Shortcut Navigation:

Box Approach Quiz

Computer security is frequently associated with confidentiality, integrity and authentication

Data reserve engineering process metadata to document system and abstract business rules and relationship

The first step for developing CAAT is_________

Using the open database connectivity feature in ACL is ______________

Computer Assisted Audited Technique involves the use of computers through "Black Box Approach"

White Box Approach necessary involves expert knowledge on the part of Auditor

The transition from manual system to CIS environment bring dramatic changes including ________________

Auditing with computer necessarily supports the

CAAT involves an Auditors' appreciation of __________

Widespread end use computing result in unlimited errors creeping into system going to accept handling, thereby increasing audit risks