Auditors do not rely on detailed knowledge of the application's internal logic when they use the __________________________ approach to auditing computer applications.
What will be an ideal response?
black box or audit around the computer
PTS: 1
Computer Science & Information Technology
You might also like to view...
A program contains the statement
throw; Where would you normally expect to find such a statement? What if that statement appeared in a different part of the program?
Computer Science & Information Technology
What is the value of i after the following statements?
``` i = 2; i += 25; ``` a) 25 b) 27 c) 50 d) 52
Computer Science & Information Technology
The ____ approach processes firewall rules in top-to-bottom order.
A. Deny All B. In Order C. Best Fit D. Last Fit
Computer Science & Information Technology
Case 14-1Natasha is using collections to organize data in a program that organizes processes such as CPU and printer access.In Natasha's program, items will be added to the ____.
A. front B. pivot C. top D. rear
Computer Science & Information Technology