Provide an explanation of why you selected that


The following is a description of seven control/technology descriptions and a list of seven control/technology names.

Control/Technology Descriptions
A. When you type a customer code into the enterprise system the matching master data is called up to the screen.

B. All enterprise systems can be programmed to consider a number of pieces of stored data and real-time calculations as business event data are being entered into the system.

C. Access to the company network from the Internet is through a server on which there are programs to monitor the traffic, coming and going.

D. Workflow software within enterprise systems can be used to route business events to those who must work on the business event data, or approve the business event before it is finalized.

E. A standard practice at most firms is to develop profiles for each employee to grant them access to the appropriate computer resources.

F. To make changes to production programs, a copy of the program is moved successively through "development," "testing," and "staging," before the modified program is moved into production.

G. Enterprise system software can be configured to require that certain fields be completed on an input screen before being allowed to move on to the next screen.

Control/Technology Names
1. Firewall

2. Preformatted screens

3. Compare input data with master data, programmed edits, customer credit check

4. Populate inputs with master data

5. Program change controls

6. Approvals, such as POs

7. Security module

Listed below are five potential risks or systems failures that can be addressed with a control or a technology from the lists above.
A. On the blank line to the left of each number (the "Description" column), insert the capital letter from the list above for the control/technology that best addresses the risk. A letter should be used only once, with two letters left over.

B. In the column titled "Explanation," provide an explanation of why you selected that control/technology description. You need to specifically describe how the control/technology addresses the risk.

C. In the right column (titled "Name") insert the number from the list above corresponding to the control/technology name for the answer provided in part A.

Request for Solution File

Ask an Expert for Answer!!
Finance Basics: Provide an explanation of why you selected that
Reference No:- TGS02156249

Expected delivery within 24 Hours