1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler79 [48]
3 years ago
11

What is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing

and sales, operations, financial functions, procurement, and reporting
A. CoBIT Information Systems Audit and Control Association
B. Information Technology Infrastructure Library
C. Committee of Sponsoring Organizations
D. Capability Maturity Model Integration Method
Computers and Technology
1 answer:
marishachu [46]3 years ago
5 0

CoBIT Information Systems Audit and Control Association is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing and sales, operations, financial functions, procurement, and reporting

A. CoBIT Information Systems Audit and Control Association

<u>Explanation:</u>

The key factor for evaluating the internal controls is CoBIT information technology ion are the best reporting tools. Where an organization can generate reports and do the analysis and take the right decision.

Since it has various departments t inside the organization some time performance of the department depends on another department.

The SWOT analysis can be achieved and management can give some input process to improve the department or individual performance in the departments the organization also need an audit log trail to improve internals in the organization.

You might be interested in
within a list are identified by an index number, placed within square brackets after the name of the list. For example:
svlad2 [7]

<u>When a programmer declare single dimension or double dimensions array they use box bracket with index number to access the cell number.</u>

int a[10]; =  where a is variable name declared with data type as integer and which hold 10 values.

Each is access with cell number or index number surrounded by box brackets

Example a [4] where “a” is variable number and “4” is index number or cell number. By refer “4” user is access the 4 cell data

Maximum “a” single dimension store total of 10 number where cell number or index number starts from 0 to 9.

8 0
3 years ago
You need to synchronize your mobile device data with your desktop computer. for security reasons, your organization prohibits sy
jeyben [28]

Answer:

USB

Explanation:

WHile trying to sync your mobile device data with your desktop computer, and Trying to avoid syncing your device over wireless connections or the internet, the best possible solution that comes to mind is to make use of USB.

Here you simply connect your phone to a USB cable and plug it to the USB port on your computer, you will be able to carry out the necessary syncing without violating the promotions from your organization concerning syncing devices over wireless connections or the internet.

8 0
3 years ago
You are creating a business report for your organization. Where will you find the options to edit the margins of your document?
prisoha [69]

Headers and footers

3 0
4 years ago
Read 2 more answers
What information is displayed in the message header of a received message? Check all that apply.
Nesterboy [21]
The answers are:


-the message subject
-the name of the sender
-the names of recipients
-the time and date the message was sent
8 0
3 years ago
Read 2 more answers
What is printed when the following code has been executed?
serg [7]
Hey it is 15 hope this helps
3 0
3 years ago
Other questions:
  • Given a string variable named sentence that has been initialized , write an expression whose value is the the very last characte
    14·1 answer
  • What OS is most commonly used by businesses?
    11·1 answer
  • PLEASE HELP!!!!!!!!!!!
    15·2 answers
  • ______ is the primary and dominant cryptographic authentication and encryption framework for security development within the TCP
    12·2 answers
  • A pair is a simple struct with two data members, one of type T1 and one of type T2. A set and a map are organized as binary sear
    10·1 answer
  • The code segment below is intended to randomly print one of the values 2, 4, 6, or 8 with equal probability.
    12·1 answer
  • Explain three ways in which tables make it easier to understand data
    6·2 answers
  • How does our behavior change when we know we're being watched?
    14·1 answer
  • Write a function isCString which accepts as arguments a const pointer to a char array and an integer for the size of the array
    12·1 answer
  • Difine Mainframe Computer~<br><br><br><br><br><br><br><img src="https://tex.z-dn.net/?f=%20%5C%3A%20%20%5C%3A%20" id="TexFormula
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!