Multiple Choice
The security and confidentiality risks of computer-based matching would include:
A) Unauthorized access to the system's ordering and matching functions would allow the insertion of fictitious vendors and / or invoices.
B) Errors in system logic can cause systematic and repetitive errors in matching.
C) The criteria used to identify duplicate payments may be too tightly defined and will overlook duplicate payments.
D) System breakdowns or interruptions can stop or slow the processing of invoices and payments.
Correct Answer:

Verified
Correct Answer:
Verified
Q46: Which of the following internal controls wold
Q47: Which of the following is most likely
Q48: The accounting record that includes the details
Q49: Which of the following is not an
Q50: The internal control process that requires the
Q52: The acquisition of materials and supplies and
Q53: The internal control process of separating the
Q54: The internal control process that requires purchase
Q55: Internal control is strengthened by the use
Q56: Which of the following questions would most