Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Accounting Information System (no need explanation, just answer) 18. Choose which of the following will strengthen the control over an encrypted file. i. ii. ili.

image text in transcribed

Accounting Information System (no need explanation, just answer)

18. Choose which of the following will strengthen the control over an encrypted file. i. ii. ili. iv. Nature of the encryption algorithm The length of the encryption key Use a strong and long passphrase to protect the key Store cryptographic keys in the browser A. i, ii, iii, iv B. I, ii, iv C. ii, iii, iv D. i, ii, iii 19. Determine which of the following elements stated below do protect confidentiality and privacy information of businesses. i. ji. iii. iv. Training and Access Control Access Control and Encryption Encryption and Classified Information Classified Information and Authentication A. i, ii, iii, iv B. i, ii, iv C. ii, iii, iv D. i, ii, iii 20. Hafidz, the department manager, reminds his staff about the importance of file labels control as it will ensure the correct and current files are being updated. Identify the correct answer. A. Yes B. No C. Both Yes and No D. None of the above 21. When sales clerk keys in the reference number of TOO1 into the system, the data screen will show the details of its customer, Teguh Bhd. such as the contact information of the person in charge and its full address. This application is an example of A. prompting B. preformatting C. closed-loop verification. D. error checking 22. The cashier accidentally enters the quantity sold as 20 instead of 2 when a customer brings two similar kitchen racks to the counter for purchase. The inventory tracking system shows that 12 kitchen racks were still in the stock. Choose which of the following data entry controls would most effectively prevent this error. A. Limit check. B. Sign check. C. Field check. D. Validity check. 23. Which of the following is NOT the primary objective of ensuring systems and information are available for use whenever needed? Choose the correct answer. i. ii. iii. iv. To minimize system downtime. To minimize system expense. To maximize system processing speed. To maximize sales. A. i, ii, iii, iv B. i, ii, iv C. ii, iii, iv D. i, ii, iii 24. This process consumes a longer period of time but the restoration is much shorter and straightforward in comparison with its alternative. This process implements A. archive B. cloud computing C. differential backup D. incremental backup 25. Data matching can be explained by the process of comparing between two sets of collected data, describes efforts to compare two sets of collected data. It will be done based on the program algorithm where two or more items of data must be matched before further action can take place. Which of these are not an example of such a process? i. data entry control. data transmission control. processing control. input control. iv. A. i, ii, iii, iv B. i, ii, iv C. ii, iii, iv D

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Principles Of External Auditing

Authors: Brenda Porter, Jon Simon, David Hatherly

4th Edition

0470974451, 9780470974452

More Books

Students also viewed these Accounting questions