ACC 562 EDU Education Terms/acc562edu.com ACC 562 EDU Education Terms/acc562edu.com | Page 9

operating system programs. Java scripts. access control programs. 34. The combination of which functions in an information technology environment are not necessarily a control weakness? (Points: 4) user and programming functions database administrator and data input functions programmers and authorization of changes users and certain data access 35. Backup controls, used to prevent data and software loss would include procedures to: (Points: 4) load balance in the event of heavy traffic across the network. constantly monitor the network for intrusion and attack. provide an alternate form of electricity to the corporate facilities. fail-over to a mirrored storage device in the event of interruption or loss. 36. Which one of the following is an example of an edit test for limits? (Points: 4) Only numbers are allowed to be input into the social security number field and dashes are pre-formatted. Each sales order is given an identifier that is also tagged to the receipt of goods record, the customer invoice record and the cash receipts record