Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

9) 9) One way to circumvent the counterfeiting of public keys is by using A) encryption B) cryptography. C) a digital certificate. D) digital authority.

image text in transcribed

9) 9) One way to circumvent the counterfeiting of public keys is by using A) encryption B) cryptography. C) a digital certificate. D) digital authority. 10) 10) If an organization asks you to disclose your date of birth and your address, but fails to take any steps to protect your private information, the organization has likely violated which of the Generally Accepted Privacy Principles? A) Security B) Access C) Collection. D) Quality 11) 11) A copy of a database, master file, or software that will be retained indefinitely as a historical record is known as a(n) A) incremental backup. B) cloud computing. C) differential backup. D) archive. 12) 12) The batch processing data entry control that sums a field that contains dollar values is called A) sequence check B) financial total. C) record count. D) hash total. 13) 13) A(n) determines the correctness of the logical relationship between two data items. A) reasonableness test B) field check C) alpha-numeric check D) range check 14) 14) A validity check is an example of A) an output control. C) an input control. B) a data transmission control. D) a data entry control. 15) 15) Turnaround documents are an example of a(n) A) processing control. C) output control. B) data entry control. D) input control. 16) 16) A determines if all required data items have been entered. A) field check B) range check C) completeness check D) limit check 17) 17) To minimize the risk of system downtime, Grizzly Corporation stores its data on multiple disk drives simultaneously. This practice is called A) patch backup management. B) redundant arrays of independent backups. C) redundant arrays of independent drives. D) downtime minimization plan. 18) 18) While this type of backup process takes longer than the alternative, restoration is easier and faster. A) differential backup B) incremental backup C) archive D) cloud computing 19) 19) Identify a useful tool for monitoring accounts receivable. A) accounts receivable aging report B) accounts receivable tolerance report C) customer credit limit report D) ERP exception report

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Using Financial Accounting

Authors: Carl S. Warren, Jeff Jones, Amanda Farmer

1st Edition

0357507851, 9780357507858

More Books

Students also viewed these Accounting questions