Which of the following procedures is NOT used to detect unauthorized program changes? a. Source code comparison

Question:

Which of the following procedures is NOT used to detect unauthorized program changes?

a. Source code comparison

b. Parallel simulation

c. Reprocessing

d. Reprogramming code

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Related Book For  book-img-for-question

Accounting Information Systems

ISBN: 9781292060521

13th Global Edition

Authors: Marshall B. Romney, Paul John Steinbart

Question Posted: