Passwords for microcomputer software programs are designed to prevent: A. Inaccurate processing of data. B. Unauthorized access to the computer. C. Incomplete updating of data files. D. Unauthorized use of the software.
Q: How can the use of passwords actually circumvent security? What actions can be taken to minimize…
A: A password is a combination of letters (eg. a, b, E, etc.), numbers (eg. 1,4,7, etc.) or symbols…
Q: What actions to be taken on error/fraud discovery?
A: An auditor is a person who is held responsible for fraud or error detection as he or she is auditing…
Q: What is the purpose of installing firewalls on bridges, routers, and gateways? O Detecting…
A: Solution: Firewalls provide protection against hacking by protecting your computer or network from…
Q: olders. (The user subsequently codes this information onto a magnetic coding device and places this…
A: Preventive control: Preventive control refers to the steps taken so that errors do not occur. For…
Q: Consider the following definitions.) Term Definition O More Info internal control Control procedures…
A: MATCHING THE FOLLOWING WITH THEIR RESPECTIVE DEFINITION Term…
Q: Computers remove a fundamental separation of functions between authorizing and processing…
A: It is a true statement that computers remove a basic separation strategy of separating the functions…
Q: How is a lockout different from a deadlock? Give an accounting example to illustrate why a database…
A: Database Deadlock: Database deadlock is a condition in which no data can be accessed as sites are…
Q: 1.A computer abuse technique called ______________________________ involves a program that…
A: Hi student Since there are multiple questions, we will answer only first question.
Q: What is computer fraud, and what types of activities does it include?
A:
Q: How can passwords actually circumvent security? What actions can be taken to minimize this?
A: Password: A password can be defined as a series of characters which can be used to determine the…
Q: Which of the following statements most likely represents a control consideration for anentity that…
A:
Q: Listed here are five scenarios. For each scenario, discuss the possible damages that can occur.…
A: Note: Since you have posted a question with multiple sub-parts, we will solve the first three…
Q: Sniffer software isa. used by malicious Web sites to sniff data from cookies stored on the user’s…
A: Sniffer Software: Sniffer software is that software which inspects the network traffic. This…
Q: Internal control is enhanced by separating the control of a transaction from the record-keeping…
A: Internal control function is implemented in the organizations so that internal policies and…
Q: Which of the following procedures would an entity most likely include in its disaster recovery plan?…
A: The requirement is to identify the most likely procedure to be included in a disaster recovery plan…
Q: A message that is contrived to appear to be coming from a trusted or authorized source is calleda. a…
A:
Q: Which preventive, detective, and/or corrective controls would best mitigate the following threat,…
A: A criminal remotely accessed a sensitive database using the authentication credentials (user ID…
Q: Computer accounting control procedures are referred to as general or application controls. The…
A: Application controls in a computer environment refers to the controls that are related to the…
Q: Describe the errors, irregularities, or misstatements that could occur due to the weaknesses…
A:
Q: Which of the following statements is correct? a. A bridge is used to connect a LAN and a WAN. b.…
A:
Q: Describe an internal control that would prevent an employee from removing a computer and then…
A: Definition: Internal control: Internal control is a process which ensures continuous reliability of…
Q: Controls used in the management of a computer center to minimize the possibility of using an…
A: Auditing is the process by which assertions made by management about financial transactions of a…
Q: Why is human behavior considered one of the biggest potential threats to operating system…
A: “Since you have asked multiple questions, we will solve the first question for you. If you want a…
Q: To guard against fraud and waste, businesses use internal controls. correct or incorrect
A: This question explains about to guard against fraud and waste, businesses use internal controls.
Q: Computer Internal Control Questionnaire Evaluation. Assume that, when conductingprocedures to obtain…
A:
Q: The purpose of a checkpoint procedure is to facilitate restarting aftera. data processing errors.b.…
A: The purpose of a checkpoint procedure is to facilitate restarting after data processing errors.
Q: Auditors of ERP systemsa. need not be concerned about segregation of duties because these systems…
A: Auditors of Enterprise Resource Planning: The responsibility of an auditor is to gather knowledge…
Q: which is true about vendor files? A. They must be cleaned on a daily basis B. They can be in…
A: A vendor file contain all information about the supplier and vendor from every department. It…
Q: As an added measure, a company has set up its network so that computers that currently log in…
A: Accessibility refers to The process of creating products usable by the people with the various…
Q: Encryption a. avoids the need for separation of duties. b. creates firewalls to protect data. c.…
A: Encryption: Encryption is a process of dividing the message into several blocks of information for…
Q: 1. _____ are controls that do not rely on the client's information technology (IT) environment for…
A: Since you have asked multiple questions, we will solve the first question for you. If you want any…
Q: A dictionary attack uses software to try thousands of common words sequentially in an attempt to…
A: The question is based on the concept of Accounting Theory.
Q: What are the computer ethical issues regarding misuse of computers?
