
微信扫一扫
实时资讯全掌握
In a daily computer run to update checking account balances and print out basic details on any customer’s account that was overdrawn, the overdrawn account of the computer programmer was never printed. Which of the following control procedures would have been most effective in detecting this fraud? A. A program check for valid customer code. B. Use of the test-data approach by the author in testing the client’s program and verification of the subsidiary file. C. Use of a running control total for the master file of checking account balances and comparison with the printout. D. Periodic recompiling of programs from documented source files, and comparison with programs currently in use. |