Exam 5: Computer Fraud

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The activist hacker group called Anonymous played Santa Claus one Christmas,indicating they were "granting wishes to people who are less fortunate than most." They were inundated with requests for iPads,iPhones,pizzas,and hundreds of other things.They hacked into banks and sent over $1 million worth of virtual credit cards to people.

(True/False)
4.8/5
(39)

Discuss the reasons for the rapid increase of computer fraud.

(Essay)
4.8/5
(28)

Which of the following is a financial pressure that could cause an employee to commit fraud?

(Multiple Choice)
4.9/5
(27)

Lauren wants to open a floral shop in a downtown business district.She doesn't have funds enough to purchase inventory and pay six months' rent up front.Lauren approaches a good friend,Jamie,to discuss the possibility of Jamie investing funds and becoming a 25% partner in the business.After a lengthy discussion,Jamie agrees to invest.Eight months later,Jamie discovered that Lauren has not be honest with her regarding some aspects of the business financial operation.In order for Jamie to sue Lauren for fraud,all the following must be true except

(Multiple Choice)
4.8/5
(33)

In many cases of fraud,the ________ takes more time and effort than the ________.

(Multiple Choice)
4.8/5
(31)

Asset misappropriation is ________ likely than fraudulent financial reporting.The amounts involved in asset misappropriation are much ________ than fraudulent financial reporting.

(Multiple Choice)
4.8/5
(33)

Which of the following is not an example of misappropriation of assets?

(Multiple Choice)
4.9/5
(35)

What characteristics must be presented for an act to be considered fraudulent? Give an example to support your answer.

(Essay)
4.9/5
(33)

Which of the following is not a way to improve fraud detection?

(Multiple Choice)
4.8/5
(44)

What is the most prevalent opportunity within most companies to commit fraud?

(Multiple Choice)
5.0/5
(26)

Which of the following fraudulent acts generally takes most time and effort?

(Multiple Choice)
4.8/5
(31)

Which of the following is the best way to hide theft of assets?

(Multiple Choice)
4.7/5
(36)

Which of the following is an example of data fraud?

(Multiple Choice)
4.8/5
(38)

Computer systems are particularly vulnerable to computer fraud because

(Multiple Choice)
4.9/5
(36)

Which of the following is least likely to result in computer fraud?

(Multiple Choice)
4.9/5
(36)

Identify the threat below that is not one of the four types of threats faced by accounting information systems.

(Multiple Choice)
4.8/5
(40)

Researchers have compared the psychological and demographic characteristics of white-collar criminals,violent criminals,and the general public.They found that

(Multiple Choice)
4.8/5
(39)

Why do many computer fraud cases go unreported and unprosecuted?

(Multiple Choice)
4.9/5
(31)

Describe some of the most frequent fraudulent financial reporting schemes.

(Essay)
4.7/5
(38)

Fraud perpetrators are often referred to as

(Multiple Choice)
4.7/5
(40)
Showing 41 - 60 of 83
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)