A programmer has made unauthorized changes to key fields in a payroll system report. Which of the following control weaknesses would have contributed MOST to this problem?
A. The user requirements were not documented.
B. Payroll files were not under the control of a librarian.
C. The programmer did not involve the user in testing.
D. The programmer has access to the production programs.
A. The user requirements were not documented.
B. Payroll files were not under the control of a librarian.
C. The programmer did not involve the user in testing.
D. The programmer has access to the production programs.