SlideShare a Scribd company logo
1 of 5
Week 1 Answer :
It is important to understand human beings and technology
interact in all information systems. This is important because
when humans understand their interaction with technology, they
will embrace its importance and help in managing and
controlling their use(Mjolsnes, 2011). In addition to that, this
knowledge helps humans to come up with innovative means to
make sure that their interaction with technology is profitable to
them.
It is important and necessary for businesses to educate their
employees on security matters. This is because when employees
understand the security of systems, they will avoid behaviors
that might risk the safety of their
systems (Seigneur, 2009). They will avoid sharing passwords of
the systems to unauthorized people.
References
Mjolsnes, S. F. (2011). A Multidisciplinary Introduction to
Information Security. Boca Raton, FL: CRC Press.
Seigneur, J. (2009). Collaborative Computer Security and Trust
Management. IGI Global.
Week 2 answer :
Just give me 4 sentences. Not able to find prev. answer.
Week 3 Answer :
A secure system needs a good and effective antivirus program.
Some antivirus is free so you do not need any cash to get the
protection. The antivirus programs are active each moment on
your computer to protect your files and your personal
information is always private and confidential. It also helps in
the scanning of documents. It is also not a must you log in to
windows for you to install the antivirus tool you can use a
computer that is functioning and use the antivirus tool that is
free to boot and then run on the computer that is infected. An
antivirus program with the scanning option is very good, very
important and very secure to your computer because the
scanning option helps identify a problem or a virus and stops it
before it erodes the computer. There are different types of free
antivirus programs: Some includes Aviva’s free software,
Smadav free software, Avast free software, and Bit defender
free software Antivirus (Ariwa & El-Qawasmeh, 2011).
The antivirus known as Bit defender provides protection to
your computer instantly against threats, worms, and virus
among others. It protects against anti-fraud and this helps to
provide security to your computer when using the internet to
browse and also during setting the computer. Bit defender
antivirus can perform many functions at the same time. These
functions include raging files and folders directly into the
program, Scan those programs (Studio, 2018).
In conclusion, the antivirus program helps to scan existing
files in the programs, email database, files that are achieved,
files that are executable, sectors that are bootable. It also helps
in identifying files that are bootable (Naumann, 2012). It also
helps in identifying files that have viruses. It is advisable to
scan and update your computer scanning software on a daily
basis or once it expires to ensure the protection of your
computer. To ensure that your computer is safe you must use
passwords, install an antivirus program that will help scan
programs and viruses in your computer.
References
Ariwa, E., & El-Qawasmeh, E. (2011). Digital Enterprise and
Information Systems: International Conference, DEIS 2011,
London, UK July 20 - 22, 2011, Proceedings. Basingstoke,
England: Springer.
Naumann, U. (2012). The Art of Differentiating Computer
Programs: An Introduction to Algorithmic Differentiation.
Philadelphia, PA: SIAM.
Studio, C. J. (2018). Free Antivirus And Antimalware Software
For Ubuntu & Linux Mint. Cyber Jannah Studio Publishing
Week 4 Answer :
The most compelling reason to migrate information to the cloud
Migrating information to that cloud has a lot of benefits
which make the process an ideal strategy for data management.
The first benefit of cloud computing is that it reduces
information system costs (Ahson & Ilyas, 2010). It minimizes
the cost that companies will incur to manage and maintain their
information technology system. The operating costs which are
reduced include the energy consumption, time used to access the
systems as well as the time needed to upgrade
system (Newcombe, 2012).
Security Concern of Migrating Information to the Cloud
The biggest security concern of migrating information to the
cloud includes the risk of being hacked and data stolen. This
has been a very serious thing that has been affecting cloud
services. In addition to that, there are high chances of the data
in the cloud to be attacked by viruses and malware (Noor, Sheng
& Bouguettaya, 2014).
References
Ahson, S. A., & Ilyas, M. (2010). Cloud Computing and
Software Services: Theory and Techniques. Boca Raton, FL:
CRC Press.
Newcombe, L. (2012). Securing Cloud Services: A pragmatic
approach to security architecture in the Cloud. IT Governance
Publishing.
Noor, T. H., Sheng, Q. Z., & Bouguettaya, A. (2014). Trust
Management in Cloud Services. Basingstoke, England:
Springer.
Week 5 Answer :
Cloud Computing
Cloud computing is very ideal in reducing the cost of
computing and as well enhances green computing. This is true
by the fact that cloud computing ensures that computers or other
digital devices are connected in a single
service (Srinivasan, 2014). This means that minimal resources
are used unlike when the computers were individually corrected
to their system. In addition to that, cloud computing reduces the
cost of managing the network since this can be done at a single
point without requiring a very big workforce to manage
it(Rao, 2015). In addition to that, cloud computing provides a
very important platform where computing services can be
properly secured against various cyber-attacks.
References
RAO, M. (2015). CLOUD COMPUTING. New Delhi, Delhi:
PHI Learning Pvt.
Srinivasan, S. (2014). Cloud Computing Basics. Basingstoke,
England: Springer.
Week 6 :
In the banking sector, the financial information system is the
most important system and is the mission-critical system. Banks
mostly deals with finances and therefore having an ideal
financial information system is a mandatory aspect. The system
is very important in providing data to day financial activities in
the bank. The system also holds very sensitive and confidential
data of the banks such as customers’ information and its
profitability information (Yap, 2011).
In case the system breaks down or gets lost, there are great
effects that can be experienced in the bank. It might loss
confidential financial data and even lost a lot of money. It can
also affect the clients whose data can be lost thus risking their
financial wellbeing (Wilson & Goddard, 2016).
References
Wilson, J. O., & Goddard, J. (2016). Banking: a Very Short
Introduction. Oxford University Press.
Yap, A. (2011). Information Systems for Global Financial
Markets: Emerging Developments and Effects: Emerging
Developments and Effects. IGI Global.
WEEK 7 :
Just give me 4 sentences. Not able to find prev. answer.
WEEK 8
Just give me 4 sentences. Not able to find prev. answer.

