part 1 q1 answer each of the questions in this


Part 1: Q1) Answer each of the questions in this section. Choose the one statement which is the most appropriate answer and enter your answer below.

Possible Topics

  • The Golden Rule
  • Ethical issue
  • Copyright
  • Professional practice
  • Purpose of studying ethics
  • Malpractice
  • Professional Code of Conduct
  • The differences between laws and ethics
  • Ethical standards
  • Personal privacy
  • Business functions requiring information

Q2) Write a technical description of the functions which are available on a workstation for new students who may be unfamiliar with using computers.

TOPICS: computer and desk

  • Input devices: keyboard mouse
  • Output devices:moniters,printers
  • Software-word processor,spread sheet, other software
  • Enrolment and acess to use machines.

Descriptin should include:

  • Facts
  • Knowledge of audience
  • What inf they need
  • Section,topic, paragraph.
  • Introduction
  • Body
  • Conclusion

Q3) You have been asked to write an article to be published in a brochure entitled "How to develop a successful work group". Write an outline for such an article. Include, in point form, each major idea that you intend to write about in the article. Your outline should fit on one page. 

SHOULD INCLUDE   

Diversity, back grounds, skills, goals, represents all stake holders, increases likely acceptance, of the system, exposes team member to a range of ideas and views.   

Good communications team members must communicate clearly and completely with each other.

Putting the team first members, own views and goals, should be secondary to the goals and the views of the group, commitment to the team.

Trust requires mutual respect, improves effectiveness of communication.

Q4) Explain how the greater "reach" of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

Should include: reach refers to the location and people the infrastructure can connect

       -the longer the reach, the more numerous are the potential sources for trouble.

       -security threats: natural disaster, accident, cyber crime, Identify threat, industrial espionage, malicious damage, Fraud

Q5) Explain how the modern view of Customer Service has extended beyond the traditional view that customer expectations can be wholly satisfied by improving the quality of your products or lowering their prices.

Explain should include:

 

  • products- quality and price.
  • Services- what services and support you provide for yout products.
  • People- the expertise and knowledge of the people who represent you to the customers
  • Processes-the difficulty or otherwise of teh processes the customer has to go through in order to purchase your product.

Q6) Describe four major characteristics which distinguish professionals from ordinary business people, and illustrate each one by using the example of a typical member of a particular profession.

Characteristics:

  • Knowledge
  • Membership
  • Trust
  • Use of knowledge
  • Codes of conduct
  • Training
  • Licensing
  • Respect of community

Typical members: Soldier, doctor, priest, lawyer, engineer, system analyst, any other example.

Q7) Why is it considered important to know your customers? Identify two things that can be done to find out more about such people. 

Include: to determine the customer needs and desires in an effort to satisfy the needs:

  1. Survey and interview.
  2. Provide feedback opurtunities.
  3. Listening and talking to customers.
  4. Asking your customer questions.

Q8) Administrators of ICT in business today need to strike a balance between ease of use and system security.

Required: Discuss how a computer resource administrator might ensure system security and, at the same time, not make the system harder for the users to operate. Use your experience of formulating policies for a computer laboratory to illustrate your answer.

Include:

  • Behaviour in labs/ protecting the equipment
  • Easy use of equipment/ ensuring the s/w
  • Hard ware, data is not open to injury, damage and loss.
  • Personal privacy/ need to ensure only appropriate use of facilities.
  • Software piracy/ need to protect facilities owner from prosecution.
  • Cyber crime/ take all steps to watch for, report, cyber crime.
  • Information download /appropriate use and permission sought.

Q9) The guiding principle of User-Centered Design is that the human user should be the central focus in designing the elements of computer systems they must interact with. Explain how this principle was applied in your project to design a lab for International Students at a student hostel.

Request for Solution File

Ask an Expert for Answer!!
Other Subject: part 1 q1 answer each of the questions in this
Reference No:- TGS0443528

Expected delivery within 24 Hours