Exam 5: Computer Fraud
Exam 1: Conceptual Foundations of Accounting Information Systems115 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems107 Questions
Exam 3: Systems Documentation Techniques108 Questions
Exam 4: Relational Databases113 Questions
Exam 5: Computer Fraud83 Questions
Exam 6: Computer Fraud and Abuse Techniques96 Questions
Exam 7: Control and Accounting Information Systems132 Questions
Exam 8: Controls for Information Security100 Questions
Exam 9: Confidentiality and Privacy Controls61 Questions
Exam 10: Processing Integrity and Availability Controls95 Questions
Exam 11: Auditing Computer-Based Information Systems116 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections108 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements108 Questions
Exam 14: The Production Cycle95 Questions
Exam 15: The Human Resources Management and Payroll Cycle86 Questions
Exam 16: General Ledger and Reporting System83 Questions
Exam 17: Database Design Using the Rea Data Model90 Questions
Exam 18: Implementing an Rea Model in a Relational Database98 Questions
Exam 19: Special Topics in Rea Modeling98 Questions
Exam 20: Introduction to Systems Development and Systems Analysis124 Questions
Exam 21: Ais Development Strategies117 Questions
Exam 22: Systems Design, implementation, and Operation105 Questions
Select questions type
What are some of the distinguishing characteristics of fraud perpetrators?
(Essay)
4.9/5
(41)
This component of the fraud triangle explains the incentive or motivation for someone to commit fraud.
(Multiple Choice)
4.8/5
(40)
Explain the various computer fraud classifications using the data processing model.Provide an example for each computer fraud classification.
(Essay)
5.0/5
(32)
Undetected data transmission errors are an example of a(n)________ threat.
(Multiple Choice)
5.0/5
(37)
Intentional or reckless conduct that results in materially misleading financial statements is called
(Multiple Choice)
4.8/5
(34)
Describe ways that the Treadway Commission has recommended to reduce fraudulent financial reporting.
(Essay)
4.8/5
(38)
Describe at least four ways a company can make fraud less likely to occur.
(Essay)
4.9/5
(46)
________ is a simple,yet effective,method for catching or preventing many types of employee fraud.
(Multiple Choice)
4.9/5
(40)
The simplest and most common way to commit a computer fraud is to
(Multiple Choice)
4.9/5
(34)
The two most common types of fraud impacting financial statements are
(Multiple Choice)
4.9/5
(45)
Which type of threat poses the greatest risk to information systems?
(Multiple Choice)
4.8/5
(47)
The most efficient way to conceal asset misappropriation is to
(Multiple Choice)
4.9/5
(39)
Most fraud perpetrators have previous criminal record; they were dishonest and disrespected members of their community.
(True/False)
4.9/5
(35)
The fraud that requires the least computer knowledge or skill involves
(Multiple Choice)
4.9/5
(33)
At Facebook,an automated system for verifying configuration value errors backfired,causing every single client to try to fix accurate data it perceived as invalid.Since the fix involved querying a cluster of databases,that cluster was quickly overwhelmed by hundreds of thousands of queries a second.The resultant crash took the Facebook system offline for two-and-a-half hours.
(True/False)
4.9/5
(35)
Showing 61 - 80 of 83
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)