A debugging tool, which reports on the sequence of steps
executed by a program, is called a/an:
A. output analyzer.
B. memory dump.
C. compiler.
D. logic path monitor.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
Logic path monitors report on the sequence of steps executed
by a program. This provides the programmer with clues to
logic errors, if any, in the program. An output analyzer
checks the results of a program for accuracy by comparing
the expected results with the actual results. A memory dump
provides a picture of the content of a computer's internal
memory at any point of time, often when the program aborted,
thus providing information on inconsistencies in data or
parameter values. Though compilers have some potential to
provide feedback to a programmer, they are not generally
considered a debugging tool.
Is This Answer Correct ? | 10 Yes | 0 No |
Answer / rfruelda
D. Logic path monitor
Logic path monitors report on the sequence of steps
executed by a program. This provides the programmer with
clues to logic errors, if any, in the program. An output
analyzer checks the results of a program for accuracy by
comparing the expected results with the actual results. A
memory dump provides a picture of the content of a
computer's internal memory at any point in time, often when
the program is aborted, thus providing information on
inconsistencies in data or parameter values. Though
compilers have some potential to provide feedback to a
programmer, they are not generally considered a debugging
tool.
Is This Answer Correct ? | 3 Yes | 0 No |
When implementing and application software package, which of the following presents the GREATEST risk? A. Uncontrolled multiple software versions B. Source programs that are not synchronized with object code C. Incorrectly set parameters D. Programming errors
In large corporate networks having supply partners across the globe, network traffic may continue to rise. The infrastructure components in such environments should be scalable. Which of the following firewall architectures limits future scalability? A. Appliances B. Operating system based C. Host based D. Demilitarized
Which of the following is the PRIMARY reason for involving an IS auditor in the definition of a system's requirements? A. Post-application reviews do not need to be performed. B. Total budgeted system development costs can be reduced. C. It is costly to institute controls after a system becomes operational. D. The extent of user involvement in design activities is reduced.
A primary benefit derived from an organization employing control self-assessment (CSA) techniques is that it:
A digital signature contains a message digest to: A. show if the message has been altered after transmission. B. define the encryption algorithm. C. confirm the identity of the originator. D. enable message transmission in a digital format.
The quality assurance group is typically responsible for: A. ensuring that the output received from system processing is complete. B. monitoring the execution of computer processing tasks. C. ensuring that programs and program changes and documentation adhere to established standards. D. designing procedures to protect data against accidental disclosure, modification or destruction.
Which of the following is the BEST audit procedure to determine if a firewall is configured in compliance with an organization's security policy? A. Review the parameter settings B. Interview the firewall administrator C. Review the actual procedures D. Review the device's log file for recent attacks
An IS auditor attempting to determine whether access to program documentation is restricted to authorized persons would MOST likely: A. evaluate the record retention plans for off-premises storage. B. interview programmers about the procedures currently being followed. C. compare utilization records to operations schedules. D. review data file access records to test the librarian function.
An internal audit department, that organizationally reports exclusively to the chief financial officer (CFO) rather than to an audit committee, is MOST likely to: A. have its audit independence questioned. B. report more business-oriented and relevant findings. C. enhance the implementation of the auditor's recommendations. D. result in more effective action being taken on the recommendations.
When reviewing a service level agreement for an outsourced computer center an IS auditor should FIRST determine that: A. the cost proposed for the services is reasonable. B. security mechanisms are specified in the agreement. C. the services in the agreement are based on an analysis of business needs. D. audit access to the computer center is allowed under the agreement.
Which of the following processes describes risk assessment? Risk assessment is: A. subjective. B. objective. C. mathematical. D. statistical.
Connection-oriented protocols in the TCP/IP suite are implemented in the: A. transport layer. B. application layer. C. physical layer. D. network layer.