List three pairs of system functions that should be separated in the centralized computer services organization. Describe a risk exposure if the functions are not separated.
Functions to Separate
Risk Exposure
__________________________
__________________________
__________________________
__________________________
__________________________
__________________________
What will be an ideal response?
separate systems development from data processing operations (unauthorized changes to application programs during execution), separate database administrator from systems development (unauthorized access to database files), separate new systems development from systems maintenance (writing fraudulent code and keeping it concealed during maintenance), separate data library from computer operations (loss of files or erasing current files)
You might also like to view...
In array items, which expression below accesses the value at row 3 and column 4?
a. items[3].[4] b. items[3[4]] c. items[3][4] d. items[3, 4]
Under what circumstances could the head and tail references for the linked implementation or the front and rear references of the array implementation be equal?
What will be an ideal response?