Auditors are now faced with examining clients that have database systems.a. Describe a database system, including its major advantage.b. Identify policies and procedures that may be established to provide control over that aspect of a database system.

What will be an ideal response?


a. In a database system, separate files are replaced with an integrated database that is shared by many application programs.

b. Controls over database systems include:
A system of user identification numbers and passwords should be used to restrict specific data to authorized personnel. 
Terminal activity should be logged by the operating system for subsequent review of unauthorized access to data. 
The responsibility for updating specific data should be assigned to a specific department. 

Business

You might also like to view...

Many communication scholars have linked nonverbal immediacy with ______.

a. respect b. popularity c. honesty d. liking

Business

Complete the statement, using the following terms: increase, decrease, or have no effect on. Increases in total fixed costs________ contribution margin per unit and ________ the breakeven point.

What will be an ideal response?

Business

Which is correct?

A. If a service desk analyst is aware of a customer using an unauthorized, unlicensed software package for a critical assignment, the analyst should let the customer use the package until the assignment is over and instruct the customer to not use the package again. B. If a customer is late in completing a critical assignment, a service desk analyst may reset his password without proper authorization as long as he logs a ticket and indicates that he has bypassed the proper procedures in the comments field. C. If a new employee has started work, and his user id and password have not been created yet, a service desk analyst should let the new employee sign in using a coworker's id for a maximum of 3 days and log a request to create an id and password for the new employee. D. If a senior level manager, trying to complete a critical project, requests access to data to which he is not authorized to access, a service desk analyst should log the request and follow the proper procedures for granting access.

Business

Shanique wanted a pair of Levis, but ________ didn't have her size

A) it B) they C) the store

Business