More Related Content

Similar to Week 1 Answer It is important to understand human beings and t.docx

Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxRunning head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
cowinhelen
 
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxSecurity Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
jeffreye3
 
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxRunning head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
jeanettehully
 
The literature and write report on information system security part 1 of 5 p...
The literature and write report on information system security  part 1 of 5 p...The literature and write report on information system security  part 1 of 5 p...
The literature and write report on information system security part 1 of 5 p...
raufik tajuddin
 
Running Head MALWARE1MALWARE2MalwareName.docx
Running Head MALWARE1MALWARE2MalwareName.docxRunning Head MALWARE1MALWARE2MalwareName.docx
Running Head MALWARE1MALWARE2MalwareName.docx
cowinhelen
 
Running head STUDY OF RANSOMWARE .docx
Running head STUDY OF RANSOMWARE                                 .docxRunning head STUDY OF RANSOMWARE                                 .docx
Running head STUDY OF RANSOMWARE .docx
jeanettehully
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
todd521
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
Kashif Ali
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docx
SALU18
 
Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx
Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docxRunning Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx
Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx
susanschei
 
TERM PAPER NETWORKING .docx
TERM PAPER NETWORKING                                     .docxTERM PAPER NETWORKING                                     .docx
TERM PAPER NETWORKING .docx
AASTHA76
 
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
zmark3
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
cuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 

Similar to Week 1 Answer It is important to understand human beings and t.docx (20)

WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
WHAT IS SOFTWARE ENGINEERING (CYBERSECURITY)
 
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docxRunning head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
Running head MANAGEMENT INFORMATION SYSTEM1MANAGEMENT INFORM.docx
 
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxSecurity Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docxRunning head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
Running head SECURITY RISKS IN DATABASE MIGRATION1SECURITY RIS.docx
 
The literature and write report on information system security part 1 of 5 p...
The literature and write report on information system security  part 1 of 5 p...The literature and write report on information system security  part 1 of 5 p...
The literature and write report on information system security part 1 of 5 p...
 
