thirdly is design for the nem system.To make a design the team must know that their design acquire hardware and software if necessary.
Lastly is implementation.Implementation process must be develop programs if necessary. Then install the new system to know the system is better with the process of the new system.Then convert the new system to replace the old system.

QUESTION 3 :

The advancement of computing industry and computer networking bring about major threat to mankind especially in the area of information privacy. Security is breached and identities are stolen by culprits for personal gain. Identify ways the culprits use to access personal information and what we can do to stop this issue once at all, by using the including available technologies that can determine our true identities especially when we go online.

The ways that the culprits use to access the personal information is by sending a spyware to the computer. This spyware will take the information about the users and send it to the culprits. Next, the culprits also may can use a virus in order to access the one's personal information where the virus for example will spoil or damage the security system of the computer. So, the computer will be easily exploited by the culprits. The example of these viruses are like worm and trojan. Worm virus will duplicate the files and will make the computer hang or jammed. The trojan virus will cause the infected files corrupted. So, if the security files of the computer will no longer protect the computer. Hence, the culprits can be easily access the person's personal information.



0 comments: