What IT controls should prevent/detect the following threats? Explain 1. The data entry clerk mis-keys the customer

Posted Date: