List three pairs of system functions that should be separated in the centralized computer services organization. Describe a risk exposure if the functions are not separated.
Functions to Separate
Risk Exposure
  __________________________
__________________________
  __________________________
__________________________
  __________________________
__________________________

What will be an ideal response?

separate systems development from data processing operations (unauthorized changes to application programs during execution), separate database administrator from systems development (unauthorized access to database files), separate new systems development from systems maintenance (writing fraudulent code and keeping it concealed during maintenance), separate data library from computer operations (loss of files or erasing current files)

Computer Science & Information Technology

You might also like to view...

In array items, which expression below accesses the value at row 3 and column 4?

a. items[3].[4] b. items[3[4]] c. items[3][4] d. items[3, 4]

Computer Science & Information Technology

Under what circumstances could the head and tail references for the linked implementation or the front and rear references of the array implementation be equal?

What will be an ideal response?

Computer Science & Information Technology