A request for a change to a report format in a module
(subsystem) was made. After making the required changes, the
programmer should carry out:
A. unit testing.
B. unit and module testing.
C. unit, module and regression testing.
D. module testing.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: C
Unit, module and regression testing will ensure that the
specific unit, module or subsystem and the complete system
works as expected. Regression testing is required for any
changes carried out at any level. The unit testing will
ensure that the unit is working as expected. The unit and
module testing will ensure that the unit and the module work
as expected. Unit testing and module testing will ensure
that the report or the unit and the module or the subsystem
are working as expected, but will not ensure that there has
not been an impact on the complete system. Regression
testing is required for any changes carried out at any level.
| Is This Answer Correct ? | 7 Yes | 0 No |
Information for detecting unauthorized input from a terminal would be BEST provided by the: A. console log printout. B. transaction journal. C. automated suspense file listing. D. user error report.
purchase orders issued to vendors have been authorized as per the authorization matrix
Which of the following is MOST important to have provided for in a disaster recovery plan? A. Backup of compiled object programs B. Reciprocal processing agreement C. Phone contact list D. Supply of special forms
The secure socket layer (SSL) protocol addresses the confidentiality of a message through: A. symmetric encryption. B. message authentication code. C. hash function. D. digital signature certificates.
Which of the following is the MOST important issue to the IS auditor in a business process re-engineering (BPR) project would be? A. The loss of middle management, which often is a result of a BPR project B. That controls are usually given low priority in a BPR project C. The considerable negative impact that information protection could have on BPR D. The risk of failure due to the large size of the task usually undertaken in a BPR project
Which of the following would BEST support 24/7 availability? A. Daily backup B. Offsite storage C. Mirroring D. Periodic testing
Antivirus software should be used as a: A. detective control. B. preventive control. C. corrective control. D. compensating control.
If the decision has been made to acquire software rather than develop it internally, this decision is normally made during the: A. requirements definition phase of the project. B. feasibility study phase of the project. C. detailed design phase of the project. D. programming phase of the project.
Confidential data residing on a PC is BEST protected by: A. a password. B. file encryption. C. removable diskettes. D. a key operated power source.
An IS auditor attempting to determine whether access to program documentation is restricted to authorized persons would MOST likely: A. evaluate the record retention plans for off-premises storage. B. interview programmers about the procedures currently being followed. C. compare utilization records to operations schedules. D. review data file access records to test the librarian function.
Which of the following represents the GREATEST potential risk in an EDI environment? A. Transaction authorization B. Loss or duplication of EDI transmissions C. Transmission delay D. Deletion or manipulation of transactions prior to or after establishment of application controls
Which of the following represents the MOST pervasive control over application development? A. IS auditors B. Standard development methodologies C. Extensive acceptance testing D. Quality assurance groups