The term module in the design phase refers to ?
Functions
Procedures
Sub programs
All of the above

1 Answer

Answer :

All of the above

Related questions

Description : What is Software ? Set of computer programs, procedures and possibly associated document concerned with the operation of data processing. A set of compiler instructions A mathematical formula None of above

Last Answer : Set of computer programs, procedures and possibly associated document concerned with the operation of data processin

Description : Data link control deals withthe design and procedures for ______communication. A) node-to-node B) host-to-host C) process-to-process D) none of the above

Last Answer : node-to-node

Description : In the advanced marketing module the term reach refers to a. the potential number of customers who would see the advertisement message. b. the potential number of customers that can be reached by ... promotions will be targeted. e. the fact that all segment respond similarly to each media type.

Last Answer : a. the potential number of customers who would see the advertisement message

Description : .As part of audit planning, CPAs should design audit programs for each individual audit and should include audit steps and procedures to a. Ensure that only material items are audited. b. Provide ... are met. c. Detect and eliminate fraud. d. Increase the amount of management information available

Last Answer : Provide assurance that the objectives of the audit are met.

Description : Personnel who design, program, operate and maintain computer equipment refers to a. Console-operator b. Programmer c. Peopleware d. System Analyst

Last Answer : Peopleware

Description : . In a kernel configuration feature, . if ……………...is selected, the dynamically loadable module is loaded the first time a call is made to the kernel that requires the module. A. "m" B. "Y" C. "n" D. "r"

Last Answer : A. "m"

Description : Which of the following statements about independent financial statement audit is incorrect? a. The term "scope of the audit" refers to audit procedures deemed necessary in the circumstances ... uncover material misstatement is eliminated when the auditor conducts the audit in accordance with PSAs.

Last Answer : The risk that the auditor will fail to uncover material misstatement is eliminated when the auditor conducts the audit in accordance with PSAs.

Description : Which of the following procedures most specifically describes splitting or separating fused cardiac valve leaflets? a) Commisurotomy Commisurotomy is frequently used for mitral stenosis. b) ... or regurgitant cardiac valve by commisurotomy, annuloplasty, leaflet repair, and/or chordoplasty.

Last Answer : a) Commisurotomy Commisurotomy is frequently used for mitral stenosis.

Description : Design phase includes? data, architectural and procedural design only architectural, procedural and interface design only data, architectural and interface design only data, architectural, interface and procedural design

Last Answer : data, architectural, interface and procedural design

Description : Which of the following is a tool in design phase ? Abstraction Refinement Information Hiding All of Above

Last Answer : All of Above

Description : In the system conceps, term organization ? implies structure and order refers to the manner in which each component fuctions with other components of the system refers to the holism of system means that part of the computer system depend on one another

Last Answer : implies structure and order

Description : The term gigabyte refers to a. 1024 bytes b. 1024 kilobytes c. 1024 megabytes d. 1024 gigabyte

Last Answer : 1024 megabytes

Description : The term gigabyte refers to a. 1024 bytes b. 1024 kilobytes c. 1024 megabytes d. 1024 gigabyte

Last Answer : 1024 megabytes

Description : The term modem is a composite word that refers to the two functional entities that make up the device: asignal _______ and a signal _______. A) modulator; demodulator B) demodulator; modulator C) modern;demo D) none of the above

Last Answer : modulator; demodulator

Description : The term 'duplex' refers to theability of the data receiving stations toecho back aconfirming messageto the sender. Infull duplex data transmission, both the sender and the receiver A. cannot talk at once B. can ... data one ata time D. can do one way data transmission only E. None of the above

Last Answer : can do one way data transmission only

Description : The term ‘Dumping’ refers to (1) The sale of a sub-standard commodity (2) Sale in a foreign market of a commodity at a price below marginal cost (3) Sale in a foreign market of a commodity just at marginal cost with too much of profit (4) Smuggling of goods without paying any customs duty

Last Answer : Sale in a foreign market of a commodity at a price below marginal cost

Description : A good software design must have (A) High module coupling, High module cohesion (B) High module coupling, Low module cohesion (C) Low module coupling, High module cohesion (D) Low module coupling, Low module cohesion

