Computer-based systems employ four types of files. Name them.
Answer to relevant QuestionsIs a data flow diagram an effective documentation technique for identifying who or what performs a particular Explain? Explain the technique known as destructive update.How can external auditors attempt to uncover motivations for committing fraud?What is the objective of reengineering?Describe an internal control that would prevent an employee from removing a computer and then reporting it as scrapped.
Post your question