Computerized systems ought to have adequate controls to circumvent unauthorized accessibility or changes to info. There needs to be controls to forestall omissions in data (e.There are three techniques to validation. Potential validation is the preferred approach, but there are conditions where the opposite methods can be used. These ways and their