NAME: ________________________

Question Types


Start With


Question Limit

of 17 available terms

Upgrade to
remove ads

6 Written Questions

6 Multiple Choice Questions

  1. includes unauthorized system use, including the theft of computer time and services
  2. includes tampering with company software, copying software illegally, using software in an unauthorized manner, and developing software to carry out an unauthorized activity
  3. three conditions are present when fraud occurs: a pressure, an opportunity, and a rationalization
  4. what fraud perpetrators are often referred to as
  5. theft of company assets. examples include embezzlement, falsifying records
  6. any fraud that requires computer technology knowledge to perpetrate, investigate, or prosecute it

5 True/False Questions

  1. pressurea person's incentive or motivation for committing fraud (financial, emotional, lifestyle)

          

  2. data fraudunless properly safeguarded, displayed or printed output can be stolen, copied or misused

          

  3. fraudgaining an unfair advantage over another person. legally, there must be: 1) a false statement, representation, or disclosure 2) a material fact, which is something that induces a person to act 3) an intent to deceive 4) a justifiable reliance; that is, the person relies on the misrepresentation to take an action 5) an injury or loss suffered by the victim

          

  4. sabotagedeliberate destruction or harm to a system

          

  5. rationalizationillegally using, copying, browsing, searching, or harming company data

          

Create Set