Methods used to maintain an audit trail in a computerized environment include all of the following except

A. transaction logs
B. transaction listings
C. data encryption
D. log of automatic transactions


Answer: C

Computer Science & Information Technology

You might also like to view...

The ability to increase the processing capability of a computer system so that it can handle more users, more data, or more transactions in a given period is known as _____.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which type of IDPS can have the problem of getting disparate systems to work in a coordinated fashion?

A. inline B. host-based C. hybrid D. network-based

Computer Science & Information Technology

The ____ character is automatically appended to all strings by the C compiler.

A. '\NULL' B. '\1' C. '\n' D. '\0'

Computer Science & Information Technology

A user types the number -12.6 in response to a prompt in a program. Which Scanner class method should be used to read the user input as a numeric value?

a) nextInt() b) nextDouble() c) nextNegative() d) next() e) any of these methods will work

Computer Science & Information Technology