(46)Under Application Controls, maintains the chronology of events that occur when a user attempts to gain access to and employ systems resources.



(46)Under Application Controls,               maintains the chronology of events that occur when a user attempts to gain access to and employ systems resources.


(a)Boundary Controls
(b)Input Controls
(c)Communication Controls
(d)Processing Controls