Structured programming is BEST described as a technique that:
A. provides knowledge of program functions to other
programmers via peer reviews.
B. reduces the maintenance time of programs by the use of
small-scale program modules.
C. makes the readable coding reflect as closely as possible
the dynamic execution of the program.
D. controls the coding and testing of the high-level
functions of the program in the development process.
Answer / guest
Answer: B
A characteristic of structured programming is smaller,
workable units. Structured programming has evolved because
smaller, workable units are easier to maintain. Structured
programming is a style of programming which restricts the
kinds of control structures. This limitation is not
crippling any program can be written with allowed control
structures. Structured programming is sometimes referred to
as go-to-less programming, since a go-to statement is not
allowed. This is perhaps the most well known restriction of
the style, since go-to statements were common at the time
structured programming was becoming more popular. Statement
labels also become unnecessary, except in languages where
subroutines are identified by labels.
| Is This Answer Correct ? | 10 Yes | 2 No |
Classification of information systems is essential in business continuity planning. Which of the following system types can not be replaced by manual methods? A. Critical system B. Vital system C. Sensitive system D. Non-critical system
What type of transmission requires modems? A. Encrypted B. Digital C. Analog D. Modulated
In which of the following phases of the system development life cycle (SDLC) is it the MOST important for the IS auditor to participate? A. Design B. Testing C. Programming D. Implementation
If inadequate, which of the following would be the MOST likely contributor to a denial-of-service attack? A. Router configuration and rules B. Design of the internal network C. Updates to the router system software D. Audit testing and review techniques
Neural networks are effective in detecting fraud because they can: A. discover new trends since they are inherently linear. B. solve problems where large and general sets of training data are not obtainable. C. attack problems that require consideration of a large number of input variables. D. make assumptions about the shape of any curve relating variables to the output.
To develop a successful business continuity plan, end user involvement is critical during which of the following phases? A. Business recovery strategy B. Detailed plan development C. Business impact analysis D. Testing and maintenance
When performing an audit of access rights, an IS auditor should be suspicious of which of the following if allocated to a computer operator? A. READ access to data B. DELETE access to transaction data files C. Logged READ/EXECUTE access to programs D. UPDATE access to job control language/script files
When developing a risk management program, the FIRST activity to be performed is a/an: A. threats assessment. B. classification of data. C. inventory of assets. D. criticality analysis.
Which of the following is the MOST important function to be performed by IS management when a service has been outsource? A. Ensuring that invoices are paid to the provider B. Participating in systems design with the provider C. Renegotiating the provider's fees D. Monitoring the outsourcing provider's performance
The most likely error to occur when implementing a firewall is: A. incorrectly configuring the access lists. B. compromising the passwords due to social engineering. C. connecting a modem to the computers in the network. D. inadequately protecting the network and server from virus attacks.
Which of the following should be included in an organization's IS security policy? A. A list of key IT resources to be secured B. The basis for access authorization C. Identity of sensitive security features D. Relevant software security features
An IS auditor doing penetration testing during an audit of Internet connections would: A. evaluate configurations. B. examine security settings. C. ensure virus-scanning software is in use. D. use tools and techniques that are available to a hacker.