
微信扫一扫
实时资讯全掌握
One of the steps in assessing control risk in a computerized information control system is identifying necessary controls to prevent data from being lost, added, duplicated, or altered during processing. An example of this type of control is the A. Use of external and internal file labels. B. Use of control totals, limit and reasonableness checks, and sequence tests. C. Authorization and approval of data in user departments and screening of data by data control groups. D. Review of data output by data control groups. |