Match each of the following program-embedded techniques (letters A-I) with a description of these techniques (numbers 1-9). Each technique relates to only one description.
1.Identifying transactions at input and obtaining a computer trail of all processing steps related to these transactions | Extended records | ____ |
2.Obtaining a record of transactions and database elements prior to and following computerized processing | Program analysis techniques | ____ |
3.Writing auditor-selected transactions to a special file for later verification | Tagging transactions | ____ |
4.Using software packages that assist audit teams in understanding the logic of an application program and following the flow of transactions and data through an application program | Embedded audit modules | ____ |
5.Using hardware and software to identify the individual who accesses the system, the applications and operations accessed, and the time the applications and operations were accessed | Parallel simulation | ____ |
6.Processing simulated transactions through the client’s computerized processing system and comparing results to predetermined results | Snapshot | ____ |
7.Providing an audit trail of transactions by accumulating the results of all processing | Integrated test facility | ____ |
8.Processing actual transactions through programs designed by audit teams to replicate the client’s computerized processing system | Test data | ____ |
9.Processing simulated transactions related to a fictitious department or branch created by the audit team | Monitoring system activity | ____ |
We need at least 10 more requests to produce the solution.
0 / 10 have requested this problem solution
The more requests, the faster the answer.