A debugging tool, which reports on the sequence of steps
executed by a program, is called a/an:
A. output analyzer.
B. memory dump.
C. compiler.
D. logic path monitor.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
Logic path monitors report on the sequence of steps executed
by a program. This provides the programmer with clues to
logic errors, if any, in the program. An output analyzer
checks the results of a program for accuracy by comparing
the expected results with the actual results. A memory dump
provides a picture of the content of a computer's internal
memory at any point of time, often when the program aborted,
thus providing information on inconsistencies in data or
parameter values. Though compilers have some potential to
provide feedback to a programmer, they are not generally
considered a debugging tool.
Is This Answer Correct ? | 10 Yes | 0 No |
Answer / rfruelda
D. Logic path monitor
Logic path monitors report on the sequence of steps
executed by a program. This provides the programmer with
clues to logic errors, if any, in the program. An output
analyzer checks the results of a program for accuracy by
comparing the expected results with the actual results. A
memory dump provides a picture of the content of a
computer's internal memory at any point in time, often when
the program is aborted, thus providing information on
inconsistencies in data or parameter values. Though
compilers have some potential to provide feedback to a
programmer, they are not generally considered a debugging
tool.
Is This Answer Correct ? | 3 Yes | 0 No |
Which of the following group/individuals should assume overall direction and responsibility for costs and timetables of system development projects? A. User management B. Project steering committee C. Senior management D. Systems development management
A decrease in amplitude as a signal propagates along a transmission medium is known as: A. noise. B. crosstalk. C. attenuation. D. delay distortion.
With the help of the security officer, granting access to data is the responsibility of: A. data owners. B. programmers. C. system analysts. D. librarians.
When reviewing the quality of an IS department's development process, the IS auditor finds that they do not use any formal, documented methodology and standards. The IS auditor's MOST appropriate action would be to: A. complete the audit and report the finding. B. investigate and recommend appropriate formal standards. C. document the informal standards and test for compliance. D. withdraw and recommend a further audit when standards are implemented.
Which of the following reports is a measure of telecommunication transmissions and determines whether transmissions are completed accurately? A. Online monitor reports B. Downtime reports C. Help desk reports D. Response time reports
Which of the following would contribute MOST to an effective business continuity plan (BCP)? The BCP: A. document was circulated to all interested parties. B. planning involved all user departments. C. was approved by senior management. D. was audited by an external IS auditor.
During a post-implementation review of an enterprise resource management system, an IS auditor would MOST likely: A. review access control configuration. B. evaluate interface testing. C. review detailed design documentation. D. evaluate system testing.
Which of the following offsite information processing facility conditions would cause an IS auditor the GREATEST concern? The facility A. is identified clearly on the outside with the company name. B. is located more than an hour driving distance from the originating site. C. does not have any windows to let in natural sunlight. D. entrance is located in the back of the building rather than the front.
An independent software program that connects two otherwise separate applications sharing computing resources across heterogeneous technologies is known as: A. middleware. B. firmware. C. application software. D. embedded systems.
Which of the following is a concern when data is transmitted through secure socket layer (SSL) encryption implemented on a trading partner's server? A. Organization does not have control over encryption. B. Messages are subjected to wire tapping. C. Data might not reach the intended recipient. D. The communication may not be secure.
Which of the following fire suppressant systems would an IS auditor expect to find when conducting an audit of an unmanned computer center? A. Carbon dioxide B. Halon C. Dry-pipe sprinkler D. Wet-pipe sprinkler
Which of the following audit procedures would MOST likely be used in an audit of a systems development project? A. Develop test transactions B. Use code comparison utilities C. Develop audit software programs D. Review functional requirements documentation