Good quality software is BEST achieved:
A. through thorough testing.
B. by finding and quickly correcting programming errors.
C. determining the amount of testing by the available time
and budget.
D. by applying well-defined processes and structured reviews
throughout the project.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
Testing can point to quality deficiencies, However, it
cannot by itself fix them. Corrective action at this point
in the project is expensive. While it is necessary to detect
and correct program errors, the bigger return comes from
detecting defects as they occur in upstream phases, such as
requirements and design. Choice C is representative of the
most common mistake when applying quality management to a
software project. It is seen as overhead, instead early
removal of defects has a substantial payback. Rework is
actually the largest cost driver on most software projects.
Choice D represents the core of achieving quality, that is,
following a well defined consistent process and effectively
reviewing key deliverables.
| Is This Answer Correct ? | 7 Yes | 0 No |
Answer / norasikin binti asin
how the organization should be developed so taht the
intended quality is achieved?
| Is This Answer Correct ? | 0 Yes | 3 No |
Which of the following represents the GREATEST potential risk in an EDI environment? A. Transaction authorization B. Loss or duplication of EDI transmissions C. Transmission delay D. Deletion or manipulation of transactions prior to or after establishment of application controls
Which of the following is the MOST critical and contributes the MOST to the quality of data in a data warehouse? A. Accuracy of the source data B. Credibility of the data source C. Accuracy of the extraction process D. Accuracy of the data transformation
Which of the following would be a compensating control to mitigate risks resulting from an inadequate segregation of duties? A. Sequence check B. Check digit C. Source documentation retention D. Batch control reconciliations
Which of the following network topologies yields the GREATEST redundancy in the event of the failure of one node? A. Mesh B. Star C. Ring D. Bus
An IS auditor reviewing operating system access discovers that the system is not secured properly. In this situation, the IS auditor is LEAST likely to be concerned that the user might: A. create new users. B. delete database and log files. C. access the system utility tools. D. access the system writeable directories.
Which of the following procedures would BEST determine whether adequate recovery/restart procedures exist? A. Reviewing program code B. Reviewing operations documentation C. Turning off the UPS, then the power D. Reviewing program documentation
E-mail message authenticity and confidentiality is BEST achieved by signing the message using the:
Which of the following would enable an enterprise to provide access to its intranet (i.e., extranet) across the Internet to its business partners? A. Virtual private network B. Client-server C. Dial-in access D. Network service provider
The potential for unauthorized system access by way of terminals or workstations within an organization's facility is increased when: A. connecting points are available in the facility to connect laptops to the network. B. users take precautions to keep their passwords confidential. C. terminals with password protection are located in unsecured locations. D. terminals are located within the facility in small clusters under the supervision of an administrator.
Which of the following would help to ensure the portability of an application connected to a database? The: A. verification of database import and export procedures. B. usage of a structured query language (SQL). C. analysis of stored procedures/triggers. D. synchronization of the entity-relation model with the database physical schema.
Which of the following audit procedures would an IS auditor normally perform FIRST when reviewing an organization's systems development methodology? A. Determine procedural adequacy. B. Analyze procedural effectiveness. C. Evaluate level of compliance with procedures. D. Compare established standards to observed procedures.
The PRIMARY reason for using digital signatures is to ensure data: A. confidentiality. B. integrity. C. availability. D. timeliness.