Exam 12: Business Ethics, Fraud, and Fraud Detection
Exam 1: Auditing and Internal Control100 Questions
Exam 2: Auditing IT Governance Controls91 Questions
Exam 3: Auditing Operating Systems and Networks105 Questions
Exam 4: Auditing Database Systems100 Questions
Exam 5: Systems Development and Program Change Activities94 Questions
Exam 6: Transaction Processing and Financial Reporting Systems Overview98 Questions
Exam 7: Computer Assisted Audit Tools and Techniques82 Questions
Exam 8: Data Structures and Caatts for Data Extraction81 Questions
Exam 9: Auditing the Revenue Cycle97 Questions
Exam 10: Auditing the Expenditure Cycle100 Questions
Exam 11: Enterprise Resource Planning Systems90 Questions
Exam 12: Business Ethics, Fraud, and Fraud Detection84 Questions
Select questions type
Individuals who acquire some level of skill and knowledge in the field of computer ethics are involved in which level of computer ethics?
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
A
Scavenging is a form of fraud in which the perpetrator uses a computer program to search for key terms in a database and then steal the data.
Free
(True/False)
4.9/5
(38)
Correct Answer:
False
Explain the Pay and Return scheme.
Free
(Essay)
4.7/5
(32)
Correct Answer:
A pay-and-return scheme involves a clerk with check-writing authority who pays a vendor twice for the same products (inventory or supplies) received. The vendor, recognizing that its customer made a double payment, issues a reimbursement to the victim company. The clerk intercepts and cashes the reimbursement check.
In balancing the risks and benefits that are part of every ethical decision, managers receive guidance from each of the following except
(Multiple Choice)
4.9/5
(39)
The text discusses many questions about personal traits of executives which might help uncover fraudulent activity. What are three?
(Essay)
4.8/5
(38)
Employees should be made aware of the firm's commitment to ethics.
(True/False)
4.8/5
(32)
According to common law, there are five conditions that must be present for an act to be deemed fraudulent. Name and explain each.
(Essay)
4.9/5
(35)
Database management fraud includes altering, updating, and deleting an organization's data.
(True/False)
4.8/5
(36)
Which of the following controls would best prevent the lapping of accounts receivable?
(Multiple Choice)
4.8/5
(38)
Distinguish between skimming and cash larceny. Give an example of each
(Essay)
4.8/5
(29)
Opportunity involves direct access to assets and/or access to information that controls assets.
(True/False)
5.0/5
(39)
Which characteristic is not associated with software as intellectual property?
(Multiple Choice)
4.8/5
(41)
Changing the Hours Worked field in an otherwise legitimate payroll transaction to increase the amount of the paycheck is an example of data collection fraud.
(True/False)
4.8/5
(44)
Showing 1 - 20 of 84
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)