Question

A computer system that writes the before-and-after results of every transaction to a log file is...

A computer system that writes the before-and-after results of every transaction to a log file is demonstrating which of the following controls?

1. Audit trail

2. Source data control

3. Data transmission control

4. Completeness check

0 0
Add a comment Improve this question Transcribed image text
Answer #1

A computer system that writes the before-and-after results of every transaction to a log file is demonstrating which of the following controls?

1:The answer is audit trail because audit trail is a security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event.

2:source data control is not correct because source data control interacts with the data-bound controls and hides the complex data binding processes. These are the tools that provide data to the data bound controls and support execution of operations like insertions, deletions, sorting, and updates.

3 Data transmission control is not correct because Data transmission is a means of transmitting digital or analog data over a communication medium to one or more devices. It allows the transmission and communication of devices in different environments: point-to-point, point-to-multipoint, or multipoint-to-multipoint.

4:completeness check is not correct because Completeness checking may be carried out at either the survey or questionnaire levels. - Completeness checking at survey level ensures that all survey data have been collected. ... -Completeness checking at questionnaire level insures that routing instructions have been followed.

so at last the answer to this question is audit trail and i have describe the reason in the 1st point so if u have any doubts in this you can clear that in the comment box given below +plus if my answer is good and understandable it would be great to receive a thums-up from you guys .

thank you happy coding !

Add a comment
Know the answer?
Add Answer to:
A computer system that writes the before-and-after results of every transaction to a log file is...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Requirement b. For each control, state which transaction-related audit objective(s) is (are) applicable. Transaction-related Audit Internal...

    Requirement b. For each control, state which transaction-related audit objective(s) is (are) applicable. Transaction-related Audit Internal Controls Objective(s) 1. Approved purchase orders are required for all acquisitions of goods. Prenumbered receiving reports are prepared as support for acquisitions and 2. numerically accounted for. Accuracy Dates on receiving reports are compared with vendors' invoices before entry into the 3. acquisitions journal. Classification Completeness 4. Account classifications are reviewed by someone other than the preparer. Occurrence 5. Vendors' invoices are recalculated before...

  • In the log structured file-system, is the checkpoint region marked as the most recent before or after the corresponding...

    In the log structured file-system, is the checkpoint region marked as the most recent before or after the corresponding log is written to disk? Explain why the order matters for file-system consistency.

  • Requirement b. For each internal control, identify the transaction-related audit objective(s) to which it applies. Transaction-related...

    Requirement b. For each internal control, identify the transaction-related audit objective(s) to which it applies. Transaction-related audit Internal control objective(s) Human resource policies require an investigation of an employment application from new employees. Investigation includes checking the employee's background, former 1. employers, and references. Approval of department head or foreman on time records is required before preparing 2. payroll Accuracy All prenumbered time records are accounted for before beginning data entry for 3. preparation of payroll. Accuracy and Occurence Classification...

  • connect ective stions LO 8-2 LO 8-12 LO 8-4 LO 8-4 Select questions are available with...

    connect ective stions LO 8-2 LO 8-12 LO 8-4 LO 8-4 Select questions are available with McGraw-Hill's Connect 8-29. Multiple Choice Questions Select the best answer for each of the following questions. Explain the reasons for your selection 4. LAN is the abbreviation for (1) Large Area Network. x (2) Local Area Network (3) Longitudinal Analogue Network (4) Low Analytical Nets. b. End user computing is most likely to occur on which of the following types of computers? (1) Mainframe....

  • 1. Detection risk is the risk a. that internal controls will not be followed. b. that...

    1. Detection risk is the risk a. that internal controls will not be followed. b. that the business will naturally experience, regardless of internal controls. c. that measures the effectiveness of a firm's internal controls. d. that an internal audit will not uncover incidents where controls have not been followed. 2. Which one of the following types of audits would be most likely to focus on objectives related to the efficient use of resources? a. Operational audit b. Independent audit...

  • 2. Which one of the following types of audits would be most likely to focus on...

    2. Which one of the following types of audits would be most likely to focus on objectives related to the efficient use of resources? a. Operational audit b. Independent audit c. Compliance audit d. Information systems audit 3. Which of the following is a reason for independent checks? a. To assess an employee and determine whether he or she is following control procedures b. To detect and correct errors and misappropriation of assets c. To ensure that mistakes can be...

  • (Click the icon to view the intemal controls.) i Click the icon to view the test...

    (Click the icon to view the intemal controls.) i Click the icon to view the test of controls.) Begin by selecting one internal control for each of the six transaction-related audit objectives for cash disbursements. Then, for ea Internal Test of Transaction-Related Audit Objectives Control Controls 1. Recorded cash disbursements are for goods and services actually received (occurrence) 2. Existing cash disbursement transactions are recorded (completeness). 3. Recorded cash disbursement transactions are accurate (accuracy) 4. Cash disbursement transactions are correctly...

  • 1.Which of the following controls would provide the most assurance to management that recorded sales actually...

    1.Which of the following controls would provide the most assurance to management that recorded sales actually occurred? A) Statements are sent to customers at the end of each month, and customer complaints are investigated B) Responsibilities for recording a customer order and shipping the products are segregated C) A credit sale is recorded only after a credit check is performed D) Shipping documents are prepared for every shipment made and filed in the shipping department 44. Which of the following...

  • EXERCISE Multiplee seen as another way to reduce the attack surface area? A. Dedicated service accounts....

    EXERCISE Multiplee seen as another way to reduce the attack surface area? A. Dedicated service accounts. B. PKI C. Two-factor authentication. D. Strong authentication. E. Access control. tion is vulnerable as it flows across the network, unlessi is A. log analyzed. B. clear texted. C. basically authenticated. D. encrypted. E. All of the above 3. The Unix group mechanism allows for a single user to belong to one or more A. attributes. B. ACLs. C. permissions. D, permissions and ACLa,its...

  • Computer Science Operation System question. I will give thumb up, thank you! Consider a file system that uses inodes to represent files. This file system has 16 direct disk blocks, as well as single,...

    Computer Science Operation System question. I will give thumb up, thank you! Consider a file system that uses inodes to represent files. This file system has 16 direct disk blocks, as well as single, double, and triple indirect disk blocks. This file system is illustrated in the below figure. Please notice that the tables pointed to by the indirect pointers are full sized blocks that only stores pointers. mode owners (2) timestamps (3) size block count data data data direct...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
Active Questions
ADVERTISEMENT