. Question 30.
A ________ is similar to a ________, except that it is a program rather than a code segment hidden in a host program.
. Question 31.
________ controls prevent, detect and correct transaction errors and fraud.
. Question 32.
According to the ERM, these objectives help ensure the accuracy, completeness and reliability of internal and external company reports.
. Question 33. Generally in a risk assessment process, the first step is to. Question 34.
The process that a business uses to safeguard assets, provide accurate and reliable information, and promote and improve operational efficiency is known as
. Question 35.
According to the ERM, these help the company address all applicable laws and regulations.
. Question 36. Which of the following is an example of a corrective control?. Question 37.