All: Identify a personal or business transaction you have conducted
recently (e.g., a banking transaction, making a purchase, visiting the
doctor, using the library, putting in your timesheet at work, using social
media, etc.). Discuss how a database is u
After reading chapter 9 you should be able to:
Understand that computer security risks come in the form of:
o Internet and network attacks
o system failures
o unauthorized access and use
o and information, hardware, and software thefts
Information System Development topic
1. All: What is the Systems Development Life Cycle (SDLC) (Chapter 10)? It is the six-phased
process that many organizations follow during systems analysis and design . Explain how your
organization implements or addre
I agree, it truly depends on the individual and what makes them effective in their position.
Unfortunately, we may never know what makes these individual thrive whether its high stress
levels, frequent flying, and or little to no rest that m
I agree with you about managers being able to read people and find it essential but an employee
must express themselves to the manager if they are not identifying the problem immediately.
Hopefully, the employee feel comfortable in doing so.