Log analysis is a software used by auditor to detect virus
On line testing techniques the auditor ______ data either _______ or fictitious in order to see that a specific program or sever edit test is doing its work
Mapping software is used by the auditor to list unused program instructions
Mapping software has very objectives
Modeling is a variety of software which ________________
On line testing can be targeted for specific functions carried out by programs
Program code analysis involves _____________
Snapshot is software which takes a picture of a file or data or a transaction passing though the system
Base case system evaluation includes____________
While base testing forces on finding if there are any defective execution policies in a program