Auditors do not rely on detailed knowledge of the application's internal logic when they use the __________________________ approach to auditing computer applications.

What will be an ideal response?


black box or audit around the computer


PTS: 1

Computer Science & Information Technology

You might also like to view...

A program contains the statement

throw; Where would you normally expect to find such a statement? What if that statement appeared in a different part of the program?

Computer Science & Information Technology

What is the value of i after the following statements?

``` i = 2; i += 25; ``` a) 25 b) 27 c) 50 d) 52

Computer Science & Information Technology

The ____ approach processes firewall rules in top-to-bottom order.

A. Deny All B. In Order C. Best Fit D. Last Fit

Computer Science & Information Technology

Case 14-1Natasha is using collections to organize data in a program that organizes processes such as CPU and printer access.In Natasha's program, items will be added to the ____.

A. front B. pivot C. top D. rear

Computer Science & Information Technology