Exam 5: Computer Fraud
Exam 1: Accounting Information Systems: an Overview94 Questions
Exam 2: Overview of Transaction Processing and Enterprise Resource Planning Systems95 Questions
Exam 3: Systems Documentation Techniques102 Questions
Exam 4: Relational Databases98 Questions
Exam 5: Computer Fraud60 Questions
Exam 6: Computer Fraud and Abuse Techniques60 Questions
Exam 7: Control and Accounting Information Systems100 Questions
Exam 8: Controls for Information Security69 Questions
Exam 9: Confidentiality and Privacy Controls51 Questions
Exam 10: Processing Integrity and Availability Controls81 Questions
Exam 11: Auditing Computer-Based Information Systems93 Questions
Exam 12: The Revenue Cycle: Sales to Cash Collections100 Questions
Exam 13: The Expenditure Cycle: Purchasing to Cash Disbursements100 Questions
Exam 14: The Production Cycle86 Questions
Exam 15: The Human Resources Management and Payroll Cycle77 Questions
Exam 16: General Ledger and Reporting System74 Questions
Exam 17: Database Design Using the Rea Data Model80 Questions
Exam 18: Implementing an Rea Model in a Relational Database84 Questions
Exam 19: Special Topics in Rea Modeling90 Questions
Exam 20: Introduction to Systems Development and Systems Analysis100 Questions
Exam 21: Ais Development Strategies97 Questions
Exam 22: Systems Design,implementation,and Operation92 Questions
Select questions type
Which situation below makes it easy for someone to commit a fraud?
(Multiple Choice)
4.9/5
(27)
Which of the following will not reduce the likelihood of an occurrence of fraud?
(Multiple Choice)
4.9/5
(39)
Why do fraudulent acts often go unreported and are therefore not prosecuted?
(Essay)
4.8/5
(29)
Which fraud scheme involves stealing customer receipts and applying subsequent customer cash payments to cover the theft?
(Multiple Choice)
4.7/5
(42)
Which of the following is the greatest risk to information systems and causes the greatest dollar losses?
(Multiple Choice)
4.7/5
(35)
Which of the following is not an example of the fraud triangle characteristic concerned with rationalization?
(Multiple Choice)
4.8/5
(45)
Researchers have compared the psychological and demographic characteristics of white-collar criminals,violent criminals,and the general public.They found that
(Multiple Choice)
4.9/5
(37)
The most efficient way to conceal asset misappropriation is to
(Multiple Choice)
4.9/5
(36)
________ is a simple,yet effective,method for catching or preventing many types of employee fraud.
(Multiple Choice)
4.9/5
(40)
Seble wants to open a floral shop in a downtown business district.She doesn't have funds enough to purchase inventory and pay six months'' rent up front.Seble approaches a good friend,Zhou,to discuss the possibility of Zhou investing funds and becoming a 25% partner in the business.After a lengthy discussion Zhou agrees to invest.Eight months later,Zhou and Seble have a major argument.In order for Zhou to sue Seble for fraud,all the following must be true except
(Multiple Choice)
4.7/5
(45)
Why is computer fraud often much more difficult to detect than other types of fraud?
(Multiple Choice)
4.8/5
(29)
What agency did the United States create to use cyber weapons and to defend against cyber attacks?
(Multiple Choice)
4.9/5
(38)
Intentional or reckless conduct that results in materially misleading financial statements is called
(Multiple Choice)
4.9/5
(41)
Showing 41 - 60 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)