Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Select the following computer controls with the error, or fraud or situation that the control is designed to prevent. No control is used more than

image text in transcribedimage text in transcribedimage text in transcribed

Select the following computer controls with the error, or fraud or situation that the control is designed to prevent. No control is used more than once. Computer controls Error, Fraud or Situation 1. A file is damaged by exposure to excessive heat and reconstruction has proven very difficult. A malicious program attaches itself to the payroll program and inappropriately modifies it to issue 300 checks for each employee overriding item count and limit controls. A senior systems programmer left the company and since that time causes of breakdowns in the system have become difficult to address as no one seems to be able to understand the programs that programmer worked on and developed. 4. Access to and alteration of data by an unauthorized system user. 5. An error occurs when an invalid account number (one digit is incorrect) is keyed in and accepted by the system. 6. Customers provide incomplete data (omitting a field or more) in ordering goods over the Internet. 7. Processing a transaction that is unreasonable in amount. 8. Several laptops and other devices are stolen. 9. Unauthorized data is sent and accepted into system from a location external to the firm. 10. Unnoticed loss of a transaction during processing of data. Select the following computer controls with the error, or fraud or situation that the control is designed to prevent. No control is used more than once. Computer controls Error, Fraud or Situation 1. A file is damaged by exposure to excessive heat and reconstruction has proven very difficult. A malicious program attaches itself to the payroll program and inappropriately modifies it to issue 300 checks for each employee overriding item count and limit controls. A senior systems programmer left the company and since that time causes of breakdowns in the system have become difficult to address as no one seems to be able to understand the programs that programmer worked on and developed. 4. Access to and alteration of data by an unauthorized system user. 5. An error occurs when an invalid account number (one digit is incorrect) is keyed in and accepted by the system. 6. Customers provide incomplete data omitting a field or more) in ordering goods over the Internet. 7. Processing a transaction that is unreasonable in amount Antivirus software Backup copies of files Firewall Item counts 8. Several laptops and other devices are stolen. 9. Unauthorized data is sent and accepted into system from a location external to the firm. 10. Unnoticed loss of a transaction during processing of data. Select the following computer controls with the error, or fraud or situation that the control is designed to prevent. No control is used more than once. Computer controls Error, Fraud or Situation 1. A file is damaged by exposure to excessive heat and reconstruction has proven very difficult. A malicious program attaches itself to the payroll program and inappropriately modifies it to issue 300 checks for each employee overriding item count and limit controls. A senior systems programmer left the company and since that time causes of breakdowns in the system have become difficult to address as no one seems to be able to understand the programs that programmer worked on and developed 4. Access to and alteration of data by an unauthorized system user. 5. An error occurs when an invalid account number (one digit is incorrect) is keyed in and accepted by the system. 6. Customers provide incomplete data (omitting a field or more) in ordering goods over the Internet. 7. Processing a transaction that is unreasonable in amount. Limit test Missing data test Passwords Physical controls over computer equipment Self-checking numbers 8. Several laptops and other devices are stolen. 9. Unauthorized data is sent and accepted into system from a location external to the firm. 10. Unnoticed loss of a transaction during processing of data

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Accounting questions

Question

What are the objectives of job evaluation ?

Answered: 1 week ago

Question

Write a note on job design.

Answered: 1 week ago

Question

Compute the derivative of f(x)cos(-4/5x)

Answered: 1 week ago

Question

Discuss the process involved in selection.

Answered: 1 week ago