Exam 5: Computer Fraud
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
"Cooking the books" is typically accomplished by all the following except
(Multiple Choice)
4.8/5
(38)
Computer systems are particularly vulnerable to computer fraud because
(Multiple Choice)
4.9/5
(40)
The day after Christmas,Jane Olson,Chief Information Officer at American Trading Corporation (ATC),received some bad news.The hard drive use to store the company's system data backups was lost while it was being transported to an offsite storage location.Jane called a meeting of her technical staff to discuss the implications of the loss.Which of the following is most likely to relieve her concerns over the potential cost of the loss?
(Multiple Choice)
4.8/5
(36)
What are the actions recommended by the Treadway Commission to reduce the possibility of fraudulent financial reporting?
(Essay)
4.7/5
(42)
Which of the following is not a way to make fraud less likely to occur?
(Multiple Choice)
4.8/5
(32)
Which of the following will not reduce the likelihood of an occurrence of fraud?
(Multiple Choice)
4.8/5
(32)
Which of the following is not a way to improve fraud detection?
(Multiple Choice)
4.9/5
(35)
Why do fraudulent acts often go unreported and are therefore not prosecuted?
(Essay)
4.8/5
(30)
Explain the various computer fraud classifications using the data processing model.Provide an example for each computer fraud classification.
(Essay)
4.8/5
(24)
Which characteristic of the fraud triangle often stems from the belief that "the rules do not apply to me" within an organization?
(Multiple Choice)
4.8/5
(35)
The activist hacker group called Anonymous played Santa Claus one Christmas,indicating they were "granting wishes to people who are less fortunate than most." They were inundated with requests for iPads,iPhones,pizzas,and hundreds of other things.They hacked into banks and sent over $1 million worth of virtual credit cards to people.
(True/False)
4.7/5
(38)
At the beginning of this chapter,you were presented with a situation regarding Jason Scott.Jason is an internal auditor for Northwest Industries,a forest products company.On March 31,he reviewed his completed tax return and noticed that the federal income tax withholding on his final paycheck was $5 more than the amount indicated on his W-2 form.He used the W-2 amount to complete his tax return and made a note to ask the payroll department what happened to the other $5.The next day,Jason was swamped,and he dismissed the $5 difference as immaterial.On April 16,a coworker grumbled that the company had taken $5 more from his check than he was given credit for on his W-2.When Jason realized he was not the only one with the $5 discrepancy,he investigated and found that all 1,500 employees had the same $5 discrepancy.He also discovered that the W-2 of Don Hawkins,the payroll programmer,had
thousands of dollars more in withholdings reported to the Internal Revenue Service (IRS)than had been withheld from his paycheck.
Identify the type of fraud scheme may have happened as described.Describe controls you would implement to address the fraud risk,and label each control as preventive or detective.
(Essay)
4.8/5
(33)
________ is a simple,yet effective,method for catching or preventing many types of employee fraud.
(Multiple Choice)
4.9/5
(36)
Most fraud perpetrators have previous criminal record;they were dishonest and disrespected members of their community.
(True/False)
4.7/5
(35)
One fraudulent scheme covers up a theft by creating cash through the transfer of money between banks.This is known as
(Multiple Choice)
4.7/5
(46)
Identify the threat below that is not one of the four types of threats faced by accounting information systems.
(Multiple Choice)
4.9/5
(39)
Which of the following is not an example of misappropriation of assets?
(Multiple Choice)
4.8/5
(44)
Showing 41 - 60 of 83
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)