Answers
Answer updated on: 12 Feb 2020
B. are more likely to be derived as a result of a risk assessment.Explanation: A bottom-up approach begins by defining operational-level requirements and policies, which are derived and implemented as the result of risk assessments. Enterprise-level policies are subsequently developed based on a synthesis of existing operational policies. Choices A, C and D are advantages of a top-down approach ...
Answer updated on: 12 Feb 2020
A. Black box test A black box test is a dynamic analysis tool for testing software modules. During the testing of software modules a black box test works first in a cohesive manner as a single unit/entity consisting of numerous modules, and second with the user data that flows across software modules. In some cases, this even drives the software behavior. In choices B, C and D, the software ...
Answer updated on: 12 Feb 2020
C. Encapsulation Encapsulation is a property of objects, and it prevents accessing either properties or methods that have not been previously defined as public. This means that any implementation of the behavior of an object is not accessible. An object defines a communication interface with the exterior and only that which belongs to that interface can be accessed.
Answer updated on: 12 Feb 2020
B. PERT chart A PERT chart will help determine project duration once all the activities and the work involved in the activities are known. Function point analysis is a technique for determining the size of a development task based on the number of function points. Function points are factors such as inputs, outputs, inquiries, logical internal files, etc. While this will help determine the size ...
Answer updated on: 12 Feb 2020
A. whether IT processes support business requirements.The role of an IT steering committee is to ensure that the IS department is in harmony with the organizations mission and objectives. To ensure this, the committee must determine whether IS processes support the business requirements. Assessing proposed additional functionality and evaluating software stability and the complexity of ...
Answer updated on: 12 Feb 2020
C. Function point analysis Function point analysis is an indirect method of measuring the size of an application by considering the number and complexity of its inputs, outputs and files. It is useful for evaluating complex applications. PERT is a project management technique that helps with both planning and control. SLOC gives a direct measure of program size, but does not allow for the ...
Answer updated on: 12 Feb 2020
A. reasonable assurance that the audit will cover material items.The ISACA IS Auditing Guideline G15 on planning the IS audit states, An assessment of risk should be made to provide reasonable assurance that material items will be adequately covered during the audit work. This assessment should identify areas with a relatively high risk of the existence of material problems. Definite assurance ...
Answer updated on: 12 Feb 2020
C. archive policy.With a policy of well-archived e-mail records, access to or retrieval of specific e-mail records is possible without disclosing other confidential e-mail records. Security and/or audit policies would not address the efficiency of record retrieval, and destroying e-mails may be an illegal act.
Answer updated on: 12 Feb 2020
A. increase in quality can be achieved, even if resource allocation is decreased. The three primary dimensions of a project are determined by the deliverables, the allocated resources and the delivery time. The area of the project management triangle, comprised of these three dimensions, is fixed. Depending on the degree of freedom, changes in one dimension might be compensated by changing ...
Answer updated on: 12 Feb 2020
A. result in a correct capture of requirements. The principal concern should be to ensure an alignment of the application with business needs and user requirements. While the CASE being used may provide tools to cover this crucial initial phase, a cooperative user-analyst interaction is always needed. Choice B should be the next concern. If the system meets business needs and user requirements, ...
No any questions is under moderation!
Following
You are following 0 people.
Followers
You have 1 followers.
Rank
1st
RankAlfred Hook
139
Asked134
Answered37635
Total Points
2nd
RankOrion Thames
150
Asked146
Answered35233
Total Points
3rd
RankCambron Bill
148
Asked149
Answered35215
Total Points
4th
RankCatherine Halcombe
108
Asked124
Answered23036
Total Points
5th
RankSantepro
600
Asked714
Answered22559
Total Points
6th
RankGregorynaomi
15
Asked14
Answered13608
Total Points
7th
RankRN Pedia
260
Asked167
Answered10271
Total Points
8th
RankAdewumiKoju
3
Asked1
Answered9548
Total Points
9th
RankJaksiboy
24
Asked27
Answered8384
Total Points
10th
RankCripstwick
13
Asked15
Answered8226
Total Points
Load More