Explanation:
The son-father-grandfather concept of backing up master files can be used when master files are stored on magnetic tape or magnetic disk.
Explanation:
Verbal approval is an informal control that is not always effective in ensuring that changes to application programs are authorized, tested, and properly implemented. Verbal approvals may not be documented or traced, and may not involve all relevant stakeholders, such as IT management, business process owners, and auditors. Additionally, verbal approvals may be subject to misunderstandings or miscommunications, leading to errors or fraud.
Explanation:
A check digit could potentially detect the error of inadvertently ordering part number 1234-8 instead of 1243-8 during processing, depending on the algorithm or formula used to calculate the check digit.
Explanation:
A financial total, also known as a control total or a batch total, is a sum of monetary values within a batch of transactions. It is commonly used as a tool for verifying the accuracy and completeness of a batch of data. In this case, the financial total is the sum of the employee gross pay amounts, and it can be compared to an expected total to ensure that all data has been properly entered and accounted for.
Explanation:
A table-lookup procedure could potentially prevent the situation where a worker's paycheck is processed incorrectly due to transposed letters in their department identification code.
Explanation:
A hash total is a control total that is calculated by summing a field of data that has no intrinsic meaning or significance, such as Social Security numbers, employee ID numbers, or invoice numbers. The purpose of a hash total is to provide a simple, fast, and easy way to verify the completeness and accuracy of data by detecting errors that cause a mismatch between the expected and actual totals.
Explanation:
Passwords may be used to ensure that users have proper authorization to perform a task in an online computer system. A password is a secret code that is known only to the user and is used to verify the user's identity. Users must enter their password to access certain functions or perform certain tasks. The password acts as a form of authentication and helps to ensure that only authorized users can perform certain actions within the system.