The use of a secure file library and restrictions on physical access to data files are control procedures used together to prevent
A) an employee or outsider obtaining data about an important client.
B) a data entry clerk from introducing data entry errors into the system.
C) a computer operator from losing or corrupting files or data during transaction processing.
D) programmers making unauthorized modifications to programs.
Correct Answer:
Verified
Q94: When doing an information systems audit,auditors must
Q95: An auditor creates a fictitious customer in
Q96: An auditor might use _ to examining
Q97: An auditor sets an embedded audit module
Q98: An auditor sets an embedded audit module
Q100: An auditor sets an embedded audit module
Q101: Evaluating effectiveness,efficiency,and goal achievement are objectives of
Q102: Identify the company below that CAATS would
Q103: One of the advantages of CAATS software
Q104: Which of the following is not one
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents