1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tensa zangetsu [6.8K]
4 years ago
5

A computer programmer from the payroll department created a fake employee number and entered this employee into the payroll data

base. She then prepared paychecks for this fake employee using the payroll systems and sent them to her own PO Box address. Identify 2 control procedures that could have prevented the problem, and explain why each of the controls would have helped.
Computers and Technology
1 answer:
Delvig [45]4 years ago
4 0

Answer:

1. Verify transactions independently .

2. Restricting access to programmers to change programs and data files when there is an error.

Explanation:

  1. Verifying transactions independently by involving another employee re-entering transactions, then programming the software in order to compare the inputs and search out errors, is an essential control method.By doing this, errors are identified, reducing risk of incorrect transactions.
  2. When programmers have access to changing data and programs, this indicates a lack of internal control. Unrestricted access enables a programmer include or subtract certain elements of programs which could lead to errors in operations and transactions. There should be proper identification of duties and a programmer should be bound by specific functions, reducing the risk of this type of error.

You might be interested in
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attack
Strike441 [17]

Answer:

Intrusion Prevention System (IPS)

Explanation:

Firewall can be defined as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Simply stated, a firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

A firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.

Basically, it is a network security device or security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer

Thus, the tool you should use is an intrusion prevention system (IPS).

6 0
3 years ago
A type of graph that uses horizontal bars to compare data is called a
sergiy2304 [10]
The answer is A) a bar graph

6 0
4 years ago
Read 2 more answers
Can the police track a phone if you post something on a social media platform even if the SIM card is out and location services
IgorLugansk [536]
Yes by using the internet address
6 0
3 years ago
Read 2 more answers
Describe the user interface in other high-technology devices commonly found in the home or office, such as a smartphone, HD tele
Vadim26 [7]

Answer:

Explanation:

Different technologies use different user interface designs in order to make the user experience as easy and intuitive as possible. This varies drastically from one device to another because of the capabilities and size of each device. If we take a fitness/smart watch into consideration, this device does not use pop up menus or side scrolling menus but instead uses large full screen menus where each option nearly fills the entire screen. That is done because the smart watch screens are very small and making everything full screen makes reading and swiping through options that much easier for the user. If the user interface were the same as in a television or smartphone it would be impossible to navigate through the different options on such a tiny screen.

7 0
3 years ago
Jason had clicked an image of his favorite band at a concert. He wanted to create a washed out look of this image to turn it int
8_murik_8 [283]

just to ensure people, its desaturate (kinda like saturation)

4 0
4 years ago
Other questions:
  • Write a class called Product. The class should have fields called name, amount, and price, holding the product’s name, the numbe
    8·1 answer
  • By default, the Windows desktop displays
    6·1 answer
  • Which of the following sentences is correct?a. Arithmetic log unit is used to perform both integer and floating point computatio
    8·1 answer
  • Im new what are points
    6·2 answers
  • A set of instructions to increase a programmer’s pay rate by 10 percent is hidden inside an authorized program. It changes and u
    12·1 answer
  • In the ______ algorithm, the disk arm starts at one end of the disk and moves toward the other end, servicing requests till the
    11·1 answer
  • What is the output of the following code:
    12·1 answer
  • Which of the following statement is correct ? A . potential difference is measured by ammeter . B . The unit of potential differ
    9·1 answer
  • I really need help please help me
    6·1 answer
  • Software is the brain of computer. Explain this starement
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!