1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kykrilka [37]
3 years ago
14

Listed here are 20 control plans discussed in the chapter. On the blank line to the left of each control plan, insert a P (preve

ntive), D (detective), or C (corrective) to classify that control most accurately. If you think that more than one code could apply to a particular plan, insert all appropriate codes and briefly explain your answer.Code Control Plan _________1. Library controls _________2. Program change controls _________3. Fire and water alarms_________4. Fire and water insurance _________5. Install batteries to provide backup for temporary loss in power _________6. Backup and recovery procedures _________7. Service level agreements _________8. IT steering committee 9. Security officer _________10. Operations run manuals _________11. Rotation of duties and forced vacations _________12. Fidelity bonding _________13. Personnel management (supervision) _________14. Personnel termination procedures _________15. Segregation of duties _________16. Strategic IT plan _________17. Disaster recovery planning _________18. Restrict entry to the computer facility through the use of employee badges, guest sign- in, and locks on computer room doors _________19. Access control software _________20. Personnel development controls
Business
1 answer:
sammy [17]3 years ago
5 0

Answer:

Code           Control Plan

____D_____1. Library controls

____P_____2. Program change controls

____D_____3. Fire and water alarms

____C_____4. Fire and water insurance

____C_____5. Install batteries to provide backup for temporary loss in power

____C_____6. Backup and recovery procedures

____P_____7. Service level agreements

____C_____8. IT steering committee

____P_____9. Security officer

____P_____10. Operations run manuals

____D_____11. Rotation of duties and forced vacations

____C_____12. Fidelity bonding

____P_____13. Personnel management (supervision)

____C_____14. Personnel termination procedures

____P_____15. Segregation of duties

____D_____16. Strategic IT plan

____C_____17. Disaster recovery planning

____P_____18. Restrict entry to the computer facility through the use of employee badges, guest sign- in, and locks on computer room doors

____P_____19. Access control software

____D_____20. Personnel development controls

Explanation:

P (preventive) controls protect against errors occurring.

D (detective) controls discover errors that have already occurred.

C (corrective) controls correct errors that have already occurred.

You might be interested in
Identify whether the following paragraph uses a direct, indirect, or semi-indirect organizational pattern.
Anna007 [38]

Answer:

Correct answer is B that is <u>Indirect Organizational Pattern</u>

6 0
3 years ago
Read 2 more answers
What is the pattern of 0.03 , 0.3 , 3 , 30
scoundrel [369]
The answer would be 300
4 0
3 years ago
Read 2 more answers
Those who make economic policy concerning price controls often do so in order to?
nlexa [21]

Answer:

establish a more equitable result based on normative judgements. In the market for personal computers and in the stock market: 1) supply and demand shifts change prices and quantities.

5 0
2 years ago
Mr. Hugh Warner is a very cautious businessman. His supplier offers trade credit terms of 3/19, net 60. Mr. Warner never takes t
vekshin1

Answer:

35.92%

Explanation:

The computation of cost of not taking the cash discount is shown below:-

Discount percentage ÷ (100 - Discount percentage) × (360 ÷ (Full Allowed Payment Days - Discount Days))

= 3% ÷ 97% × 360 ÷ (50 - 19)

=  3% ÷ 97% × 360 ÷ 31

=  0.03093 × 11.61290

= 0.359187

= 35.92%

Therefore for computing Mr. Warner's cost of not taking the cash discount we applied the above formula.

3 0
3 years ago
You invest $600 in security A with a beta of 1.5 and $400 in security B with a beta of 0.90. The beta of this portfolio is _____
klio [65]

Answer:

Beta= 1.26

Explanation:

<u>First, we will calculate the proportion of the portfolio of each security:</u>

Security A= 600/1,000= 0.6

Security B= 400/1,000= 0.4

<u>Now, the beta of the portfolio:</u>

Beta= (proportion of investment A*beta A) + (proportion of investment B*beta B)

Beta= (0.6*1.5) + (0.4*0.9)

Beta= 1.26

7 0
3 years ago
Other questions:
  • 1. Does the selected business have differentiated products or services? If so, what is the basis for this differentiation from t
    13·1 answer
  • According to maslow, the authority and responsibility of an effective manager focuses upon which level of needs?
    13·1 answer
  • Eleanor paid an annual premium of $2,000 in total coverage for her homeowner's insurance, including $250,000 in damage coverage
    15·1 answer
  • Which is the most common ethical dilemma that financial planners face? A. method of meeting their clients B. method of charging
    7·1 answer
  • What is the difference between an Oligopoly and a Monopoly?
    13·1 answer
  • Omega, Inc. sells its fitness wrist band for $100. It cost the company $62 to make the product. While Tom values the Omega wrist
    14·2 answers
  • Firms classified as being part of the sharing economy and collaborative consumption are still considered too risky to attract su
    12·1 answer
  • Tan Company is preparing the annual financial statements dated December 31 of the current year. Ending inventory Information abo
    13·1 answer
  • Which of the following is an example of promotion?
    6·2 answers
  • Why are most economies in the world today considered mixed economies?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!