The purpose of debugging programs is to:
A. generate random data that can be used to test programs
before implementing them.
B. protect, during the programming phase, valid changes from
being overwritten by other changes.
C. define the program development and maintenance costs to
be include in the feasibility study.
D. ensure that program abnormal terminations and program
coding flaws are detected and corrected.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
Debugging provides the basis for the programmer to correct
the logic errors in a program under development before it
goes into production. Tools such as logic paths monitors,
memory dumps and output analyzers aid in this process.
| Is This Answer Correct ? | 16 Yes | 1 No |
Answer / antoine
D. ensure that program abnormal terminations and program
coding flaws are detected and corrected.
| Is This Answer Correct ? | 9 Yes | 1 No |
In an online transaction processing system, data integrity is maintained by ensuring that a transaction is either completed in its entirety or not at all. This principle of data integrity is known as: A. isolation. B. consistency. C. atomicity. D. durability.
An organization is introducing a single sign-on (SSO) system. Under the SSO system, users will be required to enter only one user ID and password for access to all application systems. Under the SSO system, unauthorized access: A. is less likely. B. is more likely. C. will have a greater impact. D. will have a smaller impact.
When reviewing an organization's logical access security, which of the following would be of the MOST concern to an IS auditor? A. Passwords are not shared. B. Password files are encrypted. C. Redundant logon IDs are deleted. D. The allocation of logon IDs is controlled.
Which of the following activities should the business continuity manager perform FIRST after the replacement of hardware at the primary information processing facility? A. Verify compatibility with the hot site. B. Review the implementation report. C. Perform a walk-through of the DRP. D. Update the IS assets inventory.
There are several methods of providing telecommunications continuity. The method of routing traffic through split cable or duplicate cable facilities is: A. alternative routing. B. diverse routing. C. long-haul network diversity. D. last mile circuit protection.
The PRIMARY advantage of a continuous audit approach is that it: A. does not require an IS auditor to collect evidence on system reliability while processing is taking place. B. requires the IS auditor to review and follow up immediately on all information collected. C. can improve system security when used in time-sharing environments that process a large number of transactions. D. does not depend on the complexity of an organization's computer systems.
The FIRST task an IS auditor should complete when performing an audit in an unfamiliar area is to: A. design the audit programs for each system or function involved. B. develop a set of compliance tests and substantive tests. C. gather background information pertinent to the new audit. D. assign human and economical resources.
Confidential data residing on a PC is BEST protected by: A. a password. B. file encryption. C. removable diskettes. D. a key operated power source.
Which of the following Internet security threats could compromise integrity? A. Theft of data from the client B. Exposure of network configuration information C. A trojan horse browser D. Eavesdropping on the net
Which of the following is the MOST effective control over visitor access to a data center? A. Visitors are escorted. B. Visitor badges are required. C. Visitors sign in. D. Visitors are spot-checked by operators.
What type of transmission requires modems? A. Encrypted B. Digital C. Analog D. Modulated
In which of the following network configurations would problem resolution be the easiest? A. Bus B. Ring C.Star D. Mesh