WPCCS 16 Presentation
WPCCS 16 PresentationWPCCS 16 Presentation
WPCCS 16 Presentation
 
Running Head MALWARE1MALWARE2MalwareName.docx
Running Head MALWARE1MALWARE2MalwareName.docxRunning Head MALWARE1MALWARE2MalwareName.docx
Running Head MALWARE1MALWARE2MalwareName.docx
 
Running head STUDY OF RANSOMWARE .docx
Running head STUDY OF RANSOMWARE                                 .docxRunning head STUDY OF RANSOMWARE                                 .docx
Running head STUDY OF RANSOMWARE .docx
 
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docxRunning Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
Running Head TRENDS IN CYBERSECURITY1TRENDS IN CYBERSECURITY.docx
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
AbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docxAbstractCloud computing technology has become the new fron.docx
AbstractCloud computing technology has become the new fron.docx
 
SYSTEM CONFIGURATION TOOLS
SYSTEM CONFIGURATION TOOLSSYSTEM CONFIGURATION TOOLS
SYSTEM CONFIGURATION TOOLS
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx
Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docxRunning Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx
Running Head Assignment 5 1INFRASTRUCTURE AND SECURITY6.docx
 
TERM PAPER NETWORKING .docx
TERM PAPER NETWORKING                                     .docxTERM PAPER NETWORKING                                     .docx
TERM PAPER NETWORKING .docx
 
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docxresponse.pdfresponseby Abc AbcSubmission date 14-Ma.docx
response.pdfresponseby Abc AbcSubmission date 14-Ma.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 

More from jessiehampson

Mingzhi HuFirst Paper352020POLS 203Applicati.docx
Mingzhi HuFirst Paper352020POLS 203Applicati.docxMingzhi HuFirst Paper352020POLS 203Applicati.docx
Mingzhi HuFirst Paper352020POLS 203Applicati.docx
jessiehampson
 
Miller, 1 Sarah Miller Professor Kristen Johnson C.docx
Miller, 1 Sarah Miller Professor Kristen Johnson C.docxMiller, 1 Sarah Miller Professor Kristen Johnson C.docx
Miller, 1 Sarah Miller Professor Kristen Johnson C.docx
jessiehampson
 
Michelle Wrote; There are several different reasons why an inter.docx
Michelle Wrote; There are several different reasons why an inter.docxMichelle Wrote; There are several different reasons why an inter.docx
Michelle Wrote; There are several different reasons why an inter.docx
jessiehampson
 
Midterm Lad Report 7Midterm Lab ReportIntroductionCell.docx
Midterm Lad Report     7Midterm Lab ReportIntroductionCell.docxMidterm Lad Report     7Midterm Lab ReportIntroductionCell.docx
Midterm Lad Report 7Midterm Lab ReportIntroductionCell.docx
jessiehampson
 
MILNETVisionMILNETs vision is to leverage the diverse mili.docx
MILNETVisionMILNETs vision is to leverage the diverse mili.docxMILNETVisionMILNETs vision is to leverage the diverse mili.docx
MILNETVisionMILNETs vision is to leverage the diverse mili.docx
jessiehampson
 
Midterm QuestionIs the movement towards human security a true .docx
Midterm QuestionIs the movement towards human security a true .docxMidterm QuestionIs the movement towards human security a true .docx
Midterm QuestionIs the movement towards human security a true .docx
jessiehampson
 
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docxMGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
jessiehampson
 
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
Microsoft Word Editing  Version 1.0Software Requirement Speci.docxMicrosoft Word Editing  Version 1.0Software Requirement Speci.docx
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
jessiehampson
 
