A secure system includes _____ that can log every instance of data entry and changes.

A. audit trails
B. trap trails
C. batch trails
D. control trails


Answer: A

Computer Science & Information Technology

You might also like to view...

If an exception is thrown in C++, it may be because:

A. there was not enough heap memory to satisfy a new operation B. the compiler found the code to be exceptionally confusing C. an exception catcher is ready to catch it D. the exception, being confined to an addressable location, was recently released by a faulty exception clause

Computer Science & Information Technology

An encryption algorithm is

a. a combination of the formula and the key used for encryption b. another name for the encryption key c. the formula used to encrypt data d. always based on standards

Computer Science & Information Technology

Search engines do not allow users to view or change their search history information.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The four available storage classes are called auto, static, extern, and ____.

A. stack B. intern C. void D. register

Computer Science & Information Technology