Answered step by step
Verified Expert Solution
Question
1 Approved Answer
9) 9) One way to circumvent the counterfeiting of public keys is by using A) encryption B) cryptography. C) a digital certificate. D) digital authority.
9) 9) One way to circumvent the counterfeiting of public keys is by using A) encryption B) cryptography. C) a digital certificate. D) digital authority. 10) 10) If an organization asks you to disclose your date of birth and your address, but fails to take any steps to protect your private information, the organization has likely violated which of the Generally Accepted Privacy Principles? A) Security B) Access C) Collection. D) Quality 11) 11) A copy of a database, master file, or software that will be retained indefinitely as a historical record is known as a(n) A) incremental backup. B) cloud computing. C) differential backup. D) archive. 12) 12) The batch processing data entry control that sums a field that contains dollar values is called A) sequence check B) financial total. C) record count. D) hash total. 13) 13) A(n) determines the correctness of the logical relationship between two data items. A) reasonableness test B) field check C) alpha-numeric check D) range check 14) 14) A validity check is an example of A) an output control. C) an input control. B) a data transmission control. D) a data entry control. 15) 15) Turnaround documents are an example of a(n) A) processing control. C) output control. B) data entry control. D) input control. 16) 16) A determines if all required data items have been entered. A) field check B) range check C) completeness check D) limit check 17) 17) To minimize the risk of system downtime, Grizzly Corporation stores its data on multiple disk drives simultaneously. This practice is called A) patch backup management. B) redundant arrays of independent backups. C) redundant arrays of independent drives. D) downtime minimization plan. 18) 18) While this type of backup process takes longer than the alternative, restoration is easier and faster. A) differential backup B) incremental backup C) archive D) cloud computing 19) 19) Identify a useful tool for monitoring accounts receivable. A) accounts receivable aging report B) accounts receivable tolerance report C) customer credit limit report D) ERP exception report
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started