PLEASE MATCH TERMS WITH DEFINITIONS
\#4. Match the terms below with the definition listed Below. Terms may be used once, \begin{tabular}{l|l|} \hline more than once, or not at all, \\ \hline Outside party hired to manage systems development effort \end{tabular} Probability that 2 threat will come to pass. Risk that remains after management implements internal controls or some other response to risk. Cooperation between two or more people to thwart intemal controls Special approval needed to handle a transaction Company culture that is the foundation for all other internal control components Person who ensures an organization's networks operate properly Ensures source data is approved, monitors work flow, and handles input errors Susceptibility of accounts or transactions to control problems in absence of intemal control. Path used to trace a transaction from onigin to ourput or from output to Electronically signing a document with Controls that ptevent, detect, and cotre processing programs in transaction processing to employees to handle routine transactions without special approval Document that shows how a project will be completed Amount of risk company is willing to accept to achieve irs goals and objectives Makes sure systems are secure and protected from internal and external threats Percentage of time a system is used Examining relationships between different sets of data Potential dollar loss if a threat become a reality Outside, independent directors responsible for financial reporting, regulatory compliance, and internal control A. Inherent Risk I. Audit Trail B. Data Control C. Likelihood R. Analytical Review D. Utilization K. Application Controls S. System Analysts L. Systems Integrator T. Control Environment E. Collusion M. Systems Integrator U. Audit Committee F. Residual Risk V. General Authorization G. Throughput N. Corrective Controls W. Digital Signature H.ExposureO.StrategicMasterPlanX.SystemAdmistrator Q. Systems Administrator