MGT520 Critical Thinking Writing Rubric - Module 10 .docx
MGT520  Critical Thinking Writing Rubric - Module 10   .docxMGT520  Critical Thinking Writing Rubric - Module 10   .docx
MGT520 Critical Thinking Writing Rubric - Module 10 .docx
jessiehampson
 
Midterm PaperThe Midterm Paper is worth 100 points. It will .docx
Midterm PaperThe Midterm Paper is worth 100 points. It will .docxMidterm PaperThe Midterm Paper is worth 100 points. It will .docx
Midterm PaperThe Midterm Paper is worth 100 points. It will .docx
jessiehampson
 
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docxMGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
jessiehampson
 

More from jessiehampson (20)

Milestones Navigating Late Childhood to AdolescenceFrom the m.docx
Milestones Navigating Late Childhood to AdolescenceFrom the m.docxMilestones Navigating Late Childhood to AdolescenceFrom the m.docx
Milestones Navigating Late Childhood to AdolescenceFrom the m.docx
 
Migration and RefugeesMany immigrants in the region flee persecu.docx
Migration and RefugeesMany immigrants in the region flee persecu.docxMigration and RefugeesMany immigrants in the region flee persecu.docx
Migration and RefugeesMany immigrants in the region flee persecu.docx
 
Min-2 pagesThe goal is to develop a professional document, take .docx
Min-2 pagesThe goal is to develop a professional document, take .docxMin-2 pagesThe goal is to develop a professional document, take .docx
Min-2 pagesThe goal is to develop a professional document, take .docx
 
Mingzhi HuFirst Paper352020POLS 203Applicati.docx
Mingzhi HuFirst Paper352020POLS 203Applicati.docxMingzhi HuFirst Paper352020POLS 203Applicati.docx
Mingzhi HuFirst Paper352020POLS 203Applicati.docx
 
Miller, 1 Sarah Miller Professor Kristen Johnson C.docx
Miller, 1 Sarah Miller Professor Kristen Johnson C.docxMiller, 1 Sarah Miller Professor Kristen Johnson C.docx
Miller, 1 Sarah Miller Professor Kristen Johnson C.docx
 
Migrating to the Cloud Please respond to the following1. .docx
Migrating to the Cloud Please respond to the following1. .docxMigrating to the Cloud Please respond to the following1. .docx
Migrating to the Cloud Please respond to the following1. .docx
 
Mike, Ana, Tiffany, Josh and Annie are heading to the store to get.docx
Mike, Ana, Tiffany, Josh and Annie are heading to the store to get.docxMike, Ana, Tiffany, Josh and Annie are heading to the store to get.docx
Mike, Ana, Tiffany, Josh and Annie are heading to the store to get.docx
 
Michelle Wrote; There are several different reasons why an inter.docx
Michelle Wrote; There are several different reasons why an inter.docxMichelle Wrote; There are several different reasons why an inter.docx
Michelle Wrote; There are several different reasons why an inter.docx
 
Midterm Lad Report 7Midterm Lab ReportIntroductionCell.docx
Midterm Lad Report     7Midterm Lab ReportIntroductionCell.docxMidterm Lad Report     7Midterm Lab ReportIntroductionCell.docx
Midterm Lad Report 7Midterm Lab ReportIntroductionCell.docx
 
MicroEssay Identify a behavioral tendency that you believe.docx
MicroEssay Identify a behavioral tendency that you believe.docxMicroEssay Identify a behavioral tendency that you believe.docx
MicroEssay Identify a behavioral tendency that you believe.docx
 
