A debugging tool, which reports on the sequence of steps
executed by a program, is called a/an:
A. output analyzer.
B. memory dump.
C. compiler.
D. logic path monitor.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
Logic path monitors report on the sequence of steps executed
by a program. This provides the programmer with clues to
logic errors, if any, in the program. An output analyzer
checks the results of a program for accuracy by comparing
the expected results with the actual results. A memory dump
provides a picture of the content of a computer's internal
memory at any point of time, often when the program aborted,
thus providing information on inconsistencies in data or
parameter values. Though compilers have some potential to
provide feedback to a programmer, they are not generally
considered a debugging tool.
| Is This Answer Correct ? | 11 Yes | 0 No |
Answer / rfruelda
D. Logic path monitor
Logic path monitors report on the sequence of steps
executed by a program. This provides the programmer with
clues to logic errors, if any, in the program. An output
analyzer checks the results of a program for accuracy by
comparing the expected results with the actual results. A
memory dump provides a picture of the content of a
computer's internal memory at any point in time, often when
the program is aborted, thus providing information on
inconsistencies in data or parameter values. Though
compilers have some potential to provide feedback to a
programmer, they are not generally considered a debugging
tool.
| Is This Answer Correct ? | 3 Yes | 0 No |
A digital signature contains a message digest to: A. show if the message has been altered after transmission. B. define the encryption algorithm. C. confirm the identity of the originator. D. enable message transmission in a digital format.
A call-back system requires that a user with an id and password call a remote server through a dial-up line, then the server disconnects and: A. dials back to the user machine based on the user id and password using a telephone number from its database. B. dials back to the user machine based on the user id and password using a telephone number provided by the user during this connection. C. waits for a redial back from the user machine for reconfirmation and then verifies the user id and password using its database. D. waits for a redial back from the user machine for reconfirmation and then verifies the user id and password using the sender's database.
An IS auditor performing a review of the IS department discovers that formal project approval procedures do not exist. In the absence of these procedures the IS manager has been arbitrarily approving projects that can be completed in a short duration and referring other more complicated projects to higher levels of management for approval. The IS auditor should recommend as a FIRST course of action that: A. users participate in the review and approval process. B. formal approval procedures be adopted and documented. C. projects be referred to appropriate levels of management for approval. D. the IS manager's job description be changed to include approval authority.
To check the performance of flow and error control, an IS auditor should focus the use of a protocol analyzer on which of the following layers? A. Network B. Transport C. Data link D. Application
An organization is considering installing a LAN in a site under construction. If system availability is the main concern, which of the following topologies is MOST appropriate? A. Ring B. Line C. Star D. Bus
Programs that can run independently and travel from machine to machine across network connections, with the ability to destroy data or utilize tremendous computer and communication resources, are referred to as: A. trojan horses. B. viruses. C. worms. D. logic bombs.
What data should be used for regression testing? A. Different data than used in the previous test B. The most current production data C. The data used in previous tests D. Data produced by a test data generator
When auditing a mainframe operating system, what would the IS auditor do to establish which control features are in operation? A. Examine the parameters used when the system was generated B. Discuss system parameter options with the vendor C. Evaluate the systems documentation and installation guide D. Consult the systems programmers
Passwords should be: A. assigned by the security administrator. B. changed every 30 days at the discretion of the user. C. reused often to ensure the user does not forget the password. D. displayed on the screen so that the user can ensure that it has been entered properly.
The device that connects two networks at the highest level of the ISO-OSI framework ( i.e., application layer) is a A. Gateway B. Router C. Bridge D. Brouter
Which of the following logical access exposures involves changing data before, or as it is entered into the computer? A. Data diddling B. Trojan horse C. Worm D. Salami technique
When a complete segregation of duties cannot be achieved in an online system environment, which of the following functions should be separated from the others? A. Origination B. Authorization C. Recording D. Correction