You are on page 1of 4

FATIN AQILLAH BINTI MOHAMMAD ADZUAN

a) Data redundancy and inconsistency. Next problem is difficulty in accessing data. Third problem is data
isolation which is have multiple files and formats. Lastly is integrity problems.
b) The process used to protect data sent in a VPN is called encryption. Encryption involves converting plain text
data into an unreadable form using encryption algorithms and keys. Data is encrypted at the sender's end,
making it secure during transmission. At the receiving end, the data is decrypted using the corresponding
decryption key to recover the original plaintext. Encryption ensures confidentiality and prevents unauthorized
access to sensitive information sent via VPN.

a) i) The method described is known as symmetric key encryption.

ii) Key A is known as the shared or secret key used by Alice and Bob for encryption. Key B is Bob's private
key used to decrypt the message.

iii)

b) i) First information system control is security rules. It is define appropriate security rules and policies to
protect the company's information systems from unauthorized access, data breaches and other security
threats. Second is threat awareness and management. It is identifying and understanding potential threats
to the company's information systems, such as malware, hacking attempts or social engineering, and
implementing measures to effectively mitigate and manage those threats.
ii) Security regulations focus on establishing guidelines and policies to ensure compliance and adherence
to security standards within the organization. While threat awareness and Management involves actively
identifying, analyzing and responding to potential threats to minimize risks and vulnerabilities in a
company's information systems.

a) Enterprise systems can simplify and streamline the onboarding process for new workers. This
involves activities including gathering individual data, controlling documents, creating user accounts,
and organizing training and orientation.

b) First benefit is provides fast customer service through a consumer's preferred social media platform
and second is enables customers to share their experiences with millions online.

a) Ecommerce marketing is the act of driving awareness and action toward a business that sells
its product or service electronically.

b) Via expanded reach and access to international markets Through e-commerce, firms can
connect with customers throughout the world, overcoming geographic limitations. For example,
an online retail business doesn't need to have retail locations to offer goods to clients all over
the world.

c) i) The e-commerce revenue model that Lazada uses is an online marketplace model.

ii) Lazada serves as a platform that connects buyers and sellers in the online marketplace model.
On the Lazada website, vendors may post their goods, and consumers can browse and buy
directly from a variety of vendors. Lazada makes money by charging sellers commissions or
other fees for each successful transaction that is made possible through the platform.
Question 1

Differentiate

Database Management Systems (DBMS) Non-Relational Databases


software system that allows for the storage, known as NoSQL databases, are designed to
organization, retrieval, and management of handle unstructured, semi-structured, and
structured data in a traditional relational highly variable data.
database format.
DBMS relies on structured query language Non-relational databases offer flexible schema
(SQL) for data manipulation and supports a models, allowing data to be stored in various
predefined schema. formats like key-value pairs, documents,
columnar, or graph structures.
Example: Oracle Database, MySQL, Microsoft Example: MongoDB (document database),
SQL Server Cassandra (columnar database), Neo4j (graph
database)

One example of an information system for each database is for DBMS is a company uses an Oracle
Database as its DBMS to store customer information, product data, and sales transactions. While for
non-relation is social media platform uses MongoDB as its non-relational database to store user
profiles, posts, and comments.

a) Mobile banking applications enable users to perform various banking tasks on their
smartphones, such as checking account balances, transferring funds, paying bills, and
managing investments. For example, bank's mobile banking app allows customers to view their
account balances, transfer funds between accounts, and pay bills.
b) Mobile marketing involves delivering targeted advertisements, promotions, and personalized
content to mobile device users. For example an e-commerce retailer uses push notifications to
send personalized product recommendations, exclusive offers, and discounts to customers who
have installed their mobile shopping app.
c) Mobile ticketing enables users to purchase and store tickets for various events, transportation
services, or attractions directly on their mobile devices. For example, a transportation company
offers a mobile ticketing app that allows commuters to purchase and display digital tickets for
bus or train rides.
d) Mobile reservation applications facilitate the booking of accommodations, dining reservations,
or appointment scheduling through mobile devices. For example, a restaurant reservation app
allows users to search for nearby restaurants, view availability, and make table reservations
directly from their smartphones.
e) Mobile entertainment applications provide users with access to various forms of entertainment,
including streaming services, gaming, social media platforms, and multimedia content. For
example, a video streaming app allows users to stream movies, TV shows, or live sports directly
on their smartphones.

You might also like