MILNETVisionMILNETs vision is to leverage the diverse mili.docx
MILNETVisionMILNETs vision is to leverage the diverse mili.docxMILNETVisionMILNETs vision is to leverage the diverse mili.docx
MILNETVisionMILNETs vision is to leverage the diverse mili.docx
 
midtermAnswer all question with proper number atleast 1 and half.docx
midtermAnswer all question with proper number atleast 1 and half.docxmidtermAnswer all question with proper number atleast 1 and half.docx
midtermAnswer all question with proper number atleast 1 and half.docx
 
Midterm QuestionIs the movement towards human security a true .docx
Midterm QuestionIs the movement towards human security a true .docxMidterm QuestionIs the movement towards human security a true .docx
Midterm QuestionIs the movement towards human security a true .docx
 
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docxMGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
MGT526 v1Wk 2 – Apply Organizational AnalysisMGT526 v1Pag.docx
 
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
Microsoft Word Editing  Version 1.0Software Requirement Speci.docxMicrosoft Word Editing  Version 1.0Software Requirement Speci.docx
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
 
Microsoft Windows implements access controls by allowing organiz.docx
Microsoft Windows implements access controls by allowing organiz.docxMicrosoft Windows implements access controls by allowing organiz.docx
Microsoft Windows implements access controls by allowing organiz.docx
 
MGT520 Critical Thinking Writing Rubric - Module 10 .docx
MGT520  Critical Thinking Writing Rubric - Module 10   .docxMGT520  Critical Thinking Writing Rubric - Module 10   .docx
MGT520 Critical Thinking Writing Rubric - Module 10 .docx
 
Midterm PaperThe Midterm Paper is worth 100 points. It will .docx
Midterm PaperThe Midterm Paper is worth 100 points. It will .docxMidterm PaperThe Midterm Paper is worth 100 points. It will .docx
Midterm PaperThe Midterm Paper is worth 100 points. It will .docx
 
Miami Florida is considered ground zero for climate change, in parti.docx
Miami Florida is considered ground zero for climate change, in parti.docxMiami Florida is considered ground zero for climate change, in parti.docx
Miami Florida is considered ground zero for climate change, in parti.docx
 
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docxMGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docx
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Week 1 Answer It is important to understand human beings and t.docx

