Question: Audit of IT General Controls Req: On the space provided, indicate the appropriate term as described by the following: 1._________ A system conversion method in
Audit of IT General Controls
Req: On the space provided, indicate the appropriate term as described by the following:
1._________ A system conversion method in which on a chosen date the old system operation is terminated and all processing begins on the new system.
2._________ The testing method which verifies that all software and hardware components work together.
3. _________In this feasibility, the project team must estimate the total amount of time necessary to implement each alternative design.
4.________ A key control in program development which ensures that the application fulfills the agreed-upon functional expectations of the users, meets established usability criteria, and satisfies performance guidelines before being implemented into production.
5. ________ A technique that brings users and project team members together for an intensive workshop in which they create a system proposal into a detail design
6. _______There are several important aspects to be considered during a feasibility study. The aspect that asks the question, "Can people use the system and will they use it?"
7.________ The form of resistance where the new system is blamed for any and every unpleasant occurrence.
8.________ The person responsible of moving the program codes between environments.
9.________ It is a technique for providing users a preliminary working version of the system.
10. _______In this SDLC phase, the systems analyst defines all system interfaces, reporting, and screen layouts, and specific program logic.
II. Short Answer Questions
a) What is the difference between authentication and authorization?
b) Explain why an organization should establish and enforce policies for its IT systems in the following areas (e.g. length of password, rotation of passwords, or writing passwords on paper or sticky notes) regarding the use of passwords for log-in?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