A: Ethics is an internal mechanism of an individual which can be applied to various situations to…
Q: List the control features that directly contribute to the security of the computer center…
A: Computer Center: An enterprise established for performing complex and laborious computation tasks by…
Q: Which of the following is a password security problem? O A. Users are assigned passwords when…
A: A) It is correct as individual usually do not change password hence it became easily identifiable.…
Q: Controls over data management systems fall into two categories: access controls and backup controls.…
A: Data Management System: It is a software program that is used to create, modify, retrieve, and…
Q: The capability for computers to communicate with physically remote terminals is an important feature…
A: Answer is A
Q: An employee in the receiving department keyed in a shipment from a remote terminal and inadvertently…
A: System Control: System control can be defined as a set of procedures used for controlling and…
Q: Is a POS system that uses bar coding and a laser light scanner foolproof against inaccurate updates?…
A: POS System: Point of sale system is implemented in retail sectors where sale transaction takes…
Q: Hackers can disguise their message packets to look as if they came from an authorized user and gain…
A: The right answer is option a . spoofing.
7
Only the answer without explain
A or B or C or D
Step by step
Solved in 2 steps
- Which of the following statements is NOT correct? a. EAMs capture transactions during processing without removing the application from service. b. EAMs support continuous monitoring of controls. c. EAMs have the potential to corrupt corporate databases d. EAMs decrease operational performance. e. All of the above are correct statements.Which of the following is NOT a data communications control objective?a. maintaining the critical application listb. correcting message loss due to equipment failurec. preventing illegal accessd. rendering useless any data that a perpetrator successfully capturesThe risk of fraud in a computerized system is lower than in a manual system because of the use of automated controls. true or false
- Assumes that when conducting procedures to obtain an understanding of the control structure in the Fiona Company, you checked “NO” to the following internal control questionnaire items: Does access to on-line files requires specific passwords to be entered to identify and validate the terminal user? Are control totals established by the user prior to submitting data for processing? (order entry application subsystem). Are input control totals reconciled to output control totals? (Order entry application sub system). Required: Describe the errors, irregularities, or misstatements that could occur due to the weaknesses indicated by the lack of controls.Which of the following would reduce the effectiveness of internal control in an accountinginformation system?a. The computer librarian maintains custody of computer program instructions and detailed lists.b. Computer operators have access to operator instructions and detailed program lists.c. The control group is solely responsible for the distribution of all computer output.d. Computer programmers write and debug programs that perform routines designed by thesystems analyst.The purpose of a checkpoint procedure is to facilitate restarting aftera. data processing errors.b. data input errors.c. the failure to have all input data ready on time.d. computer operator intervention.e. echo check failures.
- 1.A computer abuse technique called ______________________________ involves a program that replicates itself on disks, in memory, and across networks. 2.A computer abuse technique called ______________________________ involves a programmer's inserting special code or passwords in a computer program that will allow the programmer to bypass the security features of the program, 3.A(n) ______________________________ is a computer abuse technique in which unauthorized code is inserted in a program, which, when activated, could cause a disaster such as shutting down a system or destroying data. 4.A(n) ______________________________ is a program that secretly takes over another Internet -attached computer and then uses that computer to launch attacks that can't be traced to the creator. 5.A(n) ______________________________ is a tool designed to assist you in evaluating the potential effectiveness of controls in a business process by matching control goals with relevant…STUDY QUESTIONS Why is human behavior considered one of the biggest potential threats to operating system integrity? What are the issues that need to be considered before implementing keystroke monitoring? Describe the three ways on how an audit trail can be used to support security objectives. Explain how poorly designed audit trail logs can actually be dysfunctional. Why would a systems programmer create a back door if he or she has access to the program in his or her day-to-day tasks? PROBLEMS Problem 1: Charles Hart, an accounts payable clerk, is an hourly employee. He never works a minute past 5 P.M. unless the overtime has been approved. Charles has recently found himself faced with some severe financial difficulties. He has been accessing the system from his home during the evening and setting up an embezzlement scheme. As his boss, what control technique(s) can be used to help detect this type of fraud? Problem 2: In 2002, Mr. Rollerball started Mighty Mouse,…Computers remove a fundamental separation of functions between authorizing and processing transactions, and there is also a risk of the integrity of accounting records. What do you think, how can management control these risks?
- Sniffer software isa. used by malicious Web sites to sniff data from cookies stored on the user’s hard drive. b. used by network administrators to analyze net- work traffic. c. used by bus topology intranets to sniff for carriers before transmitting a message to avoid data collisions. d. an illegal program downloaded from the Web to sniff passwords from the encrypted data of Internet customers. e. illegal software for decoding encrypted messages transmitted over a shared intranet channel.What control procedures can be used to achieve control over computer operations in an end-usercomputing environment? What control procedures can be used to achieve control over computerizedprocessing in an end-user computing environment?