  • 1. Week 1 Answer : It is important to understand human beings and technology interact in all information systems. This is important because when humans understand their interaction with technology, they will embrace its importance and help in managing and controlling their use(Mjolsnes, 2011). In addition to that, this knowledge helps humans to come up with innovative means to make sure that their interaction with technology is profitable to them. It is important and necessary for businesses to educate their employees on security matters. This is because when employees understand the security of systems, they will avoid behaviors that might risk the safety of their systems (Seigneur, 2009). They will avoid sharing passwords of the systems to unauthorized people. References Mjolsnes, S. F. (2011). A Multidisciplinary Introduction to Information Security. Boca Raton, FL: CRC Press. Seigneur, J. (2009). Collaborative Computer Security and Trust Management. IGI Global. Week 2 answer : Just give me 4 sentences. Not able to find prev. answer. Week 3 Answer : A secure system needs a good and effective antivirus program. Some antivirus is free so you do not need any cash to get the protection. The antivirus programs are active each moment on
  • 2. your computer to protect your files and your personal information is always private and confidential. It also helps in the scanning of documents. It is also not a must you log in to windows for you to install the antivirus tool you can use a computer that is functioning and use the antivirus tool that is free to boot and then run on the computer that is infected. An antivirus program with the scanning option is very good, very important and very secure to your computer because the scanning option helps identify a problem or a virus and stops it before it erodes the computer. There are different types of free antivirus programs: Some includes Aviva’s free software, Smadav free software, Avast free software, and Bit defender free software Antivirus (Ariwa & El-Qawasmeh, 2011). The antivirus known as Bit defender provides protection to your computer instantly against threats, worms, and virus among others. It protects against anti-fraud and this helps to provide security to your computer when using the internet to browse and also during setting the computer. Bit defender antivirus can perform many functions at the same time. These functions include raging files and folders directly into the program, Scan those programs (Studio, 2018). In conclusion, the antivirus program helps to scan existing files in the programs, email database, files that are achieved, files that are executable, sectors that are bootable. It also helps in identifying files that are bootable (Naumann, 2012). It also helps in identifying files that have viruses. It is advisable to scan and update your computer scanning software on a daily basis or once it expires to ensure the protection of your computer. To ensure that your computer is safe you must use passwords, install an antivirus program that will help scan programs and viruses in your computer. References Ariwa, E., & El-Qawasmeh, E. (2011). Digital Enterprise and Information Systems: International Conference, DEIS 2011,
  • 3. London, UK July 20 - 22, 2011, Proceedings. Basingstoke, England: Springer. Naumann, U. (2012). The Art of Differentiating Computer Programs: An Introduction to Algorithmic Differentiation. Philadelphia, PA: SIAM. Studio, C. J. (2018). Free Antivirus And Antimalware Software For Ubuntu & Linux Mint. Cyber Jannah Studio Publishing Week 4 Answer : The most compelling reason to migrate information to the cloud Migrating information to that cloud has a lot of benefits which make the process an ideal strategy for data management. The first benefit of cloud computing is that it reduces information system costs (Ahson & Ilyas, 2010). It minimizes the cost that companies will incur to manage and maintain their information technology system. The operating costs which are reduced include the energy consumption, time used to access the systems as well as the time needed to upgrade system (Newcombe, 2012). Security Concern of Migrating Information to the Cloud The biggest security concern of migrating information to the cloud includes the risk of being hacked and data stolen. This has been a very serious thing that has been affecting cloud services. In addition to that, there are high chances of the data in the cloud to be attacked by viruses and malware (Noor, Sheng & Bouguettaya, 2014). References Ahson, S. A., & Ilyas, M. (2010). Cloud Computing and Software Services: Theory and Techniques. Boca Raton, FL: CRC Press.
  • 4. Newcombe, L. (2012). Securing Cloud Services: A pragmatic approach to security architecture in the Cloud. IT Governance Publishing. Noor, T. H., Sheng, Q. Z., & Bouguettaya, A. (2014). Trust Management in Cloud Services. Basingstoke, England: Springer. Week 5 Answer : Cloud Computing Cloud computing is very ideal in reducing the cost of computing and as well enhances green computing. This is true by the fact that cloud computing ensures that computers or other digital devices are connected in a single service (Srinivasan, 2014). This means that minimal resources are used unlike when the computers were individually corrected to their system. In addition to that, cloud computing reduces the cost of managing the network since this can be done at a single point without requiring a very big workforce to manage it(Rao, 2015). In addition to that, cloud computing provides a very important platform where computing services can be properly secured against various cyber-attacks. References RAO, M. (2015). CLOUD COMPUTING. New Delhi, Delhi: PHI Learning Pvt. Srinivasan, S. (2014). Cloud Computing Basics. Basingstoke, England: Springer. Week 6 : In the banking sector, the financial information system is the most important system and is the mission-critical system. Banks mostly deals with finances and therefore having an ideal financial information system is a mandatory aspect. The system is very important in providing data to day financial activities in the bank. The system also holds very sensitive and confidential data of the banks such as customers’ information and its
  • 5. profitability information (Yap, 2011). In case the system breaks down or gets lost, there are great effects that can be experienced in the bank. It might loss confidential financial data and even lost a lot of money. It can also affect the clients whose data can be lost thus risking their financial wellbeing (Wilson & Goddard, 2016). References Wilson, J. O., & Goddard, J. (2016). Banking: a Very Short Introduction. Oxford University Press. Yap, A. (2011). Information Systems for Global Financial Markets: Emerging Developments and Effects: Emerging Developments and Effects. IGI Global. WEEK 7 : Just give me 4 sentences. Not able to find prev. answer. WEEK 8 Just give me 4 sentences. Not able to find prev. answer.