Which of the following procedures is NOT used to detect unauthorized program changes? a. Source code comparison

Question:

Which of the following procedures is NOT used to detect unauthorized program changes?

a. Source code comparison

b. Parallel simulation

c. Reprocessing

d. Reprogramming code

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Accounting Information Systems

ISBN: 12

11th Edition

Authors: Marshall RomneyPaul Steinbart

Question Posted: