________________ should be implemented as early as data preparation to support data integrity at the earliest point possible.
A. Control totals
B. Authentication controls
C. Parity bits
D. Authorization controls
A. Control totals
B. Authentication controls
C. Parity bits
D. Authorization controls