Good quality software is BEST achieved:
A. through thorough testing.
B. by finding and quickly correcting programming errors.
C. determining the amount of testing by the available time
and budget.
D. by applying well-defined processes and structured reviews
throughout the project.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
Testing can point to quality deficiencies, However, it
cannot by itself fix them. Corrective action at this point
in the project is expensive. While it is necessary to detect
and correct program errors, the bigger return comes from
detecting defects as they occur in upstream phases, such as
requirements and design. Choice C is representative of the
most common mistake when applying quality management to a
software project. It is seen as overhead, instead early
removal of defects has a substantial payback. Rework is
actually the largest cost driver on most software projects.
Choice D represents the core of achieving quality, that is,
following a well defined consistent process and effectively
reviewing key deliverables.
| Is This Answer Correct ? | 7 Yes | 0 No |
Answer / norasikin binti asin
how the organization should be developed so taht the
intended quality is achieved?
| Is This Answer Correct ? | 0 Yes | 3 No |
IS management has decided to rewrite a legacy customer relations system using fourth-generation languages (4GLs). Which of the following risks is MOST often associated with system development using 4GLs? A. Inadequate screen/report design facilities B. Complex programming language subsets C. Lack of portability across operating systems D. Inability to perform data intensive operations
To detect attack attempts that the firewall is unable to recognize, an IS auditor should recommend placing a network intrusion detection system (IDS) between the:
Which of the following controls would BEST detect intrusion? A. User ids and user privileges are granted through authorized procedures. B. Automatic logoff is used when a workstation is inactive for a particular period of time. C. Automatic logoff of the system after a specified number of unsuccessful attempts. D. Unsuccessful logon attempts are monitored by the security administrator.
As updates to an online order entry system are processed, the updates are recorded on a transaction tape and a hard-copy transaction log. At the end of the day, the order entry files are backed up on tape. During the backup procedure, a drive malfunctions and the order entry files are lost. Which of the following are necessary to restore these files? A. The previous day's backup file and the current transaction tape B. The previous day's transaction file and the current transaction tape C. The current transaction tape and the current hard-copy transaction log D. The current hard-copy transaction log and the previous day's transaction file
When implementing continuous monitoring systems an IS auditor's first step is to identify: A. reasonable target thresholds. B. high-risk areas within the organization. C. the location and format of output files. D. applications that provide the highest potential payback.
Which of the following is a network architecture configuration that links each station directly to a main hub? A. Bus B. Ring C. Star D. Completed connected
In a risk-based audit approach, an IS auditor should FIRST complete :
Which of the following would an IS auditor consider a weakness when performing an audit of an organization that uses a public key infrastructure with digital certificates for its business-to-consumer transactions via the Internet? A. Customers are widely dispersed geographically, but not the certificate authorities. B. Customers can make their transactions from any computer or mobile device. C. The certificate authority has several data processing subcenters to administrate certificates. D. The organization is the owner of the certificate authority.
Which of the following is a disadvantage of image processing? A. Verifies signatures B. Improves service C. Relatively inexpensive to use D. Reduces deterioration due to handling
In a data warehouse, data quality is achieved by: A. cleansing. B. restructuring. C. source data credibility. D. transformation.
Which of the following is the MOST critical element of an effective disaster recovery plan (DRP)? A. Offsite storage of backup data B. Up-to-date list of key disaster recovery contacts C. Availability of a replacement data center D. Clearly defined recovery time objective (RTO)
Which of the following audit procedures would MOST likely be used in an audit of a systems development project? A. Develop test transactions B. Use code comparison utilities C. Develop audit software programs D. Review functional requirements documentation