Object-oriented analysis and design, coupled with ________, is used as the most effective technique to build software and information systems.
A) object-oriented technology
B) implementation
C) requirement
D) maintenance
Question 2
_________ audit trails may be used to detect security violations within an application or to detect flaws in the application's interaction with the system.
A. Application-level B. System-level
C. User-level D. None of the above