Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Accounting Information System (no need explanation, just answer) 18. Choose which of the following will strengthen the control over an encrypted file. i. ii. ili.
Accounting Information System (no need explanation, just answer)
18. Choose which of the following will strengthen the control over an encrypted file. i. ii. ili. iv. Nature of the encryption algorithm The length of the encryption key Use a strong and long passphrase to protect the key Store cryptographic keys in the browser A. i, ii, iii, iv B. I, ii, iv C. ii, iii, iv D. i, ii, iii 19. Determine which of the following elements stated below do protect confidentiality and privacy information of businesses. i. ji. iii. iv. Training and Access Control Access Control and Encryption Encryption and Classified Information Classified Information and Authentication A. i, ii, iii, iv B. i, ii, iv C. ii, iii, iv D. i, ii, iii 20. Hafidz, the department manager, reminds his staff about the importance of file labels control as it will ensure the correct and current files are being updated. Identify the correct answer. A. Yes B. No C. Both Yes and No D. None of the above 21. When sales clerk keys in the reference number of TOO1 into the system, the data screen will show the details of its customer, Teguh Bhd. such as the contact information of the person in charge and its full address. This application is an example of A. prompting B. preformatting C. closed-loop verification. D. error checking 22. The cashier accidentally enters the quantity sold as 20 instead of 2 when a customer brings two similar kitchen racks to the counter for purchase. The inventory tracking system shows that 12 kitchen racks were still in the stock. Choose which of the following data entry controls would most effectively prevent this error. A. Limit check. B. Sign check. C. Field check. D. Validity check. 23. Which of the following is NOT the primary objective of ensuring systems and information are available for use whenever needed? Choose the correct answer. i. ii. iii. iv. To minimize system downtime. To minimize system expense. To maximize system processing speed. To maximize sales. A. i, ii, iii, iv B. i, ii, iv C. ii, iii, iv D. i, ii, iii 24. This process consumes a longer period of time but the restoration is much shorter and straightforward in comparison with its alternative. This process implements A. archive B. cloud computing C. differential backup D. incremental backup 25. Data matching can be explained by the process of comparing between two sets of collected data, describes efforts to compare two sets of collected data. It will be done based on the program algorithm where two or more items of data must be matched before further action can take place. Which of these are not an example of such a process? i. data entry control. data transmission control. processing control. input control. iv. A. i, ii, iii, iv B. i, ii, iv C. ii, iii, iv DStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started