Question
1.Which of the following control procedures mitigates the threat of duplicate payments? Select one: a. Photocopied invoices can be paid. b. Invoices should be approved
1.Which of the following control procedures mitigates the threat of duplicate payments?
Select one:
a. Photocopied invoices can be paid.
b. Invoices should be approved for payment only when accompanied by a valid purchase order.
2.Which one of the following set of instructions can be used for taking advantage of a weakness in a program?
Select one:
a. patch
b. vulnerability
c. update
d. exploit
c. When an invoice is paid, the invoice and the entire voucher package should be canceled (for example marked paid) in a way that it cannot be submitted again.
d. When evaluated receipt settlement (invoice-less system) is used, receiving reports need not be marked as paid as no invoices are generated.
3.Which of the following is a support activity in the value chain?
Select one:
a. Receiving materials
b. Manufacturing
c. Post-sales service
d. Purchasing
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started