Peer reviews to detect software errors during a program development activity are called: A. emulation techniques. B. structured walk-throughs. C. modular program techniques. D. top-down program construction.
1 6029A programmer included a routine into a payroll application to search for his/her own payroll number. As a result, if this payroll number does not appear during the payroll run, a routine will generate and place random numbers onto every paycheck. This routine is known as: A. scavenging. B. data leakage. C. piggybacking. D. a trojan horse.
1 5716An IS auditor discovers that programmers have update access to the live environment. In this situation, the IS auditor is LEAST likely to be concerned that programmers can: A. authorize transactions. B. add transactions directly to the database. C. make modifications to programs directly. D. access data from live environment and provide faster maintenance.
1 4801A company performs full backup of data and programs on a regular basis. The primary purpose of this practice is to: A. maintain data integrity in the applications. B. restore application processing after a disruption. C. prevent unauthorized changes to programs and data. D. ensure recovery of data processing in case of a disaster.
2 5278Using test data as part of a comprehensive test of program controls in a continuous online manner is called a/an: A. test data/deck. B. base case system evaluation. C. integrated test facility (ITF). D. parallel simulation.
1 7862A programmer managed to gain access to the production library, modified a program that was then used to update a sensitive table in the payroll database and restored the original program. Which of the following methods would MOST effectively detect this type of unauthorized changes? A. Source code comparison B. Executable code comparison C. Integrated test facilities (ITF) D. Review of transaction log files
1 4124Which of the following facilitates program maintenance? A. More cohesive and loosely coupled programs B. Less cohesive and loosely coupled programs C. More cohesive and strongly coupled programs D. Less cohesive and strongly coupled programs
1 8637When developing a risk management program, the FIRST activity to be performed is a/an: A. threats assessment. B. classification of data. C. inventory of assets. D. criticality analysis.
1 14329An independent software program that connects two otherwise separate applications sharing computing resources across heterogeneous technologies is known as: A. middleware. B. firmware. C. application software. D. embedded systems.
1 7379Which of the following is a strength of the program evaluation review technique (PERT) over other techniques? PERT: A. considers different scenarios for planning and control projects. B. allows the user to input program and system parameters. C. tests system maintenance processes accurately. D. estimates costs of system projects.
1 6933A tax calculation program maintains several hundred tax rates. The BEST control to ensure that tax rates entered into the program are accurate is: A. an independent review of the transaction listing. B. a programmed edit check to prevent entry of invalid data. C. programmed reasonableness checks with 20 percent data entry range. D. a visual verification of data entered by the processing department.
1 5787In regard to moving an application program from the test environment to the production environment, the BEST control would be provided by having the: A. application programmer copy the source program and compiled object module to the production libraries. B. as paul says, C. production control group compile the object module to the production libraries using the source program in the test environment. D. production control group copy the source program to the production libraries and then compile the program.
1 4676If an application program is modified and proper system maintenance procedures are in place, which of the following should be tested? The: A. integrity of the database B. access controls for the applications programmer C. complete program, including any interface systems D. segment of the program containing the revised code
1 6262In a system development project the purpose of the program and procedure development phase is to: A. prepare, test and document all programs and manual procedures. B. document a business or system problem to a level at which management can select a solution. C. prepare a high-level design of a proposed system solution and present reasons for adopting a solution. D. expand the general design of an approved solution so that program and procedure writing can begin.
1 5384The purpose of debugging programs is to: A. generate random data that can be used to test programs before implementing them. B. protect valid changes from being overwritten by other changes during programming. C. define the program development and maintenance costs to be include in the feasibility study. D. ensure that abnormal terminations and coding flaws are detected and corrected.
1 4245
How will you make .NET programs work in Linux ?
Discuss your Reward/Recognition programs?
we have 10 concurrent programs under one request group out of 10 ccps all users submitting only 9 programs from srs window remaining one ccp for specific user how can it possible send me answer asap.
What are the key issues that should be addressed in the design, conduct, and evaluation of training programs?
What are the key isssues that should be addressed in the design, conduct, and evaluation of training programs?
What are the key issues that should be addressed in the design, conduct and evaluation of training programs?
I have to write Shells (Linux + Unix)for publishing packages and reports. Is it possible ? What are the differents executable programs ineed to call ?
name poneno dept sun 9894433467 computer This is the xls sheet a programs written to transfer this data into database write test cases and test scenario?
