. Question 30 .
A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program .
. Question 31 .
________ controls prevent , detect and correct transaction errors and fraud .
. Question 32 .
According to the ERM , these objectives help ensure the accuracy , completeness and reliability of internal and external company reports .
. Question 33 . Generally in a risk assessment process , the first step is to . Question 34 .
The process that a business uses to safeguard assets , provide accurate and reliable information , and promote and improve operational efficiency is known as
. Question 35 .
According to the ERM , these help the company address all applicable laws and regulations .
. Question 36 . Which of the following is an example of a corrective control ? . Question 37 .