Question
TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 6) Data dictionary can be used as part of the
TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 6) Data dictionary can be used as part of the audit trail. 7) The activist hacker group called Anonymous played Santa Claus one Christmas, indicating they were "granting wishes to people who are less fortunate than most." They were inundated with requests for iPads, iPhones, pizzas, and hundreds of other things. They hacked into banks and sent over $1 million worth of virtual credit cards to people. 8) Identify theft has always been a federal crime. 9) In a system with effective separation of duties, it is difficult for any single employee to embezzle successfully. 10) Security is a technology issue and not just a management issue. 11) It is impossible to encrypt information transmitted over the Internet. 12) Best practice requires backups be retained indefinitely. 13) A credit sale should always be denied if it exceeds the customer's credit limit. 14) The EOQ approach to managing inventory has been gaining popularity in recent years. 15) Maintaining physical custody of the raw materials and finished goods inventories is the responsibility of the accounting department. 16) When properly deployed, accounting information systems can provide firms with a competitive advantage. 17) A properly configured enterprise resource planning (ERP) system uses a decentralized database to share information across business processes and coordinate activities. 18) In order to maintain uniformity and enhance comparability, there are a fixed number of symbols that can be used in drawing a Business Process Diagram (BPD). 19) A disgruntled employee in Australia hacked into a sewage system, causing a quarter of a million gallons of raw sewage to flood a hotel and a park. 20) Law enforcement uses key logging software, a form of malware, to detect crime. 21) Detecting fraud where two or more people are in collusion to override controls is less difficult because it is much easier to for one or more fraud perpetrators to reveal the fraud. 22) Social engineering attacks often take place over the Internet. 23) Encryption is one of the many ways to protect information in transit over the internet. 24) Training can also reduce the risk of system downtime
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started