NAME

Question Types


Start With


Question Limit

of 17 available terms

Advertisement Upgrade to remove ads

6 Written Questions

6 Multiple Choice Questions

  1. the simplest and most common way to commit a computer fraud is to alter or falsify computer input
  2. theft of company assets. examples include embezzlement, falsifying records
  3. includes tampering with company software, copying software illegally, using software in an unauthorized manner, and developing software to carry out an unauthorized activity
  4. the condition or situation that allows a person or organization to do three things: commit the fraud, conceal the fraud, and convert theft or misrepresentation to personal gain
  5. gaining an unfair advantage over another person. legally, there must be: 1) a false statement, representation, or disclosure 2) a material fact, which is something that induces a person to act 3) an intent to deceive 4) a justifiable reliance; that is, the person relies on the misrepresentation to take an action 5) an injury or loss suffered by the victim
  6. natural and political disasters, software errors and equipment malfunctions, unintentional acts, intentional acts (computer crimes)

5 True/False Questions

  1. computer fraudany fraud that requires computer technology knowledge to perpetrate, investigate, or prosecute it

          

  2. data fraudillegally using, copying, browsing, searching, or harming company data

          

  3. the fraud trianglenatural and political disasters, software errors and equipment malfunctions, unintentional acts, intentional acts (computer crimes)

          

  4. output fraudthe simplest and most common way to commit a computer fraud is to alter or falsify computer input

          

  5. white-collar criminalswhat fraud perpetrators are often referred to as

          

Create Set