
The information system employed by Ted The Bear plc automatically maintains a log of user activity.
This log contains details of identity, log-on and log-off times and details of processing carried out or access attempts made by Ted’s employees who are users of the system.
All transactions are tagged to identify the person responsible for that processing task.
The log-on details of the user determine processing privileges within the information system.
Which ONE of the following control objectives should this system effectively address?
Select ONE answer:
- Prevention
- Correction
- Accuracy
- Completeness
Show your workings to arrive at your answer, and explain and justify your reasons:
……………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………
This multiple-choice question is suitable for Accounting KS5 classes.
The answer is 1
- Correct == > The log should help to prevent unauthorised processing as processing privileges of the users are defined by the log-in details they provide. The log can do little about correction, completeness or accuracy of what the user enters into the information system.
- Not correct
- Not correct
- Not correct

This work is licensed under a Creative Commons Attribution 4.0 International License.
