Security measures that are concerned with whether or not users can run an application, read a file, or change data in a database, or can change who can access to data that others have created are referred to as:

A) logical access controls.
B) physical access controls.
C) backup procedures.
D) audit trails.


A

Business

You might also like to view...

The comparative balance sheets of Midnite Corp for 2017 and 2016 indicate that short-term trade notes receivable increased from $5,000 in 2016 to $75,000 in 2017 . How will this change be reported on Midnite's statement of cash flows, if Midnite uses the indirect method?

a. It will be included in the amount of cash and cash equivalents at the end of 2017. b. It will be reported as a deduction from net income in the operating activities section. c. It will be reported as a cash outflow in the investing activities section. d. It will be added to net income in the operating activities section.

Business

A major disadvantage of the marketing concept is that it is limited to current, expressed needs

Indicate whether the statement is true or false

Business

) Costs identified as indirect labor should be charged to ________.

A) manufacturing overhead B) direct labor on the job cost record C) ignored since they are not relevant D) salaries payable

Business

The product life-cycle concept from microeconomics and marketing provides useful insights into the relations between cash flows from operating, investing, and financing activities. When a product matures

a. net income usually reaches a peak. b. working capital declines. c. operations generate negative cash flow. d. all of the above. e. none of the above.

Business