Exam 16: Ethics, fraud and Computer Crime
Exam 1: Systems Fundamentals57 Questions
Exam 2: Systems Characteristics and Considerations58 Questions
Exam 3: Database Concepts I60 Questions
Exam 4: Database Concepts II58 Questions
Exam 5: XBRL Reporting60 Questions
Exam 6: System Mapping and Documentation60 Questions
Exam 7: Internal Controls I60 Questions
Exam 8: Internal Controls II59 Questions
Exam 9: Transaction Cycle The Revenue Cycle58 Questions
Exam 10: Transaction Cycle The Expenditure Cycle59 Questions
Exam 11: Transaction Cycle The Production Cycle60 Questions
Exam 12: Transaction Cycle The HR Management and Payroll Cycle60 Questions
Exam 13: Transaction Cycle The General Ledger and Financial Reporting Cycle60 Questions
Exam 14: Systems Development60 Questions
Exam 15: Auditing of Accounting Information Systems60 Questions
Exam 16: Ethics, fraud and Computer Crime58 Questions
Select questions type
An ethical decision-making model provides guidance on:
Introduction
(Multiple Choice)
4.9/5
(36)
Name and briefly compare and contrast at least three types of malware.
(Essay)
4.7/5
(44)
Which of the following statements regarding internet access is true?
(Multiple Choice)
4.9/5
(39)
What are the three ways of gathering information of users of an accounting information system? What are the associated ethical concerns?
(Essay)
4.9/5
(31)
Which of the following is not a criticism of utilitarianism?
(Multiple Choice)
4.8/5
(38)
The saying that an action is morally right if it is motivated by a good will that stems from a sense of duty is known as:
(Multiple Choice)
4.8/5
(39)
Some organisations restrict employee's access to external websites such as Facebook and eBay that are not relevant to work.Such conduct is ________ from an employee's perspective:
(Multiple Choice)
4.9/5
(29)
The reporting,by an employee or member of an organisation,of the unethical behaviour of a colleague is called:
(Multiple Choice)
4.8/5
(30)
What are the seven stages to go through when making an ethical decision?
(Essay)
4.9/5
(45)
The principles of the Privacy Act 1988 do not explicitly cover:
(Multiple Choice)
4.8/5
(44)
Which of the privacy principles covers the requirement that information should be protected from loss and unauthorised access?
(Multiple Choice)
4.9/5
(48)
Which of the following statements regarding ethical decision-making is true?
(Multiple Choice)
4.8/5
(38)
Which of the following fraud can occur if an employee is responsible for both approving and paying invoices?
(Multiple Choice)
4.8/5
(36)
Which of the following factors does not affect the usage of internet technology?
(Multiple Choice)
5.0/5
(42)
Showing 21 - 40 of 58
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)