Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Systems Analysis and Design 5.28-5.33 I need The Best answer for study please. T

ID: 399262 • Letter: S

Question

Systems Analysis and Design

5.28-5.33

I need The Best answer for study please.
Thanks

REVIEW QUESTIONS 5.23 Conurase the following erms: urn on investment 5.28 What are the potential consequences of not assessing the .29 Inwhat ways could you identify that one IS project is riskier 5.30 What are the ypes or categories of benefits of an IS .31 What intangible benefits might an organization obtain 5.32 Describe the concept of the time value of money. How technical risks associated with an information systems de a. Break-even analysis; present value; net present value; re- velopment project than another? projeci? from the development of an information system? does the discount rate affect the value of $1 today versus b. Economic feasibility, legal and contractual feasibility, operational feasibility; political feasibility; schedule feasibility C. Intangible benefit; tangible benefit d. Intangible cost; tangible cost planning process. all baseline plans the same? Why or why not economic cost-benefit analysis faceors. Is any factor most imponant? Why or why notu 5.24 List and describe the steps in the project initiation and 5.25 What is contained in a BPP? Are the content and format of one year from today? 5.26 Describe three commonly used methods for performing 53 Describe the surucured walk-through process. What roles need to be performed during a walk-through? 5.27 List and discuss the different types of project feasibility

Explanation / Answer

5.28 -


Information systems are directly based on digital Technologies which are vulnerable to destruction as well as error and abuse. This type of systems used in data warehouse or big data management to improve the overall availability of data management programs which is very vulnerable as devices can be unreliable. Hacking is also called the most important factor which is being prominent at current day state. Hacking directly exposes all the information stored in the information systems to the outer world which is very harmful in terms of operation of our organisation. As this data could be disastrous for a firm or its customers.
Hacking can be very dangerous for any organisation as it directly increases the chances of the information leak to the competitors as well as to the other factors which could lead to a disastrous position for the organisation in terms of If the data goes in the wrong hands. Sometimes hacking also relates with taking run some from the organisations to unlock the specific computers are the information systems which reduces the overall profits of the organisation as this type of approach would require extra expenses in form of providing ransom to hackers.

Example -

Once my email account was hacked by an unknown hacker who asked for ransom in exchange of providing the password. I reported the same to the cyber crime department and later my account was recovered and the hacker was captured by the cyber crime department as they were able to track the location using the IP address used to login into my email account.
I used to work at an FM station as an internal and the computers in the workplace were affected by ransom virus. All the files inside the computers were encrypted and it was asking for a password in form of exchange for an amount. As there was no way out to get the specific data by without paying ransom, our organisation paid $200 to the hackers for each and every computer inside your organisation to obtain password for the data.

P.S.- please use a separate Threads to ask multiple long questions in one go.