Principles Of Auditing & Other Assurance Services
Principles Of Auditing & Other Assurance Services
21st Edition
ISBN: 9781259916984
Author: WHITTINGTON, Ray, Pany, Kurt
Publisher: Mcgraw-hill Education,
Question
Book Icon
Chapter 8, Problem 29KOQ
To determine

Identify the appropriate answer related to the control to prevent the o prevent unauthorized access to sensitive programs in user operated computers system.

Blurred answer
Students have asked these similar questions
Controls over data management systems fall into two categories: access controls and backup controls. In the shared database environment, access control risks include corruption, theft, misuse, and destruction of data. These threats originate from both unauthorized intruders and authorized users who exceed their access privileges. Which of the following options is not part of controls over data management systems? a. Employees that sharing the same computers need restriction for access to specific directories, programs, and data files by using multilevel password control.b. To recover data from disaster, organizations must implement policies and procedures and routinely provide backup copies of critical files.c. Database Administrator works closely with users and systems designers has primary responsibility for user view design and works closely with users and systems designers.d. Access to confidential data must be properly managed. Inference controls prevent users from inferring,…
Which of the following would reduce the effectiveness of internal control in an accountinginformation system?a. The computer librarian maintains custody of computer program instructions and detailed lists.b. Computer operators have access to operator instructions and detailed program lists.c. The control group is solely responsible for the distribution of all computer output.d. Computer programmers write and debug programs that perform routines designed by thesystems analyst.
Explain how internal control can be enhanced through the proper installation of Information Technology Identify the risks for accounting systems that rely heavily on IT functions. Distinguish between general controls and application controls and give examples at least five Which duties should be segregated in a computer department? Describe the typical duties of computer personnel. What aspects of documentation, file security and retention control procedures are unique to computer systems? What are the responsibilities of the database administrator (DBA) function? Compare the risks associated with network environment to those associated with centralized IT functions.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,
Text book image
Pkg Acc Infor Systems MS VISIO CD
Finance
ISBN:9781133935940
Author:Ulric J. Gelinas
Publisher:CENGAGE L