What protection does transaction logging provide? Should it be included in every system?
Answer to relevant QuestionsWhat are the different considerations for output screen design and output report design?What are the four types of input controls used to reduce input errors? Describe how each works.How does public key (asymmetric) encryption work? What are its strengths? What are its weaknesses?Based on the DFD (Figure) given in Chapter 10, “Thinking Critically” problem 5, Special order purchasing, and the structure chart you developed there, identify the set of inputs and outputs required. Develop the list of ...1. Identify the data fields that each report should include.2. What questions will users want each report to answer?3. What type of report is it: detailed, summary, or exception?4. How might graphics be used? What about ...
Post your question