Last Answer : (C) Low module coupling, High module cohesion

Description : Module design is used to maximize cohesion and minimize coupling. Which of the following is the key to implement this rule? (A) Inheritance (B) Polymorphism (C) Encapsulation (D) Abstraction

Last Answer : (C) Encapsulation

Description : In the maintenance phase the product must be tested against  previous test cases. This is known as testing. (a) Unit (b) Integration (c)Regression (d) Module (e) Beta

Last Answer : (c)Regression

Description : As Kathy works on the prototype of a new action -orientated computer game module, she is engaging in which phase of the new product development process? A)idea generation B)commercialisation C)test marketing D)screening E)product development

Last Answer : E)product development

Description : Design Phase consists of ……………………. 1. Identity the functions to be performed 2. Design the input/output and file design 3. Defining basic parameters for system design A) 1 & 2 B) 2 & 3 C) 1 & 3 D) 1, 2 & 3

Last Answer : D) 1, 2 & 3

Description : What is the name given to a set of programs routines and procedures that are used to operate the computer hardware?

Last Answer : What is the answer ?

Description : The following procedures relate to Skills and Competence, except a. Identify criteria which will be considered in evaluating individual performance and expected proficiency. b. Provide procedures for ... to fill the firm's needs for personnel with expertise in specialized and industries.

Last Answer : Provide procedures for maintaining the firm's standards of quality for the work performed.

Description : In designing written audit programs, an auditor should establish specific audit objectives that relate primarily to the a. Financial statement assertions. b. Timing of audit procedures. c. Cost-benefit of gathering evidence. d. Selected audit techniques.

Last Answer : Financial statement assertions

Description : Audit programs should be designed so that a. Most of the required procedures can be performed as interim work. b. The audit evidence gathered supports the auditor's conclusions. c. ... is assessed at a sufficiently low level. d. The auditor can make constructive suggestions to management

Last Answer : The audit evidence gathered supports the auditor’s conclusions.

Description : The external auditor should obtain a sufficient understanding of the internal audit function because a. The understanding of the internal audit function is an important substantive test to be performed by ... factor in determining the nature, timing, and extent of the external auditor's procedures.

Last Answer : The work performed by internal auditors may be a factor in determining the nature, timing, and extent of the external auditor's procedures.

Description : Audit programs generally include procedures to test actual transactions and resulting balances. These procedures are primarily designed to a. Detect irregularities that result in misstated financial ... control. c. Gather corroborative evidence. d. Obtain information of informative disclosures

Last Answer : Gather corroborative evidence

Description : Audit programs are modified to suit the circumstances on particular engagements. A complete audit program for an engagement generally should be developed a. Prior to beginning the actual audit work. ... the client's accounting records and procedures. d. When the audit engagement letter is prepared

Last Answer : After the auditor has completed an evaluation of the existing internal accounting contro

Description : Computer systems are comprised of: a) Hardware, Software, Procedures, Networks and People b) Hardware, Programs, Processors, Procedures and People c) Hardware Programs, Information, People and Networks d) None of These

Last Answer : a) Hardware, Software, Procedures, Networks and People

Description : Computer systems are comprised of a) hardware, programs, processors, procedures and people b) hardware, programs, information, people and procedures c) hardware, programs, information, people and networks d) hardware, software, procedures, networks and people e) None of these

Last Answer : d) hardware, software, procedures, networks and people

Description : Software consists of (A) Set of instructions + operating procedures (B) Programs + documentation + operating procedures (C) Programs + hardware manuals (D) Set of programs

Last Answer : (B) Programs + documentation + operating procedures

Description : Standing plans that furnish broad guidelines for channeling management thinking in specified direction are called (a) Single-use plans ; (b) Programs ; (c) Procedures ; (d) Policies

Last Answer : (d) Policies 

Description : Which commandis usedto selectdistinct subject (SUB) from thetable (BOOK)? A. SELECT ALL FROM BOOK B. SELECT DISTINCT SUB FROM BOOK C. SELECT SUB FROM BOOK D. All of theabove E. None of the above

Last Answer : SELECT DISTINCT SUB FROM BOOK

Description : In order to use a DBMS, it is important to understand A. the physical schema B. all sub-schemas that thesystem supports C. one subschema D. both (a)and (b) E. None of the above

Last Answer : one subschema

Description : Consider the assertions given below. Which among them prove to be beneficial for Persistent HTTP connections? A. Reduction in latency over the sub- sequent requests B. Pipeline-oriented connection over the requests and responses C. Increase ... TCP connections a. A & B b. C & D c. A & C d. B & B

Last Answer : a. A & B

Description : What is IP class and number of sub- networks if the subnet mask is 255.224.0.0? a. Class A, 3 b. Class A, 8 c. Class B, 3 d. Class B, 32

Last Answer : b. Class A, 8

Description : The Code of Professional Ethics states, in part, that a CPA should maintain integrity and objectivity. Objectivity refers to the CPA's ability to a. Determine accounting practices that were consistently ... . c. Determine the materiality of items. d. Insist on all matters regarding audit procedures.

Last Answer : Maintain an impartial attitude on all matters which come under his review.

Description : Information risk refers to the risk that a. The client may not be able to remain in business. b. Errors and frauds would not be detected by the auditor's procedures. c. ... financial statements that arematerial misstated. d. The client's financial statements may be materially false and misleading

Last Answer : The client's financial statements may be materially false and misleading

Description : The Code of Professional Ethics states, in part, that a CPA should maintain integrity and objectivity. Objectivity refers to the CPA's ability to a. Insist on all matters regarding audit ... were consistently applied. d. Maintain an impartial attitude on all matters which come under his review

Last Answer : Maintain an impartial attitude on all matters which come under his review

Description : The component of marketing implementation that refers to work processes, procedures, and the way that information is structured is A)marketing structure. B)marketing strategy. C)organisational resources. D)shared goals. E)systems.

Last Answer : E)systems.

Description : What are different modes of parameters used in functions and procedures?

Last Answer : IN -OUT -INOUT

Description : What is an UTL_FILE.What are different procedures and functions associated with it?

Last Answer : UTL_FILE is a package that adds the ability to read and write to operating system files. Procedures associated with it are FCLOSE, FCLOSE_ALL and 5 procedures to output data to a file PUT, ... , PUTF, FFLUSH.PUT, FFLUSH.PUT_LINE,FFLUSH.NEW_LINE. Functions associated with it are FOPEN, ISOPEN.

Description : What is difference between Procedures and Functions ?

Last Answer : A Function returns a value to the caller where as a Procedure does not.

Description : How packaged procedures and functions are called from the following?

Last Answer : a. Stored procedure or anonymous block b. an application program such a PRC *C, PRO* COBOL c. SQL *PLUS?? a. PACKAGE NAME.PROCEDURE NAME (parameters); variable := PACKAGE NAME.FUNCTION NAME ( ... .PROCEDURE if the procedures does not have any out/in-out parameters. A function can not be called.

Description : Explain how procedures and functions are called in a PL/SQL block ?

Last Answer : Function is called as part of an expression. sal := calculate_sal ('a822'); procedure is called as a PL/SQL statement calculate_bonus ('A822');

Description : Which statement is correct regarding the relationship between internal auditing and the external auditor? a. Some judgments relating to the audit of the financial statements are those of the ... opinion expressed, however that responsibility may be reduced by any use made of internal auditing

Last Answer : Certain aspects of internal auditing may be useful in determining the nature, timing and extent of external audit procedures.

Description : Defects discovered by static analysis tools include: i. Variables that are never used. ii. Security vulnerabilities. iii. Programming Standard Violations iv. Uncalled functions and procedures a) i , ii,iii,iv is correct b ... ,iv are incorrect. c) i ,ii, iii and iv are incorrect d) iv, ii is correct

Last Answer : a) i , ii,iii,iv is correct

Description : The use of spooler programs and/or “. Hardware allows personal computer operators to do the processing work at the same time a printing operation is in progress a. Registered mails b. Memory c. CPU d. Buffer

Last Answer : Buffer

Description : An approach that permits the computer to work on several programs instead of one is a. On-line thesaurus b. Multiprogramming c. Over lapped processing d. Outline processor

Last Answer : Over lapped processing