Which of the following is the BEST way to mitigate the risk of unintentional modifications associated with complex calculations in end-user computing (EUC)?
A. Verify EUC results through manual calculations.
B. Operate copies of EUC programs out of a secure library.
C. Implement data integrity checks.
D. Utilize an independent party to review the source calculations.
A. Verify EUC results through manual calculations.
B. Operate copies of EUC programs out of a secure library.
C. Implement data integrity checks.
D. Utilize an independent party to review the source calculations.