WHAT ARE 19 MODELS OF EDUCATIONAL COUNSELLING? What is the most essentila thing that you consider while formulating any HR policy? In any consulting firm, the time devoted doesn't matter. all that matters is the productivity. What kind of HR and leave policy will you formulate to ensure discipline and time line working along with the increased productivity what is databank in recruitment process why u choose MBA after sicence bacground in graduation what is patent rights and copy rights what is the difference between direct investment and FDI what is the difference between direct investment and FDI what is the difference between patent rights and copy rights what is quality of work life What is KRA and KPI? Wat is recruitment & How is the Recruitment Scenario in todays global market? what is meant by managerial grid why did u select HR as your carrier what is sensex and nifty,what is the difference between those two what is the difference between CEO,MD,PRESIDENT,CHAIRMAN why do u select to do MBA in HR after doing B.Sc in physics? what is the performance management and what are the methods to use in evaluating performance? What is Learning? Please do make a reply to this question: I am bored taking interviews. Please motivate me in taking interview of yours. Trade Unions? what is sensex and nifty,what is the difference between those two What are Incentives? What is Fringe Benefits? What is Employee Morale? what are your positives and negatives as a HR? What is the best way to develop pay systems that are understandable, workable, and acceptable to employees at all levels? What is Coordination? What is the Difference between salary and wage? what is ur great weekness what is the importance of hr in the life of business? What is wages? What are the key issues that should be addressed in the design, conduct, and evaluation of training programs? where u see yourself after 10 years As jobs become more team-oriented, assessment centers will be used more often for non-management jobs. Do you agree or disagree? What is HRD? What did you like in your previous job? What is Fringe Benefits? What are the latest employee evalution trends? What is the Difference between salary and wage? why do u select to do MBA in HR after doing B.Sc in physics? What is HCN?s? what is the importance of hr in the life of business? How much do you think we should pay you?Do you know how much other companies are paying? What is the best way to develop pay systems that are understandable, Workable, and acceptable to employees at all levels? Difference between Training and Development? What is Different between Recruitment and Selection What is "mutual gains negotiation"? Selection means? Trade Unions? what is 360 degree performance appraisal? what is meant by an organisation,explain me differently What is On the Job Training? Management Guru,Professor Lallus Rail , a book was written by? What is Workers Compensation? why should i select you? Roles and Responsibilities of a HR ? How much do you think we should pay you?Do you know how much other companies are paying? In a room there are 3bulbs, and in the net room there are 3 switches. one can not see through the rooms, then how can you know that which switch is for which bulb with out taking any one's help? Define Motivation? What are the key issues that should be addressed in the design, conduct, and evaluation of training programs? What is "mutual gains negotiation"? what is Persoanl Management? What is HRM? What are Incentives?
The OS is a program that uses various data structures. Like
all programs in execution, you can determine the
performance and other behavior of the OS by inspecting its
state - the values stored in its data structures. In this
part of the assignment, we study some aspects of the
organization and behavior of a Linux system by observing
values of kernel data structures exposed through the /proc
virtual file system.
The /proc virtual file system:
Linux uses the /proc file system to collect information
from kernel data structures. The /proc implementation
provided with Linux can read many different kernel data
structures. If you cd to /proc on a Linux machine, you will
see a number of files and directories at that location.
Files in this directory subtree each corresponds to some
kernel data structure. The subdirectories with numeric
names contain virtual files with information about the
process whose process ID is the same as the directory name.
Files in /proc can be read like ordinary ASCII files. You
can open each file and read it using library routines such
as fgets() or fscanf(). The proc (5) manual page explains
the virtual files and their content available through
the /proc file system.
Requirements in detail:
In this part, you are asked to write a program to report
the behavior of the Linux kernel. Your program should run
in two different versions. The default version should print
the following values on stdout:
• Processor type
• Kernel version
• The amount of memory configured into this computer
• Amount of time since the system was last booted
A second version of the program should run continuously and
print lists of the following dynamic values (each value in
the lists is the average over a specified interval):
• The percentage of time the processor(s) spend in
user mode, system mode, and the percentage of time the
processor(s) are idle
• The amount and percentage of available (or free)
memory
• The rate (number of sectors per second) of disk
read/write in the system
• The rate (number per second) of context switches in
the kernel
• The rate (number per second) of process creations
in the system
If your program (compiled executable) is called proc_parse,
running it without any parameter should print out
information required for the first version. Running it with
two parameters "proc_parse
Hey this is venkatesh.Please can any body tell me what is SFLNXTCHG?where we use this keyword?what perpuse we use this?Can you tell me in real time senario with example? And in 7 specification(RPG/400)what is the mandatory specification using programs?
What is the technical flow associated with P2P or Procure to Pay cycle like the tables, APIs, concurrent programs involved in this cycle. Only technical please.
How to draw the flowchart for structure programs?
As per interoperatbility programs written in one language can be used by other language. How can we restrict the features of one language (say C#) in the programmer written in another language (say VB)..for example we have some features like operator overloading which is possible C#.NET (not in VB.NET), how can we restrict that when we are using this code in VB.NET.
What if you are not accepted in the schools you are applying for? ifyou didn't get into any programs?