1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Setler79 [48]
3 years ago
11

What is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing

and sales, operations, financial functions, procurement, and reporting
A. CoBIT Information Systems Audit and Control Association
B. Information Technology Infrastructure Library
C. Committee of Sponsoring Organizations
D. Capability Maturity Model Integration Method
Computers and Technology
1 answer:
marishachu [46]3 years ago
5 0

CoBIT Information Systems Audit and Control Association is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing and sales, operations, financial functions, procurement, and reporting

A. CoBIT Information Systems Audit and Control Association

<u>Explanation:</u>

The key factor for evaluating the internal controls is CoBIT information technology ion are the best reporting tools. Where an organization can generate reports and do the analysis and take the right decision.

Since it has various departments t inside the organization some time performance of the department depends on another department.

The SWOT analysis can be achieved and management can give some input process to improve the department or individual performance in the departments the organization also need an audit log trail to improve internals in the organization.

You might be interested in
When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. B
jeka94

Answer:

Because reusing the old passwords possess security threats.

Explanation:

A password can be defined as a string of characters or words or phrases that are used to authenticate the identity of the user. It is also known as passcode and should be kept confidential. A password is used to access constricted systems, applications, etc.

A password or passcode is usually composed of alphabets, numbers, symbols, characters, alphanumeric, or a combination of these.

<u>In the given case, Judy was not able to change her passcode to the previous one because reusing old passwords is prohibited in any sites or systems. A system denies the user to reuse the old passwords for various reasons but most importantly due to security reasons. Though it is said that old passwords can be used after 100 times but seldom someone changes a password that much. All systems care for the security of their users thus they deny reusing old passcodes.</u>

6 0
3 years ago
Why is it important to have user accounts? describe the purpose, features and functions of user accounts (including administrato
TEA [102]
Its important to have user accounts so you can save data and maybe log in and out of a device/cmp to another one. The purpose of the user account is to help save your stuff and personalize your device. The features are more data storage to add up, and ability to make more accounts for others so each of you can personally have their own account and save their own data on their own. Administrator accounts are the highest and have the most power of all, they are in charge of everything, especially giving permission to apps you may have downloaded and removing system apps. Users rights are the tasks specific users can do to make sure no user has too much power or less so to speak and it means what you are able/not able to do as well.
5 0
3 years ago
How does a film establish the setting?
ololo11 [35]

Answer:

Establishing Shots are critical in a film. They clue the viewer where this next scene is about to take place. Each time the location of a scene shifts, a new establishing shot does exactly; what its name implies: it establishes where the story will now continue, and fiction writers need to do the same thing.

Explanation:

8 0
3 years ago
Alison is entering text in a Word document. As she is entering data, where will the cursor move in relation to the text she is t
Vinil7 [7]

The cursor should move right but if not give me more information to correct my statement

6 0
3 years ago
Assignment
Lena [83]

Answer:

it

is

not

a

big

question

it

is

so

simple

5 0
3 years ago
Other questions:
  • In Java :
    11·1 answer
  • When did Kodak introduce film photography to the commercial market?
    10·2 answers
  • Why would "ExpirationDate” be a poor choice as a primary key?
    11·1 answer
  • Develop a list of privacy protection features that should be present if a website is serious about protecting privacy. Then, vis
    8·1 answer
  • Which word goes with "meals
    5·2 answers
  • A byte contains how many bits? Question 3 options:
    13·2 answers
  • Benefits of computer in bank​
    5·1 answer
  • Of the following field which would be the most appropriate for the primary key in a customer information table?
    5·1 answer
  • Answer This One Question Right For Brainliest
    10·1 answer
  • . prevalence of coronary artery disease in patients with isolated aortic valve stenosis. br heart j. 1984;51:121–4.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!