Exam 5: Computer Fraud
Exam 1: Accounting Information Systems: an Overview100 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design, implementation, and Operation92 Questions
Select questions type
What are some of the distinguishing characteristics of fraud perpetrators?
Free
(Essay)
4.9/5
(38)
Correct Answer:
Some distinguishing characteristics of fraud perpetrators are: they tend to spend their illegal income to support their lifestyle; once they begin it becomes harder to stop and they become bolder as each incident happens; once they start to rely on the ill-gotten gains,they become more greedy and sometimes careless and overconfident.In the case of computer criminals,they are often young and have substantial computer knowledge.About two-thirds are men and likely to be an employee of the firm from which they steal.Many are unhappy or disgruntled with their employer because they feel unappreciated and underpaid.Most have no previous criminal record.
Which of the following is not a way to improve fraud detection?
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
D
Which situation below makes it easy for someone to commit a fraud?
Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
D
Which of the following fraudulent acts generally takes most time and effort?
(Multiple Choice)
4.8/5
(49)
Why is computer fraud often much more difficult to detect than other types of fraud?
(Multiple Choice)
4.9/5
(36)
Which characteristic of the fraud triangle often stems from a lack of internal controls within an organization?
(Multiple Choice)
4.7/5
(38)
Which fraud scheme involves stealing customer receipts and applying subsequent customer cash payments to cover the theft?
(Multiple Choice)
4.8/5
(36)
Why is computer fraud often more difficult to detect than other types of fraud?
(Multiple Choice)
5.0/5
(39)
Describe at least four ways a company can make fraud less likely to occur.
(Essay)
4.8/5
(32)
In many cases of fraud,the ________ takes more time and effort than the ________.
(Multiple Choice)
4.9/5
(36)
The fraud that requires the least computer knowledge or skill involves
(Multiple Choice)
4.8/5
(34)
"Cooking the books" is typically accomplished by all the following except
(Multiple Choice)
4.8/5
(35)
Which of the following is not an example of the fraud triangle characteristic concerned with rationalization?
(Multiple Choice)
4.8/5
(28)
Which of the following is not an example of one of the basic types of fraud?
(Multiple Choice)
4.9/5
(41)
Showing 1 - 20 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)