Pkg Acc Infor Systems MS VISIO CD
10th Edition
ISBN: 9781133935940
Author: Ulric J. Gelinas
Publisher: CENGAGE L
expand_more
expand_more
format_list_bulleted
Question
Chapter 8, Problem 27RQ
Summary Introduction
To describe: The four layers of controls for restricting logical access to stored programs, data, and documentation.
Introduction:
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Give an example for each of the following control activities in the conversion cycle: transaction authorization, segregation of duties, and access.
Categorize each of the following as either an equipment failure control or an unauthorized access control.a. message authenticationb. parity checkc. call-back deviced. echo checke. line errorf. data encryptiong. request-response technique
The data attributes that a particular user has permission to access are defined by the a. operating system view. b. systems design view. c. database schema. d. user view. e. application program.
Chapter 8 Solutions
Pkg Acc Infor Systems MS VISIO CD
Ch. 8 - What are the four major categories of pervasive...Ch. 8 - What are the differences among a pervasive control...Ch. 8 - Prob. 3RQCh. 8 - Describe some compensating controls that can be...Ch. 8 - What are policy controls plans? How do policies...Ch. 8 - Why should an organization conduct monitoring...Ch. 8 - Prob. 8RQCh. 8 - Prob. 14RQCh. 8 - What are the major elements of the strategic IT...Ch. 8 - Prob. 16RQ
Ch. 8 - Prob. 17RQCh. 8 - Prob. 18RQCh. 8 - What are the four stages through which a program...Ch. 8 - What steps are commonly included in a business...Ch. 8 - Prob. 21RQCh. 8 - Prob. 22RQCh. 8 - Prob. 23RQCh. 8 - Prob. 24RQCh. 8 - Prob. 25RQCh. 8 - Prob. 26RQCh. 8 - Prob. 27RQCh. 8 - Prob. 28RQCh. 8 - Prob. 30RQCh. 8 - Prob. 31RQCh. 8 - Prob. 32RQCh. 8 - Prob. 33RQCh. 8 - Prob. 1DQCh. 8 - Prob. 2DQCh. 8 - No matter how sophisticated a system of internal...Ch. 8 - Prob. 4DQCh. 8 - Prob. 5DQCh. 8 - Prob. 8DQCh. 8 - Prob. 9DQCh. 8 - Contracting for a hot site is too cost-prohibitive...Ch. 8 - Prob. 11DQCh. 8 - Prob. 12DQCh. 8 - Prob. 13DQCh. 8 - Prob. 1SPCh. 8 - Prob. 2SPCh. 8 - Prob. 3SPCh. 8 - Listed here are 20 control plans discussed in the...Ch. 8 - Prob. 3PCh. 8 - Prob. 4PCh. 8 - Prob. 5PCh. 8 - Prob. 7P
Knowledge Booster
Similar questions
- Reviewing database authority tables is a(n) a. access control. b. organizational structure control. c. data resource control. d. operating resource control.arrow_forwardplease answer correct with reasonarrow_forwardSLO-4.2. A necessary element of internal control is ODatabase OSystems design OSystems analysis. O Information and communicationarrow_forward
- Which of the following is NOT a control implication of distributed data processing? a. redundancy b. user satisfaction c. incompatibility d. lack of standardsarrow_forwardTypical DBMS features include all of the following EXCEPT a. database interface design and development. b. backup and recovery. c. program development. d. database access. e. all of these are typical DBMS features.arrow_forwardAn integrated group of programs that supports the applications and facilitates their access to specified resources is called a(n) a. operating system. b. database management system. c. utility system. d. facility system. e. object system.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Auditing: A Risk Based-Approach (MindTap Course L...AccountingISBN:9781337619455Author:Karla M Johnstone, Audrey A. Gramling, Larry E. RittenbergPublisher:Cengage LearningAccounting Information SystemsAccountingISBN:9781337619202Author:Hall, James A.Publisher:Cengage Learning,
Auditing: A Risk Based-Approach (MindTap Course L...
Accounting
ISBN:9781337619455
Author:Karla M Johnstone, Audrey A. Gramling, Larry E. Rittenberg
Publisher:Cengage Learning
Accounting Information Systems
Accounting
ISBN:9781337619202
Author:Hall, James A.
Publisher:Cengage Learning,