question archive TRUE/FALSE 1)In a computerized environment, the audit trail log must be printed onto paper documents
Subject:AccountingPrice: Bought3
TRUE/FALSE
1)In a computerized environment, the audit trail log must be printed onto paper documents.
2.Disguising message packets to look as if they came from another user and to gain access to the host’s network is called spooling.
3.Access controls take on increased importance in a computerized environment because all of the records may be found in one place.
4.Computer viruses usually spread throughout the system before being detected.
5.A worm is software program that replicates itself in areas of idle memory until the system fails.
6.Viruses rarely attach themselves to executable files.
7.Subschemas are used to authorize user access privileges to specific data elements.
8.A recovery module suspends all data processing while the system reconciles its journal files against the database.
9.The Database Management System controls program files.
10.Operating system controls are of interest to system professionals but should not concern accountants and auditors.